Zheng Hong

Orcid: 0000-0002-9494-2116

According to our database1, Zheng Hong authored at least 25 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Spatial-Temporal Evolution Guided Change Detection Network for Remote Sensing Images.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2024

2022
A Modified TENO Scheme with Improved Efficiency.
J. Sci. Comput., 2022

Return Strategy and Machine Learning Optimization of Tennis Sports Robot for Human Motion Recognition.
Frontiers Neurorobotics, 2022

Fuzzy System-Based Position Tracking Iterative Learning Control for Tank Gun Control Systems With Error Constraints.
IEEE Access, 2022

2021
A priority based path searching method for improving hybrid fuzzing.
Comput. Secur., 2021

2020
A mapping-function-free WENO-M scheme with low computational cost.
J. Comput. Phys., 2020

2019
基于经纪人的多云访问控制模型研究 (Research on Broker Based Multicloud Access Control Model).
计算机科学, 2019

基于闭合序列模式挖掘的未知协议格式推断方法 (Closed Sequential Patterns Mining Based Unknown Protocol Format Inference Method).
计算机科学, 2019

Mathematical analysis of financial decentralization and economic efficiency in both state-owned and private enterprises.
Concurr. Comput. Pract. Exp., 2019

A Critical-Path-Coverage-Based Vulnerability Detection Method for Smart Contracts.
IEEE Access, 2019

2018
Multipurification of matching pairs based on ORB feature and PCB alignment case study.
J. Electronic Imaging, 2018

Deep learning-based personality recognition from text posts of online social networks.
Appl. Intell., 2018

2017
基于状态的工控协议Fuzzing测试技术 (Protocol State Based Fuzzing Method for Industrial Control Protocols).
计算机科学, 2017

A Risk Classification Based Approach for Android Malware Detection.
KSII Trans. Internet Inf. Syst., 2017

A novel destination prediction attack and corresponding location privacy protection method in geo-social networks.
Int. J. Distributed Sens. Networks, 2017

Personality Recognition on Social Media With Label Distribution Learning.
IEEE Access, 2017

2016
TraDR: 一种基于轨迹分解重构的移动社交网络位置预测方法 (TraDR: A Destination Prediction Method Based on Trajectory Decomposition and Reconstruction in Geo-social Networks).
计算机科学, 2016

Hadoop-MapReduce Job Scheduling Algorithms Survey.
Proceedings of the 7th International Conference on Cloud Computing and Big Data, 2016

2015
一种基于域知识的协议状态机主动推断算法 (Domain-specific Algorithm of Protocol State Machine Active Inference).
计算机科学, 2015

2014
DTSTM: Dynamic Tree Style Trust Measurement Model for Cloud Computing.
KSII Trans. Internet Inf. Syst., 2014

2013
Efficient Model-based Fuzz Testing Using Higher-order Attribute Grammars.
J. Softw., 2013

Icefex: Protocol Format Extraction from IL-based Concolic Execution.
KSII Trans. Internet Inf. Syst., 2013

2011
Semantics-based Access Control Approach for Web Service.
J. Comput., 2011

2009
Semantic Security Policy for Web Service.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2009

Research on Discerning Point Motional Target by Tri-interpolation Approximation.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009


  Loading...