Fengli Zhang

Orcid: 0000-0003-2300-8817

According to our database1, Fengli Zhang authored at least 100 papers between 2002 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
LsiA3CS: Deep-Reinforcement-Learning-Based Cloud-Edge Collaborative Task Scheduling in Large-Scale IIoT.
IEEE Internet Things J., July, 2024

Rice Height Estimation with Multi-Baseline PolInSAR Data and Optimal Detection Baseline Combination Analysis.
Remote. Sens., January, 2024

CESA: Communication efficient secure aggregation scheme via sparse graph in federated learning.
J. Netw. Comput. Appl., 2024

Federated semi-supervised learning with tolerant guidance and powerful classifier in edge scenarios.
Inf. Sci., 2024

2023
Efficient Architecture Search for Continual Learning.
IEEE Trans. Neural Networks Learn. Syst., November, 2023

Preliminary Evaluation of Geometric Positioning Accuracy of C-SAR Images Based on Automatic Corner Reflectors.
Remote. Sens., October, 2023

The Detection of Green Tide Biomass by Remote Sensing Images and In Situ Measurement in the Yellow Sea of China.
Remote. Sens., July, 2023

Integrated deep learning paradigm for document-based sentiment analysis.
J. King Saud Univ. Comput. Inf. Sci., July, 2023

Adversarial Human Trajectory Learning for Trip Recommendation.
IEEE Trans. Neural Networks Learn. Syst., April, 2023

Automatic Registration of Homogeneous and Cross-Source TomoSAR Point Clouds in Urban Areas.
Sensors, January, 2023

Quick Quality Assessment and Radiometric Calibration of C-SAR/01 Satellite Using Flexible Automatic Corner Reflector.
Remote. Sens., January, 2023

Analysis of Interpolation Methods in the Validation of Backscattering Coefficient Products.
Sensors, 2023

Detection and Localization of Data Forgery Attacks in Automatic Generation Control.
IEEE Access, 2023

VECCTO: An Collaborative Task Offloading Framework for UAV-Assisted Vehicular Edge Clusters.
Proceedings of the 4th International Conference on Computer Engineering and Intelligent Control, 2023

2022
Virtual Sensing for Online Fault Diagnosis of Heat Exchangers.
IEEE Trans. Instrum. Meas., 2022

A Lightweight YOLOv5-MNE Algorithm for SAR Ship Detection.
Sensors, 2022

Airborne SAR Radiometric Calibration Based on Improved Sliding Window Integral Method.
Sensors, 2022

Towards bitcoin transaction anonymity with recurrent attack prevention.
Int. J. Syst. Assur. Eng. Manag., 2022

Mobility and Trajectory-Based Technique for Monitoring Asymptomatic Patients.
J. Inf. Technol. Res., 2022

Multivariable time series forecasting using model fusion.
Inf. Sci., 2022

Variational cold-start resistant recommendation.
Inf. Sci., 2022

Social-trust-aware variational recommendation.
Int. J. Intell. Syst., 2022

Multi-scale graph capsule with influence attention for information cascades prediction.
Int. J. Intell. Syst., 2022

Recommendation via Collaborative Diffusion Generative Model.
Proceedings of the Knowledge Science, Engineering and Management, 2022

Assessing Buildings Damage from Multi-Temporal Sar Images Fusion using Semantic Change Detection.
Proceedings of the IEEE International Geoscience and Remote Sensing Symposium, 2022

2021
Anonymising group data sharing in opportunistic mobile social networks.
Wirel. Networks, 2021

Catch me if you can: A participant-level rumor detection framework via fine-grained user representation learning.
Inf. Process. Manag., 2021

Modeling microscopic and macroscopic information diffusion for rumor detection.
Int. J. Intell. Syst., 2021

2020
Analysis of Combining SAR and Optical Optimal Parameters to Classify Typhoon-Invasion Lodged Rice: A Case Study Using the Random Forest Method.
Sensors, 2020

Ensemble sparse supervised model for bearing fault diagnosis in smart manufacturing.
Robotics Comput. Integr. Manuf., 2020

EDDAMAP: efficient data-dependent approach for monitoring asymptomatic patient.
BMC Medical Informatics Decis. Mak., 2020

An integrated supplier selection approach incorporating decision maker's risk attitude using ANN, AHP and TOPSIS methods.
Kybernetes, 2020

A Distributed Density-based Outlier Detection Algorithm on Big Data.
Int. J. Netw. Secur., 2020

Adversarial Mobility Learning for Human Trajectory Classification.
IEEE Access, 2020

Evaluation of α_s1 for Building Damage Mapping based on Touzi Decomposition.
Proceedings of the IEEE International Geoscience and Remote Sensing Symposium, 2020

Adversity-based Social Circles Inference via Context-Aware Mobility.
Proceedings of the IEEE Global Communications Conference, 2020

Dynamic Risk-Aware Patch Scheduling.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

A Machine Learning-based Approach for Automated Vulnerability Remediation Analysis.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

2019
Privacy Preservation for eHealth Big Data in Cloud Accessed Using Resource-Constrained Devices: Survey.
Int. J. Netw. Secur., 2019

Predicting Human Mobility via Variational Attention.
Proceedings of the World Wide Web Conference, 2019

Information Cascades Modeling via Deep Multi-Task Learning.
Proceedings of the 42nd International ACM SIGIR Conference on Research and Development in Information Retrieval, 2019

Information Diffusion Prediction via Recurrent Cascades Convolution.
Proceedings of the 35th IEEE International Conference on Data Engineering, 2019

DeepTrip: Adversarially Understanding Human Mobility for Trip Recommendation.
Proceedings of the 27th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, 2019

2018
<i>R</i><sup>3</sup>: Reliable Over-the-Air Reprogramming on Computational RFIDs.
ACM Trans. Embed. Comput. Syst., 2018

Secure Cloudlet-based eHealth Big Data System with Fine-Grained Access Control and Outsourcing Decryption from ABE.
Int. J. Netw. Secur., 2018

Trajectory-User Linking via Variational AutoEncoder.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

Trajectory-based social circle inference.
Proceedings of the 26th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, 2018

2017
Flooding attacks against secure time-critical communications in the power grid.
Proceedings of the 2017 IEEE International Conference on Smart Grid Communications, 2017

Identifying Human Mobility via Trajectory Embeddings.
Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, 2017

A Mathematical Model for a Hybrid System Framework for Privacy Preservation of Patient Health Records.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

Deep learning-based data forgery detection in automatic generation control.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

Association Rules Mining with Quantum Computing and Quantum Storage.
Proceedings of the 3rd International Conference on Big Data Computing and Communications, 2017

2016
A noise immunity controlled quantum teleportation protocol.
Quantum Inf. Process., 2016

零知识下的比特流未知协议分类模型 (Unknown Bit-stream Protocol Classification Model with Zero-knowledge).
计算机科学, 2016

Aerodynamic roughness retrieval from polarimetric ALOS-2 data in urban areas.
Proceedings of the 2016 IEEE International Geoscience and Remote Sensing Symposium, 2016

Rice phenology retrieval automatically using polarimetric SAR.
Proceedings of the 2016 IEEE International Geoscience and Remote Sensing Symposium, 2016

A Dynamic Access Control Model for Spatial Data.
Proceedings of the 12th International Conference on Computational Intelligence and Security, 2016

2015
Quantum information splitting of arbitrary two-qubit state by using four-qubit cluster state and Bell-state.
Quantum Inf. Process., 2015

A Fully Secure Attribute Based Broadcast Encryption Scheme.
Int. J. Netw. Secur., 2015

A vote-based intrusion-tolerance algorithm for network latency estimation.
Int. J. Comput. Appl. Technol., 2015

Distance-bounding trust protocol in anonymous radio-frequency identification systems.
Concurr. Comput. Pract. Exp., 2015

Community Detection Based on Links and Node Features in Social Networks.
Proceedings of the MultiMedia Modeling - 21st International Conference, 2015

ARM-Based Privacy Preserving for Medical Data Publishing.
Proceedings of the Cloud Computing and Security - First International Conference, 2015

Unknown Bit Stream Protocol Message Discovery with Zero Knowledge.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

2014
Rumor Riding: An Anonymity Approach for Decentralized Peer to Peer Systems.
Wirel. Pers. Commun., 2014

Dummy Based Privacy Preservation in Continuous Querying Road Network Services.
Proceedings of the 2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2014

Achieving Absolute Privacy Preservation in Continuous Query Road Network Services.
Proceedings of the Advanced Data Mining and Applications - 10th International Conference, 2014

2013
Broadcast revocation scheme in composite-order bilinear group and its application to attribute-based encryption.
Int. J. Secur. Networks, 2013

An Expressive Decentralizing KP-ABE Scheme with Constant-Size Ciphertext.
Int. J. Netw. Secur., 2013

An Effective Feature Selection Approach for Network Intrusion Detection.
Proceedings of the IEEE Eighth International Conference on Networking, 2013

Optimizing Placement of Mix Zones to Preserve Users' Privacy for Continuous Query Services in Road Networks.
Proceedings of the Advanced Data Mining and Applications - 9th International Conference, 2013

2012
S-band backscattering analysis of wheat using tower-based scatterometer.
Proceedings of the 2012 IEEE International Geoscience and Remote Sensing Symposium, 2012

The discrepancies caused by different cluster merging algorithms in fully polarimetric SAR classification.
Proceedings of the 2012 IEEE International Geoscience and Remote Sensing Symposium, 2012

Rice scattering mechanism analysis and classification using polarimetric RADARSAT-2.
Proceedings of the 2012 IEEE International Geoscience and Remote Sensing Symposium, 2012

Efficient Revocable Key-Policy Attribute Based Encryption with Full Security.
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012

2011
Building L-shape footprint extraction from high resolution SAR image.
Proceedings of the Joint Urban Remote Sensing Event, 2011

Dual-aspect geometric and radiometric terrain correction method for high-resolution SAR data.
Proceedings of the 2011 IEEE International Geoscience and Remote Sensing Symposium, 2011

Building footprint extraction by fusing dual-aspect SAR images.
Proceedings of the 2011 IEEE International Geoscience and Remote Sensing Symposium, 2011

Subsurface targets detection with Shannon entropy.
Proceedings of the 2011 IEEE International Geoscience and Remote Sensing Symposium, 2011

Forest mapping using multi-temporal polarimetric SAR data in southwest China.
Proceedings of the 2011 IEEE International Geoscience and Remote Sensing Symposium, 2011

2010
Interpretation of buildings in high resolution sar images based on electromagnetic method.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2010

Microwave remote sensing for marine monitoring: An example of Enteromorpha prolifera bloom monitoring.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2010

Building extraction using dual-aspect high resolution SAR images.
Proceedings of the 18th International Conference on Geoinformatics: GIScience in Change, 2010

Multitemporal polarimetric SAR data fusion for land cover mapping.
Proceedings of the 18th International Conference on Geoinformatics: GIScience in Change, 2010

Ortho-rectification of high-resolution SAR image in mountain area by DEM.
Proceedings of the 18th International Conference on Geoinformatics: GIScience in Change, 2010

2009
Temporal Variation of Simulated Rice Backscattering of S-band HJ-1 SAR.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2009

Forest Type Discrimination using Polarimetric Radarsat 2 Data.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2009

Karst Forest Type Discrimination in Southwest China using Spaceborne Polarimetric SAR Data.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2009

Fast Extracting and Change Detection of Dammed Lakes using Highresolution SAR Images: A Case Study of Tangjiashan Dammed Lake.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2009

Microwave Scattering Behaviour Analysis of Typical Targets with SAR Image.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2009

Study on the Influence of Drought to Crop Growth based on SAR Remote Sensing.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2009

2008
Impulsive control of Lurie systems.
Comput. Math. Appl., 2008

Oil Spill Identification based on Textural Information of SAR Image.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2008

Polarimetric SAR Data for Forest and Deforestation Mapping in Guizhou Province, Southwest of China.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2008

Oil spill monitoring using multi-temporal SAR and microwave scatterometer data.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2008

2004
Query and Trigger of Moving Objects in WebGIS Environment.
Proceedings of the 2004 International Conference on Computer and Information Technology (CIT 2004), 2004

2002
Managing Uncertain Trajectories of Moving Objects with Domino.
Proceedings of the ICEIS 2002, 2002

Management of Dynamic Location Information in DOMINO.
Proceedings of the Advances in Database Technology, 2002

The Geometry of Uncertainty in Moving Objects Databases.
Proceedings of the Advances in Database Technology, 2002

Spatial Temporal Queries and Triggers for Managing Moving Objects.
Proceedings of the Advances in Databases and Information Systems, 2002


  Loading...