Zhihong Tian
Orcid: 0000-0002-9409-5359
According to our database1,
Zhihong Tian
authored at least 249 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IEEE Trans. Netw. Serv. Manag., October, 2024
Design of Intelligent Control Under Machine Learning Supervision and Signal Compression Mechanism Design for NCSs Under DoS Attacks.
IEEE Trans. Intell. Transp. Syst., October, 2024
IEEE Trans. Knowl. Data Eng., September, 2024
A Novel Network Forensic Framework for Advanced Persistent Threat Attack Attribution Through Deep Learning.
IEEE Trans. Intell. Transp. Syst., September, 2024
IEEE Netw., September, 2024
IEEE Trans. Neural Networks Learn. Syst., August, 2024
PANNER: POS-Aware Nested Named Entity Recognition Through Heterogeneous Graph Neural Network.
IEEE Trans. Comput. Soc. Syst., August, 2024
STIDNet: Identity-Aware Face Forgery Detection With Spatiotemporal Knowledge Distillation.
IEEE Trans. Comput. Soc. Syst., August, 2024
World Wide Web (WWW), July, 2024
Proc. VLDB Endow., July, 2024
IEEE Internet Things J., May, 2024
Recursive Multi-Tree Construction With Efficient Rule Sifting for Packet Classification on FPGA.
IEEE/ACM Trans. Netw., April, 2024
IEEE Trans. Neural Networks Learn. Syst., April, 2024
IEEE Trans. Comput. Soc. Syst., April, 2024
BlockSC: A Blockchain Empowered Spatial Crowdsourcing Service in Metaverse While Preserving User Location Privacy.
IEEE J. Sel. Areas Commun., April, 2024
Optimizing Mobility-Aware Task Offloading in Smart Healthcare for Internet of Medical Things Through Multiagent Reinforcement Learning.
IEEE Internet Things J., April, 2024
J. Signal Process. Syst., March, 2024
IEEE Trans. Software Eng., March, 2024
Intelligent Event-Triggered Control Supervised by Mini-Batch Machine Learning and Data Compression Mechanism for T-S Fuzzy NCSs Under DoS Attacks.
IEEE Trans. Fuzzy Syst., March, 2024
Proc. VLDB Endow., March, 2024
Fundus Image Enhancement via Semi-Supervised GAN and Anatomical Structure Preservation.
IEEE Trans. Emerg. Top. Comput. Intell., February, 2024
DNN Inference Acceleration for Smart Devices in Industry 5.0 by Decentralized Deep Reinforcement Learning.
IEEE Trans. Consumer Electron., February, 2024
IEEE Internet Things J., February, 2024
Size-Constrained Community Search on Large Networks: An Effective and Efficient Solution.
IEEE Trans. Knowl. Data Eng., January, 2024
Performance Analysis and Design of Intelligent Optimising Integral-Based Event-Trigger Control for Autonomous Ground Vehicles Under DoS Attacks.
IEEE Trans. Intell. Veh., January, 2024
An Access Control Method Against Unauthorized and Noncompliant Behaviors of Real-Time Data in Industrial IoT.
IEEE Internet Things J., January, 2024
ICRB: An improved consensus-based redactable blockchain considering contextual consistency.
Trans. Emerg. Telecommun. Technol., January, 2024
Privacy-Preserving Convolutional Neural Network Classification Scheme With Multiple Keys.
IEEE Trans. Serv. Comput., 2024
IEEE Trans. Inf. Forensics Secur., 2024
Stability Analysis of Networked Control Systems Under DoS Attacks and Security Controller Design With Mini-Batch Machine Learning Supervision.
IEEE Trans. Inf. Forensics Secur., 2024
Knowl. Based Syst., 2024
Analysis on unit maximum capacity of orthogonal multiple watermarking for multimedia signals in B5G wireless communications.
Digit. Commun. Networks, 2024
Data tampering detection and recovery scheme based on multi-branch target extraction for internet of vehicles.
Comput. Networks, 2024
CAAI Trans. Intell. Technol., 2024
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024
Proceedings of the IEEE International Conference on Acoustics, 2024
Proceedings of the Computer Vision - ECCV 2024, 2024
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
Evaluation Mechanism for Decentralized Collaborative Pattern Learning in Heterogeneous Vehicular Networks.
