Zhusong Liu

Orcid: 0009-0006-4149-5590

According to our database1, Zhusong Liu authored at least 30 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Application of Speech Silence Duration Detection Based on Deep Denoise Algorithm.
Proceedings of the 2024 4th International Conference on Artificial Intelligence, 2024

2022
Energy-efficient and high-spectrum-efficiency wireless transmission.
EAI Endorsed Trans. Mob. Commun. Appl., 2022

Intelligent Distributed Data Storage for Wireless Communications in B5G Networks.
EAI Endorsed Trans. Mob. Commun. Appl., 2022

Outage Probability Analysis for UAV-Aided Mobile Edge Computing Networks.
EAI Endorsed Trans. Ind. Networks Intell. Syst., 2022

2018
Finger vein secure biometric template generation based on deep learning.
Soft Comput., 2018

Multi-layer cloud architectural model and ontology-based security service framework for IoT-based smart homes.
Future Gener. Comput. Syst., 2018

Secure and fine-grained access control on e-healthcare records in mobile cloud computing.
Future Gener. Comput. Syst., 2018

2017
An efficient algorithm for large-scale causal discovery.
Soft Comput., 2017

A novel semi-supervised learning method for Internet application identification.
Soft Comput., 2017

面向通讯同步的多处理器阵列重构 (Reconfiguring Multiprocessor Arrays for Synchronous Communication).
计算机科学, 2017

Deployment optimization of multi-hop wireless networks based on substitution graph.
Inf. Sci., 2017

A near-field magnet peak values detecting method to locate short circuit points on PCB.
Int. J. Embed. Syst., 2017

A Bicriteria Approach for Single Machine Scheduling with Resource Allocation, Learning Effect and a Deteriorating Maintenance Activity.
Asia Pac. J. Oper. Res., 2017

Blockchain-Based Security Architecture for Distributed Cloud Storage.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

Fast algorithms for capacitated cloudlet placements.
Proceedings of the 21st IEEE International Conference on Computer Supported Cooperative Work in Design, 2017

2016
Model approach to grammatical evolution: theory and case study.
Soft Comput., 2016

A fine-grained attribute-based authentication for sensitive data stored in cloud computing.
Int. J. Grid Util. Comput., 2016

Delegation of signing rights for emerging 5G networks.
Concurr. Comput. Pract. Exp., 2016

Optimal Data Replica Placement in Large-Scale Federated Architectures.
Proceedings of the Security, Privacy and Anonymity in Computation, Communication and Storage, 2016

2015
Coarser-Grained Multi-user Searchable Encryption in Hybrid Cloud.
Trans. Comput. Collect. Intell., 2015

An Improved Cloud Data Sharing Scheme with Hierarchical Attribute Structure.
J. Univers. Comput. Sci., 2015

The finite volume element method for a parameter identification problem.
J. Ambient Intell. Humaniz. Comput., 2015

Server-aided anonymous attribute-based authentication in cloud computing.
Future Gener. Comput. Syst., 2015

An auditing mechanism for the security of service in grid.
Concurr. Comput. Pract. Exp., 2015

A PCB Short Circuit Locating Scheme Based on Near Field Magnet Specific Point Detecting.
Proceedings of the Computational Intelligence and Intelligent Systems, 2015

2013
Anisotropic diffusion for speckle filtering of polarimetric synthetic aperture radar imagery.
J. Electronic Imaging, 2013

An Auditing Mechanism for the Security of Service in Grid.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

A Secure Anonymous Identity-Based Access Control over Cloud Data.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

2008
The Design of a Low-Power Asynchronous DES Coprocessor for Sensor Network Encryption.
Proceedings of the 2008 International Symposium on Computer Science and Computational Technology, 2008

A Novel Fourth-Order Chaotic Circuit and Its Implementation.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008


  Loading...