Dezhi Han

Orcid: 0000-0001-8861-5461

According to our database1, Dezhi Han authored at least 156 papers between 2004 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
ADV-YOLO: improved SAR ship detection model based on YOLOv8.
J. Supercomput., January, 2025

LRCN: Layer-residual Co-Attention Networks for visual question answering.
Expert Syst. Appl., 2025

Towards bias-aware visual question answering: Rectifying and mitigating comprehension biases.
Expert Syst. Appl., 2025

Efficient multi-party PSI and its application in port management.
Comput. Stand. Interfaces, 2025

A secure data storage and sharing scheme for port supply chain based on blockchain and dynamic searchable encryption.
Comput. Stand. Interfaces, 2025

2024
KTMN: Knowledge-driven Two-stage Modulation Network for visual question answering.
Multim. Syst., December, 2024

Localization in Underwater Acoustic IoT Networks: Dealing With Perturbed Anchors and Stratification.
IEEE Internet Things J., May, 2024

MPCCT: Multimodal vision-language learning paradigm with context-based compact Transformer.
Pattern Recognit., March, 2024

Relational reasoning and adaptive fusion for visual question answering.
Appl. Intell., March, 2024

TS-DP: An Efficient Data Processing Algorithm for Distribution Digital Twin Grid for Industry 5.0.
IEEE Trans. Consumer Electron., February, 2024

Correction to: Multi‑head attention‑based model for reconstructing continuous missing time series data.
J. Supercomput., January, 2024

A novel fuzzy control path planning algorithm for intelligent ship based on scale factors.
J. Supercomput., January, 2024

On Stablecoin: Ecosystem, architecture, mechanism and applicability as payment method.
Comput. Stand. Interfaces, January, 2024

HCVC: A High-Capacity Off-Chain Virtual Channel Scheme Based on Bidirectional Locking Mechanism.
IEEE Trans. Netw. Sci. Eng., 2024

SAR-LtYOLOv8: A Lightweight YOLOv8 Model for Small Object Detection in SAR Ship Images.
Comput. Syst. Sci. Eng., 2024

FastPFM: a multi-scale ship detection algorithm for complex scenes based on SAR images.
Connect. Sci., 2024

BLSAE-SNIDS: A Bi-LSTM sparse autoencoder framework for satellite network intrusion detection.
Comput. Sci. Inf. Syst., 2024

Medical record information storage scheme based on blockchain and attribute role-based access control.
Comput. Sci. Inf. Syst., 2024

GPAN-PS: Global-Response Pedestrian Attention Network for End-to-End Person Search.
IEEE Access, 2024

YOLOv8-FDF: A Small Target Detection Algorithm in Complex Scenes.
IEEE Access, 2024

2023
Multi-head attention-based model for reconstructing continuous missing time series data.
J. Supercomput., December, 2023

LMCA: a lightweight anomaly network traffic detection model integrating adjusted mobilenet and coordinate attention mechanism for IoT.
Telecommun. Syst., December, 2023

NAS-YOLOX: a SAR ship detection using neural architecture search and multi-scale attention.
Connect. Sci., December, 2023

A multimodal hybrid parallel network intrusion detection model.
Connect. Sci., December, 2023

Multi-modal co-attention relation networks for visual question answering.
Vis. Comput., November, 2023

Blockchain-assisted secure message authentication with reputation management for VANETs.
J. Supercomput., November, 2023

MedRSS: A blockchain-based scheme for secure storage and sharing of medical records.
Comput. Ind. Eng., September, 2023

IdenMultiSig: Identity-Based Decentralized Multi-Signature in Internet of Things.
IEEE Trans. Comput. Soc. Syst., August, 2023

CTDM: cryptocurrency abnormal transaction detection method with spatio-temporal and global representation.
Soft Comput., August, 2023

Local self-attention in transformer for visual question answering.
Appl. Intell., July, 2023

A Visual Question Answering Network Merging High- and Low-Level Semantic Information.
IEICE Trans. Inf. Syst., May, 2023

A novel system for medical equipment supply chain traceability based on alliance chain and attribute and role access control.
Future Gener. Comput. Syst., May, 2023

A Feedback Semi-Supervised Learning With Meta-Gradient for Intrusion Detection.
IEEE Syst. J., March, 2023

A Video Target Tracking and Correction Model with Blockchain and Robust Feature Location.
Sensors, March, 2023

A blockchain-based secure storage and access control scheme for supply chain finance.
J. Supercomput., 2023

CLVIN: Complete language-vision interaction network for visual question answering.
Knowl. Based Syst., 2023

A Sparse Sensor Placement Strategy Based on Information Entropy and Data Reconstruction for Ocean Monitoring.
IEEE Internet Things J., 2023

An evolutive framework for server placement optimization to digital twin networks.
Int. J. Commun. Syst., 2023

Intrusion detection model of internet of things based on deep learning.
Comput. Sci. Inf. Syst., 2023

RESNETCNN: An abnormal network traffic flows detection model.
Comput. Sci. Inf. Syst., 2023

Sparse co-attention visual question answering networks based on thresholds.
Appl. Intell., 2023

Telematics Communication Based on Blockchain Technology.
Proceedings of the 8th IEEE International Conference on Smart Cloud, 2023

A method combining improved Mahalanobis distance and adversarial autoencoder to detect abnormal network traffic.
Proceedings of the International Database Engineered Applications Symposium Conference, 2023

IFLV: Wireless network intrusion detection model integrating FCN, LSTM, and ViT.
Proceedings of the 10th IEEE International Conference on Cyber Security and Cloud Computing, 2023

A Blockchain-empowered Federated Learning Framework Supprting GDPR-compliance.
Proceedings of the 10th IEEE International Conference on Cyber Security and Cloud Computing, 2023

NAS-YOLOX: ship detection based on improved YOLOX for SAR imagery.
Proceedings of the 10th IEEE International Conference on Cyber Security and Cloud Computing, 2023

A Computationally Efficient Target Localization Algorithm in Underwater Wireless Sensor Networks.
Proceedings of the 8th International Conference on Computer and Communication Systems, 2023

Efficient and Secure Multi-Party Private Set Operation Protocol Suitable for IoT Devices.
Proceedings of the 2023 International Conference on Artificial Intelligence, 2023

2022
An Evolutionary-Based Approach for Low-Complexity Intrusion Detection in Wireless Sensor Networks.
Wirel. Pers. Commun., 2022

Range Difference-Based Target Localization Under Stratification Effect and NLOS Bias in UWSNs.
IEEE Wirel. Commun. Lett., 2022

An reinforcement learning-based speech censorship chatbot system.
J. Supercomput., 2022

A Hybrid Model Integrating MPSE and IGNN for Events Recognition Along Submarine Cables.
IEEE Trans. Instrum. Meas., 2022

A Blockchain-Based Auditable Access Control System for Private Data in Service-Centric IoT Environments.
IEEE Trans. Ind. Informatics, 2022

A localization algorithm for DV-Hop wireless sensor networks based on manhattan distance.
Telecommun. Syst., 2022

A novel secure DV-Hop localization algorithm against wormhole attacks.
Telecommun. Syst., 2022

A Traceable and Revocable Ciphertext-Policy Attribute-based Encryption Scheme Based on Privacy Protection.
IEEE Trans. Dependable Secur. Comput., 2022

Blockchain for federated learning toward secure distributed machine learning systems: a systemic survey.
Soft Comput., 2022

Trajectory Optimization of Autonomous Surface Vehicles with Outliers for Underwater Target Localization.
Remote. Sens., 2022

CAAN: Context-Aware attention network for visual question answering.
Pattern Recognit., 2022

A Privacy-Preserving Storage Scheme for Logistics Data With Assistance of Blockchain.
IEEE Internet Things J., 2022

Dual Self-Guided Attention with Sparse Question Networks for Visual Question Answering.
IEICE Trans. Inf. Syst., 2022

A blockchain-based secure storage scheme for medical information.
EURASIP J. Wirel. Commun. Netw., 2022

Network abnormal traffic detection method based on fusion of chord similarity and multiple loss encoder.
EURASIP J. Wirel. Commun. Netw., 2022

MFVT: an anomaly traffic detection method merging feature fusion network and vision transformer architecture.
EURASIP J. Wirel. Commun. Netw., 2022

ABOS: an attention-based one-stage framework for person search.
EURASIP J. Wirel. Commun. Netw., 2022

MOOCsChain: A blockchain-based secure storage and sharing scheme for MOOCs learning.
Comput. Stand. Interfaces, 2022

A Reinforcement Learning-based Offensive semantics Censorship System for Chatbots.
CoRR, 2022

The abnormal traffic detection scheme based on PCA and SSH.
Connect. Sci., 2022

A Hybrid parallel deep learning model for efficient intrusion detection based on metric learning.
Connect. Sci., 2022

A consortium blockchain-based information management system for unmanned vehicle logistics.
Comput. Sci. Inf. Syst., 2022

RICNN: A ResNet&Inception convolutional neural network for intrusion detection of abnormal traffic.
Comput. Sci. Inf. Syst., 2022

Fabric-GC: A Blockchain-based Gantt chart system for cross-organizational project management.
Comput. Sci. Inf. Syst., 2022

Modeling and analysis of port supply chain system based on Fabric blockchain.
Comput. Ind. Eng., 2022

Adaptive Cross Component Linear Model for Chroma Intra-Prediction in VVC.
Proceedings of the ICCBN 2022: 10th International Conference on Communications and Broadband Networking, Shanghai, China, February 25, 2022

2021
A two-stage intrusion detection approach for software-defined IoT networks.
Soft Comput., 2021

Cross-modality co-attention networks for visual question answering.
Soft Comput., 2021

A Privacy-Preserving Charging Scheme for Electric Vehicles Using Blockchain and Fog Computing.
IEEE Syst. J., 2021

A Novel Time-Aware Hybrid Recommendation Scheme Combining User Feedback and Collaborative Filtering.
IEEE Syst. J., 2021

Three-Dimensional Localization Algorithm Based on Improved A* and DV-Hop Algorithms in Wireless Sensor Network.
Sensors, 2021

Design and Implementation of an Anomaly Network Traffic Detection Model Integrating Temporal and Spatial Features.
Secur. Commun. Networks, 2021

RDMMFET: Representation of Dense Multimodality Fusion Encoder Based on Transformer.
Mob. Inf. Syst., 2021

Logisticschain: A Blockchain-Based Secure Storage Scheme for Logistics Data.
Mob. Inf. Syst., 2021

Behavior analysis and blockchain based trust management in VANETs.
J. Parallel Distributed Comput., 2021

A novel Byzantine fault tolerance consensus for Green IoT with intelligence based on reinforcement.
J. Inf. Secur. Appl., 2021

K maximum probability attack paths generation algorithm for target nodes in networked systems.
Int. J. Inf. Sec., 2021

A multi-objective distance vector-hop localization algorithm based on differential evolution quantum particle swarm optimization.
Int. J. Commun. Syst., 2021

A time-aware hybrid recommendation scheme combining content-based and collaborative filtering.
Frontiers Comput. Sci., 2021

Fabric-SCF: A Blockchain-based Secure Storage and Access Control Scheme for Supply Chain Finance.
CoRR, 2021

A lightweight authentication scheme for telecare medical information system.
Connect. Sci., 2021

Multi-Keyword ranked search based on mapping set matching in cloud ciphertext storage system.
Connect. Sci., 2021

CASH: correlation-aware scheduling to mitigate soft error impact on heterogeneous multicores.
Connect. Sci., 2021

Multimodal encoders and decoders with gate attention for visual question answering.
Comput. Sci. Inf. Syst., 2021

Double-layer affective visual question answering network.
Comput. Sci. Inf. Syst., 2021

A hierarchical network intrusion detection model based on unsupervised clustering.
Proceedings of the MEDES '21: Proceedings of the 13th International Conference on Management of Digital EcoSystems, Virtual Event, Tunisia, November 1, 2021

