


default search action
Hongli Zhang 0001
Person information
- unicode name: 张宏莉
- affiliation (PhD 1999): Harbin Institute of Technology, Computer Science and Technology Department, China
Other persons with the same name
- Hongli Zhang (aka: Hong-li Zhang, Hong-Li Zhang) — disambiguation page
- Hongli Zhang 0002 — Beijing Institute of Technology, School of Computer Science and Technology, China
- Hongli Zhang 0003 ![0000-0001-8526-9364 [0000-0001-8526-9364]](https://dblp1.uni-trier.de/img/orcid-mark.12x12.png) — Shanghai University, School of Mechatronics Engineering and Automation, China — Shanghai University, School of Mechatronics Engineering and Automation, China
- Hongli Zhang 0004 ![0000-0001-7674-8339 [0000-0001-7674-8339]](https://dblp1.uni-trier.de/img/orcid-mark.12x12.png) (aka: Hong-li Zhang 0004) — Xinjiang University, School of Electrical Engineering, Urumqi, China (and 1 more) (aka: Hong-li Zhang 0004) — Xinjiang University, School of Electrical Engineering, Urumqi, China (and 1 more)
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
 [j100]Yunting Zhang [j100]Yunting Zhang , Lin Ye, Kai Tan, Zeshu Tian, Baisong Li, Hongli Zhang: , Lin Ye, Kai Tan, Zeshu Tian, Baisong Li, Hongli Zhang:
 ChatGPT in threefold: As attacker, target, and evaluator in adversarial attacks. Neurocomputing 621: 129307 (2025)
 [j99]Chao Meng [j99]Chao Meng , Binxing Fang, Hongli Zhang, Yuchen Yang, Gongzhu Yin, Kun Lu: , Binxing Fang, Hongli Zhang, Yuchen Yang, Gongzhu Yin, Kun Lu:
 Stance classification model with knowledge-aware multi-feature attention network. Neural Comput. Appl. 37(18): 11965-11990 (2025)
 [j98]Jinyu Zhu, Yu Zhang, Yunan Wang, Hongli Zhang, Binxing Fang: [j98]Jinyu Zhu, Yu Zhang, Yunan Wang, Hongli Zhang, Binxing Fang:
 Paths in the cloud: Geolocation mapping of Amazon's cross-border connectivity. Peer Peer Netw. Appl. 18(3): 127 (2025)
 [j97]Shiliang Ao [j97]Shiliang Ao , Binxing Fang, Xinguang Xiao, Hongli Zhang: , Binxing Fang, Xinguang Xiao, Hongli Zhang:
 Threat ripple model: A model to characterize business-oriented attacks based on business dependencies. Secur. Saf. 4: 2025003 (2025)
 [j96]Chao Meng [j96]Chao Meng , Hongli Zhang , Hongli Zhang , Gongzhu Yin , Gongzhu Yin , Yang Gao , Yang Gao , Binxing Fang: , Binxing Fang:
 Sign-Aware Graph Learning Framework for Stance Detection. IEEE Signal Process. Lett. 32: 2928-2932 (2025)
 [j95]Xiwen Fu [j95]Xiwen Fu , Guopu Zhu , Guopu Zhu , Hongli Zhang , Hongli Zhang , Xinpeng Zhang , Xinpeng Zhang , Anthony T. S. Ho, Sam Kwong , Anthony T. S. Ho, Sam Kwong : :
 Multi-Level Feature Fusion Network for Shadow Removal Detection. IEEE Trans. Circuits Syst. Video Technol. 35(7): 6508-6521 (2025)
 [j94]Dongyang Zhan [j94]Dongyang Zhan , Wenqi Zhang, Lin Ye , Wenqi Zhang, Lin Ye , Xiangzhan Yu, Hongli Zhang , Xiangzhan Yu, Hongli Zhang , Zheng He: , Zheng He:
 Anomaly Detection in Industrial Control Systems Based on Cross-Domain Representation Learning. IEEE Trans. Dependable Secur. Comput. 22(3): 2505-2518 (2025)
 [j93]Kai Tan, Dongyang Zhan, Lin Ye, Hongli Zhang, Binxing Fang, Zhihong Tian: [j93]Kai Tan, Dongyang Zhan, Lin Ye, Hongli Zhang, Binxing Fang, Zhihong Tian:
 A high-performance real-time container file monitoring approach based on virtual machine introspection. J. Supercomput. 81(1): 260 (2025)
 [j92]Yunting Zhang [j92]Yunting Zhang , Lin Ye, Shang Li, Yue Wu, Baisong Li, Hongli Zhang: , Lin Ye, Shang Li, Yue Wu, Baisong Li, Hongli Zhang:
 Chinese legal adversarial text generation based on interpretable perturbation strategies. World Wide Web (WWW) 28(2): 24 (2025)
 [c128]Wanzong Peng, Lin Ye, Xuetao Du, Hongli Zhang, Dongyang Zhan, Yunting Zhang, Yicheng Guo, Chen Zhang: [c128]Wanzong Peng, Lin Ye, Xuetao Du, Hongli Zhang, Dongyang Zhan, Yunting Zhang, Yicheng Guo, Chen Zhang:
 PwnGPT: Automatic Exploit Generation Based on Large Language Models. ACL (1) 2025: 11481-11494
 [c127]Kun Lu, Hongli Zhang, Tianze Sun, Yuchen Yang, Chao Meng, Gongzhu Yin, Binxing Fang: [c127]Kun Lu, Hongli Zhang, Tianze Sun, Yuchen Yang, Chao Meng, Gongzhu Yin, Binxing Fang:
 GMCL: Graph-Enhanced Multimodal Contrastive Learning for Rumor Detection. ICASSP 2025: 1-5
 [c126]Kun Lu, Hongli Zhang, Yuchen Yang, Binxing Fang: [c126]Kun Lu, Hongli Zhang, Yuchen Yang, Binxing Fang:
 Multi-Relation Aware Heterogeneous Graph Transformer for Robust Spammer Detection via Contrastive Learning in Social Networks. ICC 2025: 4683-4688
 [c125]Chao Meng, Hongli Zhang, Gongzhu Yin, Yuchen Yang, Yang Gao, Binxing Fang: [c125]Chao Meng, Hongli Zhang, Gongzhu Yin, Yuchen Yang, Yang Gao, Binxing Fang:
 Implicit Sign-Enhanced Stance Detection Model with Semantic Graph Attention Network. ICC 2025: 7133-7139
 [c124]Gongzhu Yin [c124]Gongzhu Yin , Hongli Zhang , Hongli Zhang , Yuchen Yang , Yuchen Yang , Yi Luo , Yi Luo : :
 Inductive Link Prediction on N-ary Relational Facts via Semantic Hypergraph Reasoning. KDD (1) 2025: 1821-1832
 [i12]Gongzhu Yin, Hongli Zhang, Yuchen Yang, Yi Luo: [i12]Gongzhu Yin, Hongli Zhang, Yuchen Yang, Yi Luo:
 Inductive Link Prediction on N-ary Relational Facts via Semantic Hypergraph Reasoning. CoRR abs/2503.20676 (2025)
 [i11]Gongzhu Yin, Hongli Zhang, Yi Luo, Yuchen Yang, Kun Lu, Chao Meng: [i11]Gongzhu Yin, Hongli Zhang, Yi Luo, Yuchen Yang, Kun Lu, Chao Meng:
 Ignite Forecasting with SPARK: An Efficient Generative Framework for Refining LLMs in Temporal Knowledge Graph Forecasting. CoRR abs/2503.22748 (2025)
 [i10]Zhaofeng Yu, Dongyang Zhan, Lin Ye, Haining Yu, Hongli Zhang, Zhihong Tian: [i10]Zhaofeng Yu, Dongyang Zhan, Lin Ye, Haining Yu, Hongli Zhang, Zhihong Tian:
 Exploring and Exploiting the Resource Isolation Attack Surface of WebAssembly Containers. CoRR abs/2509.11242 (2025)
 [i9]Dongyang Zhan, Wenqi Zhang, Lin Ye, Xiangzhan Yu, Hongli Zhang, Zheng He: [i9]Dongyang Zhan, Wenqi Zhang, Lin Ye, Xiangzhan Yu, Hongli Zhang, Zheng He:
 Anomaly Detection in Industrial Control Systems Based on Cross-Domain Representation Learning. CoRR abs/2509.11786 (2025)
 [i8]Kai Tan, Dongyang Zhan, Lin Ye, Hongli Zhang, Binxing Fang: [i8]Kai Tan, Dongyang Zhan, Lin Ye, Hongli Zhang, Binxing Fang:
 A Practical Adversarial Attack against Sequence-based Deep Learning Malware Classifiers. CoRR abs/2509.11836 (2025)
 [i7]Dongyang Zhan, Kai Tan, Lin Ye, Xiangzhan Yu, Hongli Zhang, Zheng He: [i7]Dongyang Zhan, Kai Tan, Lin Ye, Xiangzhan Yu, Hongli Zhang, Zheng He:
 An Adversarial Robust Behavior Sequence Anomaly Detection Approach Based on Critical Behavior Unit Learning. CoRR abs/2509.15756 (2025)
 [i6]Kai Tan, Dongyang Zhan, Lin Ye, Hongli Zhang, Binxing Fang, Zhihong Tian: [i6]Kai Tan, Dongyang Zhan, Lin Ye, Hongli Zhang, Binxing Fang, Zhihong Tian:
 A High-performance Real-time Container File Monitoring Approach Based on Virtual Machine Introspection. CoRR abs/2509.16030 (2025)
- 2024
 [j91]Chunyu Liu, Hongli Zhang, Guopu Zhu [j91]Chunyu Liu, Hongli Zhang, Guopu Zhu , Haotian Guan, Sam Kwong , Haotian Guan, Sam Kwong : :
 Exploring trajectory embedding via spatial-temporal propagation for dynamic region representations. Inf. Sci. 668: 120516 (2024)
 [j90]Zuquan Liu, Guopu Zhu [j90]Zuquan Liu, Guopu Zhu , Yu Zhang, Hongli Zhang, Sam Kwong: , Yu Zhang, Hongli Zhang, Sam Kwong:
 An efficient cheating-detectable secret image sharing scheme with smaller share sizes. J. Inf. Secur. Appl. 81: 103709 (2024)
 [j89]Zeshu Tian [j89]Zeshu Tian , Hongli Zhang, Yan Wang , Hongli Zhang, Yan Wang : :
 Personalised soft prompt tuning in pre-trained language models: Bridging multitask transfer learning and crowdsourcing learning. Knowl. Based Syst. 305: 112646 (2024)
 [j88]Yunting Zhang [j88]Yunting Zhang , Shang Li, Lin Ye, Hongli Zhang, Zhe Chen, Binxing Fang: , Shang Li, Lin Ye, Hongli Zhang, Zhe Chen, Binxing Fang:
 Kalt: generating adversarial explainable chinese legal texts. Mach. Learn. 113(9): 6341-6371 (2024)
 [j87]Yunting Zhang [j87]Yunting Zhang , Lin Ye, Zeshu Tian , Lin Ye, Zeshu Tian , Zhe Chen, Hongli Zhang, Baisong Li, Binxing Fang: , Zhe Chen, Hongli Zhang, Baisong Li, Binxing Fang:
 UCTT: universal and low-cost adversarial example generation for tendency classification. Neural Comput. Appl. 36(22): 13865-13894 (2024)
 [j86]Kai Tan [j86]Kai Tan , Dongyang Zhan , Dongyang Zhan , Lin Ye , Lin Ye , Hongli Zhang , Hongli Zhang , Binxing Fang , Binxing Fang : :
 A Practical Adversarial Attack Against Sequence-Based Deep Learning Malware Classifiers. IEEE Trans. Computers 73(3): 708-721 (2024)
 [j85]Benxin Zhang [j85]Benxin Zhang , Guopu Zhu , Guopu Zhu , Zhibin Zhu , Zhibin Zhu , Hongli Zhang , Hongli Zhang , Yicong Zhou , Yicong Zhou , Sam Kwong , Sam Kwong : :
 Impulse Noise Image Restoration Using Nonconvex Variational Model and Difference of Convex Functions Algorithm. IEEE Trans. Cybern. 54(4): 2257-2270 (2024)
 [c123]Zeshu Tian, Hongli Zhang, Yan Wang [c123]Zeshu Tian, Hongli Zhang, Yan Wang : :
 Reinforcement-Based Denoising for Crowdsourcing Named Entity Recognition in Social Networks. ICC 2024: 1163-1169
 [c122]Kai Tan, Dongyang Zhan, Zhaofeng Yu, Lin Ye, Hongli Zhang, Binxing Fang: [c122]Kai Tan, Dongyang Zhan, Zhaofeng Yu, Lin Ye, Hongli Zhang, Binxing Fang:
 Multi-Stage Defense: Enhancing Robustness in Sequence-Based Log Anomaly Detection. ICC 2024: 2725-2730
- 2023
 [j84]Zhe Chen, Shang Li [j84]Zhe Chen, Shang Li , Lin Ye, Hongli Zhang: , Lin Ye, Hongli Zhang:
 Multi-label classification of legal text based on label embedding and capsule network. Appl. Intell. 53(6): 6873-6886 (2023)
 [j83]Dongyang Zhan [j83]Dongyang Zhan , Zhaofeng Yu , Zhaofeng Yu , Xiangzhan Yu, Hongli Zhang , Xiangzhan Yu, Hongli Zhang , Lin Ye , Lin Ye , Likun Liu , Likun Liu : :
 Securing Operating Systems Through Fine-Grained Kernel Access Limitation for IoT Systems. IEEE Internet Things J. 10(6, March 15): 5378-5392 (2023)
 [j82]Dongyang Zhan [j82]Dongyang Zhan , Kai Tan , Kai Tan , Lin Ye , Lin Ye , Xiangzhan Yu , Xiangzhan Yu , Hongli Zhang , Hongli Zhang , Zheng He , Zheng He : :
 An Adversarial Robust Behavior Sequence Anomaly Detection Approach Based on Critical Behavior Unit Learning. IEEE Trans. Computers 72(11): 3286-3299 (2023)
 [j81]Yulan Zhang [j81]Yulan Zhang , Guopu Zhu , Guopu Zhu , Xing Wang, Xiangyang Luo , Xing Wang, Xiangyang Luo , Yicong Zhou , Yicong Zhou , Hongli Zhang , Hongli Zhang , Ligang Wu , Ligang Wu : :
 CNN-Transformer Based Generative Adversarial Network for Copy-Move Source/ Target Distinguishment. IEEE Trans. Circuits Syst. Video Technol. 33(5): 2019-2032 (2023)
 [j80]Haining Yu [j80]Haining Yu , Hongli Zhang , Hongli Zhang , Xiaohua Jia , Xiaohua Jia , Xiao Chen, Xiangzhan Yu: , Xiao Chen, Xiangzhan Yu:
 pSafety: Privacy-Preserving Safety Monitoring in Online Ride Hailing Services. IEEE Trans. Dependable Secur. Comput. 20(1): 209-224 (2023)
 [j79]Jinkun You [j79]Jinkun You , Yuan-Gen Wang , Yuan-Gen Wang , Guopu Zhu , Guopu Zhu , Ligang Wu , Ligang Wu , Hongli Zhang , Hongli Zhang , Sam Kwong , Sam Kwong : :
 Estimating the Secret Key of Spread Spectrum Watermarking Based on Equivalent Keys. IEEE Trans. Multim. 25: 2459-2473 (2023)
 [j78]Yang Gao [j78]Yang Gao , Hongli Zhang , Hongli Zhang , Xiangzhan Yu: , Xiangzhan Yu:
 Higher-Order Community Detection: On Information Degeneration and Its Elimination. IEEE/ACM Trans. Netw. 31(2): 891-903 (2023)
 [j77]Dongyang Zhan [j77]Dongyang Zhan , Zhaofeng Yu, Xiangzhan Yu, Hongli Zhang , Zhaofeng Yu, Xiangzhan Yu, Hongli Zhang , Lin Ye , Lin Ye : :
 Shrinking the Kernel Attack Surface Through Static and Dynamic Syscall Limitation. IEEE Trans. Serv. Comput. 16(2): 1431-1443 (2023)
 [j76]Dongyang Zhan [j76]Dongyang Zhan , Xiangzhan Yu, Hongli Zhang , Xiangzhan Yu, Hongli Zhang , Lin Ye , Lin Ye : :
 ErrHunter: Detecting Error-Handling Bugs in the Linux Kernel Through Systematic Static Analysis. IEEE Trans. Software Eng. 49(2): 684-698 (2023)
 [c121]Yue Wu, Lin Ye, Baisong Li, Hongli Zhang, Jing Cao: [c121]Yue Wu, Lin Ye, Baisong Li, Hongli Zhang, Jing Cao:
 Comparative Performance Analysis of Lightweight BERT-derived Models for Cybersecurity Corpus in Cloud Networks. CloudNet 2023: 443-447
 [c120]Gongzhu Yin [c120]Gongzhu Yin , Xing Wang , Xing Wang , Hongli Zhang , Hongli Zhang , Chao Meng , Chao Meng , Yuchen Yang , Yuchen Yang , Kun Lu , Kun Lu , Yi Luo , Yi Luo : :
 Beyond Individuals: Modeling Mutual and Multiple Interactions for Inductive Link Prediction between Groups. WSDM 2023: 751-759
- 2022
 [j75]Yang Gao, Xiangzhan Yu, Hongli Zhang: [j75]Yang Gao, Xiangzhan Yu, Hongli Zhang:
 Graph clustering using triangle-aware measures in large networks. Inf. Sci. 584: 618-632 (2022)
 [j74]Fanghui Sun [j74]Fanghui Sun , Shen Wang, Hongli Zhang: , Shen Wang, Hongli Zhang:
 A progressive learning method on unknown protocol behaviors. J. Netw. Comput. Appl. 197: 103249 (2022)
 [j73]Gongzhu Yin [j73]Gongzhu Yin , Xing Wang, Hongli Zhang, Jinlin Wang: , Xing Wang, Hongli Zhang, Jinlin Wang:
 Cost-effective CNNs-based prototypical networks for few-shot relation classification across domains. Knowl. Based Syst. 253: 109470 (2022)
 [j72]Yulan Zhang [j72]Yulan Zhang , Guopu Zhu , Guopu Zhu , Ligang Wu , Ligang Wu , Sam Kwong , Sam Kwong , Hongli Zhang , Hongli Zhang , Yicong Zhou , Yicong Zhou : :
 Multi-Task SE-Network for Image Splicing Localization. IEEE Trans. Circuits Syst. Video Technol. 32(7): 4828-4840 (2022)
 [j71]Jie Chang, Guopu Zhu [j71]Jie Chang, Guopu Zhu , Hongli Zhang , Hongli Zhang , Yicong Zhou , Yicong Zhou , Xiangyang Luo , Xiangyang Luo , Ligang Wu , Ligang Wu : :
 Reversible Data Hiding for Color Images Based on Adaptive 3D Prediction-Error Expansion and Double Deep Q-Network. IEEE Trans. Circuits Syst. Video Technol. 32(8): 5055-5067 (2022)
 [j70]Xiaojie Fang [j70]Xiaojie Fang , Zhaopeng Du, Xinyu Yin, Lei Liu , Zhaopeng Du, Xinyu Yin, Lei Liu , Xuejun Sha , Xuejun Sha , Hongli Zhang , Hongli Zhang : :
 Toward Physical Layer Security and Efficiency for SAGIN: A WFRFT-Based Parallel Complex-Valued Spectrum Spreading Approach. IEEE Trans. Intell. Transp. Syst. 23(3): 2819-2829 (2022)
 [j69]Ahmed Samy [j69]Ahmed Samy , Ibrahim A. Elgendy , Ibrahim A. Elgendy , Haining Yu , Haining Yu , Weizhe Zhang , Weizhe Zhang , Hongli Zhang , Hongli Zhang : :
 Secure Task Offloading in Blockchain-Enabled Mobile Edge Computing With Deep Reinforcement Learning. IEEE Trans. Netw. Serv. Manag. 19(4): 4872-4887 (2022)
 [j68]Haining Yu [j68]Haining Yu , Xiaohua Jia , Xiaohua Jia , Hongli Zhang , Hongli Zhang , Jiangang Shu , Jiangang Shu : :
 Efficient and Privacy-Preserving Ride Matching Using Exact Road Distance in Online Ride Hailing Services. IEEE Trans. Serv. Comput. 15(4): 1841-1854 (2022)
 [c119]Chuanwang Ma, Yu Zhang, Binxing Fang, Hongli Zhang: [c119]Chuanwang Ma, Yu Zhang, Binxing Fang, Hongli Zhang:
 DWBFT: A Weighted Byzantine Fault Tolerant Protocol with Decentralized Trust. ICC 2022: 5384-5390
- 2021
 [j67]Xiaoding Guo [j67]Xiaoding Guo , Hongli Zhang, Lin Ye, Shang Li: , Hongli Zhang, Lin Ye, Shang Li:
 TenLa: an approach based on controllable tensor decomposition and optimized lasso regression for judgement prediction of legal cases. Appl. Intell. 51(4): 2233-2252 (2021)
 [j66]Yang Gao, Xiangzhan Yu, Hongli Zhang: [j66]Yang Gao, Xiangzhan Yu, Hongli Zhang:
 Overlapping community detection by constrained personalized PageRank. Expert Syst. Appl. 173: 114682 (2021)
 [j65]Haining Yu [j65]Haining Yu , Hongli Zhang , Hongli Zhang , Xiangzhan Yu, Xiaojiang Du , Xiangzhan Yu, Xiaojiang Du , Mohsen Guizani , Mohsen Guizani : :
 PGRide: Privacy-Preserving Group Ridesharing Matching in Online Ride Hailing Services. IEEE Internet Things J. 8(7): 5722-5735 (2021)
 [j64]Ahmed Samy [j64]Ahmed Samy , Haining Yu, Hongli Zhang, Guangyao Zhang: , Haining Yu, Hongli Zhang, Guangyao Zhang:
 SPETS: Secure and Privacy-Preserving Energy Trading System in Microgrid. Sensors 21(23): 8121 (2021)
 [j63]Haining Yu [j63]Haining Yu , Xiaohua Jia , Xiaohua Jia , Hongli Zhang , Hongli Zhang , Xiangzhan Yu, Jiangang Shu , Xiangzhan Yu, Jiangang Shu : :
 PSRide: Privacy-Preserving Shared Ride Matching for Online Ride Hailing Systems. IEEE Trans. Dependable Secur. Comput. 18(3): 1425-1440 (2021)
 [j62]Yu Zhang [j62]Yu Zhang , Wenfeng Liu , Wenfeng Liu , Zhongda Xia , Zhongda Xia , Zhongze Wang , Zhongze Wang , Lu Liu , Lu Liu , Weizhe Zhang, Hongli Zhang, Binxing Fang: , Weizhe Zhang, Hongli Zhang, Binxing Fang:
 Blockchain-Based DNS Root Zone Management Decentralization for Internet of Things. Wirel. Commun. Mob. Comput. 2021: 6620236:1-6620236:20 (2021)
 [c118]Zhaofeng Yu [c118]Zhaofeng Yu , Lin Ye, Hongli Zhang, Dongyang Zhan , Lin Ye, Hongli Zhang, Dongyang Zhan : :
 A Container-Oriented Virtual-Machine-Introspection-Based Security Monitor to Secure Containers in Cloud Computing. ICAIS (2) 2021: 102-111
 [c117]Xiaojie Fang, Xinyu Yin, Ning Zhang [c117]Xiaojie Fang, Xinyu Yin, Ning Zhang , Xuejun Sha, Hongli Zhang, Zhu Han: , Xuejun Sha, Hongli Zhang, Zhu Han:
 Demonstrating Physical Layer Security Via Weighted Fractional Fourier Transform. INFOCOM Workshops 2021: 1-2
- 2020
 [j61]Ahmed Samy [j61]Ahmed Samy , Haining Yu , Haining Yu , Hongli Zhang: , Hongli Zhang:
 Fog-Based Attack Detection Framework for Internet of Things Using Deep Learning. IEEE Access 8: 74571-74585 (2020)
 [j60]Xiaoding Guo [j60]Xiaoding Guo , Hongli Zhang , Hongli Zhang , Lin Ye , Lin Ye , Shang Li , Shang Li , Guangyao Zhang: , Guangyao Zhang:
 TenRR: An Approach Based on Innovative Tensor Decomposition and Optimized Ridge Regression for Judgment Prediction of Legal Cases. IEEE Access 8: 167914-167929 (2020)
 [j59]Fanghui Sun [j59]Fanghui Sun , Shen Wang, Chunrui Zhang, Hongli Zhang: , Shen Wang, Chunrui Zhang, Hongli Zhang:
 Clustering of unknown protocol messages based on format comparison. Comput. Networks 179: 107296 (2020)
 [j58]Xiaomeng Wang, Binxing Fang, Hongli Zhang, Xing Wang: [j58]Xiaomeng Wang, Binxing Fang, Hongli Zhang, Xing Wang:
 Predicting the security threats on the spreading of rumor, false information of Facebook content based on the principle of sociology. Comput. Commun. 150: 455-462 (2020)
 [j57]Ning Zhang [j57]Ning Zhang , Xiaojie Fang , Xiaojie Fang , Ye Wang , Ye Wang , Shaohua Wu , Shaohua Wu , Huici Wu , Huici Wu , Dulal C. Kar , Dulal C. Kar , Hongli Zhang , Hongli Zhang : :
 Physical-Layer Authentication for Internet of Things via WFRFT-Based Gaussian Tag Embedding. IEEE Internet Things J. 7(9): 9001-9010 (2020)
 [j56]Yang Gao, Xiangzhan Yu, Hongli Zhang: [j56]Yang Gao, Xiangzhan Yu, Hongli Zhang:
 Uncovering overlapping community structure in static and dynamic networks. Knowl. Based Syst. 201-202: 106060 (2020)
 [j55]Haining Yu [j55]Haining Yu , Hongli Zhang, Xiangzhan Yu: , Hongli Zhang, Xiangzhan Yu:
 Hail the Closest Driver on Roads: Privacy-Preserving Ride Matching in Online Ride Hailing Services. Secur. Commun. Networks 2020: 4948387:1-4948387:13 (2020)
 [c116]Jiaxi Liu, Lin Ye, Hongli Zhang, Xiaoding Guo: [c116]Jiaxi Liu, Lin Ye, Hongli Zhang, Xiaoding Guo:
 Named entity recognition of legal judgment based on small-scale labeled data. CIAT 2020: 549-555
 [c115]Wenfeng Liu, Yu Zhang, Lu Liu, Shuyan Liu, Hongli Zhang, Binxing Fang: [c115]Wenfeng Liu, Yu Zhang, Lu Liu, Shuyan Liu, Hongli Zhang, Binxing Fang:
 A secure domain name resolution and management architecture based on blockchain. ISCC 2020: 1-7
2010 – 2019
- 2019
 [j54]Shang Li [j54]Shang Li , Hongli Zhang, Lin Ye , Hongli Zhang, Lin Ye , Xiaoding Guo, Binxing Fang: , Xiaoding Guo, Binxing Fang:
 MANN: A Multichannel Attentive Neural Network for Legal Judgment Prediction. IEEE Access 7: 151144-151155 (2019)
 [j53]Yuxi Xie, Lizhi Peng [j53]Yuxi Xie, Lizhi Peng , Zhenxiang Chen, Bo Yang, Hongli Zhang, Haibo Zhang , Zhenxiang Chen, Bo Yang, Hongli Zhang, Haibo Zhang : :
 Generative learning for imbalanced data using the Gaussian mixed model. Appl. Soft Comput. 79: 439-451 (2019)
 [j52]Xiaoding Guo [j52]Xiaoding Guo , Hongli Zhang , Hongli Zhang , Lin Ye, Shang Li , Lin Ye, Shang Li : :
 RnRTD: Intelligent Approach Based on the Relationship-Driven Neural Network and Restricted Tensor Decomposition for Multiple Accusation Judgment in Legal Cases. Comput. Intell. Neurosci. 2019: 6705405:1-6705405:18 (2019)
 [j51]Xiaomeng Wang, Binxing Fang, Hongli Zhang, Yuhang Wang: [j51]Xiaomeng Wang, Binxing Fang, Hongli Zhang, Yuhang Wang:
 A competitive model of popularity prediction using correlation matrix. Clust. Comput. 22(Supplement): 2747-2759 (2019)
 [j50]Fanghui Sun [j50]Fanghui Sun , Shen Wang, Chunrui Zhang, Hongli Zhang: , Shen Wang, Chunrui Zhang, Hongli Zhang:
 Unsupervised field segmentation of unknown protocol messages. Comput. Commun. 146: 121-130 (2019)
 [j49]Dongyang Zhan [j49]Dongyang Zhan , Lin Ye , Lin Ye , Binxing Fang, Hongli Zhang: , Binxing Fang, Hongli Zhang:
 SAVM: A practical secure external approach for automated in-VM management. Concurr. Comput. Pract. Exp. 31(23) (2019)
 [j48]Jinlin Wang [j48]Jinlin Wang , Haining Yu, Xing Wang, Hongli Zhang, Binxing Fang, Yuchen Yang, Xiaozhou Zhu: , Haining Yu, Xing Wang, Hongli Zhang, Binxing Fang, Yuchen Yang, Xiaozhou Zhu:
 DRAV: Detection and repair of data availability violations in Internet of Things. Int. J. Distributed Sens. Networks 15(11) (2019)
 [j47]Ying Pang, Lizhi Peng [j47]Ying Pang, Lizhi Peng , Zhenxiang Chen, Bo Yang, Hongli Zhang: , Zhenxiang Chen, Bo Yang, Hongli Zhang:
 Imbalanced learning based on adaptive weighting and Gaussian function synthesizing with an application on Android malware detection. Inf. Sci. 484: 95-112 (2019)
 [j46]Yuhang Wang, Zhihong Tian [j46]Yuhang Wang, Zhihong Tian , Hongli Zhang, Shen Su, Wei Shi , Hongli Zhang, Shen Su, Wei Shi : :
 Erratum: Wang, Y. et al., A Privacy Preserving Scheme for Nearest Neighbor Query. Sensors 2018, 18, 2440. Sensors 19(14): 3187 (2019)
 [j45]Nabin Kumar Karn, Hongli Zhang, Feng Jiang, Rahul Yadav [j45]Nabin Kumar Karn, Hongli Zhang, Feng Jiang, Rahul Yadav , Asif Ali Laghari , Asif Ali Laghari : :
 Measuring bandwidth and buffer occupancy to improve the QoE of HTTP adaptive streaming. Signal Image Video Process. 13(7): 1367-1375 (2019)
 [j44]Haining Yu [j44]Haining Yu , Jiangang Shu , Jiangang Shu , Xiaohua Jia , Xiaohua Jia , Hongli Zhang , Hongli Zhang , Xiangzhan Yu: , Xiangzhan Yu:
 lpRide: Lightweight and Privacy-Preserving Ride Matching Over Road Networks in Online Ride Hailing Systems. IEEE Trans. Veh. Technol. 68(11): 10418-10428 (2019)
 [j43]Xiaoding Guo [j43]Xiaoding Guo , Hongli Zhang , Hongli Zhang , Lin Ye, Shang Li , Lin Ye, Shang Li : :
 Learning Users' Intention of Legal Consultation through Pattern-Oriented Tensor Decomposition with Bi-LSTM. Wirel. Commun. Mob. Comput. 2019: 2589784:1-2589784:16 (2019)
 [c114]Xiaoding Guo, Hongli Zhang, Lin Ye, Shang Li [c114]Xiaoding Guo, Hongli Zhang, Lin Ye, Shang Li : :
 RnnTd: An Approach Based on LSTM and Tensor Decomposition for Classification of Crimes in Legal Cases. DSC 2019: 16-22
 [c113]Likun Liu, Jiantao Shi [c113]Likun Liu, Jiantao Shi , Hongli Zhang, Xiangzhan Yu: , Hongli Zhang, Xiangzhan Yu:
 No Way to Evade: Detecting Multi-Path Routing Attacks for NIDS. GLOBECOM 2019: 1-6
 [c112]Xiaomeng Wang, Binxing Fang, Hongli Zhang, Xing Wang: [c112]Xiaomeng Wang, Binxing Fang, Hongli Zhang, Xing Wang:
 Analyzing and Predicting the Popularity of Online Content Using the Weak Ties Theory. HPCC/SmartCity/DSS 2019: 1743-1748
 [c111]Jinlin Wang [c111]Jinlin Wang , Hongli Zhang, Binxing Fang, Xing Wang, Gongzhu Yin, Ximiao Yu: , Hongli Zhang, Binxing Fang, Xing Wang, Gongzhu Yin, Ximiao Yu:
 EDCleaner: Data Cleaning for Entity Information in Social Network. ICC 2019: 1-7
 [c110]Dongyang Zhan [c110]Dongyang Zhan , Huhua Li, Lin Ye, Hongli Zhang, Binxing Fang, Xiaojiang Du: , Huhua Li, Lin Ye, Hongli Zhang, Binxing Fang, Xiaojiang Du:
 A Low-Overhead Kernel Object Monitoring Approach for Virtual Machine Introspection. ICC 2019: 1-6
 [c109]Shang Li [c109]Shang Li , Bin Guo, Yilei Cai, Lin Ye, Hongli Zhang, Binxing Fang: , Bin Guo, Yilei Cai, Lin Ye, Hongli Zhang, Binxing Fang:
 Legal Case Inspection: An Analogy-Based Approach to Judgment Evaluation. ICAIS (1) 2019: 148-158
 [c108]Shang Li [c108]Shang Li , Boyang Liu, Lin Ye, Hongli Zhang, Binxing Fang: , Boyang Liu, Lin Ye, Hongli Zhang, Binxing Fang:
 Element-Aware Legal Judgment Prediction for Criminal Cases with Confusing Charges. ICTAI 2019: 660-667
 [c107]Likun Liu, Hongli Zhang, Jiantao Shi [c107]Likun Liu, Hongli Zhang, Jiantao Shi , Xiangzhan Yu, Haixiao Xu: , Xiangzhan Yu, Haixiao Xu:
 I2P Anonymous Communication Network Measurement and Analysis. SmartCom 2019: 105-115
 [i5]Zhihong Tian, Shen Su, Xiang Yu, Yuhang Wang, Hongli Zhang, Xiaojiang Du, Mohsen Guizani: [i5]Zhihong Tian, Shen Su, Xiang Yu, Yuhang Wang, Hongli Zhang, Xiaojiang Du, Mohsen Guizani:
 Vcash: A Novel Reputation Framework for Identifying Denial of Traffic Service in Internet of Connected Vehicles. CoRR abs/1902.03994 (2019)
 [i4]Dongyang Zhan, Huhua Li, Lin Ye, Hongli Zhang, Binxing Fang, Xiaojiang Du: [i4]Dongyang Zhan, Huhua Li, Lin Ye, Hongli Zhang, Binxing Fang, Xiaojiang Du:
 A Low-overhead Kernel Object Monitoring Approach for Virtual Machine Introspection. CoRR abs/1902.05135 (2019)
- 2018
 [j42]Zhigang Zhou [j42]Zhigang Zhou , Hongli Zhang, Shang Li , Hongli Zhang, Shang Li , Xiaojiang Du: , Xiaojiang Du:
 Hermes: A Privacy-Preserving Approximate Search Framework for Big Data. IEEE Access 6: 20009-20020 (2018)
 [j41]Dongyang Zhan [j41]Dongyang Zhan , Lin Ye, Hongli Zhang, Binxing Fang, Huhua Li , Lin Ye, Hongli Zhang, Binxing Fang, Huhua Li , Yang Liu, Xiaojiang Du, Mohsen Guizani: , Yang Liu, Xiaojiang Du, Mohsen Guizani:
 A high-performance virtual machine filesystem monitor in cloud-assisted cognitive IoT. Future Gener. Comput. Syst. 88: 209-219 (2018)
 [j40]Xianyan Wu, Qi Han, Xiamu Niu, Hongli Zhang, Siu-Ming Yiu, Jun-bin Fang [j40]Xianyan Wu, Qi Han, Xiamu Niu, Hongli Zhang, Siu-Ming Yiu, Jun-bin Fang : :
 JPEG image width estimation for file carving. IET Image Process. 12(7): 1245-1252 (2018)
 [j39]Majing Su [j39]Majing Su , Hongli Zhang , Hongli Zhang , Md. Zakirul Alam Bhuiyan , Md. Zakirul Alam Bhuiyan , Xiaojiang Du , Xiaojiang Du , Peng Zhang , Peng Zhang : :
 An effective copyright-protected content delivery scheme for P2P file sharing networks. Int. J. Commun. Syst. 31(16) (2018)
 [j38]Nabin Kumar Karn, Hongli Zhang, Feng Jiang: [j38]Nabin Kumar Karn, Hongli Zhang, Feng Jiang:
 User-perceived quality aware adaptive streaming of 3D multi-view video plus depth over the internet. Multim. Tools Appl. 77(17): 22965-22983 (2018)
 [j37]Yuhang Wang [j37]Yuhang Wang , Zhihong Tian , Zhihong Tian , Hongli Zhang, Shen Su, Wei Shi , Hongli Zhang, Shen Su, Wei Shi : :
 A Privacy Preserving Scheme for Nearest Neighbor Query. Sensors 18(8): 2440 (2018)
 [j36]Dongyang Zhan [j36]Dongyang Zhan , Lin Ye, Binxing Fang, Hongli Zhang, Xiaojiang Du: , Lin Ye, Binxing Fang, Hongli Zhang, Xiaojiang Du:
 Checking virtual machine kernel control-flow integrity using a page-level dynamic tracing approach. Soft Comput. 22(23): 7977-7987 (2018)
 [j35]Hongli Zhang [j35]Hongli Zhang , Zhigang Zhou, Lin Ye, Xiaojiang Du , Zhigang Zhou, Lin Ye, Xiaojiang Du : :
 Towards Privacy Preserving Publishing of Set-Valued Data on Hybrid Cloud. IEEE Trans. Cloud Comput. 6(2): 316-329 (2018)
 [j34]Likun Liu, Hongli Zhang, Xiangzhan Yu [j34]Likun Liu, Hongli Zhang, Xiangzhan Yu , Yi Xin , Yi Xin , Muhammad Shafiq , Muhammad Shafiq , Mengmeng Ge , Mengmeng Ge : :
 An Efficient Security System for Mobile Data Monitoring. Wirel. Commun. Mob. Comput. 2018: 9809345:1-9809345:10 (2018)
 [c106]Rui Jin, Hongli Zhang, Yu Zhang: [c106]Rui Jin, Hongli Zhang, Yu Zhang:
 The social negative mood index for social networks. DSC 2018: 1-5
 [c105]Xiaomeng Wang, Binxing Fang, Hongli Zhang, Shen Su: [c105]Xiaomeng Wang, Binxing Fang, Hongli Zhang, Shen Su:
 Predicting the Popularity of Online Content Based on the Weak Ties Theory. DSC 2018: 386-391
 [c104]Shang Li [c104]Shang Li , Hongli Zhang, Lin Ye, Xiaoding Guo, Binxing Fang: , Hongli Zhang, Lin Ye, Xiaoding Guo, Binxing Fang:
 Evaluating the Rationality of Judicial Decision with LSTM-Based Case Modeling. DSC 2018: 392-397
 [c103]Guangwei Yang, Haining Yu, Hongli Zhang, Xiangzhan Yu: [c103]Guangwei Yang, Haining Yu, Hongli Zhang, Xiangzhan Yu:
 A Metadata-Based Representation Method of the Internet of Things. DSC 2018: 498-505
 [c102]Yuhang Wang [c102]Yuhang Wang , Hongli Zhang, Shen Su, Zhihong Tian: , Hongli Zhang, Shen Su, Zhihong Tian:
 A Location Privacy-Aware Method for kNN Query in Location Based Services. DSC 2018: 537-541
 [c101]Jinlin Wang [c101]Jinlin Wang , Hongli Zhang, Binxing Fang, Xing Wang, Yuanxin Zhang: , Hongli Zhang, Binxing Fang, Xing Wang, Yuanxin Zhang:
 Evaluation on Availability of Entity Information in Cyberspace. DSC 2018: 811-818
 [c100]Ming Hou, Hongli Zhang, Yuhang Wang: [c100]Ming Hou, Hongli Zhang, Yuhang Wang:
 OFC: An Approach for Protecting Location Privacy from Location Provider in Location-Based Services. DSC 2018: 917-922
 [c99]Jingwei Liu [c99]Jingwei Liu , Xiaolu Li, Lin Ye, Hongli Zhang, Xiaojiang Du, Mohsen Guizani: , Xiaolu Li, Lin Ye, Hongli Zhang, Xiaojiang Du, Mohsen Guizani:
 BPDS: A Blockchain Based Privacy-Preserving Data Sharing for Electronic Medical Records. GLOBECOM 2018: 1-6
 [c98]Yuhang Wang [c98]Yuhang Wang , Hongli Zhang, Shen Su: , Hongli Zhang, Shen Su:
 VAT: A Velocity-Aware Trajectory Privacy Preservation Scheme for IoT Searching. ICCCS (2) 2018: 357-365
 [c97]Ke Li, Xiangzhan Yu, Hongli Zhang, Longfei Wu, Xiaojiang Du, E. Paul Ratazzi [c97]Ke Li, Xiangzhan Yu, Hongli Zhang, Longfei Wu, Xiaojiang Du, E. Paul Ratazzi , Mohsen Guizani: , Mohsen Guizani:
 Security Mechanisms to Defend against New Attacks on Software-Defined Radio. ICNC 2018: 537-541
 [c96]Likun Liu, Jiantao Shi [c96]Likun Liu, Jiantao Shi , Hongli Zhang, Xiangzhan Yu: , Hongli Zhang, Xiangzhan Yu:
 Tearing Down the Face of Algorithmic Complexity Attacks for DPI Engines. ISPA/IUCC/BDCloud/SocialCom/SustainCom 2018: 751-758
 [i3]Dongyang Zhan, Lin Ye, Hongli Zhang, Binxing Fang, Huhua Li, Yang Liu, Xiaojiang Du, Mohsen Guizani: [i3]Dongyang Zhan, Lin Ye, Hongli Zhang, Binxing Fang, Huhua Li, Yang Liu, Xiaojiang Du, Mohsen Guizani:
 A high-performance virtual machine filesystem monitor in cloud-assisted cognitive IoT. CoRR abs/1804.01633 (2018)
 [i2]Hongli Zhang, Yuhang Wang, Xiaojiang Du, Mohsen Guizani: [i2]Hongli Zhang, Yuhang Wang, Xiaojiang Du, Mohsen Guizani:
 Preserving Location Privacy in Mobile Edge Computing. CoRR abs/1804.01636 (2018)
 [i1]Jingwei Liu, Xiaolu Li, Lin Ye, Hongli Zhang, Xiaojiang Du, Mohsen Guizani: [i1]Jingwei Liu, Xiaolu Li, Lin Ye, Hongli Zhang, Xiaojiang Du, Mohsen Guizani:
 BPDS: A Blockchain based Privacy-Preserving Data Sharing for Electronic Medical Records. CoRR abs/1811.03223 (2018)
- 2017
 [j33]Yanbin Sun, Yu Zhang, Binxing Fang, Hongli Zhang: [j33]Yanbin Sun, Yu Zhang, Binxing Fang, Hongli Zhang:
 Succinct and practical greedy embedding for geometric routing. Comput. Commun. 114: 51-61 (2017)
 [j32]Lizhi Peng [j32]Lizhi Peng , Hongli Zhang, Haibo Zhang , Hongli Zhang, Haibo Zhang , Bo Yang: , Bo Yang:
 A fast feature weighting algorithm of data gravitation classification. Inf. Sci. 375: 54-78 (2017)
 [c95]Jinlin Wang [c95]Jinlin Wang , Hongli Zhang, Binxing Fang, Xing Wang, Lin Ye: , Hongli Zhang, Binxing Fang, Xing Wang, Lin Ye:
 A Survey on Data Cleaning Methods in Cyberspace. DSC 2017: 74-81
 [c94]Xiaomeng Wang, Binxing Fang, Hongli Zhang, XuanYu: [c94]Xiaomeng Wang, Binxing Fang, Hongli Zhang, XuanYu:
 Predicting the Popularity of News Based on Competitive Matrix. DSC 2017: 151-155
 [c93]Shang Li [c93]Shang Li , Zhigang Zhou, Hongli Zhang, Binxing Fang: , Zhigang Zhou, Hongli Zhang, Binxing Fang:
 An approximate search framework for big data. ICC 2017: 1-6
- 2016
 [j31]Yanbin Sun, Yu Zhang, Binxing Fang, Hongli Zhang: [j31]Yanbin Sun, Yu Zhang, Binxing Fang, Hongli Zhang:
 SNGR: Scalable Name-Based Geometric Routing for ICN. IEICE Trans. Commun. 99-B(8): 1835-1845 (2016)
 [j30]Zhikai Xu, Hongli Zhang, Xiang-Zhan Yu, Shen Su: [j30]Zhikai Xu, Hongli Zhang, Xiang-Zhan Yu, Shen Su:
 Privacy-Aware Information Sharing in Location-Based Services: Attacks and Defense. IEICE Trans. Inf. Syst. 99-D(8): 1991-2001 (2016)
 [j29]Mahmoud Emam [j29]Mahmoud Emam , Qi Han, Liyang Yu, Hongli Zhang: , Qi Han, Liyang Yu, Hongli Zhang:
 A Keypoint-Based Region Duplication Forgery Detection Algorithm. IEICE Trans. Inf. Syst. 99-D(9): 2413-2416 (2016)
 [j28]Hongli Zhang, Zhikai Xu, Xiaojiang Du, Zhigang Zhou, Jiantao Shi [j28]Hongli Zhang, Zhikai Xu, Xiaojiang Du, Zhigang Zhou, Jiantao Shi : :
 CAPR: context-aware participant recruitment mechanism in mobile crowdsourcing. Wirel. Commun. Mob. Comput. 16(15): 2179-2193 (2016)
 [j27]Zhigang Zhou, Hongli Zhang, Lin Ye, Xiaojiang Du: [j27]Zhigang Zhou, Hongli Zhang, Lin Ye, Xiaojiang Du:
 Cuckoo: flexible compute-intensive task offloading in mobile cloud computing. Wirel. Commun. Mob. Comput. 16(18): 3256-3268 (2016)
 [c92]Shen Su, Hongli Zhang, Yue Zhang, Dongyang Zhan [c92]Shen Su, Hongli Zhang, Yue Zhang, Dongyang Zhan , Junxi Guo: , Junxi Guo:
 Shrinking the Sentiment Analysis for Signed Network Construction. DSC 2016: 353-357
 [c91]Pengfule Ding, Zhihong Tian, Hongli Zhang, Yong Wang, Liang Zhang, Sanchuan Guo: [c91]Pengfule Ding, Zhihong Tian, Hongli Zhang, Yong Wang, Liang Zhang, Sanchuan Guo:
 Detection and Defense of SYN Flood Attacks Based on Dual Stack Network Firewall. DSC 2016: 526-531
 [c90]Yang Gao, Hongli Zhang, Yue Zhang: [c90]Yang Gao, Hongli Zhang, Yue Zhang:
 A Fast and High Quality Approach for Overlapping Community Detection through Minimizing Conductance. DSC 2016: 688-693
 [c89]Hongli Zhang, Zhikai Xu, Xiang-Zhan Yu, Xiaojiang Du: [c89]Hongli Zhang, Zhikai Xu, Xiang-Zhan Yu, Xiaojiang Du:
 LPPS: Location privacy protection for smartphones. ICC 2016: 1-6
 [c88]Mahmoud Emam [c88]Mahmoud Emam , Qi Han, Hongli Zhang: , Qi Han, Hongli Zhang:
 Detection of Copy-Scale-Move Forgery in Digital Images Using SFOP and MROGH. ICYCSEE (1) 2016: 326-334
 [c87]Zhikai Xu, Hongli Zhang, Xiang-Zhan Yu: [c87]Zhikai Xu, Hongli Zhang, Xiang-Zhan Yu:
 Multiple Mix-Zones Deployment for Continuous Location Privacy Protection. Trustcom/BigDataSE/ISPA 2016: 760-766
- 2015
 [j26]Hongli Zhang, Qiang Zhang, Zhigang Zhou, Xiaojiang Du, Wei Yu [j26]Hongli Zhang, Qiang Zhang, Zhigang Zhou, Xiaojiang Du, Wei Yu , Mohsen Guizani: , Mohsen Guizani:
 Processing geo-dispersed big data in an advanced mapreduce framework. IEEE Netw. 29(5): 24-30 (2015)
 [j25]Hongli Zhang, Dongliang Xu, Zhihong Tian, Yujian Fan: [j25]Hongli Zhang, Dongliang Xu, Zhihong Tian, Yujian Fan:
 An efficient parallel algorithm for exact multi-pattern matching. Secur. Commun. Networks 8(9): 1688-1697 (2015)
 [j24]Hongli Zhang, Qiang Zhang, Xiaojiang Du: [j24]Hongli Zhang, Qiang Zhang, Xiaojiang Du:
 Toward Vehicle-Assisted Cloud Computing for Smartphones. IEEE Trans. Veh. Technol. 64(12): 5610-5618 (2015)
 [c86]Yanbin Sun, Yu Zhang, Hongli Zhang, Binxing Fang, Xiaojiang Du: [c86]Yanbin Sun, Yu Zhang, Hongli Zhang, Binxing Fang, Xiaojiang Du:
 Geometric Routing on Flat Names for ICN. GLOBECOM 2015: 1-6
 [c85]Zhigang Zhou, Hongli Zhang, Xiang-Zhan Yu, Junwu Guo: [c85]Zhigang Zhou, Hongli Zhang, Xiang-Zhan Yu, Junwu Guo:
 Continuous resource allocation in cloud computing. ICC 2015: 319-324
 [c84]Hongli Zhang, Zhikai Xu, Zhigang Zhou, Jiantao Shi [c84]Hongli Zhang, Zhikai Xu, Zhigang Zhou, Jiantao Shi , Xiaojiang Du: , Xiaojiang Du:
 CLPP: Context-aware location privacy protection for location-based social network. ICC 2015: 1164-1169
 [c83]Longfei Wu [c83]Longfei Wu , Xiaojiang Du, Hongli Zhang, Wei Yu , Xiaojiang Du, Hongli Zhang, Wei Yu , Chonggang Wang: , Chonggang Wang:
 Effective task scheduling in proximate mobile device based communication systems. ICC 2015: 3503-3508
 [c82]Majing Su, Hongli Zhang, Xiaojiang Du, Qiong Dai: [c82]Majing Su, Hongli Zhang, Xiaojiang Du, Qiong Dai:
 A novel stochastic-encryption-based P2P Digital Rights Management scheme. ICC 2015: 5541-5545
 [c81]Hongli Zhang, Dongliang Xu, Lei Zhang, Yanbin Sun: [c81]Hongli Zhang, Dongliang Xu, Lei Zhang, Yanbin Sun:
 Matrix-based parallel pattern matching method. ICC 2015: 7114-7119
 [c80]Shen Su, Beichuan Zhang, Lin Ye, Hongli Zhang, Nathan Yee: [c80]Shen Su, Beichuan Zhang, Lin Ye, Hongli Zhang, Nathan Yee:
 Towards real-time route leak events detection. ICC 2015: 7192-7197
 [c79]Zhigang Zhou, Hongli Zhang, Xiang-Zhan Yu, Junwu Guo: [c79]Zhigang Zhou, Hongli Zhang, Xiang-Zhan Yu, Junwu Guo:
 Audit meets game theory: Verifying reliable execution of SLA for compute-intensive program in cloud. ICC 2015: 7456-7461
 [c78]Longfei Wu [c78]Longfei Wu , Xiaojiang Du, Hongli Zhang: , Xiaojiang Du, Hongli Zhang:
 An effective access control scheme for preventing permission leak in Android. ICNC 2015: 57-61
 [c77]Yanbin Sun, Yu Zhang, Hongli Zhang, Binxing Fang, Jiantao Shi: [c77]Yanbin Sun, Yu Zhang, Hongli Zhang, Binxing Fang, Jiantao Shi:
 An ICN-Oriented Name-Based Routing Scheme. ICYCSEE 2015: 101-108
 [c76]Junwu Guo, Zhigang Zhou, Hongli Zhang: [c76]Junwu Guo, Zhigang Zhou, Hongli Zhang:
 Cocktail: A New Tool for Audit by Performance Evaluation on Local Machine. SOSE 2015: 241-246
 [c75]Hongli Zhang, Panpan Li, Zhigang Zhou: [c75]Hongli Zhang, Panpan Li, Zhigang Zhou:
 Performance Difference Prediction in Cloud Services for SLA-Based Auditing. SOSE 2015: 253-258
- 2014
 [j23]Lizhi Peng, Hongli Zhang, Bo Yang, Yuehui Chen: [j23]Lizhi Peng, Hongli Zhang, Bo Yang, Yuehui Chen:
 A new approach for imbalanced data classification based on data gravitation. Inf. Sci. 288: 347-373 (2014)
 [j22]Hongli Zhang, Panpan Li, Zhigang Zhou, Junchao Wu, Xiang-Zhan Yu: [j22]Hongli Zhang, Panpan Li, Zhigang Zhou, Junchao Wu, Xiang-Zhan Yu:
 A Privacy-aware Virtual Machine Migration Framework on Hybrid Clouds. J. Networks 9(5): 1086-1095 (2014)
 [j21]Hongli Zhang, Lin Ye, Jiantao Shi [j21]Hongli Zhang, Lin Ye, Jiantao Shi , Xiaojiang Du, Mohsen Guizani: , Xiaojiang Du, Mohsen Guizani:
 Verifying cloud service-level agreement by a third-party auditor. Secur. Commun. Networks 7(3): 492-502 (2014)
 [j20]Juan Chen, Hongli Zhang, Xiaojiang Du, Binxing Fang, Liu Yan: [j20]Juan Chen, Hongli Zhang, Xiaojiang Du, Binxing Fang, Liu Yan:
 Designing robust routing protocols to protect base stations in wireless sensor networks. Wirel. Commun. Mob. Comput. 14(17): 1613-1626 (2014)
 [c74]Yu Zhang, Hongli Zhang, Lixia Zhang: [c74]Yu Zhang, Hongli Zhang, Lixia Zhang:
 Kite: a mobility support scheme for NDN. ICN 2014: 179-180
 [c73]Hongli Zhang, Qiang Zhang: [c73]Hongli Zhang, Qiang Zhang:
 A Novel Road Topology-aware Routing in VANETs. APWeb Workshophs 2014: 167-176
 [c72]Dongliang Xu, Hongli Zhang, Miao Hou: [c72]Dongliang Xu, Hongli Zhang, Miao Hou:
 The Improved AC High-Performance Pattern-Matching Algorithm for Intrusion Detection. APWeb Workshophs 2014: 200-213
 [c71]Qiang Zhang, Hongli Zhang, Xiaojiang Du, Zhigang Zhou, Shen Su, Rui Jin: [c71]Qiang Zhang, Hongli Zhang, Xiaojiang Du, Zhigang Zhou, Shen Su, Rui Jin:
 Contention-based adaptive position update for intermittently connected VANETs. GLOBECOM 2014: 51-56
 [c70]Zhigang Zhou, Hongli Zhang, Qiang Zhang, Yang Xu, Panpan Li: [c70]Zhigang Zhou, Hongli Zhang, Qiang Zhang, Yang Xu, Panpan Li:
 Privacy-preserving granular data retrieval indexes for outsourced cloud data. GLOBECOM 2014: 601-606
 [c69]Lin Ye, Hongli Zhang, Xiaojiang Du: [c69]Lin Ye, Hongli Zhang, Xiaojiang Du:
 Modeling Leechers attack in BitTorrent. GLOBECOM 2014: 681-685
 [c68]Lizhi Peng, Hongli Zhang, Bo Yang, Yuehui Chen: [c68]Lizhi Peng, Hongli Zhang, Bo Yang, Yuehui Chen:
 Feature Evaluation for Early Stage Internet Traffic Identification. ICA3PP (1) 2014: 511-525
 [c67]Shen Su, Hongli Zhang, Binxing Fang, Lin Ye: [c67]Shen Su, Hongli Zhang, Binxing Fang, Lin Ye:
 Quantifying AS-level routing policy changes. ICC 2014: 1148-1153
 [e1]Weihong Han, Zi Huang, Changjun Hu, Hongli Zhang, Li Guo: [e1]Weihong Han, Zi Huang, Changjun Hu, Hongli Zhang, Li Guo:
 Web Technologies and Applications - APWeb 2014 Workshops, SNA, NIS, and IoTS, Changsha, China, September 5, 2014. Proceedings. Lecture Notes in Computer Science 8710, Springer 2014, ISBN 978-3-319-11118-6 [contents]
- 2013
 [j19]Yu Cui, Zhihong Tian, Binxing Fang, Hongli Zhang, Weizhe Zhang: [j19]Yu Cui, Zhihong Tian, Binxing Fang, Hongli Zhang, Weizhe Zhang:
 Data Spoofing Attacks by IPv6 Tunnels. IEICE Trans. Commun. 96-B(11): 2875-2882 (2013)
 [j18]Lei Zhang, Hongli Zhang, Xiajiong Shen, Lihua Yin: [j18]Lei Zhang, Hongli Zhang, Xiajiong Shen, Lihua Yin:
 A bottom-up algorithm of vertical assembling concept lattices. Int. J. Data Min. Bioinform. 7(3): 229-244 (2013)
 [j17]Hongli Zhang, Lin Ye, Jiantao Shi [j17]Hongli Zhang, Lin Ye, Jiantao Shi , Xiaojiang Du, Hsiao-Hwa Chen: , Xiaojiang Du, Hsiao-Hwa Chen:
 Preventing Piracy Content Propagation in Peer-to-Peer Networks. IEEE J. Sel. Areas Commun. 31(9-Supplement): 105-114 (2013)
 [j16]Majing Su, Hongli Zhang, Xiaojiang Du, Binxing Fang, Mohsen Guizani: [j16]Majing Su, Hongli Zhang, Xiaojiang Du, Binxing Fang, Mohsen Guizani:
 A Measurement Study on the Topologies of BitTorrent Networks. IEEE J. Sel. Areas Commun. 31(9-Supplement): 338-347 (2013)
 [c66]Hongli Zhang, Zhigang Zhou, Xiaojiang Du, Panpan Li, Xiang-Zhan Yu: [c66]Hongli Zhang, Zhigang Zhou, Xiaojiang Du, Panpan Li, Xiang-Zhan Yu:
 Practical and privacy-assured data indexes for outsourced cloud data. GLOBECOM 2013: 671-676
 [c65]Hongli Zhang, Lin Ye, Xiaojiang Du, Mohsen Guizani: [c65]Hongli Zhang, Lin Ye, Xiaojiang Du, Mohsen Guizani:
 Protecting private cloud located within public cloud. GLOBECOM 2013: 677-681
 [c64]Hongli Zhang, Panpan Li, Zhigang Zhou, Xiaojiang Du, Weizhe Zhang: [c64]Hongli Zhang, Panpan Li, Zhigang Zhou, Xiaojiang Du, Weizhe Zhang:
 A performance prediction scheme for computation-intensive applications on cloud. ICC 2013: 1957-1961
 [c63]Xia Liu, Zhigang Zhou, Xiaojiang Du, Hongli Zhang, Junchao Wu: [c63]Xia Liu, Zhigang Zhou, Xiaojiang Du, Hongli Zhang, Junchao Wu:
 Glaucus: Predicting Computing-Intensive Program's Performance for Cloud Customers. ICIC (1) 2013: 285-294
 [c62]Hongli Zhang, Jiantao Shi [c62]Hongli Zhang, Jiantao Shi , Lin Ye, Xiaojiang Du: , Lin Ye, Xiaojiang Du:
 PPBD: A piracy preventing system for BT DHT networks. INFOCOM 2013: 1806-1814
 [c61]Zhigang Zhou, Hongli Zhang, Xiaojiang Du, Panpan Li, Xiang-Zhan Yu: [c61]Zhigang Zhou, Hongli Zhang, Xiaojiang Du, Panpan Li, Xiang-Zhan Yu:
 Prometheus: Privacy-aware data retrieval on hybrid cloud. INFOCOM 2013: 2643-2651
- 2012
 [j15]Hongli Zhang, Gang Lu, Mahmoud T. Qassrawi, Yu Zhang, Xiang-Zhan Yu: [j15]Hongli Zhang, Gang Lu, Mahmoud T. Qassrawi, Yu Zhang, Xiang-Zhan Yu:
 Feature selection for optimizing traffic classification. Comput. Commun. 35(12): 1457-1471 (2012)
 [j14]Haining Yu, Hongli Zhang, Binxing Fang, Xiang-Zhan Yu: [j14]Haining Yu, Hongli Zhang, Binxing Fang, Xiang-Zhan Yu:
 A Large Scale Code Resolution Service Network in the Internet of Things. Sensors 12(11): 15206-15243 (2012)
 [c60]Yifei Zhang, Hongli Zhang: [c60]Yifei Zhang, Hongli Zhang:
 Synthetic evaluation on the performance of network coordinate systems. CCIS 2012: 642-645
 [c59]Majing Su, Hongli Zhang, Binxing Fang, Ning Yan: [c59]Majing Su, Hongli Zhang, Binxing Fang, Ning Yan:
 A measurement. CyberC 2012: 512-518
 [c58]Lin Ye, Hongli Zhang, Jiantao Shi [c58]Lin Ye, Hongli Zhang, Jiantao Shi , Xiaojiang Du: , Xiaojiang Du:
 Verifying cloud Service Level Agreement. GLOBECOM 2012: 777-782
 [c57]Majing Su, Hongli Zhang, Xiaojiang Du, Binxing Fang, Mohsen Guizani: [c57]Majing Su, Hongli Zhang, Xiaojiang Du, Binxing Fang, Mohsen Guizani:
 Understanding the topologies of BitTorrent networks: A measurement view. GLOBECOM 2012: 1994-1999
 [c56]Juan Chen, Hongli Zhang, Binxing Fang, Xiaojiang Du, Haining Yu, Xiang-Zhan Yu: [c56]Juan Chen, Hongli Zhang, Binxing Fang, Xiaojiang Du, Haining Yu, Xiang-Zhan Yu:
 An efficient and sustainable self-healing protocol for Unattended Wireless Sensor Networks. GLOBECOM 2012: 5356-5361
 [c55]Juan Chen, Hongli Zhang, Xiaojiang Du, Binxing Fang, Yan Liu, Haining Yu: [c55]Juan Chen, Hongli Zhang, Xiaojiang Du, Binxing Fang, Yan Liu, Haining Yu:
 Base station location protection in wireless sensor networks: Attacks and defense. ICC 2012: 554-559
 [c54]Majing Su, Hongli Zhang, Binxing Fang, Xiaojiang Du: [c54]Majing Su, Hongli Zhang, Binxing Fang, Xiaojiang Du:
 DDoS vulnerability of BitTorrent Peer Exchange extension: Analysis and defense. ICC 2012: 1048-1052
 [c53]Gang Lu, Hongli Zhang, Mahmoud T. Qassrawi, Xiangzhan Yu: [c53]Gang Lu, Hongli Zhang, Mahmoud T. Qassrawi, Xiangzhan Yu:
 Comparison and Analysis of Flow Features at the Packet Level for Traffic Classification. ICCVE 2012: 262-267
 [c52]Qiao Li [c52]Qiao Li , Hui He, Binxing Fang, Hongli Zhang: , Hui He, Binxing Fang, Hongli Zhang:
 A Novel Cache Replacement Policy for ISP Merged CDN. ICPADS 2012: 708-709
 [c51]Weizhe Zhang, Hongli Zhang, Huixiang Chen, Qizhen Zhang, Albert M. K. Cheng [c51]Weizhe Zhang, Hongli Zhang, Huixiang Chen, Qizhen Zhang, Albert M. K. Cheng : :
 Improving the QoS of Web Applications across Multiple Virtual Machines in Cloud Computing Environment. IPDPS Workshops 2012: 2247-2253
 [c50]Bing Rao, Zhigang Zhou, Hongli Zhang, Shuofei Tang, Renfu Yao: [c50]Bing Rao, Zhigang Zhou, Hongli Zhang, Shuofei Tang, Renfu Yao:
 Outsourcing Cloud Data Privacy-Preserving Based on Over-Encryption. ISCTCS 2012: 109-116
 [c49]Meng Zhang, Hongli Zhang, Bo Zhang, Gang Lu: [c49]Meng Zhang, Hongli Zhang, Bo Zhang, Gang Lu:
 Encrypted Traffic Classification Based on an Improved Clustering Algorithm. ISCTCS 2012: 124-131
 [c48]Haining Yu, Hongli Zhang, Xingzhan Yu: [c48]Haining Yu, Hongli Zhang, Xingzhan Yu:
 A Flexible Framework for Representations of Entities in the Internet of Things. ISCTCS 2012: 295-302
 [c47]Hongli Zhang, Panpan Li, Zhigang Zhou, Xiangzhan Yu: [c47]Hongli Zhang, Panpan Li, Zhigang Zhou, Xiangzhan Yu:
 A PSO-Based Hierarchical Resource Scheduling Strategy on Cloud Computing. ISCTCS 2012: 325-332
 [c46]Yujian Fan, Hongli Zhang, Jiahui Liu, Dongliang Xu: [c46]Yujian Fan, Hongli Zhang, Jiahui Liu, Dongliang Xu:
 An Efficient Parallel String Matching Algorithm Based on DFA. ISCTCS 2012: 349-356
 [c45]Junchao Wu, Panpan Li, Hongli Zhang, Binsheng Chu: [c45]Junchao Wu, Panpan Li, Hongli Zhang, Binsheng Chu:
 A Reliable Query Scheme for Outsourced Data in Cloud. ISCTCS 2012: 730-736
- 2011
 [j13]Yu Zhang, Ricardo V. Oliveira, Yangyang Wang, Shen Su, Baobao Zhang, Jun Bi, Hongli Zhang, Lixia Zhang: [j13]Yu Zhang, Ricardo V. Oliveira, Yangyang Wang, Shen Su, Baobao Zhang, Jun Bi, Hongli Zhang, Lixia Zhang:
 A Framework to Quantify the Pitfalls of Using Traceroute in AS-Level Topology Measurement. IEEE J. Sel. Areas Commun. 29(9): 1822-1836 (2011)
 [c44]Jiantao Shi [c44]Jiantao Shi , Hongli Zhang, Xiang-Zhan Yu, Jianhong Zhai: , Hongli Zhang, Xiang-Zhan Yu, Jianhong Zhai:
 Reliable object rating framework for content sharing system. CSS 2011: 27-32
 [c43]Juan Chen, Hongli Zhang, Binxing Fang, Xiaojiang Du, Lihua Yin, Xiang-Zhan Yu: [c43]Juan Chen, Hongli Zhang, Binxing Fang, Xiaojiang Du, Lihua Yin, Xiang-Zhan Yu:
 Towards Efficient Anonymous Communications in Sensor Networks. GLOBECOM 2011: 1-5
 [c42]Phillip Reindl, Xiaojiang Du, Kendall E. Nygard, Hongli Zhang: [c42]Phillip Reindl, Xiaojiang Du, Kendall E. Nygard, Hongli Zhang:
 Lightweight Source Anonymity in Wireless Sensor Networks. GLOBECOM 2011: 1-5
- 2010
 [j12]Xiao Xu, Weizhe Zhang, Hongli Zhang, Binxing Fang: [j12]Xiao Xu, Weizhe Zhang, Hongli Zhang, Binxing Fang:
 Efficient Distributed Web Crawling Utilizing Internet Resources. IEICE Trans. Inf. Syst. 93-D(10): 2747-2762 (2010)
 [j11]Xiao Xu, Weizhe Zhang, Hongli Zhang, Binxing Fang: [j11]Xiao Xu, Weizhe Zhang, Hongli Zhang, Binxing Fang:
 Exploring Web Partition in DHT-Based Distributed Web Crawling. IEICE Trans. Inf. Syst. 93-D(11): 2907-2921 (2010)
 [j10]Lin Ye, Hongli Zhang, Fei Li, Majing Su: [j10]Lin Ye, Hongli Zhang, Fei Li, Majing Su:
 A Measurement Study on BitTorrent System. Int. J. Commun. Netw. Syst. Sci. 3(12): 916-924 (2010)
 [j9]Xiao Xu, Weizhe Zhang, Hongli Zhang, Binxing Fang: [j9]Xiao Xu, Weizhe Zhang, Hongli Zhang, Binxing Fang:
 Exploiting Location-aware Mechanism for Distributed Web Crawling over DHTs. J. Comput. 5(11): 1646-1654 (2010)
 [j8]Safaa O. Al-Mamory [j8]Safaa O. Al-Mamory , Hongli Zhang: , Hongli Zhang:
 New data mining technique to enhance IDS alarms quality. J. Comput. Virol. 6(1): 43-55 (2010)
 [c41]Wenmao Liu, Lihua Yin, Weizhe Zhang, Hongli Zhang: [c41]Wenmao Liu, Lihua Yin, Weizhe Zhang, Hongli Zhang:
 A General Distributed Object Locating Architecture in the Internet of Things. ICPADS 2010: 730-735
 [c40]Lizhi Peng, Hongli Zhang, Bo Yang, Yuehui Chen, Mahmoud T. Qassrawi, Gang Lu: [c40]Lizhi Peng, Hongli Zhang, Bo Yang, Yuehui Chen, Mahmoud T. Qassrawi, Gang Lu:
 Traffic identification using flexible neural trees. IWQoS 2010: 1-5
 [c39]Xiao Xu, Weizhe Zhang, Hongli Zhang, Binxing Fang: [c39]Xiao Xu, Weizhe Zhang, Hongli Zhang, Binxing Fang:
 Scale-Adaptable Recrawl Strategies for DHT-Based Distributed Web Crawling System. NPC 2010: 91-105
 [c38]Yu Zhang, Ricardo V. Oliveira, Hongli Zhang, Lixia Zhang: [c38]Yu Zhang, Ricardo V. Oliveira, Hongli Zhang, Lixia Zhang:
 Quantifying the Pitfalls of Traceroute in AS Connectivity Inference. PAM 2010: 91-100
2000 – 2009
- 2009
 [j7]Safaa O. Al-Mamory [j7]Safaa O. Al-Mamory , Hongli Zhang: , Hongli Zhang:
 Intrusion detection alarms reduction using root cause analysis and clustering. Comput. Commun. 32(2): 419-430 (2009)
 [j6]Safaa O. Al-Mamory [j6]Safaa O. Al-Mamory , Hongli Zhang: , Hongli Zhang:
 IDS alerts correlation using grammar-based approach. J. Comput. Virol. 5(4): 271-282 (2009)
 [c37]Lin Ye, Hongli Zhang, Weizhe Zhang, Jian Tan: [c37]Lin Ye, Hongli Zhang, Weizhe Zhang, Jian Tan:
 Measurement and Analysis of BitTorrent Availability. ICPADS 2009: 787-792
 [c36]Xiao Xu, Weizhe Zhang, Hongli Zhang, Binxing Fang, Xinran Liu: [c36]Xiao Xu, Weizhe Zhang, Hongli Zhang, Binxing Fang, Xinran Liu:
 A Forwarding-Based Task Scheduling Algorithm for Distributed Web Crawling over DHTs. ICPADS 2009: 854-859
 [c35]Yifei Zhang, Hongli Zhang: [c35]Yifei Zhang, Hongli Zhang:
 A Steady Network Coordinate System for Network Distance Estimating. ICPADS 2009: 860-863
 [c34]Wei Jiang, Binxing Fang, Hongli Zhang, Zhihong Tian, Xin-fang Song: [c34]Wei Jiang, Binxing Fang, Hongli Zhang, Zhihong Tian, Xin-fang Song:
 Optimal Network Security Strengthening Using Attack-Defense Game Model. ITNG 2009: 475-480
 [c33]Guangyu Shi, Youshui Long, Hao Gong, Changqing Wan, Chuanliang Yu, Xianqing Yang, Hongli Zhang, Yunfei Zhang: [c33]Guangyu Shi, Youshui Long, Hao Gong, Changqing Wan, Chuanliang Yu, Xianqing Yang, Hongli Zhang, Yunfei Zhang:
 HiFiP2P: The Simulator Capable of Massive Nodes and MeasuredUnderlay. PDP 2009: 285-292
- 2008
 [c32]Zhihong Tian, Baoshan Qin, Jianwei Ye, Hongli Zhang: [c32]Zhihong Tian, Baoshan Qin, Jianwei Ye, Hongli Zhang:
 Alertclu: A Realtime Alert Aggregation and Correlation System. CW 2008: 778-781
 [c31]Yu Zhang, Binxing Fang, Hongli Zhang: [c31]Yu Zhang, Binxing Fang, Hongli Zhang:
 On Destination Set in IP-Level Topology Measurement. ICN 2008: 168-173
 [c30]Wei Jiang, Zhihong Tian, Hongli Zhang, Xin-fang Song: [c30]Wei Jiang, Zhihong Tian, Hongli Zhang, Xin-fang Song:
 A Stochastic Game Theoretic Approach to Attack Prediction and Optimal Active Defense Strategy Decision. ICNSC 2008: 648-653
 [c29]Weizhe Zhang, Hongli Zhang, Xinran Liu, Xuemai Gu: [c29]Weizhe Zhang, Hongli Zhang, Xinran Liu, Xuemai Gu:
 Parallel Job Scheduling with Time-varying Constraints for Heterogeneous Multiple-Cluster Systems. ICYCS 2008: 1843-1848
 [c28]Safaa O. Al-Mamory [c28]Safaa O. Al-Mamory , Hongli Zhang, Ayad R. Abbas , Hongli Zhang, Ayad R. Abbas : :
 Modeling network attacks for scenario construction. IJCNN 2008: 1495-1502
 [c27]Safaa O. Al-Mamory [c27]Safaa O. Al-Mamory , Hongli Zhang, Ayad R. Abbas , Hongli Zhang, Ayad R. Abbas : :
 IDS alarms reduction using data mining. IJCNN 2008: 3564-3570
 [c26]Guangyu Shi, Youshui Long, Hao Gong, Changqing Wan, Chuanliang Yu, Xianqing Yang, Hongli Zhang: [c26]Guangyu Shi, Youshui Long, Hao Gong, Changqing Wan, Chuanliang Yu, Xianqing Yang, Hongli Zhang:
 A High Scalability P2P Simulation Framework with Measured Realistic Network Layer Support. IPCCC 2008: 311-318
 [c25]Guangyu Shi, Youshui Long, Jian Chen, Hao Gong, Hongli Zhang: [c25]Guangyu Shi, Youshui Long, Jian Chen, Hao Gong, Hongli Zhang:
 2MC-Match: A topology matching technique with 2-means clustering algorithm in P2P systems. ISCC 2008
 [c24]Guangyu Shi, Youshui Long, Jian Chen, Hao Gong, Hongli Zhang: [c24]Guangyu Shi, Youshui Long, Jian Chen, Hao Gong, Hongli Zhang:
 T2MC: A Peer-to-Peer Mismatch Reduction Technique by Traceroute and 2-Means Classification Algorithm. Networking 2008: 366-374
- 2007
 [c23]Safaa O. Al-Mamory, Hongli Zhang: [c23]Safaa O. Al-Mamory, Hongli Zhang:
 Scenario Discovery Using Abstracted Correlation Graph. CIS 2007: 702-706
 [c22]Wei Jiang, Hongli Zhang, Zhihong Tian, Xin-fang Song: [c22]Wei Jiang, Hongli Zhang, Zhihong Tian, Xin-fang Song:
 A Game Theoretic Method for Decision and Analysis of the Optimal Active Defense Strategy. CIS 2007: 819-823
- 2006
 [j5]Weizhe Zhang, Binxing Fang, Mingzeng Hu, Xinran Liu, Hongli Zhang, Lei Gao: [j5]Weizhe Zhang, Binxing Fang, Mingzeng Hu, Xinran Liu, Hongli Zhang, Lei Gao:
 Multisite co-allocation scheduling algorithms for parallel jobs in computing grid environments. Sci. China Ser. F Inf. Sci. 49(6): 906-926 (2006)
 [j4]Jianqi Tang, Binxing Fang, Mingzeng Hu, Hongli Zhang: [j4]Jianqi Tang, Binxing Fang, Mingzeng Hu, Hongli Zhang:
 A parallel programming interface for out-of-core cluster applications. Clust. Comput. 9(3): 321-327 (2006)
 [j3]Weizhe Zhang, Mingzeng Hu, Hongli Zhang, Kaipeng Liu: [j3]Weizhe Zhang, Mingzeng Hu, Hongli Zhang, Kaipeng Liu:
 A Multiobjective Evolutionary Algorithm for Grid Job Scheduling of Multi-QoS Constraints. J. Comput. Res. Dev. 43(11): 1855-1862 (2006)
 [j2]Zhihong Tian, Mingzeng Hu, Bin Li, Bo Liu, Hongli Zhang: [j2]Zhihong Tian, Mingzeng Hu, Bin Li, Bo Liu, Hongli Zhang:
 Defending against distributed denial-of-service attacks with an auction-based method. Web Intell. Agent Syst. 4(3): 341-351 (2006)
 [c21]Hongjie Sun, Binxing Fang, Hongli Zhang: [c21]Hongjie Sun, Binxing Fang, Hongli Zhang:
 User-Perceived Web QoS Measurement and Evaluation System. APWeb 2006: 157-165
 [c20]Hui He, Mingzeng Hu, Hongli Zhang: [c20]Hui He, Mingzeng Hu, Hongli Zhang:
 Clustering of Network Link Characteristic for Detector Placement of Macroscopical Prewarning. IMSCCS (2) 2006: 155-159
- 2005
 [c19]Hui He, Mingzeng Hu, Weizhe Zhang, Hongli Zhang, Zhi Yang: [c19]Hui He, Mingzeng Hu, Weizhe Zhang, Hongli Zhang, Zhi Yang:
 Topology-Based Macroscopical Response and Control Technology for Network Security Event. CIS (2) 2005: 560-566
 [c18]Jun Zheng, Mingzeng Hu, Hongli Zhang: [c18]Jun Zheng, Mingzeng Hu, Hongli Zhang:
 Usage Behavior Profiling for Anomaly Detection using Vector Quantization. Communication Systems and Applications 2005: 107-112
 [c17]Hui He, Mingzeng Hu, Weizhe Zhang, Hongli Zhang: [c17]Hui He, Mingzeng Hu, Weizhe Zhang, Hongli Zhang:
 Fast Detection of Worm Infection for Large-Scale Networks. ICMLC 2005: 672-681
 [c16]Hui He, Mingzeng Hu, Hongli Zhang, Zhenjiang Tang: [c16]Hui He, Mingzeng Hu, Hongli Zhang, Zhenjiang Tang:
 On the Effectiveness of multi-similarity for early detection of worms. PDCAT 2005: 229-233
 [c15]Hongjie Sun, Binxing Fang, Hongli Zhang: [c15]Hongjie Sun, Binxing Fang, Hongli Zhang:
 A Distributed Architecture for Network Performance Measurement and Evaluation System. PDCAT 2005: 471-475
 [c14]Weizhe Zhang, Mingzeng Hu, Hongli Zhang: [c14]Weizhe Zhang, Mingzeng Hu, Hongli Zhang:
 Load Balance Heuristics for Synchronous Iterative Applications on Heterogeneous Cluster Systems. PDCAT 2005: 1063-1067
 [c13]Xiaofeng Wang, Binxing Fang, Hongli Zhang, Weizhe Zhang: [c13]Xiaofeng Wang, Binxing Fang, Hongli Zhang, Weizhe Zhang:
 A Model for Estimating the Performance of Synchronous Parallel Network Simulation. IASTED PDCS 2005: 548-553
- 2004
 [j1]Wu Yang, Binxing Fang, Bo Liu, Hongli Zhang: [j1]Wu Yang, Binxing Fang, Bo Liu, Hongli Zhang:
 Intrusion detection system for high-speed network. Comput. Commun. 27(13): 1288-1294 (2004)
 [c12]Jianqi Tang, Binxing Fang, Mingzeng Hu, Hongli Zhang: [c12]Jianqi Tang, Binxing Fang, Mingzeng Hu, Hongli Zhang:
 Developing a user-level middleware for out-of-core computation on Grids. CCGRID 2004: 686-690
 [c11]Wei Wang, Binxing Fang, Hongli Zhang, Yuanzhe Yao: [c11]Wei Wang, Binxing Fang, Hongli Zhang, Yuanzhe Yao:
 Ad Hoc Debugging Environment for Grid Applications. GCC 2004: 113-120
 [c10]Gang Liu, Mingzeng Hu, Binxing Fang, Hongli Zhang: [c10]Gang Liu, Mingzeng Hu, Binxing Fang, Hongli Zhang:
 Measurement and Modeling of Large-Scale Peer-to-Peer Storage System. GCC Workshops 2004: 270-277
 [c9]Yuanzhe Yao, Binxing Fang, Hongli Zhang, Wei Wang: [c9]Yuanzhe Yao, Binxing Fang, Hongli Zhang, Wei Wang:
 Network Performance Measurement Methodologies in PGMS. GCC Workshops 2004: 466-473
 [c8]Jun Zheng, Mingzeng Hu, Binxing Fang, Hongli Zhang: [c8]Jun Zheng, Mingzeng Hu, Binxing Fang, Hongli Zhang:
 Anomaly Detection Using Fast SOFM. GCC Workshops 2004: 530-537
 [c7]Yuanzhe Yao, Binxing Fang, Hongli Zhang, Wei Wang: [c7]Yuanzhe Yao, Binxing Fang, Hongli Zhang, Wei Wang:
 PGMS: A P2P-Based Grid Monitoring System. GCC 2004: 903-906
 [c6]Weizhe Zhang, Binxing Fang, Hui He, Hongli Zhang, Mingzeng Hu: [c6]Weizhe Zhang, Binxing Fang, Hui He, Hongli Zhang, Mingzeng Hu:
 Multisite Resource Selection and Scheduling Algorithm on Computational Grid. IPDPS 2004
 [c5]Jianqi Tang, Binxing Fang, Mingzeng Hu, Hongli Zhang: [c5]Jianqi Tang, Binxing Fang, Mingzeng Hu, Hongli Zhang:
 The Practice of I/O Optimizations for Out-of-Core Computation. PDCAT 2004: 81-85
 [c4]Gang Liu, Mingzeng Hu, Binxing Fang, Hongli Zhang: [c4]Gang Liu, Mingzeng Hu, Binxing Fang, Hongli Zhang:
 Explaining BitTorrent Traffic Self-Similarity. PDCAT 2004: 839-843
 [c3]Wei Wang, Binxing Fang, Hongli Zhang: [c3]Wei Wang, Binxing Fang, Hongli Zhang:
 Grid-Enabled Parallel Debugging Environment: A Portal Solution. PDPTA 2004: 856-862
 [c2]Jianqi Tang, Binxing Fang, Mingzeng Hu, Hongli Zhang: [c2]Jianqi Tang, Binxing Fang, Mingzeng Hu, Hongli Zhang:
 A parallel out-of-core computing system using PVFS for Linux clusters. SNAPI@PACT 2004: 33-39
- 2003
 [c1]Weizhe Zhang, Hongli Zhang, Hui He, Mingzeng Hu: [c1]Weizhe Zhang, Hongli Zhang, Hui He, Mingzeng Hu:
 Multisite Task Scheduling on Distributed Computing Grid. GCC (2) 2003: 57-64
Coauthor Index
aka: Xiang-Zhan Yu

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from  to the list of external document links (if available).
 to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the  of the Internet Archive (if available).
 of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from  ,
,  , and
, and  to record detail pages.
 to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from  and
 and  to record detail pages.
 to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from  .
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-10-31 02:11 CET by the dblp team
 all metadata released as open data under CC0 1.0 license
 all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


 Google
Google Google Scholar
Google Scholar Semantic Scholar
Semantic Scholar Internet Archive Scholar
Internet Archive Scholar CiteSeerX
CiteSeerX ORCID
ORCID







