Hongliang Zhu
Orcid: 0009-0000-7080-1047
According to our database1,
Hongliang Zhu
authored at least 37 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Remote. Sens., August, 2024
Symmetric Kullback-Leibler distance based generalized grey target decision method for mixed attributes.
Grey Syst. Theory Appl., 2024
GSEDroid: GNN-based Android malware detection framework using lightweight semantic embedding.
Comput. Secur., 2024
Non-destructive classification of sturgeon stress using cross-modal data fusion and multi-input deep learning models.
Comput. Electron. Agric., 2024
2023
N-LoLiGan: Unsupervised low-light enhancement GAN with an N-Net for low-light tunnel images.
Digit. Signal Process., November, 2023
Symmetry, October, 2023
Comput. Secur., 2023
2022
Privacy-Preserving Query Scheme (PPQS) for Location-Based Services in Outsourced Cloud.
Secur. Commun. Networks, 2022
Hierarchical secret sharing scheme for WSN based on linear homogeneous recurrence relations.
Int. J. Distributed Sens. Networks, 2022
Cross-domain entity identity association analysis and prediction based on representation learning.
Int. J. Distributed Sens. Networks, 2022
2021
Secur. Commun. Networks, 2021
J. Cloud Comput., 2021
IEEE Access, 2021
2020
Ground Target Classification from SAR Image with the Pixel Complement for Target Shape.
Proceedings of the 2020 IEEE Sensors, Rotterdam, The Netherlands, October 25-28, 2020, 2020
A New Target Classification Method for Synthetic Aperture Radar Images based on Wavelet Scattering Transform.
Proceedings of the IEEE International Conference on Signal Processing, 2020
Carrier-based Aircraft Detection on Flight Deck of Aircraft Carrier with Simulated 3-D Model by Deep Neural Network.
Proceedings of the CSSE 2020: 3rd International Conference on Computer Science and Software Engineering, 2020
2019
A Secure and Efficient Data Integrity Verification Scheme for Cloud-IoT Based on Short Signature.
IEEE Access, 2019
IEEE Access, 2019
A Mechanism to Improve Effectiveness and Privacy Preservation for Review Publication in LBS.
IEEE Access, 2019
LRM: A Location Recombination Mechanism for Achieving Trajectory k-Anonymity Privacy Protection.
IEEE Access, 2019
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2019
2018
Outsourcing Set Intersection Computation Based on Bloom Filter for Privacy Preservation in Multimedia Processing.
Secur. Commun. Networks, 2018
A Clone Detection Algorithm with Low Resource Expenditure for Wireless Sensor Networks.
J. Sensors, 2018
Detection of selective forwarding attacks based on adaptive learning automata and communication quality in wireless sensor networks.
Int. J. Distributed Sens. Networks, 2018
Sci. China Inf. Sci., 2018
Multimodal Feature-Level Fusion for Biometrics Identification System on IoMT Platform.
IEEE Access, 2018
Proceedings of the 4th IEEE International Conference on Big Data Security on Cloud, 2018
2017
Intrusion Detection Based on State Context and Hierarchical Trust in Wireless Sensor Networks.
IEEE Access, 2017
2016
Based on the character of cloud storage string encryption and cipher text retrieval of string research.
Proceedings of the 4th International Conference on Cloud Computing and Intelligence Systems, 2016
2014
J. Networks, 2014
2013
J. Comput., 2013
2011
Some results on preserving K-member simply separable relations in partial K-valued logic.
Proceedings of the Third International Conference on Digital Image Processing, 2011
2010
New asymptotical stability conditions for delayed neural networks model with distribution.
Proceedings of the Sixth International Conference on Natural Computation, 2010