Ronghua Shi

According to our database1, Ronghua Shi authored at least 60 papers between 1985 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
H3NI: Non-target-specific node injection attacks on hypergraph neural networks via genetic algorithm.
Neurocomputing, 2025

2024
Channelwise and Spatially Guided Multimodal Feature Fusion Network for 3-D Object Detection in Autonomous Vehicles.
IEEE Trans. Geosci. Remote. Sens., 2024

MDIplier: Protocol Format Recovery via Hierarchical Inference.
Proceedings of the 35th IEEE International Symposium on Software Reliability Engineering, 2024

2023
SMGNN: span-to-span multi-channel graph neural network for aspect-sentiment triplet extraction.
J. Intell. Inf. Syst., December, 2023

Four-state continuous-variable quantum key distribution with a hybrid linear amplifier.
Quantum Inf. Process., September, 2023

Two End-to-End Quantum-Inspired Deep Neural Networks for Text Classification.
IEEE Trans. Knowl. Data Eng., April, 2023

Harris hawks optimizer based on the novice protection tournament for numerical and engineering optimization problems.
Appl. Intell., March, 2023

Quantum Circuit Learning With Parameterized Boson Sampling.
IEEE Trans. Knowl. Data Eng., 2023

2022
Monte Carlo-based security analysis for multi-mode continuous-variable quantum key distribution over underwater channel.
Quantum Inf. Process., 2022

A quantum hash function with grouped coarse-grained boson sampling.
Quantum Inf. Process., 2022

SKC-CCCO: an encryption algorithm for quantum group signature.
Quantum Inf. Process., 2022

mFI-PSO: A Flexible and Effective Method in Adversarial Image Generation for Deep Neural Networks.
Proceedings of the International Joint Conference on Neural Networks, 2022

2021
Quantum digital signature based on measurement-device-independent continuous-variable scheme.
Quantum Inf. Process., 2021

Spectrum sharing protocol in two-way cognitive radio networks with energy accumulation in relay node.
Peer-to-Peer Netw. Appl., 2021

Performance Analysis and Optimization of a Cooperative Transmission Protocol in NOMA-Assisted Cognitive Radio Networks with Discrete Energy Harvesting.
Entropy, 2021

A Hybridization of Dragonfly Algorithm Optimization and Angle Modulation Mechanism for 0-1 Knapsack Problems.
Entropy, 2021

An Improved Dragonfly Algorithm Based on Angle Modulation Mechanism for Solving 0-1 Knapsack Problems.
Proceedings of the Advances in Swarm Intelligence - 12th International Conference, 2021

Fireworks Harris Hawk Algorithm Based on Dynamic Competition Mechanism for Numerical Optimization.
Proceedings of the Advances in Swarm Intelligence - 12th International Conference, 2021

2020
Adversarial Image Generation and Training for Deep Convolutional Neural Networks.
CoRR, 2020

SilkViser: A Visual Explorer of Blockchain-based Cryptocurrency Transaction Data.
Proceedings of the 15th IEEE Conference on Visual Analytics Science and Technology, 2020

Distill BERT to Traditional Models in Chinese Machine Reading Comprehension (Student Abstract).
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
A Metamaterial-Based Compact Planar Monopole Antenna for Wi-Fi and UWB Applications.
Sensors, 2019

Arbitrated quantum signature scheme with quantum walk-based teleportation.
Quantum Inf. Process., 2019

2018
Seeflow: A Visualization System Using 2T Hybrid Graph for Characteristics Analysis of Abnormal Netflow.
Wirel. Pers. Commun., 2018

Squeezed-state quantum key distribution with a Rindler observer.
Quantum Inf. Process., 2018

Coherent attacking continuous-variable quantum key distribution with entanglement in the middle.
Quantum Inf. Process., 2018

Transparent Learning: An Incremental Machine Learning Framework Based on Transparent Computing.
IEEE Netw., 2018

Cooperative spectrum sharing in cognitive radio networks with energy accumulation: design and analysis.
IET Commun., 2018

Throughput analysis of cognitive wireless acoustic sensor networks with energy harvesting.
Future Gener. Comput. Syst., 2018

A Novel Radial Visualization of Intrusion Detection Alerts.
IEEE Computer Graphics and Applications, 2018

Secure beamforming for cognitive cyber-physical systems based on cognitive radio with wireless energy harvesting.
Ad Hoc Networks, 2018

2017
Secure Beamforming Design with Bidirectional Secondary Transmissions in Wireless-Powered Cognitive Radio Networks.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

2016
A Matrix-Based Visualization System for Network Traffic Forensics.
IEEE Syst. J., 2016

A Visualization System for Multiple Heterogeneous Network Security Data and Fusion Analysis.
KSII Trans. Internet Inf. Syst., 2016

Visual fusion of multi-source network security data based on labelled treemap.
Int. J. Netw. Virtual Organisations, 2016

IDSPlanet: A Novel Radial Visualization of Intrusion Detection Alerts.
Proceedings of the 9th International Symposium on Visual Information Communication and Interaction, 2016

2015
Continuous-variable quantum key distribution under the local oscillator intensity attack with noiseless linear amplifier.
Quantum Inf. Process., 2015

Quantum relay cooperative communication via space-time transmission.
Quantum Inf. Comput., 2015

An intelligent solar energy-harvesting system for wireless sensor networks.
EURASIP J. Wirel. Commun. Netw., 2015

TDD-Based Massive MIMO Systems: Overview and Development.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

DBSCAN-M: An Intelligent Clustering Algorithm Based on Mutual Reinforcement.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

2014
A Multi-Scale Weighted Back Projection Imaging Technique for Ground Penetrating Radar Applications.
Remote. Sens., 2014

Quantum states sharing in the relay system with teleportation of non-maximally entanglement.
Int. J. Internet Protoc. Technol., 2014

MIMO radar antenna array synthesis with a hybrid approach based on GA and PSO.
Int. J. Embed. Syst., 2014

2013
Probabilistic quantum relay communication in the noisy channel with analogous space-time code.
Quantum Inf. Process., 2013

Batch proxy quantum blind signature scheme.
Sci. China Inf. Sci., 2013

NetSecRadar: A Visualization System for Network Security Situational Awareness.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013

Quantum Secret Sharing Based on Chinese Remainder Theorem in Hyperchaotic System.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013

2012
A Quantum TITO Diversity Transmission Scheme with Quantum Teleportation of Non-maximally Entangled Bell State.
Proceedings of the 11th IEEE International Conference on Trust, 2012

NetSecRadar: A real-time visualization system for network security: VAST 2012 Mini Challenge. Award: Honorable mention for interesting use of radial visualization technique.
Proceedings of the 7th IEEE Conference on Visual Analytics Science and Technology, 2012

2011
A multiparty quantum proxy group signature scheme for the entangled-state message with quantum Fourier transform.
Quantum Inf. Process., 2011

Multiparty Quantum Group Signature Scheme with Quantum Parallel Computation.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Quantum Secure Communication Based on Nonmaximally Entangled Qubit Pair and Dining Cryptographers Problem.
Proceedings of the IEEE 10th International Conference on Trust, 2011

2010
Quantum codes based on fast pauli block transforms in the finite field.
Quantum Inf. Process., 2010

2009
Design and Implementation for Transport Dispatch System in Enterprise.
Proceedings of the 2009 Third International Conference on Genetic and Evolutionary Computing, 2009

2008
Protection against Mobile Adversaries in Mobile Ad-hoc Networks.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

An Improved Scheme for Reducing the Latency of AODV in Ad Hoc Networks.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

1996
A redundant binary algorithm for RSA.
J. Comput. Sci. Technol., 1996

1992
2-neighborhoods and hamiltonian conditions.
J. Graph Theory, 1992

1985
Smallest regular graphs with girth pair (4, 2<i>t</i>+1).
Graphs Comb., 1985


  Loading...