Long Zhang

Orcid: 0000-0002-1633-4051

Affiliations:
  • Chinese People's Liberation Army, Academy of Military Science, Beijing, China
  • National University of Defense Technology, College of Computer, Changsha, China (PhD 2017)


According to our database1, Long Zhang authored at least 18 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Intrusion Detection for Unmanned Aerial Vehicles Security: A Tiny Machine Learning Model.
IEEE Internet Things J., June, 2024

Joint Communication and Control Optimization of a UAV-Assisted Multi-Vehicle Platooning System in Uncertain Communication Environment.
IEEE Trans. Veh. Technol., March, 2024

MRC-VulLoc: Software source code vulnerability localization based on multi-choice reading comprehension.
Comput. Secur., 2024

VulCausal: Robust Vulnerability Detection Using Neural Network Models from a Causal Perspective.
Proceedings of the Knowledge Science, Engineering and Management, 2024

2023
An attention-based automatic vulnerability detection approach with GGNN.
Int. J. Mach. Learn. Cybern., September, 2023

Transmission-Efficient RIS-Carrying UAV's Auxiliary Communication Systems for Intelligent Connected Vehicle Platoons at the Unsignalized Intersection in Smart Cities.
IEEE Internet Things J., 2023

Leveraging User-Defined Identifiers for Counterfactual Data Generation in Source Code Vulnerability Detection.
Proceedings of the 23rd IEEE International Working Conference on Source Code Analysis and Manipulation, 2023

2022
An Anti-Disturbance Resilience Enhanced Algorithm for UAV 3D Route Planning.
Sensors, 2022

A Survey of GNSS Spoofing and Anti-Spoofing Technology.
Remote. Sens., 2022

Cooperative Positioning Enhancement for HDVs and CAVs Coexisting Environment Using Deep Neural Networks.
Proceedings of the Advances in Swarm Intelligence - 13th International Conference, 2022

2021
An Approach of Linear Regression-Based UAV GPS Spoofing Detection.
Wirel. Commun. Mob. Comput., 2021

Interpretation of Learning-Based Automatic Source Code Vulnerability Detection Model Using LIME.
Proceedings of the Knowledge Science, Engineering and Management, 2021

A 3D Flight Route Planning Algorithm for UAV Based on the Idea of Resilience.
Proceedings of the ICCPR '21: 10th International Conference on Computing and Pattern Recognition, Shanghai, China, October 15, 2021

2019
一种基于SAT求解器的组合电路重汇聚现象分析方法 (Reconvergence Phenomena Analysis Method in Combinational Circuits Based on SAT Solver).
计算机科学, 2019

2018
An SAT-Based Method to Multithreaded Program Verification for Mobile Crowdsourcing Networks.
Wirel. Commun. Mob. Comput., 2018

Analysis of SET Reconvergence and Hardening in the Combinational Circuit Using a SAT-Based Method.
IEEE Access, 2018

2017
A Formal Approach to Verify Parameterized Protocols in Mobile Cyber-Physical Systems.
Mob. Inf. Syst., 2017

2012
State space reduction in modeling checking parameterized cache coherence protocol by two-dimensional abstraction.
J. Supercomput., 2012


  Loading...