default search action
Zhiyong Hong
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j32]Yange Chen, Baocang Wang, Hang Jiang, Pu Duan, Yuan Ping, Zhiyong Hong:
PEPFL: A framework for a practical and efficient privacy-preserving federated learning. Digit. Commun. Networks 10(2): 355-368 (2024) - [j31]Yingwei Feng, Zhiyong Hong, Liping Xiong, Zhiqiang Zeng, Jingmin Li:
Shufflemono: Rethinking Lightweight Network for Self-Supervised Monocular Depth Estimation. J. Artif. Intell. Soft Comput. Res. 14(3): 191-205 (2024) - [j30]Wenkang Zhang, Zhiyong Hong, Liping Xiong, Zhiqiang Zeng, Zhishun Cai, Kunyu Tan:
Sinextnet: A New Small Object Detection Model for Aerial Images Based on PP-Yoloe. J. Artif. Intell. Soft Comput. Res. 14(3): 251-265 (2024) - [j29]Huarun Xiao, Zhiyong Hong, Liping Xiong, Zhiqiang Zeng:
AMCFCN: attentive multi-view contrastive fusion clustering net. PeerJ Comput. Sci. 10: e1906 (2024) - 2023
- [j28]Feifan She, Zhiyong Hong, Zhiqiang Zeng, Wenhua Yu:
Improved Traffic Sign Detection Model Based on YOLOv7-Tiny. IEEE Access 11: 126555-126567 (2023) - [j27]Zhiqiang Zeng, Xiangyu Zhang, Zhiyong Hong:
A constrained multiobjective differential evolution algorithm based on the fusion of two rankings. Inf. Sci. 647: 119572 (2023) - [c9]Cong Liu, Zhiyong Hong, Wenhua Yu, Dexin Zhen:
An Efficient Helmet Wearing Detection Method Based On YOLOv7-Tiny. MLMI 2023: 92-99 - 2022
- [j26]Guanzhou Ke, Zhiyong Hong, Wenhua Yu, Xin Zhang, Zeyi Liu:
Efficient multi-view clustering networks. Appl. Intell. 52(13): 14918-14934 (2022) - [j25]Zhiyong Hong, Liguo Zhou, Yu Zhan, Chengdong Liu, Baocang Wang:
Cryptanalysis of an additively homomorphic public key encryption scheme. Comput. Stand. Interfaces 82: 103623 (2022) - [j24]Zhiqiang Zeng, Min Zhang, Zhiyong Hong, Huanhuan Zhang, Hui Zhu:
Enhancing differential evolution with a target vector replacement strategy. Comput. Stand. Interfaces 82: 103631 (2022) - [j23]Yange Chen, Qingqing Zhao, Pu Duan, Benyu Zhang, Zhiyong Hong, Baocang Wang:
Verifiable privacy-preserving association rule mining using distributed decryption mechanism on the cloud. Expert Syst. Appl. 201: 117086 (2022) - [j22]Zhiqiang Zeng, Le Gao, Zhiyong Hong:
Energy-Aware Scheduling of Two-Stage Flexible Flow Shop Based on Group Technology: Consideration of the Inconsistency of Process Differences. Int. J. Comput. Intell. Syst. 15(1): 60 (2022) - [j21]Furong Li, Yange Chen, Pu Duan, Benyu Zhang, Zhiyong Hong, Yupu Hu, Baocang Wang:
Privacy-preserving convolutional neural network prediction with low latency and lightweight users. Int. J. Intell. Syst. 37(1): 568-595 (2022) - [j20]Yange Chen, SuYu He, Baocang Wang, Pu Duan, Benyu Zhang, Zhiyong Hong, Yuan Ping:
Cryptanalysis and Improvement of DeepPAR: Privacy-Preserving and Asynchronous Deep Learning for Industrial IoT. IEEE Internet Things J. 9(21): 21958-21970 (2022) - [j19]Yu Zhan, Danfeng Shen, Pu Duan, Benyu Zhang, Zhiyong Hong, Baocang Wang:
MDOPE: Efficient multi-dimensional data order preserving encryption scheme. Inf. Sci. 595: 334-343 (2022) - [j18]Wenju Xu, Baocang Wang, Jiasen Liu, Yange Chen, Pu Duan, Zhiyong Hong:
Toward practical privacy-preserving linear regression. Inf. Sci. 596: 119-136 (2022) - [j17]Zhiqiang Zeng, Min Zhang, Huanhuan Zhang, Zhiyong Hong:
Improved differential evolution algorithm based on the sawtooth-linear population size adaptive method. Inf. Sci. 608: 1045-1071 (2022) - [j16]Zhiqiang Zeng, Zhiyong Hong, Huanhuan Zhang, Min Zhang, Chuangquan Chen:
Improving differential evolution using a best discarded vector selection strategy. Inf. Sci. 609: 353-375 (2022) - [j15]Songyang Wu, Wenju Xu, Zhiyong Hong, Pu Duan, Benyu Zhang, Yupu Hu, Baocang Wang:
Updatable privacy-preserving itK-nearest neighbor query in location-based s-ervice. Peer-to-Peer Netw. Appl. 15(2): 1076-1089 (2022) - [j14]Qinyu Mao, Yange Chen, Pu Duan, Benyu Zhang, Zhiyong Hong, Baocang Wang:
