Zhongyuan Jiang

Orcid: 0000-0001-8249-9711

According to our database1, Zhongyuan Jiang authored at least 46 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Target link protection against link-prediction-based attacks via artificial bee colony algorithm based on random walk.
Int. J. Mach. Learn. Cybern., November, 2024

Aspect-Level sentiment analysis based on fusion graph double convolutional neural networks.
Int. J. Parallel Emergent Distributed Syst., September, 2024

K-Backup: Load- and TCAM-Aware Multi-Backup Fast Failure Recovery in SDNs.
IEEE/ACM Trans. Netw., August, 2024

PSMA: Layered Deployment Scheme for Secure VNF Multiplexing Based on Primary and Secondary Multiplexing Architecture.
IEEE Trans. Netw. Serv. Manag., June, 2024

MLDR: An O(|V|/4) and Near-Optimal Routing Scheme for LEO Mega-Constellations.
IEEE Internet Things J., May, 2024

Privacy Protection for Marginal-Sensitive Community Individuals Against Adversarial Community Detection Attacks.
IEEE Trans. Comput. Soc. Syst., February, 2024

CRS-Diff: Controllable Remote Sensing Image Generation With Diffusion Model.
IEEE Trans. Geosci. Remote. Sens., 2024

CRS-Diff: Controllable Generative Remote Sensing Foundation Model.
CoRR, 2024

A Petri Net Strategy for Fault Diagnosis and Location in Power Distribution Systems to Prevent Local Power Shortages.
IEEE Access, 2024

2023
DND: Deep Learning-Based Directed Network Disintegrator.
IEEE J. Emerg. Sel. Topics Circuits Syst., September, 2023

MolHF: Molecular Heterogeneous Attributes Fusion for Drug-Target Affinity Prediction on Heterogeneity.
IEICE Trans. Inf. Syst., May, 2023

An Accessional Signature Scheme With Unmalleable Transaction Implementation to Securely Redeem Cryptocurrencies.
IEEE Trans. Inf. Forensics Secur., 2023

A Multi-CUAV Multi-UAV Electricity Scheduling Scheme: From Charging Location Selection to Electricity Transaction.
IEEE Internet Things J., 2023

EDF: Enhanced Deep Fingerprinting attacks on Websites.
Proceedings of the International Conference on Networking and Network Applications, 2023

2022
RumorDecay: Rumor Dissemination Interruption for Target Recipients in Social Networks.
IEEE Trans. Syst. Man Cybern. Syst., 2022

SecRouting: Secure Routing for Network Functions Virtualization (NFV) Technology.
IEEE Trans. Circuits Syst. II Express Briefs, 2022

A Driver Drowsiness Detection Scheme Based on 3D Convolutional Neural Networks.
Int. J. Pattern Recognit. Artif. Intell., 2022

An efficient XOR-based visual cryptography scheme with lossless reconfigurable algorithms.
Int. J. Distributed Sens. Networks, 2022

Sparse Imbalanced Drug-Target Interaction Prediction via Heterogeneous Data Augmentation and Node Similarity.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2022

A Survey of Deep Anomaly Detection for System Logs.
Proceedings of the International Joint Conference on Neural Networks, 2022

Mixed Color Channels (MCC): A Universal Module for Mixed Sample Data Augmentation Methods.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2022

2021
Community Hiding by Link Perturbation in Social Networks.
IEEE Trans. Comput. Soc. Syst., 2021

Safeness-Based Community Penetration.
IEEE Trans. Circuits Syst. II Express Briefs, 2021

GNS: Forge High Anonymity Graph by Nonlinear Scaling Spectrum.
Secur. Commun. Networks, 2021

Cold-start Recommendation Method Based on Homomorphic Encryption.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021

2020
Similarity-Based and Sybil Attack Defended Community Detection for Social Networks.
IEEE Trans. Circuits Syst., 2020

Traffic Dynamics Evaluation for the Future NFV Deployment.
IEEE Trans. Circuits Syst. II Express Briefs, 2020

Trajectory-Based Community Detection.
IEEE Trans. Circuits Syst. II Express Briefs, 2020

TCEMD: A Trust Cascading-Based Emergency Message Dissemination Model in VANETs.
IEEE Internet Things J., 2020

A Minimum Capacity Optimization Scheme for Airport Terminals During Peak Periods.
IEEE Access, 2020

Doing in One Go: Delivery Time Inference Based on Couriers' Trajectories.
Proceedings of the KDD '20: The 26th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2020

Target Privacy Preserving for Social Networks.
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020

Enhancing Path Reliability against Sybil Attack by Improved Multi-Path-Trees in SDN.
Proceedings of the IEEE Global Communications Conference, 2020

Discovering Real-Time Reachable Area Using Trajectory Connections.
Proceedings of the Database Systems for Advanced Applications, 2020

2019
DISCO: Influence Maximization Meets Network Embedding and Deep Learning.
CoRR, 2019

Walk2Privacy: Limiting target link privacy disclosure against the adversarial link prediction.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

2018
A Petri Net Approach to Fault Diagnosis and Restoration for Power Transmission Systems to Avoid the Output Interruption of Substations.
IEEE Syst. J., 2018

Targeted Influential Nodes Selection in Location-Aware Social Networks.
Complex., 2018

2017
FCT: a fully-distributed context-aware trust model for location based service recommendation.
Sci. China Inf. Sci., 2017

Inferring Traffic Cascading Patterns.
Proceedings of the 25th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, 2017

Multi-hop Based Centrality of a Path in Complex Network.
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017

A Survey of Network Reconstruction on Social Network.
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017

Centrality Based Privacy Preserving for Weighted Social Networks.
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017

2016
Reliability evaluation for NFV deployment of future mobile broadband networks.
IEEE Wirel. Commun., 2016

LSOT: A Lightweight Self-Organized Trust Model in VANETs.
Mob. Inf. Syst., 2016

LCT: A Lightweight Cross-domain Trust Model for the Mobile Distributed Environment.
KSII Trans. Internet Inf. Syst., 2016


  Loading...