Zhihong Rao

Orcid: 0000-0003-3627-7645

According to our database1, Zhihong Rao authored at least 18 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Prediction of UAV Positions using Particle Swarm optimisation-based Kalman filter.
Int. J. Robotics Autom., 2024

Stop-Probability-Based Network Topology Discovery Method.
IEICE Trans. Commun., 2024

ISPPFL: An incentive scheme based privacy-preserving federated learning for avatar in metaverse.
Comput. Networks, 2024

2022
Security Analysis of Shadowsocks(R) Protocol.
Secur. Commun. Networks, 2022

Feature-level interpolation-based GAN for image super-resolution.
Pers. Ubiquitous Comput., 2022

2020
Software Vulnerability Mining Based on the Human-Computer Coordination.
Proceedings of the Intelligent Human Systems Integration 2020, 2020

Vulnerability Discovery in Network Systems Based on Human-Machine Collective Intelligence.
Proceedings of the Intelligent Human Systems Integration 2020, 2020

OSAF_e: One-Stage Anchor Free Object Detection Method Considering Effective Area.
Proceedings of the Artificial Intelligence and Mobile Services - AIMS 2020, 2020

Attention-Based Interaction Trajectory Prediction.
Proceedings of the Artificial Intelligence and Mobile Services - AIMS 2020, 2020

2019
General Identifiability Condition for Network Topology Monitoring with Network Tomography.
Sensors, 2019

Review of Innovative Cyberspace Security Research Inspired by Bionics Computing Methods.
Proceedings of the 2019 IEEE SmartWorld, 2019

Cyberspace Surveying and Mapping: Hierarchical Model and Resource Formalization.
Proceedings of the IEEE INFOCOM 2019, 2019

An Opcode Sequences Analysis Method For Unknown Malware Detection.
Proceedings of the 2019 2nd International Conference on Geoinformatics and Data Analysis, 2019

An Analysis Model of Buffer Overflow Vulnerability Based on FSM.
Proceedings of the 2019 2nd International Conference on Geoinformatics and Data Analysis, 2019

2018
Tor anonymous traffic identification based on gravitational clustering.
Peer-to-Peer Netw. Appl., 2018

A massive RDF storage approach based on graph database.
Proceedings of the International Conference on Geoinformatics and Data Analysis, 2018

2008
Nonlinear Modeling and Control of Servo Pneumatic Actuators.
IEEE Trans. Control. Syst. Technol., 2008

2006
Modeling and Control of a Miniature Servo Pneumatic Actuator.
Proceedings of the 2006 IEEE International Conference on Robotics and Automation, 2006


  Loading...