Privacy-Preserving Classification Scheme Based on Support Vector Machine. IEEE Syst. J. 16(4): 5906-5916 (2022) - [j13]Yange Chen, Qinyu Mao, Baocang Wang, Pu Duan, Benyu Zhang, Zhiyong Hong:
Privacy-Preserving Multi-Class Support Vector Machine Model on Medical Diagnosis. IEEE J. Biomed. Health Informatics 26(7): 3342-3353 (2022) - 2021
- [j12]Shaotao Dai, Xufeng Yan, Zhiyong Hong, Tao Ma, Rui Wu, Zhongyu Li, Zhibin Zeng, Ping Yang, Lei Hu, Teng Zhang, Bangzhu Wang:
Development and Test of One Commercial Megawatt Superconducting DC Induction Heater With Extra High Energy Efficiency. IEEE Access 9: 3301-3314 (2021) - [j11]Zhiyong Hong, Zhili Zhang, Pu Duan, Benyu Zhang, Baocang Wang, Wen Gao, Zhen Zhao:
Secure Privacy-Preserving Association Rule Mining With Single Cloud Server. IEEE Access 9: 165090-165102 (2021) - [j10]Zhiyong Hong, Zhiqiang Zeng, Le Gao:
Energy-efficiency scheduling of multi-cell manufacturing system considering total handling distance and eligibility constraints. Comput. Ind. Eng. 151: 106998 (2021) - [j9]Zhiqiang Zeng, Min Zhang, Tao Chen, Zhiyong Hong:
A new selection operator for differential evolution algorithm. Knowl. Based Syst. 226: 107150 (2021) - [j8]Yannan Li, Yong Yu, Willy Susilo, Zhiyong Hong, Mohsen Guizani:
Security and Privacy for Edge Intelligence in 5G and Beyond Networks: Challenges and Solutions. IEEE Wirel. Commun. 28(2): 63-69 (2021) - [c8]Guanzhou Ke, Zhiyong Hong, Zhiqiang Zeng, Zeyi Liu, Yangjie Sun, Yannan Xie:
CONAN: Contrastive Fusion Networks for Multi-view Clustering. IEEE BigData 2021: 653-660 - [c7]Xu Wang, Kaili Zhou, Zhiyong Hong:
Open Field Smart Planting System of Family Farm. ICCCS 2021: 823-828 - [c6]Shaoyong Li, Lin Yu, Zhiyong Hong, Xinglin Liu:
Composing Approximations from Distribution Data under a Fuzzy Relation. ISKE 2021: 380-384 - 2020
- [j7]Ping Yang, Shaotao Dai, Tao Ma, Jianmin Huang, Guozhong Jiang, Yawei Wang, Zhiyong Hong, Zhijian Jin:
Analysis of Peak Electromagnetic Torque Characteristics for Superconducting DC Induction Heaters. IEEE Access 8: 14777-14788 (2020) - [j6]Zhiyong Hong, Shaoyong Li, Lin Yu:
Accelerating Update of Approximations Under a Dominance Relation. IEEE Access 8: 146472-146482 (2020)
2010 – 2019
- 2019
- [j5]Shaoyong Li, Zhiyong Hong, Tianrui Li:
Efficient composing rough approximations for distributed data. Knowl. Based Syst. 182 (2019) - [c5]Zhiyong Hong, Yuqiang Li, Zhiqiang Zeng:
Convolutional Neural Network for Control Chart Patterns Recognition. CSAE 2019: 59:1-59:9 - [c4]Shaoyong Li, Lin Yu, Zhiyong Hong, Hexi Li:
Composition of Rough Approximations under the Dominance-Based Relation. ISKE 2019: 227-231 - [c3]Shaoyong Li, Zhiyong Hong:
A Dynamic Dominance-Based Rough Set Approach for Processing Ordered Data. IJCRS 2019: 312-320 - 2018
- [j4]Yi Liu, Jun Liu, Zhiyong Hong:
A Multiple Attribute Decision Making Approach Based on New Similarity Measures of Interval-valued Hesitant Fuzzy Sets. Int. J. Comput. Intell. Syst. 11(1): 15-32 (2018) - [j3]Zhiyong Hong, Yuan Rong, Ya Qin, Yi Liu:
Hesitant fuzzy dual Muirhead mean operators and its application to multiple attribute decision making. J. Intell. Fuzzy Syst. 35(2): 2161-2172 (2018) - 2017
- [j2]Ya Qin, Yi Liu, Zhiyong Hong:
Multicriteria decision making method based on generalized Pythagorean fuzzy ordered weighted distance measures . J. Intell. Fuzzy Syst. 33(6): 3665-3675 (2017) - 2016
- [c2]Zhiyong Hong:
Updating P-dominated and P-dominating sets based on a classification tree. ICNC-FSKD 2016: 950-954 - 2014
- [c1]Zhiyong Hong, Keyun Qin:
Algebraic Structure of Fuzzy Soft Sets. RSKT 2014: 569-576 - 2010
- [j1]Keyun Qin, Zhiyong Hong:
On soft equality. J. Comput. Appl. Math. 234(5): 1347-1355 (2010)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint