default search action
BibTeX records: Zhihong Tian
@article{DBLP:journals/caaitrit/CongQZFGST24, author = {Yue Cong and Jing Qiu and Kun Zhang and Zhongyang Fang and Chengliang Gao and Shen Su and Zhihong Tian}, title = {Ada-FFL: Adaptive computing fairness federated learning}, journal = {{CAAI} Trans. Intell. Technol.}, volume = {9}, number = {3}, pages = {573--584}, year = {2024}, url = {https://doi.org/10.1049/cit2.12232}, doi = {10.1049/CIT2.12232}, timestamp = {Thu, 04 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/caaitrit/CongQZFGST24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/LiPSSLT24, author = {Mianjie Li and Qihan Pei and Chun Shan and Shen Su and Yuan Liu and Zhihong Tian}, title = {Data tampering detection and recovery scheme based on multi-branch target extraction for internet of vehicles}, journal = {Comput. Networks}, volume = {252}, pages = {110677}, year = {2024}, url = {https://doi.org/10.1016/j.comnet.2024.110677}, doi = {10.1016/J.COMNET.2024.110677}, timestamp = {Sun, 08 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/LiPSSLT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcan/LiLWTGDS24, author = {Mianjie Li and Senfeng Lai and Jiao Wang and Zhihong Tian and Nadra Guizani and Xiaojiang Du and Chun Shan}, title = {Analysis on unit maximum capacity of orthogonal multiple watermarking for multimedia signals in {B5G} wireless communications}, journal = {Digit. Commun. Networks}, volume = {10}, number = {1}, pages = {38--44}, year = {2024}, url = {https://doi.org/10.1016/j.dcan.2022.05.009}, doi = {10.1016/J.DCAN.2022.05.009}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcan/LiLWTGDS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ett/ZhangZTLQSXG24, author = {Lejun Zhang and Chendong Zhu and Zhihong Tian and Yuan Liu and Jing Qiu and Shen Su and Guangxia Xu and Ran Guo}, title = {{ICRB:} An improved consensus-based redactable blockchain considering contextual consistency}, journal = {Trans. Emerg. Telecommun. Technol.}, volume = {35}, number = {1}, year = {2024}, url = {https://doi.org/10.1002/ett.4906}, doi = {10.1002/ETT.4906}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ett/ZhangZTLQSXG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/WangZLST24, author = {Jingpei Wang and Ming Zhu and Mohan Li and Yanbin Sun and Zhihong Tian}, title = {An Access Control Method Against Unauthorized and Noncompliant Behaviors of Real-Time Data in Industrial IoT}, journal = {{IEEE} Internet Things J.}, volume = {11}, number = {1}, pages = {708--727}, year = {2024}, url = {https://doi.org/10.1109/JIOT.2023.3285992}, doi = {10.1109/JIOT.2023.3285992}, timestamp = {Fri, 09 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/WangZLST24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/LiWGLT24, author = {Zhaohua Li and Le Wang and Zhaoquan Gu and Yang Lv and Zhihong Tian}, title = {Labels Are Culprits: Defending Gradient Attack on Privacy}, journal = {{IEEE} Internet Things J.}, volume = {11}, number = {4}, pages = {6007--6019}, year = {2024}, url = {https://doi.org/10.1109/JIOT.2023.3309992}, doi = {10.1109/JIOT.2023.3309992}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/LiWGLT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/DongSSHLT24, author = {Chongwu Dong and Yanbin Sun and Muhammad Shafiq and Ning Hu and Yuan Liu and Zhihong Tian}, title = {Optimizing Mobility-Aware Task Offloading in Smart Healthcare for Internet of Medical Things Through Multiagent Reinforcement Learning}, journal = {{IEEE} Internet Things J.}, volume = {11}, number = {8}, pages = {13677--13691}, year = {2024}, url = {https://doi.org/10.1109/JIOT.2023.3338718}, doi = {10.1109/JIOT.2023.3338718}, timestamp = {Sun, 08 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/DongSSHLT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/WangQWHT24, author = {Xu Wang and Lingfeng Qu and Hao{-}Tian Wu and Yi Han and Zhihong Tian}, title = {Reversible Image Thumbnail Preservation With High-Visual Naturalness}, journal = {{IEEE} Internet Things J.}, volume = {11}, number = {10}, pages = {18739--18752}, year = {2024}, url = {https://doi.org/10.1109/JIOT.2024.3366328}, doi = {10.1109/JIOT.2024.3366328}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/WangQWHT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/LiuZSZDGT24, author = {Yuan Liu and Yanan Zhang and Shen Su and Lejun Zhang and Xiaojiang Du and Mohsen Guizani and Zhihong Tian}, title = {BlockSC: {A} Blockchain Empowered Spatial Crowdsourcing Service in Metaverse While Preserving User Location Privacy}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {42}, number = {4}, pages = {880--892}, year = {2024}, url = {https://doi.org/10.1109/JSAC.2023.3345416}, doi = {10.1109/JSAC.2023.3345416}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/LiuZSZDGT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/kbs/CongZQFZCLT24, author = {Yue Cong and Yuxiang Zeng and Jing Qiu and Zhongyang Fang and Lejun Zhang and Du Cheng and Jia Liu and Zhihong Tian}, title = {FedGA: {A} greedy approach to enhance federated learning with Non-IID data}, journal = {Knowl. Based Syst.}, volume = {301}, pages = {112201}, year = {2024}, url = {https://doi.org/10.1016/j.knosys.2024.112201}, doi = {10.1016/J.KNOSYS.2024.112201}, timestamp = {Thu, 22 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/kbs/CongZQFZCLT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pvldb/XieCCZLT24, author = {Jiadong Xie and Zehua Chen and Deming Chu and Fan Zhang and Xuemin Lin and Zhihong Tian}, title = {Influence Maximization via Vertex Countering}, journal = {Proc. {VLDB} Endow.}, volume = {17}, number = {6}, pages = {1297--1309}, year = {2024}, url = {https://www.vldb.org/pvldb/vol17/p1297-zhang.pdf}, timestamp = {Thu, 11 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pvldb/XieCCZLT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pvldb/LiangOZYLT24, author = {Qi Liang and Dian Ouyang and Fan Zhang and Jianye Yang and Xuemin Lin and Zhihong Tian}, title = {Efficient Regular Simple Path Queries under Transitive Restricted Expressions}, journal = {Proc. {VLDB} Endow.}, volume = {17}, number = {7}, pages = {1710--1722}, year = {2024}, url = {https://www.vldb.org/pvldb/vol17/p1710-ouyang.pdf}, timestamp = {Mon, 29 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pvldb/LiangOZYLT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pvldb/YangFGMLT24, author = {Jianye Yang and Sheng Fang and Zhaoquan Gu and Ziyi Ma and Xuemin Lin and Zhihong Tian}, title = {TC-Match: Fast Time-constrained Continuous Subgraph Matching}, journal = {Proc. {VLDB} Endow.}, volume = {17}, number = {11}, pages = {2791--2804}, year = {2024}, url = {https://www.vldb.org/pvldb/vol17/p2791-yang.pdf}, timestamp = {Thu, 19 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pvldb/YangFGMLT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tce/DongSDST24, author = {Chongwu Dong and Muhammad Shafiq and Maryam M. Al Dabel and Yanbin Sun and Zhihong Tian}, title = {{DNN} Inference Acceleration for Smart Devices in Industry 5.0 by Decentralized Deep Reinforcement Learning}, journal = {{IEEE} Trans. Consumer Electron.}, volume = {70}, number = {1}, pages = {1519--1530}, year = {2024}, url = {https://doi.org/10.1109/TCE.2023.3339468}, doi = {10.1109/TCE.2023.3339468}, timestamp = {Sun, 08 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tce/DongSDST24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcss/YangHWLT24, author = {Zhe{-}Rui Yang and Zhen{-}Yu He and Chang{-}Dong Wang and Jian{-}Huang Lai and Zhihong Tian}, title = {Collaborative Meta-Path Modeling for Explainable Recommendation}, journal = {{IEEE} Trans. Comput. Soc. Syst.}, volume = {11}, number = {2}, pages = {1805--1815}, year = {2024}, url = {https://doi.org/10.1109/TCSS.2023.3243939}, doi = {10.1109/TCSS.2023.3243939}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcss/YangHWLT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcss/ZhouLGQGT24, author = {Ling Zhou and Jianming Li and Zhaoquan Gu and Jing Qiu and Brij B. Gupta and Zhihong Tian}, title = {{PANNER:} POS-Aware Nested Named Entity Recognition Through Heterogeneous Graph Neural Network}, journal = {{IEEE} Trans. Comput. Soc. Syst.}, volume = {11}, number = {4}, pages = {4718--4726}, year = {2024}, url = {https://doi.org/10.1109/TCSS.2022.3159366}, doi = {10.1109/TCSS.2022.3159366}, timestamp = {Sun, 08 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcss/ZhouLGQGT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcss/FangYXTTHWLT24, author = {Mingqi Fang and Lingyun Yu and Hongtao Xie and Qingfeng Tan and Zhiyuan Tan and Amir Hussain and Zezheng Wang and Jiahong Li and Zhihong Tian}, title = {STIDNet: Identity-Aware Face Forgery Detection With Spatiotemporal Knowledge Distillation}, journal = {{IEEE} Trans. Comput. Soc. Syst.}, volume = {11}, number = {4}, pages = {5354--5366}, year = {2024}, url = {https://doi.org/10.1109/TCSS.2024.3356549}, doi = {10.1109/TCSS.2024.3356549}, timestamp = {Sun, 08 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcss/FangYXTTHWLT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tetci/WuCGZHHT24, author = {Hao{-}Tian Wu and Xin Cao and Ying Gao and Kaihan Zheng and Jiwu Huang and Jiankun Hu and Zhihong Tian}, title = {Fundus Image Enhancement via Semi-Supervised {GAN} and Anatomical Structure Preservation}, journal = {{IEEE} Trans. Emerg. Top. Comput. Intell.}, volume = {8}, number = {1}, pages = {313--326}, year = {2024}, url = {https://doi.org/10.1109/TETCI.2023.3301337}, doi = {10.1109/TETCI.2023.3301337}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tetci/WuCGZHHT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tfs/CaiSSCWT24, author = {Xiao Cai and Kaibo Shi and Yanbin Sun and Jinde Cao and Shiping Wen and Zhihong Tian}, title = {Intelligent Event-Triggered Control Supervised by Mini-Batch Machine Learning and Data Compression Mechanism for {T-S} Fuzzy NCSs Under DoS Attacks}, journal = {{IEEE} Trans. Fuzzy Syst.}, volume = {32}, number = {3}, pages = {804--815}, year = {2024}, url = {https://doi.org/10.1109/TFUZZ.2023.3308933}, doi = {10.1109/TFUZZ.2023.3308933}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tfs/CaiSSCWT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WuCTLLH24, author = {Hao{-}Tian Wu and Yiu{-}Ming Cheung and Zhihong Tian and Dingcai Liu and Xiangyang Luo and Jiankun Hu}, title = {Lossless Data Hiding in {NTRU} Cryptosystem by Polynomial Encoding and Modulation}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3719--3732}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3362592}, doi = {10.1109/TIFS.2024.3362592}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WuCTLLH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/CaiSSCWQT24, author = {Xiao Cai and Kaibo Shi and Yanbin Sun and Jinde Cao and Shiping Wen and Cheng Qiao and Zhihong Tian}, title = {Stability Analysis of Networked Control Systems Under DoS Attacks and Security Controller Design With Mini-Batch Machine Learning Supervision}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3857--3865}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3347889}, doi = {10.1109/TIFS.2023.3347889}, timestamp = {Sun, 08 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/CaiSSCWQT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tits/MeiHLLTL24, author = {Yangyang Mei and Weihong Han and Shudong Li and Kaihan Lin and Zhihong Tian and Shumei Li}, title = {A Novel Network Forensic Framework for Advanced Persistent Threat Attack Attribution Through Deep Learning}, journal = {{IEEE} Trans. Intell. Transp. Syst.}, volume = {25}, number = {9}, pages = {12131--12140}, year = {2024}, url = {https://doi.org/10.1109/TITS.2024.3360260}, doi = {10.1109/TITS.2024.3360260}, timestamp = {Fri, 20 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tits/MeiHLLTL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tiv/CaiSSST24, author = {Xiao Cai and Kaibo Shi and Yanbin Sun and YengChai Soh and Zhihong Tian}, title = {Performance Analysis and Design of Intelligent Optimising Integral-Based Event-Trigger Control for Autonomous Ground Vehicles Under DoS Attacks}, journal = {{IEEE} Trans. Intell. Veh.}, volume = {9}, number = {1}, pages = {2149--2159}, year = {2024}, url = {https://doi.org/10.1109/TIV.2023.3317238}, doi = {10.1109/TIV.2023.3317238}, timestamp = {Sun, 08 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tiv/CaiSSST24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/ZhangGOYLT24, author = {Fan Zhang and Haicheng Guo and Dian Ouyang and Shiyu Yang and Xuemin Lin and Zhihong Tian}, title = {Size-Constrained Community Search on Large Networks: An Effective and Efficient Solution}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {36}, number = {1}, pages = {356--371}, year = {2024}, url = {https://doi.org/10.1109/TKDE.2023.3280483}, doi = {10.1109/TKDE.2023.3280483}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tkde/ZhangGOYLT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/WangYGOTL24, author = {Jianhua Wang and Jianye Yang and Zhaoquan Gu and Dian Ouyang and Zhihong Tian and Xuemin Lin}, title = {Efficient Maximal Biclique Enumeration on Large Signed Bipartite Graphs}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {36}, number = {9}, pages = {4618--4631}, year = {2024}, url = {https://doi.org/10.1109/TKDE.2024.3373654}, doi = {10.1109/TKDE.2024.3373654}, timestamp = {Thu, 22 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tkde/WangYGOTL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnn/LinLZLZWT24, author = {Xixun Lin and Zhao Li and Peng Zhang and Luchen Liu and Chuan Zhou and Bin Wang and Zhihong Tian}, title = {Structure-Aware Prototypical Neural Process for Few-Shot Graph Classification}, journal = {{IEEE} Trans. Neural Networks Learn. Syst.}, volume = {35}, number = {4}, pages = {4607--4621}, year = {2024}, url = {https://doi.org/10.1109/TNNLS.2022.3173318}, doi = {10.1109/TNNLS.2022.3173318}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnn/LinLZLZWT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnn/GuoZT24, author = {Xiaoding Guo and Lei Zhang and Zhihong Tian}, title = {Judgment Prediction Based on Tensor Decomposition With Optimized Neural Networks}, journal = {{IEEE} Trans. Neural Networks Learn. Syst.}, volume = {35}, number = {8}, pages = {11116--11127}, year = {2024}, url = {https://doi.org/10.1109/TNNLS.2023.3248275}, doi = {10.1109/TNNLS.2023.3248275}, timestamp = {Thu, 22 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnn/GuoZT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/XinLJLXLTZ24, author = {Yao Xin and Wenjun Li and Chengjun Jia and Xianfeng Li and Yang Xu and Bin Liu and Zhihong Tian and Weizhe Zhang}, title = {Recursive Multi-Tree Construction With Efficient Rule Sifting for Packet Classification on {FPGA}}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {32}, number = {2}, pages = {1707--1722}, year = {2024}, url = {https://doi.org/10.1109/TNET.2023.3330381}, doi = {10.1109/TNET.2023.3330381}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/XinLJLXLTZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/WangCLSLDT24, author = {Baocang Wang and Yange Chen and Furong Li and Jian Song and Rongxing Lu and Pu Duan and Zhihong Tian}, title = {Privacy-Preserving Convolutional Neural Network Classification Scheme With Multiple Keys}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {17}, number = {1}, pages = {322--335}, year = {2024}, url = {https://doi.org/10.1109/TSC.2023.3349298}, doi = {10.1109/TSC.2023.3349298}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tsc/WangCLSLDT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tse/WenGYLTJW24, author = {Xin{-}Cheng Wen and Cuiyun Gao and Jiaxin Ye and Yichen Li and Zhihong Tian and Yan Jia and Xuan Wang}, title = {Meta-Path Based Attentional Graph Learning Model for Vulnerability Detection}, journal = {{IEEE} Trans. Software Eng.}, volume = {50}, number = {3}, pages = {360--375}, year = {2024}, url = {https://doi.org/10.1109/TSE.2023.3340267}, doi = {10.1109/TSE.2023.3340267}, timestamp = {Tue, 27 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tse/WenGYLTJW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/vlsisp/ZhangLGWQSLXCT24, author = {Lejun Zhang and Yuan Li and Ran Guo and Guopeng Wang and Jing Qiu and Shen Su and Yuan Liu and Guangxia Xu and Huiling Chen and Zhihong Tian}, title = {A Novel Smart Contract Reentrancy Vulnerability Detection Model based on BiGAS}, journal = {J. Signal Process. Syst.}, volume = {96}, number = {3}, pages = {215--237}, year = {2024}, url = {https://doi.org/10.1007/s11265-023-01859-7}, doi = {10.1007/S11265-023-01859-7}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/vlsisp/ZhangLGWQSLXCT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/www/LiYJCT24, author = {Yangchun Li and Danfeng Yan and Wei Jiang and Yuanqiang Cai and Zhihong Tian}, title = {Exploring highly concise and accurate text matching model with tiny weights}, journal = {World Wide Web {(WWW)}}, volume = {27}, number = {4}, pages = {39}, year = {2024}, url = {https://doi.org/10.1007/s11280-024-01262-7}, doi = {10.1007/S11280-024-01262-7}, timestamp = {Mon, 24 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/www/LiYJCT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/TangHPWSLZWT24, author = {Keke Tang and Xu He and Weilong Peng and Jianpeng Wu and Yawen Shi and Daizong Liu and Pan Zhou and Wenping Wang and Zhihong Tian}, editor = {Michael J. Wooldridge and Jennifer G. Dy and Sriraam Natarajan}, title = {Manifold Constraints for Imperceptible Adversarial Attacks on Point Clouds}, booktitle = {Thirty-Eighth {AAAI} Conference on Artificial Intelligence, {AAAI} 2024, Thirty-Sixth Conference on Innovative Applications of Artificial Intelligence, {IAAI} 2024, Fourteenth Symposium on Educational Advances in Artificial Intelligence, {EAAI} 2014, February 20-27, 2024, Vancouver, Canada}, pages = {5127--5135}, publisher = {{AAAI} Press}, year = {2024}, url = {https://doi.org/10.1609/aaai.v38i6.28318}, doi = {10.1609/AAAI.V38I6.28318}, timestamp = {Thu, 20 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aaai/TangHPWSLZWT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/TangZPFCZT24, author = {Keke Tang and Wenyu Zhao and Weilong Peng and Xiang Fang and Xiaodong Cui and Peican Zhu and Zhihong Tian}, title = {Reparameterization Head for Efficient Multi-Input Networks}, booktitle = {{IEEE} International Conference on Acoustics, Speech and Signal Processing, {ICASSP} 2024, Seoul, Republic of Korea, April 14-19, 2024}, pages = {6190--6194}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICASSP48485.2024.10447574}, doi = {10.1109/ICASSP48485.2024.10447574}, timestamp = {Tue, 06 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icassp/TangZPFCZT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/QiuLCCSZT23, author = {Jing Qiu and Yang Lin and Hao Chen and Du Cheng and Muhammad Shafiq and Lejun Zhang and Zhihong Tian}, title = {Diverse classifiers with label dependencies for long-tail relation extraction in big data}, journal = {Comput. Electr. Eng.}, volume = {110}, pages = {108812}, year = {2023}, url = {https://doi.org/10.1016/j.compeleceng.2023.108812}, doi = {10.1016/J.COMPELECENG.2023.108812}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cee/QiuLCCSZT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cem/ZhouLSYT23, author = {Haifeng Zhou and Mohan Li and Yanbin Sun and Lei Yun and Zhihong Tian}, title = {Digital Twin-Based Cyber Range for Industrial Internet of Things}, journal = {{IEEE} Consumer Electron. Mag.}, volume = {12}, number = {6}, pages = {66--77}, year = {2023}, url = {https://doi.org/10.1109/MCE.2022.3203202}, doi = {10.1109/MCE.2022.3203202}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cem/ZhouLSYT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/LiSTDG23, author = {Mianjie Li and Chun Shan and Zhihong Tian and Xiaojiang Du and Mohsen Guizani}, title = {Adaptive Information Hiding Method Based on Feature Extraction for Visible Light Communication}, journal = {{IEEE} Commun. Mag.}, volume = {61}, number = {4}, pages = {102--106}, year = {2023}, url = {https://doi.org/10.1109/MCOM.001.2200035}, doi = {10.1109/MCOM.001.2200035}, timestamp = {Thu, 27 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/LiSTDG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/WangZGWQSLXT23, author = {Zhujun Wang and Lejun Zhang and Ran Guo and Guopeng Wang and Jing Qiu and Shen Su and Yuan Liu and Guangxia Xu and Zhihong Tian}, title = {A covert channel over blockchain based on label tree without long waiting times}, journal = {Comput. Networks}, volume = {232}, pages = {109843}, year = {2023}, url = {https://doi.org/10.1016/j.comnet.2023.109843}, doi = {10.1016/J.COMNET.2023.109843}, timestamp = {Mon, 27 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/WangZGWQSLXT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijon/LiTDYSG23, author = {Mianjie Li and Zhihong Tian and Xiaojiang Du and Xiaochen Yuan and Chun Shan and Mohsen Guizani}, title = {Power normalized cepstral robust features of deep neural networks in a cloud computing data privacy protection scheme}, journal = {Neurocomputing}, volume = {518}, pages = {165--173}, year = {2023}, url = {https://doi.org/10.1016/j.neucom.2022.11.001}, doi = {10.1016/J.NEUCOM.2022.11.001}, timestamp = {Sun, 04 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijon/LiTDYSG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/TangSLPHZGT23, author = {Keke Tang and Yawen Shi and Tianrui Lou and Weilong Peng and Xu He and Peican Zhu and Zhaoquan Gu and Zhihong Tian}, title = {Rethinking Perturbation Directions for Imperceptible Adversarial Attacks on Point Clouds}, journal = {{IEEE} Internet Things J.}, volume = {10}, number = {6, March 15}, pages = {5158--5169}, year = {2023}, url = {https://doi.org/10.1109/JIOT.2022.3222159}, doi = {10.1109/JIOT.2022.3222159}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/TangSLPHZGT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/LvSZLT23, author = {Yangzixing Lv and Wei Shi and Weiyong Zhang and Hui Lu and Zhihong Tian}, title = {Do Not Trust the Clouds Easily: The Insecurity of Content Security Policy Based on Object Storage}, journal = {{IEEE} Internet Things J.}, volume = {10}, number = {12}, pages = {10462--10470}, year = {2023}, url = {https://doi.org/10.1109/JIOT.2023.3238658}, doi = {10.1109/JIOT.2023.3238658}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/LvSZLT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/YuLBHWT23, author = {Zhuocheng Yu and Shudong Li and Youming Bai and Weihong Han and Xiaobo Wu and Zhihong Tian}, title = {{REMSF:} {A} Robust Ensemble Model of Malware Detection Based on Semantic Feature Fusion}, journal = {{IEEE} Internet Things J.}, volume = {10}, number = {18}, pages = {16134--16143}, year = {2023}, url = {https://doi.org/10.1109/JIOT.2023.3267337}, doi = {10.1109/JIOT.2023.3267337}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/YuLBHWT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/QiaoBZT23, author = {Cheng Qiao and Kenneth N. Brown and Yong Zhang and Zhihong Tian}, title = {CWEmd: {A} Lightweight Similarity Measurement for Resource-Constrained Vehicular Networks}, journal = {{IEEE} Internet Things J.}, volume = {10}, number = {22}, pages = {19655--19665}, year = {2023}, url = {https://doi.org/10.1109/JIOT.2023.3282968}, doi = {10.1109/JIOT.2023.3282968}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/QiaoBZT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/LiTL23, author = {Songsong Li and Zhihong Tian and Yao Li}, title = {Residual long short-term memory network with multi-source and multi-frequency information fusion: An application to China's stock market}, journal = {Inf. Sci.}, volume = {622}, pages = {133--147}, year = {2023}, url = {https://doi.org/10.1016/j.ins.2022.11.136}, doi = {10.1016/J.INS.2022.11.136}, timestamp = {Thu, 16 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/LiTL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/kbs/LiangGX0T23, author = {Xujian Liang and Zhaoquan Gu and Yushun Xie and Le Wang and Zhihong Tian}, title = {{MUSEDA:} Multilingual Unsupervised and Supervised Embedding for Domain Adaption}, journal = {Knowl. Based Syst.}, volume = {273}, pages = {110560}, year = {2023}, url = {https://doi.org/10.1016/j.knosys.2023.110560}, doi = {10.1016/J.KNOSYS.2023.110560}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/kbs/LiangGX0T23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tits/LiLWOT23, author = {Shudong Li and Yuan Li and Xiaobo Wu and Sattam Al Otaibi and Zhihong Tian}, title = {Imbalanced Malware Family Classification Using Multimodal Fusion and Weight Self-Learning}, journal = {{IEEE} Trans. Intell. Transp. Syst.}, volume = {24}, number = {7}, pages = {7642--7652}, year = {2023}, url = {https://doi.org/10.1109/TITS.2022.3208891}, doi = {10.1109/TITS.2022.3208891}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tits/LiLWOT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tits/QiaoQTMZT23, author = {Cheng Qiao and Jing Qiu and Zhiyuan Tan and Geyong Min and Albert Y. Zomaya and Zhihong Tian}, title = {Evaluation Mechanism for Decentralized Collaborative Pattern Learning in Heterogeneous Vehicular Networks}, journal = {{IEEE} Trans. Intell. Transp. Syst.}, volume = {24}, number = {11}, pages = {13123--13132}, year = {2023}, url = {https://doi.org/10.1109/TITS.2022.3186630}, doi = {10.1109/TITS.2022.3186630}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tits/QiaoQTMZT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/QiaoBZT23, author = {Cheng Qiao and Kenneth N. Brown and Fan Zhang and Zhihong Tian}, title = {Adaptive Asynchronous Clustering Algorithms for Wireless Mesh Networks}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {35}, number = {3}, pages = {2610--2627}, year = {2023}, url = {https://doi.org/10.1109/TKDE.2021.3119550}, doi = {10.1109/TKDE.2021.3119550}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tkde/QiaoBZT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/ChaiDQYT23, author = {Yuhan Chai and Lei Du and Jing Qiu and Lihua Yin and Zhihong Tian}, title = {Dynamic Prototype Network Based on Sample Adaptation for Few-Shot Malware Detection}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {35}, number = {5}, pages = {4754--4766}, year = {2023}, url = {https://doi.org/10.1109/TKDE.2022.3142820}, doi = {10.1109/TKDE.2022.3142820}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tkde/ChaiDQYT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/RenXZZT23, author = {Yitong Ren and Yanjun Xiao and Yinghai Zhou and Zhiyong Zhang and Zhihong Tian}, title = {{CSKG4APT:} {A} Cybersecurity Knowledge Graph for Advanced Persistent Threat Organization Attribution}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {35}, number = {6}, pages = {5695--5709}, year = {2023}, url = {https://doi.org/10.1109/TKDE.2022.3175719}, doi = {10.1109/TKDE.2022.3175719}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tkde/RenXZZT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/GaoZYZHTLZ23, author = {Yang Gao and Peng Zhang and Hong Yang and Chuan Zhou and Yue Hu and Zhihong Tian and Zhao Li and Jingren Zhou}, title = {GraphNAS++: Distributed Architecture Search for Graph Neural Networks}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {35}, number = {7}, pages = {6973--6987}, year = {2023}, url = {https://doi.org/10.1109/TKDE.2022.3178153}, doi = {10.1109/TKDE.2022.3178153}, timestamp = {Sat, 20 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tkde/GaoZYZHTLZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnse/LiLTS23, author = {Mianjie Li and Yuan Liu and Zhihong Tian and Chun Shan}, title = {Privacy Protection Method Based On Multidimensional Feature Fusion Under 6G Networks}, journal = {{IEEE} Trans. Netw. Sci. Eng.}, volume = {10}, number = {3}, pages = {1462--1471}, year = {2023}, url = {https://doi.org/10.1109/TNSE.2022.3186393}, doi = {10.1109/TNSE.2022.3186393}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnse/LiLTS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnse/LiuYAXZT23, author = {Yuan Liu and Wangyuan Yu and Zhengpeng Ai and Guangxia Xu and Liang Zhao and Zhihong Tian}, title = {A Blockchain-Empowered Federated Learning in Healthcare-Based Cyber Physical Systems}, journal = {{IEEE} Trans. Netw. Sci. Eng.}, volume = {10}, number = {5}, pages = {2685--2696}, year = {2023}, url = {https://doi.org/10.1109/TNSE.2022.3168025}, doi = {10.1109/TNSE.2022.3168025}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnse/LiuYAXZT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnse/LiJZWTG23, author = {Shudong Li and Laiyuan Jiang and Qianqing Zhang and Zhen Wang and Zhihong Tian and Mohsen Guizani}, title = {A Malicious Mining Code Detection Method Based on Multi-Features Fusion}, journal = {{IEEE} Trans. Netw. Sci. Eng.}, volume = {10}, number = {5}, pages = {2731--2739}, year = {2023}, url = {https://doi.org/10.1109/TNSE.2022.3155187}, doi = {10.1109/TNSE.2022.3155187}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnse/LiJZWTG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/LiuZYZTZ23, author = {Yuan Liu and Chuang Zhang and Yu Yan and Xin Zhou and Zhihong Tian and Jie Zhang}, title = {A Semi-Centralized Trust Management Model Based on Blockchain for Data Exchange in IoT System}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {16}, number = {2}, pages = {858--871}, year = {2023}, url = {https://doi.org/10.1109/TSC.2022.3181668}, doi = {10.1109/TSC.2022.3181668}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsc/LiuZYZTZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsusc/ZhouRYXTMT23, author = {Yinghai Zhou and Yitong Ren and Ming Yi and Yanjun Xiao and Zhiyuan Tan and Nour Moustafa and Zhihong Tian}, title = {CDTier: {A} Chinese Dataset of Threat Intelligence Entity Relationships}, journal = {{IEEE} Trans. Sustain. Comput.}, volume = {8}, number = {4}, pages = {627--638}, year = {2023}, url = {https://doi.org/10.1109/TSUSC.2023.3240411}, doi = {10.1109/TSUSC.2023.3240411}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tsusc/ZhouRYXTMT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wc/ChenQZLZTDG23, author = {Ximing Chen and Jing Qiu and Fasheng Zhou and Hui Lu and Lejun Zhang and Zhihong Tian and Xiaojiang Du and Mohsen Guizani}, title = {Decentralized Cooperative Caching for Sustainable Metaverse Via Meta Self-Supervision Learning}, journal = {{IEEE} Wirel. Commun.}, volume = {30}, number = {5}, pages = {96--103}, year = {2023}, url = {https://doi.org/10.1109/MWC.008.2300006}, doi = {10.1109/MWC.008.2300006}, timestamp = {Wed, 06 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/wc/ChenQZLZTDG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/www/LiCZTQ23, author = {Jianming Li and Yue Cong and Ling Zhou and Zhihong Tian and Jing Qiu}, title = {Super-resolution-based part collaboration network for vehicle re-identification}, journal = {World Wide Web {(WWW)}}, volume = {26}, number = {2}, pages = {519--538}, year = {2023}, url = {https://doi.org/10.1007/s11280-022-01060-z}, doi = {10.1007/S11280-022-01060-Z}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/www/LiCZTQ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/www/JiangYTXH23, author = {Linyu Jiang and Yukun Yan and Zhihong Tian and Zuobin Xiong and Qilong Han}, title = {Personalized sampling graph collection with local differential privacy for link prediction}, journal = {World Wide Web {(WWW)}}, volume = {26}, number = {5}, pages = {2669--2689}, year = {2023}, url = {https://doi.org/10.1007/s11280-023-01136-4}, doi = {10.1007/S11280-023-01136-4}, timestamp = {Fri, 20 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/www/JiangYTXH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/TangWPS0GTW23, author = {Keke Tang and Jianpeng Wu and Weilong Peng and Yawen Shi and Peng Song and Zhaoquan Gu and Zhihong Tian and Wenping Wang}, editor = {Brian Williams and Yiling Chen and Jennifer Neville}, title = {Deep Manifold Attack on Point Clouds via Parameter Plane Stretching}, booktitle = {Thirty-Seventh {AAAI} Conference on Artificial Intelligence, {AAAI} 2023, Thirty-Fifth Conference on Innovative Applications of Artificial Intelligence, {IAAI} 2023, Thirteenth Symposium on Educational Advances in Artificial Intelligence, {EAAI} 2023, Washington, DC, USA, February 7-14, 2023}, pages = {2420--2428}, publisher = {{AAAI} Press}, year = {2023}, url = {https://doi.org/10.1609/aaai.v37i2.25338}, doi = {10.1609/AAAI.V37I2.25338}, timestamp = {Mon, 04 Sep 2023 12:29:24 +0200}, biburl = {https://dblp.org/rec/conf/aaai/TangWPS0GTW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cloudnet/LiYTST23, author = {Kebin Li and Yang You and Yuntian Tan and Shen Su and Zhihong Tian}, title = {{C2MDNIF:} {A} Cross Chain based Method for Domain Name Information Fusion}, booktitle = {12th {IEEE} International Conference on Cloud Networking, CloudNet 2023, Hoboken, NJ, USA, November 1-3, 2023}, pages = {316--324}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CloudNet59005.2023.10490047}, doi = {10.1109/CLOUDNET59005.2023.10490047}, timestamp = {Sun, 28 Apr 2024 20:40:19 +0200}, biburl = {https://dblp.org/rec/conf/cloudnet/LiYTST23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cloudnet/QiWWOHT23, author = {Wuqi Qi and Wei Wu and Hao Wang and Lu Ou and Ning Hu and Zhihong Tian}, title = {Intrusion Detection Techniques Analysis in Cloud Computing}, booktitle = {12th {IEEE} International Conference on Cloud Networking, CloudNet 2023, Hoboken, NJ, USA, November 1-3, 2023}, pages = {360--363}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CloudNet59005.2023.10490069}, doi = {10.1109/CLOUDNET59005.2023.10490069}, timestamp = {Sun, 28 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cloudnet/QiWWOHT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cloudnet/ChenLZZHLYT23, author = {Junhan Chen and Rufeng Liang and Man Zhang and Chengcong Zheng and Xun Huang and Hui Lu and Xiang Yu and Zhihong Tian}, title = {Vulnerability Correlation, Multi-step Attack and Exploit Chain in Breach and Attack Simulation}, booktitle = {12th {IEEE} International Conference on Cloud Networking, CloudNet 2023, Hoboken, NJ, USA, November 1-3, 2023}, pages = {398--402}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CloudNet59005.2023.10490046}, doi = {10.1109/CLOUDNET59005.2023.10490046}, timestamp = {Sun, 28 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cloudnet/ChenLZZHLYT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cloudnet/TangZZZWLYT23, author = {Xiang Tang and Houlin Zhou and Man Zhang and Yuheng Zhang and Guocheng Wu and Hui Lu and Xiang Yu and Zhihong Tian}, title = {Research on the Exploitability of Binary Software Vulnerabilities}, booktitle = {12th {IEEE} International Conference on Cloud Networking, CloudNet 2023, Hoboken, NJ, USA, November 1-3, 2023}, pages = {403--407}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CloudNet59005.2023.10490070}, doi = {10.1109/CLOUDNET59005.2023.10490070}, timestamp = {Fri, 10 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cloudnet/TangZZZWLYT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cloudnet/JiangRWTLHTZ23, author = {Yunxin Jiang and Yitong Ren and Ziyu Wang and Yi Tang and Shengtao Lu and Ning Hu and Zhihong Tian and Yinghai Zhou}, title = {{OPTIMA-DEM:} An Optimized Threat Behavior Prediction Method using {DEMATEL-ISM}}, booktitle = {12th {IEEE} International Conference on Cloud Networking, CloudNet 2023, Hoboken, NJ, USA, November 1-3, 2023}, pages = {413--417}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CloudNet59005.2023.10490058}, doi = {10.1109/CLOUDNET59005.2023.10490058}, timestamp = {Sun, 28 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cloudnet/JiangRWTLHTZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cloudnet/YiLWHT23, author = {Haowen Yi and Fan Liu and Rui Wang and Ning Hu and Zhihong Tian}, title = {A Survey of Deception Defense: Approaches Used to Counter Malicious Behavior}, booktitle = {12th {IEEE} International Conference on Cloud Networking, CloudNet 2023, Hoboken, NJ, USA, November 1-3, 2023}, pages = {418--422}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CloudNet59005.2023.10490043}, doi = {10.1109/CLOUDNET59005.2023.10490043}, timestamp = {Thu, 18 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cloudnet/YiLWHT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/SuXLWLQSLT23, author = {Shen Su and Yue Xue and Liansheng Lin and Chao Wang and Hui Lu and Jing Qiu and Yanbin Sun and Yuan Liu and Zhihong Tian}, title = {Smart Contract Firewall: Protecting the on-Chain Smart Contract Projects}, booktitle = {{IEEE} Global Communications Conference, {GLOBECOM} 2023, Kuala Lumpur, Malaysia, December 4-8, 2023}, pages = {5122--5128}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/GLOBECOM54140.2023.10437641}, doi = {10.1109/GLOBECOM54140.2023.10437641}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/SuXLWLQSLT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdm/TangCPLZZTW23, author = {Keke Tang and Xujian Cai and Weilong Peng and Daizong Liu and Peican Zhu and Pan Zhou and Zhihong Tian and Wenping Wang}, editor = {Guihai Chen and Latifur Khan and Xiaofeng Gao and Meikang Qiu and Witold Pedrycz and Xindong Wu}, title = {Matching Words for Out-of-distribution Detection}, booktitle = {{IEEE} International Conference on Data Mining, {ICDM} 2023, Shanghai, China, December 1-4, 2023}, pages = {578--587}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICDM58522.2023.00067}, doi = {10.1109/ICDM58522.2023.00067}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdm/TangCPLZZTW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwcmc/SunZHZSLT23, author = {Yanbin Sun and Jianxun Zhou and Bo Hu and Xiaoming Zhou and Wei Song and Mohan Li and Zhihong Tian}, title = {Hierarchical Name-based Routing for Content Provider Mobility in {ICN}}, booktitle = {International Wireless Communications and Mobile Computing, {IWCMC} 2023, Marrakesh, Morocco, June 19-23, 2023}, pages = {941--946}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/IWCMC58020.2023.10182459}, doi = {10.1109/IWCMC58020.2023.10182459}, timestamp = {Thu, 27 Jul 2023 08:33:40 +0200}, biburl = {https://dblp.org/rec/conf/iwcmc/SunZHZSLT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwqos/LiLSSQT23, author = {Weicheng Li and Hui Lu and Yanbin Sun and Shen Su and Jing Qiu and Zhihong Tian}, title = {Improving Precision of Detecting Deserialization Vulnerabilities with Bytecode Analysis}, booktitle = {31st {IEEE/ACM} International Symposium on Quality of Service, IWQoS 2023, Orlando, FL, USA, June 19-21, 2023}, pages = {1--2}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/IWQoS57198.2023.10188756}, doi = {10.1109/IWQOS57198.2023.10188756}, timestamp = {Mon, 14 Aug 2023 15:24:20 +0200}, biburl = {https://dblp.org/rec/conf/iwqos/LiLSSQT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/metacom/SuTXWLTSD23, author = {Shen Su and Yuntian Tan and Yue Xue and Chao Wang and Hui Lu and Zhihong Tian and Chun Shan and Xiaojiang Du}, title = {Detecting Smart Contract Project Anomalies in Metaverse}, booktitle = {{IEEE} International Conference on Metaverse Computing, Networking and Applications, MetaCom 2023, Kyoto, Japan, June 26-28, 2023}, pages = {524--532}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/MetaCom57706.2023.00095}, doi = {10.1109/METACOM57706.2023.00095}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/metacom/SuTXWLTSD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/TanGWZGT22, author = {Hao Tan and Zhaoquan Gu and Le Wang and Huan Zhang and Brij B. Gupta and Zhihong Tian}, title = {Improving adversarial transferability by temporal and spatial momentum in urban speaker recognition systems}, journal = {Comput. Electr. Eng.}, volume = {104}, number = {Part}, pages = {108446}, year = {2022}, url = {https://doi.org/10.1016/j.compeleceng.2022.108446}, doi = {10.1016/J.COMPELECENG.2022.108446}, timestamp = {Tue, 07 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cee/TanGWZGT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cmpb/YinHZT22, author = {Xiao{-}Xia Yin and Sillas Hadjiloucas and Yanchun Zhang and Zhihong Tian}, title = {{MRI} radiogenomics for intelligent diagnosis of breast tumors and accurate prediction of neoadjuvant chemotherapy responses-a review}, journal = {Comput. Methods Programs Biomed.}, volume = {214}, pages = {106510}, year = {2022}, url = {https://doi.org/10.1016/j.cmpb.2021.106510}, doi = {10.1016/J.CMPB.2021.106510}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cmpb/YinHZT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/ChaiSQYT22, author = {Yuhan Chai and Zhe Sun and Jing Qiu and Lihua Yin and Zhihong Tian}, title = {{TPRPF:} a preserving framework of privacy relations based on adversarial training for texts in big data}, journal = {Frontiers Comput. Sci.}, volume = {16}, number = {4}, pages = {164618}, year = {2022}, url = {https://doi.org/10.1007/s11704-022-1653-0}, doi = {10.1007/S11704-022-1653-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fcsc/ChaiSQYT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijon/ZhuGQLT22, author = {Bin Zhu and Zhaoquan Gu and Yaguan Qian and Francis C. M. Lau and Zhihong Tian}, title = {Leveraging transferability and improved beam search in textual adversarial attacks}, journal = {Neurocomputing}, volume = {500}, pages = {135--142}, year = {2022}, url = {https://doi.org/10.1016/j.neucom.2022.05.054}, doi = {10.1016/J.NEUCOM.2022.05.054}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijon/ZhuGQLT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpdc/HouLLTZT22, author = {Jian Hou and Fangai Liu and Hui Lu and Zhiyuan Tan and Xuqiang Zhuang and Zhihong Tian}, title = {A novel flow-vector generation approach for malicious traffic detection}, journal = {J. Parallel Distributed Comput.}, volume = {169}, pages = {72--86}, year = {2022}, url = {https://doi.org/10.1016/j.jpdc.2022.06.004}, doi = {10.1016/J.JPDC.2022.06.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpdc/HouLLTZT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/kais/WenZWT22, author = {Jing Wen and Xi{-}Ran Zhu and Chang{-}Dong Wang and Zhihong Tian}, title = {A framework for personalized recommendation with conditional generative adversarial networks}, journal = {Knowl. Inf. Syst.}, volume = {64}, number = {10}, pages = {2637--2660}, year = {2022}, url = {https://doi.org/10.1007/s10115-022-01719-z}, doi = {10.1007/S10115-022-01719-Z}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/kais/WenZWT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/LiSZTSLS22, author = {Mianjie Li and Wei Shi and Fusheng Zhu and Zhihong Tian and Muhammad Shafiq and Zhiyong Luo and Chun Shan}, title = {Large-Capacity Local Multi-Dimensional Information Hiding Method for 6G Networks}, journal = {{IEEE} Netw.}, volume = {36}, number = {4}, pages = {160--165}, year = {2022}, url = {https://doi.org/10.1109/MNET.001.2100412}, doi = {10.1109/MNET.001.2100412}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/network/LiSZTSLS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/simpra/ZhangWCGTDG22, author = {Zhiqiang Zhang and Le Wang and Guangyao Chen and Zhaoquan Gu and Zhihong Tian and Xiaojiang Du and Mohsen Guizani}, title = {{STG2P:} {A} two-stage pipeline model for intrusion detection based on improved LightGBM and K-means}, journal = {Simul. Model. Pract. Theory}, volume = {120}, pages = {102614}, year = {2022}, url = {https://doi.org/10.1016/j.simpat.2022.102614}, doi = {10.1016/J.SIMPAT.2022.102614}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/simpra/ZhangWCGTDG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spe/GuZWDGT22, author = {Zhaoquan Gu and Yan Zhu and Yuexuan Wang and Xiaojiang Du and Mohsen Guizani and Zhihong Tian}, title = {Applying artificial bee colony algorithm to the multidepot vehicle routing problem}, journal = {Softw. Pract. Exp.}, volume = {52}, number = {3}, pages = {756--771}, year = {2022}, url = {https://doi.org/10.1002/spe.2838}, doi = {10.1002/SPE.2838}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/spe/GuZWDGT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tgcn/GuLKDDGT22, author = {Zhaoquan Gu and Hao Li and Sajid Khan and Lianbing Deng and Xiaojiang Du and Mohsen Guizani and Zhihong Tian}, title = {{IEPSBP:} {A} Cost-Efficient Image Encryption Algorithm Based on Parallel Chaotic System for Green IoT}, journal = {{IEEE} Trans. Green Commun. Netw.}, volume = {6}, number = {1}, pages = {89--106}, year = {2022}, url = {https://doi.org/10.1109/TGCN.2021.3095707}, doi = {10.1109/TGCN.2021.3095707}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tgcn/GuLKDDGT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/LvWZZTT22, author = {Lingling Lv and Zongyu Wu and Jinhua Zhang and Lei Zhang and Zhiyuan Tan and Zhihong Tian}, title = {A {VMD} and {LSTM} Based Hybrid Model of Load Forecasting for Power Grid Security}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {18}, number = {9}, pages = {6474--6482}, year = {2022}, url = {https://doi.org/10.1109/TII.2021.3130237}, doi = {10.1109/TII.2021.3130237}, timestamp = {Tue, 28 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tii/LvWZZTT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/LvWZGT22, author = {Lingling Lv and Zongyu Wu and Lei Zhang and Brij B. Gupta and Zhihong Tian}, title = {An Edge-AI Based Forecasting Approach for Improving Smart Microgrid Efficiency}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {18}, number = {11}, pages = {7946--7954}, year = {2022}, url = {https://doi.org/10.1109/TII.2022.3163137}, doi = {10.1109/TII.2022.3163137}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tii/LvWZGT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnse/GuWCTWDGT22, author = {Zhaoquan Gu and Le Wang and Xiaolong Chen and Yunyi Tang and Xingang Wang and Xiaojiang Du and Mohsen Guizani and Zhihong Tian}, title = {Epidemic Risk Assessment by a Novel Communication Station Based Method}, journal = {{IEEE} Trans. Netw. Sci. Eng.}, volume = {9}, number = {1}, pages = {332--344}, year = {2022}, url = {https://doi.org/10.1109/TNSE.2021.3058762}, doi = {10.1109/TNSE.2021.3058762}, timestamp = {Tue, 08 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tnse/GuWCTWDGT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnse/LuJHDGT22, author = {Hui Lu and Chengjie Jin and Xiaohan Helu and Xiaojiang Du and Mohsen Guizani and Zhihong Tian}, title = {DeepAutoD: Research on Distributed Machine Learning Oriented Scalable Mobile Communication Security Unpacking System}, journal = {{IEEE} Trans. Netw. Sci. Eng.}, volume = {9}, number = {4}, pages = {2052--2065}, year = {2022}, url = {https://doi.org/10.1109/TNSE.2021.3100750}, doi = {10.1109/TNSE.2021.3100750}, timestamp = {Mon, 25 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnse/LuJHDGT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnsm/ChaiQYZGT22, author = {Yuhan Chai and Jing Qiu and Lihua Yin and Lejun Zhang and Brij B. Gupta and Zhihong Tian}, title = {From Data and Model Levels: Improve the Performance of Few-Shot Malware Classification}, journal = {{IEEE} Trans. Netw. Serv. Manag.}, volume = {19}, number = {4}, pages = {4248--4261}, year = {2022}, url = {https://doi.org/10.1109/TNSM.2022.3200866}, doi = {10.1109/TNSM.2022.3200866}, timestamp = {Fri, 10 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tnsm/ChaiQYZGT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/TanWSTT22, author = {Qingfeng Tan and Xuebin Wang and Wei Shi and Jian Tang and Zhihong Tian}, title = {An Anonymity Vulnerability in Tor}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {30}, number = {6}, pages = {2574--2587}, year = {2022}, url = {https://doi.org/10.1109/TNET.2022.3174003}, doi = {10.1109/TNET.2022.3174003}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ton/TanWSTT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/LiuXHNZMLT22, author = {Yuan Liu and Zehui Xiong and Qin Hu and Dusit Niyato and Jie Zhang and Chunyan Miao and Cyril Leung and Zhihong Tian}, title = {VRepChain: {A} Decentralized and Privacy-Preserving Reputation System for Social Internet of Vehicles Based on Blockchain}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {71}, number = {12}, pages = {13242--13253}, year = {2022}, url = {https://doi.org/10.1109/TVT.2022.3198004}, doi = {10.1109/TVT.2022.3198004}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tvt/LiuXHNZMLT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwcmc/ZhangCJTD22, author = {Lei Zhang and Huiping Chen and Peiyan Jia and Zhihong Tian and Xiaojiang Du}, title = {{WGAN-GP} and {LSTM} based Prediction Model for Aircraft 4- {D} Traj ectory}, booktitle = {2022 International Wireless Communications and Mobile Computing, {IWCMC} 2022, Dubrovnik, Croatia, May 30 - June 3, 2022}, pages = {937--942}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/IWCMC55113.2022.9824928}, doi = {10.1109/IWCMC55113.2022.9824928}, timestamp = {Mon, 28 Aug 2023 21:17:32 +0200}, biburl = {https://dblp.org/rec/conf/iwcmc/ZhangCJTD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ZhaoLQMYZT022, author = {Bodong Zhao and Zheming Li and Shisong Qin and Zheyu Ma and Ming Yuan and Wenyu Zhu and Zhihong Tian and Chao Zhang}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {StateFuzz: System Call-Based State-Aware Linux Driver Fuzzing}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {3273--3289}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/zhao-bodong}, timestamp = {Fri, 02 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/ZhaoLQMYZT022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2201-09539, author = {Tonghe Wang and Songpu Ai and Zhihong Tian and Brij B. Gupta and Chun Shan}, title = {A Blockchain-Based Distributed Computational Resource Trading System for Industrial Internet of Things Considering Multiple Preferences}, journal = {CoRR}, volume = {abs/2201.09539}, year = {2022}, url = {https://arxiv.org/abs/2201.09539}, eprinttype = {arXiv}, eprint = {2201.09539}, timestamp = {Tue, 01 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2201-09539.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2211-04118, author = {Jinta Weng and Yue Hu and Zhihong Tian and Heyan Huang}, title = {ConsPrompt: Easily Exploiting Contrastive Samples for Few-shot Prompt Learning}, journal = {CoRR}, volume = {abs/2211.04118}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2211.04118}, doi = {10.48550/ARXIV.2211.04118}, eprinttype = {arXiv}, eprint = {2211.04118}, timestamp = {Thu, 02 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2211-04118.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2212-14274, author = {Xin{-}Cheng Wen and Cuiyun Gao and Jiaxin Ye and Zhihong Tian and Yan Jia and Xuan Wang}, title = {Meta-Path Based Attentional Graph Learning Model for Vulnerability Detection}, journal = {CoRR}, volume = {abs/2212.14274}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2212.14274}, doi = {10.48550/ARXIV.2212.14274}, eprinttype = {arXiv}, eprint = {2212.14274}, timestamp = {Sun, 08 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2212-14274.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/LiuLLMT21, author = {Yuan Liu and Yixiao Lan and Boyang Li and Chunyan Miao and Zhihong Tian}, title = {Proof of Learning (PoLe): Empowering neural network training with consensus building on blockchains}, journal = {Comput. Networks}, volume = {201}, pages = {108594}, year = {2021}, url = {https://doi.org/10.1016/j.comnet.2021.108594}, doi = {10.1016/J.COMNET.2021.108594}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/LiuLLMT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computing/ZhangZJTDG21, author = {Tianle Zhang and Liwen Zheng and Yu Jiang and Zhihong Tian and Xiaojiang Du and Mohsen Guizani}, title = {A method of chained recommendation for charging piles in internet of vehicles}, journal = {Computing}, volume = {103}, number = {2}, pages = {231--249}, year = {2021}, url = {https://doi.org/10.1007/s00607-020-00832-7}, doi = {10.1007/S00607-020-00832-7}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computing/ZhangZJTDG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/finr/GuTWLST21, author = {Zhaoquan Gu and Keke Tang and Zhen Wang and Yanhua Li and Wei Shi and Zhihong Tian}, title = {Editorial: Intelligence and Safety for Humanoid Robots: Design, Control, and Applications}, journal = {Frontiers Neurorobotics}, volume = {15}, year = {2021}, url = {https://doi.org/10.3389/fnbot.2021.808369}, doi = {10.3389/FNBOT.2021.808369}, timestamp = {Sat, 19 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/finr/GuTWLST21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeejas/XuSZT21, author = {Dongliang Xu and Wei Shi and Wensheng Zhai and Zhihong Tian}, title = {Multi-Candidate Voting Model Based on Blockchain}, journal = {{IEEE} {CAA} J. Autom. Sinica}, volume = {8}, number = {12}, pages = {1891--1900}, year = {2021}, url = {https://doi.org/10.1109/JAS.2021.1004207}, doi = {10.1109/JAS.2021.1004207}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeejas/XuSZT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/ShafiqTBDG21, author = {Muhammad Shafiq and Zhihong Tian and Ali Kashif Bashir and Xiaojiang Du and Mohsen Guizani}, title = {CorrAUC: {A} Malicious Bot-IoT Traffic Detection Method in IoT Network Using Machine-Learning Techniques}, journal = {{IEEE} Internet Things J.}, volume = {8}, number = {5}, pages = {3242--3254}, year = {2021}, url = {https://doi.org/10.1109/JIOT.2020.3002255}, doi = {10.1109/JIOT.2020.3002255}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/ShafiqTBDG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipm/SuTLDYDG21, author = {Shen Su and Zhihong Tian and Shuang Li and Jinxi Deng and Lihua Yin and Xiaojiang Du and Mohsen Guizani}, title = {IoT root union: {A} decentralized name resolving system for IoT based on blockchain}, journal = {Inf. Process. Manag.}, volume = {58}, number = {3}, pages = {102553}, year = {2021}, url = {https://doi.org/10.1016/j.ipm.2021.102553}, doi = {10.1016/J.IPM.2021.102553}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipm/SuTLDYDG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LvYZHT21, author = {Lingling Lv and Zhipeng Yang and Lei Zhang and Quanzhen Huang and Zhihong Tian}, title = {Multi-party transaction framework for drone services based on alliance blockchain in smart cities}, journal = {J. Inf. Secur. Appl.}, volume = {58}, pages = {102792}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.102792}, doi = {10.1016/J.JISA.2021.102792}, timestamp = {Sun, 16 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/LvYZHT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/js/LiCWCT21, author = {Shudong Li and Yanshan Chen and Xiaobo Wu and Xiaochun Cheng and Zhihong Tian}, title = {Power Grid-Oriented Cascading Failure Vulnerability Identifying Method Based on Wireless Sensors}, journal = {J. Sensors}, volume = {2021}, pages = {8820413:1--8820413:12}, year = {2021}, url = {https://doi.org/10.1155/2021/8820413}, doi = {10.1155/2021/8820413}, timestamp = {Tue, 20 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/js/LiCWCT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mlc/HuTLDG21, author = {Ning Hu and Zhihong Tian and Hui Lu and Xiaojiang Du and Mohsen Guizani}, title = {A multiple-kernel clustering based intrusion detection scheme for 5G and IoT networks}, journal = {Int. J. Mach. Learn. Cybern.}, volume = {12}, number = {11}, pages = {3129--3144}, year = {2021}, url = {https://doi.org/10.1007/s13042-020-01253-w}, doi = {10.1007/S13042-020-01253-W}, timestamp = {Fri, 07 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mlc/HuTLDG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/monet/SunLSTSH21, author = {Yanbin Sun and Mohan Li and Shen Su and Zhihong Tian and Wei Shi and Meng Han}, title = {Secure Data Sharing Framework via Hierarchical Greedy Embedding in Darknets}, journal = {Mob. Networks Appl.}, volume = {26}, number = {2}, pages = {940--948}, year = {2021}, url = {https://doi.org/10.1007/s11036-019-01325-4}, doi = {10.1007/S11036-019-01325-4}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/monet/SunLSTSH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/monet/LuJHZSHT21, author = {Hui Lu and Chengjie Jin and Xiaohan Helu and Man Zhang and Yanbin Sun and Yi Han and Zhihong Tian}, title = {Research on Intelligent Detection of Command Level Stack Pollution for Binary Program Analysis}, journal = {Mob. Networks Appl.}, volume = {26}, number = {4}, pages = {1723--1732}, year = {2021}, url = {https://doi.org/10.1007/s11036-019-01507-0}, doi = {10.1007/S11036-019-01507-0}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/monet/LuJHZSHT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/HuTSYZDG21, author = {Ning Hu and Zhihong Tian and Yanbin Sun and Lihua Yin and Baokang Zhao and Xiaojiang Du and Nadra Guizani}, title = {Building Agile and Resilient {UAV} Networks Based on {SDN} and Blockchain}, journal = {{IEEE} Netw.}, volume = {35}, number = {1}, pages = {57--63}, year = {2021}, url = {https://doi.org/10.1109/MNET.011.2000176}, doi = {10.1109/MNET.011.2000176}, timestamp = {Mon, 22 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/network/HuTSYZDG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/LuJHZGT21, author = {Hui Lu and Chengjie Jin and Xiaohan Helu and Chunsheng Zhu and Nadra Guizani and Zhihong Tian}, title = {AutoD: Intelligent Blockchain Application Unpacking Based on {JNI} Layer Deception Call}, journal = {{IEEE} Netw.}, volume = {35}, number = {2}, pages = {215--221}, year = {2021}, url = {https://doi.org/10.1109/MNET.011.2000467}, doi = {10.1109/MNET.011.2000467}, timestamp = {Fri, 07 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/network/LuJHZGT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/QiuCTGD21, author = {Jing Qiu and Yuanyuan Chen and Zhihong Tian and Nadra Guizani and Xiaojiang Du}, title = {The Security of Internet of Vehicles Network: Adversarial Examples for Trajectory Mode Detection}, journal = {{IEEE} Netw.}, volume = {35}, number = {5}, pages = {279--283}, year = {2021}, url = {https://doi.org/10.1109/MNET.121.2000435}, doi = {10.1109/MNET.121.2000435}, timestamp = {Tue, 16 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/network/QiuCTGD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pvldb/Lin000T21, author = {Zhe Lin and Fan Zhang and Xuemin Lin and Wenjie Zhang and Zhihong Tian}, title = {Hierarchical Core Maintenance on Large Dynamic Graphs}, journal = {Proc. {VLDB} Endow.}, volume = {14}, number = {5}, pages = {757--770}, year = {2021}, url = {http://www.vldb.org/pvldb/vol14/p757-zhang.pdf}, doi = {10.14778/3446095.3446099}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pvldb/Lin000T21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/YangZLST21, author = {Jiageng Yang and Xinguo Zhang and Hui Lu and Muhammad Shafiq and Zhihong Tian}, title = {StFuzzer: Contribution-Aware Coverage-Guided Fuzzing for Smart Devices}, journal = {Secur. Commun. Networks}, volume = {2021}, pages = {1987844:1--1987844:15}, year = {2021}, url = {https://doi.org/10.1155/2021/1987844}, doi = {10.1155/2021/1987844}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/YangZLST21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LiZWHT21, author = {Shudong Li and Qianqing Zhang and Xiaobo Wu and Weihong Han and Zhihong Tian}, title = {Attribution Classification Method of {APT} Malware in IoT Using Machine Learning Techniques}, journal = {Secur. Commun. Networks}, volume = {2021}, pages = {9396141:1--9396141:12}, year = {2021}, url = {https://doi.org/10.1155/2021/9396141}, doi = {10.1155/2021/9396141}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LiZWHT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/simpra/LiLHDGT21, author = {Shudong Li and Yuan Li and Weihong Han and Xiaojiang Du and Mohsen Guizani and Zhihong Tian}, title = {Malicious mining code detection based on ensemble learning in cloud computing environment}, journal = {Simul. Model. Pract. Theory}, volume = {113}, pages = {102391}, year = {2021}, url = {https://doi.org/10.1016/j.simpat.2021.102391}, doi = {10.1016/J.SIMPAT.2021.102391}, timestamp = {Tue, 05 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/simpra/LiLHDGT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcss/HanTZHJG21, author = {Weihong Han and Zhihong Tian and Chunsheng Zhu and Zizhong Huang and Yan Jia and Mohsen Guizani}, title = {A Topic Representation Model for Online Social Networks Based on Hybrid Human-Artificial Intelligence}, journal = {{IEEE} Trans. Comput. Soc. Syst.}, volume = {8}, number = {1}, pages = {191--200}, year = {2021}, url = {https://doi.org/10.1109/TCSS.2019.2959826}, doi = {10.1109/TCSS.2019.2959826}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcss/HanTZHJG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tgcn/HuTDGZ21, author = {Ning Hu and Zhihong Tian and Xiaojiang Du and Nadra Guizani and Zhihan Zhu}, title = {Deep-Green: {A} Dispersed Energy-Efficiency Computing Paradigm for Green Industrial IoT}, journal = {{IEEE} Trans. Green Commun. Netw.}, volume = {5}, number = {2}, pages = {750--764}, year = {2021}, url = {https://doi.org/10.1109/TGCN.2021.3064683}, doi = {10.1109/TGCN.2021.3064683}, timestamp = {Tue, 01 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tgcn/HuTDGZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tgcn/LvZZSTDG21, author = {Lingling Lv and Chan Zheng and Lei Zhang and Chun Shan and Zhihong Tian and Xiaojiang Du and Mohsen Guizani}, title = {Contract and Lyapunov Optimization-Based Load Scheduling and Energy Management for {UAV} Charging Stations}, journal = {{IEEE} Trans. Green Commun. Netw.}, volume = {5}, number = {3}, pages = {1381--1394}, year = {2021}, url = {https://doi.org/10.1109/TGCN.2021.3085561}, doi = {10.1109/TGCN.2021.3085561}, timestamp = {Wed, 01 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tgcn/LvZZSTDG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tgcn/HuTDG21, author = {Ning Hu and Zhihong Tian and Xiaojiang Du and Mohsen Guizani}, title = {An Energy-Efficient In-Network Computing Paradigm for 6G}, journal = {{IEEE} Trans. Green Commun. Netw.}, volume = {5}, number = {4}, pages = {1722--1733}, year = {2021}, url = {https://doi.org/10.1109/TGCN.2021.3099804}, doi = {10.1109/TGCN.2021.3099804}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tgcn/HuTDG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/SunTLSDG21, author = {Yanbin Sun and Zhihong Tian and Mohan Li and Shen Su and Xiaojiang Du and Mohsen Guizani}, title = {Honeypot Identification in Softwarized Industrial Cyber-Physical Systems}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {17}, number = {8}, pages = {5542--5551}, year = {2021}, url = {https://doi.org/10.1109/TII.2020.3044576}, doi = {10.1109/TII.2020.3044576}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tii/SunTLSDG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/LuoTMGST21, author = {Chaochao Luo and Zhiyuan Tan and Geyong Min and Jie Gan and Wei Shi and Zhihong Tian}, title = {A Novel Web Attack Detection System for Internet of Things via Ensemble Classification}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {17}, number = {8}, pages = {5810--5818}, year = {2021}, url = {https://doi.org/10.1109/TII.2020.3038761}, doi = {10.1109/TII.2020.3038761}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tii/LuoTMGST21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tits/WangTSDG21, author = {Yuhang Wang and Zhihong Tian and Yanbin Sun and Xiaojiang Du and Nadra Guizani}, title = {LocJury: An IBN-Based Location Privacy Preserving Scheme for IoCV}, journal = {{IEEE} Trans. Intell. Transp. Syst.}, volume = {22}, number = {8}, pages = {5028--5037}, year = {2021}, url = {https://doi.org/10.1109/TITS.2020.2970610}, doi = {10.1109/TITS.2020.2970610}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tits/WangTSDG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnse/DuSGT21, author = {Xiaojiang Du and Willy Susilo and Mohsen Guizani and Zhihong Tian}, title = {Introduction to the Special Section on Artificial Intelligence Security: Adversarial Attack and Defense}, journal = {{IEEE} Trans. Netw. Sci. Eng.}, volume = {8}, number = {2}, pages = {905--907}, year = {2021}, url = {https://doi.org/10.1109/TNSE.2021.3073637}, doi = {10.1109/TNSE.2021.3073637}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnse/DuSGT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wc/GuLGDT21, author = {Zhaoquan Gu and Dongda Li and Nadra Guizani and Xiaojiang Du and Zhihong Tian}, title = {An Aerial-Computing-Assisted Architecture for Large-Scale Sensor Networks}, journal = {{IEEE} Wirel. Commun.