Jinhong Zhang

Orcid: 0000-0002-9906-3508

According to our database1, Jinhong Zhang authored at least 27 papers between 2011 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Density change consistency clustering from density extreme.
Pattern Recognit., 2025

2024
Long short-term attentional neuro-cognitive diagnostic model for skill growth assessment in intelligent tutoring systems.
Expert Syst. Appl., March, 2024

TEPG: a traffic engineering based power-aware greedy routing algorithm in backbone networks with bundled links.
Frontiers Comput. Sci., February, 2024

A Distributed Static Error Identification Method Based on Measurement Reconstruction for Dual-Axis Hybrid Inertial Navigation System.
IEEE Trans. Instrum. Meas., 2024

SICNet: Learning selective inter-slice context via Mask-Guided Self-knowledge distillation for NPC segmentation.
J. Vis. Commun. Image Represent., 2024

Millimeter-Wave Radar-Based Unsteady Vital Signs Monitoring for Smart Home.
Proceedings of the IEEE International Conference on Communications, 2024

CNFA: Conditional Normalizing Flow for Query-Limited Attack.
Proceedings of the IEEE International Conference on Acoustics, 2024

2023
Multi-branch feature learning based speech emotion recognition using SCAR-NET.
Connect. Sci., December, 2023

Characterizing Interconnection Networks in Terms of Complexity via Entropy Measures.
Symmetry, October, 2023

DualFlow: Generating imperceptible adversarial examples by flow field and normalize flow-based model.
Frontiers Neurorobotics, June, 2023

Sensor Fusion of GNSS and IMU Data for Robust Localization via Smoothed Error State Kalman Filter.
Sensors, April, 2023

A path planning method using modified harris hawks optimization algorithm for mobile robots.
PeerJ Comput. Sci., 2023

Model Inversion Attacks on Homogeneous and Heterogeneous Graph Neural Networks.
CoRR, 2023

SCME: A Self-contrastive Method for Data-Free and Query-Limited Model Extraction Attack.
Proceedings of the Neural Information Processing - 30th International Conference, 2023

Multi-scale Features Destructive Universal Adversarial Perturbations.
Proceedings of the Information and Communications Security - 25th International Conference, 2023

AFLOW: Developing Adversarial Examples Under Extremely Noise-Limited Settings.
Proceedings of the Information and Communications Security - 25th International Conference, 2023

DeepLSH: A Deep Learning-based Locality Sensitive Hash Method.
Proceedings of the 15th International Conference on Digital Image Processing, 2023

TIA: Token Importance Transferable Attack on Vision Transformers.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023

2022
Multi-Stage Power-Aware Intelligent Adaptive Routing Algorithms in Bundled Links Based Backbone Networks.
IEEE Access, 2022

Towards Query-limited Adversarial Attacks on Graph Neural Networks.
Proceedings of the 34th IEEE International Conference on Tools with Artificial Intelligence, 2022

2021
Combining GCN and Transformer for Chinese Grammatical Error Detection.
CoRR, 2021

TEAP: Traffic Engineering and ALR policy based Power-aware solutions for green routing and planning problems in backbone networks.
Comput. Commun., 2021

2017
A green intelligent routing algorithm supporting flexible QoS for many-to-many multicast.
Comput. Networks, 2017

2015
Multiple many-to-many multicast routing scheme in green multi-granularity transport networks.
Comput. Networks, 2015

DrawCompileEvolve: Sparking Interactive Evolutionary Art with Human Creations.
Proceedings of the Evolutionary and Biologically Inspired Music, Sound, Art and Design, 2015

2014
The Case for a Mixed-Initiative Collaborative Neuroevolution Approach.
CoRR, 2014

2011
Research of a kind of new UAV training simulator based on equipment simulation.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011


  Loading...