Zonghua Zhang
Orcid: 0000-0003-0379-7089
According to our database1,
Zonghua Zhang
authored at least 129 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Simultaneous Detection of the Orientation and Position of Moving Objects With Simple RFID Array for Industrial IoT Applications.
IEEE Internet Things J., September, 2024
Intelligent Sensing of Thermal Error of CNC Machine Tool Spindle Based on Multi-Source Information Fusion.
Sensors, June, 2024
"3-2-1" PMP: Adding an Extra Pattern to Dual-Band Phase Shift Profilometry for Higher Precision 3-D Imaging.
IEEE Trans. Instrum. Meas., 2024
Intrinsic Parameters Calibration of Multibeam LiDAR by Particle Swarm Optimization Algorithm.
IEEE Trans. Instrum. Meas., 2024
Data Augmentation for Multivariate Time Series Classification: An Experimental Study.
Proceedings of the 40th International Conference on Data Engineering, ICDE 2024, 2024
2023
Adaptive Threshold-Based ZUPT for Single IMU-Enabled Wearable Pedestrian Localization.
IEEE Internet Things J., July, 2023
Guest Editorial Special Issue on Collaborative Intelligence for Green Internet of Things in the 6G Era.
IEEE Trans. Green Commun. Netw., June, 2023
Veh. Commun., 2023
CoRR, 2023
A Generic Approach to Integrating Time into Spatial-Temporal Forecasting via Conditional Neural Fields.
CoRR, 2023
Multivariate Time Series Anomaly Detection: Fancy Algorithms and Flawed Evaluation Methodology.
Proceedings of the Performance Evaluation and Benchmarking: 15th TPC Technology Conference, 2023
ARTMAN '23: First Workshop on Recent Advances in Resilient and Trustworthy ML Systems in Autonomous Networks.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Breaking Boundaries: Balancing Performance and Robustness in Deep Wireless Traffic Forecasting.
Proceedings of the 2023 Workshop on Recent Advances in Resilient and Trustworthy ML Systems in Autonomous Networks, 2023
2022
IEEE Signal Process. Lett., 2022
Phase Target-Based Calibration of Projector Radial Chromatic Aberration for Color Fringe 3D Measurement Systems.
Sensors, 2022
Sensors, 2022
PDR-Net: Progressive depth reconstruction network for color guided depth map super-resolution.
Neurocomputing, 2022
Ann. des Télécommunications, 2022
Interactions between artificial intelligence and cybersecurity to protect future networks.
Ann. des Télécommunications, 2022
A Model-Data-Fusion Pole Piece Thickness Prediction Method With Multisensor Fusion for Lithium Battery Rolling Machine.
IEEE Access, 2022
2021
IEEE Trans. Netw. Serv. Manag., 2021
Predistorting Projected Fringes for High-Accuracy 3-D Phase Mapping in Fringe Projection Profilometry.
IEEE Trans. Instrum. Meas., 2021
Leveraging Network Functions Virtualization Orchestrators to Achieve Software-Defined Access Control in the Clouds.
IEEE Trans. Dependable Secur. Comput., 2021
Monocular Depth Estimation with Joint Attention Feature Distillation and Wavelet-Based Loss Function.
Sensors, 2021
Practical Cross-Layer Radio Frequency-Based Authentication Scheme for Internet of Things.
Sensors, 2021
Research on integral separation control of warp tension based on fuzzy parameter optimization.
J. Intell. Fuzzy Syst., 2021
Radio Frequency Identification and Sensing: Integration of Wireless Powering, Sensing, and Communication for IIoT Innovations.
IEEE Commun. Mag., 2021
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021
Little Help Makes a Big Difference: Leveraging Active Learning to Improve Unsupervised Time Series Anomaly Detection.
Proceedings of the Service-Oriented Computing - ICSOC 2021 Workshops, 2021
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021
2020
Cost-Effective Wearable Indoor Localization and Motion Analysis via the Integration of UWB and IMU.
Sensors, 2020
Design and feasibility study of roots-type power machine rotor based on numerical simulation.
Neural Comput. Appl., 2020
3D palmprint identification using blocked histogram and improved sparse representation-based classifier.
Neural Comput. Appl., 2020
Joint Attention Mechanisms for Monocular Depth Estimation With Multi-Scale Convolutions and Adaptive Weight Adjustment.
