Hongli Zhang
Orcid: 0000-0002-8167-7106Affiliations:
- Harbin Institute of Technology, Computer Science and Technology Department, China (PhD 1999)
According to our database1,
Hongli Zhang
authored at least 215 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Mach. Learn., September, 2024
UCTT: universal and low-cost adversarial example generation for tendency classification.
Neural Comput. Appl., August, 2024
Impulse Noise Image Restoration Using Nonconvex Variational Model and Difference of Convex Functions Algorithm.
IEEE Trans. Cybern., April, 2024
A Practical Adversarial Attack Against Sequence-Based Deep Learning Malware Classifiers.
IEEE Trans. Computers, March, 2024
An efficient cheating-detectable secret image sharing scheme with smaller share sizes.
J. Inf. Secur. Appl., 2024
Exploring trajectory embedding via spatial-temporal propagation for dynamic region representations.
Inf. Sci., 2024
Reinforcement-Based Denoising for Crowdsourcing Named Entity Recognition in Social Networks.
Proceedings of the IEEE International Conference on Communications, 2024
Proceedings of the IEEE International Conference on Communications, 2024
2023
An Adversarial Robust Behavior Sequence Anomaly Detection Approach Based on Critical Behavior Unit Learning.
IEEE Trans. Computers, November, 2023
CNN-Transformer Based Generative Adversarial Network for Copy-Move Source/ Target Distinguishment.
IEEE Trans. Circuits Syst. Video Technol., May, 2023
IEEE/ACM Trans. Netw., April, 2023
Multi-label classification of legal text based on label embedding and capsule network.
Appl. Intell., March, 2023
ErrHunter: Detecting Error-Handling Bugs in the Linux Kernel Through Systematic Static Analysis.
IEEE Trans. Software Eng., February, 2023
IEEE Trans. Serv. Comput., 2023
IEEE Trans. Multim., 2023
IEEE Trans. Dependable Secur. Comput., 2023
Securing Operating Systems Through Fine-Grained Kernel Access Limitation for IoT Systems.
IEEE Internet Things J., 2023
Beyond Individuals: Modeling Mutual and Multiple Interactions for Inductive Link Prediction between Groups.
Proceedings of the Sixteenth ACM International Conference on Web Search and Data Mining, 2023
Comparative Performance Analysis of Lightweight BERT-derived Models for Cybersecurity Corpus in Cloud Networks.
Proceedings of the 12th IEEE International Conference on Cloud Networking, 2023
2022
Secure Task Offloading in Blockchain-Enabled Mobile Edge Computing With Deep Reinforcement Learning.
IEEE Trans. Netw. Serv. Manag., December, 2022
Efficient and Privacy-Preserving Ride Matching Using Exact Road Distance in Online Ride Hailing Services.
IEEE Trans. Serv. Comput., 2022
Toward Physical Layer Security and Efficiency for SAGIN: A WFRFT-Based Parallel Complex-Valued Spectrum Spreading Approach.
IEEE Trans. Intell. Transp. Syst., 2022
IEEE Trans. Circuits Syst. Video Technol., 2022
Reversible Data Hiding for Color Images Based on Adaptive 3D Prediction-Error Expansion and Double Deep Q-Network.
IEEE Trans. Circuits Syst. Video Technol., 2022
Cost-effective CNNs-based prototypical networks for few-shot relation classification across domains.
Knowl. Based Syst., 2022
J. Netw. Comput. Appl., 2022
Proceedings of the IEEE International Conference on Communications, 2022
2021
Wirel. Commun. Mob. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
Sensors, 2021
PGRide: Privacy-Preserving Group Ridesharing Matching in Online Ride Hailing Services.
IEEE Internet Things J., 2021
Expert Syst. Appl., 2021
TenLa: an approach based on controllable tensor decomposition and optimized lasso regression for judgement prediction of legal cases.
Appl. Intell., 2021
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021
A Container-Oriented Virtual-Machine-Introspection-Based Security Monitor to Secure Containers in Cloud Computing.
Proceedings of the Artificial Intelligence and Security - 7th International Conference, 2021
2020
Hail the Closest Driver on Roads: Privacy-Preserving Ride Matching in Online Ride Hailing Services.
Secur. Commun. Networks, 2020
Knowl. Based Syst., 2020
Physical-Layer Authentication for Internet of Things via WFRFT-Based Gaussian Tag Embedding.
IEEE Internet Things J., 2020
Predicting the security threats on the spreading of rumor, false information of Facebook content based on the principle of sociology.
Comput. Commun., 2020
Comput. Networks, 2020
IEEE Access, 2020
TenRR: An Approach Based on Innovative Tensor Decomposition and Optimized Ridge Regression for Judgment Prediction of Legal Cases.
IEEE Access, 2020
Proceedings of the IEEE Symposium on Computers and Communications, 2020
Proceedings of the CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, 2020
2019
Learning Users' Intention of Legal Consultation through Pattern-Oriented Tensor Decomposition with Bi-LSTM.
Wirel. Commun. Mob. Comput., 2019
lpRide: Lightweight and Privacy-Preserving Ride Matching Over Road Networks in Online Ride Hailing Systems.
IEEE Trans. Veh. Technol., 2019
Measuring bandwidth and buffer occupancy to improve the QoE of HTTP adaptive streaming.
Signal Image Video Process., 2019
Erratum: Wang, Y. et al., A Privacy Preserving Scheme for Nearest Neighbor Query. <i>Sensors</i> 2018, <i>18</i>, 2440.
Sensors, 2019
Imbalanced learning based on adaptive weighting and Gaussian function synthesizing with an application on Android malware detection.
Inf. Sci., 2019
Int. J. Distributed Sens. Networks, 2019
Vcash: A Novel Reputation Framework for Identifying Denial of Traffic Service in Internet of Connected Vehicles.
CoRR, 2019
Concurr. Comput. Pract. Exp., 2019
Clust. Comput., 2019
RnRTD: Intelligent Approach Based on the Relationship-Driven Neural Network and Restricted Tensor Decomposition for Multiple Accusation Judgment in Legal Cases.
Comput. Intell. Neurosci., 2019
Appl. Soft Comput., 2019
IEEE Access, 2019
Proceedings of the Smart Computing and Communication - 4th International Conference, 2019
Proceedings of the 31st IEEE International Conference on Tools with Artificial Intelligence, 2019
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Analyzing and Predicting the Popularity of Online Content Using the Weak Ties Theory.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019
Proceedings of the 2019 IEEE Global Communications Conference, 2019
RnnTd: An Approach Based on LSTM and Tensor Decomposition for Classification of Crimes in Legal Cases.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019
2018
Wirel. Commun. Mob. Comput., 2018
IEEE Trans. Cloud Comput., 2018
Checking virtual machine kernel control-flow integrity using a page-level dynamic tracing approach.
Soft Comput., 2018
User-perceived quality aware adaptive streaming of 3D multi-view video plus depth over the internet.
Multim. Tools Appl., 2018
An effective copyright-protected content delivery scheme for P2P file sharing networks.
Int. J. Commun. Syst., 2018
A high-performance virtual machine filesystem monitor in cloud-assisted cognitive IoT.
Future Gener. Comput. Syst., 2018
IEEE Access, 2018
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018
Proceedings of the 2018 International Conference on Computing, 2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
BPDS: A Blockchain Based Privacy-Preserving Data Sharing for Electronic Medical Records.
Proceedings of the IEEE Global Communications Conference, 2018
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018
OFC: An Approach for Protecting Location Privacy from Location Provider in Location-Based Services.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018
2017
Inf. Sci., 2017
Proceedings of the IEEE International Conference on Communications, 2017
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017
2016
Wirel. Commun. Mob. Comput., 2016
Wirel. Commun. Mob. Comput., 2016
IEICE Trans. Inf. Syst., 2016
IEICE Trans. Inf. Syst., 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the Social Computing, 2016
Proceedings of the 2016 IEEE International Conference on Communications, 2016
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016
A Fast and High Quality Approach for Overlapping Community Detection through Minimizing Conductance.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016
2015
IEEE Trans. Veh. Technol., 2015
Secur. Commun. Networks, 2015
IEEE Netw., 2015
Proceedings of the 2015 IEEE Symposium on Service-Oriented System Engineering, 2015
Proceedings of the 2015 IEEE Symposium on Service-Oriented System Engineering, 2015
Proceedings of the Intelligent Computation in Big Data Era, 2015
Proceedings of the International Conference on Computing, Networking and Communications, 2015
Audit meets game theory: Verifying reliable execution of SLA for compute-intensive program in cloud.
Proceedings of the 2015 IEEE International Conference on Communications, 2015
Proceedings of the 2015 IEEE International Conference on Communications, 2015
Proceedings of the 2015 IEEE International Conference on Communications, 2015
Proceedings of the 2015 IEEE International Conference on Communications, 2015
Proceedings of the 2015 IEEE International Conference on Communications, 2015
Proceedings of the 2015 IEEE International Conference on Communications, 2015
Proceedings of the 2015 IEEE International Conference on Communications, 2015
Proceedings of the 2015 IEEE Global Communications Conference, 2015
2014
Designing robust routing protocols to protect base stations in wireless sensor networks.
Wirel. Commun. Mob. Comput., 2014
Secur. Commun. Networks, 2014
J. Networks, 2014
Inf. Sci., 2014
Proceedings of the IEEE International Conference on Communications, 2014
Proceedings of the Algorithms and Architectures for Parallel Processing, 2014
Proceedings of the IEEE Global Communications Conference, 2014
Proceedings of the IEEE Global Communications Conference, 2014
Proceedings of the IEEE Global Communications Conference, 2014
Proceedings of the Web Technologies and Applications, 2014
Proceedings of the Web Technologies and Applications, 2014
Proceedings of the 1st International Conference on Information-Centric Networking, 2014
2013
IEEE J. Sel. Areas Commun., 2013
IEEE J. Sel. Areas Commun., 2013
Int. J. Data Min. Bioinform., 2013
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
Proceedings of the Intelligent Computing Theories - 9th International Conference, 2013
Proceedings of IEEE International Conference on Communications, 2013
Proceedings of the 2013 IEEE Global Communications Conference, 2013
Proceedings of the 2013 IEEE Global Communications Conference, 2013
2012
Sensors, 2012
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012
Improving the QoS of Web Applications across Multiple Virtual Machines in Cloud Computing Environment.
Proceedings of the 26th IEEE International Parallel and Distributed Processing Symposium Workshops & PhD Forum, 2012
Proceedings of the 18th IEEE International Conference on Parallel and Distributed Systems, 2012
Comparison and Analysis of Flow Features at the Packet Level for Traffic Classification.
Proceedings of the 2012 International Conference on Connected Vehicles and Expo, 2012
Proceedings of IEEE International Conference on Communications, 2012
Proceedings of IEEE International Conference on Communications, 2012
Proceedings of the 2012 IEEE Global Communications Conference, 2012
Proceedings of the 2012 IEEE Global Communications Conference, 2012
An efficient and sustainable self-healing protocol for Unattended Wireless Sensor Networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012
Proceedings of the 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2012
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012
2011
A Framework to Quantify the Pitfalls of Using Traceroute in AS-Level Topology Measurement.
