Zhihong Zhou

Orcid: 0009-0000-5897-931X

According to our database1, Zhihong Zhou authored at least 26 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Local-Ascending-Global Learning Strategy for Brain-Computer Interface.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Asymmetric Heat Transfer in Aircraft Electrothermal Anti-Icing.
Symmetry, February, 2023

Blockchain-based Collaborative Caching Mechanism for Information Center IoT.
J. ICT Stand., 2023

Research on Anomaly Detection in Vehicular CAN Based on Bi-LSTM.
J. Cyber Secur. Mobil., 2023

Comparative Research on Embedding Methods for Video Knowledge Graph.
Proceedings of the 2023 2nd Asia Conference on Algorithms, Computing and Machine Learning, 2023

2022
Malicious encrypted traffic features extraction model based on unsupervised feature adaptive learning.
J. Comput. Virol. Hacking Tech., 2022

A Study of the Critical Velocity of the Droplet Transition from the Cassie to Wenzel State on the Symmetric Pillared Surface.
Symmetry, 2022

Free Vibration Analysis of a Spinning Composite Laminated Truncated Conical Shell under Hygrothermal Environment.
Symmetry, 2022

The min-p robust optimization approach for facility location problem under uncertainty.
J. Comb. Optim., 2022

2021
Research on a Technical Scheme for Evaluating the Stickiness of Family Group Users.
Proceedings of the 2nd Asia Conference on Computers and Communications, 2021

2020
Ciphertext-only fault analysis on the Midori lightweight cryptosystem.
Sci. China Inf. Sci., 2020

2019
Fall detection and recognition based on GCN and 2D Pose.
Proceedings of the 6th International Conference on Systems and Informatics, 2019

Road sludge detection and identification based on improved Yolov3.
Proceedings of the 6th International Conference on Systems and Informatics, 2019

2018
Security Analysis of the PHOTON Lightweight Cryptosystem in the Wireless Body Area Network.
KSII Trans. Internet Inf. Syst., 2018

Understanding structure-based social network de-anonymization techniques via empirical analysis.
EURASIP J. Wirel. Commun. Netw., 2018

Classification of botnet families based on features self-learning under Network Traffic Censorship.
Proceedings of the Third International Conference on Security of Smart Cities, 2018

2017
Optical multi-image encryption scheme based on discrete cosine transform and nonlinear fractional Mellin transform.
Multim. Tools Appl., 2017

Security Analysis of the Whirlpool Hash Function in the Cloud of Things.
KSII Trans. Internet Inf. Syst., 2017

Deeply Understanding Structure-based Social Network De-anonymization.
Proceedings of the 2017 International Conference on Identification, 2017

2016
Impossible Differential Fault Analysis on the LED Lightweight Cryptosystem in the Vehicular Ad-Hoc Networks.
IEEE Trans. Dependable Secur. Comput., 2016

Relay selection scheme for amplify-and-forward cooperative communication system with artificial noise.
Secur. Commun. Networks, 2016

2015
Security Analysis of the Lightweight Cryptosystem TWINE in the Internet of Things.
KSII Trans. Internet Inf. Syst., 2015

2014
Multistage Stochastic Decomposition: A Bridge between Stochastic Programming and Approximate Dynamic Programming.
SIAM J. Optim., 2014

2013
Multi-Party Concurrent Signature Scheme Based on Designated Verifiers.
J. Comput., 2013

2011
Optimization simulation: the case of multi-stage stochastic decision models.
Proceedings of the Winter Simulation Conference 2011, 2011

2009
Enhancements of two-stage stochastic decomposition.
Comput. Oper. Res., 2009


  Loading...