default search action
Zhihong Rao
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j8]Yang Bai, Gaojie Xing, Hongyan Wu, Zhihong Rao, Chengzong Peng, Yutang Rao, Wentao Yang, Chuan Ma, Jiani Li, Yimin Zhou:
ISPPFL: An incentive scheme based privacy-preserving federated learning for avatar in metaverse. Comput. Networks 251: 110654 (2024) - [j7]Yuguang Zhang, Zhiyong Zhang, Wei Zhang, Deming Mao, Zhihong Rao:
Stop-Probability-Based Network Topology Discovery Method. IEICE Trans. Commun. 107(9): 583-594 (2024) - [j6]Jian Zhou, Yu Su, Yuhe Qiu, Xiaoyou He, Zhihong Rao:
Prediction of UAV Positions using Particle Swarm optimisation-based Kalman filter. Int. J. Robotics Autom. 39(4): 312-319 (2024) - 2022
- [j5]Lizong Zhang, Wei Zhang, Guoming Lu, Pengcheng Yang, Zhihong Rao:
Feature-level interpolation-based GAN for image super-resolution. Pers. Ubiquitous Comput. 26(4): 995-1010 (2022) - [j4]Qingbing Ji, Zhihong Rao, Man Chen, Jie Luo:
Security Analysis of Shadowsocks(R) Protocol. Secur. Commun. Networks 2022: 4862571:1-4862571:6 (2022) - 2020
- [c10]Yong Zhang, Lizong Zhang, Zhihong Rao, Guiduo Duan, Chunyu Wang:
OSAF_e: One-Stage Anchor Free Object Detection Method Considering Effective Area. AIMS 2020: 159-167 - [c9]Zhe Liu, Lizong Zhang, Zhihong Rao, Guisong Liu:
Attention-Based Interaction Trajectory Prediction. AIMS 2020: 168-175 - [c8]Ye Han, Jianfeng Chen, Zhihong Rao, Yifan Wang, Jie Liu:
Vulnerability Discovery in Network Systems Based on Human-Machine Collective Intelligence. IHSI 2020: 453-458 - [c7]Jie Liu, Da He, Yifan Wang, Jianfeng Chen, Zhihong Rao:
Software Vulnerability Mining Based on the Human-Computer Coordination. IHSI 2020: 532-538
2010 – 2019
- 2019
- [j3]Shengli Pan, Zongwang Zhang, Zhiyong Zhang, Deze Zeng, Rui Xu, Zhihong Rao:
General Identifiability Condition for Network Topology Monitoring with Network Tomography. Sensors 19(19): 4125 (2019) - [c6]Zhi Sun, Zhihong Rao, Jianfeng Chen, Rui Xu, Da He, Hui Yang, Jie Liu:
An Opcode Sequences Analysis Method For Unknown Malware Detection. ICGDA 2019: 15-19 - [c5]Jie Liu, Da He, Zhihong Rao:
An Analysis Model of Buffer Overflow Vulnerability Based on FSM. ICGDA 2019: 47-51 - [c4]Rui Xu, Zhiyong Zhang, Zhihong Rao, Jianfeng Chen, Ming Li, Fang Liu, Shengli Pan:
Cyberspace Surveying and Mapping: Hierarchical Model and Resource Formalization. INFOCOM Workshops 2019: 68-72 - [c3]Jianfeng Chen, Chunlin Li, Zhihong Rao, Rui Xu, Chunhui Hu:
Review of Innovative Cyberspace Security Research Inspired by Bionics Computing Methods. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2019: 1486-1493 - 2018
- [j2]Zhihong Rao, Weina Niu, Xiaosong Zhang, Hongwei Li:
Tor anonymous traffic identification based on gravitational clustering. Peer-to-Peer Netw. Appl. 11(3): 592-601 (2018) - [c2]Jie Liu, Jianfeng Chen, Zhihong Rao, Zhi Sun, Hui Yang, Rui Xu:
A massive RDF storage approach based on graph database. ICGDA 2018: 169-173
2000 – 2009
- 2008
- [j1]Zhihong Rao, Gary M. Bone:
Nonlinear Modeling and Control of Servo Pneumatic Actuators. IEEE Trans. Control. Syst. Technol. 16(3): 562-569 (2008) - 2006
- [c1]Zhihong Rao, Gary M. Bone:
Modeling and Control of a Miniature Servo Pneumatic Actuator. ICRA 2006: 1806-1811
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-13 00:38 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint