Zhixin Sun

Orcid: 0000-0001-6148-9688

According to our database1, Zhixin Sun authored at least 140 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A designated private set based trapdoor authentication scheme for privacy preserving trust management in decentralized systems.
Discov. Comput., December, 2024

Directed dynamic attribute graph anomaly detection based on evolved graph attention for blockchain.
Knowl. Inf. Syst., February, 2024

Spatial-temporal knowledge distillation for lightweight network traffic anomaly detection.
Comput. Secur., February, 2024

DRL-based intelligent resource allocation for physical layer semantic communication with IRS.
Phys. Commun., 2024

An energy-efficient asynchronous neighbor discovery algorithm based on cyclic difference set in duty-cycle wireless sensor networks.
J. Netw. Comput. Appl., 2024

An meta-cognitive based logistics human resource modeling and optimal scheduling.
Eng. Appl. Artif. Intell., 2024

Jade: A Differentiable Physics Engine for Articulated Rigid Bodies with Intersection-Free Frictional Contact.
Proceedings of the IEEE International Conference on Robotics and Automation, 2024

A Plug-and-Play Image Registration Network.
Proceedings of the Twelfth International Conference on Learning Representations, 2024

2023
Constructing conditional PKEET with verification mechanism for data privacy protection in intelligent systems.
J. Supercomput., September, 2023

A Structured Pruning Algorithm for Model-based Deep Learning.
CoRR, 2023

Time-varying Characteristics of mmWave Channel based on the Clustered Sparsity Model.
Proceedings of the 98th IEEE Vehicular Technology Conference, 2023

Robustness of Deep Equilibrium Architectures to Changes in the Measurement Model.
Proceedings of the IEEE International Conference on Acoustics, 2023

SINCO: A Novel Structural Regularizer for Image Compression Using Implicit Neural Representations.
Proceedings of the IEEE International Conference on Acoustics, 2023

Commodity Personalized Recommendation Algorithm Based on the Knowledge Graph.
Proceedings of the IEEE Intl Conf on Dependable, 2023

Diff-LfD: Contact-aware Model-based Learning from Visual Demonstration for Robotic Manipulation via Differentiable Physics-based Simulation and Rendering.
Proceedings of the Conference on Robot Learning, 2023

2022
Robust secrecy rate maximization in IRS-assisted cognitive radio networks.
Phys. Commun., 2022

TS-ABOS-CMS: time-bounded secure attribute-based online/offline signature with constant message size for IoT systems.
J. Syst. Archit., 2022

Scalable Blockchain Storage Model Based on DHT and IPFS.
KSII Trans. Internet Inf. Syst., 2022

Designing and application of modified SSA based ADRC controller for overhead crane systems.
Int. J. Intell. Robotics Appl., 2022

Dual-Scale Alignment-Based Transformer on Linguistic Skeleton Tags for Non-Autoregressive Video Captioning.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2022

Visual-Aware Attention Dual-Stream Decoder for Video Captioning.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2022

SDN traffic anomaly detection method based on convolutional autoencoder and federated learning.
Proceedings of the IEEE Global Communications Conference, 2022

Research on fire rescue path optimization of unmanned equipment based on improved Slime mould Algorithm.
Proceedings of the IEEE Intl. Conf. on Dependable, 2022

Improved Carnivorous Plant Algorithm based on Hybrid Strategy and its application.
Proceedings of the IEEE Intl. Conf. on Dependable, 2022

A Collaborative Filtering Recommendation Method with Integrated User Profiles.
Proceedings of the Advanced Data Mining and Applications - 18th International Conference, 2022

2021
A secure peer to peer multiparty transaction scheme based on blockchain.
Peer-to-Peer Netw. Appl., 2021

A Fine-Grained Attribute Based Data Retrieval with Proxy Re-Encryption Scheme for Data Outsourcing Systems.
Mob. Networks Appl., 2021

A flexible attribute based data access management scheme for sensor-cloud system.
J. Syst. Archit., 2021

Image Deduplication Based on Hashing and Clustering in Cloud Storage.
KSII Trans. Internet Inf. Syst., 2021

Performance Analysis Models of BLE Neighbor Discovery: A Survey.
IEEE Internet Things J., 2021

Designing and application of type-2 fuzzy PID control for overhead crane systems.
Int. J. Intell. Robotics Appl., 2021

