Zhen Hong

Orcid: 0000-0001-9956-3732

According to our database1, Zhen Hong authored at least 62 papers between 1992 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Large-Scale Node Lightweight Consensus Algorithm of Blockchain for Internet of Things.
IEEE Internet Things J., November, 2024

MS-ZeroWall: Detecting Zero-Day Multi-Step Attack in Smart Home Using VAE and HMM.
IEEE Trans. Veh. Technol., September, 2024

MASiNet: Network Intrusion Detection for IoT Security Based on Meta-Learning Framework.
IEEE Internet Things J., July, 2024

Detect Insider Attacks in Industrial Cyber-physical Systems Using Multi-physical Features-based Fingerprinting.
ACM Trans. Sens. Networks, March, 2024

Trustworthy IAP: An Intelligent Applications Profiler to Investigate Vulnerabilities of Consumer Electronic Devices.
IEEE Trans. Consumer Electron., February, 2024

Meta-RFF: Few-Shot Open-Set Incremental Learning for RF Fingerprint Recognition via Multi-phase Meta Task Adaptation.
Proceedings of the Wireless Artificial Intelligent Computing Systems and Applications, 2024

2023
BisSiam: Bispectrum Siamese Network Based Contrastive Learning for UAV Anomaly Detection.
IEEE Trans. Knowl. Data Eng., December, 2023

The Importance of Expert Knowledge for Automatic Modulation Open Set Recognition.
IEEE Trans. Pattern Anal. Mach. Intell., November, 2023

AC Power Consumption Dataset.
Dataset, November, 2023

Triple Collocation of Ground-, Satellite- and Land Surface Model-Based Surface Soil Moisture Products in Oklahoma Part II: New Multi-Sensor Soil Moisture (MSSM) Product.
Remote. Sens., July, 2023

A Traceability Localization Method of Acoustic Attack Source for MEMS Gyroscope.
IEEE Embed. Syst. Lett., March, 2023

Toward Cooperative 3D Object Reconstruction with Multi-agent.
Proceedings of the IEEE International Conference on Robotics and Automation, 2023

Neural Mode Estimation.
Proceedings of the IEEE International Conference on Acoustics, 2023

Boosting Signal Modulation Few-Shot Learning with Pre-Transformation.
Proceedings of the IEEE International Conference on Acoustics, 2023

2022
ESP Spoofing: Covert Acoustic Attack on MEMS Gyroscopes in Vehicles.
IEEE Trans. Inf. Forensics Secur., 2022

EfficientTDNN: Efficient Architecture Search for Speaker Recognition.
IEEE ACM Trans. Audio Speech Lang. Process., 2022

Triple Collocation of Ground-, Satellite- and Land Surface Model-Based Surface Soil Moisture Products in Oklahoma - Part I: Individual Product Assessment.
Remote. Sens., 2022

A wearable-based posture recognition system with AI-assisted approach for healthcare IoT.
Future Gener. Comput. Syst., 2022

Modelling of the Slope Solute Loss Based on Fuzzy Neural Network Model.
Comput. Syst. Sci. Eng., 2022

Combining machine learning with radiomics features in predicting outcomes after mechanical thrombectomy in patients with acute ischemic stroke.
Comput. Methods Programs Biomed., 2022

Distributed Fusion Tracking Estimation Under Range-Only Measurement.
IEEE Access, 2022

2021
$R$-Print: A System Residuals-Based Fingerprinting for Attack Detection in Industrial Cyber-Physical Systems.
IEEE Trans. Ind. Electron., 2021

Meta-WF: Meta-Learning-Based Few-Shot Wireless Impersonation Detection for Wi-Fi Networks.
IEEE Commun. Lett., 2021

EfficientTDNN: Efficient Architecture Search for Speaker Recognition in the Wild.
CoRR, 2021

FineFool: A novel DNN object contour attack on image recognition based on the attention perturbation adversarial technique.
Comput. Secur., 2021

2020
An Improved LDA-Based ELM Classification for Intrusion Detection Algorithm in IoT Application.
Sensors, 2020

Cross-Examination of Similarity, Difference and Deficiency of Gauge, Radar and Satellite Precipitation Measuring Uncertainties for Extreme Events Using Conventional Metrics and Multiplicative Triple Collocation.
Remote. Sens., 2020

Can Remote Sensing Technologies Capture the Extreme Precipitation Event and Its Cascading Hydrological Response? A Case Study of Hurricane Harvey Using EF5 Modeling Framework.
Remote. Sens., 2020

Machine Learning-based Intrusion Detection for IoT Devices in Smart Home.
Proceedings of the 16th IEEE International Conference on Control & Automation, 2020

Distributed Nonlinear Fusion UKF.
Proceedings of the 16th IEEE International Conference on Control & Automation, 2020

2019
A secure routing protocol with regional partitioned clustering and Beta trust management in smart home.
Wirel. Networks, 2019

Method of large acceleration change for in-flight alignment of projectiles based on double-vector observations.
Trans. Inst. Meas. Control, 2019

Attacker Location Evaluation-Based Fake Source Scheduling for Source Location Privacy in Cyber-Physical Systems.
IEEE Trans. Inf. Forensics Secur., 2019

Quality-guided image classification toward information management applications.
J. Vis. Commun. Image Represent., 2019

An Energy-Efficient Topology Control Algorithm for Earth Building Monitoring Using Heterogeneous Wireless Sensor Networks.
IEEE Access, 2019

SDVisor: Secure Debug Enclave with Hypervisor.
Proceedings of the 13th IEEE International Conference on Service-Oriented System Engineering, 2019

2018
A Topology Control with Energy Balance in Underwater Wireless Sensor Networks for IoT-Based Application.
Sensors, 2018

China's 1 km Merged Gauge, Radar and Satellite Experimental Precipitation Dataset.
Remote. Sens., 2018

Procurement risk management under uncertainty: a review.
Ind. Manag. Data Syst., 2018

Fusion estimation in clustering sensor networks under stochastic deception attacks.
Int. J. Syst. Sci., 2018

Decentralized Applications: The Blockchain-Empowered Software System.
IEEE Access, 2018

Quantifying Graph Anonymity, Utility, and De-anonymity.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

2017
A tree-based topology construction algorithm with probability distribution and competition in the same layer for wireless sensor network.
Peer-to-Peer Netw. Appl., 2017

Blockchain-Empowered Fair Computational Resource Sharing System in the D2D Network.
Future Internet, 2017

Information Privacy of Cyber Transportation System: Opportunities and Challenges.
Proceedings of the 6th Annual Conference on Research in Information Technology, 2017

Near-Complete Privacy Protection: Cognitive Optimal Strategy in Location-Based Services.
Proceedings of the 2017 International Conference on Identification, 2017

Connectivity-Aware Task Outsourcing and Scheduling in D2D Networks.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017

2016
无线传感器网络(k, m)-容错连通支配集的分布式构建 (Distributed Construction for (k, m)-Fault Tolerant Connected Dominating Set in Wireless Sensor Network).
计算机科学, 2016

Energy-Efficient and Power-Optimal Topology Control with Potential Game for Heterogeneous Wireless Sensor Networks.
Proceedings of the 2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud), 2016

2015
Quality-of-Experience Optimization for a Cloud Gaming System With Ad Hoc Cloudlet Assistance.
IEEE Trans. Circuits Syst. Video Technol., 2015

无线传感器网络中一种改进的能效数据收集协议 (Improved Energy Efficient Data Gathering Protocol in Wireless Sensor Network).
计算机科学, 2015

Data Uploading and Exchange Algorithm for Mobile Sensor Networks in the City Traffic Environment.
Int. J. Distributed Sens. Networks, 2015

A Privacy and Price-Aware Inter-Cloud System.
Proceedings of the 7th IEEE International Conference on Cloud Computing Technology and Science, 2015

2014
Proactive and reactive purchasing planning under dependent demand, price, and yield risks.
OR Spectr., 2014

Adaptive Control based Particle Swarm Optimization and Chebyshev Neural Network for Chaotic Systems.
J. Comput., 2014

Energy-Efficient Weighted Observation Fusion Kalman Filtering with Randomly Delayed Measurements.
Circuits Syst. Signal Process., 2014

Reputation-based multiplayer fairness for ad-hoc cloudlet-assisted cloud gaming system.
Proceedings of the International Conference on Smart Computing, 2014

2013
A decision support system for procurement risk management in the presence of spot market.
Decis. Support Syst., 2013

2012
A risk assessment framework for logistics outsourcing.
Ind. Manag. Data Syst., 2012

2011
The theatrical calculating formulas of BFT type flexible driving with multichannel engaging.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011

2010
Design of Building Monitoring Systems Based on Wireless Sensor Networks.
Wirel. Sens. Netw., 2010

1992
Target Tracking from Binocular Image Sequence Using the Autoregressive Moving Average Model.
Proceedings of IAPR Workshop on Machine Vision Applications, 1992


  Loading...