Honglong Chen
Orcid: 0000-0002-5343-1440
According to our database1,
Honglong Chen
authored at least 135 papers
between 2009 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Optimizing task allocation with temporal-spatial privacy protection in mobile crowdsensing.
Expert Syst. J. Knowl. Eng., February, 2025
IW-ViT: Independence-Driven Weighting Vision Transformer for out-of-distribution generalization.
Pattern Recognit., 2025
Defending against backdoor attack on deep neural networks based on multi-scale inactivation.
Inf. Sci., 2025
2024
Reward-Oriented Task Offloading in Energy Harvesting Collaborative Edge Computing Systems.
IEEE Trans. Mob. Comput., December, 2024
IEEE Trans. Mob. Comput., December, 2024
ACM Trans. Knowl. Discov. Data, November, 2024
Image-Scaling Attack on Image Signal Processing Pipelines in Deep Neural Networks-Based Outdoor Vision Applications.
IEEE Trans. Consumer Electron., November, 2024
Wirel. Networks, October, 2024
IEEE Trans. Mob. Comput., October, 2024
Efficient Deployment and Scheduling of Shared VNF Instances in Mobile Edge Computing Networks.
IEEE Internet Things J., October, 2024
ACM Trans. Spatial Algorithms Syst., September, 2024
IEEE Trans. Comput. Soc. Syst., June, 2024
IEEE Trans. Veh. Technol., May, 2024
IEEE Trans. Mob. Comput., May, 2024
IEEE Internet Things J., May, 2024
EDSP-Edge: Efficient Dynamic Edge Service Entity Placement for Mobile Virtual Reality Systems.
IEEE Trans. Wirel. Commun., April, 2024
Call White Black: Enhanced Image-Scaling Attack in Industrial Artificial Intelligence Systems.
IEEE Trans. Ind. Informatics, April, 2024
Neural Process. Lett., April, 2024
A Reassessment on Applying Protocol Interference Model Under Rayleigh Fading: From Perspective of Link Scheduling.
IEEE/ACM Trans. Netw., February, 2024
Efficiently Identifying Unknown COTS RFID Tags for Intelligent Transportation Systems.
IEEE Trans. Intell. Transp. Syst., January, 2024
IEEE Trans. Sustain. Comput., 2024
NOMA-Enabled Multiuser Offloading in Multicell Edge Computing Networks: A Coalition Game Based Approach.
IEEE Trans. Netw. Sci. Eng., 2024
IEEE Trans. Multim., 2024
Investigating the Backdoor on DNNs Based on Recolorization and Reconstruction: From a Multi-Channel Perspective.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Geosci. Remote. Sens. Lett., 2024
Eng. Appl. Artif. Intell., 2024
Proceedings of the Knowledge Science, Engineering and Management, 2024
Lightweight Privacy Protection Against Channel-Level Gradient Leakage Attack in Federated Learning.
Proceedings of the 15th International Conference on Information and Communication Technology Convergence, 2024
Proceedings of the Forty-first International Conference on Machine Learning, 2024
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
Learning Distinct Relationship in Package Recommendation With Graph Attention Networks.
IEEE Trans. Comput. Soc. Syst., December, 2023
Ad Hoc Networks, November, 2023
Inf. Sci., October, 2023
Probabilistic Coverage Constraint Task Assignment with Privacy Protection in Vehicular Crowdsensing.
Sensors, September, 2023
Sensors, July, 2023
IEEE Internet Things J., June, 2023
Neural Process. Lett., April, 2023
ARPCNN: Auxiliary Review-Based Personalized Attentional CNN for Trustworthy Recommendation.
IEEE Trans. Ind. Informatics, 2023
MSCET: A Multi-Scenario Offloading Schedule for Biomedical Data Processing and Analysis in Cloud-Edge-Terminal Collaborative Vehicular Networks.
IEEE ACM Trans. Comput. Biol. Bioinform., 2023
Ad Hoc Networks, 2023
Proceedings of the 19th International Conference on Mobility, Sensing and Networking, 2023
DTrust: Toward Dynamic Trust Levels Assessment in Time-Varying Online Social Networks.
