Zonghua Zhang

Orcid: 0000-0003-0379-7089

According to our database1, Zonghua Zhang authored at least 124 papers between 2004 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Adaptive Threshold-Based ZUPT for Single IMU-Enabled Wearable Pedestrian Localization.
IEEE Internet Things J., July, 2023

Guest Editorial Special Issue on Collaborative Intelligence for Green Internet of Things in the 6G Era.
IEEE Trans. Green Commun. Netw., June, 2023

A survey on misbehavior detection for connected and autonomous vehicles.
Veh. Commun., 2023

Multivariate Time Series Anomaly Detection: Fancy Algorithms and Flawed Evaluation Methodology.
CoRR, 2023

A Benchmarking Study of Matching Algorithms for Knowledge Graph Entity Alignment.
CoRR, 2023

A Generic Approach to Integrating Time into Spatial-Temporal Forecasting via Conditional Neural Fields.
CoRR, 2023

ARTMAN '23: First Workshop on Recent Advances in Resilient and Trustworthy ML Systems in Autonomous Networks.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Breaking Boundaries: Balancing Performance and Robustness in Deep Wireless Traffic Forecasting.
Proceedings of the 2023 Workshop on Recent Advances in Resilient and Trustworthy ML Systems in Autonomous Networks, 2023

2022
Deformable Enhancement and Adaptive Fusion for Depth Map Super-Resolution.
IEEE Signal Process. Lett., 2022

Phase Target-Based Calibration of Projector Radial Chromatic Aberration for Color Fringe 3D Measurement Systems.
Sensors, 2022

A High-Accuracy Calibration Method for a Telecentric Structured Light System.
Sensors, 2022

PDR-Net: Progressive depth reconstruction network for color guided depth map super-resolution.
Neurocomputing, 2022

Explainable artificial intelligence for cybersecurity: a literature survey.
Ann. des Télécommunications, 2022

Interactions between artificial intelligence and cybersecurity to protect future networks.
Ann. des Télécommunications, 2022

A Model-Data-Fusion Pole Piece Thickness Prediction Method With Multisensor Fusion for Lithium Battery Rolling Machine.
IEEE Access, 2022

2021
On Achieving Trustworthy Service Function Chaining.
IEEE Trans. Netw. Serv. Manag., 2021

Predistorting Projected Fringes for High-Accuracy 3-D Phase Mapping in Fringe Projection Profilometry.
IEEE Trans. Instrum. Meas., 2021

Leveraging Network Functions Virtualization Orchestrators to Achieve Software-Defined Access Control in the Clouds.
IEEE Trans. Dependable Secur. Comput., 2021

Monocular Depth Estimation with Joint Attention Feature Distillation and Wavelet-Based Loss Function.
Sensors, 2021

Practical Cross-Layer Radio Frequency-Based Authentication Scheme for Internet of Things.
Sensors, 2021

Research on integral separation control of warp tension based on fuzzy parameter optimization.
J. Intell. Fuzzy Syst., 2021

Radio Frequency Identification and Sensing: Integration of Wireless Powering, Sensing, and Communication for IIoT Innovations.
IEEE Commun. Mag., 2021

Disaster-Resilient Service Function Chain Embedding Based on Multi-Path Routing.
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021

Little Help Makes a Big Difference: Leveraging Active Learning to Improve Unsupervised Time Series Anomaly Detection.
Proceedings of the Service-Oriented Computing - ICSOC 2021 Workshops, 2021

Rethinking Deep Packet Inspection Design and Deployment in the era of SDN and NFV.
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021

2020
Cost-Effective Wearable Indoor Localization and Motion Analysis via the Integration of UWB and IMU.
Sensors, 2020

Design and feasibility study of roots-type power machine rotor based on numerical simulation.
Neural Comput. Appl., 2020

3D palmprint identification using blocked histogram and improved sparse representation-based classifier.
Neural Comput. Appl., 2020

Joint Attention Mechanisms for Monocular Depth Estimation With Multi-Scale Convolutions and Adaptive Weight Adjustment.
IEEE Access, 2020

AutoMAP: Diagnose Your Microservice-based Web Applications Automatically.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

