Dezhi Han
Orcid: 0000-0001-8861-5461
According to our database1,
Dezhi Han
authored at least 156 papers
between 2004 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
J. Supercomput., January, 2025
Expert Syst. Appl., 2025
Towards bias-aware visual question answering: Rectifying and mitigating comprehension biases.
Expert Syst. Appl., 2025
Comput. Stand. Interfaces, 2025
A secure data storage and sharing scheme for port supply chain based on blockchain and dynamic searchable encryption.
Comput. Stand. Interfaces, 2025
2024
Multim. Syst., December, 2024
Localization in Underwater Acoustic IoT Networks: Dealing With Perturbed Anchors and Stratification.
IEEE Internet Things J., May, 2024
MPCCT: Multimodal vision-language learning paradigm with context-based compact Transformer.
Pattern Recognit., March, 2024
Appl. Intell., March, 2024
TS-DP: An Efficient Data Processing Algorithm for Distribution Digital Twin Grid for Industry 5.0.
IEEE Trans. Consumer Electron., February, 2024
Correction to: Multi‑head attention‑based model for reconstructing continuous missing time series data.
J. Supercomput., January, 2024
A novel fuzzy control path planning algorithm for intelligent ship based on scale factors.
J. Supercomput., January, 2024
On Stablecoin: Ecosystem, architecture, mechanism and applicability as payment method.
Comput. Stand. Interfaces, January, 2024
HCVC: A High-Capacity Off-Chain Virtual Channel Scheme Based on Bidirectional Locking Mechanism.
IEEE Trans. Netw. Sci. Eng., 2024
SAR-LtYOLOv8: A Lightweight YOLOv8 Model for Small Object Detection in SAR Ship Images.
Comput. Syst. Sci. Eng., 2024
FastPFM: a multi-scale ship detection algorithm for complex scenes based on SAR images.
Connect. Sci., 2024
BLSAE-SNIDS: A Bi-LSTM sparse autoencoder framework for satellite network intrusion detection.
Comput. Sci. Inf. Syst., 2024
Medical record information storage scheme based on blockchain and attribute role-based access control.
Comput. Sci. Inf. Syst., 2024
IEEE Access, 2024
2023
Multi-head attention-based model for reconstructing continuous missing time series data.
J. Supercomput., December, 2023
LMCA: a lightweight anomaly network traffic detection model integrating adjusted mobilenet and coordinate attention mechanism for IoT.
Telecommun. Syst., December, 2023
NAS-YOLOX: a SAR ship detection using neural architecture search and multi-scale attention.
Connect. Sci., December, 2023
Connect. Sci., December, 2023
Vis. Comput., November, 2023
Blockchain-assisted secure message authentication with reputation management for VANETs.
J. Supercomput., November, 2023
Comput. Ind. Eng., September, 2023
IEEE Trans. Comput. Soc. Syst., August, 2023
CTDM: cryptocurrency abnormal transaction detection method with spatio-temporal and global representation.
Soft Comput., August, 2023
Appl. Intell., July, 2023
A Visual Question Answering Network Merging High- and Low-Level Semantic Information.
IEICE Trans. Inf. Syst., May, 2023
A novel system for medical equipment supply chain traceability based on alliance chain and attribute and role access control.
Future Gener. Comput. Syst., May, 2023
IEEE Syst. J., March, 2023
A Video Target Tracking and Correction Model with Blockchain and Robust Feature Location.
Sensors, March, 2023
A blockchain-based secure storage and access control scheme for supply chain finance.
J. Supercomput., 2023
Knowl. Based Syst., 2023
A Sparse Sensor Placement Strategy Based on Information Entropy and Data Reconstruction for Ocean Monitoring.
IEEE Internet Things J., 2023
Int. J. Commun. Syst., 2023
Comput. Sci. Inf. Syst., 2023
Comput. Sci. Inf. Syst., 2023
Appl. Intell., 2023
Proceedings of the 8th IEEE International Conference on Smart Cloud, 2023
A method combining improved Mahalanobis distance and adversarial autoencoder to detect abnormal network traffic.
Proceedings of the International Database Engineered Applications Symposium Conference, 2023
Proceedings of the 10th IEEE International Conference on Cyber Security and Cloud Computing, 2023
Proceedings of the 10th IEEE International Conference on Cyber Security and Cloud Computing, 2023
Proceedings of the 10th IEEE International Conference on Cyber Security and Cloud Computing, 2023
A Computationally Efficient Target Localization Algorithm in Underwater Wireless Sensor Networks.
Proceedings of the 8th International Conference on Computer and Communication Systems, 2023
Efficient and Secure Multi-Party Private Set Operation Protocol Suitable for IoT Devices.
Proceedings of the 2023 International Conference on Artificial Intelligence, 2023
2022
An Evolutionary-Based Approach for Low-Complexity Intrusion Detection in Wireless Sensor Networks.
Wirel. Pers. Commun., 2022
Range Difference-Based Target Localization Under Stratification Effect and NLOS Bias in UWSNs.
IEEE Wirel. Commun. Lett., 2022
J. Supercomput., 2022
A Hybrid Model Integrating MPSE and IGNN for Events Recognition Along Submarine Cables.
IEEE Trans. Instrum. Meas., 2022
A Blockchain-Based Auditable Access Control System for Private Data in Service-Centric IoT Environments.
IEEE Trans. Ind. Informatics, 2022
A localization algorithm for DV-Hop wireless sensor networks based on manhattan distance.
Telecommun. Syst., 2022
Telecommun. Syst., 2022
A Traceable and Revocable Ciphertext-Policy Attribute-based Encryption Scheme Based on Privacy Protection.
IEEE Trans. Dependable Secur. Comput., 2022
Blockchain for federated learning toward secure distributed machine learning systems: a systemic survey.
Soft Comput., 2022
Trajectory Optimization of Autonomous Surface Vehicles with Outliers for Underwater Target Localization.
Remote. Sens., 2022
Pattern Recognit., 2022
A Privacy-Preserving Storage Scheme for Logistics Data With Assistance of Blockchain.
IEEE Internet Things J., 2022
Dual Self-Guided Attention with Sparse Question Networks for Visual Question Answering.
IEICE Trans. Inf. Syst., 2022
EURASIP J. Wirel. Commun. Netw., 2022
Network abnormal traffic detection method based on fusion of chord similarity and multiple loss encoder.
EURASIP J. Wirel. Commun. Netw., 2022
MFVT: an anomaly traffic detection method merging feature fusion network and vision transformer architecture.
EURASIP J. Wirel. Commun. Netw., 2022
EURASIP J. Wirel. Commun. Netw., 2022
Comput. Stand. Interfaces, 2022
CoRR, 2022
A Hybrid parallel deep learning model for efficient intrusion detection based on metric learning.
Connect. Sci., 2022
A consortium blockchain-based information management system for unmanned vehicle logistics.
Comput. Sci. Inf. Syst., 2022
RICNN: A ResNet&Inception convolutional neural network for intrusion detection of abnormal traffic.
Comput. Sci. Inf. Syst., 2022
Fabric-GC: A Blockchain-based Gantt chart system for cross-organizational project management.
Comput. Sci. Inf. Syst., 2022
Comput. Ind. Eng., 2022
Proceedings of the ICCBN 2022: 10th International Conference on Communications and Broadband Networking, Shanghai, China, February 25, 2022
2021
Soft Comput., 2021
Soft Comput., 2021
A Privacy-Preserving Charging Scheme for Electric Vehicles Using Blockchain and Fog Computing.
IEEE Syst. J., 2021
A Novel Time-Aware Hybrid Recommendation Scheme Combining User Feedback and Collaborative Filtering.
IEEE Syst. J., 2021
Three-Dimensional Localization Algorithm Based on Improved A* and DV-Hop Algorithms in Wireless Sensor Network.
Sensors, 2021
Design and Implementation of an Anomaly Network Traffic Detection Model Integrating Temporal and Spatial Features.
Secur. Commun. Networks, 2021
Mob. Inf. Syst., 2021
Mob. Inf. Syst., 2021
J. Parallel Distributed Comput., 2021
A novel Byzantine fault tolerance consensus for Green IoT with intelligence based on reinforcement.
J. Inf. Secur. Appl., 2021
K maximum probability attack paths generation algorithm for target nodes in networked systems.
Int. J. Inf. Sec., 2021
A multi-objective distance vector-hop localization algorithm based on differential evolution quantum particle swarm optimization.
Int. J. Commun. Syst., 2021
A time-aware hybrid recommendation scheme combining content-based and collaborative filtering.
Frontiers Comput. Sci., 2021
Fabric-SCF: A Blockchain-based Secure Storage and Access Control Scheme for Supply Chain Finance.
CoRR, 2021
Connect. Sci., 2021
Multi-Keyword ranked search based on mapping set matching in cloud ciphertext storage system.
Connect. Sci., 2021
CASH: correlation-aware scheduling to mitigate soft error impact on heterogeneous multicores.
Connect. Sci., 2021
Comput. Sci. Inf. Syst., 2021
Comput. Sci. Inf. Syst., 2021
Proceedings of the MEDES '21: Proceedings of the 13th International Conference on Management of Digital EcoSystems, Virtual Event, Tunisia, November 1, 2021
Non-interactive Zero Knowledge Proof Based Access Control in Information-Centric Internet of Things.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021
2020
ARFV: An Efficient Shared Data Auditing Scheme Supporting Revocation for Fog-Assisted Vehicular Ad-Hoc Networks.
IEEE Trans. Veh. Technol., 2020
IEEE Trans. Cloud Comput., 2020
Soft Comput., 2020
Sensors, 2020
Sensors, 2020
Enhancing the Sensor Node Localization Algorithm Based on Improved DV-Hop and DE Algorithms in Wireless Sensor Networks.
Sensors, 2020
Sensors, 2020
Research and Software Design of an Φ-OTDR-Based Optical Fiber Vibration Recognition Algorithm.
J. Electr. Comput. Eng., 2020
Design of network intrusion detection system based on parallel DPC clustering algorithm.
Int. J. Embed. Syst., 2020
Intrusion detection of wireless sensor networks based on IPSO algorithm and BP neural network.
Int. J. Comput. Sci. Eng., 2020
Mitigating multi-cell upsets impacts on approximate network on chip through unequal message protection.
IEICE Electron. Express, 2020
A K-means algorithm based on characteristics of density applied to network intrusion detection.
Comput. Sci. Inf. Syst., 2020
Appl. Intell., 2020
IEEE Access, 2020
A Low Resource Consumption Clone Detection Method for Multi-Base Station Wireless Sensor Networks.
IEEE Access, 2020
IEEE Access, 2020
IEEE Access, 2020
IEEE Access, 2020
Fabric-Chain & Chain: A Blockchain-Based Electronic Document System for Supply Chain Finance.
Proceedings of the Blockchain and Trustworthy Systems - Second International Conference, 2020
Proceedings of the Blockchain and Trustworthy Systems - Second International Conference, 2020
2019
IEEE Trans. Parallel Distributed Syst., 2019
Improving the performance of feature selection and data clustering with novel global search and elite-guided artificial bee colony algorithm.
J. Supercomput., 2019
An Efficient and Safe Road Condition Monitoring Authentication Scheme Based on Fog Computing.
IEEE Internet Things J., 2019
DDoS attack detection based on global unbiased search strategy bee colony algorithm and artificial neural network.
Int. J. Embed. Syst., 2019
Design and application of real-time network abnormal traffic detection system based on Spark Streaming.
Int. J. Embed. Syst., 2019
Int. J. Comput. Sci. Eng., 2019
Int. J. Comput. Sci. Eng., 2019
Privacy-preserving multi-authority attribute-based encryption with dynamic policy updating in PHR.
Comput. Sci. Inf. Syst., 2019
Comput. Sci. Inf. Syst., 2019
Design of intrusion detection system based on improved ABC_elite and BP neural networks.
Comput. Sci. Inf. Syst., 2019
IEEE Access, 2019
Proceedings of the 6th International Conference on Systems and Informatics, 2019
2018
G-SD: Achieving Fast Reverse Lookup using Scalable Declustering Layout in Large-Scale File Systems.
IEEE Trans. Cloud Comput., 2018
IEEE Trans. Computers, 2018
IEEE Trans. Big Data, 2018
基于智能蜂群算法的DDoS攻击检测系统 (DDoS Attack Detection System Based on Intelligent Bee Colony Algorithm).
计算机科学, 2018
IEICE Electron. Express, 2018
IEICE Electron. Express, 2018
Towards Studying the Two-Tier Intra-Frequency X2 Handover Based on Software-Defined Open LTE Platform.
IEEE Access, 2018
A Novel Packets Transmission Scheme Based on Software Defined Open Wireless Platform.
IEEE Access, 2018
Proceedings of the Parallel and Distributed Computing, 2018
Performance Evaluation and Analysis for MPI-Based Data Movement in Virtual Switch Network.
Proceedings of the 2018 IEEE International Conference on Networking, 2018
Exploiting critical factors for higher education course construction of teaching in a second language: case study of 'computer architecture'.
Proceedings of the 10th International Conference on Education Technology and Computers, 2018
2017
Fuzzy-Logic Based Distributed Energy-Efficient Clustering Algorithm for Wireless Sensor Networks.
Sensors, 2017
Deister: A light-weight autonomous block management in data-intensive file systems using deterministic declustering distribution.
J. Parallel Distributed Comput., 2017
DANCER: The routing algorithm in delay tolerant networks based on dynamic and polymorphic combination of dimensions and energy consideration.
Int. J. Distributed Sens. Networks, 2017
Comput. Sci. Inf. Syst., 2017
Comput. Sci. Inf. Syst., 2017
2016
Routing Algorithm with Uneven Clustering for Energy Heterogeneous Wireless Sensor Networks.
J. Sensors, 2016
Comput. Sci. Inf. Syst., 2016
Comput. Sci. Inf. Syst., 2016
Proceedings of the International Conference on Advanced Cloud and Big Data, 2016
Survey of data intensive computing technologies application to to security log data management.
Proceedings of the 3rd IEEE/ACM International Conference on Big Data Computing, 2016
2015
Proceedings of the 10th IEEE International Conference on Networking, 2015
Achieving up to zero communication delay in BSP-based graph processing via vertex categorization.
Proceedings of the 10th IEEE International Conference on Networking, 2015
2009
Proceedings of the Sixth International Conference on Fuzzy Systems and Knowledge Discovery, 2009
2004
Proceedings of the Grid and Cooperative Computing, 2004
Proceedings of the Grid and Cooperative Computing, 2004