Zhihong Liu

Orcid: 0000-0003-3314-4943

According to our database1, Zhihong Liu authored at least 158 papers between 2000 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
New structure-preserving algorithms of Gauss-Seidel and successive over-relaxation iteration methods for quaternion linear systems.
Numer. Algorithms, March, 2024

2023
Emotion recognition based on convolutional gated recurrent units with attention.
Connect. Sci., December, 2023

High-breakdown-voltage (>3000 V) and low-power-dissipation Al0.3Ga0.7N/GaN/Al0.1Ga0.9N double-heterostructure HEMTs with Ohmic/Schottky hybrid drains and Al2O3/SiO2 passivation.
Sci. China Inf. Sci., December, 2023

The intermittent diagnosability for two families of interconnection networks under the PMC model and MM* model.
Discret. Appl. Math., November, 2023

Hybrid Contextual Semantic Network for Accurate Segmentation and Detection of Small-Size Stroke Lesions From MRI.
IEEE J. Biomed. Health Informatics, August, 2023

Color image watermarking based on a fast structure-preserving algorithm of quaternion singular value decomposition.
Signal Process., July, 2023

1.7 kV normally-off p-GaN gate high-electron-mobility transistors on a semi-insulating SiC substrate.
Sci. China Inf. Sci., February, 2023

ManuChain II: Blockchained Smart Contract System as the Digital Twin of Decentralized Autonomous Manufacturing Toward Resilience in Industry 5.0.
IEEE Trans. Syst. Man Cybern. Syst., 2023

Personalized Recommendation Model Based on Improved GRU Network in Big Data Environment.
J. Electr. Comput. Eng., 2023

DLPriv: Deep Learning Based Dynamic Location Privacy Mechanism for LBS in Internet-of-Vehicles.
Proceedings of the International Conference on Networking and Network Applications, 2023

Topological Loss on Graph Auto-Encoders.
Proceedings of the International Conference on Networking and Network Applications, 2023

2D-Shapley: A Framework for Fragmented Data Valuation.
Proceedings of the International Conference on Machine Learning, 2023

Encrypted Voice Traffic Fingerprinting: An Adaptive Network Traffic Feature Encoding Model.
Proceedings of the IEEE International Conference on Communications, 2023

Social Networks Based Robust Federated Learning for Encrypted Traffic Classification.
Proceedings of the IEEE International Conference on Communications, 2023

MT-CNN: A Classification Method of Encrypted Traffic Based on Semi-Supervised Learning.
Proceedings of the IEEE Global Communications Conference, 2023

Software Vulnerability Detection with GPT and In-Context Learning.
Proceedings of the 8th International Conference on Data Science in Cyberspace, 2023

Ga2O3 Heterojunction PN Diodes with Suppressed Background Carrier Concentration for Improved Breakdown Voltage.
Proceedings of the Device Research Conference, 2023

2022
Mission-Oriented Miniature Fixed-Wing UAV Swarms: A Multilayered and Distributed Architecture.
IEEE Trans. Syst. Man Cybern. Syst., 2022

Unsupervised Tissue Segmentation via Deep Constrained Gaussian Network.
IEEE Trans. Medical Imaging, 2022

Survivable Networks for Consensus.
IEEE Trans. Control. Netw. Syst., 2022

A New Method of Solving Special Solutions of Quaternion Generalized Lyapunov Matrix Equation.
Symmetry, 2022

Solving Quaternion Linear System Based on Semi-Tensor Product of Quaternion Matrices.
Symmetry, 2022

WHUVID: A Large-Scale Stereo-IMU Dataset for Visual-Inertial Odometry and Autonomous Driving in Chinese Urban Scenarios.
Remote. Sens., 2022

Automatic fine-grained glomerular lesion recognition in kidney pathology.
Pattern Recognit., 2022

Integrating human experience in deep reinforcement learning for multi-UAV collision detection and avoidance.
Ind. Robot, 2022

Sliding window based ON/OFF flow watermarking on Tor.
Comput. Commun., 2022

Design and simulation of reverse-blocking Schottky-drain AlN/AlGaN HEMTs with drain field plate.
Sci. China Inf. Sci., 2022