Proceedings of the IEEE INFOCOM 2023, 2023
Annealing Genetic-based Preposition Substitution for Text Rubbish Example Generation.
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023
Proceedings of the 10th IEEE International Conference on Cyber Security and Cloud Computing, 2023
Proceedings of the AI 2023: Advances in Artificial Intelligence, 2023
2022
Edge data based trailer inception probabilistic matrix factorization for context-aware movie recommendation.
World Wide Web, 2022
Semi-Direct Monocular Visual-Inertial Odometry Using Point and Line Features for IoV.
ACM Trans. Internet Techn., 2022
IEEE Trans. Ind. Informatics, 2022
IEEE Trans. Ind. Informatics, 2022
Guest Editorial: Special Section on Distributed Intelligence Over Internet of Things.
IEEE Trans. Ind. Informatics, 2022
DAP: Efficient Detection Against Probabilistic Cloning Attacks in Anonymous RFID Systems.
IEEE Trans. Ind. Informatics, 2022
VRConvMF: Visual Recurrent Convolutional Matrix Factorization for Movie Recommendation.
IEEE Trans. Emerg. Top. Comput. Intell., 2022
IEEE Trans. Comput. Soc. Syst., 2022
IEEE Trans. Comput. Soc. Syst., 2022
MAFI: GNN-Based Multiple Aggregators and Feature Interactions Network for Fraud Detection Over Heterogeneous Graph.
IEEE Trans. Big Data, 2022
DOT: Decentralized Offloading of Tasks in OFDMA-Based Heterogeneous Computing Networks.
IEEE Internet Things J., 2022
Internet Things, 2022
Neurocomputing, 2022
Int. J. Intell. Syst., 2022
Int. J. Intell. Syst., 2022
CoRR, 2022
The 4<sup>th</sup> International Workshop on Artificial Intelligence Applications in Internet of Things (AI<sup>2</sup>OT 2022): Preface.
Proceedings of the 18th International Conference on Mobility, Sensing and Networking, 2022
Proceedings of the 18th International Conference on Mobility, Sensing and Networking, 2022
Proceedings of the 16th International Conference on Ubiquitous Information Management and Communication, 2022
Proceedings of the 34th IEEE International Conference on Tools with Artificial Intelligence, 2022
2021
Nowhere to Hide: Efficiently Identifying Probabilistic Cloning Attacks in Large-Scale RFID Systems.
IEEE Trans. Inf. Forensics Secur., 2021
From edge data to recommendation: A double attention-based deformable convolutional network.
Peer-to-Peer Netw. Appl., 2021
J. Netw. Comput. Appl., 2021
Trust-aware generative adversarial network with recurrent neural network for recommender systems.
Int. J. Intell. Syst., 2021
Ad Hoc Networks, 2021
Proceedings of the WI-IAT '21: IEEE/WIC/ACM International Conference on Web Intelligence, Hybrid Event / Melbourne, VIC, Australia, December 14 - 17, 2021, 2021
2020
Efficient Link Scheduling in Wireless Networks Under Rayleigh-Fading and Multiuser Interference.
IEEE Trans. Wirel. Commun., 2020
IEEE Trans. Wirel. Commun., 2020
J. Netw. Comput. Appl., 2020
PAN: Pipeline assisted neural networks model for data-to-text generation in social internet of things.
Inf. Sci., 2020
PWEND: Proactive wakeup based energy-efficient neighbor discovery for mobile sensor networks.
Ad Hoc Networks, 2020
TagRec: Trust-Aware Generative Adversarial Network with Recurrent Neural Network for Recommender Systems.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020
Proceedings of the 9th IEEE/CIC International Conference on Communications in China, 2020
2019
Privacy-Preserving Crowd-Sourced Statistical Data Publishing with An Untrusted Server.
IEEE Trans. Mob. Comput., 2019
J. Netw. Comput. Appl., 2019
Int. J. High Perform. Comput. Netw., 2019
A social-based watchdog system to detect selfish nodes in opportunistic mobile networks.
Future Gener. Comput. Syst., 2019
IEEE Commun. Mag., 2019
Deformable Convolutional Matrix Factorization for Document Context-Aware Recommendation in Social Networks.
IEEE Access, 2019
2018
IEEE Trans. Veh. Technol., 2018
On Achieving Asynchronous Energy-Efficient Neighbor Discovery for Mobile Sensor Networks.
IEEE Trans. Emerg. Top. Comput., 2018
Pers. Ubiquitous Comput., 2018
IEEE Internet Things J., 2018
IEEE Internet Things J., 2018
A Novel Distributed algorithm for constructing virtual backbones in wireless sensor networks.
Comput. Networks, 2018
A Social Utility-Based Dissemination Scheme for Emergency Warning Messages in Vehicular Social Networks.
Comput. J., 2018
Segmented Bloom Filter Based Missing Tag Detection for Large-Scale RFID Systems With Unknown Tags.
IEEE Access, 2018
On Using Sampling Bloom Filter for Unknown Tag Identification in Large-Scale RFID Systems.
IEEE Access, 2018
Deep User Modeling for Content-based Event Recommendation in Event-based Social Networks.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
Pay On-Demand: Dynamic Incentive and Task Selection for Location-Dependent Mobile Crowdsensing Systems.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018
2017
IEEE Trans. Veh. Technol., 2017
Pervasive Mob. Comput., 2017
SINR based shortest link scheduling with oblivious power control in wireless networks.
J. Netw. Comput. Appl., 2017
Efficient and Reliable Missing Tag Identification for Large-Scale RFID Systems With Unknown Tags.
IEEE Internet Things J., 2017
Comput. Networks, 2017
Ad Hoc Networks, 2017
2016
A Secure Credit-Based Incentive Mechanism for Message Forwarding in Noncooperative DTNs.
IEEE Trans. Veh. Technol., 2016
Parameter Characteristics of Gauss-Markov Mobility Model in Mobile Wireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2016
2015
Wirel. Commun. Mob. Comput., 2015
Pervasive Mob. Comput., 2015
On protecting end-to-end location privacy against local eavesdropper in Wireless Sensor Networks.
Pervasive Mob. Comput., 2015
2014
Mobile Beacon Based Wormhole Attackers Detection and Positioning in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2014
GAR: Group aware cooperative routing protocol for resource-constraint opportunistic networks.
Comput. Commun., 2014
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014
2013
HierTrack: an energy-efficient cluster-based target tracking system forwireless sensor networks.
J. Zhejiang Univ. Sci. C, 2013
Int. J. Distributed Sens. Networks, 2013
Making Nodes Cooperative: A Secure Incentive Mechanism for Message Forwarding in DTNs.
Proceedings of the 22nd International Conference on Computer Communication and Networks, 2013
Proceedings of the 11th IFAC International Workshop on Adaptation and Learning in Control and Signal Processing, 2013
2012
Group aware cooperative routing for opportunistic networks under resource constraints.
Proceedings of the 2012 IEEE Global Communications Conference, 2012
2011
Proceedings of the 9th International Conference on Embedded Networked Sensor Systems, 2011
Proceedings of the International Conference on Parallel Processing, 2011
2010
EURASIP J. Wirel. Commun. Netw., 2010
EURASIP J. Wirel. Commun. Netw., 2010
Label-Based DV-Hop Localization Against Wormhole Attacks in Wireless Sensor Networks.
Proceedings of the Fifth International Conference on Networking, Architecture, and Storage, 2010
Proceedings of the 29th International Performance Computing and Communications Conference, 2010
From nowhere to somewhere: Protecting end-to-end location privacy in wireless sensor networks.
Proceedings of the 29th International Performance Computing and Communications Conference, 2010
A Novel Mobility Management Scheme for Target Tracking in Cluster-Based Sensor Networks.
Proceedings of the Distributed Computing in Sensor Systems, 2010
2009
Proceedings of the Wireless Algorithms, 2009
Conflicting-Set-Based Wormhole Attack Resistant Localization in Wireless Sensor Networks.
Proceedings of the Ubiquitous Intelligence and Computing, 6th International Conference, 2009