Generative Deep Learning for Internet of Things Network Traffic Generation.
Proceedings of the 25th IEEE Pacific Rim International Symposium on Dependable Computing, 2020

Message from the Program Chairs CSCloud 2020 CSCloud-EdgeCom 2020.
Proceedings of the 7th IEEE International Conference on Cyber Security and Cloud Computing, 2020

Lightweight Authentication Scheme for Internet of Things.
Proceedings of the IEEE 17th Annual Consumer Communications & Networking Conference, 2020

2019
Person Recognition Using 3-D Palmprint Data Based on Full-Field Sinusoidal Fringe Projection.
IEEE Trans. Instrum. Meas., 2019

SCTSC: A Semicentralized Traffic Signal Control Mode With Attribute-Based Blockchain in IoVs.
IEEE Trans. Comput. Soc. Syst., 2019

Calibration of the Relative Orientation between Multiple Depth Cameras Based on a Three-Dimensional Target.
Sensors, 2019

Radio Frequency Identification and Sensing Techniques and Their Applications - A Review of the State-of-the-Art.
Sensors, 2019

Measurement of the Three-Dimensional Shape of Discontinuous Specular Objects Using Infrared Phase-Measuring Deflectometry.
Sensors, 2019

Footprints: Ensuring Trusted Service Function Chaining in the World of SDN and NFV.
Proceedings of the Security and Privacy in Communication Networks, 2019

Anomalous Communications Detection in IoT Networks Using Sparse Autoencoders.
Proceedings of the 18th IEEE International Symposium on Network Computing and Applications, 2019

Performance Evaluation of Sensors Lightweight Security Mechanism.
Proceedings of the 16th IEEE International Conference on Mobile Ad Hoc and Sensor Systems Workshops, 2019

2018
Editorial: Special Issue on Security and Privacy of IoT.
World Wide Web, 2018

An automatically vetting mechanism for SSL error-handling vulnerability in android hybrid Web apps.
World Wide Web, 2018

CreditCoin: A Privacy-Preserving Blockchain-Based Incentive Announcement Network for Communications of Smart Vehicles.
IEEE Trans. Intell. Transp. Syst., 2018

Distance Calibration between Reference Plane and Screen in Direct Phase Measuring Deflectometry.
Sensors, 2018

NFV Security Survey: From Use Case Driven Threat Analysis to State-of-the-Art Countermeasures.
IEEE Commun. Surv. Tutorials, 2018

Securing Named Data Networking: Attribute-Based Encryption and Beyond.
IEEE Commun. Mag., 2018

Roundtable Gossip Algorithm: A Novel Sparse Trust Mining Method for Large-Scale Recommendation Systems.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

IoT Devices Recognition Through Network Traffic Analysis.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

2017
REPLACE: A Reliable Trust-Based Platoon Service Recommendation Scheme in VANET.
IEEE Trans. Veh. Technol., 2017

Three-Dimensional Shape Measurements of Specular Objects Using Phase-Measuring Deflectometry.
Sensors, 2017

An Iterative Distortion Compensation Algorithm for Camera Calibration Based on Phase Target.
Sensors, 2017

Full-Field Calibration of Color Camera Chromatic Aberration using Absolute Phase Maps.
Sensors, 2017

3D palmprint identification combining blocked ST and PCA.
Pattern Recognit. Lett., 2017

TPSQ: Trust-based platoon service query via vehicular communications.
Peer-to-Peer Netw. Appl., 2017

PTRS: A privacy-preserving trust-based relay selection scheme in VANETs.
Peer-to-Peer Netw. Appl., 2017

ArOMA: An SDN based autonomic DDoS mitigation framework.
Comput. Secur., 2017

A novel MMC sub-module based on controllability theory.
Proceedings of the IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, China, October 29, 2017

An improved multi-level converter with a novel sub-module circuit.
Proceedings of the IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, China, October 29, 2017

A novel topolgoy of multi-level converters using split wound coupled inductors.
Proceedings of the IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, China, October 29, 2017

SDAC: A New Software-Defined Access Control Paradigm for Cloud-Based Systems.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