Investigation of heavy ion irradiation effects on 650-V p-GaN normally-off HEMTs.
Sci. China Inf. Sci., 2022

Learning to rank method combining multi-head self-attention with conditional generative adversarial nets.
Array, 2022

Representing the Topology of Complex Networks Based on Graph Embedding.
Proceedings of the International Conference on Networking and Network Applications, 2022

HLT: A Hierarchical Vulnerability Detection Model Based on Transformer.
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022

Trajectory Obfuscation and Detection in Internet-of-vehicles.
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022

Event-Based Obstacle Sensing and Avoidance for an UAV Through Deep Reinforcement Learning.
Proceedings of the Artificial Intelligence - Second CAAI International Conference, 2022

2021
Deep Learning Methods for Lung Cancer Segmentation in Whole-Slide Histopathology Images - The ACDC@LungHP Challenge 2019.
IEEE J. Biomed. Health Informatics, 2021

An Explainable Diagnostic Method for Autism Spectrum Disorder Using Neural Network.
J. Inf. Sci. Eng., 2021

A Differential Privacy Topology Scheme for Average Path Length Query.
J. Inf. Sci. Eng., 2021

Image-Based Visual Servo Tracking Control of a Ground Moving Target for a Fixed-Wing Unmanned Aerial Vehicle.
J. Intell. Robotic Syst., 2021

Formation Reconfiguration for Fixed-Wing UAVs.
J. Intell. Robotic Syst., 2021

Multi-target tracking for unmanned aerial vehicle swarms using deep reinforcement learning.
Neurocomputing, 2021

A Cost Function for the Uncertainty of Matching Point Distribution on Image Registration.
ISPRS Int. J. Geo Inf., 2021

Autonomous Landing of a Rotor Unmanned Aerial Vehicle on a Boat Using Image-Based Visual Servoing.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2021

Cold-start Recommendation Method Based on Homomorphic Encryption.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021

Multi-Scale Selective Feedback Network with Dual Loss for Real Image Denoising.
Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, 2021

Margin Loss Based On Adaptive Metric For Image Recognition.
Proceedings of the 2021 IEEE International Conference on Image Processing, 2021

Covert Wireless Communications in the Presence of an Active Adversary.
Proceedings of the ICC 2021, 2021

Pri-PGD: Forging privacy-preserving graph towards spectral-based graph neural network.
Proceedings of the IEEE Global Communications Conference, 2021

Pseudo 3D Auto-Correlation Network for Real Image Denoising.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

Graph Embedding Based on Euclidean Distance Matrix and its Applications.
Proceedings of the CIKM '21: The 30th ACM International Conference on Information and Knowledge Management, Virtual Event, Queensland, Australia, November 1, 2021

2020
<i>R</i><sub><i>g</i></sub> conditional diagnosability: A novel generalized measure of system-level diagnosis.
Theor. Comput. Sci., 2020

Graphene Electro-Optical Switch Modulator by Adjusting Propagation Length Based on Hybrid Plasmonic Waveguide in Infrared Band.
Sensors, 2020

TeroKit: A Database-Driven Web Server for Terpenome Research.
J. Chem. Inf. Model., 2020

Covert Wireless Communication in IoT Network: From AWGN Channel to THz Band.
IEEE Internet Things J., 2020

Deep Learning Methods for Lung Cancer Segmentation in Whole-slide Histopathology Images - the ACDC@LungHP Challenge 2019.
CoRR, 2020

Comprehensive Design of Device Parameters for GaN Vertical Trench MOSFETs.
IEEE Access, 2020

Accelerating Method of Evolutionary Ensemble Learning Based on Gaussian Random Field.
Proceedings of the Simulation Tools and Techniques - 12th EAI International Conference, 2020

Feel Vibration: Challenge-Response Mobile Authentication with Covert Channel.
Proceedings of the 20th IEEE International Conference on Communication Technology, 2020

Perosonalized Differentially Private Location Collection Method with Adaptive GPS Discretization.
Proceedings of the Cyber Security - 17th China Annual Conference, 2020

Spectrum Privacy Preserving for Social Networks: A Personalized Differential Privacy Approach.
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020

An Interpretable Machine Learning Survival Model for Predicting Long-term Kidney Outcomes in IgA Nephropathy.
Proceedings of the AMIA 2020, 2020

2019
Cooperative Jamming for Secrecy of Wireless Communications.
J. Inf. Sci. Eng., 2019

Social Tie Based Cooperative Jamming for D2D Communications in the Internet of Things.
J. Inf. Sci. Eng., 2019

Exploring Chemical and Biological Space of Terpenoids.
J. Chem. Inf. Model., 2019

Structurally Selective Mechanism of Liver X Receptor Ligand: In Silico and In Vitro Studies.
J. Chem. Inf. Model., 2019

Research on the high-accuracy mileage statistics method based on the civil satellite data.
Int. J. Distributed Sens. Networks, 2019

Mission Oriented Miniature Fixed-wing UAV Swarms: A Multi-layered and Distributed Architecture.
CoRR, 2019

Hiding Communications in AWGN Channels and THz Band with Interference Uncertainty.
CoRR, 2019

Challenges in Covert Wireless Communications with Active Warden on AWGN channels.
CoRR, 2019

Coordinated flight control of miniature fixed-wing UAV swarms: methods and experiments.
Sci. China Inf. Sci., 2019

DeepScreening: a deep learning-based screening web server for accelerating drug discovery.
Database J. Biol. Databases Curation, 2019

An Optimized Image-Based Visual Servo Control for Fixed-Wing Unmanned Aerial Vehicle Target Tracking With Fixed Camera.
IEEE Access, 2019

Edge Weight Differential Privacy Based Spectral Query Algorithm.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

Comparison of Neural Networks' Performance in Early Screening of Autism Spectrum Disorders Under Two MRI Principles.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

Security Mechanisms to Provide Convoy Member Co-presence Authentication in Vehicle Platooning.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

Research on Resolution Limit of Community Detection in Location-Based Social Networks.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

Adaptive N-Gram Model Based Differentially Private Trajectory Synthesis Method.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

Collective Influence Based Privacy Preservation for Social Networks.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

A Topology Based Differential Privacy Scheme for Average Path Length Query.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

Intelligent station area recognition technology based on NB-IoT and SVM.
Proceedings of the 28th IEEE International Symposium on Industrial Electronics, 2019

Listen!: Audio-based Smart IoT Device Pairing Protocol.
Proceedings of the 19th IEEE International Conference on Communication Technology, 2019

P3SGD: Patient Privacy Preserving SGD for Regularizing Deep CNNs in Pathological Image Classification.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019

UAV Autonomous Landing using Visual Servo Control based on Aerostack.
Proceedings of the 3rd International Conference on Computer Science and Application Engineering, 2019

Leader-Follower Formation Control of Unmanned Aerial Vehicles Based on Active Disturbances Rejection Control.
Proceedings of the 2019 4th International Conference on Automation, 2019

G2C: A Generator-to-Classifier Framework Integrating Multi-Stained Visual Cues for Pathological Glomerulus Classification.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

2018
Covert Wireless Communications in IoT Systems: Hiding Information in Interference.
IEEE Wirel. Commun., 2018

Identifying opinion leader nodes in online social networks with a new closeness evaluation algorithm.
Soft Comput., 2018

Retrieval of the Fine-Mode Aerosol Optical Depth over East China Using a Grouped Residual Error Sorting (GRES) Method from Multi-Angle and Polarized Satellite Data.
Remote. Sens., 2018

基于信任网络的协同过滤推荐方法 (Trust Network Based Collaborative Filtering Recommendation Algorithm).
计算机科学, 2018

基于社交网络信任关系的服务推荐方法 (Service Recommendation Method Based on Social Network Trust Relationships).
计算机科学, 2018

TCMAnalyzer: A Chemo- and Bioinformatics Web Service for Analyzing Traditional Chinese Medicine.
J. Chem. Inf. Model., 2018

Covert Wireless Communications with Active Eavesdropper on AWGN Channels.
CoRR, 2018

Springbok: An App deployment accelerator for Android smart devices.
Comput. Electr. Eng., 2018

True Random Number Generation Using Process Scheduling of Android Systems.
Proceedings of the International Conference on Networking and Network Applications, 2018

Cooperative Jamming for Secrecy of Wireless Communications.
Proceedings of the International Conference on Networking and Network Applications, 2018

Preserving Privacy for Hubs and Links in Social Networks.
Proceedings of the International Conference on Networking and Network Applications, 2018

Exploiting Social Tie and SIR Characteristic for Cooperative Jamming: A Game Model in a Two-layer Network.
Proceedings of the International Conference on Networking and Network Applications, 2018

On Covert Communication with Interference Uncertainty.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Dispatching and management methods for communication of UAV swarm.
Proceedings of the 2nd International Conference on High Performance Compilation, 2018

2017
Retrieval of Aerosol Optical Depth Using the Empirical Orthogonal Functions (EOFs) Based on PARASOL Multi-Angle Intensity Data.
Remote. Sens., 2017

Predicting DPP-IV inhibitors with machine learning approaches.
J. Comput. Aided Mol. Des., 2017

The Sound and the Fury: Hiding Communications in Noisy Wireless Networks with Interference Uncertainty.
CoRR, 2017

cBinderDB: a covalent binding agent database.
Bioinform., 2017

PTS: a pharmaceutical target seeker.
Database J. Biol. Databases Curation, 2017

A Secure Authentication Method of Intelligent Terminals Based on Jensen-Shannon Divergence.
Proceedings of the International Conference on Networking and Network Applications, 2017

Modeling Key Infection in Large-Scale Sensor Networks.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

An Infrared Target Tracking System and Implementation.
Proceedings of the Communications, Signal Processing, and Systems, 2017

Study of the Algorithm for the Classification of Brain Waves.
Proceedings of the Communications, Signal Processing, and Systems, 2017

A Survey of Network Reconstruction on Social Network.
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017

Centrality Based Privacy Preserving for Weighted Social Networks.
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017

2016
Dynamic Resource Allocation for MapReduce with Partitioning Skew.
IEEE Trans. Computers, 2016

Retrieval of Aerosol Fine-Mode Fraction from Intensity and Polarization Measurements by PARASOL over East Asia.
Remote. Sens., 2016

Cooperative Jammer Placement for Physical Layer Security Enhancement.
IEEE Netw., 2016

Experimental study of bias dependence of pulsed laser-induced single-event transient in SiGe HBT.
Microelectron. Reliab., 2016

OPTIMA: On-Line Partitioning Skew Mitigation for MapReduce with Resource Adjustment.
J. Netw. Syst. Manag., 2016

ROUTE: run-time robust reducer workload estimation for MapReduce.
Int. J. Netw. Manag., 2016

DynamicAdjust: Dynamic Resource Adjustment for Mitigating Skew in MapReduce.
IEICE Trans. Inf. Syst., 2016

ASDB: a resource for probing protein functions with small molecules.
Bioinform., 2016

Some Identities Related to Restricted Lattice Paths.
Proceedings of the 9th International Symposium on Computational Intelligence and Design, 2016

Divide-and-conquer based cooperative jamming: Addressing multiple eavesdroppers in close proximity.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Problems and Countermeasures of 3S Technologies Application in Precision Agriculture.
Proceedings of the Computer and Computing Technologies in Agriculture X, 2016

On cooperative jamming in wireless networks with eavesdroppers at arbitrary locations.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Multi-Class Error-Diffusion with Blue-Noise Property and Its Application.
Proceedings of the Computer Vision, Imaging and Computer Graphics Theory and Applications, 2016

Multi-Class Error-Diffusion with Blue-noise Property.
Proceedings of the 11th Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications (VISIGRAPP 2016), 2016

2015
3S: three-signature path authentication for BGP security.
Secur. Commun. Networks, 2015

Securing network coding against pollution attacks in P2P converged ubiquitous networks.
Peer-to-Peer Netw. Appl., 2015

Binding Kinetics versus Affinities in BRD4 Inhibition.
J. Chem. Inf. Model., 2015

Discovering New Acetylcholinesterase Inhibitors by Mining the <i>Buzhongyiqi</i> Decoction Recipe Data.
J. Chem. Inf. Model., 2015

On Key Evolution over Wireless Channels.
Int. J. Distributed Sens. Networks, 2015

Aesthetic QR Codes Based on Two-Stage Image Blending.
Proceedings of the MultiMedia Modeling - 21st International Conference, 2015

DREAMS: Dynamic resource allocation for MapReduce with data skew.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

Information Acquisition for Farmland Soil Carbon Sink Impact Factors Based on ZigBee Wireless Network.
Proceedings of the Computer and Computing Technologies in Agriculture IX, 2015

2014
Inversion of Aerosol Optical Depth Based on the CCD and IRS Sensors on the HJ-1 Satellites.
Remote. Sens., 2014

Impact of bias conditions on performance degradation in SiGe HBTs irradiated by 10 MeV Br ion.
Microelectron. Reliab., 2014

Reliable Enhanced Secure Code Dissemination with Rateless Erasure Codes in WSNs.
J. Softw., 2014

Structure-Function Analysis of the Conserved Tyrosine and Diverse π-Stacking among Class I Histone Deacetylases: A QM (DFT)/MM MD Study.
J. Chem. Inf. Model., 2014

ChemStable: a web server for rule-embedded naïve Bayesian learning approach to predict compound stability.
J. Comput. Aided Mol. Des., 2014

2013
Enhancing Molecular Shape Comparison by Weighted Gaussian Functions.
J. Chem. Inf. Model., 2013

Discovery of New Selective Human Aldose Reductase Inhibitors through Virtual Screening Multiple Binding Pocket Conformations.
J. Chem. Inf. Model., 2013

SIR: A Secure Identifier-Based Inter-Domain Routing for Identifier/Locator Split Network.
IEICE Trans. Commun., 2013

Fault and Intrusion Tolerance of Complex Networks: A Controllability View.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

A New Active Path Identification and Filtering Method.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

2012
Data security in unattended wireless sensor networks with mobile sinks.
Wirel. Commun. Mob. Comput., 2012

Secrecy Transfer.
Int. J. Distributed Sens. Networks, 2012

A Trusted Authentication Scheme for Wireless Networks Using Direct Anonymous Attestation.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

Displacement fault detection of bearing weight saddle in TFDS based on hough transform and symmetry validation.
Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery, 2012

Out-of-Order-Delivery-Tolerant Secure Code Dissemination with Fountain Codes in Wireless Sensor Networks.
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012

Adapkeys: An Adaptive Security Scheme for Network Coding.
Proceedings of the 2012 IEEE Asia-Pacific Services Computing Conference, 2012

2010
Key Infection, Secrecy Transfer, and Key Evolution for Sensor Networks.
IEEE Trans. Wirel. Commun., 2010

2009
Asymmetric Key Pre-distribution Scheme for sensor networks.
IEEE Trans. Wirel. Commun., 2009

Coherence Resonance in Coupled Neuron Models Driven by Colored Noise.
Proceedings of the Fifth International Conference on Natural Computation, 2009

An Automated Trading System with Multi-indicator Fusion Based on D-S Evidence Theory in Forex Market.
Proceedings of the Sixth International Conference on Fuzzy Systems and Knowledge Discovery, 2009

2008
Keying Material Based Key Pre-distribution Scheme for Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2008

A pairwise key establishment scheme for heterogeneous sensor networks.
Proceedings of the 1st ACM International Workshop on Heterogeneous Sensor and Actor Networks, 2008

Keying material based key pre-distribution scheme.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2008

2007
Fuzzy Classification for Manufacture Design Documents Based on Domain Ontology and Document Structure Tagging.
Proceedings of the 11th International Conference on Computer Supported Cooperative Work in Design, 2007

2006
Design tools for reliability analysis.
Proceedings of the 43rd Design Automation Conference, 2006

2001
Full-Chip Reliability Simulation for VDSM Integrated Circuits.
Microelectron. Reliab., 2001

2000
GLACIER: A Hot Carrier Gate Level Circuit Characterization and Simulation System for VLSI Design.
Proceedings of the 1st International Symposium on Quality of Electronic Design (ISQED 2000), 2000

Gate-level aged timing simulation methodology for hot-carrier reliability assurance.
Proceedings of ASP-DAC 2000, 2000


  Loading...