default search action
Zhihong Tian
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j180]Lejun Zhang, Bo Zhang, Ran Guo, Zhujun Wang, Guopeng Wang, Jing Qiu, Shen Su, Yuan Liu, Guangxia Xu, Zhihong Tian, Sergey Gataullin:
A blockchain-oriented covert communication technology with controlled security level based on addressing confusion ciphertext. Frontiers Comput. Sci. 19(2): 192807 (2025) - [j179]Hao Liu, Yinghai Zhou, Binxing Fang, Yanbin Sun, Ning Hu, Zhihong Tian:
PHCG: PLC Honeypoint Communication Generator for Industrial IoT. IEEE Trans. Mob. Comput. 24(1): 198-209 (2025) - 2024
- [j178]Yue Cong, Jing Qiu, Kun Zhang, Zhongyang Fang, Chengliang Gao, Shen Su, Zhihong Tian:
Ada-FFL: Adaptive computing fairness federated learning. CAAI Trans. Intell. Technol. 9(3): 573-584 (2024) - [j177]Mianjie Li, Qihan Pei, Chun Shan, Shen Su, Yuan Liu, Zhihong Tian:
Data tampering detection and recovery scheme based on multi-branch target extraction for internet of vehicles. Comput. Networks 252: 110677 (2024) - [j176]Mianjie Li, Senfeng Lai, Jiao Wang, Zhihong Tian, Nadra Guizani, Xiaojiang Du, Chun Shan:
Analysis on unit maximum capacity of orthogonal multiple watermarking for multimedia signals in B5G wireless communications. Digit. Commun. Networks 10(1): 38-44 (2024) - [j175]Lejun Zhang, Chendong Zhu, Zhihong Tian, Yuan Liu, Jing Qiu, Shen Su, Guangxia Xu, Ran Guo:
ICRB: An improved consensus-based redactable blockchain considering contextual consistency. Trans. Emerg. Telecommun. Technol. 35(1) (2024) - [j174]Jingpei Wang, Ming Zhu, Mohan Li, Yanbin Sun, Zhihong Tian:
An Access Control Method Against Unauthorized and Noncompliant Behaviors of Real-Time Data in Industrial IoT. IEEE Internet Things J. 11(1): 708-727 (2024) - [j173]Zhaohua Li, Le Wang, Zhaoquan Gu, Yang Lv, Zhihong Tian:
Labels Are Culprits: Defending Gradient Attack on Privacy. IEEE Internet Things J. 11(4): 6007-6019 (2024) - [j172]Chongwu Dong, Yanbin Sun, Muhammad Shafiq, Ning Hu, Yuan Liu, Zhihong Tian:
Optimizing Mobility-Aware Task Offloading in Smart Healthcare for Internet of Medical Things Through Multiagent Reinforcement Learning. IEEE Internet Things J. 11(8): 13677-13691 (2024) - [j171]Xu Wang, Lingfeng Qu, Hao-Tian Wu, Yi Han, Zhihong Tian:
Reversible Image Thumbnail Preservation With High-Visual Naturalness. IEEE Internet Things J. 11(10): 18739-18752 (2024) - [j170]Yuan Liu, Yanan Zhang, Shen Su, Lejun Zhang, Xiaojiang Du, Mohsen Guizani, Zhihong Tian:
BlockSC: A Blockchain Empowered Spatial Crowdsourcing Service in Metaverse While Preserving User Location Privacy. IEEE J. Sel. Areas Commun. 42(4): 880-892 (2024) - [j169]Yue Cong, Yuxiang Zeng, Jing Qiu, Zhongyang Fang, Lejun Zhang, Du Cheng, Jia Liu, Zhihong Tian:
FedGA: A greedy approach to enhance federated learning with Non-IID data. Knowl. Based Syst. 301: 112201 (2024) - [j168]Cheng Qiao, Yanqing Zeng, Hui Lu, Yuan Liu, Zhihong Tian:
An Efficient Incentive Mechanism for Federated Learning in Vehicular Networks. IEEE Netw. 38(5): 189-195 (2024) - [j167]Jiadong Xie, Zehua Chen, Deming Chu, Fan Zhang, Xuemin Lin, Zhihong Tian:
Influence Maximization via Vertex Countering. Proc. VLDB Endow. 17(6): 1297-1309 (2024) - [j166]Qi Liang, Dian Ouyang, Fan Zhang, Jianye Yang, Xuemin Lin, Zhihong Tian:
Efficient Regular Simple Path Queries under Transitive Restricted Expressions. Proc. VLDB Endow. 17(7): 1710-1722 (2024) - [j165]Jianye Yang, Sheng Fang, Zhaoquan Gu, Ziyi Ma, Xuemin Lin, Zhihong Tian:
TC-Match: Fast Time-constrained Continuous Subgraph Matching. Proc. VLDB Endow. 17(11): 2791-2804 (2024) - [j164]Chongwu Dong, Muhammad Shafiq, Maryam M. Al Dabel, Yanbin Sun, Zhihong Tian:
DNN Inference Acceleration for Smart Devices in Industry 5.0 by Decentralized Deep Reinforcement Learning. IEEE Trans. Consumer Electron. 70(1): 1519-1530 (2024) - [j163]Zhe-Rui Yang, Zhen-Yu He, Chang-Dong Wang, Jian-Huang Lai, Zhihong Tian:
Collaborative Meta-Path Modeling for Explainable Recommendation. IEEE Trans. Comput. Soc. Syst. 11(2): 1805-1815 (2024) - [j162]Ling Zhou, Jianming Li, Zhaoquan Gu, Jing Qiu, Brij B. Gupta, Zhihong Tian:
PANNER: POS-Aware Nested Named Entity Recognition Through Heterogeneous Graph Neural Network. IEEE Trans. Comput. Soc. Syst. 11(4): 4718-4726 (2024) - [j161]Mingqi Fang, Lingyun Yu, Hongtao Xie, Qingfeng Tan, Zhiyuan Tan, Amir Hussain, Zezheng Wang, Jiahong Li, Zhihong Tian:
STIDNet: Identity-Aware Face Forgery Detection With Spatiotemporal Knowledge Distillation. IEEE Trans. Comput. Soc. Syst. 11(4): 5354-5366 (2024) - [j160]Hao-Tian Wu, Xin Cao, Ying Gao, Kaihan Zheng, Jiwu Huang, Jiankun Hu, Zhihong Tian:
Fundus Image Enhancement via Semi-Supervised GAN and Anatomical Structure Preservation. IEEE Trans. Emerg. Top. Comput. Intell. 8(1): 313-326 (2024) - [j159]Xiao Cai, Kaibo Shi, Yanbin Sun, Jinde Cao, Shiping Wen, Zhihong Tian:
Intelligent Event-Triggered Control Supervised by Mini-Batch Machine Learning and Data Compression Mechanism for T-S Fuzzy NCSs Under DoS Attacks. IEEE Trans. Fuzzy Syst. 32(3): 804-815 (2024) - [j158]Hao-Tian Wu, Yiu-Ming Cheung, Zhihong Tian, Dingcai Liu, Xiangyang Luo, Jiankun Hu:
Lossless Data Hiding in NTRU Cryptosystem by Polynomial Encoding and Modulation. IEEE Trans. Inf. Forensics Secur. 19: 3719-3732 (2024) - [j157]Xiao Cai, Kaibo Shi, Yanbin Sun, Jinde Cao, Shiping Wen, Cheng Qiao, Zhihong Tian:
Stability Analysis of Networked Control Systems Under DoS Attacks and Security Controller Design With Mini-Batch Machine Learning Supervision. IEEE Trans. Inf. Forensics Secur. 19: 3857-3865 (2024) - [j156]Yangyang Mei, Weihong Han, Shudong Li, Kaihan Lin, Zhihong Tian, Shumei Li:
A Novel Network Forensic Framework for Advanced Persistent Threat Attack Attribution Through Deep Learning. IEEE Trans. Intell. Transp. Syst. 25(9): 12131-12140 (2024) - [j155]Xiao Cai, Kaibo Shi, Yanbin Sun, Jinde Cao, Oh-Min Kwon, Cheng Qiao, Zhihong Tian:
Design of Intelligent Control Under Machine Learning Supervision and Signal Compression Mechanism Design for NCSs Under DoS Attacks. IEEE Trans. Intell. Transp. Syst. 25(10): 15116-15121 (2024) - [j154]Xiao Cai, Kaibo Shi, Yanbin Sun, YengChai Soh, Zhihong Tian:
Performance Analysis and Design of Intelligent Optimising Integral-Based Event-Trigger Control for Autonomous Ground Vehicles Under DoS Attacks. IEEE Trans. Intell. Veh. 9(1): 2149-2159 (2024) - [j153]Fan Zhang, Haicheng Guo, Dian Ouyang, Shiyu Yang, Xuemin Lin, Zhihong Tian:
Size-Constrained Community Search on Large Networks: An Effective and Efficient Solution. IEEE Trans. Knowl. Data Eng. 36(1): 356-371 (2024) - [j152]Jianhua Wang, Jianye Yang, Zhaoquan Gu, Dian Ouyang, Zhihong Tian, Xuemin Lin:
Efficient Maximal Biclique Enumeration on Large Signed Bipartite Graphs. IEEE Trans. Knowl. Data Eng. 36(9): 4618-4631 (2024) - [j151]Ziyu Wang, Yinghai Zhou, Hao Liu, Jing Qiu, Binxing Fang, Zhihong Tian:
ThreatInsight: Innovating Early Threat Detection Through Threat-Intelligence-Driven Analysis and Attribution. IEEE Trans. Knowl. Data Eng. 36(12): 9388-9402 (2024) - [j150]Rui Huang, Wushao Wen, Zhi Zhou, Chongwu Dong, Cheng Qiao, Zhihong Tian, Xu Chen:
Dynamic Task Offloading for Multi-UAVs in Vehicular Edge Computing With Delay Guarantees: A Consensus ADMM-Based Optimization. IEEE Trans. Mob. Comput. 23(12): 13696-13712 (2024) - [j149]Xixun Lin, Zhao Li, Peng Zhang, Luchen Liu, Chuan Zhou, Bin Wang, Zhihong Tian:
Structure-Aware Prototypical Neural Process for Few-Shot Graph Classification. IEEE Trans. Neural Networks Learn. Syst. 35(4): 4607-4621 (2024) - [j148]Xiaoding Guo, Lei Zhang, Zhihong Tian:
Judgment Prediction Based on Tensor Decomposition With Optimized Neural Networks. IEEE Trans. Neural Networks Learn. Syst. 35(8): 11116-11127 (2024) - [j147]Yange Chen, Lei Liu, Yuan Ping, Mohammed Atiquzzaman, Shahid Mumtaz, Zhili Zhang, Mohsen Guizani, Zhihong Tian:
A Privacy-Preserving Federated Learning Framework With Lightweight and Fair in IoT. IEEE Trans. Netw. Serv. Manag. 21(5): 5843-5858 (2024) - [j146]Yao Xin, Wenjun Li, Chengjun Jia, Xianfeng Li, Yang Xu, Bin Liu, Zhihong Tian, Weizhe Zhang:
Recursive Multi-Tree Construction With Efficient Rule Sifting for Packet Classification on FPGA. IEEE/ACM Trans. Netw. 32(2): 1707-1722 (2024) - [j145]Baocang Wang, Yange Chen, Furong Li, Jian Song, Rongxing Lu, Pu Duan, Zhihong Tian:
Privacy-Preserving Convolutional Neural Network Classification Scheme With Multiple Keys. IEEE Trans. Serv. Comput. 17(1): 322-335 (2024) - [j144]Xin-Cheng Wen, Cuiyun Gao, Jiaxin Ye, Yichen Li, Zhihong Tian, Yan Jia, Xuan Wang:
Meta-Path Based Attentional Graph Learning Model for Vulnerability Detection. IEEE Trans. Software Eng. 50(3): 360-375 (2024) - [j143]Lejun Zhang, Yuan Li, Ran Guo, Guopeng Wang, Jing Qiu, Shen Su, Yuan Liu, Guangxia Xu, Huiling Chen, Zhihong Tian:
A Novel Smart Contract Reentrancy Vulnerability Detection Model based on BiGAS. J. Signal Process. Syst. 96(3): 215-237 (2024) - [j142]Yangchun Li, Danfeng Yan, Wei Jiang, Yuanqiang Cai, Zhihong Tian:
Exploring highly concise and accurate text matching model with tiny weights. World Wide Web (WWW) 27(4): 39 (2024) - [c64]Keke Tang, Xu He, Weilong Peng, Jianpeng Wu, Yawen Shi, Daizong Liu, Pan Zhou, Wenping Wang, Zhihong Tian:
Manifold Constraints for Imperceptible Adversarial Attacks on Point Clouds. AAAI 2024: 5127-5135 - [c63]Keke Tang, Chao Hou, Weilong Peng, Runnan Chen, Peican Zhu, Wenping Wang, Zhihong Tian:
CORES: Convolutional Response-based Score for Out-of-distribution Detection. CVPR 2024: 10916-10925 - [c62]Keke Tang, Lujie Huang, Weilong Peng, Daizong Liu, Xiaofei Wang, Yang Ma, Ligang Liu, Zhihong Tian:
FLAT: Flux-Aware Imperceptible Adversarial Attacks on 3D Point Clouds. ECCV (6) 2024: 198-215 - [c61]Keke Tang, Wenyu Zhao, Weilong Peng, Xiang Fang, Xiaodong Cui, Peican Zhu, Zhihong Tian:
Reparameterization Head for Efficient Multi-Input Networks. ICASSP 2024: 6190-6194 - [c60]Keke Tang, Zhensu Wang, Weilong Peng, Lujie Huang, Le Wang, Peican Zhu, Wenping Wang, Zhihong Tian:
SymAttack: Symmetry-aware Imperceptible Adversarial Attacks on 3D Point Clouds. ACM Multimedia 2024: 3131-3140 - [c59]Rui Gao, Hui Lu, Houlin Zhou, Chengcong Zheng, Zhihong Tian, Xiaojiang Du:
Active and Passive Attack Detection Methods for Malicious Encrypted Traffic. WiMob 2024: 359-364 - 2023
- [j141]Jing Qiu, Yang Lin, Hao Chen, Du Cheng, Muhammad Shafiq, Lejun Zhang, Zhihong Tian:
Diverse classifiers with label dependencies for long-tail relation extraction in big data. Comput. Electr. Eng. 110: 108812 (2023) - [j140]Haifeng Zhou, Mohan Li, Yanbin Sun, Lei Yun, Zhihong Tian:
Digital Twin-Based Cyber Range for Industrial Internet of Things. IEEE Consumer Electron. Mag. 12(6): 66-77 (2023) - [j139]Mianjie Li, Chun Shan, Zhihong Tian, Xiaojiang Du, Mohsen Guizani:
Adaptive Information Hiding Method Based on Feature Extraction for Visible Light Communication. IEEE Commun. Mag. 61(4): 102-106 (2023) - [j138]Zhujun Wang, Lejun Zhang, Ran Guo, Guopeng Wang, Jing Qiu, Shen Su, Yuan Liu, Guangxia Xu, Zhihong Tian:
A covert channel over blockchain based on label tree without long waiting times. Comput. Networks 232: 109843 (2023) - [j137]Mianjie Li, Zhihong Tian, Xiaojiang Du, Xiaochen Yuan, Chun Shan, Mohsen Guizani:
Power normalized cepstral robust features of deep neural networks in a cloud computing data privacy protection scheme. Neurocomputing 518: 165-173 (2023) - [j136]Keke Tang, Yawen Shi, Tianrui Lou, Weilong Peng, Xu He, Peican Zhu, Zhaoquan Gu, Zhihong Tian:
Rethinking Perturbation Directions for Imperceptible Adversarial Attacks on Point Clouds. IEEE Internet Things J. 10(6, March 15): 5158-5169 (2023) - [j135]Yangzixing Lv, Wei Shi, Weiyong Zhang, Hui Lu, Zhihong Tian:
Do Not Trust the Clouds Easily: The Insecurity of Content Security Policy Based on Object Storage. IEEE Internet Things J. 10(12): 10462-10470 (2023) - [j134]Zhuocheng Yu, Shudong Li, Youming Bai, Weihong Han, Xiaobo Wu, Zhihong Tian:
REMSF: A Robust Ensemble Model of Malware Detection Based on Semantic Feature Fusion. IEEE Internet Things J. 10(18): 16134-16143 (2023) - [j133]Cheng Qiao, Kenneth N. Brown, Yong Zhang, Zhihong Tian:
CWEmd: A Lightweight Similarity Measurement for Resource-Constrained Vehicular Networks. IEEE Internet Things J. 10(22): 19655-19665 (2023) - [j132]Songsong Li, Zhihong Tian, Yao Li:
Residual long short-term memory network with multi-source and multi-frequency information fusion: An application to China's stock market. Inf. Sci. 622: 133-147 (2023) - [j131]Xujian Liang, Zhaoquan Gu, Yushun Xie, Le Wang, Zhihong Tian:
MUSEDA: Multilingual Unsupervised and Supervised Embedding for Domain Adaption. Knowl. Based Syst. 273: 110560 (2023) - [j130]Shudong Li, Yuan Li, Xiaobo Wu, Sattam Al Otaibi, Zhihong Tian:
Imbalanced Malware Family Classification Using Multimodal Fusion and Weight Self-Learning. IEEE Trans. Intell. Transp. Syst. 24(7): 7642-7652 (2023) - [j129]Cheng Qiao, Jing Qiu, Zhiyuan Tan, Geyong Min, Albert Y. Zomaya, Zhihong Tian:
Evaluation Mechanism for Decentralized Collaborative Pattern Learning in Heterogeneous Vehicular Networks. IEEE Trans. Intell. Transp. Syst. 24(11): 13123-13132 (2023) - [j128]Cheng Qiao, Kenneth N. Brown, Fan Zhang, Zhihong Tian:
Adaptive Asynchronous Clustering Algorithms for Wireless Mesh Networks. IEEE Trans. Knowl. Data Eng. 35(3): 2610-2627 (2023) - [j127]Yuhan Chai, Lei Du, Jing Qiu, Lihua Yin, Zhihong Tian:
Dynamic Prototype Network Based on Sample Adaptation for Few-Shot Malware Detection. IEEE Trans. Knowl. Data Eng. 35(5): 4754-4766 (2023) - [j126]Yitong Ren, Yanjun Xiao, Yinghai Zhou, Zhiyong Zhang, Zhihong Tian:
CSKG4APT: A Cybersecurity Knowledge Graph for Advanced Persistent Threat Organization Attribution. IEEE Trans. Knowl. Data Eng. 35(6): 5695-5709 (2023) - [j125]Yang Gao, Peng Zhang, Hong Yang, Chuan Zhou, Yue Hu, Zhihong Tian, Zhao Li, Jingren Zhou:
GraphNAS++: Distributed Architecture Search for Graph Neural Networks. IEEE Trans. Knowl. Data Eng. 35(7): 6973-6987 (2023) - [j124]Mianjie Li, Yuan Liu, Zhihong Tian, Chun Shan:
Privacy Protection Method Based On Multidimensional Feature Fusion Under 6G Networks. IEEE Trans. Netw. Sci. Eng. 10(3): 1462-1471 (2023) - [j123]Yuan Liu, Wangyuan Yu, Zhengpeng Ai, Guangxia Xu, Liang Zhao, Zhihong Tian:
A Blockchain-Empowered Federated Learning in Healthcare-Based Cyber Physical Systems. IEEE Trans. Netw. Sci. Eng. 10(5): 2685-2696 (2023) - [j122]Shudong Li, Laiyuan Jiang, Qianqing Zhang, Zhen Wang, Zhihong Tian, Mohsen Guizani:
A Malicious Mining Code Detection Method Based on Multi-Features Fusion. IEEE Trans. Netw. Sci. Eng. 10(5): 2731-2739 (2023) - [j121]Yuan Liu, Chuang Zhang, Yu Yan, Xin Zhou, Zhihong Tian, Jie Zhang:
A Semi-Centralized Trust Management Model Based on Blockchain for Data Exchange in IoT System. IEEE Trans. Serv. Comput. 16(2): 858-871 (2023) - [j120]Yinghai Zhou, Yitong Ren, Ming Yi, Yanjun Xiao, Zhiyuan Tan, Nour Moustafa, Zhihong Tian:
CDTier: A Chinese Dataset of Threat Intelligence Entity Relationships. IEEE Trans. Sustain. Comput. 8(4): 627-638 (2023) - [j119]Ximing Chen, Jing Qiu, Fasheng Zhou, Hui Lu, Lejun Zhang, Zhihong Tian, Xiaojiang Du, Mohsen Guizani:
Decentralized Cooperative Caching for Sustainable Metaverse Via Meta Self-Supervision Learning. IEEE Wirel. Commun. 30(5): 96-103 (2023) - [j118]Jianming Li, Yue Cong, Ling Zhou, Zhihong Tian, Jing Qiu:
Super-resolution-based part collaboration network for vehicle re-identification. World Wide Web (WWW) 26(2): 519-538 (2023) - [j117]Linyu Jiang, Yukun Yan, Zhihong Tian, Zuobin Xiong, Qilong Han:
Personalized sampling graph collection with local differential privacy for link prediction. World Wide Web (WWW) 26(5): 2669-2689 (2023) - [c58]Keke Tang, Jianpeng Wu, Weilong Peng, Yawen Shi, Peng Song, Zhaoquan Gu, Zhihong Tian, Wenping Wang:
Deep Manifold Attack on Point Clouds via Parameter Plane Stretching. AAAI 2023: 2420-2428 - [c57]Kebin Li, Yang You, Yuntian Tan, Shen Su, Zhihong Tian:
C2MDNIF: A Cross Chain based Method for Domain Name Information Fusion. CloudNet 2023: 316-324 - [c56]Wuqi Qi, Wei Wu, Hao Wang, Lu Ou, Ning Hu, Zhihong Tian:
Intrusion Detection Techniques Analysis in Cloud Computing. CloudNet 2023: 360-363 - [c55]Junhan Chen, Rufeng Liang, Man Zhang, Chengcong Zheng, Xun Huang, Hui Lu, Xiang Yu, Zhihong Tian:
Vulnerability Correlation, Multi-step Attack and Exploit Chain in Breach and Attack Simulation. CloudNet 2023: 398-402 - [c54]Xiang Tang, Houlin Zhou, Man Zhang, Yuheng Zhang, Guocheng Wu, Hui Lu, Xiang Yu, Zhihong Tian:
Research on the Exploitability of Binary Software Vulnerabilities. CloudNet 2023: 403-407 - [c53]Yunxin Jiang, Yitong Ren, Ziyu Wang, Yi Tang, Shengtao Lu, Ning Hu, Zhihong Tian, Yinghai Zhou:
OPTIMA-DEM: An Optimized Threat Behavior Prediction Method using DEMATEL-ISM. CloudNet 2023: 413-417 - [c52]Haowen Yi, Fan Liu, Rui Wang, Ning Hu, Zhihong Tian:
A Survey of Deception Defense: Approaches Used to Counter Malicious Behavior. CloudNet 2023: 418-422 - [c51]Shen Su, Yue Xue, Liansheng Lin, Chao Wang, Hui Lu, Jing Qiu, Yanbin Sun, Yuan Liu, Zhihong Tian:
Smart Contract Firewall: Protecting the on-Chain Smart Contract Projects. GLOBECOM 2023: 5122-5128 - [c50]Keke Tang, Xujian Cai, Weilong Peng, Daizong Liu, Peican Zhu, Pan Zhou, Zhihong Tian, Wenping Wang:
Matching Words for Out-of-distribution Detection. ICDM 2023: 578-587 - [c49]Yanbin Sun, Jianxun Zhou, Bo Hu, Xiaoming Zhou, Wei Song, Mohan Li, Zhihong Tian:
Hierarchical Name-based Routing for Content Provider Mobility in ICN. IWCMC 2023: 941-946 - [c48]Weicheng Li, Hui Lu, Yanbin Sun, Shen Su, Jing Qiu, Zhihong Tian:
Improving Precision of Detecting Deserialization Vulnerabilities with Bytecode Analysis. IWQoS 2023: 1-2 - [c47]Shen Su, Yuntian Tan, Yue Xue, Chao Wang, Hui Lu, Zhihong Tian, Chun Shan, Xiaojiang Du:
Detecting Smart Contract Project Anomalies in Metaverse. MetaCom 2023: 524-532 - 2022
- [j116]Hao Tan, Zhaoquan Gu, Le Wang, Huan Zhang, Brij B. Gupta, Zhihong Tian:
Improving adversarial transferability by temporal and spatial momentum in urban speaker recognition systems. Comput. Electr. Eng. 104(Part): 108446 (2022) - [j115]Xiao-Xia Yin, Sillas Hadjiloucas, Yanchun Zhang, Zhihong Tian:
MRI radiogenomics for intelligent diagnosis of breast tumors and accurate prediction of neoadjuvant chemotherapy responses-a review. Comput. Methods Programs Biomed. 214: 106510 (2022) - [j114]Yuhan Chai, Zhe Sun, Jing Qiu, Lihua Yin, Zhihong Tian:
TPRPF: a preserving framework of privacy relations based on adversarial training for texts in big data. Frontiers Comput. Sci. 16(4): 164618 (2022) - [j113]Bin Zhu, Zhaoquan Gu, Yaguan Qian, Francis C. M. Lau, Zhihong Tian:
Leveraging transferability and improved beam search in textual adversarial attacks. Neurocomputing 500: 135-142 (2022) - [j112]Jian Hou, Fangai Liu, Hui Lu, Zhiyuan Tan, Xuqiang Zhuang, Zhihong Tian:
A novel flow-vector generation approach for malicious traffic detection. J. Parallel Distributed Comput. 169: 72-86 (2022) - [j111]Jing Wen, Xi-Ran Zhu, Chang-Dong Wang, Zhihong Tian:
A framework for personalized recommendation with conditional generative adversarial networks. Knowl. Inf. Syst. 64(10): 2637-2660 (2022) - [j110]Mianjie Li, Wei Shi, Fusheng Zhu, Zhihong Tian, Muhammad Shafiq, Zhiyong Luo, Chun Shan:
Large-Capacity Local Multi-Dimensional Information Hiding Method for 6G Networks. IEEE Netw. 36(4): 160-165 (2022) - [j109]Zhiqiang Zhang, Le Wang, Guangyao Chen, Zhaoquan Gu, Zhihong Tian, Xiaojiang Du, Mohsen Guizani:
STG2P: A two-stage pipeline model for intrusion detection based on improved LightGBM and K-means. Simul. Model. Pract. Theory 120: 102614 (2022) - [j108]Zhaoquan Gu, Yan Zhu, Yuexuan Wang, Xiaojiang Du, Mohsen Guizani, Zhihong Tian:
Applying artificial bee colony algorithm to the multidepot vehicle routing problem. Softw. Pract. Exp. 52(3): 756-771 (2022) - [j107]Zhaoquan Gu, Hao Li, Sajid Khan, Lianbing Deng, Xiaojiang Du, Mohsen Guizani, Zhihong Tian:
IEPSBP: A Cost-Efficient Image Encryption Algorithm Based on Parallel Chaotic System for Green IoT. IEEE Trans. Green Commun. Netw. 6(1): 89-106 (2022) - [j106]Lingling Lv, Zongyu Wu, Jinhua Zhang, Lei Zhang, Zhiyuan Tan, Zhihong Tian:
A VMD and LSTM Based Hybrid Model of Load Forecasting for Power Grid Security. IEEE Trans. Ind. Informatics 18(9): 6474-6482 (2022) - [j105]Lingling Lv, Zongyu Wu, Lei Zhang, Brij B. Gupta, Zhihong Tian:
An Edge-AI Based Forecasting Approach for Improving Smart Microgrid Efficiency. IEEE Trans. Ind. Informatics 18(11): 7946-7954 (2022) - [j104]Zhaoquan Gu, Le Wang, Xiaolong Chen, Yunyi Tang, Xingang Wang, Xiaojiang Du, Mohsen Guizani, Zhihong Tian:
Epidemic Risk Assessment by a Novel Communication Station Based Method. IEEE Trans. Netw. Sci. Eng. 9(1): 332-344 (2022) - [j103]Hui Lu, Chengjie Jin, Xiaohan Helu, Xiaojiang Du, Mohsen Guizani, Zhihong Tian:
DeepAutoD: Research on Distributed Machine Learning Oriented Scalable Mobile Communication Security Unpacking System. IEEE Trans. Netw. Sci. Eng. 9(4): 2052-2065 (2022) - [j102]Yuhan Chai, Jing Qiu, Lihua Yin, Lejun Zhang, Brij B. Gupta, Zhihong Tian:
From Data and Model Levels: Improve the Performance of Few-Shot Malware Classification. IEEE Trans. Netw. Serv. Manag. 19(4): 4248-4261 (2022) - [j101]Qingfeng Tan, Xuebin Wang, Wei Shi, Jian Tang, Zhihong Tian:
An Anonymity Vulnerability in Tor. IEEE/ACM Trans. Netw. 30(6): 2574-2587 (2022) - [j100]Yuan Liu, Zehui Xiong, Qin Hu, Dusit Niyato, Jie Zhang, Chunyan Miao, Cyril Leung, Zhihong Tian:
VRepChain: A Decentralized and Privacy-Preserving Reputation System for Social Internet of Vehicles Based on Blockchain. IEEE Trans. Veh. Technol. 71(12): 13242-13253 (2022) - [c46]Lei Zhang, Huiping Chen, Peiyan Jia, Zhihong Tian, Xiaojiang Du:
WGAN-GP and LSTM based Prediction Model for Aircraft 4- D Traj ectory. IWCMC 2022: 937-942 - [c45]Bodong Zhao, Zheming Li, Shisong Qin, Zheyu Ma, Ming Yuan, Wenyu Zhu, Zhihong Tian, Chao Zhang:
StateFuzz: System Call-Based State-Aware Linux Driver Fuzzing. USENIX Security Symposium 2022: 3273-3289 - [i12]Tonghe Wang, Songpu Ai, Zhihong Tian, Brij B. Gupta, Chun Shan:
A Blockchain-Based Distributed Computational Resource Trading System for Industrial Internet of Things Considering Multiple Preferences. CoRR abs/2201.09539 (2022) - [i11]Jinta Weng, Yue Hu, Zhihong Tian, Heyan Huang:
ConsPrompt: Easily Exploiting Contrastive Samples for Few-shot Prompt Learning. CoRR abs/2211.04118 (2022) - [i10]Xin-Cheng Wen, Cuiyun Gao, Jiaxin Ye, Zhihong Tian, Yan Jia, Xuan Wang:
Meta-Path Based Attentional Graph Learning Model for Vulnerability Detection. CoRR abs/2212.14274 (2022) - 2021
- [j99]Yuan Liu, Yixiao Lan, Boyang Li, Chunyan Miao, Zhihong Tian:
Proof of Learning (PoLe): Empowering neural network training with consensus building on blockchains. Comput. Networks 201: 108594 (2021) - [j98]Tianle Zhang, Liwen Zheng, Yu Jiang, Zhihong Tian, Xiaojiang Du, Mohsen Guizani:
A method of chained recommendation for charging piles in internet of vehicles. Computing 103(2): 231-249 (2021) - [j97]Zhaoquan Gu, Keke Tang, Zhen Wang, Yanhua Li, Wei Shi, Zhihong Tian:
Editorial: Intelligence and Safety for Humanoid Robots: Design, Control, and Applications. Frontiers Neurorobotics 15 (2021) - [j96]Dongliang Xu, Wei Shi, Wensheng Zhai, Zhihong Tian:
Multi-Candidate Voting Model Based on Blockchain. IEEE CAA J. Autom. Sinica 8(12): 1891-1900 (2021) - [j95]Muhammad Shafiq, Zhihong Tian, Ali Kashif Bashir, Xiaojiang Du, Mohsen Guizani:
CorrAUC: A Malicious Bot-IoT Traffic Detection Method in IoT Network Using Machine-Learning Techniques. IEEE Internet Things J. 8(5): 3242-3254 (2021) - [j94]Shen Su, Zhihong Tian, Shuang Li, Jinxi Deng, Lihua Yin, Xiaojiang Du, Mohsen Guizani:
IoT root union: A decentralized name resolving system for IoT based on blockchain. Inf. Process. Manag. 58(3): 102553 (2021) - [j93]Lingling Lv, Zhipeng Yang, Lei Zhang, Quanzhen Huang, Zhihong Tian:
Multi-party transaction framework for drone services based on alliance blockchain in smart cities. J. Inf. Secur. Appl. 58: 102792 (2021) - [j92]Shudong Li, Yanshan Chen, Xiaobo Wu, Xiaochun Cheng, Zhihong Tian:
Power Grid-Oriented Cascading Failure Vulnerability Identifying Method Based on Wireless Sensors. J. Sensors 2021: 8820413:1-8820413:12 (2021) - [j91]Ning Hu, Zhihong Tian, Hui Lu, Xiaojiang Du, Mohsen Guizani:
A multiple-kernel clustering based intrusion detection scheme for 5G and IoT networks. Int. J. Mach. Learn. Cybern. 12(11): 3129-3144 (2021) - [j90]Yanbin Sun, Mohan Li, Shen Su, Zhihong Tian, Wei Shi, Meng Han:
Secure Data Sharing Framework via Hierarchical Greedy Embedding in Darknets. Mob. Networks Appl. 26(2): 940-948 (2021) - [j89]Hui Lu, Chengjie Jin, Xiaohan Helu, Man Zhang, Yanbin Sun, Yi Han, Zhihong Tian:
Research on Intelligent Detection of Command Level Stack Pollution for Binary Program Analysis. Mob. Networks Appl. 26(4): 1723-1732 (2021) - [j88]Ning Hu, Zhihong Tian, Yanbin Sun, Lihua Yin, Baokang Zhao, Xiaojiang Du, Nadra Guizani:
Building Agile and Resilient UAV Networks Based on SDN and Blockchain. IEEE Netw. 35(1): 57-63 (2021) - [j87]Hui Lu, Chengjie Jin, Xiaohan Helu, Chunsheng Zhu, Nadra Guizani, Zhihong Tian:
AutoD: Intelligent Blockchain Application Unpacking Based on JNI Layer Deception Call. IEEE Netw. 35(2): 215-221 (2021) - [j86]Jing Qiu, Yuanyuan Chen, Zhihong Tian, Nadra Guizani, Xiaojiang Du:
The Security of Internet of Vehicles Network: Adversarial Examples for Trajectory Mode Detection. IEEE Netw. 35(5): 279-283 (2021) - [j85]Zhe Lin, Fan Zhang, Xuemin Lin, Wenjie Zhang, Zhihong Tian:
Hierarchical Core Maintenance on Large Dynamic Graphs. Proc. VLDB Endow. 14(5): 757-770 (2021) - [j84]Jiageng Yang, Xinguo Zhang, Hui Lu, Muhammad Shafiq, Zhihong Tian:
StFuzzer: Contribution-Aware Coverage-Guided Fuzzing for Smart Devices. Secur. Commun. Networks 2021: 1987844:1-1987844:15 (2021) - [j83]Shudong Li, Qianqing Zhang, Xiaobo Wu, Weihong Han, Zhihong Tian:
Attribution Classification Method of APT Malware in IoT Using Machine Learning Techniques. Secur. Commun. Networks 2021: 9396141:1-9396141:12 (2021) - [j82]Shudong Li, Yuan Li, Weihong Han, Xiaojiang Du, Mohsen Guizani, Zhihong Tian:
Malicious mining code detection based on ensemble learning in cloud computing environment. Simul. Model. Pract. Theory 113: 102391 (2021) - [j81]Weihong Han, Zhihong Tian, Chunsheng Zhu, Zizhong Huang, Yan Jia, Mohsen Guizani:
A Topic Representation Model for Online Social Networks Based on Hybrid Human-Artificial Intelligence. IEEE Trans. Comput. Soc. Syst. 8(1): 191-200 (2021) - [j80]Ning Hu, Zhihong Tian, Xiaojiang Du, Nadra Guizani, Zhihan Zhu:
Deep-Green: A Dispersed Energy-Efficiency Computing Paradigm for Green Industrial IoT. IEEE Trans. Green Commun. Netw. 5(2): 750-764 (2021) - [j79]Lingling Lv, Chan Zheng, Lei Zhang, Chun Shan, Zhihong Tian, Xiaojiang Du, Mohsen Guizani:
Contract and Lyapunov Optimization-Based Load Scheduling and Energy Management for UAV Charging Stations. IEEE Trans. Green Commun. Netw. 5(3): 1381-1394 (2021) - [j78]Ning Hu, Zhihong Tian, Xiaojiang Du, Mohsen Guizani:
An Energy-Efficient In-Network Computing Paradigm for 6G. IEEE Trans. Green Commun. Netw. 5(4): 1722-1733 (2021) - [j77]Yanbin Sun, Zhihong Tian, Mohan Li, Shen Su, Xiaojiang Du, Mohsen Guizani:
Honeypot Identification in Softwarized Industrial Cyber-Physical Systems. IEEE Trans. Ind. Informatics 17(8): 5542-5551 (2021) - [j76]Chaochao Luo, Zhiyuan Tan, Geyong Min, Jie Gan, Wei Shi, Zhihong Tian:
A Novel Web Attack Detection System for Internet of Things via Ensemble Classification. IEEE Trans. Ind. Informatics 17(8): 5810-5818 (2021) - [j75]Yuhang Wang, Zhihong Tian, Yanbin Sun, Xiaojiang Du, Nadra Guizani:
LocJury: An IBN-Based Location Privacy Preserving Scheme for IoCV. IEEE Trans. Intell. Transp. Syst. 22(8): 5028-5037 (2021) - [j74]Xiaojiang Du, Willy Susilo, Mohsen Guizani, Zhihong Tian:
Introduction to the Special Section on Artificial Intelligence Security: Adversarial Attack and Defense. IEEE Trans. Netw. Sci. Eng. 8(2): 905-907 (2021) - [j73]Zhaoquan Gu, Dongda Li, Nadra Guizani, Xiaojiang Du, Zhihong Tian:
An Aerial-Computing-Assisted Architecture for Large-Scale Sensor Networks. IEEE Wirel. Commun. 28(5): 43-49 (2021) - [j72]Chang Liu, Gang Xiong, Gaopeng Gou, Siu-Ming Yiu, Zhen Li, Zhihong Tian:
Classifying encrypted traffic using adaptive fingerprints with multi-level attributes. World Wide Web 24(6): 2071-2097 (2021) - [c44]Wenrong Xie, Fashan Dong, Haiyang Yu, Zhaoquan Gu, Le Wang, Zhihong Tian:
Generate Adversarial Examples Combined with Image Entropy Distribution. DSC 2021: 272-279 - [c43]Chuanyu Zhao, Shudong Li, Xiaobo Wu, Weihong Han, Zhihong Tian, Maofei Chen:
A Novel Malware Encrypted Traffic Detection Framework Based On Ensemble Learning. DSC 2021: 614-620 - [c42]Keke Tang, Dingruibo Miao, Weilong Peng, Jianpeng Wu, Yawen Shi, Zhaoquan Gu, Zhihong Tian, Wenping Wang:
CODEs: Chamfer Out-of-Distribution Examples against Overconfidence Issue. ICCV 2021: 1133-1142 - [c41]Jing Wen, Bi-Yi Chen, Chang-Dong Wang, Zhihong Tian:
PRGAN: Personalized Recommendation with Conditional Generative Adversarial Networks. ICDM 2021: 729-738 - [c40]Meng Jia, Kun He, Jing Chen, Ruiying Du, Weihang Chen, Zhihong Tian, Shouling Ji:
PROCESS: Privacy-Preserving On-Chain Certificate Status Service. INFOCOM 2021: 1-10 - [c39]Xingbin Wang, Boyan Zhao, Rui Hou, Amro Awad, Zhihong Tian, Dan Meng:
NASGuard: A Novel Accelerator Architecture for Robust Neural Architecture Search (NAS) Networks. ISCA 2021: 776-789 - [c38]Xugong Qin, Yu Zhou, Youhui Guo, Dayan Wu, Zhihong Tian, Ning Jiang, Hongbin Wang, Weiping Wang:
Mask is All You Need: Rethinking Mask R-CNN for Dense and Arbitrary-Shaped Scene Text Detection. ACM Multimedia 2021: 414-423 - [c37]Ke Lv, Yuan Liu, Jienan Chen, Dongxia Wang, Zhihong Tian:
An Interactive System for Unfair Rating Detection Models in a Customized Perspective. TrustCom 2021: 871-878 - [p3]Huchen Zhou, Mohan Li, Zhaoquan Gu, Zhihong Tian:
Spatiotemporal Data Cleaning and Knowledge Fusion. MDATA: A New Knowledge Representation Model 2021: 32-50 - [p2]Xiaolong Chen, Le Wang, Yunyi Tang, Weihong Han, Zhihong Tian, Zhaoquan Gu:
Entity Alignment: Optimization by Seed Selection. MDATA: A New Knowledge Representation Model 2021: 99-116 - [p1]Yunyi Tang, Le Wang, Xiaolong Chen, Zhaoquan Gu, Zhihong Tian:
Knowledge Extraction: Automatic Classification of Matching Rules. MDATA: A New Knowledge Representation Model 2021: 117-130 - [i9]Keke Tang, Dingruibo Miao, Weilong Peng, Jianpeng Wu, Yawen Shi, Zhaoquan Gu, Zhihong Tian, Wenping Wang:
CODEs: Chamfer Out-of-Distribution Examples against Overconfidence Issue. CoRR abs/2108.06024 (2021) - [i8]Xugong Qin, Yu Zhou, Youhui Guo, Dayan Wu, Zhihong Tian, Ning Jiang, Hongbin Wang, Weiping Wang:
Mask is All You Need: Rethinking Mask R-CNN for Dense and Arbitrary-Shaped Scene Text Detection. CoRR abs/2109.03426 (2021) - [i7]Bin Zhu, Zhaoquan Gu, Le Wang, Zhihong Tian:
TREATED: Towards Universal Defense against Textual Adversarial Attacks. CoRR abs/2109.06176 (2021) - [i6]Lei Zhang, Shuaimin Jiang, Xiajiong Shen, Brij B. Gupta, Zhihong Tian:
PWG-IDS: An Intrusion Detection Model for Solving Class Imbalance in IIoT Networks Using Generative Adversarial Networks. CoRR abs/2110.03445 (2021) - 2020
- [j71]Hong-Li Zhang, Rui Jin, Yu Zhang, Zhihong Tian:
A Public Psychological Pressure Index for Social Networks. IEEE Access 8: 23457-23469 (2020) - [j70]Zhaoquan Gu, Weixiong Hu, Chuanjing Zhang, Le Wang, Chunsheng Zhu, Zhihong Tian:
Restricted Region Based Iterative Gradient Method for Non-Targeted Attack. IEEE Access 8: 25262-25271 (2020) - [j69]Xi Luo, Lihua Yin, Chao Li, Chonghua Wang, Fuyang Fang, Chunsheng Zhu, Zhihong Tian:
A Lightweight Privacy-Preserving Communication Protocol for Heterogeneous IoT Environment. IEEE Access 8: 67192-67204 (2020) - [j68]Shudong Li, Dawei Zhao, Xiaobo Wu, Zhihong Tian, Aiping Li, Zhen Wang:
Functional immunization of networks based on message passing. Appl. Math. Comput. 366 (2020) - [j67]Yuanyuan Chen, Jing Qiu, Xiaojiang Du, Lihua Yin, Zhihong Tian:
Security of Mobile Multimedia Data: The Adversarial Examples for Spatio-temporal Data. Comput. Networks 181: 107432 (2020) - [j66]Muhammad Shafiq, Zhihong Tian, Ali Kashif Bashir, Xiaojiang Du, Mohsen Guizani:
IoT malicious traffic identification using wrapper-based feature selection mechanisms. Comput. Secur. 94: 101863 (2020) - [j65]Zhe Sun, Lihua Yin, Chao Li, Weizhe Zhang, Ang Li, Zhihong Tian:
The QoS and privacy trade-off of adversarial deep learning: An evolutionary game approach. Comput. Secur. 96: 101876 (2020) - [j64]Weixiang Chen, Xiaohan Helu, Chengjie Jin, Man Zhang, Hui Lu, Yanbin Sun, Zhihong Tian:
Advanced persistent threat organization identification based on software gene of malware. Trans. Emerg. Telecommun. Technol. 31(12) (2020) - [j63]Muhammad Shafiq, Zhihong Tian, Yanbin Sun, Xiaojiang Du, Mohsen Guizani:
Selection of effective machine learning algorithm and Bot-IoT attacks traffic identification for internet of things in smart city. Future Gener. Comput. Syst. 107: 433-442 (2020) - [j62]Lihua Yin, Binxing Fang, Yunchuan Guo, Zhe Sun, Zhihong Tian:
Hierarchically defining Internet of Things security: From CIA to CACA. Int. J. Distributed Sens. Networks 16(1) (2020) - [j61]Yang Zhang, Shixin Sun, Dongwen Zhang, Jing Qiu, Zhihong Tian:
A consistency-guaranteed approach for Internet of Things software refactoring. Int. J. Distributed Sens. Networks 16(1) (2020) - [j60]Haitao Sun, Chengjie Jin, Xiaohan Helu, Hui Lu, Man Zhang, Zhihong Tian:
Research on android infiltration technology based on the silent installation of an accessibility service. Int. J. Distributed Sens. Networks 16(2) (2020) - [j59]Dongliang Xu, Zhihong Tian, Rufeng Lai, Xiangtao Kong, Zhiyuan Tan, Wei Shi:
Deep learning based emotion analysis of microblog texts. Inf. Fusion 64: 1-11 (2020) - [j58]Zhihong Tian, Xiangsong Gao, Shen Su, Jing Qiu:
Vcash: A Novel Reputation Framework for Identifying Denial of Traffic Service in Internet of Connected Vehicles. IEEE Internet Things J. 7(5): 3901-3909 (2020) - [j57]Jing Qiu, Zhihong Tian, Chunlai Du, Qi Zuo, Shen Su, Binxing Fang:
A Survey on Access Control in the Age of Internet of Things. IEEE Internet Things J. 7(6): 4682-4696 (2020) - [j56]Mohan Li, Yanbin Sun, Hui Lu, Sabita Maharjan, Zhihong Tian:
Deep Reinforcement Learning for Partially Observable Data Poisoning Attack in Crowdsensing Systems. IEEE Internet Things J. 7(7): 6266-6278 (2020) - [j55]Tiantian Ji, Zhongru Wang, Zhihong Tian, Binxing Fang, Qiang Ruan, Haichen Wang, Wei Shi:
AFLPro: Direction sensitive fuzzing. J. Inf. Secur. Appl. 54: 102497 (2020) - [j54]Jie Han, Zhihong Tian:
The effect of trade creation in China-Asean free trade area based on the gravity model. J. Intell. Fuzzy Syst. 38(6): 7061-7065 (2020) - [j53]Yaping Liu, Shuo Zhang, Haojin Zhu, Peng-Jun Wan, Lixin Gao, Yaoxue Zhang, Zhihong Tian:
A novel routing verification approach based on blockchain for inter-domain routing in smart metropolitan area networks. J. Parallel Distributed Comput. 142: 77-89 (2020) - [j52]Xiaowei Wang, Maowei Cheng, Yefu Wang, Shaohui Liu, Zhihong Tian, Feng Jiang, Hongjun Zhang:
Obstructive sleep apnea detection using ecg-sensor with convolutional neural networks. Multim. Tools Appl. 79(23-24): 15813-15827 (2020) - [j51]Zhihong Tian, Yuhang Wang, Yanbin Sun, Jing Qiu:
Location Privacy Challenges in Mobile Edge Computing: Classification and Exploration. IEEE Netw. 34(2): 52-56 (2020) - [j50]Yuhang Wang, Zhihong Tian, Yanbin Sun, Xiaojiang Du, Nadra Guizani:
Preserving Location Privacy in UASN through Collaboration and Semantic Encapsulation. IEEE Netw. 34(4): 284-290 (2020) - [j49]Yanbin Sun, Zhihong Tian, Mohan Li, Chunsheng Zhu, Nadra Guizani:
Automated Attack and Defense Framework toward 5G Security. IEEE Netw. 34(5): 247-253 (2020) - [j48]Zhaoquan Gu, Zhen Cao, Zhihong Tian, Yuexuan Wang, Xiaojiang Du, Mohsen Guizani:
A Low-Latency and Energy-Efficient Neighbor Discovery Algorithm for Wireless Sensor Networks. Sensors 20(3): 657 (2020) - [j47]Jing Qiu, Yuhan Chai, Zhihong Tian, Xiaojiang Du, Mohsen Guizani:
Automatic Concept Extraction Based on Semantic Graphs From Big Data in Smart City. IEEE Trans. Comput. Soc. Syst. 7(1): 225-233 (2020) - [j46]Zhihong Tian, Chaochao Luo, Hui Lu, Shen Su, Yanbin Sun, Man Zhang:
User and Entity Behavior Analysis under Urban Big Data. Trans. Data Sci. 1(3): 16:1-16:19 (2020) - [j45]Zhihong Tian, Chaochao Luo, Jing Qiu, Xiaojiang Du, Mohsen Guizani:
A Distributed Deep Learning System for Web Attack Detection on Edge Devices. IEEE Trans. Ind. Informatics 16(3): 1963-1971 (2020) - [j44]Jing Qiu, Lei Du, Dongwen Zhang, Shen Su, Zhihong Tian:
Nei-TTE: Intelligent Traffic Time Estimation Based on Fine-Grained Time Derivation of Road Segments for Smart City. IEEE Trans. Ind. Informatics 16(4): 2659-2666 (2020) - [j43]Menghai Pan, Weixiao Huang, Yanhua Li, Xun Zhou, Zhenming Liu, Rui Song, Hui Lu, Zhihong Tian, Jun Luo:
DHPA: Dynamic Human Preference Analytics Framework: A Case Study on Taxi Drivers' Learning Curve Analysis. ACM Trans. Intell. Syst. Technol. 11(1): 8:1-8:19 (2020) - [j42]Aleksei Grigorev, Shaohui Liu, Zhihong Tian, Jianxin Xiong, Seungmin Rho, Feng Jiang:
Delving Deeper in Drone-Based Person Re-Id by Employing Deep Decision Forest and Attributes Fusion. ACM Trans. Multim. Comput. Commun. Appl. 16(1s): 25:1-25:15 (2020) - [j41]Feng Jiang, Yunsheng Fu, Brij B. Gupta, Yongsheng Liang, Seungmin Rho, Fang Lou, Fanzhi Meng, Zhihong Tian:
Deep Learning Based Multi-Channel Intelligent Attack Detection for Data Security. IEEE Trans. Sustain. Comput. 5(2): 204-212 (2020) - [j40]Jing Qiu, Lei Du, Yuanyuan Chen, Zhihong Tian, Xiaojiang Du, Mohsen Guizani:
Artificial Intelligence Security in 5G Networks: Adversarial Examples for Estimating a Travel Time Task. IEEE Veh. Technol. Mag. 15(3): 95-100 (2020) - [j39]Shen Su, Zhihong Tian, Siyu Liang, Shuang Li, Sha-sha Du, Nadra Guizani:
A Reputation Management Scheme for Efficient Malicious Vehicle Identification over 5G Networks. IEEE Wirel. Commun. 27(3): 46-52 (2020) - [j38]Muhammad Shafiq, Zhihong Tian, Ali Kashif Bashir, Korhan Cengiz, Adnan Tahir:
SoftSystem: Smart Edge Computing Device Selection Method for IoT Based on Soft Set Technique. Wirel. Commun. Mob. Comput. 2020: 8864301:1-8864301:10 (2020) - [j37]Weihong Han, Zhihong Tian, Zizhong Huang, Shudong Li, Yan Jia:
Topic representation model based on microblogging behavior analysis. World Wide Web 23(6): 3083-3097 (2020) - [c36]Meihua Fan, Shudong Li, Weihong Han, Xiaobo Wu, Zhaoquan Gu, Zhihong Tian:
A Novel Malware Detection Framework Based on Weighted Heterograph. CIAT 2020: 39-43 - [c35]Dongqiu Huang, Zhihong Tian, Shen Su, Yu Jiang:
A defense scheme of voice control system against DolphinAttack. CIAT 2020: 136-142 - [c34]Hanwen Liu, Xiaohan Helu, Chengjie Jin, Hui Lu, Zhihong Tian, Xiaojiang Du, Khalid Abualsaud:
A Malware Detection Method for Health Sensor Data Based on Machine Learning. ICIoT 2020: 277-282 - [c33]Yan Sun, Lihua Yin, Zhe Sun, Zhihong Tian, Xiaojiang Du:
An IoT data sharing privacy preserving scheme. INFOCOM Workshops 2020: 984-990 - [c32]Yuhan Chai, Jing Qiu, Shen Su, Chunsheng Zhu, Lihua Yin, Zhihong Tian:
LGMal: A Joint Framework Based on Local and Global Features for Malware Detection. IWCMC 2020: 463-468 - [c31]Jinta Weng, Wensheng Gan, Guozhu Ding, Zhihong Tian, Ying Gao, Jing Qiu:
SESM: Emotional Social Semantic and Time Series Analysis of Learners' Comments. SMC 2020: 4134-4139 - [c30]Mingzhou Yang, Yanhua Li, Xun Zhou, Hui Lu, Zhihong Tian, Jun Luo:
Inferring Passengers' Interactive Choices on Public Transits via MA-AL: Multi-Agent Apprenticeship Learning. WWW 2020: 1637-1647 - [e1]Zhihong Tian, Lihua Yin, Zhaoquan Gu:
CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, Virtual Event / Guangzhou, China, December 5, 2020. ACM 2020, ISBN 978-1-4503-8782-8 [contents]
2010 – 2019
- 2019
- [j36]Yanbin Sun, Zhihong Tian, Yuhang Wang, Mohan Li, Shen Su, Xianzhi Wang, Dunqiu Fan:
Lightweight Anonymous Geometric Routing for Internet of Things. IEEE Access 7: 29754-29762 (2019) - [j35]Weihong Han, Zhihong Tian, Zizhong Huang, Dongqiu Huang, Yan Jia:
Quantitative Assessment of Wireless Connected Intelligent Robot Swarms Network Security Situation. IEEE Access 7: 134293-134300 (2019) - [j34]Le Wang, Zhihong Tian, Zhaoquan Gu, Hui Lu:
Crowdsourcing Approach for Developing Hands-On Experiments in Cybersecurity Education. IEEE Access 7: 169066-169072 (2019) - [j33]Hui Lu, Xiaohan Helu, Chengjie Jin, Yanbin Sun, Man Zhang, Zhihong Tian:
Salaxy: Enabling USB Debugging Mode Automatically to Control Android Devices. IEEE Access 7: 178321-178330 (2019) - [j32]Jiwei Xu, Zhenghong Deng, Bo Gao, Qun Song, Zhihong Tian, Qiuling Wang, Mingyu Gao, Zhenxi Niu:
Popularity-driven strategy updating rule promotes cooperation in the spatial prisoner's dilemma game. Appl. Math. Comput. 353: 82-87 (2019) - [j31]Zhihong Tian, Shen Su, Wei Shi, Xiaojiang Du, Mohsen Guizani, Xiang Yu:
A data-driven method for future Internet route decision modeling. Future Gener. Comput. Syst. 95: 212-220 (2019) - [j30]Xiongrui Xu, Zhihai Rong, Zhihong Tian, Zhi-Xi Wu:
Timescale diversity facilitates the emergence of cooperation-extortion alliances in networked systems. Neurocomputing 350: 195-201 (2019) - [j29]Qingfeng Tan, Yue Gao, Jinqiao Shi, Xuebin Wang, Binxing Fang, Zhihong Tian:
Toward a Comprehensive Insight Into the Eclipse Attacks of Tor Hidden Services. IEEE Internet Things J. 6(2): 1584-1593 (2019) - [j28]Bo Li, Yanyu Huang, Zheli Liu, Jin Li, Zhihong Tian, Siu-Ming Yiu:
HybridORAM: Practical oblivious cloud storage with constant bandwidth. Inf. Sci. 479: 651-663 (2019) - [j27]Zhihong Tian, Mohan Li, Meikang Qiu, Yanbin Sun, Shen Su:
Block-DEF: A secure digital evidence framework using blockchain. Inf. Sci. 491: 151-165 (2019) - [j26]Juan Chen, Zhihong Tian, Xiang Cui, Lihua Yin, Xianzhi Wang:
Trust architecture and reputation evaluation for internet of things. J. Ambient Intell. Humaniz. Comput. 10(8): 3099-3107 (2019) - [j25]Weihong Han, Zhihong Tian, Zizhong Huang, Shudong Li, Yan Jia:
Bidirectional self-adaptive resampling in internet of things big data learning. Multim. Tools Appl. 78(21): 30111-30126 (2019) - [j24]Zhaoquan Gu, Yuexuan Wang, Wei Shi, Zhihong Tian, Kui Ren, Francis C. M. Lau:
A Practical Neighbor Discovery Framework for Wireless Sensor Networks. Sensors 19(8): 1887 (2019) - [j23]Weihong Han, Zhihong Tian, Wei Shi, Zizhong Huang, Shudong Li:
Low-Power Distributed Data Flow Anomaly-Monitoring Technology for Industrial Internet of Things. Sensors 19(12): 2804 (2019) - [j22]Yuhang Wang, Zhihong Tian, Hongli Zhang, Shen Su, Wei Shi:
Erratum: Wang, Y. et al., A Privacy Preserving Scheme for Nearest Neighbor Query. Sensors 2018, 18, 2440. Sensors 19(14): 3187 (2019) - [j21]Zhongru Wang, Yuntao Zhang, Zhihong Tian, Qiang Ruan, Tong Liu, Haichen Wang, Zhehui Liu, Jiayi Lin, Binxing Fang, Wei Shi:
Automated Vulnerability Discovery and Exploitation in the Internet of Things. Sensors 19(15): 3362 (2019) - [j20]Hao Li, Zhaoquan Gu, Lianbing Deng, Yi Han, Cheng Yang, Zhihong Tian:
A Fine-Grained Video Encryption Service Based on the Cloud-Fog-Local Architecture for Public and Private Videos. Sensors 19(24): 5366 (2019) - [j19]Zhihong Tian, Wei Shi, Yuhang Wang, Chunsheng Zhu, Xiaojiang Du, Shen Su, Yanbin Sun, Nadra Guizani:
Real-Time Lateral Movement Detection Based on Evidence Reasoning Network for Edge Computing Environment. IEEE Trans. Ind. Informatics 15(7): 4285-4294 (2019) - [j18]Zhihong Tian, Xiangsong Gao, Shen Su, Jing Qiu, Xiaojiang Du, Mohsen Guizani:
Evaluating Reputation Management Schemes of Internet of Vehicles Based on Evolutionary Game Theory. IEEE Trans. Veh. Technol. 68(6): 5971-5980 (2019) - [c29]Cong Zhang, Yanhua Li, Jie Bao, Sijie Ruan, Tianfu He, Hui Lu, Zhihong Tian, Cong Liu, Chao Tian, Jianfeng Lin, Xianen Li:
Effective Recycling Planning for Dockless Sharing Bikes. SIGSPATIAL/GIS 2019: 62-70 - [c28]Dongwen Zhang, Yaqi Si, Zhihong Tian, Lihua Yin, Jing Qiu, Xiaojiang Du:
A Genetic-Algorithm Based Method for Storage Location Assignments in Mobile Rack Warehouses. GLOBECOM 2019: 1-6 - [c27]Yuhang Wang, Zhihong Tian, Shen Su, Yanbin Sun, Chunsheng Zhu:
Preserving Location Privacy in Mobile Edge Computing. ICC 2019: 1-6 - [c26]Zheng Shen, Zhaoquan Gu, Yuexuan Wang, Zhihong Tian, Mingli Song, Chunsheng Zhu:
Can the Max-Min Fairness-Based Coalitional Mechanism in Competitive Networks be Trustful? IWCMC 2019: 348-353 - [i5]Zhihong Tian, Shen Su, Xiang Yu, Yuhang Wang, Hongli Zhang, Xiaojiang Du, Mohsen Guizani:
Vcash: A Novel Reputation Framework for Identifying Denial of Traffic Service in Internet of Connected Vehicles. CoRR abs/1902.03994 (2019) - [i4]Zhihong Tian, Yanbin Sun, Shen Su, Mohan Li, Xiaojiang Du, Mohsen Guizani:
Automated Attack and Defense Framework for 5G Security on Physical and Logical Layers. CoRR abs/1902.04009 (2019) - [i3]Zhihong Tian, Wei Shi, Yuhang Wang, Chunsheng Zhu, Xiaojiang Du, Shen Su, Yanbin Sun, Nadra Guizani:
Real Time Lateral Movement Detection based on Evidence Reasoning Network for Edge Computing Environment. CoRR abs/1902.04387 (2019) - [i2]Zhihong Tian, Xiangsong Gao, Shen Su, Jing Qiu, Xiaojiang Du, Mohsen Guizani:
Evaluating Reputation Management Schemes of Internet of Vehicles based on Evolutionary Game Theory. CoRR abs/1902.04667 (2019) - [i1]Keke Tang, Peng Song, Yuexin Ma, Zhaoquan Gu, Yu Su, Zhihong Tian, Wenping Wang:
Decision Propagation Networks for Image Classification. CoRR abs/1911.12101 (2019) - 2018
- [j17]Zhihong Tian, Yu Cui, Lun An, Shen Su, Xiaoxia Yin, Lihua Yin, Xiang Cui:
A Real-Time Correlation of Host-Level Events in Cyber Range Service for Smart Campus. IEEE Access 6: 35355-35364 (2018) - [j16]Jing Qiu, Yuhan Chai, Yan Liu, Zhaoquan Gu, Shudong Li, Zhihong Tian:
Automatic Non-Taxonomic Relation Extraction from Big Data in Smart City. IEEE Access 6: 74854-74864 (2018) - [j15]Wuzhen Shi, Shaohui Liu, Feng Jiang, Debin Zhao, Zhihong Tian:
Anchored neighborhood deep network for single-image super-resolution. EURASIP J. Image Video Process. 2018: 34 (2018) - [j14]Honglu Liu, Zhihong Tian, Anqiang Huang, Zaili Yang:
Analysis of vulnerabilities in maritime supply chains. Reliab. Eng. Syst. Saf. 169: 475-484 (2018) - [j13]Yuhang Wang, Zhihong Tian, Hongli Zhang, Shen Su, Wei Shi:
A Privacy Preserving Scheme for Nearest Neighbor Query. Sensors 18(8): 2440 (2018) - [j12]Mohan Li, Yanbin Sun, Yu Jiang, Zhihong Tian:
Answering the Min-Cost Quality-Aware Query on Multi-Sources in Sensor-Cloud Systems. Sensors 18(12): 4486 (2018) - [j11]Xiang Yu, Zhihong Tian, Jing Qiu, Feng Jiang:
A Data Leakage Prevention Method Based on the Reduction of Confidential and Context Terms for Smart Mobile Devices. Wirel. Commun. Mob. Comput. 2018: 5823439:1-5823439:11 (2018) - [j10]Zihan Wang, Chaoge Liu, Jing Qiu, Zhihong Tian, Xiang Cui, Shen Su:
Automatically Traceback RDP-Based Targeted Ransomware Attacks. Wirel. Commun. Mob. Comput. 2018: 7943586:1-7943586:13 (2018) - [c25]Zhaoquan Gu, Yongcai Wang, Jing Qiu, Lihua Yin, Zhihong Tian:
How to Control Target Nodes in Dynamic Networks. DSC 2018: 266-273 - [c24]Shudong Li, Xiaobo Wu, Aiping Li, Bin Zhou, Zhihong Tian, Dawei Zhao:
Structural Vulnerability of Complex Networks Under Multiple Edge-Based Attacks. DSC 2018: 405-409 - [c23]Yunsheng Fu, Fang Lou, Fangzhi Meng, Zhihong Tian, Hua Zhang, Feng Jiang:
An Intelligent Network Attack Detection Method Based on RNN. DSC 2018: 483-489 - [c22]Yuhang Wang, Hongli Zhang, Shen Su, Zhihong Tian:
A Location Privacy-Aware Method for kNN Query in Location Based Services. DSC 2018: 537-541 - [c21]Fanzhi Meng, Fang Lou, Yunsheng Fu, Zhihong Tian:
Deep Learning Based Attribute Classification Insider Threat Detection for Data Security. DSC 2018: 576-581 - [c20]Jing Qiu, Yaqi Si, Zhihong Tian:
Automatic Taxonomy Construction for Eye Colors Data without Using Context Information. DSC 2018: 837-841 - [c19]Jie Yin, Heyang Lv, Fangjiao Zhang, Zhihong Tian, Xiang Cui:
Study on Advanced Botnet Based on Publicly Available Resources. ICICS 2018: 57-74 - [c18]Mohan Li, Yu Jiang, Yanbin Sun, Zhihong Tian:
Answering the Min-Cost Quality-Aware Query on Multi-sources in Sensor-Cloud Systems. SpaCCS 2018: 156-165 - 2017
- [c17]Hua Zhang, Fang Lou, Yunsheng Fu, Zhihong Tian:
A Conditional Probability Computation Method for Vulnerability Exploitation Based on CVSS. DSC 2017: 238-241 - 2016
- [j9]Zhihong Tian, Honglu Liu:
Evaluation method for node importance in container supply chain network. Int. J. Serv. Technol. Manag. 22(3/4/5): 145-161 (2016) - [j8]Zhihong Tian, Zhenji Zhang, Ruize Gao:
Optimization in e-commerce market network based on value order parameter. Inf. Technol. Manag. 17(2): 187-197 (2016) - [c16]Xinxing Zhang, Zhihong Tian, Luchen Zhang:
A Measurement Study on Mainline DHT and Magnet Link. DSC 2016: 11-19 - [c15]Pengfule Ding, Zhihong Tian, Hongli Zhang, Yong Wang, Liang Zhang, Sanchuan Guo:
Detection and Defense of SYN Flood Attacks Based on Dual Stack Network Firewall. DSC 2016: 526-531 - [c14]Qianqian Zhang, Honglu Liu, Shifeng Liu, Zhihong Tian:
Dynamic online consumer trust forming mechanism research based on Beijing, China. LISS 2016: 1-9 - 2015
- [j7]Hongli Zhang, Dongliang Xu, Zhihong Tian, Yujian Fan:
An efficient parallel algorithm for exact multi-pattern matching. Secur. Commun. Networks 8(9): 1688-1697 (2015) - 2013
- [j6]Yu Cui, Zhihong Tian, Binxing Fang, Hongli Zhang, Weizhe Zhang:
Data Spoofing Attacks by IPv6 Tunnels. IEICE Trans. Commun. 96-B(11): 2875-2882 (2013) - [j5]Zhihong Tian, Zhenji Zhang, Xiaolan Guan:
A new evolution model for B2C e-commerce market. Inf. Technol. Manag. 14(3): 205-215 (2013) - [j4]Zhihong Tian, Zhenji Zhang, Xiaolan Guan:
A New Evolution Mechanism Model for B2B E-Commerce Network. J. Electron. Commer. Organ. 11(2): 12-22 (2013) - [c13]Huiping Chen, Zhihong Tian, Yubin Wang, Xue Han:
The Analysis of County Science and Technology Worker Internet Usage and Its Influence Factors. CCTA (2) 2013: 434-443 - [c12]Pingping Liu, Zhihong Tian, Xu Wu, Wei Liu:
An Improved Common Vulnerability Scoring System Based on K-means. ISCTCS 2013: 62-69 - 2011
- [c11]Zhihong Tian, Zhenji Zhang, Dongpo Xiao:
Study on the Knowledge -Sharing Network of Innovation Teams using Social Network Analysis. ICEIS (2) 2011: 438-443 - [c10]Honglu Liu, Zhihong Tian:
Study on the Evolution Mechanisms of the Network Public Opinion. ICEIS (3) 2011: 444-448 - [c9]Dongpo Xiao, Zhenji Zhang, Zhihong Tian, Jingyuan Zeng, Feng Cao:
A New Chinese Public Welfare Operation Mode based on Value Network Model. ICEIS (1) 2011: 510-514
2000 – 2009
- 2009
- [j3]Yang Li, Jun-Li Wang, Zhihong Tian, Tianbo Lu, Chen Young:
Building lightweight intrusion detection system using wrapper-based feature selection mechanisms. Comput. Secur. 28(6): 466-475 (2009) - [c8]Yang Li, Tianbo Lu, Li Guo, Zhihong Tian, Lin Qi:
Optimizing Network Anomaly Detection Scheme Using Instance Selection Mechanism. GLOBECOM 2009: 1-7 - [c7]Wei Jiang, Binxing Fang, Hongli Zhang, Zhihong Tian, Xin-fang Song:
Optimal Network Security Strengthening Using Attack-Defense Game Model. ITNG 2009: 475-480 - [c6]Yang Li, Tianbo Lu, Li Guo, Zhihong Tian, Qin-Wu Nie:
Towards lightweight and efficient DDOS attacks detection for web server. WWW 2009: 1139-1140 - 2008
- [j2]Yang Li, Li Guo, Zhihong Tian, Tianbo Lu:
A lightweight web server anomaly detection method based on transductive scheme and genetic algorithms. Comput. Commun. 31(17): 4018-4025 (2008) - [c5]Zhihong Tian, Baoshan Qin, Jianwei Ye, Hongli Zhang:
Alertclu: A Realtime Alert Aggregation and Correlation System. CW 2008: 778-781 - [c4]Wei Jiang, Zhihong Tian, Hongli Zhang, Xin-fang Song:
A Stochastic Game Theoretic Approach to Attack Prediction and Optimal Active Defense Strategy Decision. ICNSC 2008: 648-653 - [c3]Yang Li, Binxing Fang, Li Guo, Zhihong Tian, Yongzheng Zhang, Zhi-Gang Wu:
UBSF: A novel online URL-Based Spam Filter. ISCC 2008: 332-339 - 2007
- [c2]Wei Jiang, Hongli Zhang, Zhihong Tian, Xin-fang Song:
A Game Theoretic Method for Decision and Analysis of the Optimal Active Defense Strategy. CIS 2007: 819-823 - 2006
- [j1]Zhihong Tian, Mingzeng Hu, Bin Li, Bo Liu, Hongli Zhang:
Defending against distributed denial-of-service attacks with an auction-based method. Web Intell. Agent Syst. 4(3): 341-351 (2006) - 2004
- [c1]Zhihong Tian, Binxing Fang, Xiao-chun Yun:
Defending Against Flash Crowds and Malicious Traffic Attacks with An Auction-Based Method. Web Intelligence 2004: 24-28
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-23 20:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint