Hongyi Zhu

Orcid: 0000-0001-6794-0230

According to our database1, Hongyi Zhu authored at least 61 papers between 2014 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Online creators' strategic cooperation in two-sided synchronous UGC market: Empirical evidence from a livestreaming platform.
Inf. Manag., 2025

Image2Text2Image: A Novel Framework for Label-Free Evaluation of Image-to-Text Generation with Text-to-Image Diffusion Models.
Proceedings of the MultiMedia Modeling, 2025

2024
Reinforcement Learning-Based Bandwidth Decision in Optical Access Networks: A Study of Exploration Strategy and Time With Confidence Guarantee.
IEEE Trans. Commun., November, 2024

Leveraging RIS to Assist Communication and Against CSI-Based Passive Sensing.
IEEE Wirel. Commun. Lett., June, 2024

A Highly Efficient Numerical Method for the Time-Fractional Diffusion Equation on Unbounded Domains.
J. Sci. Comput., May, 2024

A Practical Design of RIS With Subsurfaces Using Codebook-Based Configuration Method.
IEEE Wirel. Commun. Lett., April, 2024

Automated Analysis of Changes in Privacy Policies: A Structured Self-Attentive Sentence Embedding Approach.
MIS Q., 2024

Creating Proactive Cyber Threat Intelligence with Hacker Exploit Labels: A Deep Transfer Learning Approach.
MIS Q., 2024

Improving Threat Mitigation Through a Cybersecurity Risk Management Framework: A Computational Design Science Approach.
J. Manag. Inf. Syst., 2024

A profile similarity-based personalized federated learning method for wearable sensor-based human activity recognition.
Inf. Manag., 2024

Gradient Weight-normalized Low-rank Projection for Efficient LLM Training.
CoRR, 2024

Parameter-Efficient Fine-Tuning via Selective Discrete Cosine Transform.
CoRR, 2024

Towards Trustworthy Web Attack Detection: An Uncertainty-Aware Ensemble Deep Kernel Learning Model.
CoRR, 2024

A Whole-Process Certifiably Robust Aggregation Method Against Backdoor Attacks in Federated Learning.
CoRR, 2024

Performance evaluation of 2D LiDAR SLAM algorithms in simulated orchard environments.
Comput. Electron. Agric., 2024

Exquisitor at the Video Browser Showdown 2024: Relevance Feedback Meets Conversational Search.
Proceedings of the MultiMedia Modeling - 30th International Conference, 2024

Enhancing Interactive Image Retrieval With Query Rewriting Using Large Language Models and Vision Language Models.
Proceedings of the 2024 International Conference on Multimedia Retrieval, 2024

Exquisitor at the Lifelog Search Challenge 2024: Blending Conversational Search with User Relevance Feedback.
Proceedings of the 7th Annual ACM Workshop on the Lifelog Search Challenge, 2024

A Novel Evaluation Framework for Image2Text Generation.
Proceedings of The First Workshop on Large Language Models for Evaluation in Information Retrieval (LLM4Eval 2024) co-located with 10th International Conference on Online Publishing (SIGIR 2024), 2024

A Hybrid Fiber-Femtocell Indoor Network to Support Low-Latency and High-Bandwidth Indoor Communication Applications.
Proceedings of the International Conference on Computing, Networking and Communications, 2024

Using RIS to Support/Prevent Passive Sensing: RIS-enabled Passive Sensing Performance and RIS Configuration Study.
Proceedings of the IEEE International Conference on Communications, 2024

Two-sided Long Tails on Blockchain-Based Crowdsourcing Platforms.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

Introduction to the Minitrack on Cybersecurity in the Age of Artificial Intelligence, AI for Cybersecurity, and Cybersecurity for AI.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

Suggesting Alternatives for Potentially Insecure Artificial Intelligence Repositories: An Unsupervised Graph Embedding Approach.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

2023
A Compact Dual-Band Omnidirectional Circularly Polarized Filtering Antenna for UAV Communications.
IEEE Trans. Veh. Technol., December, 2023

Additive Feature Attribution Explainable Methods to Craft Adversarial Attacks for Text Classification and Text Regression.
IEEE Trans. Knowl. Data Eng., December, 2023

Deep Learning for Information Systems Research.
J. Manag. Inf. Syst., 2023

User Profiling and Vulnerability Introduction Prediction in Social Coding Repositories: A Dynamic Graph Embedding Approach: Vulnerability Introduction Prediction in Social Coding Repositories.
Proceedings of the 2023 Cyber Security Experimentation and Test Workshop, 2023

Visualizing Multimodal Time Series at Scale.
Proceedings of the Advances in Visual Computing - 18th International Symposium, 2023

Towards Privacy-Preserving Depression Detection: Experiments on Passive Sensor Signal Data.
Proceedings of the IEEE International Conference on Digital Health, 2023

Video-based estimation of pain indicators in dogs.
Proceedings of the 11th International Conference on Affective Computing and Intelligent Interaction, 2023

2022
Exploring the Propagation of Vulnerabilities from GitHub Repositories Hosted by Major Technology Organizations.
Proceedings of the CSET 2022: Cyber Security Experimentation and Test Workshop, 2022

Identifying Patterns of Vulnerability Incidence in Foundational Machine Learning Repositories on GitHub: An Unsupervised Graph Embedding Approach.
Proceedings of the IEEE International Conference on Data Mining Workshops, 2022

2021
Highly efficient schemes for time-fractional Allen-Cahn equation using extended SAV approach.
Numer. Algorithms, 2021

A Deep Learning Approach for Recognizing Activity of Daily Living (ADL) for Senior Care: Exploiting Interaction Dependency and Temporal Patterns.
MIS Q., 2021

Exploring the Evolution of Exploit-Sharing Hackers: An Unsupervised Graph Embedding Approach.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2021

2020
Proactively Identifying Emerging Hacker Threats from the Dark Web: A Diachronic Graph Embedding Framework (D-GEF).
ACM Trans. Priv. Secur., 2020

Optimization of Two-Way Network Coded HARQ With Overhead.
IEEE Trans. Commun., 2020

Human Identification for Activities of Daily Living: A Deep Transfer Learning Approach.
J. Manag. Inf. Syst., 2020

Deep Learning for Information Systems Research.
CoRR, 2020

Smart Vulnerability Assessment for Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2020

Identifying Vulnerable GitHub Repositories and Users in Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2020

Labeling Hacker Exploits for Proactive Cyber Threat Intelligence: A Deep Transfer Learning Approach.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2020

Will Cooperation Help Content Creators Grow? Empirical Evidence from Twitch.tv.
Proceedings of the 41st International Conference on Information Systems, 2020

2019
Emoticon Analysis for Chinese Social Media and E-commerce: The AZEmo System.
ACM Trans. Manag. Inf. Syst., 2019

A Fast High Order Method for the Time-Fractional Diffusion Equation.
SIAM J. Numer. Anal., 2019

Highly efficient and accurate schemes for time fractional Allen-Cahn equation by using extended SAV approach.
CoRR, 2019

Well-posedness for modified higher-order anisotropic Cahn-Hilliard equations.
Asymptot. Anal., 2019

Fear Appeals and Information Security Behaviors: An Empirical Study on Mechanical Turk.
AIS Trans. Replication Res., 2019

An Efficient Network-Coded ARQ Scheme for Two-Way Wireless Communication With Full-Duplex Relaying.
IEEE Access, 2019

2018
Throughput and Efficiency Analysis of Network-Coded HARQ for Two-Way Wireless Systems
PhD thesis, 2018

Research on the technological architectural design of geological hazard monitoring and rescue-after-disaster system based on cloud computing and Internet of things.
Int. J. Syst. Assur. Eng. Manag., 2018

A sequence-to-sequence model-based deep learning approach for recognizing activity of daily living for senior care.
J. Biomed. Informatics, 2018

Throughput Analysis of Two-Way NCed-HARQ With Reverse-Link Assistance and Estimated Channel State Information.
IEEE Commun. Lett., 2018

Identifying SCADA Systems and Their Vulnerabilities on the Internet of Things: A Text-Mining Approach.
IEEE Intell. Syst., 2018

2017
On practical network coded ARQ for two-way wireless communication.
Proceedings of the IEEE International Conference on Communications, 2017

2016
Identifying SCADA vulnerabilities using passive and active vulnerability assessment techniques.
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016

SilverLink: Developing an International Smart and Connected Home Monitoring System for Senior Care.
Proceedings of the Smart Health - International Conference, 2016

An efficient network coding scheme for two-way communication with ARQ feedback.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

2015
SilverLink: Smart Home Health Monitoring for Senior Care.
Proceedings of the Smart Health - International Conference, 2015

2014
Emoticon Analysis for Chinese Health and Fitness Topics.
Proceedings of the Smart Health - International Conference, 2014


  Loading...