IEEE Access, 2020
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020
Proceedings of the 25th IEEE Pacific Rim International Symposium on Dependable Computing, 2020
Proceedings of the 7th IEEE International Conference on Cyber Security and Cloud Computing, 2020
Proceedings of the IEEE 17th Annual Consumer Communications & Networking Conference, 2020
2019
Person Recognition Using 3-D Palmprint Data Based on Full-Field Sinusoidal Fringe Projection.
IEEE Trans. Instrum. Meas., 2019
SCTSC: A Semicentralized Traffic Signal Control Mode With Attribute-Based Blockchain in IoVs.
IEEE Trans. Comput. Soc. Syst., 2019
Calibration of the Relative Orientation between Multiple Depth Cameras Based on a Three-Dimensional Target.
Sensors, 2019
Radio Frequency Identification and Sensing Techniques and Their Applications - A Review of the State-of-the-Art.
Sensors, 2019
Measurement of the Three-Dimensional Shape of Discontinuous Specular Objects Using Infrared Phase-Measuring Deflectometry.
Sensors, 2019
Proceedings of the Security and Privacy in Communication Networks, 2019
Proceedings of the 18th IEEE International Symposium on Network Computing and Applications, 2019
Proceedings of the 16th IEEE International Conference on Mobile Ad Hoc and Sensor Systems Workshops, 2019
2018
An automatically vetting mechanism for SSL error-handling vulnerability in android hybrid Web apps.
World Wide Web, 2018
CreditCoin: A Privacy-Preserving Blockchain-Based Incentive Announcement Network for Communications of Smart Vehicles.
IEEE Trans. Intell. Transp. Syst., 2018
Distance Calibration between Reference Plane and Screen in Direct Phase Measuring Deflectometry.
Sensors, 2018
NFV Security Survey: From Use Case Driven Threat Analysis to State-of-the-Art Countermeasures.
IEEE Commun. Surv. Tutorials, 2018
IEEE Commun. Mag., 2018
Roundtable Gossip Algorithm: A Novel Sparse Trust Mining Method for Large-Scale Recommendation Systems.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018
2017
IEEE Trans. Veh. Technol., 2017
Three-Dimensional Shape Measurements of Specular Objects Using Phase-Measuring Deflectometry.
Sensors, 2017
An Iterative Distortion Compensation Algorithm for Camera Calibration Based on Phase Target.
Sensors, 2017
Full-Field Calibration of Color Camera Chromatic Aberration using Absolute Phase Maps.
Sensors, 2017
Pattern Recognit. Lett., 2017
Peer-to-Peer Netw. Appl., 2017
Peer-to-Peer Netw. Appl., 2017
Proceedings of the IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, China, October 29, 2017
Proceedings of the IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, China, October 29, 2017
Proceedings of the IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, China, October 29, 2017
Proceedings of the Information and Communications Security - 19th International Conference, 2017
Proceedings of the IEEE International Conference on Communications, 2017
Proceedings of the 1st International Workshop on Security and Dependability of Multi-Domain Infrastructures, 2017
Proceedings of the ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2017
2016
Next Road Rerouting: A Multiagent System for Mitigating Unexpected Urban Traffic Congestion.
IEEE Trans. Intell. Transp. Syst., 2016
IEEE Trans. Inf. Forensics Secur., 2016
TripSense: A Trust-Based Vehicular Platoon Crowdsensing Scheme with Privacy Preservation in VANETs.
Sensors, 2016
Int. J. Comput. Commun. Control, 2016
SecMANO: Towards Network Functions Virtualization (NFV) Based Security MANagement and Orchestration.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
ControllerSEPA: A Security-Enhancing SDN Controller Plug-in for OpenFlow Applications.
Proceedings of the 17th International Conference on Parallel and Distributed Computing, 2016
Proceedings of the IEEE NetSoft Conference and Workshops, 2016
Novel Constructions of Cramer-Shoup Like Cryptosystems Based on Index Exchangeable Family.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
2015
An Accurate Projector Calibration Method Based on Polynomial Distortion Representation.
Sensors, 2015
Towards cross-layer approaches to coping with misbehavior in mobile ad hoc networks: an anatomy of reputation systems.
Secur. Commun. Networks, 2015
A comprehensive study of flooding attack consequences and countermeasures in Session Initiation Protocol (SIP).
Secur. Commun. Networks, 2015
Learning optimal measurement and control of assembly robot for large-scale heavy-weight parts.
Proceedings of the 2015 IEEE International Conference on Robotics and Biomimetics, 2015
Proceedings of the 2015 IEEE International Conference on Robotics and Biomimetics, 2015
VTrust: A Robust Trust Framework for Relay Selection in Hybrid Vehicular Communications.
Proceedings of the 2015 IEEE Global Communications Conference, 2015
Proceedings of the 10th ACM Symposium on Information, 2015
2014
Certificateless Remote Anonymous Authentication Schemes for WirelessBody Area Networks.
IEEE Trans. Parallel Distributed Syst., 2014
Multidisciplinary approaches to achieving efficient and trustworthy eHealth monitoring systems.
Proceedings of the 2014 IEEE/CIC International Conference on Communications in China, 2014
Proceedings of the 2014 IEEE International Conference on High Performance Computing and Communications, 2014
2013
Exploring attack graph for cost-benefit security hardening: A probabilistic approach.
Comput. Secur., 2013
Proceedings of the IEEE 10th International Conference on e-Business Engineering, 2013
2012
IEEE Wirel. Commun. Lett., 2012
HPM: A novel hierarchical Peer-to-Peer model for lookup acceleration with provision of physical proximity.
J. Netw. Comput. Appl., 2012
An efficient certificateless remote anonymous authentication scheme for wireless body area networks.
Proceedings of IEEE International Conference on Communications, 2012
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012
Proceedings of the Seventh International Conference on Availability, 2012
2011
Discrete logarithm based additively homomorphic encryption and secure data aggregation.
Inf. Sci., 2011
Mitigating Packet Dropping Problem in Mobile Ad Hoc Networks: Proposals and Challenges.
IEEE Commun. Surv. Tutorials, 2011
Toward cost-sensitive self-optimizing anomaly detection and response in autonomic networks.
Comput. Secur., 2011
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011
Proceedings of IEEE International Conference on Communications, 2011
2010
Wirel. Networks, 2010
STARS: A Simple and Efficient <i>S</i>cheme for Providing Transparent <i>T</i>raceability and <i>A</i>nonymity to <i>R</i>eputation <i>S</i>ystems.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2010
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010
2009
M-AID: An adaptive middleware built upon anomaly detectors for intrusion detection and rational response.
ACM Trans. Auton. Adapt. Syst., 2009
Janus: A dual-purpose analytical model for understanding, characterizing and countermining multi-stage collusive attacks in enterprise networks.
J. Netw. Comput. Appl., 2009
Measuring IDS-estimated attack impacts for rational incident response: A decision theoretic approach.
Comput. Secur., 2009
Discrete-Log-Based Additively Homomorphic Encryption and Secure WSN Data Aggregation.
Proceedings of the Information and Communications Security, 11th International Conference, 2009
On Achieving Cost-Sensitive Anomaly Detection and Response in Mobile Ad Hoc Networks.
Proceedings of IEEE International Conference on Communications, 2009
Proceedings of the Eighth IEEE International Conference on Dependable, 2009
2008
Special Issue on "Security and Privacy Preservation in Vehicular Communications" Wiley's Security and Communication Networks Journal.
Secur. Commun. Networks, 2008
Secur. Commun. Networks, 2008
RADAR: A ReputAtion-Based Scheme for Detecting Anomalous Nodes in WiReless Mesh Networks.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008
A model-based semi-quantitative approach for evaluating security of enterprise networks.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008
Proceedings of the Twenty-Seventh Annual ACM Symposium on Principles of Distributed Computing, 2008
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008
Boosting Markov Reward Models for Probabilistic Security Evaluation by Characterizing Behaviors of Attacker and Defender.
Proceedings of the The Third International Conference on Availability, 2008
2007
Neural Comput., 2007
An Observation-Centric Analysis on the Modeling of Anomaly-based Intrusion Detection.
Int. J. Netw. Secur., 2007
IEICE Trans. Inf. Syst., 2007
2006
Proceedings of the Information Security and Cryptology - ICISC 2006, 9th International Conference, Busan, Korea, November 30, 2006
2005
Application of online-training SVMs for real-time intrusion detection with different considerations.
Comput. Commun., 2005
A Brief Comparative Study on Analytical Models of Computer System Dependability and Security.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005
Proceedings of the Information Security Practice and Experience, 2005
Dynamic Combination of Multiple Host-Based Anomaly Detectors with Broader Detection Coverage and Fewer False Alerts.
Proceedings of the Networking, 2005
Constructing Multi-Layered Boundary to Defend Against Intrusive Anomalies: An Autonomic Detection Coordinator.
Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June, 2005
2004
Suppressing False Alarms of Intrusion Detection Using Improved Text Categorization Method.
Proceedings of the 2004 IEEE International Conference on e-Technology, 2004
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004