Non-interactive Zero Knowledge Proof Based Access Control in Information-Centric Internet of Things.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021

2020
ARFV: An Efficient Shared Data Auditing Scheme Supporting Revocation for Fog-Assisted Vehicular Ad-Hoc Networks.
IEEE Trans. Veh. Technol., 2020

ODDS: Optimizing Data-Locality Access for Scientific Data Analysis.
IEEE Trans. Cloud Comput., 2020

Wireless sensor network intrusion detection system based on MK-ELM.
Soft Comput., 2020

On one-time cookies protocol based on one-time password.
Soft Comput., 2020

An Efficient Two-Factor Authentication Scheme Based on the Merkle Tree.
Sensors, 2020

An Effective Dense Co-Attention Networks for Visual Question Answering.
Sensors, 2020

Enhancing the Sensor Node Localization Algorithm Based on Improved DV-Hop and DE Algorithms in Wireless Sensor Networks.
Sensors, 2020

Multi-Modal Explicit Sparse Attention Networks for Visual Question Answering.
Sensors, 2020

Research and Software Design of an Φ-OTDR-Based Optical Fiber Vibration Recognition Algorithm.
J. Electr. Comput. Eng., 2020

Design of network intrusion detection system based on parallel DPC clustering algorithm.
Int. J. Embed. Syst., 2020

Intrusion detection of wireless sensor networks based on IPSO algorithm and BP neural network.
Int. J. Comput. Sci. Eng., 2020

Mitigating multi-cell upsets impacts on approximate network on chip through unequal message protection.
IEICE Electron. Express, 2020

A K-means algorithm based on characteristics of density applied to network intrusion detection.
Comput. Sci. Inf. Syst., 2020

An intrusion detection approach based on improved deep belief network.
Appl. Intell., 2020

A Secure Framework for Data Sharing in Private Blockchain-Based WBANs.
IEEE Access, 2020

A Low Resource Consumption Clone Detection Method for Multi-Base Station Wireless Sensor Networks.
IEEE Access, 2020

Fabric-iot: A Blockchain-Based Access Control System in IoT.
IEEE Access, 2020

Multimodal Encoder-Decoder Attention Networks for Visual Question Answering.
IEEE Access, 2020

Reinforcement-Based Robust Variable Pitch Control of Wind Turbines.
IEEE Access, 2020

Robust Adaptive Control of Maximum Power Point Tracking for Wind Power System.
IEEE Access, 2020

Fabric-Chain & Chain: A Blockchain-Based Electronic Document System for Supply Chain Finance.
Proceedings of the Blockchain and Trustworthy Systems - Second International Conference, 2020

Blockchain Based Trust Management in Vehicular Networks.
Proceedings of the Blockchain and Trustworthy Systems - Second International Conference, 2020

2019
A Correlation-Aware Page-Level FTL to Exploit Semantic Links in Workloads.
IEEE Trans. Parallel Distributed Syst., 2019

Improving the performance of feature selection and data clustering with novel global search and elite-guided artificial bee colony algorithm.
J. Supercomput., 2019

An Efficient and Safe Road Condition Monitoring Authentication Scheme Based on Fog Computing.
IEEE Internet Things J., 2019

DDoS attack detection based on global unbiased search strategy bee colony algorithm and artificial neural network.
Int. J. Embed. Syst., 2019

Design and application of real-time network abnormal traffic detection system based on Spark Streaming.
Int. J. Embed. Syst., 2019

Design of DDoS attack detection system based on intelligent bee colony algorithm.
Int. J. Comput. Sci. Eng., 2019

LWE-based multi-authority attribute-based encryption scheme with hidden policies.
Int. J. Comput. Sci. Eng., 2019

Privacy-preserving multi-authority attribute-based encryption with dynamic policy updating in PHR.
Comput. Sci. Inf. Syst., 2019

Hierarchical authority based weighted attribute encryption scheme.
Comput. Sci. Inf. Syst., 2019

Design of intrusion detection system based on improved ABC_elite and BP neural networks.
Comput. Sci. Inf. Syst., 2019

EduRSS: A Blockchain-Based Educational Records Secure Storage and Sharing Scheme.
IEEE Access, 2019

Panoramic image mosaic technology based on SIFT algorithm in power monitoring.
Proceedings of the 6th International Conference on Systems and Informatics, 2019

2018
A new rule-based power-aware job scheduler for supercomputers.
J. Supercomput., 2018

G-SD: Achieving Fast Reverse Lookup using Scalable Declustering Layout in Large-Scale File Systems.
IEEE Trans. Cloud Comput., 2018

Achieving Load Balance for Parallel Data Access on Distributed File Systems.
IEEE Trans. Computers, 2018

Speed Up Big Data Analytics by Unveiling the Storage Distribution of Sub-Datasets.
IEEE Trans. Big Data, 2018

基于智能蜂群算法的DDoS攻击检测系统 (DDoS Attack Detection System Based on Intelligent Bee Colony Algorithm).
计算机科学, 2018

A place-aware redundancy methodology for multi-cell upsets mitigation in NoC.
IEICE Electron. Express, 2018

A virtual filter based fast assessment methodology for fault tolerant NoCs.
IEICE Electron. Express, 2018

Towards Studying the Two-Tier Intra-Frequency X2 Handover Based on Software-Defined Open LTE Platform.
IEEE Access, 2018

A Novel Packets Transmission Scheme Based on Software Defined Open Wireless Platform.
IEEE Access, 2018

A Fast Global AVF Calculation Methodology for Multi-core Reliability Assessment.
Proceedings of the Parallel and Distributed Computing, 2018

Performance Evaluation and Analysis for MPI-Based Data Movement in Virtual Switch Network.
Proceedings of the 2018 IEEE International Conference on Networking, 2018

Exploiting critical factors for higher education course construction of teaching in a second language: case study of 'computer architecture'.
Proceedings of the 10th International Conference on Education Technology and Computers, 2018

2017
Fuzzy-Logic Based Distributed Energy-Efficient Clustering Algorithm for Wireless Sensor Networks.
Sensors, 2017

Deister: A light-weight autonomous block management in data-intensive file systems using deterministic declustering distribution.
J. Parallel Distributed Comput., 2017

DANCER: The routing algorithm in delay tolerant networks based on dynamic and polymorphic combination of dimensions and energy consideration.
Int. J. Distributed Sens. Networks, 2017

A DDoS attack detection system based on spark framework.
Comput. Sci. Inf. Syst., 2017

An improved artificial bee colony algorithm with elite-guided search equations.
Comput. Sci. Inf. Syst., 2017

2016
Routing Algorithm with Uneven Clustering for Energy Heterogeneous Wireless Sensor Networks.
J. Sensors, 2016

An anomaly detection on the application-layer-based QoS in the cloud storage system.
Comput. Sci. Inf. Syst., 2016

K maximum probability attack paths dynamic generation algorithm.
Comput. Sci. Inf. Syst., 2016

Taming Big Data Scheduling with Locality-Aware Scheduling.
Proceedings of the International Conference on Advanced Cloud and Big Data, 2016

Survey of data intensive computing technologies application to to security log data management.
Proceedings of the 3rd IEEE/ACM International Conference on Big Data Computing, 2016

2015
On the Cooling of Energy Efficient Storage.
Proceedings of the 10th IEEE International Conference on Networking, 2015

Achieving up to zero communication delay in BSP-based graph processing via vertex categorization.
Proceedings of the 10th IEEE International Conference on Networking, 2015

2009
Fast Algorithm of the ML Estimator for Passive Synthetic Arrays.
Proceedings of the Sixth International Conference on Fuzzy Systems and Knowledge Discovery, 2009

2004
iNASC: A iSCSI-Based NAS Storage Cluster.
Proceedings of the Grid and Cooperative Computing, 2004

Research on Security of the United Storage Network.
Proceedings of the Grid and Cooperative Computing, 2004


  Loading...