Zhihong Liu

According to our database1, Zhihong Liu authored at least 78 papers between 2000 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Cooperative Jamming for Secrecy of Wireless Communications.
J. Inf. Sci. Eng., 2019

Social Tie Based Cooperative Jamming for D2D Communications in the Internet of Things.
J. Inf. Sci. Eng., 2019

Research on the high-accuracy mileage statistics method based on the civil satellite data.
IJDSN, 2019

Hiding Communications in AWGN Channels and THz Band with Interference Uncertainty.
CoRR, 2019

P3SGD: Patient Privacy Preserving SGD for Regularizing Deep CNNs in Pathological Image Classification.
CoRR, 2019

Challenges in Covert Wireless Communications with Active Warden on AWGN channels.
CoRR, 2019

An Optimized Image-Based Visual Servo Control for Fixed-Wing Unmanned Aerial Vehicle Target Tracking With Fixed Camera.
IEEE Access, 2019

Intelligent station area recognition technology based on NB-IoT and SVM.
Proceedings of the 28th IEEE International Symposium on Industrial Electronics, 2019

Leader-Follower Formation Control of Unmanned Aerial Vehicles Based on Active Disturbances Rejection Control.
Proceedings of the 2019 4th International Conference on Automation, 2019

G2C: A Generator-to-Classifier Framework Integrating Multi-Stained Visual Cues for Pathological Glomerulus Classification.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

2018
Covert Wireless Communications in IoT Systems: Hiding Information in Interference.
IEEE Wireless Commun., 2018

Identifying opinion leader nodes in online social networks with a new closeness evaluation algorithm.
Soft Comput., 2018

Retrieval of the Fine-Mode Aerosol Optical Depth over East China Using a Grouped Residual Error Sorting (GRES) Method from Multi-Angle and Polarized Satellite Data.
Remote Sensing, 2018

G2C: A Generator-to-Classifier Framework Integrating Multi-Stained Visual Cues for Pathological Glomerulus Classification.
CoRR, 2018

Covert Wireless Communications with Active Eavesdropper on AWGN Channels.
CoRR, 2018

Springbok: An App deployment accelerator for Android smart devices.
Computers & Electrical Engineering, 2018

True Random Number Generation Using Process Scheduling of Android Systems.
Proceedings of the International Conference on Networking and Network Applications, 2018

Cooperative Jamming for Secrecy of Wireless Communications.
Proceedings of the International Conference on Networking and Network Applications, 2018

Preserving Privacy for Hubs and Links in Social Networks.
Proceedings of the International Conference on Networking and Network Applications, 2018

Exploiting Social Tie and SIR Characteristic for Cooperative Jamming: A Game Model in a Two-layer Network.
Proceedings of the International Conference on Networking and Network Applications, 2018

On Covert Communication with Interference Uncertainty.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

2017
Retrieval of Aerosol Optical Depth Using the Empirical Orthogonal Functions (EOFs) Based on PARASOL Multi-Angle Intensity Data.
Remote Sensing, 2017

Predicting DPP-IV inhibitors with machine learning approaches.
Journal of Computer-Aided Molecular Design, 2017

The Sound and the Fury: Hiding Communications in Noisy Wireless Networks with Interference Uncertainty.
CoRR, 2017

cBinderDB: a covalent binding agent database.
Bioinformatics, 2017

PTS: a pharmaceutical target seeker.
Database, 2017

A Secure Authentication Method of Intelligent Terminals Based on Jensen-Shannon Divergence.
Proceedings of the International Conference on Networking and Network Applications, 2017

Modeling Key Infection in Large-Scale Sensor Networks.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

A Survey of Network Reconstruction on Social Network.
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017

Centrality Based Privacy Preserving for Weighted Social Networks.
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017

2016
Dynamic Resource Allocation for MapReduce with Partitioning Skew.
IEEE Trans. Computers, 2016

Retrieval of Aerosol Fine-Mode Fraction from Intensity and Polarization Measurements by PARASOL over East Asia.
Remote Sensing, 2016

Cooperative Jammer Placement for Physical Layer Security Enhancement.
IEEE Network, 2016

Experimental study of bias dependence of pulsed laser-induced single-event transient in SiGe HBT.
Microelectronics Reliability, 2016

OPTIMA: On-Line Partitioning Skew Mitigation for MapReduce with Resource Adjustment.
J. Network Syst. Manage., 2016

ROUTE: run-time robust reducer workload estimation for MapReduce.
Int. Journal of Network Management, 2016

DynamicAdjust: Dynamic Resource Adjustment for Mitigating Skew in MapReduce.
IEICE Transactions, 2016

ASDB: a resource for probing protein functions with small molecules.
Bioinformatics, 2016

Divide-and-conquer based cooperative jamming: Addressing multiple eavesdroppers in close proximity.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

On cooperative jamming in wireless networks with eavesdroppers at arbitrary locations.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Multi-Class Error-Diffusion with Blue-Noise Property and Its Application.
Proceedings of the Computer Vision, Imaging and Computer Graphics Theory and Applications, 2016

Multi-Class Error-Diffusion with Blue-noise Property.
Proceedings of the 11th Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications (VISIGRAPP 2016), 2016

2015
3S: three-signature path authentication for BGP security.
Security and Communication Networks, 2015

Securing network coding against pollution attacks in P2P converged ubiquitous networks.
Peer-to-Peer Networking and Applications, 2015

Binding Kinetics versus Affinities in BRD4 Inhibition.
Journal of Chemical Information and Modeling, 2015

Discovering New Acetylcholinesterase Inhibitors by Mining the Buzhongyiqi Decoction Recipe Data.
Journal of Chemical Information and Modeling, 2015

On Key Evolution over Wireless Channels.
IJDSN, 2015

Aesthetic QR Codes Based on Two-Stage Image Blending.
Proceedings of the MultiMedia Modeling - 21st International Conference, 2015

DREAMS: Dynamic resource allocation for MapReduce with data skew.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

Information Acquisition for Farmland Soil Carbon Sink Impact Factors Based on ZigBee Wireless Network.
Proceedings of the Computer and Computing Technologies in Agriculture IX, 2015

2014
Inversion of Aerosol Optical Depth Based on the CCD and IRS Sensors on the HJ-1 Satellites.
Remote Sensing, 2014

Impact of bias conditions on performance degradation in SiGe HBTs irradiated by 10 MeV Br ion.
Microelectronics Reliability, 2014

Reliable Enhanced Secure Code Dissemination with Rateless Erasure Codes in WSNs.
JSW, 2014

Structure-Function Analysis of the Conserved Tyrosine and Diverse π-Stacking among Class I Histone Deacetylases: A QM (DFT)/MM MD Study.
Journal of Chemical Information and Modeling, 2014

ChemStable: a web server for rule-embedded naïve Bayesian learning approach to predict compound stability.
Journal of Computer-Aided Molecular Design, 2014

2013
Enhancing Molecular Shape Comparison by Weighted Gaussian Functions.
Journal of Chemical Information and Modeling, 2013

Discovery of New Selective Human Aldose Reductase Inhibitors through Virtual Screening Multiple Binding Pocket Conformations.
Journal of Chemical Information and Modeling, 2013

SIR: A Secure Identifier-Based Inter-Domain Routing for Identifier/Locator Split Network.
IEICE Transactions, 2013

Fault and Intrusion Tolerance of Complex Networks: A Controllability View.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

A New Active Path Identification and Filtering Method.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

2012
Data security in unattended wireless sensor networks with mobile sinks.
Wireless Communications and Mobile Computing, 2012

Secrecy Transfer.
IJDSN, 2012

A Trusted Authentication Scheme for Wireless Networks Using Direct Anonymous Attestation.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

Displacement fault detection of bearing weight saddle in TFDS based on hough transform and symmetry validation.
Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery, 2012

Out-of-Order-Delivery-Tolerant Secure Code Dissemination with Fountain Codes in Wireless Sensor Networks.
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012

Adapkeys: An Adaptive Security Scheme for Network Coding.
Proceedings of the 2012 IEEE Asia-Pacific Services Computing Conference, 2012

2010
Key Infection, Secrecy Transfer, and Key Evolution for Sensor Networks.
IEEE Trans. Wireless Communications, 2010

2009
Asymmetric Key Pre-distribution Scheme for sensor networks.
IEEE Trans. Wireless Communications, 2009

Coherence Resonance in Coupled Neuron Models Driven by Colored Noise.
Proceedings of the Fifth International Conference on Natural Computation, 2009

An Automated Trading System with Multi-indicator Fusion Based on D-S Evidence Theory in Forex Market.
Proceedings of the Sixth International Conference on Fuzzy Systems and Knowledge Discovery, 2009

2008
Keying Material Based Key Pre-distribution Scheme for Sensor Networks.
Ad Hoc & Sensor Wireless Networks, 2008

A pairwise key establishment scheme for heterogeneous sensor networks.
Proceedings of the 1st ACM International Workshop on Heterogeneous Sensor and Actor Networks, 2008

Keying material based key pre-distribution scheme.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2008

2007
Fuzzy Classification for Manufacture Design Documents Based on Domain Ontology and Document Structure Tagging.
Proceedings of the 11th International Conference on Computer Supported Cooperative Work in Design, 2007

2006
Design tools for reliability analysis.
Proceedings of the 43rd Design Automation Conference, 2006

2001
Full-Chip Reliability Simulation for VDSM Integrated Circuits.
Microelectronics Reliability, 2001

2000
GLACIER: A Hot Carrier Gate Level Circuit Characterization and Simulation System for VLSI Design.
Proceedings of the 1st International Symposium on Quality of Electronic Design (ISQED 2000), 2000

Gate-level aged timing simulation methodology for hot-carrier reliability assurance.
Proceedings of ASP-DAC 2000, 2000


  Loading...