Zhixin Sun
Orcid: 0000-0001-6148-9688
According to our database1,
Zhixin Sun
authored at least 140 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
A designated private set based trapdoor authentication scheme for privacy preserving trust management in decentralized systems.
Discov. Comput., December, 2024
Directed dynamic attribute graph anomaly detection based on evolved graph attention for blockchain.
Knowl. Inf. Syst., February, 2024
Spatial-temporal knowledge distillation for lightweight network traffic anomaly detection.
Comput. Secur., February, 2024
DRL-based intelligent resource allocation for physical layer semantic communication with IRS.
Phys. Commun., 2024
An energy-efficient asynchronous neighbor discovery algorithm based on cyclic difference set in duty-cycle wireless sensor networks.
J. Netw. Comput. Appl., 2024
Eng. Appl. Artif. Intell., 2024
Jade: A Differentiable Physics Engine for Articulated Rigid Bodies with Intersection-Free Frictional Contact.
Proceedings of the IEEE International Conference on Robotics and Automation, 2024
Proceedings of the Twelfth International Conference on Learning Representations, 2024
2023
Constructing conditional PKEET with verification mechanism for data privacy protection in intelligent systems.
J. Supercomput., September, 2023
Time-varying Characteristics of mmWave Channel based on the Clustered Sparsity Model.
Proceedings of the 98th IEEE Vehicular Technology Conference, 2023
Proceedings of the IEEE International Conference on Acoustics, 2023
SINCO: A Novel Structural Regularizer for Image Compression Using Implicit Neural Representations.
Proceedings of the IEEE International Conference on Acoustics, 2023
Proceedings of the IEEE Intl Conf on Dependable, 2023
Diff-LfD: Contact-aware Model-based Learning from Visual Demonstration for Robotic Manipulation via Differentiable Physics-based Simulation and Rendering.
Proceedings of the Conference on Robot Learning, 2023
2022
Phys. Commun., 2022
TS-ABOS-CMS: time-bounded secure attribute-based online/offline signature with constant message size for IoT systems.
J. Syst. Archit., 2022
KSII Trans. Internet Inf. Syst., 2022
Designing and application of modified SSA based ADRC controller for overhead crane systems.
Int. J. Intell. Robotics Appl., 2022
Dual-Scale Alignment-Based Transformer on Linguistic Skeleton Tags for Non-Autoregressive Video Captioning.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2022
Proceedings of the IEEE International Conference on Multimedia and Expo, 2022
SDN traffic anomaly detection method based on convolutional autoencoder and federated learning.
Proceedings of the IEEE Global Communications Conference, 2022
Research on fire rescue path optimization of unmanned equipment based on improved Slime mould Algorithm.
Proceedings of the IEEE Intl. Conf. on Dependable, 2022
Proceedings of the IEEE Intl. Conf. on Dependable, 2022
Proceedings of the Advanced Data Mining and Applications - 18th International Conference, 2022
2021
Peer-to-Peer Netw. Appl., 2021
A Fine-Grained Attribute Based Data Retrieval with Proxy Re-Encryption Scheme for Data Outsourcing Systems.
Mob. Networks Appl., 2021
J. Syst. Archit., 2021
KSII Trans. Internet Inf. Syst., 2021
IEEE Internet Things J., 2021
Int. J. Intell. Robotics Appl., 2021
Trans. Emerg. Telecommun. Technol., 2021
Distributed time synchronization algorithm based on sequential belief propagation in wireless sensor networks.
Comput. Commun., 2021
IEEE Access Special Section Editorial: Blockchain Technology: Principles and Applications.
IEEE Access, 2021
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2021, 2021
A Mobile Internet Multi-level Two-way Identity Authentication Scheme Based on Zero Trust.
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021
Proceedings of the IEEE Intl Conf on Dependable, 2021
Proceedings of the IEEE Intl Conf on Dependable, 2021
2020
Visual Browse and Exploration in Motion Capture Data with Phylogenetic Tree of Context-Aware Poses.
Sensors, 2020
An immune clone selection based power control strategy for alleviating energy hole problems in wireless sensor networks.
J. Ambient Intell. Humaniz. Comput., 2020
IEEE Internet Things J., 2020
An Adaptive DE Algorithm Based Fuzzy Logic Anti-swing Controller for Overhead Crane Systems.
Int. J. Fuzzy Syst., 2020
UAV-aided networks with optimization allocation via artificial bee colony with intellective search.
EURASIP J. Wirel. Commun. Netw., 2020
Research on Key Technologies of Logistics Information Traceability Model Based on Consortium Chain.
IEEE Access, 2020
2019
IEEE Trans. Vis. Comput. Graph., 2019
Sensors, 2019
Secur. Commun. Networks, 2019
Toward secure and accountable data transmission in Narrow Band Internet of Things based on blockchain.
Int. J. Distributed Sens. Networks, 2019
IEEE Access, 2019
IEEE Access, 2019
A Survey of Techniques for Mobile Service Encrypted Traffic Classification Using Deep Learning.
IEEE Access, 2019
IEEE Access, 2019
A Ciphertext Policy Attribute Based Signcryption Scheme with Secure and Flexible Key Evolving.
Proceedings of the 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2019
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019
A Deep Belief Networks Based Prediction Method for Identification of Disease-Associated Non-coding SNPs in Human Genome.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019
Proceedings of the 2019 IEEE Intl Conf on Dependable, 2019
Research on Vehicle Routing Problem with time Windows Based on the Dragonfly Algorithm.
Proceedings of the 2019 IEEE Intl Conf on Dependable, 2019
Achieving Data Security, Access Control and Authentication of Controllers in Hierarchical Software Defined Networking with Attribute Based Encryption.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019
2018
Sharing your privileges securely: a key-insulated attribute based proxy re-encryption scheme for IoT.
World Wide Web, 2018
IEEE Trans. Intell. Transp. Syst., 2018
Achieving secure data access control and efficient key updating in mobile multimedia sensor networks.
Multim. Tools Appl., 2018
J. Intell. Fuzzy Syst., 2018
A Coordinated Ciphertext Policy Attribute-based PHR Access Control with User Accountability.
KSII Trans. Internet Inf. Syst., 2018
Circuits Syst. Signal Process., 2018
A Weighted Frequent Itemset Mining Algorithm for Intelligent Decision in Smart Systems.
IEEE Access, 2018
IEEE Access, 2018
IEEE Access, 2018
A Smart Automated Signature Extraction Scheme for Mobile Phone Number in Human-Centered Smart Home Systems.
IEEE Access, 2018
Performance Modeling and Suitability Assessment of Data Center Based on Fog Computing in Smart Systems.
IEEE Access, 2018
Optimal Sliding Mode Controller Design Based on Dynamic Differential Evolutionary Algorithm for Under-Actuated Crane Systems.
IEEE Access, 2018
Type-2 Fuzzy Sliding Mode Anti-Swing Controller Design and Optimization for Overhead Crane.
IEEE Access, 2018
IEEE Access, 2018
Cognitive Radio-Based Smart Grids: From the Perspective of Full-Duplex Primary Users.
IEEE Access, 2018
Proceedings of the IEEE/CIC International Conference on Communications in China, 2018
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018
The Controller Placement of Software-Defined Networks Based on Minimum Delay and Load Balancing.
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018
ARP-CP-ABE: Toward Efficient, Secure and Flexible Access Control for Personal Health Record Systems.
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018
2017
Wirel. Pers. Commun., 2017
Towards Secure Data Retrieval for Multi-Tenant Architecture Using Attribute-Based Key Word Search.
Symmetry, 2017
计算机科学, 2017
基于签名与数据流模式挖掘的Android恶意软件检测系统 (Android Static Analysis System Based on Signature and Data Flow Pattern Mining).
计算机科学, 2017
A Secure and Efficient Cloud Resource Allocation Scheme with Trust Evaluation Mechanism Based on Combinatorial Double Auction.
KSII Trans. Internet Inf. Syst., 2017
Provably secure attribute based signcryption with delegated computation and efficient key updating.
KSII Trans. Internet Inf. Syst., 2017
Concurrent transmission mechanism to mitigate pan-exposed-node problems in wireless sensor networks.
Int. J. Distributed Sens. Networks, 2017
Efficient key insulated attribute based signature without bilinear pairings for mobile communications.
Autom. Control. Comput. Sci., 2017
A Collaborative Key Management Protocol in Ciphertext Policy Attribute-Based Encryption for Cloud Data Sharing.
IEEE Access, 2017
Proceedings of the Intelligent Computing Theories and Application, 2017
Application of Adaptive Genetic Algorithm for Multimodal Transportation Logistics Distribution Routing Problem.
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017
Proceedings of the 2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2017
2016
Joint Energy Management Strategy for Geo-Distributed Data Centers and Electric Vehicles in Smart Grid Environment.
IEEE Trans. Smart Grid, 2016
基于动态分析的Android应用程序安全研究 (Security Survey on Android Application Based on Dynamic Analysis).
计算机科学, 2016
An efficient and traceable KP-ABS scheme with untrusted attribute authority in cloud computing.
J. Cloud Comput., 2016
KSII Trans. Internet Inf. Syst., 2016
A key-insulated CP-ABE with key exposure accountability for secure data sharing in the cloud.
KSII Trans. Internet Inf. Syst., 2016
KSII Trans. Internet Inf. Syst., 2016
Int. J. Wirel. Mob. Comput., 2016
IEICE Trans. Inf. Syst., 2016
Compressive network coding for wireless sensor networks: Spatio-temporal coding and optimization design.
Comput. Networks, 2016
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Networks, 2016
Proceedings of the Intelligent Computing Theories and Application, 2016
Proceedings of the Intelligent Computing Theories and Application, 2016
Proceedings of the Intelligent Computing Methodologies - 12th International Conference, 2016
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016
2015
Research of Neighbor Discovery for IPv6 over Low-Power Wireless Personal Area Networks.
EAI Endorsed Trans. Self Adapt. Syst., 2015
计算机科学, 2015
Int. J. Distributed Sens. Networks, 2015
Combining network coding and compressed sensing for error correction in wireless sensor networks.
Int. J. Commun. Syst., 2015
IEEE Commun. Lett., 2015
EAI Endorsed Trans. Cogn. Commun., 2015
Sci. China Inf. Sci., 2015
Proceedings of the 11th International Conference on Heterogeneous Networking for Quality, 2015
Proceedings of the 11th International Conference on Heterogeneous Networking for Quality, 2015
Proceedings of the 24th International Conference on Computer Communication and Networks, 2015
Proceedings of the 2015 IEEE Global Communications Conference, 2015
2014
Wirel. Networks, 2014
J. Networks, 2014
P2P traffic identification method based on an improvement incremental SVM learning algorithm.
Proceedings of the 2014 International Symposium on Wireless Personal Multimedia Communications, 2014
2013
Sci. China Inf. Sci., 2013
2012
Toward collinearity-aware and conflict-friendly localization for wireless sensor networks.
Comput. Commun., 2012
2011
Appl. Math. Comput., 2011
2010
Proceedings of the GCC 2010, 2010
2009
J. Comput., 2009
Proceedings of the Scalable Information Systems, 4th International ICST Conference, 2009
2008
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
2005
On Intelligent Agent-based Decoy Systems.
Proceedings of The 2005 International Conference on Security and Management, 2005