Fanzhi Meng

Orcid: 0000-0003-3018-5491

According to our database1, Fanzhi Meng authored at least 14 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Optimization of Internet of Things Remote Desktop Protocol for Low-Bandwidth Environments Using Convolutional Neural Networks.
Sensors, February, 2024

Data-Driven-Based Distributed Fuzzy Tracking Control for Nonlinear MASs Under DoS Attacks.
IEEE Trans. Fuzzy Syst., January, 2024

2023
Branchy-TEE: Deep Learning Security Inference Acceleration Using Trusted Execution Environment.
Proceedings of the 35th International Conference on Software Engineering and Knowledge Engineering, 2023

Adaptive CNN-Based Image Compression Model for Improved Remote Desktop Experience.
Proceedings of the Neural Information Processing - 30th International Conference, 2023

2022
A Resilient Economic Dispatch Method for Power Grid under DoS Attacks.
Proceedings of the IECON 2022, 2022

2021
GRU and Multi-autoencoder based Insider Threat Detection for Cyber Security.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

2020
Deep Learning Based Multi-Channel Intelligent Attack Detection for Data Security.
IEEE Trans. Sustain. Comput., 2020

CovLets: A Second-Order Descriptor for Modeling Multiple Features.
ACM Trans. Multim. Comput. Commun. Appl., 2020

XWM: a high-speed matching algorithm for large-scale URL rules in wireless surveillance applications.
Multim. Tools Appl., 2020

2019
Brain Image Segmentation Based on FCM Clustering Algorithm and Rough Set.
IEEE Access, 2019

2018
A network threat analysis method combined with kernel PCA and LSTM-RNN.
Proceedings of the Tenth International Conference on Advanced Computational Intelligence, 2018

Deep Learning Based Attribute Classification Insider Threat Detection for Data Security.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

2015
Wireless Protocol Secure Injection Testing Method Based on Time Selection.
Proceedings of the Third International Conference on Robot, Vision and Signal Processing, 2015

2010
Energy-efficient and coverage-specific node scheduling for wireless sensor networks.
Proceedings of the 13th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2010


  Loading...