IEEE Trans. Intell. Transp. Syst., November, 2023
IEEE Consumer Electron. Mag., November, 2023
Decentralized Cooperative Caching for Sustainable Metaverse Via Meta Self-Supervision Learning.
IEEE Wirel. Commun., October, 2023
Personalized sampling graph collection with local differential privacy for link prediction.
World Wide Web (WWW), September, 2023
REMSF: A Robust Ensemble Model of Malware Detection Based on Semantic Feature Fusion.
IEEE Internet Things J., September, 2023
Diverse classifiers with label dependencies for long-tail relation extraction in big data.
Comput. Electr. Eng., September, 2023
Comput. Networks, August, 2023
IEEE Trans. Knowl. Data Eng., July, 2023
CSKG4APT: A Cybersecurity Knowledge Graph for Advanced Persistent Threat Organization Attribution.
IEEE Trans. Knowl. Data Eng., June, 2023
IEEE Trans. Knowl. Data Eng., May, 2023
Residual long short-term memory network with multi-source and multi-frequency information fusion: An application to China's stock market.
Inf. Sci., April, 2023
Adaptive Information Hiding Method Based on Feature Extraction for Visible Light Communication.
IEEE Commun. Mag., April, 2023
World Wide Web (WWW), March, 2023
IEEE Trans. Knowl. Data Eng., March, 2023
IEEE Trans. Sustain. Comput., 2023
A Semi-Centralized Trust Management Model Based on Blockchain for Data Exchange in IoT System.
IEEE Trans. Serv. Comput., 2023
A Blockchain-Empowered Federated Learning in Healthcare-Based Cyber Physical Systems.
IEEE Trans. Netw. Sci. Eng., 2023
Privacy Protection Method Based On Multidimensional Feature Fusion Under 6G Networks.
IEEE Trans. Netw. Sci. Eng., 2023
IEEE Trans. Netw. Sci. Eng., 2023
Imbalanced Malware Family Classification Using Multimodal Fusion and Weight Self-Learning.
IEEE Trans. Intell. Transp. Syst., 2023
Knowl. Based Syst., 2023
Rethinking Perturbation Directions for Imperceptible Adversarial Attacks on Point Clouds.
IEEE Internet Things J., 2023
CWEmd: A Lightweight Similarity Measurement for Resource-Constrained Vehicular Networks.
IEEE Internet Things J., 2023
Do Not Trust the Clouds Easily: The Insecurity of Content Security Policy Based on Object Storage.
IEEE Internet Things J., 2023
Power normalized cepstral robust features of deep neural networks in a cloud computing data privacy protection scheme.
Neurocomputing, 2023
Proceedings of the IEEE International Conference on Metaverse Computing, 2023
Improving Precision of Detecting Deserialization Vulnerabilities with Bytecode Analysis.
Proceedings of the 31st IEEE/ACM International Symposium on Quality of Service, 2023
Proceedings of the International Wireless Communications and Mobile Computing, 2023
Proceedings of the IEEE International Conference on Data Mining, 2023
Proceedings of the IEEE Global Communications Conference, 2023
Proceedings of the 12th IEEE International Conference on Cloud Networking, 2023
Proceedings of the 12th IEEE International Conference on Cloud Networking, 2023
Proceedings of the 12th IEEE International Conference on Cloud Networking, 2023
Proceedings of the 12th IEEE International Conference on Cloud Networking, 2023
Proceedings of the 12th IEEE International Conference on Cloud Networking, 2023
Vulnerability Correlation, Multi-step Attack and Exploit Chain in Breach and Attack Simulation.
Proceedings of the 12th IEEE International Conference on Cloud Networking, 2023
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023
2022
From Data and Model Levels: Improve the Performance of Few-Shot Malware Classification.
IEEE Trans. Netw. Serv. Manag., December, 2022
VRepChain: A Decentralized and Privacy-Preserving Reputation System for Social Internet of Vehicles Based on Blockchain.
IEEE Trans. Veh. Technol., 2022
DeepAutoD: Research on Distributed Machine Learning Oriented Scalable Mobile Communication Security Unpacking System.
IEEE Trans. Netw. Sci. Eng., 2022
IEEE Trans. Netw. Sci. Eng., 2022
IEEE Trans. Ind. Informatics, 2022
IEEE Trans. Ind. Informatics, 2022
IEPSBP: A Cost-Efficient Image Encryption Algorithm Based on Parallel Chaotic System for Green IoT.
IEEE Trans. Green Commun. Netw., 2022
Softw. Pract. Exp., 2022
STG2P: A two-stage pipeline model for intrusion detection based on improved LightGBM and K-means.
Simul. Model. Pract. Theory, 2022
IEEE Netw., 2022
A framework for personalized recommendation with conditional generative adversarial networks.
Knowl. Inf. Syst., 2022
J. Parallel Distributed Comput., 2022
Neurocomputing, 2022
TPRPF: a preserving framework of privacy relations based on adversarial training for texts in big data.
Frontiers Comput. Sci., 2022
CoRR, 2022
CoRR, 2022
A Blockchain-Based Distributed Computational Resource Trading System for Industrial Internet of Things Considering Multiple Preferences.
CoRR, 2022
MRI radiogenomics for intelligent diagnosis of breast tumors and accurate prediction of neoadjuvant chemotherapy responses-a review.
Comput. Methods Programs Biomed., 2022
Improving adversarial transferability by temporal and spatial momentum in urban speaker recognition systems.
Comput. Electr. Eng., 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 2022 International Wireless Communications and Mobile Computing, 2022
2021
Proceedings of the MDATA: A New Knowledge Representation Model, 2021
Proceedings of the MDATA: A New Knowledge Representation Model, 2021
Proceedings of the MDATA: A New Knowledge Representation Model, 2021
Classifying encrypted traffic using adaptive fingerprints with multi-level attributes.
World Wide Web, 2021
IEEE Wirel. Commun., 2021
Introduction to the Special Section on Artificial Intelligence Security: Adversarial Attack and Defense.
IEEE Trans. Netw. Sci. Eng., 2021
IEEE Trans. Intell. Transp. Syst., 2021
IEEE Trans. Ind. Informatics, 2021
A Novel Web Attack Detection System for Internet of Things via Ensemble Classification.
IEEE Trans. Ind. Informatics, 2021
Contract and Lyapunov Optimization-Based Load Scheduling and Energy Management for UAV Charging Stations.
IEEE Trans. Green Commun. Netw., 2021
Deep-Green: A Dispersed Energy-Efficiency Computing Paradigm for Green Industrial IoT.
IEEE Trans. Green Commun. Netw., 2021
IEEE Trans. Green Commun. Netw., 2021
A Topic Representation Model for Online Social Networks Based on Hybrid Human-Artificial Intelligence.
IEEE Trans. Comput. Soc. Syst., 2021
Malicious mining code detection based on ensemble learning in cloud computing environment.
Simul. Model. Pract. Theory, 2021
Secur. Commun. Networks, 2021
Attribution Classification Method of APT Malware in IoT Using Machine Learning Techniques.
Secur. Commun. Networks, 2021
The Security of Internet of Vehicles Network: Adversarial Examples for Trajectory Mode Detection.
IEEE Netw., 2021
AutoD: Intelligent Blockchain Application Unpacking Based on JNI Layer Deception Call.
IEEE Netw., 2021
IEEE Netw., 2021
Mob. Networks Appl., 2021
Research on Intelligent Detection of Command Level Stack Pollution for Binary Program Analysis.
Mob. Networks Appl., 2021
A multiple-kernel clustering based intrusion detection scheme for 5G and IoT networks.
Int. J. Mach. Learn. Cybern., 2021
Power Grid-Oriented Cascading Failure Vulnerability Identifying Method Based on Wireless Sensors.
J. Sensors, 2021
Multi-party transaction framework for drone services based on alliance blockchain in smart cities.
J. Inf. Secur. Appl., 2021
Inf. Process. Manag., 2021
CorrAUC: A Malicious Bot-IoT Traffic Detection Method in IoT Network Using Machine-Learning Techniques.
IEEE Internet Things J., 2021
Editorial: Intelligence and Safety for Humanoid Robots: Design, Control, and Applications.
Frontiers Neurorobotics, 2021
PWG-IDS: An Intrusion Detection Model for Solving Class Imbalance in IIoT Networks Using Generative Adversarial Networks.
CoRR, 2021
Computing, 2021
Proof of Learning (PoLe): Empowering neural network training with consensus building on blockchains.
Comput. Networks, 2021
An Interactive System for Unfair Rating Detection Models in a Customized Perspective.
Proceedings of the 20th IEEE International Conference on Trust, 2021
Mask is All You Need: Rethinking Mask R-CNN for Dense and Arbitrary-Shaped Scene Text Detection.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021
NASGuard: A Novel Accelerator Architecture for Robust Neural Architecture Search (NAS) Networks.
Proceedings of the 48th ACM/IEEE Annual International Symposium on Computer Architecture, 2021
Proceedings of the 40th IEEE Conference on Computer Communications, 2021
Proceedings of the IEEE International Conference on Data Mining, 2021
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021
2020
World Wide Web, 2020
SoftSystem: Smart Edge Computing Device Selection Method for IoT Based on Soft Set Technique.
Wirel. Commun. Mob. Comput., 2020
A Reputation Management Scheme for Efficient Malicious Vehicle Identification over 5G Networks.
IEEE Wirel. Commun., 2020
Artificial Intelligence Security in 5G Networks: Adversarial Examples for Estimating a Travel Time Task.
IEEE Veh. Technol. Mag., 2020
IEEE Trans. Sustain. Comput., 2020
Delving Deeper in Drone-Based Person Re-Id by Employing Deep Decision Forest and Attributes Fusion.
ACM Trans. Multim. Comput. Commun. Appl., 2020
DHPA: Dynamic Human Preference Analytics Framework: A Case Study on Taxi Drivers' Learning Curve Analysis.
ACM Trans. Intell. Syst. Technol., 2020
IEEE Trans. Ind. Informatics, 2020
Nei-TTE: Intelligent Traffic Time Estimation Based on Fine-Grained Time Derivation of Road Segments for Smart City.
IEEE Trans. Ind. Informatics, 2020
IEEE Trans. Comput. Soc. Syst., 2020
A Low-Latency and Energy-Efficient Neighbor Discovery Algorithm for Wireless Sensor Networks.
Sensors, 2020
Preserving Location Privacy in UASN through Collaboration and Semantic Encapsulation.
IEEE Netw., 2020
Location Privacy Challenges in Mobile Edge Computing: Classification and Exploration.
IEEE Netw., 2020
Obstructive sleep apnea detection using ecg-sensor with convolutional neural networks.
Multim. Tools Appl., 2020
A novel routing verification approach based on blockchain for inter-domain routing in smart metropolitan area networks.
J. Parallel Distributed Comput., 2020
The effect of trade creation in China-Asean free trade area based on the gravity model.
J. Intell. Fuzzy Syst., 2020
Vcash: A Novel Reputation Framework for Identifying Denial of Traffic Service in Internet of Connected Vehicles.
IEEE Internet Things J., 2020
IEEE Internet Things J., 2020
Deep Reinforcement Learning for Partially Observable Data Poisoning Attack in Crowdsensing Systems.
IEEE Internet Things J., 2020
A consistency-guaranteed approach for Internet of Things <i>software refactoring</i>.
Int. J. Distributed Sens. Networks, 2020
Int. J. Distributed Sens. Networks, 2020
Research on android infiltration technology based on the silent installation of an accessibility service.
Int. J. Distributed Sens. Networks, 2020
Selection of effective machine learning algorithm and Bot-IoT attacks traffic identification for internet of things in smart city.
Future Gener. Comput. Syst., 2020
Advanced persistent threat organization identification based on software gene of malware.
Trans. Emerg. Telecommun. Technol., 2020
The QoS and privacy trade-off of adversarial deep learning: An evolutionary game approach.
Comput. Secur., 2020
IoT malicious traffic identification using wrapper-based feature selection mechanisms.
Comput. Secur., 2020
Security of Mobile Multimedia Data: The Adversarial Examples for Spatio-temporal Data.
Comput. Networks, 2020
Appl. Math. Comput., 2020
A Lightweight Privacy-Preserving Communication Protocol for Heterogeneous IoT Environment.
IEEE Access, 2020
IEEE Access, 2020
Inferring Passengers' Interactive Choices on Public Transits via MA-AL: Multi-Agent Apprenticeship Learning.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020
Proceedings of the 2020 IEEE International Conference on Systems, Man, and Cybernetics, 2020
Proceedings of the 16th International Wireless Communications and Mobile Computing Conference, 2020
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
Proceedings of the IEEE International Conference on Informatics, 2020
Proceedings of the CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, 2020
Proceedings of the CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, 2020
2019
Evaluating Reputation Management Schemes of Internet of Vehicles Based on Evolutionary Game Theory.
IEEE Trans. Veh. Technol., 2019
Real-Time Lateral Movement Detection Based on Evidence Reasoning Network for Edge Computing Environment.
IEEE Trans. Ind. Informatics, 2019
Sensors, 2019
Erratum: Wang, Y. et al., A Privacy Preserving Scheme for Nearest Neighbor Query. <i>Sensors</i> 2018, <i>18</i>, 2440.
Sensors, 2019
A Fine-Grained Video Encryption Service Based on the Cloud-Fog-Local Architecture for Public and Private Videos.
Sensors, 2019
Low-Power Distributed Data Flow Anomaly-Monitoring Technology for Industrial Internet of Things.
Sensors, 2019
Multim. Tools Appl., 2019
J. Ambient Intell. Humaniz. Comput., 2019
Inf. Sci., 2019
IEEE Internet Things J., 2019
Timescale diversity facilitates the emergence of cooperation-extortion alliances in networked systems.
Neurocomputing, 2019
Future Gener. Comput. Syst., 2019
Automated Attack and Defense Framework for 5G Security on Physical and Logical Layers.
CoRR, 2019
Vcash: A Novel Reputation Framework for Identifying Denial of Traffic Service in Internet of Connected Vehicles.
CoRR, 2019
Popularity-driven strategy updating rule promotes cooperation in the spatial prisoner's dilemma game.
Appl. Math. Comput., 2019
Crowdsourcing Approach for Developing Hands-On Experiments in Cybersecurity Education.
IEEE Access, 2019
IEEE Access, 2019
Quantitative Assessment of Wireless Connected Intelligent Robot Swarms Network Security Situation.
IEEE Access, 2019
Can the Max-Min Fairness-Based Coalitional Mechanism in Competitive Networks be Trustful?
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
A Genetic-Algorithm Based Method for Storage Location Assignments in Mobile Rack Warehouses.
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Proceedings of the 27th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, 2019
2018
A Data Leakage Prevention Method Based on the Reduction of Confidential and Context Terms for Smart Mobile Devices.
Wirel. Commun. Mob. Comput., 2018
Wirel. Commun. Mob. Comput., 2018
Sensors, 2018
EURASIP J. Image Video Process., 2018
A Real-Time Correlation of Host-Level Events in Cyber Range Service for Smart Campus.
IEEE Access, 2018
IEEE Access, 2018
Proceedings of the Information and Communications Security - 20th International Conference, 2018
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018
Automatic Taxonomy Construction for Eye Colors Data without Using Context Information.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018
Deep Learning Based Attribute Classification Insider Threat Detection for Data Security.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018
2017
A Conditional Probability Computation Method for Vulnerability Exploitation Based on CVSS.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017
2016
Inf. Technol. Manag., 2016
Int. J. Serv. Technol. Manag., 2016
Proceedings of the International Conference on Logistics, Informatics and Service Sciences, 2016
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016
2015
Secur. Commun. Networks, 2015
2013
J. Electron. Commer. Organ., 2013
Proceedings of the Trustworthy Computing and Services, 2013
The Analysis of County Science and Technology Worker Internet Usage and Its Influence Factors.
Proceedings of the Computer and Computing Technologies in Agriculture VII, 2013
2011
A New Chinese Public Welfare Operation Mode based on Value Network Model.
Proceedings of the ICEIS 2011, 2011
Study on the Knowledge -Sharing Network of Innovation Teams using Social Network Analysis.
Proceedings of the ICEIS 2011, 2011
Study on the Evolution Mechanisms of the Network Public Opinion.
Proceedings of the ICEIS 2011, 2011
2009
Building lightweight intrusion detection system using wrapper-based feature selection mechanisms.
Comput. Secur., 2009
Proceedings of the 18th International Conference on World Wide Web, 2009
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009
2008
A lightweight web server anomaly detection method based on transductive scheme and genetic algorithms.
Comput. Commun., 2008
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), 2008
A Stochastic Game Theoretic Approach to Attack Prediction and Optimal Active Defense Strategy Decision.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008
Proceedings of the International Conference on Cyberworlds 2008, 2008
2007
A Game Theoretic Method for Decision and Analysis of the Optimal Active Defense Strategy.
Proceedings of the Computational Intelligence and Security, International Conference, 2007
2006
Defending against distributed denial-of-service attacks with an auction-based method.
Web Intell. Agent Syst., 2006
2004
Defending Against Flash Crowds and Malicious Traffic Attacks with An Auction-Based Method.
Proceedings of the 2004 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2004), 2004