default search action
Zhidong Shen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j18]Liang Dong, Jiawei Qiu, Zhongwang Fu, Leiyang Chen, Xiaohui Cui, Zhidong Shen:
Stealthy dynamic backdoor attack against neural networks for image classification. Appl. Soft Comput. 149(Part A): 110993 (2024) - [j17]Liang Dong, Leiyang Chen, Zhongwang Fu, Chengliang Zheng, Xiaohui Cui, Zhidong Shen:
Leveraging saliency priors and explanations for enhanced consistent interpretability. Expert Syst. Appl. 249: 123518 (2024) - [j16]Liang Dong, Zhongwang Fu, Leiyang Chen, Hongwei Ding, Chengliang Zheng, Xiaohui Cui, Zhidong Shen:
FDNet: Imperceptible backdoor attacks via frequency domain steganography and negative sampling. Neurocomputing 583: 127546 (2024) - [j15]Umer Zukaib, Xiaohui Cui, Chengliang Zheng, Mir Hassan, Zhidong Shen:
Meta-IDS: Meta-Learning-Based Smart Intrusion Detection System for Internet of Medical Things (IoMT) Network. IEEE Internet Things J. 11(13): 23080-23095 (2024) - [j14]Liang Dong, Leiyang Chen, Chengliang Zheng, Zhongwang Fu, Umer Zukaib, Xiaohui Cui, Zhidong Shen:
OCIE: Augmenting model interpretability via Deconfounded Explanation-Guided Learning. Knowl. Based Syst. 302: 112390 (2024) - [j13]Qi Hu, Zhidong Shen, Zongyao Sha, Weijie Tan:
Multiloss Adversarial Attacks for Multimodal Remote Sensing Image Classification. IEEE Trans. Geosci. Remote. Sens. 62: 1-13 (2024) - [j12]Hongwei Ding, Yu Sun, Nana Huang, Zhidong Shen, Xiaohui Cui:
TMG-GAN: Generative Adversarial Networks-Based Imbalanced Learning for Network Intrusion Detection. IEEE Trans. Inf. Forensics Secur. 19: 1156-1167 (2024) - 2023
- [j11]Zhidong Shen, Ting Zhong, Hui Sun, Baiwen Qi:
RRN: A differential private approach to preserve privacy in image classification. IET Image Process. 17(7): 2192-2203 (2023) - [j10]Haojie Zhang, Zhidong Shen:
News Recommendation Based on User Topic and Entity Preferences in Historical Behavior. Inf. 14(2): 60 (2023) - [j9]Hongwei Ding, Yu Sun, Zhenyu Wang, Nana Huang, Zhidong Shen, Xiaohui Cui:
RGAN-EL: A GAN and ensemble learning-based hybrid approach for imbalanced data classification. Inf. Process. Manag. 60(2): 103235 (2023) - [j8]Hongwei Ding, Yu Sun, Nana Huang, Zhidong Shen, Zhenyu Wang, Adnan Iftekhar, Xiaohui Cui:
RVGAN-TL: A generative adversarial networks and transfer learning-based hybrid approach for imbalanced data classification. Inf. Sci. 629: 184-203 (2023) - [j7]Wei Li, Jinlin Chen, Zhenyu Wang, Zhidong Shen, Chao Ma, Xiaohui Cui:
IFL-GAN: Improved Federated Learning Generative Adversarial Network With Maximum Mean Discrepancy Model Aggregation. IEEE Trans. Neural Networks Learn. Syst. 34(12): 10502-10515 (2023) - [c6]Fenghong Chen, Zhidong Shen:
A Data-Free Substitute Model Training Method for Textual Adversarial Attacks. ICONIP (14) 2023: 295-307 - 2021
- [j6]Zhidong Shen, Ting Zhong:
Analysis of Application Examples of Differential Privacy in Deep Learning. Comput. Intell. Neurosci. 2021: 4244040:1-4244040:15 (2021) - 2020
- [j5]Zhidong Shen, Siyuan Lu, Huijuan Huang, Meng Yuan, Guoming Tang, Weiying Chen, Taige Zhang, Ting Zhong:
An Approach Based on Customized Robust Cloaked Region for Geographic Location Information Privacy Protection. Mob. Inf. Syst. 2020: 3903681:1-3903681:12 (2020) - [j4]Zhidong Shen, Si Chen:
A Survey of Automatic Software Vulnerability Detection, Program Repair, and Defect Prediction Techniques. Secur. Commun. Networks 2020: 8858010:1-8858010:16 (2020)
2010 – 2019
- 2019
- [j3]Zhidong Shen, Weiying Chen:
A Survey of Research on Runtime Rerandomization Under Memory Disclosure. IEEE Access 7: 105432-105440 (2019) - [j2]Zhidong Shen, Yuhao Zhang, Weiying Chen:
A Bayesian Classification Intrusion Detection Method Based on the Fusion of PCA and LDA. Secur. Commun. Networks 2019: 6346708:1-6346708:11 (2019) - [c5]Adnan Shehzad, Nauman Zafar, Mir Hassan, Zhidong Shen:
Food Item Recognition and Intake Measurement Techniques. ICMLC 2019: 405-411 - 2017
- [j1]Chen Lin, Zhidong Shen, Qian Chen, Frederick T. Sheldon:
A data integrity verification scheme in mobile cloud computing. J. Netw. Comput. Appl. 77: 146-151 (2017) - 2013
- [c4]Huayi Wu, Zhidong Shen, Baohua Bai:
A security protocol with minimum interference for UWB and WiFi networks. SCVT 2013: 1-5 - [c3]Li Li, Dijiang Huang, Zhidong Shen, Samia Bouzefrane:
A cloud based dual-root trust model for secure mobile online transactions. WCNC 2013: 4404-4409
2000 – 2009
- 2009
- [c2]Zhidong Shen, Qiang Tong:
A Security Technology for Mobile Agent System Improved by Trusted Computing Platform. HIS (3) 2009: 46-50 - [c1]Qiang Tong, Zhidong Shen:
Research of Mobile Agent Technology for GIS Grid. HIS (2) 2009: 190-194
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-22 00:39 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint