Zhihong Tian

According to our database1, Zhihong Tian authored at least 155 papers between 2004 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2022
Epidemic Risk Assessment by a Novel Communication Station Based Method.
IEEE Trans. Netw. Sci. Eng., 2022

IEPSBP: A Cost-Efficient Image Encryption Algorithm Based on Parallel Chaotic System for Green IoT.
IEEE Trans. Green Commun. Netw., 2022

Applying artificial bee colony algorithm to the multidepot vehicle routing problem.
Softw. Pract. Exp., 2022

A Blockchain-Based Distributed Computational Resource Trading System for Industrial Internet of Things Considering Multiple Preferences.
CoRR, 2022

MRI radiogenomics for intelligent diagnosis of breast tumors and accurate prediction of neoadjuvant chemotherapy responses-a review.
Comput. Methods Programs Biomed., 2022

2021
Spatiotemporal Data Cleaning and Knowledge Fusion.
Proceedings of the MDATA: A New Knowledge Representation Model, 2021

Knowledge Extraction: Automatic Classification of Matching Rules.
Proceedings of the MDATA: A New Knowledge Representation Model, 2021

Entity Alignment: Optimization by Seed Selection.
Proceedings of the MDATA: A New Knowledge Representation Model, 2021

Classifying encrypted traffic using adaptive fingerprints with multi-level attributes.
World Wide Web, 2021

An Aerial-Computing-Assisted Architecture for Large-Scale Sensor Networks.
IEEE Wirel. Commun., 2021

Introduction to the Special Section on Artificial Intelligence Security: Adversarial Attack and Defense.
IEEE Trans. Netw. Sci. Eng., 2021

LocJury: An IBN-Based Location Privacy Preserving Scheme for IoCV.
IEEE Trans. Intell. Transp. Syst., 2021

Honeypot Identification in Softwarized Industrial Cyber-Physical Systems.
IEEE Trans. Ind. Informatics, 2021

A Novel Web Attack Detection System for Internet of Things via Ensemble Classification.
IEEE Trans. Ind. Informatics, 2021

Contract and Lyapunov Optimization-Based Load Scheduling and Energy Management for UAV Charging Stations.
IEEE Trans. Green Commun. Netw., 2021

Deep-Green: A Dispersed Energy-Efficiency Computing Paradigm for Green Industrial IoT.
IEEE Trans. Green Commun. Netw., 2021

An Energy-Efficient In-Network Computing Paradigm for 6G.
IEEE Trans. Green Commun. Netw., 2021

A Topic Representation Model for Online Social Networks Based on Hybrid Human-Artificial Intelligence.
IEEE Trans. Comput. Soc. Syst., 2021

Malicious mining code detection based on ensemble learning in cloud computing environment.
Simul. Model. Pract. Theory, 2021

StFuzzer: Contribution-Aware Coverage-Guided Fuzzing for Smart Devices.
Secur. Commun. Networks, 2021

Attribution Classification Method of APT Malware in IoT Using Machine Learning Techniques.
Secur. Commun. Networks, 2021

Hierarchical Core Maintenance on Large Dynamic Graphs.
Proc. VLDB Endow., 2021

The Security of Internet of Vehicles Network: Adversarial Examples for Trajectory Mode Detection.
IEEE Netw., 2021

AutoD: Intelligent Blockchain Application Unpacking Based on JNI Layer Deception Call.
IEEE Netw., 2021

Building Agile and Resilient UAV Networks Based on SDN and Blockchain.
IEEE Netw., 2021

Secure Data Sharing Framework via Hierarchical Greedy Embedding in Darknets.
Mob. Networks Appl., 2021

Research on Intelligent Detection of Command Level Stack Pollution for Binary Program Analysis.
Mob. Networks Appl., 2021

A multiple-kernel clustering based intrusion detection scheme for 5G and IoT networks.
Int. J. Mach. Learn. Cybern., 2021

Power Grid-Oriented Cascading Failure Vulnerability Identifying Method Based on Wireless Sensors.
J. Sensors, 2021

Multi-party transaction framework for drone services based on alliance blockchain in smart cities.
J. Inf. Secur. Appl., 2021

IoT root union: A decentralized name resolving system for IoT based on blockchain.
Inf. Process. Manag., 2021

CorrAUC: A Malicious Bot-IoT Traffic Detection Method in IoT Network Using Machine-Learning Techniques.
IEEE Internet Things J., 2021

Multi-Candidate Voting Model Based on Blockchain.
IEEE CAA J. Autom. Sinica, 2021

PWG-IDS: An Intrusion Detection Model for Solving Class Imbalance in IIoT Networks Using Generative Adversarial Networks.
CoRR, 2021

TREATED: Towards Universal Defense against Textual Adversarial Attacks.
CoRR, 2021

A method of chained recommendation for charging piles in internet of vehicles.
Computing, 2021

Proof of Learning (PoLe): Empowering neural network training with consensus building on blockchains.
Comput. Networks, 2021

An Interactive System for Unfair Rating Detection Models in a Customized Perspective.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Mask is All You Need: Rethinking Mask R-CNN for Dense and Arbitrary-Shaped Scene Text Detection.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021

NASGuard: A Novel Accelerator Architecture for Robust Neural Architecture Search (NAS) Networks.
Proceedings of the 48th ACM/IEEE Annual International Symposium on Computer Architecture, 2021

PROCESS: Privacy-Preserving On-Chain Certificate Status Service.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

PRGAN: Personalized Recommendation with Conditional Generative Adversarial Networks.
Proceedings of the IEEE International Conference on Data Mining, 2021

CODEs: Chamfer Out-of-Distribution Examples against Overconfidence Issue.
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021

A Novel Malware Encrypted Traffic Detection Framework Based On Ensemble Learning.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

Generate Adversarial Examples Combined with Image Entropy Distribution.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

2020
Topic representation model based on microblogging behavior analysis.
World Wide Web, 2020

SoftSystem: Smart Edge Computing Device Selection Method for IoT Based on Soft Set Technique.
Wirel. Commun. Mob. Comput., 2020

A Reputation Management Scheme for Efficient Malicious Vehicle Identification over 5G Networks.
IEEE Wirel. Commun., 2020

Artificial Intelligence Security in 5G Networks: Adversarial Examples for Estimating a Travel Time Task.
IEEE Veh. Technol. Mag., 2020

Deep Learning Based Multi-Channel Intelligent Attack Detection for Data Security.
IEEE Trans. Sustain. Comput., 2020

Delving Deeper in Drone-Based Person Re-Id by Employing Deep Decision Forest and Attributes Fusion.
ACM Trans. Multim. Comput. Commun. Appl., 2020

DHPA: Dynamic Human Preference Analytics Framework: A Case Study on Taxi Drivers' Learning Curve Analysis.
ACM Trans. Intell. Syst. Technol., 2020

A Distributed Deep Learning System for Web Attack Detection on Edge Devices.
IEEE Trans. Ind. Informatics, 2020

Nei-TTE: Intelligent Traffic Time Estimation Based on Fine-Grained Time Derivation of Road Segments for Smart City.
IEEE Trans. Ind. Informatics, 2020

User and Entity Behavior Analysis under Urban Big Data.
Trans. Data Sci., 2020

Automatic Concept Extraction Based on Semantic Graphs From Big Data in Smart City.
IEEE Trans. Comput. Soc. Syst., 2020

A Low-Latency and Energy-Efficient Neighbor Discovery Algorithm for Wireless Sensor Networks.
Sensors, 2020

Preserving Location Privacy in UASN through Collaboration and Semantic Encapsulation.
IEEE Netw., 2020

Location Privacy Challenges in Mobile Edge Computing: Classification and Exploration.
IEEE Netw., 2020

Automated Attack and Defense Framework toward 5G Security.
IEEE Netw., 2020

Obstructive sleep apnea detection using ecg-sensor with convolutional neural networks.
Multim. Tools Appl., 2020

A novel routing verification approach based on blockchain for inter-domain routing in smart metropolitan area networks.
J. Parallel Distributed Comput., 2020

The effect of trade creation in China-Asean free trade area based on the gravity model.
J. Intell. Fuzzy Syst., 2020

AFLPro: Direction sensitive fuzzing.
J. Inf. Secur. Appl., 2020

Vcash: A Novel Reputation Framework for Identifying Denial of Traffic Service in Internet of Connected Vehicles.
IEEE Internet Things J., 2020

A Survey on Access Control in the Age of Internet of Things.
IEEE Internet Things J., 2020

Deep Reinforcement Learning for Partially Observable Data Poisoning Attack in Crowdsensing Systems.
IEEE Internet Things J., 2020

Deep learning based emotion analysis of microblog texts.
Inf. Fusion, 2020

A consistency-guaranteed approach for Internet of Things <i>software refactoring</i>.
Int. J. Distributed Sens. Networks, 2020

Hierarchically defining Internet of Things security: From CIA to CACA.
Int. J. Distributed Sens. Networks, 2020

Research on android infiltration technology based on the silent installation of an accessibility service.
Int. J. Distributed Sens. Networks, 2020

Selection of effective machine learning algorithm and Bot-IoT attacks traffic identification for internet of things in smart city.
Future Gener. Comput. Syst., 2020

Advanced persistent threat organization identification based on software gene of malware.
Trans. Emerg. Telecommun. Technol., 2020

The QoS and privacy trade-off of adversarial deep learning: An evolutionary game approach.
Comput. Secur., 2020

IoT malicious traffic identification using wrapper-based feature selection mechanisms.
Comput. Secur., 2020

Security of Mobile Multimedia Data: The Adversarial Examples for Spatio-temporal Data.
Comput. Networks, 2020

Functional immunization of networks based on message passing.
Appl. Math. Comput., 2020

A Public Psychological Pressure Index for Social Networks.
IEEE Access, 2020

A Lightweight Privacy-Preserving Communication Protocol for Heterogeneous IoT Environment.
IEEE Access, 2020

Restricted Region Based Iterative Gradient Method for Non-Targeted Attack.
IEEE Access, 2020

Inferring Passengers' Interactive Choices on Public Transits via MA-AL: Multi-Agent Apprenticeship Learning.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

SESM: Emotional Social Semantic and Time Series Analysis of Learners' Comments.
Proceedings of the 2020 IEEE International Conference on Systems, Man, and Cybernetics, 2020

LGMal: A Joint Framework Based on Local and Global Features for Malware Detection.
Proceedings of the 16th International Wireless Communications and Mobile Computing Conference, 2020

An IoT data sharing privacy preserving scheme.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

A Malware Detection Method for Health Sensor Data Based on Machine Learning.
Proceedings of the IEEE International Conference on Informatics, 2020

A defense scheme of voice control system against DolphinAttack.
Proceedings of the CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, 2020

A Novel Malware Detection Framework Based on Weighted Heterograph.
Proceedings of the CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, 2020

2019
Evaluating Reputation Management Schemes of Internet of Vehicles Based on Evolutionary Game Theory.
IEEE Trans. Veh. Technol., 2019

Real-Time Lateral Movement Detection Based on Evidence Reasoning Network for Edge Computing Environment.
IEEE Trans. Ind. Informatics, 2019

Automated Vulnerability Discovery and Exploitation in the Internet of Things.
Sensors, 2019

Erratum: Wang, Y. et al., A Privacy Preserving Scheme for Nearest Neighbor Query. <i>Sensors</i> 2018, <i>18</i>, 2440.
Sensors, 2019

A Fine-Grained Video Encryption Service Based on the Cloud-Fog-Local Architecture for Public and Private Videos.
Sensors, 2019

Low-Power Distributed Data Flow Anomaly-Monitoring Technology for Industrial Internet of Things.
Sensors, 2019

A Practical Neighbor Discovery Framework for Wireless Sensor Networks.
Sensors, 2019

Bidirectional self-adaptive resampling in internet of things big data learning.
Multim. Tools Appl., 2019

Trust architecture and reputation evaluation for internet of things.
J. Ambient Intell. Humaniz. Comput., 2019

Block-DEF: A secure digital evidence framework using blockchain.
Inf. Sci., 2019

HybridORAM: Practical oblivious cloud storage with constant bandwidth.
Inf. Sci., 2019

Toward a Comprehensive Insight Into the Eclipse Attacks of Tor Hidden Services.
IEEE Internet Things J., 2019

Timescale diversity facilitates the emergence of cooperation-extortion alliances in networked systems.
Neurocomputing, 2019

A data-driven method for future Internet route decision modeling.
Future Gener. Comput. Syst., 2019

Decision Propagation Networks for Image Classification.
CoRR, 2019

Automated Attack and Defense Framework for 5G Security on Physical and Logical Layers.
CoRR, 2019

Vcash: A Novel Reputation Framework for Identifying Denial of Traffic Service in Internet of Connected Vehicles.
CoRR, 2019

Popularity-driven strategy updating rule promotes cooperation in the spatial prisoner's dilemma game.
Appl. Math. Comput., 2019

Crowdsourcing Approach for Developing Hands-On Experiments in Cybersecurity Education.
IEEE Access, 2019

Lightweight Anonymous Geometric Routing for Internet of Things.
IEEE Access, 2019

Salaxy: Enabling USB Debugging Mode Automatically to Control Android Devices.
IEEE Access, 2019

Quantitative Assessment of Wireless Connected Intelligent Robot Swarms Network Security Situation.
IEEE Access, 2019

Can the Max-Min Fairness-Based Coalitional Mechanism in Competitive Networks be Trustful?
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

Preserving Location Privacy in Mobile Edge Computing.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

A Genetic-Algorithm Based Method for Storage Location Assignments in Mobile Rack Warehouses.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Effective Recycling Planning for Dockless Sharing Bikes.
Proceedings of the 27th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, 2019

2018
A Data Leakage Prevention Method Based on the Reduction of Confidential and Context Terms for Smart Mobile Devices.
Wirel. Commun. Mob. Comput., 2018

Automatically Traceback RDP-Based Targeted Ransomware Attacks.
Wirel. Commun. Mob. Comput., 2018

A Privacy Preserving Scheme for Nearest Neighbor Query.
Sensors, 2018

Answering the Min-Cost Quality-Aware Query on Multi-Sources in Sensor-Cloud Systems.
Sensors, 2018

Analysis of vulnerabilities in maritime supply chains.
Reliab. Eng. Syst. Saf., 2018

Medical image semantic segmentation based on deep learning.
Neural Comput. Appl., 2018

Anchored neighborhood deep network for single-image super-resolution.
EURASIP J. Image Video Process., 2018

A Real-Time Correlation of Host-Level Events in Cyber Range Service for Smart Campus.
IEEE Access, 2018

Automatic Non-Taxonomic Relation Extraction from Big Data in Smart City.
IEEE Access, 2018

Study on Advanced Botnet Based on Publicly Available Resources.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

A Location Privacy-Aware Method for kNN Query in Location Based Services.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

Automatic Taxonomy Construction for Eye Colors Data without Using Context Information.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

Deep Learning Based Attribute Classification Insider Threat Detection for Data Security.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

Structural Vulnerability of Complex Networks Under Multiple Edge-Based Attacks.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

How to Control Target Nodes in Dynamic Networks.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

An Intelligent Network Attack Detection Method Based on RNN.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

2017
A Conditional Probability Computation Method for Vulnerability Exploitation Based on CVSS.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

2016
Optimization in e-commerce market network based on value order parameter.
Inf. Technol. Manag., 2016

Evaluation method for node importance in container supply chain network.
Int. J. Serv. Technol. Manag., 2016

Dynamic online consumer trust forming mechanism research based on Beijing, China.
Proceedings of the International Conference on Logistics, Informatics and Service Sciences, 2016

A Measurement Study on Mainline DHT and Magnet Link.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016

Detection and Defense of SYN Flood Attacks Based on Dual Stack Network Firewall.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016

2015
An efficient parallel algorithm for exact multi-pattern matching.
Secur. Commun. Networks, 2015

2013
A New Evolution Mechanism Model for B2B E-Commerce Network.
J. Electron. Commer. Organ., 2013

A new evolution model for B2C e-commerce market.
Inf. Technol. Manag., 2013

Data Spoofing Attacks by IPv6 Tunnels.
IEICE Trans. Commun., 2013

An Improved Common Vulnerability Scoring System Based on K-means.
Proceedings of the Trustworthy Computing and Services, 2013

The Analysis of County Science and Technology Worker Internet Usage and Its Influence Factors.
Proceedings of the Computer and Computing Technologies in Agriculture VII, 2013

2011
A New Chinese Public Welfare Operation Mode based on Value Network Model.
Proceedings of the ICEIS 2011, 2011

Study on the Knowledge -Sharing Network of Innovation Teams using Social Network Analysis.
Proceedings of the ICEIS 2011, 2011

Study on the Evolution Mechanisms of the Network Public Opinion.
Proceedings of the ICEIS 2011, 2011

2009
Building lightweight intrusion detection system using wrapper-based feature selection mechanisms.
Comput. Secur., 2009

Towards lightweight and efficient DDOS attacks detection for web server.
Proceedings of the 18th International Conference on World Wide Web, 2009

Optimal Network Security Strengthening Using Attack-Defense Game Model.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

Optimizing Network Anomaly Detection Scheme Using Instance Selection Mechanism.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

2008
A lightweight web server anomaly detection method based on transductive scheme and genetic algorithms.
Comput. Commun., 2008

UBSF: A novel online URL-Based Spam Filter.
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), 2008

A Stochastic Game Theoretic Approach to Attack Prediction and Optimal Active Defense Strategy Decision.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008

Alertclu: A Realtime Alert Aggregation and Correlation System.
Proceedings of the International Conference on Cyberworlds 2008, 2008

2007
A Game Theoretic Method for Decision and Analysis of the Optimal Active Defense Strategy.
Proceedings of the Computational Intelligence and Security, International Conference, 2007

2006
Defending against distributed denial-of-service attacks with an auction-based method.
Web Intell. Agent Syst., 2006

2004
Defending Against Flash Crowds and Malicious Traffic Attacks with An Auction-Based Method.
Proceedings of the 2004 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2004), 2004


  Loading...