Hongliang Zhu

Orcid: 0009-0000-7080-1047

According to our database1, Hongliang Zhu authored at least 37 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
SOD-YOLO: Small-Object-Detection Algorithm Based on Improved YOLOv8 for UAV Images.
Remote. Sens., August, 2024

Symmetric Kullback-Leibler distance based generalized grey target decision method for mixed attributes.
Grey Syst. Theory Appl., 2024

GSEDroid: GNN-based Android malware detection framework using lightweight semantic embedding.
Comput. Secur., 2024

Non-destructive classification of sturgeon stress using cross-modal data fusion and multi-input deep learning models.
Comput. Electron. Agric., 2024

2023
N-LoLiGan: Unsupervised low-light enhancement GAN with an N-Net for low-light tunnel images.
Digit. Signal Process., November, 2023

Birefringence after Tellurium Nanosheets and Copper Intercalation.
Symmetry, October, 2023

Cross-domain vulnerability detection using graph embedding and domain adaptation.
Comput. Secur., 2023

2022
Privacy-Preserving Query Scheme (PPQS) for Location-Based Services in Outsourced Cloud.
Secur. Commun. Networks, 2022

Hierarchical secret sharing scheme for WSN based on linear homogeneous recurrence relations.
Int. J. Distributed Sens. Networks, 2022

Cross-domain entity identity association analysis and prediction based on representation learning.
Int. J. Distributed Sens. Networks, 2022

2021
Cross-Platform Strong Privacy Protection Mechanism for Review Publication.
Secur. Commun. Networks, 2021

A rational delegating computation protocol based on reputation and smart contract.
J. Cloud Comput., 2021

Dark Area Classification From Airborne SAR Images Based on Deep Margin Learning.
IEEE Access, 2021

2020
Ground Target Classification from SAR Image with the Pixel Complement for Target Shape.
Proceedings of the 2020 IEEE Sensors, Rotterdam, The Netherlands, October 25-28, 2020, 2020

A New Target Classification Method for Synthetic Aperture Radar Images based on Wavelet Scattering Transform.
Proceedings of the IEEE International Conference on Signal Processing, 2020

Carrier-based Aircraft Detection on Flight Deck of Aircraft Carrier with Simulated 3-D Model by Deep Neural Network.
Proceedings of the CSSE 2020: 3rd International Conference on Computer Science and Software Engineering, 2020

2019
A Secure and Efficient Data Integrity Verification Scheme for Cloud-IoT Based on Short Signature.
IEEE Access, 2019

An Intrusion Action-Based IDS Alert Correlation Analysis and Prediction Framework.
IEEE Access, 2019

A Mechanism to Improve Effectiveness and Privacy Preservation for Review Publication in LBS.
IEEE Access, 2019

LRM: A Location Recombination Mechanism for Achieving Trajectory k-Anonymity Privacy Protection.
IEEE Access, 2019

A Authentication and Access Authorization Mechanism on the PaaS Platform.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2019

2018
Outsourcing Set Intersection Computation Based on Bloom Filter for Privacy Preservation in Multimedia Processing.
Secur. Commun. Networks, 2018

A Clone Detection Algorithm with Low Resource Expenditure for Wireless Sensor Networks.
J. Sensors, 2018

Detection of selective forwarding attacks based on adaptive learning automata and communication quality in wireless sensor networks.
Int. J. Distributed Sens. Networks, 2018

Price Dynamics in an Order-Driven Market with Bayesian Learning.
Complex., 2018

Fabrication of InP-based monolithically integrated laser transmitters.
Sci. China Inf. Sci., 2018

Multimodal Feature-Level Fusion for Biometrics Identification System on IoMT Platform.
IEEE Access, 2018

Machine Learning and Deep Learning Methods for Cybersecurity.
IEEE Access, 2018

A Survey of Malicious Accounts Detection in Large-Scale Online Social Networks.
Proceedings of the 4th IEEE International Conference on Big Data Security on Cloud, 2018

2017
Intrusion Detection Based on State Context and Hierarchical Trust in Wireless Sensor Networks.
IEEE Access, 2017

2016
Based on the character of cloud storage string encryption and cipher text retrieval of string research.
Proceedings of the 4th International Conference on Cloud Computing and Intelligence Systems, 2016

2014
An Improved Directed Diffusion Protocol based on Opportunistic Routing.
J. Networks, 2014

A Weakly Homomorphic Encryption with LDN.
J. Networks, 2014

2013
Security Protocol for RFID System Conforming to EPC-C1G2 Standard.
J. Comput., 2013

A Novel Trust Evaluation Model Based on Grey Clustering Theory for Routing Networks.
J. Comput., 2013

2011
Some results on preserving K-member simply separable relations in partial K-valued logic.
Proceedings of the Third International Conference on Digital Image Processing, 2011

2010
New asymptotical stability conditions for delayed neural networks model with distribution.
Proceedings of the Sixth International Conference on Natural Computation, 2010


  Loading...