default search action
Hongyi Zhu
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j24]Qiujie Li, Hongyi Zhu:
Performance evaluation of 2D LiDAR SLAM algorithms in simulated orchard environments. Comput. Electron. Agric. 221: 108994 (2024) - [j23]Yidong Chai, Haoxin Liu, Hongyi Zhu, Yue Pan, Anqi Zhou, Hongyan Liu, Jianwei Liu, Yang Qian:
A profile similarity-based personalized federated learning method for wearable sensor-based human activity recognition. Inf. Manag. 61(7): 103922 (2024) - [j22]Benjamin M. Ampel, Sagar Samtani, Hongyi Zhu, Hsinchun Chen, Jay F. Nunamaker Jr.:
Improving Threat Mitigation Through a Cybersecurity Risk Management Framework: A Computational Design Science Approach. J. Manag. Inf. Syst. 41(1): 236-265 (2024) - [j21]Hongyi Zhu, Chuanju Xu:
A Highly Efficient Numerical Method for the Time-Fractional Diffusion Equation on Unbounded Domains. J. Sci. Comput. 99(2): 47 (2024) - [j20]Benjamin Ampel, Sagar Samtani, Hongyi Zhu, Hsinchun Chen:
Creating Proactive Cyber Threat Intelligence with Hacker Exploit Labels: A Deep Transfer Learning Approach. MIS Q. 48(1): 137-166 (2024) - [j19]Jing Chen, Lihua Ruan, Hongyi Zhu:
A Practical Design of RIS With Subsurfaces Using Codebook-Based Configuration Method. IEEE Wirel. Commun. Lett. 13(4): 1098-1102 (2024) - [j18]Lihua Ruan, Hongyi Zhu:
Leveraging RIS to Assist Communication and Against CSI-Based Passive Sensing. IEEE Wirel. Commun. Lett. 13(6): 1750-1754 (2024) - [c26]Mark W. Patton, Hsinchun Chen, Sagar Samtani, Hongyi Zhu:
Introduction to the Minitrack on Cybersecurity in the Age of Artificial Intelligence, AI for Cybersecurity, and Cybersecurity for AI. HICSS 2024: 536-537 - [c25]Ben Lazarine, Sagar Samtani, Hongyi Zhu, Ramesh Venkataraman:
Suggesting Alternatives for Potentially Insecure Artificial Intelligence Repositories: An Unsupervised Graph Embedding Approach. HICSS 2024: 548-556 - [c24]Bingyi Wu, Charles Zhechao Liu, Kim-Kwang Raymond Choo, Hongyi Zhu, Shen Chang:
Two-sided Long Tails on Blockchain-Based Crowdsourcing Platforms. HICSS 2024: 4143-4152 - [c23]Lihua Ruan, Hongyi Zhu:
Using RIS to Support/Prevent Passive Sensing: RIS-enabled Passive Sensing Performance and RIS Configuration Study. ICC 2024: 4912-4917 - [c22]Lihua Ruan, Hongyi Zhu:
A Hybrid Fiber-Femtocell Indoor Network to Support Low-Latency and High-Bandwidth Indoor Communication Applications. ICNC 2024: 951-956 - [c21]Jia-Hong Huang, Hongyi Zhu, Yixian Shen, Stevan Rudinac, Alessio M. Pacces, Evangelos Kanoulas:
A Novel Evaluation Framework for Image2Text Generation. LLM4Eval@SIGIR 2024: 51-65 - [c20]Omar Shahbaz Khan, Ujjwal Sharma, Hongyi Zhu, Stevan Rudinac, Björn Þór Jónsson:
Exquisitor at the Lifelog Search Challenge 2024: Blending Conversational Search with User Relevance Feedback. LSC@ICMR 2024: 117-121 - [c19]Hongyi Zhu, Jia-Hong Huang, Stevan Rudinac, Evangelos Kanoulas:
Enhancing Interactive Image Retrieval With Query Rewriting Using Large Language Models and Vision Language Models. ICMR 2024: 978-987 - [c18]Omar Shahbaz Khan, Hongyi Zhu, Ujjwal Sharma, Evangelos Kanoulas, Stevan Rudinac, Björn Þór Jónsson:
Exquisitor at the Video Browser Showdown 2024: Relevance Feedback Meets Conversational Search. MMM (4) 2024: 347-355 - [i6]Hongyi Zhu, Jia-Hong Huang, Stevan Rudinac, Evangelos Kanoulas:
Enhancing Interactive Image Retrieval With Query Rewriting Using Large Language Models and Vision Language Models. CoRR abs/2404.18746 (2024) - [i5]Anqi Zhou, Yezheng Liu, Yidong Chai, Hongyi Zhu, Xinyue Ge, Yuanchun Jiang, Meng Wang:
A Whole-Process Certifiably Robust Aggregation Method Against Backdoor Attacks in Federated Learning. CoRR abs/2407.00719 (2024) - [i4]Jia-Hong Huang, Hongyi Zhu, Yixian Shen, Stevan Rudinac, Alessio M. Pacces, Evangelos Kanoulas:
A Novel Evaluation Framework for Image2Text Generation. CoRR abs/2408.01723 (2024) - 2023
- [j17]Sagar Samtani, Hongyi Zhu, Balaji Padmanabhan, Yidong Chai, Hsinchun Chen, Jay F. Nunamaker Jr.:
Deep Learning for Information Systems Research. J. Manag. Inf. Syst. 40(1): 271-301 (2023) - [j16]Yidong Chai, Ruicheng Liang, Sagar Samtani, Hongyi Zhu, Meng Wang, Ye-Zheng Liu, Yuanchun Jiang:
Additive Feature Attribution Explainable Methods to Craft Adversarial Attacks for Text Classification and Text Regression. IEEE Trans. Knowl. Data Eng. 35(12): 12400-12414 (2023) - [j15]Yifeng Qin, Min Han, Long Zhang, Chun-Xu Mao, Hongyi Zhu:
A Compact Dual-Band Omnidirectional Circularly Polarized Filtering Antenna for UAV Communications. IEEE Trans. Veh. Technol. 72(12): 16742-16747 (2023) - [c17]Hongyi Zhu, Yasemin Salgirli, Pinar Can, Durmus Atilgan, Albert Ali Salah:
Video-based estimation of pain indicators in dogs. ACII 2023: 1-8 - [c16]Aijia Yuan, Michael Xu, Hongyi Zhu, Sagar Samtani, Edlin Garcia:
Towards Privacy-Preserving Depression Detection: Experiments on Passive Sensor Signal Data. ICDH 2023: 115-117 - [c15]Jiahang Huang, Andrew Ni, Jasmine Zhang, Hongyi Zhu, Hui Zhang:
Visualizing Multimodal Time Series at Scale. ISVC (1) 2023: 71-84 - [c14]Agrim Sachdeva, Ben Lazarine, Hongyi Zhu, Sagar Samtani:
User Profiling and Vulnerability Introduction Prediction in Social Coding Repositories: A Dynamic Graph Embedding Approach: Vulnerability Introduction Prediction in Social Coding Repositories. CSET @ USENIX Security Symposium 2023: 19-25 - 2022
- [c13]Agrim Sachdeva, Ben Lazarine, Ruchik Dama, Sagar Samtani, Hongyi Zhu:
Identifying Patterns of Vulnerability Incidence in Foundational Machine Learning Repositories on GitHub: An Unsupervised Graph Embedding Approach. ICDM (Workshops) 2022: 1-8 - [c12]Ben Lazarine, Zhong Zhang, Agrim Sachdeva, Sagar Samtani, Hongyi Zhu:
Exploring the Propagation of Vulnerabilities from GitHub Repositories Hosted by Major Technology Organizations. CSET @ USENIX Security Symposium 2022: 145-150 - [i3]Hongyi Zhu, Yasemin Salgirli, Pinar Can, Durmus Atilgan, Albert Ali Salah:
Video-based estimation of pain indicators in dogs. CoRR abs/2209.13296 (2022) - 2021
- [j14]Hongyi Zhu, Sagar Samtani, Randall A. Brown, Hsinchun Chen:
A Deep Learning Approach for Recognizing Activity of Daily Living (ADL) for Senior Care: Exploiting Interaction Dependency and Temporal Patterns. MIS Q. 45(2) (2021) - [j13]Dianming Hou, Hongyi Zhu, Chuanju Xu:
Highly efficient schemes for time-fractional Allen-Cahn equation using extended SAV approach. Numer. Algorithms 88(3): 1077-1108 (2021) - [c11]Kaeli Otto, Benjamin Ampel, Sagar Samtani, Hongyi Zhu, Hsinchun Chen:
Exploring the Evolution of Exploit-Sharing Hackers: An Unsupervised Graph Embedding Approach. ISI 2021: 1-6 - 2020
- [j12]Hongyi Zhu, Sagar Samtani, Hsinchun Chen, Jay F. Nunamaker Jr.:
Human Identification for Activities of Daily Living: A Deep Transfer Learning Approach. J. Manag. Inf. Syst. 37(2): 457-483 (2020) - [j11]Hongyi Zhu, Besma Smida, David J. Love:
Optimization of Two-Way Network Coded HARQ With Overhead. IEEE Trans. Commun. 68(6): 3602-3613 (2020) - [j10]Sagar Samtani, Hongyi Zhu, Hsinchun Chen:
Proactively Identifying Emerging Hacker Threats from the Dark Web: A Diachronic Graph Embedding Framework (D-GEF). ACM Trans. Priv. Secur. 23(4): 21:1-21:33 (2020) - [c10]Bingyi Wu, Charles Zhechao Liu, Hongyi Zhu:
Will Cooperation Help Content Creators Grow? Empirical Evidence from Twitch.tv. ICIS 2020 - [c9]Benjamin Ampel, Sagar Samtani, Hongyi Zhu, Steven Ullman, Hsinchun Chen:
Labeling Hacker Exploits for Proactive Cyber Threat Intelligence: A Deep Transfer Learning Approach. ISI 2020: 1-6 - [c8]Ben Lazarine, Sagar Samtani, Mark W. Patton, Hongyi Zhu, Steven Ullman, Benjamin Ampel, Hsinchun Chen:
Identifying Vulnerable GitHub Repositories and Users in Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach. ISI 2020: 1-6 - [c7]Steven Ullman, Sagar Samtani, Ben Lazarine, Hongyi Zhu, Benjamin Ampel, Mark W. Patton, Hsinchun Chen:
Smart Vulnerability Assessment for Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach. ISI 2020: 1-6 - [i2]Sagar Samtani, Hongyi Zhu, Balaji Padmanabhan, Yidong Chai, Hsinchun Chen:
Deep Learning for Information Systems Research. CoRR abs/2010.05774 (2020)
2010 – 2019
- 2019
- [j9]Hongyi Zhu, Besma Smida, David J. Love:
An Efficient Network-Coded ARQ Scheme for Two-Way Wireless Communication With Full-Duplex Relaying. IEEE Access 7: 131995-132009 (2019) - [j8]Sagar Samtani, Hongyi Zhu, Shuo Yu:
Fear Appeals and Information Security Behaviors: An Empirical Study on Mechanical Turk. AIS Trans. Replication Res. 5: 5 (2019) - [j7]Shuiran Peng, Hongyi Zhu:
Well-posedness for modified higher-order anisotropic Cahn-Hilliard equations. Asymptot. Anal. 111(3-4): 201-215 (2019) - [j6]Hongyi Zhu, Chuanju Xu:
A Fast High Order Method for the Time-Fractional Diffusion Equation. SIAM J. Numer. Anal. 57(6): 2829-2849 (2019) - [j5]Shuo Yu, Hongyi Zhu, Shan Jiang, Yong Zhang, Chunxiao Xing, Hsinchun Chen:
Emoticon Analysis for Chinese Social Media and E-commerce: The AZEmo System. ACM Trans. Manag. Inf. Syst. 9(4): 16:1-16:22 (2019) - [i1]Dianming Hou, Hongyi Zhu, Chuanju Xu:
Highly efficient and accurate schemes for time fractional Allen-Cahn equation by using extended SAV approach. CoRR abs/1910.09087 (2019) - 2018
- [b1]Hongyi Zhu:
Throughput and Efficiency Analysis of Network-Coded HARQ for Two-Way Wireless Systems. Purdue University, USA, 2018 - [j4]Sagar Samtani, Shuo Yu, Hongyi Zhu, Mark W. Patton, John Matherly, Hsinchun Chen:
Identifying SCADA Systems and Their Vulnerabilities on the Internet of Things: A Text-Mining Approach. IEEE Intell. Syst. 33(2): 63-73 (2018) - [j3]Hongyi Zhu, Besma Smida, David J. Love:
Throughput Analysis of Two-Way NCed-HARQ With Reverse-Link Assistance and Estimated Channel State Information. IEEE Commun. Lett. 22(2): 352-355 (2018) - [j2]Hongyi Zhu, Hsinchun Chen, Randall A. Brown:
A sequence-to-sequence model-based deep learning approach for recognizing activity of daily living for senior care. J. Biomed. Informatics 84: 148-158 (2018) - [j1]Lele Qin, Shuang Feng, Hongyi Zhu:
Research on the technological architectural design of geological hazard monitoring and rescue-after-disaster system based on cloud computing and Internet of things. Int. J. Syst. Assur. Eng. Manag. 9(3): 684-695 (2018) - 2017
- [c6]Hongyi Zhu, Xinghao Gu, Besma Smida, David J. Love:
On practical network coded ARQ for two-way wireless communication. ICC 2017: 1-6 - 2016
- [c5]Hongyi Zhu, Besma Smida, David J. Love:
An efficient network coding scheme for two-way communication with ARQ feedback. ICC 2016: 1-6 - [c4]Lubaina Maimoon, Joshua Chuang, Hongyi Zhu, Shuo Yu, Kuo-Shiuan Peng, Rahul Prayakarao, Jie Bai, Daniel Dajun Zeng, Shu-Hsing Li, Hsin-Min Lu, Hsinchun Chen:
SilverLink: Developing an International Smart and Connected Home Monitoring System for Senior Care. ICSH 2016: 65-77 - [c3]Sagar Samtani, Shuo Yu, Hongyi Zhu, Mark W. Patton, Hsinchun Chen:
Identifying SCADA vulnerabilities using passive and active vulnerability assessment techniques. ISI 2016: 25-30 - 2015
- [c2]Joshua Chuang, Lubaina Maimoon, Shuo Yu, Hongyi Zhu, Casper Nybroe, Owen Hsiao, Shu-Hsing Li, Hsin-Min Lu, Hsinchun Chen:
SilverLink: Smart Home Health Monitoring for Senior Care. ICSH 2015: 3-14 - 2014
- [c1]Shuo Yu, Hongyi Zhu, Shan Jiang, Hsinchun Chen:
Emoticon Analysis for Chinese Health and Fitness Topics. ICSH 2014: 1-12
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:28 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint