Zihao Shen

Orcid: 0000-0003-3541-7888

According to our database1, Zihao Shen authored at least 27 papers between 2009 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
RNC-DP: A personalized trajectory data publishing scheme combining road network constraints and GAN.
Future Gener. Comput. Syst., 2025

2024
Personalized trajectory privacy data publishing scheme based on differential privacy.
Internet Things, April, 2024

Trust Mechanism Privacy Protection Scheme Combining Blockchain and Multi-Party Evaluation.
IEEE Trans. Intell. Veh., February, 2024

Privacy-protecting predictive cache method based on blockchain and machine learning in Internet of vehicles.
Veh. Commun., 2024

Combining blockchain and crowd-sensing for location privacy protection in Internet of vehicles.
Veh. Commun., 2024

A trajectory privacy protection method using cached candidate result sets.
J. Parallel Distributed Comput., 2024

Enhancing Chemical Reaction Monitoring with a Deep Learning Model for NMR Spectra Image Matching to Target Compounds.
J. Chem. Inf. Model., 2024

BiGRU-DP: Improved differential privacy protection method for trajectory data publishing.
Expert Syst. Appl., 2024

Random vortex and expansion-rate model for Oberbeck-Boussinesq fluid flows.
CoRR, 2024

2023
Learning-based small cell base station selection scheme involving location privacy in service migration.
J. Reliab. Intell. Environ., December, 2023

Trajectory privacy data publishing scheme based on local optimisation and R-tree.
Connect. Sci., December, 2023

DP-STGAT: Traffic statistics publishing with differential privacy and a spatial-temporal graph attention network.
Inf. Sci., April, 2023

A Differential Privacy Budget Allocation Method Combining Privacy Security Level.
J. Commun. Inf. Networks, March, 2023

MacFrag: segmenting large-scale molecules to obtain diverse fragments with high qualities.
Bioinform., January, 2023

2022
Molecular Docking for Ligand-Receptor Binding Process Based on Heterogeneous Computing.
Sci. Program., 2022

Enhancing Location Privacy through P2P Network and Caching in Anonymizer.
KSII Trans. Internet Inf. Syst., 2022

Multi-modal chemical information reconstruction from images and texts for exploring the near-drug space.
Briefings Bioinform., 2022

e-TSN: an interactive visual exploration platform for target-disease knowledge mapping from literature.
Briefings Bioinform., 2022

2021
A Network Security Risk Assessment Method Based on a B_NAG Model.
Comput. Syst. Sci. Eng., 2021

RP-NBSR: A Novel Network Attack Detection Model Based on Machine Learning.
Comput. Syst. Sci. Eng., 2021

KPDR : An Effective Method of Privacy Protection.
Complex., 2021

A MADM Location Privacy Protection Method Based on Blockchain.
IEEE Access, 2021

2020
IKPCA-ELM-based Intrusion Detection Method.
KSII Trans. Internet Inf. Syst., 2020

2019
Crack Detection of Track Plate Based on YOLO.
Proceedings of the 12th International Symposium on Computational Intelligence and Design, 2019

2018
Track Crack Detection Method in Complex Environment.
Proceedings of the 11th International Symposium on Computational Intelligence and Design, 2018

2014
A Rule-based Attacks Detection Method for Wireless Sensor Networks.
Int. J. Online Eng., 2014

2009
Research on Security Architecture for Defending Insider Threat.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009


  Loading...