}, volume = {28}, number = {5}, pages = {43--49}, year = {2021}, url = {https://doi.org/10.1109/MWC.101.2100045}, doi = {10.1109/MWC.101.2100045}, timestamp = {Tue, 23 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/wc/GuLGDT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/www/LiuXGYLT21, author = {Chang Liu and Gang Xiong and Gaopeng Gou and Siu{-}Ming Yiu and Zhen Li and Zhihong Tian}, title = {Classifying encrypted traffic using adaptive fingerprints with multi-level attributes}, journal = {World Wide Web}, volume = {24}, number = {6}, pages = {2071--2097}, year = {2021}, url = {https://doi.org/10.1007/s11280-021-00940-0}, doi = {10.1007/S11280-021-00940-0}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/www/LiuXGYLT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsc/XieDYGWT21, author = {Wenrong Xie and Fashan Dong and Haiyang Yu and Zhaoquan Gu and Le Wang and Zhihong Tian}, title = {Generate Adversarial Examples Combined with Image Entropy Distribution}, booktitle = {Sixth {IEEE} International Conference on Data Science in Cyberspace, {DSC} 2021, Shenzhen, China, October 9-11, 2021}, pages = {272--279}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSC53577.2021.00044}, doi = {10.1109/DSC53577.2021.00044}, timestamp = {Fri, 22 Apr 2022 19:18:38 +0200}, biburl = {https://dblp.org/rec/conf/dsc/XieDYGWT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsc/ZhaoLWHTC21, author = {Chuanyu Zhao and Shudong Li and Xiaobo Wu and Weihong Han and Zhihong Tian and Maofei Chen}, title = {A Novel Malware Encrypted Traffic Detection Framework Based On Ensemble Learning}, booktitle = {Sixth {IEEE} International Conference on Data Science in Cyberspace, {DSC} 2021, Shenzhen, China, October 9-11, 2021}, pages = {614--620}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSC53577.2021.00097}, doi = {10.1109/DSC53577.2021.00097}, timestamp = {Fri, 22 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dsc/ZhaoLWHTC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccv/TangMPWSGTW21, author = {Keke Tang and Dingruibo Miao and Weilong Peng and Jianpeng Wu and Yawen Shi and Zhaoquan Gu and Zhihong Tian and Wenping Wang}, title = {CODEs: Chamfer Out-of-Distribution Examples against Overconfidence Issue}, booktitle = {2021 {IEEE/CVF} International Conference on Computer Vision, {ICCV} 2021, Montreal, QC, Canada, October 10-17, 2021}, pages = {1133--1142}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICCV48922.2021.00119}, doi = {10.1109/ICCV48922.2021.00119}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccv/TangMPWSGTW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdm/WenCWT21, author = {Jing Wen and Bi{-}Yi Chen and Chang{-}Dong Wang and Zhihong Tian}, editor = {James Bailey and Pauli Miettinen and Yun Sing Koh and Dacheng Tao and Xindong Wu}, title = {{PRGAN:} Personalized Recommendation with Conditional Generative Adversarial Networks}, booktitle = {{IEEE} International Conference on Data Mining, {ICDM} 2021, Auckland, New Zealand, December 7-10, 2021}, pages = {729--738}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICDM51629.2021.00084}, doi = {10.1109/ICDM51629.2021.00084}, timestamp = {Mon, 31 Jan 2022 08:58:55 +0100}, biburl = {https://dblp.org/rec/conf/icdm/WenCWT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/Jia0CDCTJ21, author = {Meng Jia and Kun He and Jing Chen and Ruiying Du and Weihang Chen and Zhihong Tian and Shouling Ji}, title = {{PROCESS:} Privacy-Preserving On-Chain Certificate Status Service}, booktitle = {40th {IEEE} Conference on Computer Communications, {INFOCOM} 2021, Vancouver, BC, Canada, May 10-13, 2021}, pages = {1--10}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/INFOCOM42981.2021.9488858}, doi = {10.1109/INFOCOM42981.2021.9488858}, timestamp = {Tue, 21 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/Jia0CDCTJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isca/WangZHATM21, author = {Xingbin Wang and Boyan Zhao and Rui Hou and Amro Awad and Zhihong Tian and Dan Meng}, title = {NASGuard: {A} Novel Accelerator Architecture for Robust Neural Architecture Search {(NAS)} Networks}, booktitle = {48th {ACM/IEEE} Annual International Symposium on Computer Architecture, {ISCA} 2021, Virtual Event / Valencia, Spain, June 14-18, 2021}, pages = {776--789}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISCA52012.2021.00066}, doi = {10.1109/ISCA52012.2021.00066}, timestamp = {Mon, 19 Feb 2024 07:32:07 +0100}, biburl = {https://dblp.org/rec/conf/isca/WangZHATM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mm/QinZGWTJWW21, author = {Xugong Qin and Yu Zhou and Youhui Guo and Dayan Wu and Zhihong Tian and Ning Jiang and Hongbin Wang and Weiping Wang}, editor = {Heng Tao Shen and Yueting Zhuang and John R. Smith and Yang Yang and Pablo C{\'{e}}sar and Florian Metze and Balakrishnan Prabhakaran}, title = {Mask is All You Need: Rethinking Mask {R-CNN} for Dense and Arbitrary-Shaped Scene Text Detection}, booktitle = {{MM} '21: {ACM} Multimedia Conference, Virtual Event, China, October 20 - 24, 2021}, pages = {414--423}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3474085.3475178}, doi = {10.1145/3474085.3475178}, timestamp = {Mon, 22 Apr 2024 21:24:20 +0200}, biburl = {https://dblp.org/rec/conf/mm/QinZGWTJWW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LvLCWT21, author = {Ke Lv and Yuan Liu and Jienan Chen and Dongxia Wang and Zhihong Tian}, title = {An Interactive System for Unfair Rating Detection Models in a Customized Perspective}, booktitle = {20th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2021, Shenyang, China, October 20-22, 2021}, pages = {871--878}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00123}, doi = {10.1109/TRUSTCOM53373.2021.00123}, timestamp = {Mon, 25 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LvLCWT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/ZhouLGT21, author = {Huchen Zhou and Mohan Li and Zhaoquan Gu and Zhihong Tian}, editor = {Yan Jia and Zhaoquan Gu and Aiping Li}, title = {Spatiotemporal Data Cleaning and Knowledge Fusion}, booktitle = {{MDATA:} {A} New Knowledge Representation Model - Theory, Methods and Applications}, series = {Lecture Notes in Computer Science}, volume = {12647}, pages = {32--50}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-71590-8\_3}, doi = {10.1007/978-3-030-71590-8\_3}, timestamp = {Wed, 25 Jan 2023 17:51:20 +0100}, biburl = {https://dblp.org/rec/series/lncs/ZhouLGT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/Chen0THTG21, author = {Xiaolong Chen and Le Wang and Yunyi Tang and Weihong Han and Zhihong Tian and Zhaoquan Gu}, editor = {Yan Jia and Zhaoquan Gu and Aiping Li}, title = {Entity Alignment: Optimization by Seed Selection}, booktitle = {{MDATA:} {A} New Knowledge Representation Model - Theory, Methods and Applications}, series = {Lecture Notes in Computer Science}, volume = {12647}, pages = {99--116}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-71590-8\_6}, doi = {10.1007/978-3-030-71590-8\_6}, timestamp = {Tue, 17 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lncs/Chen0THTG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/Tang0CGT21, author = {Yunyi Tang and Le Wang and Xiaolong Chen and Zhaoquan Gu and Zhihong Tian}, editor = {Yan Jia and Zhaoquan Gu and Aiping Li}, title = {Knowledge Extraction: Automatic Classification of Matching Rules}, booktitle = {{MDATA:} {A} New Knowledge Representation Model - Theory, Methods and Applications}, series = {Lecture Notes in Computer Science}, volume = {12647}, pages = {117--130}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-71590-8\_7}, doi = {10.1007/978-3-030-71590-8\_7}, timestamp = {Tue, 17 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lncs/Tang0CGT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2108-06024, author = {Keke Tang and Dingruibo Miao and Weilong Peng and Jianpeng Wu and Yawen Shi and Zhaoquan Gu and Zhihong Tian and Wenping Wang}, title = {CODEs: Chamfer Out-of-Distribution Examples against Overconfidence Issue}, journal = {CoRR}, volume = {abs/2108.06024}, year = {2021}, url = {https://arxiv.org/abs/2108.06024}, eprinttype = {arXiv}, eprint = {2108.06024}, timestamp = {Wed, 18 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2108-06024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2109-03426, author = {Xugong Qin and Yu Zhou and Youhui Guo and Dayan Wu and Zhihong Tian and Ning Jiang and Hongbin Wang and Weiping Wang}, title = {Mask is All You Need: Rethinking Mask {R-CNN} for Dense and Arbitrary-Shaped Scene Text Detection}, journal = {CoRR}, volume = {abs/2109.03426}, year = {2021}, url = {https://arxiv.org/abs/2109.03426}, eprinttype = {arXiv}, eprint = {2109.03426}, timestamp = {Tue, 21 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2109-03426.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2109-06176, author = {Bin Zhu and Zhaoquan Gu and Le Wang and Zhihong Tian}, title = {{TREATED:} Towards Universal Defense against Textual Adversarial Attacks}, journal = {CoRR}, volume = {abs/2109.06176}, year = {2021}, url = {https://arxiv.org/abs/2109.06176}, eprinttype = {arXiv}, eprint = {2109.06176}, timestamp = {Fri, 21 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2109-06176.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2110-03445, author = {Lei Zhang and Shuaimin Jiang and Xiajiong Shen and Brij B. Gupta and Zhihong Tian}, title = {{PWG-IDS:} An Intrusion Detection Model for Solving Class Imbalance in IIoT Networks Using Generative Adversarial Networks}, journal = {CoRR}, volume = {abs/2110.03445}, year = {2021}, url = {https://arxiv.org/abs/2110.03445}, eprinttype = {arXiv}, eprint = {2110.03445}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2110-03445.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZhangJZT20, author = {Hong{-}Li Zhang and Rui Jin and Yu Zhang and Zhihong Tian}, title = {A Public Psychological Pressure Index for Social Networks}, journal = {{IEEE} Access}, volume = {8}, pages = {23457--23469}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.2969270}, doi = {10.1109/ACCESS.2020.2969270}, timestamp = {Tue, 03 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/ZhangJZT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/GuHZWZT20, author = {Zhaoquan Gu and Weixiong Hu and Chuanjing Zhang and Le Wang and Chunsheng Zhu and Zhihong Tian}, title = {Restricted Region Based Iterative Gradient Method for Non-Targeted Attack}, journal = {{IEEE} Access}, volume = {8}, pages = {25262--25271}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.2971004}, doi = {10.1109/ACCESS.2020.2971004}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/GuHZWZT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/LuoYLWFZT20, author = {Xi Luo and Lihua Yin and Chao Li and Chonghua Wang and Fuyang Fang and Chunsheng Zhu and Zhihong Tian}, title = {A Lightweight Privacy-Preserving Communication Protocol for Heterogeneous IoT Environment}, journal = {{IEEE} Access}, volume = {8}, pages = {67192--67204}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.2978525}, doi = {10.1109/ACCESS.2020.2978525}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/LuoYLWFZT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amc/LiZWTLW20, author = {Shudong Li and Dawei Zhao and Xiaobo Wu and Zhihong Tian and Aiping Li and Zhen Wang}, title = {Functional immunization of networks based on message passing}, journal = {Appl. Math. Comput.}, volume = {366}, year = {2020}, url = {https://doi.org/10.1016/j.amc.2019.124728}, doi = {10.1016/J.AMC.2019.124728}, timestamp = {Fri, 06 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/amc/LiZWTLW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/ChenQDYT20, author = {Yuanyuan Chen and Jing Qiu and Xiaojiang Du and Lihua Yin and Zhihong Tian}, title = {Security of Mobile Multimedia Data: The Adversarial Examples for Spatio-temporal Data}, journal = {Comput. Networks}, volume = {181}, pages = {107432}, year = {2020}, url = {https://doi.org/10.1016/j.comnet.2020.107432}, doi = {10.1016/J.COMNET.2020.107432}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/ChenQDYT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ShafiqTBDG20, author = {Muhammad Shafiq and Zhihong Tian and Ali Kashif Bashir and Xiaojiang Du and Mohsen Guizani}, title = {IoT malicious traffic identification using wrapper-based feature selection mechanisms}, journal = {Comput. Secur.}, volume = {94}, pages = {101863}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101863}, doi = {10.1016/J.COSE.2020.101863}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/ShafiqTBDG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SunYLZLT20, author = {Zhe Sun and Lihua Yin and Chao Li and Weizhe Zhang and Ang Li and Zhihong Tian}, title = {The QoS and privacy trade-off of adversarial deep learning: An evolutionary game approach}, journal = {Comput. Secur.}, volume = {96}, pages = {101876}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101876}, doi = {10.1016/J.COSE.2020.101876}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SunYLZLT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ett/ChenHJZLST20, author = {Weixiang Chen and Xiaohan Helu and Chengjie Jin and Man Zhang and Hui Lu and Yanbin Sun and Zhihong Tian}, title = {Advanced persistent threat organization identification based on software gene of malware}, journal = {Trans. Emerg. Telecommun. Technol.}, volume = {31}, number = {12}, year = {2020}, url = {https://doi.org/10.1002/ett.3884}, doi = {10.1002/ETT.3884}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ett/ChenHJZLST20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/ShafiqTSDG20, author = {Muhammad Shafiq and Zhihong Tian and Yanbin Sun and Xiaojiang Du and Mohsen Guizani}, title = {Selection of effective machine learning algorithm and Bot-IoT attacks traffic identification for internet of things in smart city}, journal = {Future Gener. Comput. Syst.}, volume = {107}, pages = {433--442}, year = {2020}, url = {https://doi.org/10.1016/j.future.2020.02.017}, doi = {10.1016/J.FUTURE.2020.02.017}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/ShafiqTSDG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/YinFGST20, author = {Lihua Yin and Binxing Fang and Yunchuan Guo and Zhe Sun and Zhihong Tian}, title = {Hierarchically defining Internet of Things security: From {CIA} to {CACA}}, journal = {Int. J. Distributed Sens. Networks}, volume = {16}, number = {1}, year = {2020}, url = {https://doi.org/10.1177/1550147719899374}, doi = {10.1177/1550147719899374}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/YinFGST20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/ZhangSZQT20, author = {Yang Zhang and Shixin Sun and Dongwen Zhang and Jing Qiu and Zhihong Tian}, title = {A consistency-guaranteed approach for Internet of Things \emph{software refactoring}}, journal = {Int. J. Distributed Sens. Networks}, volume = {16}, number = {1}, year = {2020}, url = {https://doi.org/10.1177/1550147720901680}, doi = {10.1177/1550147720901680}, timestamp = {Fri, 30 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/ZhangSZQT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/SunJHLZT20, author = {Haitao Sun and Chengjie Jin and Xiaohan Helu and Hui Lu and Man Zhang and Zhihong Tian}, title = {Research on android infiltration technology based on the silent installation of an accessibility service}, journal = {Int. J. Distributed Sens. Networks}, volume = {16}, number = {2}, year = {2020}, url = {https://doi.org/10.1177/1550147720903628}, doi = {10.1177/1550147720903628}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/SunJHLZT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/inffus/XuTLKTS20, author = {Dongliang Xu and Zhihong Tian and Rufeng Lai and Xiangtao Kong and Zhiyuan Tan and Wei Shi}, title = {Deep learning based emotion analysis of microblog texts}, journal = {Inf. Fusion}, volume = {64}, pages = {1--11}, year = {2020}, url = {https://doi.org/10.1016/j.inffus.2020.06.002}, doi = {10.1016/J.INFFUS.2020.06.002}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/inffus/XuTLKTS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/TianGSQ20, author = {Zhihong Tian and Xiangsong Gao and Shen Su and Jing Qiu}, title = {Vcash: {A} Novel Reputation Framework for Identifying Denial of Traffic Service in Internet of Connected Vehicles}, journal = {{IEEE} Internet Things J.}, volume = {7}, number = {5}, pages = {3901--3909}, year = {2020}, url = {https://doi.org/10.1109/JIOT.2019.2951620}, doi = {10.1109/JIOT.2019.2951620}, timestamp = {Fri, 30 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/TianGSQ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/QiuTDZSF20, author = {Jing Qiu and Zhihong Tian and Chunlai Du and Qi Zuo and Shen Su and Binxing Fang}, title = {A Survey on Access Control in the Age of Internet of Things}, journal = {{IEEE} Internet Things J.}, volume = {7}, number = {6}, pages = {4682--4696}, year = {2020}, url = {https://doi.org/10.1109/JIOT.2020.2969326}, doi = {10.1109/JIOT.2020.2969326}, timestamp = {Fri, 30 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/QiuTDZSF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/LiSLMT20, author = {Mohan Li and Yanbin Sun and Hui Lu and Sabita Maharjan and Zhihong Tian}, title = {Deep Reinforcement Learning for Partially Observable Data Poisoning Attack in Crowdsensing Systems}, journal = {{IEEE} Internet Things J.}, volume = {7}, number = {7}, pages = {6266--6278}, year = {2020}, url = {https://doi.org/10.1109/JIOT.2019.2962914}, doi = {10.1109/JIOT.2019.2962914}, timestamp = {Fri, 07 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/LiSLMT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/JiWTFRWS20, author = {Tiantian Ji and Zhongru Wang and Zhihong Tian and Binxing Fang and Qiang Ruan and Haichen Wang and Wei Shi}, title = {AFLPro: Direction sensitive fuzzing}, journal = {J. Inf. Secur. Appl.}, volume = {54}, pages = {102497}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102497}, doi = {10.1016/J.JISA.2020.102497}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/JiWTFRWS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jifs/HanT20, author = {Jie Han and Zhihong Tian}, title = {The effect of trade creation in China-Asean free trade area based on the gravity model}, journal = {J. Intell. Fuzzy Syst.}, volume = {38}, number = {6}, pages = {7061--7065}, year = {2020}, url = {https://doi.org/10.3233/JIFS-179784}, doi = {10.3233/JIFS-179784}, timestamp = {Wed, 01 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jifs/HanT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpdc/LiuZZWGZT20, author = {Yaping Liu and Shuo Zhang and Haojin Zhu and Peng{-}Jun Wan and Lixin Gao and Yaoxue Zhang and Zhihong Tian}, title = {A novel routing verification approach based on blockchain for inter-domain routing in smart metropolitan area networks}, journal = {J. Parallel Distributed Comput.}, volume = {142}, pages = {77--89}, year = {2020}, url = {https://doi.org/10.1016/j.jpdc.2020.04.005}, doi = {10.1016/J.JPDC.2020.04.005}, timestamp = {Wed, 04 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpdc/LiuZZWGZT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/WangCWLTJZ20, author = {Xiaowei Wang and Maowei Cheng and Yefu Wang and Shaohui Liu and Zhihong Tian and Feng Jiang and Hongjun Zhang}, title = {Obstructive sleep apnea detection using ecg-sensor with convolutional neural networks}, journal = {Multim. Tools Appl.}, volume = {79}, number = {23-24}, pages = {15813--15827}, year = {2020}, url = {https://doi.org/10.1007/s11042-018-6161-8}, doi = {10.1007/S11042-018-6161-8}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mta/WangCWLTJZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/TianWSQ20, author = {Zhihong Tian and Yuhang Wang and Yanbin Sun and Jing Qiu}, title = {Location Privacy Challenges in Mobile Edge Computing: Classification and Exploration}, journal = {{IEEE} Netw.}, volume = {34}, number = {2}, pages = {52--56}, year = {2020}, url = {https://doi.org/10.1109/MNET.001.1900139}, doi = {10.1109/MNET.001.1900139}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/network/TianWSQ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/WangTSDG20, author = {Yuhang Wang and Zhihong Tian and Yanbin Sun and Xiaojiang Du and Nadra Guizani}, title = {Preserving Location Privacy in {UASN} through Collaboration and Semantic Encapsulation}, journal = {{IEEE} Netw.}, volume = {34}, number = {4}, pages = {284--290}, year = {2020}, url = {https://doi.org/10.1109/MNET.001.1900534}, doi = {10.1109/MNET.001.1900534}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/network/WangTSDG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/SunTLZG20, author = {Yanbin Sun and Zhihong Tian and Mohan Li and Chunsheng Zhu and Nadra Guizani}, title = {Automated Attack and Defense Framework toward 5G Security}, journal = {{IEEE} Netw.}, volume = {34}, number = {5}, pages = {247--253}, year = {2020}, url = {https://doi.org/10.1109/MNET.011.1900635}, doi = {10.1109/MNET.011.1900635}, timestamp = {Fri, 02 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/network/SunTLZG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/GuCTWDG20, author = {Zhaoquan Gu and Zhen Cao and Zhihong Tian and Yuexuan Wang and Xiaojiang Du and Mohsen Guizani}, title = {A Low-Latency and Energy-Efficient Neighbor Discovery Algorithm for Wireless Sensor Networks}, journal = {Sensors}, volume = {20}, number = {3}, pages = {657}, year = {2020}, url = {https://doi.org/10.3390/s20030657}, doi = {10.3390/S20030657}, timestamp = {Sat, 30 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/GuCTWDG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcss/QiuCTDG20, author = {Jing Qiu and Yuhan Chai and Zhihong Tian and Xiaojiang Du and Mohsen Guizani}, title = {Automatic Concept Extraction Based on Semantic Graphs From Big Data in Smart City}, journal = {{IEEE} Trans. Comput. Soc. Syst.}, volume = {7}, number = {1}, pages = {225--233}, year = {2020}, url = {https://doi.org/10.1109/TCSS.2019.2946181}, doi = {10.1109/TCSS.2019.2946181}, timestamp = {Fri, 30 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcss/QiuCTDG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdasci/TianLLSSZ20, author = {Zhihong Tian and Chaochao Luo and Hui Lu and Shen Su and Yanbin Sun and Man Zhang}, title = {User and Entity Behavior Analysis under Urban Big Data}, journal = {Trans. Data Sci.}, volume = {1}, number = {3}, pages = {16:1--16:19}, year = {2020}, url = {https://doi.org/10.1145/3374749}, doi = {10.1145/3374749}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdasci/TianLLSSZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/TianLQDG20, author = {Zhihong Tian and Chaochao Luo and Jing Qiu and Xiaojiang Du and Mohsen Guizani}, title = {A Distributed Deep Learning System for Web Attack Detection on Edge Devices}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {16}, number = {3}, pages = {1963--1971}, year = {2020}, url = {https://doi.org/10.1109/TII.2019.2938778}, doi = {10.1109/TII.2019.2938778}, timestamp = {Fri, 30 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tii/TianLQDG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/QiuDZST20, author = {Jing Qiu and Lei Du and Dongwen Zhang and Shen Su and Zhihong Tian}, title = {Nei-TTE: Intelligent Traffic Time Estimation Based on Fine-Grained Time Derivation of Road Segments for Smart City}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {16}, number = {4}, pages = {2659--2666}, year = {2020}, url = {https://doi.org/10.1109/TII.2019.2943906}, doi = {10.1109/TII.2019.2943906}, timestamp = {Fri, 30 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tii/QiuDZST20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tist/PanHLZLSLTL20, author = {Menghai Pan and Weixiao Huang and Yanhua Li and Xun Zhou and Zhenming Liu and Rui Song and Hui Lu and Zhihong Tian and Jun Luo}, title = {{DHPA:} Dynamic Human Preference Analytics Framework: {A} Case Study on Taxi Drivers' Learning Curve Analysis}, journal = {{ACM} Trans. Intell. Syst. Technol.}, volume = {11}, number = {1}, pages = {8:1--8:19}, year = {2020}, url = {https://doi.org/10.1145/3360312}, doi = {10.1145/3360312}, timestamp = {Mon, 02 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tist/PanHLZLSLTL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tomccap/GrigorevLTXRJ20, author = {Aleksei Grigorev and Shaohui Liu and Zhihong Tian and Jianxin Xiong and Seungmin Rho and Feng Jiang}, title = {Delving Deeper in Drone-Based Person Re-Id by Employing Deep Decision Forest and Attributes Fusion}, journal = {{ACM} Trans. Multim. Comput. Commun. Appl.}, volume = {16}, number = {1s}, pages = {25:1--25:15}, year = {2020}, url = {https://doi.org/10.1145/3360050}, doi = {10.1145/3360050}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tomccap/GrigorevLTXRJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsusc/JiangFGLRLMT20, author = {Feng Jiang and Yunsheng Fu and Brij B. Gupta and Yongsheng Liang and Seungmin Rho and Fang Lou and Fanzhi Meng and Zhihong Tian}, title = {Deep Learning Based Multi-Channel Intelligent Attack Detection for Data Security}, journal = {{IEEE} Trans. Sustain. Comput.}, volume = {5}, number = {2}, pages = {204--212}, year = {2020}, url = {https://doi.org/10.1109/TSUSC.2018.2793284}, doi = {10.1109/TSUSC.2018.2793284}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsusc/JiangFGLRLMT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/vtm/QiuDCTDG20, author = {Jing Qiu and Lei Du and Yuanyuan Chen and Zhihong Tian and Xiaojiang Du and Mohsen Guizani}, title = {Artificial Intelligence Security in 5G Networks: Adversarial Examples for Estimating a Travel Time Task}, journal = {{IEEE} Veh. Technol. Mag.}, volume = {15}, number = {3}, pages = {95--100}, year = {2020}, url = {https://doi.org/10.1109/MVT.2020.3002487}, doi = {10.1109/MVT.2020.3002487}, timestamp = {Tue, 01 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/vtm/QiuDCTDG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wc/SuTLLDG20, author = {Shen Su and Zhihong Tian and Siyu Liang and Shuang Li and Sha{-}sha Du and Nadra Guizani}, title = {A Reputation Management Scheme for Efficient Malicious Vehicle Identification over 5G Networks}, journal = {{IEEE} Wirel. Commun.}, volume = {27}, number = {3}, pages = {46--52}, year = {2020}, url = {https://doi.org/10.1109/MWC.001.1900456}, doi = {10.1109/MWC.001.1900456}, timestamp = {Tue, 30 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wc/SuTLLDG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wicomm/ShafiqTBCT20, author = {Muhammad Shafiq and Zhihong Tian and Ali Kashif Bashir and Korhan Cengiz and Adnan Tahir}, title = {SoftSystem: Smart Edge Computing Device Selection Method for IoT Based on Soft Set Technique}, journal = {Wirel. Commun. Mob. Comput.}, volume = {2020}, pages = {8864301:1--8864301:10}, year = {2020}, url = {https://doi.org/10.1155/2020/8864301}, doi = {10.1155/2020/8864301}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/wicomm/ShafiqTBCT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/www/HanTHLJ20, author = {Weihong Han and Zhihong Tian and Zizhong Huang and Shudong Li and Yan Jia}, title = {Topic representation model based on microblogging behavior analysis}, journal = {World Wide Web}, volume = {23}, number = {6}, pages = {3083--3097}, year = {2020}, url = {https://doi.org/10.1007/s11280-020-00822-x}, doi = {10.1007/S11280-020-00822-X}, timestamp = {Sat, 07 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/www/HanTHLJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ciat/FanLHWGT20, author = {Meihua Fan and Shudong Li and Weihong Han and Xiaobo Wu and Zhaoquan Gu and Zhihong Tian}, editor = {Zhihong Tian and Lihua Yin and Zhaoquan Gu}, title = {A Novel Malware Detection Framework Based on Weighted Heterograph}, booktitle = {{CIAT} 2020: International Conference on Cyberspace Innovation of Advanced Technologies, Virtual Event / Guangzhou, China, December 5, 2020}, pages = {39--43}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3444370.3444545}, doi = {10.1145/3444370.3444545}, timestamp = {Thu, 21 Jan 2021 16:32:07 +0100}, biburl = {https://dblp.org/rec/conf/ciat/FanLHWGT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ciat/HuangTSJ20, author = {Dongqiu Huang and Zhihong Tian and Shen Su and Yu Jiang}, editor = {Zhihong Tian and Lihua Yin and Zhaoquan Gu}, title = {A defense scheme of voice control system against DolphinAttack}, booktitle = {{CIAT} 2020: International Conference on Cyberspace Innovation of Advanced Technologies, Virtual Event / Guangzhou, China, December 5, 2020}, pages = {136--142}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3444370.3444560}, doi = {10.1145/3444370.3444560}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ciat/HuangTSJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciot3/LiuHJLTDA20, author = {Hanwen Liu and Xiaohan Helu and Chengjie Jin and Hui Lu and Zhihong Tian and Xiaojiang Du and Khalid Abualsaud}, title = {A Malware Detection Method for Health Sensor Data Based on Machine Learning}, booktitle = {{IEEE} International Conference on Informatics, IoT, and Enabling Technologies, ICIoT 2020, Doha, Qatar, February 2-5, 2020}, pages = {277--282}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICIoT48696.2020.9089478}, doi = {10.1109/ICIOT48696.2020.9089478}, timestamp = {Fri, 07 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iciot3/LiuHJLTDA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/SunYSTD20, author = {Yan Sun and Lihua Yin and Zhe Sun and Zhihong Tian and Xiaojiang Du}, title = {An IoT data sharing privacy preserving scheme}, booktitle = {39th {IEEE} Conference on Computer Communications, {INFOCOM} Workshops 2020, Toronto, ON, Canada, July 6-9, 2020}, pages = {984--990}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/INFOCOMWKSHPS50562.2020.9162939}, doi = {10.1109/INFOCOMWKSHPS50562.2020.9162939}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/SunYSTD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwcmc/ChaiQSZYT20, author = {Yuhan Chai and Jing Qiu and Shen Su and Chunsheng Zhu and Lihua Yin and Zhihong Tian}, title = {LGMal: {A} Joint Framework Based on Local and Global Features for Malware Detection}, booktitle = {16th International Wireless Communications and Mobile Computing Conference, {IWCMC} 2020, Limassol, Cyprus, June 15-19, 2020}, pages = {463--468}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/IWCMC48107.2020.9148289}, doi = {10.1109/IWCMC48107.2020.9148289}, timestamp = {Fri, 30 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwcmc/ChaiQSZYT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smc/WengGDTGQ20, author = {Jinta Weng and Wensheng Gan and Guozhu Ding and Zhihong Tian and Ying Gao and Jing Qiu}, title = {{SESM:} Emotional Social Semantic and Time Series Analysis of Learners' Comments}, booktitle = {2020 {IEEE} International Conference on Systems, Man, and Cybernetics, {SMC} 2020, Toronto, ON, Canada, October 11-14, 2020}, pages = {4134--4139}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SMC42975.2020.9283241}, doi = {10.1109/SMC42975.2020.9283241}, timestamp = {Tue, 30 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/smc/WengGDTGQ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/YangLZLTL20, author = {Mingzhou Yang and Yanhua Li and Xun Zhou and Hui Lu and Zhihong Tian and Jun Luo}, editor = {Yennun Huang and Irwin King and Tie{-}Yan Liu and Maarten van Steen}, title = {Inferring Passengers' Interactive Choices on Public Transits via {MA-AL:} Multi-Agent Apprenticeship Learning}, booktitle = {{WWW} '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020}, pages = {1637--1647}, publisher = {{ACM} / {IW3C2}}, year = {2020}, url = {https://doi.org/10.1145/3366423.3380235}, doi = {10.1145/3366423.3380235}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/www/YangLZLTL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ciat/2020, editor = {Zhihong Tian and Lihua Yin and Zhaoquan Gu}, title = {{CIAT} 2020: International Conference on Cyberspace Innovation of Advanced Technologies, Virtual Event / Guangzhou, China, December 5, 2020}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3444370}, doi = {10.1145/3444370}, isbn = {978-1-4503-8782-8}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ciat/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/SunTWLSWF19, author = {Yanbin Sun and Zhihong Tian and Yuhang Wang and Mohan Li and Shen Su and Xianzhi Wang and Dunqiu Fan}, title = {Lightweight Anonymous Geometric Routing for Internet of Things}, journal = {{IEEE} Access}, volume = {7}, pages = {29754--29762}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2902621}, doi = {10.1109/ACCESS.2019.2902621}, timestamp = {Fri, 12 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/SunTWLSWF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/HanTHHJ19, author = {Weihong Han and Zhihong Tian and Zizhong Huang and Dongqiu Huang and Yan Jia}, title = {Quantitative Assessment of Wireless Connected Intelligent Robot Swarms Network Security Situation}, journal = {{IEEE} Access}, volume = {7}, pages = {134293--134300}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2940822}, doi = {10.1109/ACCESS.2019.2940822}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/HanTHHJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/WangTGL19, author = {Le Wang and Zhihong Tian and Zhaoquan Gu and Hui Lu}, title = {Crowdsourcing Approach for Developing Hands-On Experiments in Cybersecurity Education}, journal = {{IEEE} Access}, volume = {7}, pages = {169066--169072}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2952585}, doi = {10.1109/ACCESS.2019.2952585}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/WangTGL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/LuHJSZT19, author = {Hui Lu and Xiaohan Helu and Chengjie Jin and Yanbin Sun and Man Zhang and Zhihong Tian}, title = {Salaxy: Enabling {USB} Debugging Mode Automatically to Control Android Devices}, journal = {{IEEE} Access}, volume = {7}, pages = {178321--178330}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2958837}, doi = {10.1109/ACCESS.2019.2958837}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/LuHJSZT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amc/XuDGSTWGN19, author = {Jiwei Xu and Zhenghong Deng and Bo Gao and Qun Song and Zhihong Tian and Qiuling Wang and Mingyu Gao and Zhenxi Niu}, title = {Popularity-driven strategy updating rule promotes cooperation in the spatial prisoner's dilemma game}, journal = {Appl. Math. Comput.}, volume = {353}, pages = {82--87}, year = {2019}, url = {https://doi.org/10.1016/j.amc.2019.01.060}, doi = {10.1016/J.AMC.2019.01.060}, timestamp = {Wed, 10 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/amc/XuDGSTWGN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/TianSSDGY19, author = {Zhihong Tian and Shen Su and Wei Shi and Xiaojiang Du and Mohsen Guizani and Xiang Yu}, title = {A data-driven method for future Internet route decision modeling}, journal = {Future Gener. Comput. Syst.}, volume = {95}, pages = {212--220}, year = {2019}, url = {https://doi.org/10.1016/j.future.2018.12.054}, doi = {10.1016/J.FUTURE.2018.12.054}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/TianSSDGY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijon/XuRTW19, author = {Xiongrui Xu and Zhihai Rong and Zhihong Tian and Zhi{-}Xi Wu}, title = {Timescale diversity facilitates the emergence of cooperation-extortion alliances in networked systems}, journal = {Neurocomputing}, volume = {350}, pages = {195--201}, year = {2019}, url = {https://doi.org/10.1016/j.neucom.2019.03.057}, doi = {10.1016/J.NEUCOM.2019.03.057}, timestamp = {Fri, 05 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijon/XuRTW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/TanGSWFT19, author = {Qingfeng Tan and Yue Gao and Jinqiao Shi and Xuebin Wang and Binxing Fang and Zhihong Tian}, title = {Toward a Comprehensive Insight Into the Eclipse Attacks of Tor Hidden Services}, journal = {{IEEE} Internet Things J.}, volume = {6}, number = {2}, pages = {1584--1593}, year = {2019}, url = {https://doi.org/10.1109/JIOT.2018.2846624}, doi = {10.1109/JIOT.2018.2846624}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/TanGSWFT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/LiHLLTY19, author = {Bo Li and Yanyu Huang and Zheli Liu and Jin Li and Zhihong Tian and Siu{-}Ming Yiu}, title = {HybridORAM: Practical oblivious cloud storage with constant bandwidth}, journal = {Inf. Sci.}, volume = {479}, pages = {651--663}, year = {2019}, url = {https://doi.org/10.1016/j.ins.2018.02.019}, doi = {10.1016/J.INS.2018.02.019}, timestamp = {Thu, 01 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/LiHLLTY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/TianLQSS19, author = {Zhihong Tian and Mohan Li and Meikang Qiu and Yanbin Sun and Shen Su}, title = {Block-DEF: {A} secure digital evidence framework using blockchain}, journal = {Inf. Sci.}, volume = {491}, pages = {151--165}, year = {2019}, url = {https://doi.org/10.1016/j.ins.2019.04.011}, doi = {10.1016/J.INS.2019.04.011}, timestamp = {Fri, 31 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/TianLQSS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jaihc/ChenTCYW19, author = {Juan Chen and Zhihong Tian and Xiang Cui and Lihua Yin and Xianzhi Wang}, title = {Trust architecture and reputation evaluation for internet of things}, journal = {J. Ambient Intell. Humaniz. Comput.}, volume = {10}, number = {8}, pages = {3099--3107}, year = {2019}, url = {https://doi.org/10.1007/s12652-018-0887-z}, doi = {10.1007/S12652-018-0887-Z}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jaihc/ChenTCYW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/HanTHLJ19, author = {Weihong Han and Zhihong Tian and Zizhong Huang and Shudong Li and Yan Jia}, title = {Bidirectional self-adaptive resampling in internet of things big data learning}, journal = {Multim. Tools Appl.}, volume = {78}, number = {21}, pages = {30111--30126}, year = {2019}, url = {https://doi.org/10.1007/s11042-018-6938-9}, doi = {10.1007/S11042-018-6938-9}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/HanTHLJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/GuWSTRL19, author = {Zhaoquan Gu and Yuexuan Wang and Wei Shi and Zhihong Tian and Kui Ren and Francis C. M. Lau}, title = {A Practical Neighbor Discovery Framework for Wireless Sensor Networks}, journal = {Sensors}, volume = {19}, number = {8}, pages = {1887}, year = {2019}, url = {https://doi.org/10.3390/s19081887}, doi = {10.3390/S19081887}, timestamp = {Tue, 18 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/GuWSTRL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/HanTSHL19, author = {Weihong Han and Zhihong Tian and Wei Shi and Zizhong Huang and Shudong Li}, title = {Low-Power Distributed Data Flow Anomaly-Monitoring Technology for Industrial Internet of Things}, journal = {Sensors}, volume = {19}, number = {12}, pages = {2804}, year = {2019}, url = {https://doi.org/10.3390/s19122804}, doi = {10.3390/S19122804}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/HanTSHL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/WangTZSS19, author = {Yuhang Wang and Zhihong Tian and Hongli Zhang and Shen Su and Wei Shi}, title = {Erratum: Wang, Y. et al., {A} Privacy Preserving Scheme for Nearest Neighbor Query. \emph{Sensors} 2018, \emph{18}, 2440}, journal = {Sensors}, volume = {19}, number = {14}, pages = {3187}, year = {2019}, url = {https://doi.org/10.3390/s19143187}, doi = {10.3390/S19143187}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/WangTZSS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/WangZTRLWLLFS19, author = {Zhongru Wang and Yuntao Zhang and Zhihong Tian and Qiang Ruan and Tong Liu and Haichen Wang and Zhehui Liu and Jiayi Lin and Binxing Fang and Wei Shi}, title = {Automated Vulnerability Discovery and Exploitation in the Internet of Things}, journal = {Sensors}, volume = {19}, number = {15}, pages = {3362}, year = {2019}, url = {https://doi.org/10.3390/s19153362}, doi = {10.3390/S19153362}, timestamp = {Wed, 26 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/WangZTRLWLLFS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/LiGDHYT19, author = {Hao Li and Zhaoquan Gu and Lianbing Deng and Yi Han and Cheng Yang and Zhihong Tian}, title = {A Fine-Grained Video Encryption Service Based on the Cloud-Fog-Local Architecture for Public and Private Videos}, journal = {Sensors}, volume = {19}, number = {24}, pages = {5366}, year = {2019}, url = {https://doi.org/10.3390/s19245366}, doi = {10.3390/S19245366}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/LiGDHYT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/TianSWZDSSG19, author = {Zhihong Tian and Wei Shi and Yuhang Wang and Chunsheng Zhu and Xiaojiang Du and Shen Su and Yanbin Sun and Nadra Guizani}, title = {Real-Time Lateral Movement Detection Based on Evidence Reasoning Network for Edge Computing Environment}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {15}, number = {7}, pages = {4285--4294}, year = {2019}, url = {https://doi.org/10.1109/TII.2019.2907754}, doi = {10.1109/TII.2019.2907754}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tii/TianSWZDSSG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/TianGSQDG19, author = {Zhihong Tian and Xiangsong Gao and Shen Su and Jing Qiu and Xiaojiang Du and Mohsen Guizani}, title = {Evaluating Reputation Management Schemes of Internet of Vehicles Based on Evolutionary Game Theory}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {68}, number = {6}, pages = {5971--5980}, year = {2019}, url = {https://doi.org/10.1109/TVT.2019.2910217}, doi = {10.1109/TVT.2019.2910217}, timestamp = {Fri, 30 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/TianGSQDG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gis/ZhangL0RHLTLTLL19, author = {Cong Zhang and Yanhua Li and Jie Bao and Sijie Ruan and Tianfu He and Hui Lu and Zhihong Tian and Cong Liu and Chao Tian and Jianfeng Lin and Xianen Li}, editor = {Farnoush Banaei Kashani and Goce Trajcevski and Ralf Hartmut G{\"{u}}ting and Lars Kulik and Shawn D. Newsam}, title = {Effective Recycling Planning for Dockless Sharing Bikes}, booktitle = {Proceedings of the 27th {ACM} {SIGSPATIAL} International Conference on Advances in Geographic Information Systems, {SIGSPATIAL} 2019, Chicago, IL, USA, November 5-8, 2019}, pages = {62--70}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3347146.3359340}, doi = {10.1145/3347146.3359340}, timestamp = {Sat, 09 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gis/ZhangL0RHLTLTLL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/ZhangSTYQD19, author = {Dongwen Zhang and Yaqi Si and Zhihong Tian and Lihua Yin and Jing Qiu and Xiaojiang Du}, title = {A Genetic-Algorithm Based Method for Storage Location Assignments in Mobile Rack Warehouses}, booktitle = {2019 {IEEE} Global Communications Conference, {GLOBECOM} 2019, Waikoloa, HI, USA, December 9-13, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/GLOBECOM38437.2019.9013447}, doi = {10.1109/GLOBECOM38437.2019.9013447}, timestamp = {Fri, 30 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/ZhangSTYQD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/WangTSSZ19, author = {Yuhang Wang and Zhihong Tian and Shen Su and Yanbin Sun and Chunsheng Zhu}, title = {Preserving Location Privacy in Mobile Edge Computing}, booktitle = {2019 {IEEE} International Conference on Communications, {ICC} 2019, Shanghai, China, May 20-24, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICC.2019.8761370}, doi = {10.1109/ICC.2019.8761370}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/WangTSSZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwcmc/ShenGWTSZ19, author = {Zheng Shen and Zhaoquan Gu and Yuexuan Wang and Zhihong Tian and Mingli Song and Chunsheng Zhu}, title = {Can the Max-Min Fairness-Based Coalitional Mechanism in Competitive Networks be Trustful?}, booktitle = {15th International Wireless Communications {\&} Mobile Computing Conference, {IWCMC} 2019, Tangier, Morocco, June 24-28, 2019}, pages = {348--353}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/IWCMC.2019.8766678}, doi = {10.1109/IWCMC.2019.8766678}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/iwcmc/ShenGWTSZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1902-03994, author = {Zhihong Tian and Shen Su and Xiang Yu and Yuhang Wang and Hongli Zhang and Xiaojiang Du and Mohsen Guizani}, title = {Vcash: {A} Novel Reputation Framework for Identifying Denial of Traffic Service in Internet of Connected Vehicles}, journal = {CoRR}, volume = {abs/1902.03994}, year = {2019}, url = {http://arxiv.org/abs/1902.03994}, eprinttype = {arXiv}, eprint = {1902.03994}, timestamp = {Tue, 21 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1902-03994.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1902-04009, author = {Zhihong Tian and Yanbin Sun and Shen Su and Mohan Li and Xiaojiang Du and Mohsen Guizani}, title = {Automated Attack and Defense Framework for 5G Security on Physical and Logical Layers}, journal = {CoRR}, volume = {abs/1902.04009}, year = {2019}, url = {http://arxiv.org/abs/1902.04009}, eprinttype = {arXiv}, eprint = {1902.04009}, timestamp = {Tue, 21 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1902-04009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1902-04387, author = {Zhihong Tian and Wei Shi and Yuhang Wang and Chunsheng Zhu and Xiaojiang Du and Shen Su and Yanbin Sun and Nadra Guizani}, title = {Real Time Lateral Movement Detection based on Evidence Reasoning Network for Edge Computing Environment}, journal = {CoRR}, volume = {abs/1902.04387}, year = {2019}, url = {http://arxiv.org/abs/1902.04387}, eprinttype = {arXiv}, eprint = {1902.04387}, timestamp = {Fri, 25 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1902-04387.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1902-04667, author = {Zhihong Tian and Xiangsong Gao and Shen Su and Jing Qiu and Xiaojiang Du and Mohsen Guizani}, title = {Evaluating Reputation Management Schemes of Internet of Vehicles based on Evolutionary Game Theory}, journal = {CoRR}, volume = {abs/1902.04667}, year = {2019}, url = {http://arxiv.org/abs/1902.04667}, eprinttype = {arXiv}, eprint = {1902.04667}, timestamp = {Fri, 30 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1902-04667.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1911-12101, author = {Keke Tang and Peng Song and Yuexin Ma and Zhaoquan Gu and Yu Su and Zhihong Tian and Wenping Wang}, title = {Decision Propagation Networks for Image Classification}, journal = {CoRR}, volume = {abs/1911.12101}, year = {2019}, url = {http://arxiv.org/abs/1911.12101}, eprinttype = {arXiv}, eprint = {1911.12101}, timestamp = {Tue, 03 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1911-12101.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/TianCASYYC18, author = {Zhihong Tian and Yu Cui and Lun An and Shen Su and Xiaoxia Yin and Lihua Yin and Xiang Cui}, title = {A Real-Time Correlation of Host-Level Events in Cyber Range Service for Smart Campus}, journal = {{IEEE} Access}, volume = {6}, pages = {35355--35364}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2846590}, doi = {10.1109/ACCESS.2018.2846590}, timestamp = {Wed, 27 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/TianCASYYC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/QiuCLGLT18, author = {Jing Qiu and Yuhan Chai and Yan Liu and Zhaoquan Gu and Shudong Li and Zhihong Tian}, title = {Automatic Non-Taxonomic Relation Extraction from Big Data in Smart City}, journal = {{IEEE} Access}, volume = {6}, pages = {74854--74864}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2881422}, doi = {10.1109/ACCESS.2018.2881422}, timestamp = {Fri, 30 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/QiuCLGLT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejivp/ShiL0ZT18, author = {Wuzhen Shi and Shaohui Liu and Feng Jiang and Debin Zhao and Zhihong Tian}, title = {Anchored neighborhood deep network for single-image super-resolution}, journal = {{EURASIP} J. Image Video Process.}, volume = {2018}, pages = {34}, year = {2018}, url = {https://doi.org/10.1186/s13640-018-0269-7}, doi = {10.1186/S13640-018-0269-7}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejivp/ShiL0ZT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ress/LiuTHY18, author = {Honglu Liu and Zhihong Tian and Anqiang Huang and Zaili Yang}, title = {Analysis of vulnerabilities in maritime supply chains}, journal = {Reliab. Eng. Syst. Saf.}, volume = {169}, pages = {475--484}, year = {2018}, url = {https://doi.org/10.1016/j.ress.2017.09.018}, doi = {10.1016/J.RESS.2017.09.018}, timestamp = {Tue, 25 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ress/LiuTHY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/WangT0SS18, author = {Yuhang Wang and Zhihong Tian and Hongli Zhang and Shen Su and Wei Shi}, title = {A Privacy Preserving Scheme for Nearest Neighbor Query}, journal = {Sensors}, volume = {18}, number = {8}, pages = {2440}, year = {2018}, url = {https://doi.org/10.3390/s18082440}, doi = {10.3390/S18082440}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/WangT0SS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/LiSJT18, author = {Mohan Li and Yanbin Sun and Yu Jiang and Zhihong Tian}, title = {Answering the Min-Cost Quality-Aware Query on Multi-Sources in Sensor-Cloud Systems}, journal = {Sensors}, volume = {18}, number = {12}, pages = {4486}, year = {2018}, url = {https://doi.org/10.3390/s18124486}, doi = {10.3390/S18124486}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/LiSJT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wicomm/YuTQJ18, author = {Xiang Yu and Zhihong Tian and Jing Qiu and Feng Jiang}, title = {A Data Leakage Prevention Method Based on the Reduction of Confidential and Context Terms for Smart Mobile Devices}, journal = {Wirel. Commun. Mob. Comput.}, volume = {2018}, pages = {5823439:1--5823439:11}, year = {2018}, url = {https://doi.org/10.1155/2018/5823439}, doi = {10.1155/2018/5823439}, timestamp = {Fri, 30 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wicomm/YuTQJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wicomm/WangLQTCS18, author = {Zihan Wang and Chaoge Liu and Jing Qiu and Zhihong Tian and Xiang Cui and Shen Su}, title = {Automatically Traceback RDP-Based Targeted Ransomware Attacks}, journal = {Wirel. Commun. Mob. Comput.}, volume = {2018}, pages = {7943586:1--7943586:13}, year = {2018}, url = {https://doi.org/10.1155/2018/7943586}, doi = {10.1155/2018/7943586}, timestamp = {Fri, 30 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wicomm/WangLQTCS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsc/GuWQYT18, author = {Zhaoquan Gu and Yongcai Wang and Jing Qiu and Lihua Yin and Zhihong Tian}, title = {How to Control Target Nodes in Dynamic Networks}, booktitle = {Third {IEEE} International Conference on Data Science in Cyberspace, {DSC} 2018, Guangzhou, China, June 18-21, 2018}, pages = {266--273}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/DSC.2018.00045}, doi = {10.1109/DSC.2018.00045}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsc/GuWQYT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsc/LiWL0TZ18, author = {Shudong Li and Xiaobo Wu and Aiping Li and Bin Zhou and Zhihong Tian and Dawei Zhao}, title = {Structural Vulnerability of Complex Networks Under Multiple Edge-Based Attacks}, booktitle = {Third {IEEE} International Conference on Data Science in Cyberspace, {DSC} 2018, Guangzhou, China, June 18-21, 2018}, pages = {405--409}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/DSC.2018.00065}, doi = {10.1109/DSC.2018.00065}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsc/LiWL0TZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsc/FuLMTZJ18, author = {Yunsheng Fu and Fang Lou and Fangzhi Meng and Zhihong Tian and Hua Zhang and Feng Jiang}, title = {An Intelligent Network Attack Detection Method Based on {RNN}}, booktitle = {Third {IEEE} International Conference on Data Science in Cyberspace, {DSC} 2018, Guangzhou, China, June 18-21, 2018}, pages = {483--489}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/DSC.2018.00078}, doi = {10.1109/DSC.2018.00078}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsc/FuLMTZJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsc/Wang0ST18, author = {Yuhang Wang and Hongli Zhang and Shen Su and Zhihong Tian}, title = {A Location Privacy-Aware Method for kNN Query in Location Based Services}, booktitle = {Third {IEEE} International Conference on Data Science in Cyberspace, {DSC} 2018, Guangzhou, China, June 18-21, 2018}, pages = {537--541}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/DSC.2018.00086}, doi = {10.1109/DSC.2018.00086}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dsc/Wang0ST18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsc/MengLFT18, author = {Fanzhi Meng and Fang Lou and Yunsheng Fu and Zhihong Tian}, title = {Deep Learning Based Attribute Classification Insider Threat Detection for Data Security}, booktitle = {Third {IEEE} International Conference on Data Science in Cyberspace, {DSC} 2018, Guangzhou, China, June 18-21, 2018}, pages = {576--581}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/DSC.2018.00092}, doi = {10.1109/DSC.2018.00092}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsc/MengLFT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsc/QiuST18, author = {Jing Qiu and Yaqi Si and Zhihong Tian}, title = {Automatic Taxonomy Construction for Eye Colors Data without Using Context Information}, booktitle = {Third {IEEE} International Conference on Data Science in Cyberspace, {DSC} 2018, Guangzhou, China, June 18-21, 2018}, pages = {837--841}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/DSC.2018.00134}, doi = {10.1109/DSC.2018.00134}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsc/QiuST18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/YinLZTC18, author = {Jie Yin and Heyang Lv and Fangjiao Zhang and Zhihong Tian and Xiang Cui}, editor = {David Naccache and Shouhuai Xu and Sihan Qing and Pierangela Samarati and Gregory Blanc and Rongxing Lu and Zonghua Zhang and Ahmed Meddahi}, title = {Study on Advanced Botnet Based on Publicly Available Resources}, booktitle = {Information and Communications Security - 20th International Conference, {ICICS} 2018, Lille, France, October 29-31, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11149}, pages = {57--74}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01950-1\_4}, doi = {10.1007/978-3-030-01950-1\_4}, timestamp = {Sat, 05 Sep 2020 18:01:07 +0200}, biburl = {https://dblp.org/rec/conf/icics/YinLZTC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spaccs/LiJST18, author = {Mohan Li and Yu Jiang and Yanbin Sun and Zhihong Tian}, editor = {Guojun Wang and Jinjun Chen and Laurence T. Yang}, title = {Answering the Min-Cost Quality-Aware Query on Multi-sources in Sensor-Cloud Systems}, booktitle = {Security, Privacy, and Anonymity in Computation, Communication, and Storage - 11th International Conference and Satellite Workshops, SpaCCS 2018, Melbourne, NSW, Australia, December 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11342}, pages = {156--165}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-05345-1\_13}, doi = {10.1007/978-3-030-05345-1\_13}, timestamp = {Tue, 03 Mar 2020 16:31:00 +0100}, biburl = {https://dblp.org/rec/conf/spaccs/LiJST18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsc/ZhangLFT17, author = {Hua Zhang and Fang Lou and Yunsheng Fu and Zhihong Tian}, title = {A Conditional Probability Computation Method for Vulnerability Exploitation Based on {CVSS}}, booktitle = {Second {IEEE} International Conference on Data Science in Cyberspace, {DSC} 2017, Shenzhen, China, June 26-29, 2017}, pages = {238--241}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/DSC.2017.33}, doi = {10.1109/DSC.2017.33}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsc/ZhangLFT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijstm/TianL16, author = {Zhihong Tian and Honglu Liu}, title = {Evaluation method for node importance in container supply chain network}, journal = {Int. J. Serv. Technol. Manag.}, volume = {22}, number = {3/4/5}, pages = {145--161}, year = {2016}, url = {https://doi.org/10.1504/IJSTM.2016.078534}, doi = {10.1504/IJSTM.2016.078534}, timestamp = {Thu, 30 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijstm/TianL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itm/TianZG16, author = {Zhihong Tian and Zhenji Zhang and Ruize Gao}, title = {Optimization in e-commerce market network based on value order parameter}, journal = {Inf. Technol. Manag.}, volume = {17}, number = {2}, pages = {187--197}, year = {2016}, url = {https://doi.org/10.1007/s10799-015-0244-2}, doi = {10.1007/S10799-015-0244-2}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itm/TianZG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsc/ZhangTZ16, author = {Xinxing Zhang and Zhihong Tian and Luchen Zhang}, title = {A Measurement Study on Mainline {DHT} and Magnet Link}, booktitle = {{IEEE} First International Conference on Data Science in Cyberspace, {DSC} 2016, Changsha, China, June 13-16, 2016}, pages = {11--19}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/DSC.2016.106}, doi = {10.1109/DSC.2016.106}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsc/ZhangTZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsc/DingTZWZG16, author = {Pengfule Ding and Zhihong Tian and Hongli Zhang and Yong Wang and Liang Zhang and Sanchuan Guo}, title = {Detection and Defense of {SYN} Flood Attacks Based on Dual Stack Network Firewall}, booktitle = {{IEEE} First International Conference on Data Science in Cyberspace, {DSC} 2016, Changsha, China, June 13-16, 2016}, pages = {526--531}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/DSC.2016.108}, doi = {10.1109/DSC.2016.108}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsc/DingTZWZG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/liss/ZhangLLT16, author = {Qianqian Zhang and Honglu Liu and Shifeng Liu and Zhihong Tian}, title = {Dynamic online consumer trust forming mechanism research based on Beijing, China}, booktitle = {International Conference on Logistics, Informatics and Service Sciences, {LISS} 2016, Sydney, Australia, July 24-27, 2016}, pages = {1--9}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/LISS.2016.7854515}, doi = {10.1109/LISS.2016.7854515}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/liss/ZhangLLT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhangXTF15, author = {Hongli Zhang and Dongliang Xu and Zhihong Tian and Yujian Fan}, title = {An efficient parallel algorithm for exact multi-pattern matching}, journal = {Secur. Commun. Networks}, volume = {8}, number = {9}, pages = {1688--1697}, year = {2015}, url = {https://doi.org/10.1002/sec.1115}, doi = {10.1002/SEC.1115}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZhangXTF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/CuiTFZZ13, author = {Yu Cui and Zhihong Tian and Binxing Fang and Hongli Zhang and Weizhe Zhang}, title = {Data Spoofing Attacks by IPv6 Tunnels}, journal = {{IEICE} Trans. Commun.}, volume = {96-B}, number = {11}, pages = {2875--2882}, year = {2013}, url = {https://doi.org/10.1587/transcom.E96.B.2875}, doi = {10.1587/TRANSCOM.E96.B.2875}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/CuiTFZZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itm/TianZG13, author = {Zhihong Tian and Zhenji Zhang and Xiaolan Guan}, title = {A new evolution model for {B2C} e-commerce market}, journal = {Inf. Technol. Manag.}, volume = {14}, number = {3}, pages = {205--215}, year = {2013}, url = {https://doi.org/10.1007/s10799-013-0159-8}, doi = {10.1007/S10799-013-0159-8}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itm/TianZG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jeco/TianZG13, author = {Zhihong Tian and Zhenji Zhang and Xiaolan Guan}, title = {A New Evolution Mechanism Model for {B2B} E-Commerce Network}, journal = {J. Electron. Commer. Organ.}, volume = {11}, number = {2}, pages = {12--22}, year = {2013}, url = {https://doi.org/10.4018/jeco.2013040102}, doi = {10.4018/JECO.2013040102}, timestamp = {Wed, 27 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jeco/TianZG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip12/ChenTWH13, author = {Huiping Chen and Zhihong Tian and Yubin Wang and Xue Han}, editor = {Daoliang Li and Yingyi Chen}, title = {The Analysis of County Science and Technology Worker Internet Usage and Its Influence Factors}, booktitle = {Computer and Computing Technologies in Agriculture {VII} - 7th {IFIP} {WG} 5.14 International Conference, {CCTA} 2013, Beijing, China, September 18-20, 2013, Revised Selected Papers, Part {II}}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {420}, pages = {434--443}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-54341-8\_45}, doi = {10.1007/978-3-642-54341-8\_45}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip12/ChenTWH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isctcs/LiuTWL13, author = {Pingping Liu and Zhihong Tian and Xu Wu and Wei Liu}, editor = {Yuyu Yuan and Xu Wu and Yueming Lu}, title = {An Improved Common Vulnerability Scoring System Based on K-means}, booktitle = {Trustworthy Computing and Services - International Conference, {ISCTCS} 2013, Beijing, China, November 2013, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {426}, pages = {62--69}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43908-1\_8}, doi = {10.1007/978-3-662-43908-1\_8}, timestamp = {Wed, 27 Jun 2018 10:47:48 +0200}, biburl = {https://dblp.org/rec/conf/isctcs/LiuTWL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iceis/TianZX11, author = {Zhihong Tian and Zhenji Zhang and Dongpo Xiao}, editor = {Runtong Zhang and Jos{\'{e}} Cordeiro and Xuewei Li and Zhenji Zhang and Juliang Zhang}, title = {Study on the Knowledge -Sharing Network of Innovation Teams using Social Network Analysis}, booktitle = {{ICEIS} 2011 - Proceedings of the 13th International Conference on Enterprise Information Systems, Volume 2, Beijing, China, 8-11 June, 2011}, pages = {438--443}, publisher = {SciTePress}, year = {2011}, timestamp = {Wed, 28 Sep 2011 14:47:16 +0200}, biburl = {https://dblp.org/rec/conf/iceis/TianZX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iceis/LiuT11, author = {Honglu Liu and Zhihong Tian}, editor = {Runtong Zhang and Jos{\'{e}} Cordeiro and Xuewei Li and Zhenji Zhang and Juliang Zhang}, title = {Study on the Evolution Mechanisms of the Network Public Opinion}, booktitle = {{ICEIS} 2011 - Proceedings of the 13th International Conference on Enterprise Information Systems, Volume 3, Beijing, China, 8-11 June, 2011}, pages = {444--448}, publisher = {SciTePress}, year = {2011}, timestamp = {Wed, 28 Sep 2011 15:01:13 +0200}, biburl = {https://dblp.org/rec/conf/iceis/LiuT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iceis/XiaoZTZC11, author = {Dongpo Xiao and Zhenji Zhang and Zhihong Tian and Jingyuan Zeng and Feng Cao}, editor = {Runtong Zhang and Jos{\'{e}} Cordeiro and Xuewei Li and Zhenji Zhang and Juliang Zhang}, title = {A New Chinese Public Welfare Operation Mode based on Value Network Model}, booktitle = {{ICEIS} 2011 - Proceedings of the 13th International Conference on Enterprise Information Systems, Volume 1, Beijing, China, 8-11 June, 2011}, pages = {510--514}, publisher = {SciTePress}, year = {2011}, timestamp = {Wed, 28 Sep 2011 14:19:01 +0200}, biburl = {https://dblp.org/rec/conf/iceis/XiaoZTZC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiWTLY09, author = {Yang Li and Jun{-}Li Wang and Zhihong Tian and Tianbo Lu and Chen Young}, title = {Building lightweight intrusion detection system using wrapper-based feature selection mechanisms}, journal = {Comput. Secur.}, volume = {28}, number = {6}, pages = {466--475}, year = {2009}, url = {https://doi.org/10.1016/j.cose.2009.01.001}, doi = {10.1016/J.COSE.2009.01.001}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/LiWTLY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/LiLGTQ09, author = {Yang Li and Tianbo Lu and Li Guo and Zhihong Tian and Lin Qi}, title = {Optimizing Network Anomaly Detection Scheme Using Instance Selection Mechanism}, booktitle = {Proceedings of the Global Communications Conference, 2009. {GLOBECOM} 2009, Honolulu, Hawaii, USA, 30 November - 4 December 2009}, pages = {1--7}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/GLOCOM.2009.5425547}, doi = {10.1109/GLOCOM.2009.5425547}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/globecom/LiLGTQ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itng/JiangFZTS09, author = {Wei Jiang and Binxing Fang and Hongli Zhang and Zhihong Tian and Xin{-}fang Song}, editor = {Shahram Latifi}, title = {Optimal Network Security Strengthening Using Attack-Defense Game Model}, booktitle = {Sixth International Conference on Information Technology: New Generations, {ITNG} 2009, Las Vegas, Nevada, USA, 27-29 April 2009}, pages = {475--480}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ITNG.2009.300}, doi = {10.1109/ITNG.2009.300}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itng/JiangFZTS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/LiLGTN09, author = {Yang Li and Tianbo Lu and Li Guo and Zhihong Tian and Qin{-}Wu Nie}, editor = {Juan Quemada and Gonzalo Le{\'{o}}n and Yo{\"{e}}lle S. Maarek and Wolfgang Nejdl}, title = {Towards lightweight and efficient {DDOS} attacks detection for web server}, booktitle = {Proceedings of the 18th International Conference on World Wide Web, {WWW} 2009, Madrid, Spain, April 20-24, 2009}, pages = {1139--1140}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1526709.1526896}, doi = {10.1145/1526709.1526896}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/www/LiLGTN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/LiGTL08, author = {Yang Li and Li Guo and Zhihong Tian and Tianbo Lu}, title = {A lightweight web server anomaly detection method based on transductive scheme and genetic algorithms}, journal = {Comput. Commun.}, volume = {31}, number = {17}, pages = {4018--4025}, year = {2008}, url = {https://doi.org/10.1016/j.comcom.2008.08.009}, doi = {10.1016/J.COMCOM.2008.08.009}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/LiGTL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cw/TianQYZ08, author = {Zhihong Tian and Baoshan Qin and Jianwei Ye and Hongli Zhang}, title = {Alertclu: {A} Realtime Alert Aggregation and Correlation System}, booktitle = {International Conference on Cyberworlds 2008, Hangzhou, China, 22-24 September 2008, Proceedings}, pages = {778--781}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CW.2008.116}, doi = {10.1109/CW.2008.116}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cw/TianQYZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnsc/JiangTZS08, author = {Wei Jiang and Zhihong Tian and Hongli Zhang and Xin{-}fang Song}, title = {A Stochastic Game Theoretic Approach to Attack Prediction and Optimal Active Defense Strategy Decision}, booktitle = {Proceedings of the {IEEE} International Conference on Networking, Sensing and Control, {ICNSC} 2008, Hainan, China, 6-8 April 2008}, pages = {648--653}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ICNSC.2008.4525297}, doi = {10.1109/ICNSC.2008.4525297}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/icnsc/JiangTZS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscc/LiFGTZW08, author = {Yang Li and Binxing Fang and Li Guo and Zhihong Tian and Yongzheng Zhang and Zhi{-}Gang Wu}, title = {{UBSF:} {A} novel online URL-Based Spam Filter}, booktitle = {Proceedings of the 13th {IEEE} Symposium on Computers and Communications {(ISCC} 2008), July 6-9, Marrakech, Morocco}, pages = {332--339}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ISCC.2008.4625689}, doi = {10.1109/ISCC.2008.4625689}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscc/LiFGTZW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/JiangZTS07, author = {Wei Jiang and Hongli Zhang and Zhihong Tian and Xin{-}fang Song}, title = {A Game Theoretic Method for Decision and Analysis of the Optimal Active Defense Strategy}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2007, Harbin, Heilongjiang, China, December 15-19, 2007}, pages = {819--823}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/CIS.2007.31}, doi = {10.1109/CIS.2007.31}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/JiangZTS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wias/TianHLLZ06, author = {Zhihong Tian and Mingzeng Hu and Bin Li and Bo Liu and Hongli Zhang}, title = {Defending against distributed denial-of-service attacks with an auction-based method}, journal = {Web Intell. Agent Syst.}, volume = {4}, number = {3}, pages = {341--351}, year = {2006}, url = {http://content.iospress.com/articles/web-intelligence-and-agent-systems-an-international-journal/wia00095}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wias/TianHLLZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/webi/TianFX04, author = {Zhihong Tian and Binxing Fang and Xiao{-}chun Yun}, title = {Defending Against Flash Crowds and Malicious Traffic Attacks with An Auction-Based Method}, booktitle = {2004 {IEEE/WIC/ACM} International Conference on Web Intelligence {(WI} 2004), 20-24 September 2004, Beijing, China}, pages = {24--28}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/WI.2004.10152}, doi = {10.1109/WI.2004.10152}, timestamp = {Thu, 23 Mar 2023 14:30:18 +0100}, biburl = {https://dblp.org/rec/conf/webi/TianFX04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.