A data privacy protection scheme for Internet of things based on blockchain.
Trans. Emerg. Telecommun. Technol., 2021

Visual-aware Attention Dual-stream Decoder for Video Captioning.
CoRR, 2021

Distributed time synchronization algorithm based on sequential belief propagation in wireless sensor networks.
Comput. Commun., 2021

IEEE Access Special Section Editorial: Blockchain Technology: Principles and Applications.
IEEE Access, 2021

Modeling Context-Guided Visual and Linguistic Semantic Feature for Video Captioning.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2021, 2021

A Mobile Internet Multi-level Two-way Identity Authentication Scheme Based on Zero Trust.
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021

A hyperbolic embedding for scale-free networks.
Proceedings of the IEEE Intl Conf on Dependable, 2021

MSBiNN: Multi-scale Bipartite Graph Neural Network for Recommender System.
Proceedings of the IEEE Intl Conf on Dependable, 2021

2020
Neighbor discovery latency in bluetooth low energy networks.
Wirel. Networks, 2020

Visual Browse and Exploration in Motion Capture Data with Phylogenetic Tree of Context-Aware Poses.
Sensors, 2020

An immune clone selection based power control strategy for alleviating energy hole problems in wireless sensor networks.
J. Ambient Intell. Humaniz. Comput., 2020

Deep Reinforcement Learning for Smart Home Energy Management.
IEEE Internet Things J., 2020

An Adaptive DE Algorithm Based Fuzzy Logic Anti-swing Controller for Overhead Crane Systems.
Int. J. Fuzzy Syst., 2020

UAV-aided networks with optimization allocation via artificial bee colony with intellective search.
EURASIP J. Wirel. Commun. Netw., 2020

A Blockchain Privacy Protection Scheme Based on Ring Signature.
IEEE Access, 2020

Research on Key Technologies of Logistics Information Traceability Model Based on Consortium Chain.
IEEE Access, 2020

2019
VERAM: View-Enhanced Recurrent Attention Model for 3D Shape Classification.
IEEE Trans. Vis. Comput. Graph., 2019

Energy Modeling of Neighbor Discovery in Bluetooth Low Energy Networks.
Sensors, 2019

F2P-ABS: A Fast and Secure Attribute-Based Signature for Mobile Platforms.
Secur. Commun. Networks, 2019

Toward secure and accountable data transmission in Narrow Band Internet of Things based on blockchain.
Int. J. Distributed Sens. Networks, 2019

Improved hop-based localisation algorithm for irregular networks.
IET Commun., 2019

Deep Reinforcement Learning for Smart Home Energy Management.
CoRR, 2019

Efficient DDoS Detection Based on K-FKNN in Software Defined Networks.
IEEE Access, 2019

A Third-Party Mobile Payment Scheme Based on NTRU Against Quantum Attacks.
IEEE Access, 2019

A Survey of Techniques for Mobile Service Encrypted Traffic Classification Using Deep Learning.
IEEE Access, 2019

BLE Neighbor Discovery Parameter Configuration for IoT Applications.
IEEE Access, 2019

A Ciphertext Policy Attribute Based Signcryption Scheme with Secure and Flexible Key Evolving.
Proceedings of the 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2019

A GA-Optimized Weighted Mixed Kernel Function of SVM Based on Information Entropy.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

Mining Hypernym-Hyponym Relations from Social Tags via Tag Embedding.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

Accurate and Fast DV-Hop Localization Algorithm in Irregular Networks.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

A Deep Belief Networks Based Prediction Method for Identification of Disease-Associated Non-coding SNPs in Human Genome.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

Shape Recognition with Recurrent Neural Network.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

A Review of Issues and Challenges in Fog Computing Environment.
Proceedings of the 2019 IEEE Intl Conf on Dependable, 2019

Research on Vehicle Routing Problem with time Windows Based on the Dragonfly Algorithm.
Proceedings of the 2019 IEEE Intl Conf on Dependable, 2019

Achieving Data Security, Access Control and Authentication of Controllers in Hierarchical Software Defined Networking with Attribute Based Encryption.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

2018
Sharing your privileges securely: a key-insulated attribute based proxy re-encryption scheme for IoT.
World Wide Web, 2018

Optimal Type-2 Fuzzy System For Arterial Traffic Signal Control.
IEEE Trans. Intell. Transp. Syst., 2018

Time-varying LSTM networks for action recognition.
Multim. Tools Appl., 2018

Achieving secure data access control and efficient key updating in mobile multimedia sensor networks.
Multim. Tools Appl., 2018

Adaptive type-2 fuzzy traffic signal control with on-line optimization.
J. Intell. Fuzzy Syst., 2018

Compression Method for IPSec over 6LoWPAN.
KSII Trans. Internet Inf. Syst., 2018

A Coordinated Ciphertext Policy Attribute-based PHR Access Control with User Accountability.
KSII Trans. Internet Inf. Syst., 2018

Object Tracking by Incremental Structural Learning of Deformable Parts.
Circuits Syst. Signal Process., 2018

A Weighted Frequent Itemset Mining Algorithm for Intelligent Decision in Smart Systems.
IEEE Access, 2018

New Wireless Sensor Network Localization Algorithm for Outdoor Adventure.
IEEE Access, 2018

A New Inter-Domain Information Sharing Smart System Based on ABSES in SDN.
IEEE Access, 2018

A Smart Automated Signature Extraction Scheme for Mobile Phone Number in Human-Centered Smart Home Systems.
IEEE Access, 2018

Performance Modeling and Suitability Assessment of Data Center Based on Fog Computing in Smart Systems.
IEEE Access, 2018

An Improved Intrusion Detection Algorithm Based on GA and SVM.
IEEE Access, 2018

Optimal Sliding Mode Controller Design Based on Dynamic Differential Evolutionary Algorithm for Under-Actuated Crane Systems.
IEEE Access, 2018

Type-2 Fuzzy Sliding Mode Anti-Swing Controller Design and Optimization for Overhead Crane.
IEEE Access, 2018

An Improved Feature Selection Algorithm Based on Ant Colony Optimization.
IEEE Access, 2018

A Detection Method for Anomaly Flow in Software Defined Network.
IEEE Access, 2018

Cognitive Radio-Based Smart Grids: From the Perspective of Full-Duplex Primary Users.
IEEE Access, 2018

FPGA-Based Real-time Interference Alignment Verification System.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2018

An Attribute-Based Searchable Encryption Scheme Supporting Trapdoor Updating.
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018

The Controller Placement of Software-Defined Networks Based on Minimum Delay and Load Balancing.
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018

ARP-CP-ABE: Toward Efficient, Secure and Flexible Access Control for Personal Health Record Systems.
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018

2017
A Key-Insulated Ciphertext Policy Attribute Based Signcryption for Mobile Networks.
Wirel. Pers. Commun., 2017

Towards Secure Data Retrieval for Multi-Tenant Architecture Using Attribute-Based Key Word Search.
Symmetry, 2017

无线传感器网络分簇算法综述 (Survey of Clustering Algorithms for Wireless Sensor Networks).
计算机科学, 2017

基于签名与数据流模式挖掘的Android恶意软件检测系统 (Android Static Analysis System Based on Signature and Data Flow Pattern Mining).
计算机科学, 2017

A Secure and Efficient Cloud Resource Allocation Scheme with Trust Evaluation Mechanism Based on Combinatorial Double Auction.
KSII Trans. Internet Inf. Syst., 2017

Provably secure attribute based signcryption with delegated computation and efficient key updating.
KSII Trans. Internet Inf. Syst., 2017

Concurrent transmission mechanism to mitigate pan-exposed-node problems in wireless sensor networks.
Int. J. Distributed Sens. Networks, 2017

Efficient key insulated attribute based signature without bilinear pairings for mobile communications.
Autom. Control. Comput. Sci., 2017

A Collaborative Key Management Protocol in Ciphertext Policy Attribute-Based Encryption for Cloud Data Sharing.
IEEE Access, 2017

P2P Traffic Identification Method Based on Traffic Statistical Characteristics.
Proceedings of the Intelligent Computing Theories and Application, 2017

Application of Adaptive Genetic Algorithm for Multimodal Transportation Logistics Distribution Routing Problem.
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017

SDN-based Architecture for Big Data Network.
Proceedings of the 2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2017

2016
Joint Energy Management Strategy for Geo-Distributed Data Centers and Electric Vehicles in Smart Grid Environment.
IEEE Trans. Smart Grid, 2016

ONS安全机制研究 (Research on ONS Security).
计算机科学, 2016

基于动态分析的Android应用程序安全研究 (Security Survey on Android Application Based on Dynamic Analysis).
计算机科学, 2016

An efficient and traceable KP-ABS scheme with untrusted attribute authority in cloud computing.
J. Cloud Comput., 2016

A Symmetric Lookup-based Secure P2P Routing Algorithm.
KSII Trans. Internet Inf. Syst., 2016

A key-insulated CP-ABE with key exposure accountability for secure data sharing in the cloud.
KSII Trans. Internet Inf. Syst., 2016

Data Sorting-based Adaptive Spatial Compression in Wireless Sensor Networks.
KSII Trans. Internet Inf. Syst., 2016

A fuzzy operator based bat algorithm for cloud service composition.
Int. J. Wirel. Mob. Comput., 2016

Object Tracking with Embedded Deformable Parts in Dynamic Conditional Random Fields.
IEICE Trans. Inf. Syst., 2016

Compressive network coding for wireless sensor networks: Spatio-temporal coding and optimization design.
Comput. Networks, 2016

A Design of the Event Trigger for Android Application.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Networks, 2016

Balanced Tree-Based Support Vector Machine for Friendly Analysis on Mobile Network.
Proceedings of the Intelligent Computing Theories and Application, 2016

An Improved Context-Aware Recommender Algorithm.
Proceedings of the Intelligent Computing Theories and Application, 2016

Improved Collaborative Filtering Algorithm (ICF).
Proceedings of the Intelligent Computing Methodologies - 12th International Conference, 2016

DCT-Based Adaptive Data Compression in Wireless Sensor Networks.
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016

2015
Research of Neighbor Discovery for IPv6 over Low-Power Wireless Personal Area Networks.
EAI Endorsed Trans. Self Adapt. Syst., 2015

Active learning for P2P traffic identification.
Peer-to-Peer Netw. Appl., 2015

无线传感器网络时间同步机制研究 (Overview of Time Synchronization in Wireless Sensor Networks).
计算机科学, 2015

A Novel Cooperative ARQ Method for Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2015

Combining network coding and compressed sensing for error correction in wireless sensor networks.
Int. J. Commun. Syst., 2015

A Novel Semi-Blind Polarization Adaption Technique for Cognitive Users.
IEEE Commun. Lett., 2015

An Improved 6LoWPAN Hierarchical Routing Protocol.
EAI Endorsed Trans. Cogn. Commun., 2015

Convergence analysis and application of the central force optimization algorithm.
Sci. China Inf. Sci., 2015

An improved 6LoWPAN hierarchical routing protocol.
Proceedings of the 11th International Conference on Heterogeneous Networking for Quality, 2015

A hybrid recommendation algorithm based on social networks.
Proceedings of the 11th International Conference on Heterogeneous Networking for Quality, 2015

Clustered Spatio-Temporal Compression Design for Wireless Sensor Networks.
Proceedings of the 24th International Conference on Computer Communication and Networks, 2015

An Energy-Balanced Multi-Hop Relay Transmission Scheme Based on RVNS in DTMSN.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

2014
Compressive network coding for error control in wireless sensor networks.
Wirel. Networks, 2014

Study on the Improvement of ELGamal Cryptosystem Based on Elliptic Curve.
J. Networks, 2014

P2P traffic identification method based on an improvement incremental SVM learning algorithm.
Proceedings of the 2014 International Symposium on Wireless Personal Multimedia Communications, 2014

2013
Tracking Deformable Parts via Dynamic Conditional Random Fields.
CoRR, 2013

Secure P2P topology based on a multidimensional DHT space mapping.
Sci. China Inf. Sci., 2013

2012
Toward collinearity-aware and conflict-friendly localization for wireless sensor networks.
Comput. Commun., 2012

2011
A multicast routing algorithm based on searching in directed graph.
Appl. Math. Comput., 2011

2010
Research on a Multi-layered and Multi-grouped Model for P2P Networks.
Proceedings of the GCC 2010, 2010

2009
Research of Intelligent Rule-base Based on Multilayer Intrusion Detection.
J. Comput., 2009

A Multidimensional Mapping Mechanism Based Secure Routing Method for DHT.
Proceedings of the Scalable Information Systems, 4th International ICST Conference, 2009

2008
A Method Based on AMHI for DDoS Attacks Detection and Defense.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

2005
On Intelligent Agent-based Decoy Systems.
Proceedings of The 2005 International Conference on Security and Management, 2005


  Loading...