Zhiyong Zhang

Orcid: 0000-0003-3061-7768

Affiliations:
  • Henan University of Science and Technology, Information Engineering College, Luoyang, China
  • Iowa State University, Ames, IA, USA (2015 - 2016)
  • Xi'an Jiaotong University, School of Management, China (2010 - 2013)


According to our database1, Zhiyong Zhang authored at least 48 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Combinatorial Optimization Analysis Method for Detecting Malicious Industrial Internet Attack Behaviors.
ACM Trans. Cyber Phys. Syst., January, 2024

2023
Multimodal fusion sensitive information classification based on mixed attention and CLIP model1.
J. Intell. Fuzzy Syst., December, 2023

Disinformation Propagation Trend Analysis and Identification Based on Social Situation Analytics and Multilevel Attention Network.
IEEE Trans. Comput. Soc. Syst., April, 2023

A service collaboration method based on mobile edge computing in internet of things.
Multim. Tools Appl., February, 2023

Inference of User Desires to Spread Disinformation Based on Social Situation Analytics and Group Effect.
IEEE Trans. Dependable Secur. Comput., 2023

A Lightweight Cross-Domain Authentication Protocol for Trusted Access to Industrial Internet.
Int. J. Semantic Web Inf. Syst., 2023

2021
A Novel Spatio-Temporal Access Control Model for Online Social Networks and Visual Verification.
Int. J. Cloud Appl. Comput., 2021

2020
A crowdsourcing method for online social networks security assessment based on human-centric computing.
Hum. centric Comput. Inf. Sci., 2020

ParaCA: A Speculative Parallel Crawling Approach on Apache Spark.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020

An Adaptive Thread Partitioning Approach in Speculative Multithreading.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020

2019
ProCTA: program characteristic-based thread partition approach.
J. Supercomput., 2019

A Situational Analytic Method for User Behavior Pattern in Multimedia Social Networks.
IEEE Trans. Big Data, 2019

An improvement for combination rule in evidence theory.
Future Gener. Comput. Syst., 2019

A Novel Social Situation Analytics-Based Recommendation Algorithm for Multimedia Social Networks.
IEEE Access, 2019

Detecting Malicious Social Bots Based on Clickstream Sequences.
IEEE Access, 2019

TPAoPI: A Thread Partitioning Approach Based on Procedure Importance in Speculative Multithreading.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

2018
Guest Editorial: Recent Advances on Security and Privacy of Multimedia Big Data in the Critical Infrastructure.
Multim. Tools Appl., 2018

A novel crowd evaluation method for security and trustworthiness of online social networks platforms based on signaling theory.
J. Comput. Sci., 2018

The convergence of new computing paradigms and big data analytics methodologies for online social networks.
J. Comput. Sci., 2018

Trust evaluation based on evidence theory in online social networks.
Int. J. Distributed Sens. Networks, 2018

A Novel Authorization Scheme for Multimedia Social Networks Under Cloud Storage Method by Using MA-CP-ABE.
Int. J. Cloud Appl. Comput., 2018

Social media security and trustworthiness: Overview and new direction.
Future Gener. Comput. Syst., 2018

Recent research in computational intelligence paradigms into security and privacy for online social networks (OSNs).
Future Gener. Comput. Syst., 2018

More permutation polynomials with differential uniformity six.
Sci. China Inf. Sci., 2018

Crowd computing for social media ecosystems.
Appl. Soft Comput., 2018

Efficient Compressed Ciphertext Length Scheme Using Multi-Authority CP-ABE for Hierarchical Attributes.
IEEE Access, 2018

2017
CyVOD: a novel trinity multimedia social network scheme.
Multim. Tools Appl., 2017

Guest Editorial: Multimedia Social Network Security and Applications.
Multim. Tools Appl., 2017

A new conflict management method in Dempster-Shafer theory.
Int. J. Distributed Sens. Networks, 2017

Introduction to the special section on Recent Trends in Embedded Technologies and Wearable Systems: Computational Intelligence Solutions.
Comput. Electr. Eng., 2017

2016
A novel authorization delegation scheme for multimedia social networks by using proxy re-encryption.
Multim. Tools Appl., 2016

A Quantitative and Qualitative Analysis-based Security Risk Assessment for Multimedia Social Networks.
Int. J. Netw. Secur., 2016

2015
A novel approach to rights sharing-enabling digital rights management for mobile multimedia.
Multim. Tools Appl., 2015

面向多媒体数字版权保护的委托授权远程证明协议 (Delegation Authorization Protocol Based on Remote Attestation Applied in Multimedia DRM).
计算机科学, 2015

A Formal Analytic Approach to Credible Potential Path and Mining Algorithms for Multimedia Social Networks.
Comput. J., 2015

Security, Trust and Risk in Multimedia Social Networks.
Comput. J., 2015

A matrix factorization based trust factors model.
Proceedings of the IEEE International Conference on Information and Automation, 2015

2013
A trust model for multimedia social networks.
Soc. Netw. Anal. Min., 2013

A Social Network Information Propagation Model Considering Different Types of Social Relationships.
Proceedings of the Genetic and Evolutionary Computing, 2013

An Approach to Mobile Multimedia Digital Rights Management Based on Android.
Proceedings of the Genetic and Evolutionary Computing, 2013

2012
Advance on Trust Model and Evaluation Method in Social Networks.
Proceedings of the 2012 Sixth International Conference on Genetic and Evolutionary Computing, 2012

Application of improved HU moments in object recognition.
Proceedings of the 2012 IEEE International Conference on Automation and Logistics, 2012

SAR and panchromatic image fusion based on region features in nonsubsampled contourlet transform domain.
Proceedings of the 2012 IEEE International Conference on Automation and Logistics, 2012

True random bit generator based on cell phone recording and chaotic encryption.
Proceedings of the 2012 IEEE International Conference on Automation and Logistics, 2012

2011
Usage Control Model for Digital Rights Management in Digital Home Networks.
J. Multim., 2011

2010
Utility-Analytic Approach and Swarm Simulations of Security Policies in Digital Rights Management.
J. Multim., 2010

Security, trust and risk in Digital Rights Management ecosystem.
Proceedings of the 2010 International Conference on High Performance Computing & Simulation, 2010

2006
Dynamic Capability Delegation Model for MAS, Architecture and Protocols in CSCW Environment.
Proceedings of the 10th International Conference on CSCW in Design, 2006


  Loading...