Hongyi Zhu
Orcid: 0000-0001-6794-0230
According to our database1,
Hongyi Zhu
authored at least 61 papers
between 2014 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Online creators' strategic cooperation in two-sided synchronous UGC market: Empirical evidence from a livestreaming platform.
Inf. Manag., 2025
Image2Text2Image: A Novel Framework for Label-Free Evaluation of Image-to-Text Generation with Text-to-Image Diffusion Models.
Proceedings of the MultiMedia Modeling, 2025
2024
Reinforcement Learning-Based Bandwidth Decision in Optical Access Networks: A Study of Exploration Strategy and Time With Confidence Guarantee.
IEEE Trans. Commun., November, 2024
IEEE Wirel. Commun. Lett., June, 2024
A Highly Efficient Numerical Method for the Time-Fractional Diffusion Equation on Unbounded Domains.
J. Sci. Comput., May, 2024
A Practical Design of RIS With Subsurfaces Using Codebook-Based Configuration Method.
IEEE Wirel. Commun. Lett., April, 2024
Automated Analysis of Changes in Privacy Policies: A Structured Self-Attentive Sentence Embedding Approach.
MIS Q., 2024
Creating Proactive Cyber Threat Intelligence with Hacker Exploit Labels: A Deep Transfer Learning Approach.
MIS Q., 2024
Improving Threat Mitigation Through a Cybersecurity Risk Management Framework: A Computational Design Science Approach.
J. Manag. Inf. Syst., 2024
A profile similarity-based personalized federated learning method for wearable sensor-based human activity recognition.
Inf. Manag., 2024
CoRR, 2024
Towards Trustworthy Web Attack Detection: An Uncertainty-Aware Ensemble Deep Kernel Learning Model.
CoRR, 2024
A Whole-Process Certifiably Robust Aggregation Method Against Backdoor Attacks in Federated Learning.
CoRR, 2024
Performance evaluation of 2D LiDAR SLAM algorithms in simulated orchard environments.
Comput. Electron. Agric., 2024
Exquisitor at the Video Browser Showdown 2024: Relevance Feedback Meets Conversational Search.
Proceedings of the MultiMedia Modeling - 30th International Conference, 2024
Enhancing Interactive Image Retrieval With Query Rewriting Using Large Language Models and Vision Language Models.
Proceedings of the 2024 International Conference on Multimedia Retrieval, 2024
Exquisitor at the Lifelog Search Challenge 2024: Blending Conversational Search with User Relevance Feedback.
Proceedings of the 7th Annual ACM Workshop on the Lifelog Search Challenge, 2024
Proceedings of The First Workshop on Large Language Models for Evaluation in Information Retrieval (LLM4Eval 2024) co-located with 10th International Conference on Online Publishing (SIGIR 2024), 2024
A Hybrid Fiber-Femtocell Indoor Network to Support Low-Latency and High-Bandwidth Indoor Communication Applications.
Proceedings of the International Conference on Computing, Networking and Communications, 2024
Using RIS to Support/Prevent Passive Sensing: RIS-enabled Passive Sensing Performance and RIS Configuration Study.
Proceedings of the IEEE International Conference on Communications, 2024
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024
Introduction to the Minitrack on Cybersecurity in the Age of Artificial Intelligence, AI for Cybersecurity, and Cybersecurity for AI.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024
Suggesting Alternatives for Potentially Insecure Artificial Intelligence Repositories: An Unsupervised Graph Embedding Approach.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024
2023
A Compact Dual-Band Omnidirectional Circularly Polarized Filtering Antenna for UAV Communications.
IEEE Trans. Veh. Technol., December, 2023
Additive Feature Attribution Explainable Methods to Craft Adversarial Attacks for Text Classification and Text Regression.
IEEE Trans. Knowl. Data Eng., December, 2023
User Profiling and Vulnerability Introduction Prediction in Social Coding Repositories: A Dynamic Graph Embedding Approach: Vulnerability Introduction Prediction in Social Coding Repositories.
Proceedings of the 2023 Cyber Security Experimentation and Test Workshop, 2023
Proceedings of the Advances in Visual Computing - 18th International Symposium, 2023
Towards Privacy-Preserving Depression Detection: Experiments on Passive Sensor Signal Data.
Proceedings of the IEEE International Conference on Digital Health, 2023
Proceedings of the 11th International Conference on Affective Computing and Intelligent Interaction, 2023
2022
Exploring the Propagation of Vulnerabilities from GitHub Repositories Hosted by Major Technology Organizations.
Proceedings of the CSET 2022: Cyber Security Experimentation and Test Workshop, 2022
Identifying Patterns of Vulnerability Incidence in Foundational Machine Learning Repositories on GitHub: An Unsupervised Graph Embedding Approach.
Proceedings of the IEEE International Conference on Data Mining Workshops, 2022
2021
Highly efficient schemes for time-fractional Allen-Cahn equation using extended SAV approach.
Numer. Algorithms, 2021
A Deep Learning Approach for Recognizing Activity of Daily Living (ADL) for Senior Care: Exploiting Interaction Dependency and Temporal Patterns.
MIS Q., 2021
Exploring the Evolution of Exploit-Sharing Hackers: An Unsupervised Graph Embedding Approach.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2021
2020
Proactively Identifying Emerging Hacker Threats from the Dark Web: A Diachronic Graph Embedding Framework (D-GEF).
ACM Trans. Priv. Secur., 2020
Human Identification for Activities of Daily Living: A Deep Transfer Learning Approach.
J. Manag. Inf. Syst., 2020
Smart Vulnerability Assessment for Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2020
Identifying Vulnerable GitHub Repositories and Users in Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2020
Labeling Hacker Exploits for Proactive Cyber Threat Intelligence: A Deep Transfer Learning Approach.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2020
Proceedings of the 41st International Conference on Information Systems, 2020
2019
ACM Trans. Manag. Inf. Syst., 2019
SIAM J. Numer. Anal., 2019
Highly efficient and accurate schemes for time fractional Allen-Cahn equation by using extended SAV approach.
CoRR, 2019
Asymptot. Anal., 2019
Fear Appeals and Information Security Behaviors: An Empirical Study on Mechanical Turk.
AIS Trans. Replication Res., 2019
An Efficient Network-Coded ARQ Scheme for Two-Way Wireless Communication With Full-Duplex Relaying.
IEEE Access, 2019
2018
Throughput and Efficiency Analysis of Network-Coded HARQ for Two-Way Wireless Systems
PhD thesis, 2018
Research on the technological architectural design of geological hazard monitoring and rescue-after-disaster system based on cloud computing and Internet of things.
Int. J. Syst. Assur. Eng. Manag., 2018
A sequence-to-sequence model-based deep learning approach for recognizing activity of daily living for senior care.
J. Biomed. Informatics, 2018
Throughput Analysis of Two-Way NCed-HARQ With Reverse-Link Assistance and Estimated Channel State Information.
IEEE Commun. Lett., 2018
Identifying SCADA Systems and Their Vulnerabilities on the Internet of Things: A Text-Mining Approach.
IEEE Intell. Syst., 2018
2017
Proceedings of the IEEE International Conference on Communications, 2017
2016
Identifying SCADA vulnerabilities using passive and active vulnerability assessment techniques.
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016
SilverLink: Developing an International Smart and Connected Home Monitoring System for Senior Care.
Proceedings of the Smart Health - International Conference, 2016
Proceedings of the 2016 IEEE International Conference on Communications, 2016
2015
Proceedings of the Smart Health - International Conference, 2015
2014
Proceedings of the Smart Health - International Conference, 2014