IEEE J. Sel. Areas Commun., 2011
Proceedings of the Global Communications Conference, 2011
Proceedings of the Global Communications Conference, 2011
Proceedings of the Third International Workshop on Cyberspace Safety and Security, 2011
2010
J. Comput., 2010
IEICE Trans. Inf. Syst., 2010
IEICE Trans. Inf. Syst., 2010
Proceedings of the Passive and Active Measurement, 11th International Conference, 2010
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2010
Proceedings of the 18th International Workshop on Quality of Service, 2010
Proceedings of the 16th IEEE International Conference on Parallel and Distributed Systems, 2010
2009
Comput. Commun., 2009
Proceedings of the 17th Euromicro International Conference on Parallel, 2009
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009
Proceedings of the 15th IEEE International Conference on Parallel and Distributed Systems, 2009
Proceedings of the 15th IEEE International Conference on Parallel and Distributed Systems, 2009
Proceedings of the 15th IEEE International Conference on Parallel and Distributed Systems, 2009
2008
T2MC: A Peer-to-Peer Mismatch Reduction Technique by Traceroute and 2-Means Classification Algorithm.
Proceedings of the NETWORKING 2008, Ad Hoc and Sensor Networks, Wireless Networks, 2008
2MC-Match: A topology matching technique with 2-means clustering algorithm in P2P systems.
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), 2008
A High Scalability P2P Simulation Framework with Measured Realistic Network Layer Support.
Proceedings of the 2008 IEEE International Performance, 2008
Proceedings of the International Joint Conference on Neural Networks, 2008
Proceedings of the International Joint Conference on Neural Networks, 2008
Parallel Job Scheduling with Time-varying Constraints for Heterogeneous Multiple-Cluster Systems.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
A Stochastic Game Theoretic Approach to Attack Prediction and Optimal Active Defense Strategy Decision.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008
Proceedings of the Seventh International Conference on Networking (ICN 2008), 2008
Proceedings of the International Conference on Cyberworlds 2008, 2008
2007
A Game Theoretic Method for Decision and Analysis of the Optimal Active Defense Strategy.
Proceedings of the Computational Intelligence and Security, International Conference, 2007
Proceedings of the Computational Intelligence and Security, International Conference, 2007
2006
Defending against distributed denial-of-service attacks with an auction-based method.
Web Intell. Agent Syst., 2006
A Multiobjective Evolutionary Algorithm for Grid Job Scheduling of Multi-QoS Constraints.
J. Comput. Res. Dev., 2006
Clust. Comput., 2006
Multisite co-allocation scheduling algorithms for parallel jobs in computing grid environments.
Sci. China Ser. F Inf. Sci., 2006
Clustering of Network Link Characteristic for Detector Placement of Macroscopical Prewarning.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006
Proceedings of the Frontiers of WWW Research and Development, 2006
2005
A Model for Estimating the Performance of Synchronous Parallel Network Simulation.
Proceedings of the International Conference on Parallel and Distributed Computing Systems, 2005
Load Balance Heuristics for Synchronous Iterative Applications on Heterogeneous Cluster Systems.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005
A Distributed Architecture for Network Performance Measurement and Evaluation System.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005
Proceedings of the Advances in Machine Learning and Cybernetics, 2005
Usage Behavior Profiling for Anomaly Detection using Vector Quantization.
Proceedings of the IASTED International Conference on Communication Systems and Applications, 2005
Topology-Based Macroscopical Response and Control Technology for Network Security Event.
Proceedings of the Computational Intelligence and Security, International Conference, 2005
2004
Proceedings of the International Workshop on Storage Network Architecture and Parallel I/Os, 2004
Grid-Enabled Parallel Debugging Environment: A Portal Solution.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2004
Proceedings of the Parallel and Distributed Computing: Applications and Technologies, 2004
Proceedings of the Parallel and Distributed Computing: Applications and Technologies, 2004
Proceedings of the 18th International Parallel and Distributed Processing Symposium (IPDPS 2004), 2004
Proceedings of the Grid and Cooperative Computing, 2004
Proceedings of the Grid and Cooperative Computing, 2004
Proceedings of the Grid and Cooperative Computing, 2004
Proceedings of the Grid and Cooperative Computing, 2004
Proceedings of the Grid and Cooperative Computing, 2004
Proceedings of the 4th IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGrid 2004), 2004
2003
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003