default search action
Zhen Hong
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j45]Zhenyu Wen, Yuheng Ye, Jie Su, Taotao Li, Jinhao Wan, Shilian Zheng, Zhen Hong, Shibo He, Haoran Duan, Yuexiang Li, Yawen Huang, Yefeng Zheng:
Unraveling Complexity: An Exploration Into Large-Scale Multimodal Signal Processing. IEEE Intell. Syst. 39(6): 48-57 (2024) - [j44]Yiming Wu, Gaoyun Lin, Lisong Liu, Zhen Hong, Yangyang Wang, Xing Yang, Zoe Lin Jiang, Shouling Ji, Zhenyu Wen:
MASiNet: Network Intrusion Detection for IoT Security Based on Meta-Learning Framework. IEEE Internet Things J. 11(14): 25136-25146 (2024) - [j43]Yubo Zhuang, Yourong Chen, Xudong Zhang, Tiaojuan Ren, Meng Han, Muhammad Alam, Zhen Hong:
A Large-Scale Node Lightweight Consensus Algorithm of Blockchain for Internet of Things. IEEE Internet Things J. 11(22): 37170-37186 (2024) - [j42]Jie Su, Zhen Hong, Lei Ye, Tao Liu, Sizhuang Liang, Shouling Ji, Gagangeet Singh Aujla, Reheem Beyah, Zhenyu Wen:
Trustworthy IAP: An Intelligent Applications Profiler to Investigate Vulnerabilities of Consumer Electronic Devices. IEEE Trans. Consumer Electron. 70(1): 4605-4616 (2024) - [j41]Zhen Hong, Lingling Lu, Dehua Zheng, Jiahui Suo, Peng Sun, Raheem Beyah, Zhenyu Wen:
Detect Insider Attacks in Industrial Cyber-physical Systems Using Multi-physical Features-based Fingerprinting. ACM Trans. Sens. Networks 20(2): 29:1-29:27 (2024) - [j40]Taotao Li, Zhen Hong, Wanglei Feng, Li Yu, Zhenyu Wen:
MS-ZeroWall: Detecting Zero-Day Multi-Step Attack in Smart Home Using VAE and HMM. IEEE Trans. Veh. Technol. 73(9): 13278-13291 (2024) - [c16]Taotao Li, Zhenyu Wen, Yuting Jiang, Jian Wang, Jie Su, Zhen Hong, Li Yu, Shibo He:
Meta-RFF: Few-Shot Open-Set Incremental Learning for RF Fingerprint Recognition via Multi-phase Meta Task Adaptation. WASA (1) 2024: 221-234 - 2023
- [j39]Tao Liu, Zhen Hong, Huan Chen:
A Traceability Localization Method of Acoustic Attack Source for MEMS Gyroscope. IEEE Embed. Syst. Lett. 15(1): 13-16 (2023) - [j38]Taotao Li, Zhenyu Wen, Yang Long, Zhen Hong, Shilian Zheng, Li Yu, Bo Chen, Xiaoniu Yang, Ling Shao:
The Importance of Expert Knowledge for Automatic Modulation Open Set Recognition. IEEE Trans. Pattern Anal. Mach. Intell. 45(11): 13730-13748 (2023) - [j37]Zhen Hong, Hernan A. Moreno, Laura V. Alvarez, Zhi Li, Yang Hong:
Triple Collocation of Ground-, Satellite- and Land Surface Model-Based Surface Soil Moisture Products in Oklahoma Part II: New Multi-Sensor Soil Moisture (MSSM) Product. Remote. Sens. 15(13): 3450 (2023) - [j36]Taotao Li, Zhen Hong, Qianming Cai, Li Yu, Zhenyu Wen, Renyu Yang:
BisSiam: Bispectrum Siamese Network Based Contrastive Learning for UAV Anomaly Detection. IEEE Trans. Knowl. Data Eng. 35(12): 12109-12124 (2023) - [c15]Peng Sun, Jie Su, Zhenyu Wen, Yejian Zhou, Zhen Hong, Shanqing Yu, Huaji Zhou:
Boosting Signal Modulation Few-Shot Learning with Pre-Transformation. ICASSP 2023: 1-5 - [c14]Peng Sun, Zhenyu Wen, Yejian Zhou, Zhen Hong, Tao Lin:
Neural Mode Estimation. ICASSP 2023: 1-5 - [c13]Xiong Li, Zhenyu Wen, Leiqiang Zhou, Chenwei Li, Yejian Zhou, Taotao Li, Zhen Hong:
Toward Cooperative 3D Object Reconstruction with Multi-agent. ICRA 2023: 4975-4982 - [d1]Jie Su, Zhen Hong, Lei Ye, Tao Liu, Sizhuang Liang, Shouling Ji, Gagangeet Singh Aujla, Reheem Beyah, Zhenyu Wen:
AC Power Consumption Dataset. IEEE DataPort, 2023 - 2022
- [j35]Shiqing Sang, Rusheng Wang, Zhen Hong:
Distributed Fusion Tracking Estimation Under Range-Only Measurement. IEEE Access 10: 40525-40535 (2022) - [j34]Yan Li, Yongchang Liu, Zhen Hong, Ying Wang, Xiuling Lu:
Combining machine learning with radiomics features in predicting outcomes after mechanical thrombectomy in patients with acute ischemic stroke. Comput. Methods Programs Biomed. 225: 107093 (2022) - [j33]Xiaona Zhang, Jie Feng, Zhen Hong, Xiaona Rui:
Modelling of the Slope Solute Loss Based on Fuzzy Neural Network Model. Comput. Syst. Sci. Eng. 42(2): 677-688 (2022) - [j32]Zhen Hong, Miao Hong, Ning Wang, Yong Ma, Xiaolong Zhou, Wei Wang:
A wearable-based posture recognition system with AI-assisted approach for healthcare IoT. Future Gener. Comput. Syst. 127: 286-296 (2022) - [j31]Zhen Hong, Hernan A. Moreno, Zhi Li, Shuo Li, John S. Greene, Yang Hong, Laura V. Alvarez:
Triple Collocation of Ground-, Satellite- and Land Surface Model-Based Surface Soil Moisture Products in Oklahoma - Part I: Individual Product Assessment. Remote. Sens. 14(22): 5641 (2022) - [j30]Rui Wang, Zhihua Wei, Haoran Duan, Shouling Ji, Yang Long, Zhen Hong:
EfficientTDNN: Efficient Architecture Search for Speaker Recognition. IEEE ACM Trans. Audio Speech Lang. Process. 30: 2267-2279 (2022) - [j29]Zhen Hong, Xiong Li, Zhenyu Wen, Leiqiang Zhou, Huan Chen, Jie Su:
ESP Spoofing: Covert Acoustic Attack on MEMS Gyroscopes in Vehicles. IEEE Trans. Inf. Forensics Secur. 17: 3734-3747 (2022) - 2021
- [j28]Jinyin Chen, Haibin Zheng, Hui Xiong, Ruoxi Chen, Tianyu Du, Zhen Hong, Shouling Ji:
FineFool: A novel DNN object contour attack on image recognition based on the attention perturbation adversarial technique. Comput. Secur. 104: 102220 (2021) - [j27]Taotao Li, Zhen Hong, Lisong Liu, Zhenyu Wen, Li Yu:
Meta-WF: Meta-Learning-Based Few-Shot Wireless Impersonation Detection for Wi-Fi Networks. IEEE Commun. Lett. 25(11): 3585-3589 (2021) - [j26]Zhen Hong, Chaofeng Yang, Li Yu:
$R$-Print: A System Residuals-Based Fingerprinting for Attack Detection in Industrial Cyber-Physical Systems. IEEE Trans. Ind. Electron. 68(11): 11458-11469 (2021) - [i2]Rui Wang, Zhihua Wei, Shouling Ji, Zhen Hong:
EfficientTDNN: Efficient Architecture Search for Speaker Recognition in the Wild. CoRR abs/2103.13581 (2021) - 2020
- [j25]Mengye Chen, Soumaya Nabih, Noah S. Brauer, Shang Gao, Jonathan J. Gourley, Zhen Hong, Randall L. Kolar, Yang Hong:
Can Remote Sensing Technologies Capture the Extreme Precipitation Event and Its Cascading Hydrological Response? A Case Study of Hurricane Harvey Using EF5 Modeling Framework. Remote. Sens. 12(3): 445 (2020) - [j24]Zhi Li, Mengye Chen, Shang Gao, Zhen Hong, Guoqiang Tang, Yixin Wen, Jonathan J. Gourley, Yang Hong:
Cross-Examination of Similarity, Difference and Deficiency of Gauge, Radar and Satellite Precipitation Measuring Uncertainties for Extreme Events Using Conventional Metrics and Multiplicative Triple Collocation. Remote. Sens. 12(8): 1258 (2020) - [j23]Dehua Zheng, Zhen Hong, Ning Wang, Ping Chen:
An Improved LDA-Based ELM Classification for Intrusion Detection Algorithm in IoT Application. Sensors 20(6): 1706 (2020) - [c12]Zhongyao Hu, Bo Chen, Rusheng Wang, Zhen Hong, Qiuxia Chen:
Distributed Nonlinear Fusion UKF. ICCA 2020: 272-276 - [c11]Taotao Li, Zhen Hong, Li Yu:
Machine Learning-based Intrusion Detection for IoT Devices in Smart Home. ICCA 2020: 277-282
2010 – 2019
- 2019
- [j22]Ning Wang, Zhen Hong:
An Energy-Efficient Topology Control Algorithm for Earth Building Monitoring Using Heterogeneous Wireless Sensor Networks. IEEE Access 7: 76120-76130 (2019) - [j21]Kuo-Min Ko, Po-Chang Ko, Shih-Yang Lin, Zhen Hong:
Quality-guided image classification toward information management applications. J. Vis. Commun. Image Represent. 63 (2019) - [j20]Zhen Hong, Rui Wang, Shouling Ji, Raheem Beyah:
Attacker Location Evaluation-Based Fake Source Scheduling for Source Location Privacy in Cyber-Physical Systems. IEEE Trans. Inf. Forensics Secur. 14(5): 1337-1350 (2019) - [j19]Yun Xu, Zhen Hong, Yan Su, Xin-hua Zhu:
Method of large acceleration change for in-flight alignment of projectiles based on double-vector observations. Trans. Inst. Meas. Control 41(10): 2782-2788 (2019) - [j18]Zhen Hong, Qian Shao, Xiaojing Liao, Raheem Beyah:
A secure routing protocol with regional partitioned clustering and Beta trust management in smart home. Wirel. Networks 25(7): 3805-3823 (2019) - [c10]Zhen Hong, Zinan Li, Yubin Xia:
SDVisor: Secure Debug Enclave with Hypervisor. SOSE 2019 - 2018
- [j17]Wei Cai, Zehua Wang, Jason B. Ernst, Zhen Hong, Chen Feng, Victor C. M. Leung:
Decentralized Applications: The Blockchain-Empowered Software System. IEEE Access 6: 53019-53033 (2018) - [j16]Haiyu Song, Zhen Hong, Hongbo Song, Wen-An Zhang:
Fusion estimation in clustering sensor networks under stochastic deception attacks. Int. J. Syst. Sci. 49(10): 2257-2266 (2018) - [j15]Zhen Hong, Carman K. M. Lee, Linda Zhang:
Procurement risk management under uncertainty: a review. Ind. Manag. Data Syst. 118(7): 1547-1574 (2018) - [j14]Yan Shen, Zhen Hong, Yang Pan, Jingjing Yu, Lane Maguire:
China's 1 km Merged Gauge, Radar and Satellite Experimental Precipitation Dataset. Remote. Sens. 10(2): 264 (2018) - [j13]Zhen Hong, Xiaoman Pan, Ping Chen, Xianchuang Su, Ning Wang, Wenqi Lu:
A Topology Control with Energy Balance in Underwater Wireless Sensor Networks for IoT-Based Application. Sensors 18(7): 2306 (2018) - [c9]Shouling Ji, Tianyu Du, Zhen Hong, Ting Wang, Raheem A. Beyah:
Quantifying Graph Anonymity, Utility, and De-anonymity. INFOCOM 2018: 1736-1744 - [i1]Wei Cai, Zehua Wang, Jason B. Ernst, Zhen Hong, Chen Feng, Victor C. M. Leung:
Decentralized Applications: The Blockchain-Empowered Software System. CoRR abs/1810.05365 (2018) - 2017
- [j12]Zhen Hong, Zehua Wang, Wei Cai, Victor C. M. Leung:
Blockchain-Empowered Fair Computational Resource Sharing System in the D2D Network. Future Internet 9(4): 85 (2017) - [j11]Zhen Hong, Rui Wang, Xile Li, Ning Wang:
A tree-based topology construction algorithm with probability distribution and competition in the same layer for wireless sensor network. Peer-to-Peer Netw. Appl. 10(3): 658-669 (2017) - [c8]Zhen Hong, Zehua Wang, Wei Cai, Victor C. M. Leung:
Connectivity-Aware Task Outsourcing and Scheduling in D2D Networks. ICCCN 2017: 1-9 - [c7]Meng Han, Jinbao Wang, Mingyuan Yan, Chunyu Ai, Zhuojun Duan, Zhen Hong:
Near-Complete Privacy Protection: Cognitive Optimal Strategy in Location-Based Services. IIKI 2017: 298-304 - [c6]Meng Han, Lei Li, Xiaoqing Peng, Zhen Hong, Mohan Li:
Information Privacy of Cyber Transportation System: Opportunities and Challenges. RITT 2017: 23-28 - 2016
- [j10]Chenming Ma, Wanliang Wang, Zhen Hong:
无线传感器网络(k, m)-容错连通支配集的分布式构建 (Distributed Construction for (k, m)-Fault Tolerant Connected Dominating Set in Wireless Sensor Network). 计算机科学 43(1): 128-132 (2016) - [c5]Zhen Hong, Rui Wang, Tingting Song, Qian Shao, Lidan Zhou:
Energy-Efficient and Power-Optimal Topology Control with Potential Game for Heterogeneous Wireless Sensor Networks. BDCloud-SocialCom-SustainCom 2016: 533-540 - 2015
- [j9]Tiaojuan Ren, Yourong Chen, Binbin Zhou, Hexin Lv, Zhangquan Wang, Sen Xu, Lizhe Yu, Zhen Hong:
Data Uploading and Exchange Algorithm for Mobile Sensor Networks in the City Traffic Environment. Int. J. Distributed Sens. Networks 11: 418152:1-418152:11 (2015) - [j8]Chenming Ma, Wanliang Wang, Zhen Hong:
无线传感器网络中一种改进的能效数据收集协议 (Improved Energy Efficient Data Gathering Protocol in Wireless Sensor Network). 计算机科学 42(2): 65-69 (2015) - [j7]Wei Cai, Zhen Hong, Xiaofei Wang, Henry C. B. Chan, Victor C. M. Leung:
Quality-of-Experience Optimization for a Cloud Gaming System With Ad Hoc Cloudlet Assistance. IEEE Trans. Circuits Syst. Video Technol. 25(12): 2092-2104 (2015) - [c4]Yuanfang Chi, Wei Cai, Zhen Hong, Henry C. B. Chan, Victor C. M. Leung:
A Privacy and Price-Aware Inter-Cloud System. CloudCom 2015: 298-305 - 2014
- [j6]Jian Chen, Bo Chen, Zhen Hong:
Energy-Efficient Weighted Observation Fusion Kalman Filtering with Randomly Delayed Measurements. Circuits Syst. Signal Process. 33(10): 3299-3316 (2014) - [j5]Zhen Hong, Xile Li, Bo Chen:
Adaptive Control based Particle Swarm Optimization and Chebyshev Neural Network for Chaotic Systems. J. Comput. 9(6): 1385-1390 (2014) - [j4]Zhen Hong, Carman K. M. Lee, Xiaofeng Nie:
Proactive and reactive purchasing planning under dependent demand, price, and yield risks. OR Spectr. 36(4): 1055-1076 (2014) - [c3]Zhen Hong, Wei Cai, Xiaofei Wang, Victor C. M. Leung:
Reputation-based multiplayer fairness for ad-hoc cloudlet-assisted cloud gaming system. SMARTCOMP 2014: 89-96 - 2013
- [j3]Zhen Hong, Carman K. M. Lee:
A decision support system for procurement risk management in the presence of spot market. Decis. Support Syst. 55(1): 67-78 (2013) - 2012
- [j2]Ka Man Lee, Yu Ching Yeung, Zhen Hong:
A risk assessment framework for logistics outsourcing. Ind. Manag. Data Syst. 112(4) (2012) - 2011
- [c2]Yuancheng He, Zhen Hong, Lin Yuan, Songtao Wu, Ziqiu Zheng:
The theatrical calculating formulas of BFT type flexible driving with multichannel engaging. EMEIT 2011: 2008-2014 - 2010
- [j1]Qifen Dong, Li Yu, Huanjia Lu, Zhen Hong, Yourong Chen:
Design of Building Monitoring Systems Based on Wireless Sensor Networks. Wirel. Sens. Netw. 2(9): 703-709 (2010)
1990 – 1999
- 1992
- [c1]Zhen Hong, Narendra Ahuja:
Target Tracking from Binocular Image Sequence Using the Autoregressive Moving Average Model. MVA 1992: 317-320
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-26 01:56 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint