Zhun Zhang

Orcid: 0000-0003-3122-3816

According to our database1, Zhun Zhang authored at least 15 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Domain Isolated Tripartite Authenticated Key Agreement Protocol With Dynamic Revocation and Online Public Identity Updating for IIoT.
IEEE Internet Things J., May, 2024

2023
A grey breakpoint prediction model and its application in forecasting and policy evaluation.
Eng. Appl. Artif. Intell., November, 2023

A novel grey model with fractional reverse accumulation for forecasting natural gas consumption.
Comput. Ind. Eng., May, 2023

Forecasting per Capita Energy Consumption in China Using a Spatial Discrete Grey Prediction Model.
Syst., 2023

2022
A More Accurate and Robust Binary Ring-LWE Decryption Scheme and Its Hardware Implementation for IoT Devices.
IEEE Trans. Very Large Scale Integr. Syst., 2022

Ring-ExpLWE: A High-Performance and Lightweight Post-Quantum Encryption Scheme for Resource-Constrained IoT Devices.
IEEE Internet Things J., 2022

Forecasting Chinese provincial carbon emissions using a novel grey prediction model considering spatial correlation.
Expert Syst. Appl., 2022

2021
GGCAD: A Novel Method of Adversarial Detection by Guided Grad-CAM.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

2020
An M-Cache-Based Security Monitoring and Fault Recovery Architecture for Embedded Processor.
IEEE Trans. Very Large Scale Integr. Syst., 2020

Unknown Attack Detection Based on Zero-Shot Learning.
IEEE Access, 2020

2019
A LS-SVM based Measurement Points Classification Algorithm for Adjacent Targets in WSNs.
Sensors, 2019

Data Communication Security Based on Novel Reversible Mean Shift Steganography Algorithm.
Proceedings of the IEEE International Conference on Consumer Electronics, 2019

2018
A Security Design for the Detecting of Buffer Overflow Attacks in IoT Device.
IEEE Access, 2018

An Optimized Method of Hardware Implementation for LHash in the Embedded System.
Proceedings of the 2nd International Conference on Computer Science and Application Engineering, 2018

2015
A multi-objective power allocation scheme for heterogeneous wireless networks cooperative communication system.
Proceedings of the Seventh International Conference on Advanced Computational Intelligence, 2015


  Loading...