Controller DAC: Securing SDN controller with dynamic access control.
Proceedings of the IEEE International Conference on Communications, 2017

Adaptive Policy-driven Attack Mitigation in SDN.
Proceedings of the 1st International Workshop on Security and Dependability of Multi-Domain Infrastructures, 2017

A First Step Towards Security Extension for NFV Orchestrator.
Proceedings of the ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2017

2016
Next Road Rerouting: A Multiagent System for Mitigating Unexpected Urban Traffic Congestion.
IEEE Trans. Intell. Transp. Syst., 2016

Achieving Probabilistic Anonymity in a Linear and Hybrid Randomization Model.
IEEE Trans. Inf. Forensics Secur., 2016

TripSense: A Trust-Based Vehicular Platoon Crowdsensing Scheme with Privacy Preservation in VANETs.
Sensors, 2016

Dynamic Secure Interconnection for Security Enhancement in Cloud Computing.
Int. J. Comput. Commun. Control, 2016

SecMANO: Towards Network Functions Virtualization (NFV) Based Security MANagement and Orchestration.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

ControllerSEPA: A Security-Enhancing SDN Controller Plug-in for OpenFlow Applications.
Proceedings of the 17th International Conference on Parallel and Distributed Computing, 2016

SRV: Switch-based rules verification in software defined networking.
Proceedings of the IEEE NetSoft Conference and Workshops, 2016

Novel Constructions of Cramer-Shoup Like Cryptosystems Based on Index Exchangeable Family.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
An Accurate Projector Calibration Method Based on Polynomial Distortion Representation.
Sensors, 2015

Towards cross-layer approaches to coping with misbehavior in mobile ad hoc networks: an anatomy of reputation systems.
Secur. Commun. Networks, 2015

A comprehensive study of flooding attack consequences and countermeasures in Session Initiation Protocol (SIP).
Secur. Commun. Networks, 2015

Enabling security functions with SDN: A feasibility study.
Comput. Networks, 2015

Learning optimal measurement and control of assembly robot for large-scale heavy-weight parts.
Proceedings of the 2015 IEEE International Conference on Robotics and Biomimetics, 2015

A new survey adjustment method for laser tracker relocation.
Proceedings of the 2015 IEEE International Conference on Robotics and Biomimetics, 2015

VTrust: A Robust Trust Framework for Relay Selection in Hybrid Vehicular Communications.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Secure PUFs-Based Cipher Suite for Enabling TLS to Authenticate Hardware Devices.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
Certificateless Remote Anonymous Authentication Schemes for WirelessBody Area Networks.
IEEE Trans. Parallel Distributed Syst., 2014

Multidisciplinary approaches to achieving efficient and trustworthy eHealth monitoring systems.
Proceedings of the 2014 IEEE/CIC International Conference on Communications in China, 2014

An Efficient Admission Control Algorithm for Virtual Sensor Networks.
Proceedings of the 2014 IEEE International Conference on High Performance Computing and Communications, 2014

2013
Exploring attack graph for cost-benefit security hardening: A probabilistic approach.
Comput. Secur., 2013

Achieving Probabilistic Anonymity Against One-to-Multiple Linkage Attacks.
Proceedings of the IEEE 10th International Conference on e-Business Engineering, 2013

2012
Fast and Efficient Countermeasure for MAC Layer Misbehavior in MANETs.
IEEE Wirel. Commun. Lett., 2012

HPM: A novel hierarchical Peer-to-Peer model for lookup acceleration with provision of physical proximity.
J. Netw. Comput. Appl., 2012

An efficient certificateless remote anonymous authentication scheme for wireless body area networks.
Proceedings of IEEE International Conference on Communications, 2012

Certificateless Partially Blind Signature.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

Boosting Logical Attack Graph for Efficient Security Control.
Proceedings of the Seventh International Conference on Availability, 2012

2011
Discrete logarithm based additively homomorphic encryption and secure data aggregation.
Inf. Sci., 2011

Mitigating Packet Dropping Problem in Mobile Ad Hoc Networks: Proposals and Challenges.
IEEE Commun. Surv. Tutorials, 2011

Toward cost-sensitive self-optimizing anomaly detection and response in autonomic networks.
Comput. Secur., 2011

Practical network traffic analysis in P2P environment.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011

HASVC: An Efficient Hybrid Authentication Scheme for Vehicular Communication.
Proceedings of IEEE International Conference on Communications, 2011

2010
RADAR: A reputation-driven anomaly detection system for wireless mesh networks.
Wirel. Networks, 2010

STARS: A Simple and Efficient <i>S</i>cheme for Providing Transparent <i>T</i>raceability and <i>A</i>nonymity to <i>R</i>eputation <i>S</i>ystems.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2010

MobiTrust: Trust Management System in Mobile Social Computing.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
M-AID: An adaptive middleware built upon anomaly detectors for intrusion detection and rational response.
ACM Trans. Auton. Adapt. Syst., 2009

Janus: A dual-purpose analytical model for understanding, characterizing and countermining multi-stage collusive attacks in enterprise networks.
J. Netw. Comput. Appl., 2009

Measuring IDS-estimated attack impacts for rational incident response: A decision theoretic approach.
Comput. Secur., 2009

Discrete-Log-Based Additively Homomorphic Encryption and Secure WSN Data Aggregation.
Proceedings of the Information and Communications Security, 11th International Conference, 2009

On Achieving Cost-Sensitive Anomaly Detection and Response in Mobile Ad Hoc Networks.
Proceedings of IEEE International Conference on Communications, 2009

A Dynamic Protection System of Web Server in Virtual Cluster Using Live Migration.
Proceedings of the Eighth IEEE International Conference on Dependable, 2009

2008
Special Issue on "Security and Privacy Preservation in Vehicular Communications" Wiley's Security and Communication Networks Journal.
Secur. Commun. Networks, 2008

Defending against packet dropping attack in vehicular <i>ad hoc</i> networks.
Secur. Commun. Networks, 2008

RADAR: A ReputAtion-Based Scheme for Detecting Anomalous Nodes in WiReless Mesh Networks.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

A model-based semi-quantitative approach for evaluating security of enterprise networks.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

Balancing energy consumption for uniform data gathering wireless sensor networks.
Proceedings of the Twenty-Seventh Annual ACM Symposium on Principles of Distributed Computing, 2008

Hardening Botnet by a Rational Botmaster.
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008

Boosting Markov Reward Models for Probabilistic Security Evaluation by Characterizing Behaviors of Attacker and Defender.
Proceedings of the The Third International Conference on Availability, 2008

2007
3D Periodic Human Motion Reconstruction from 2D Motion Sequences.
Neural Comput., 2007

An Observation-Centric Analysis on the Modeling of Anomaly-based Intrusion Detection.
Int. J. Netw. Secur., 2007

Constructing a Multilayered Boundary to Defend against Intrusive Anomalies.
IEICE Trans. Inf. Syst., 2007

2006
Janus: A Two-Sided Analytical Model for Multi-Stage Coordinated Attacks.
Proceedings of the Information Security and Cryptology - ICISC 2006, 9th International Conference, Busan, Korea, November 30, 2006

2005
View-independent person identification from human gait.
Neurocomputing, 2005

Application of online-training SVMs for real-time intrusion detection with different considerations.
Comput. Commun., 2005

A Brief Comparative Study on Analytical Models of Computer System Dependability and Security.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

An Efficient Protocol for the Problem of Secure Two-party Vector Dominance.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

A Brief Observation-Centric Analysis on Anomaly-Based Intrusion Detection.
Proceedings of the Information Security Practice and Experience, 2005

Dynamic Combination of Multiple Host-Based Anomaly Detectors with Broader Detection Coverage and Fewer False Alerts.
Proceedings of the Networking, 2005

Constructing Multi-Layered Boundary to Defend Against Intrusive Anomalies: An Autonomic Detection Coordinator.
Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June, 2005

2004
Suppressing False Alarms of Intrusion Detection Using Improved Text Categorization Method.
Proceedings of the 2004 IEEE International Conference on e-Technology, 2004

Online Training of SVMs for Real-time Intrusion Detection.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004


  Loading...