default search action
Zhihong Zhou
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c8]Dongrui Gao, Haokai Zhang, Pengrui Li, Tian Tang, Shihong Liu, Zhihong Zhou, Shaofei Ying, Ye Zhu, Yongqing Zhang:
A Local-Ascending-Global Learning Strategy for Brain-Computer Interface. AAAI 2024: 10039-10047 - 2023
- [j18]Xiaopeng Kan, Zhihong Zhou, Lihong Yao, Yuxin Zuo:
Research on Anomaly Detection in Vehicular CAN Based on Bi-LSTM. J. Cyber Secur. Mobil. 12(5): 629-652 (2023) - [j17]Yin Ying, Zhihong Zhou, Quanhai Zhang:
Blockchain-based Collaborative Caching Mechanism for Information Center IoT. J. ICT Stand. 11(1): 67-96 (2023) - [j16]Huajie Xiong, Wenjun Wu, Yijing An, Xiao Li, Zhihong Zhou:
Asymmetric Heat Transfer in Aircraft Electrothermal Anti-Icing. Symmetry 15(3): 599 (2023) - [c7]Zhihong Zhou, Qiang Xu, Hui Ding, Shengwei Ji:
Comparative Research on Embedding Methods for Video Knowledge Graph. CACML 2023: 264-270 - 2022
- [j15]Zhizhu Lai, Qun Yue, Zheng Wang, Dongmei Ge, Yulong Chen, Zhihong Zhou:
The min-p robust optimization approach for facility location problem under uncertainty. J. Comb. Optim. 44(2): 1134-1160 (2022) - [j14]Xiao Li, Xuanling Zhang, Zhihong Zhou:
Free Vibration Analysis of a Spinning Composite Laminated Truncated Conical Shell under Hygrothermal Environment. Symmetry 14(7): 1369 (2022) - [j13]Zhulong Wu, Yingqi Li, Shaohan Cui, Xiao Li, Zhihong Zhou, Xiaobao Tian:
A Study of the Critical Velocity of the Droplet Transition from the Cassie to Wenzel State on the Symmetric Pillared Surface. Symmetry 14(9): 1891 (2022) - [j12]Zhihong Zhou, Hu Bin, Jianhua Li, Ying Yin, Xiuzhen Chen, Jin Ma, Lihong Yao:
Malicious encrypted traffic features extraction model based on unsupervised feature adaptive learning. J. Comput. Virol. Hacking Tech. 18(4): 453-463 (2022) - 2021
- [c6]Yinchao Cheng, Zhihong Zhou, Ye Guo, Zhongxian Xu, Lin Lin:
Research on a Technical Scheme for Evaluating the Stickiness of Family Group Users. ACCC 2021: 32-38 - 2020
- [j11]Wei Li, Linfeng Liao, Dawu Gu, Shan Cao, Yixin Wu, Jiayao Li, Zhihong Zhou, Zheng Guo, Ya Liu, Zhiqiang Liu:
Ciphertext-only fault analysis on the Midori lightweight cryptosystem. Sci. China Inf. Sci. 63(3) (2020)
2010 – 2019
- 2019
- [c5]Yin Zheng, Dongping Zhang, Li Yang, Zhihong Zhou:
Fall detection and recognition based on GCN and 2D Pose. ICSAI 2019: 558-562 - [c4]Jun Ge, Dongping Zhang, Li Yang, Zhihong Zhou:
Road sludge detection and identification based on improved Yolov3. ICSAI 2019: 579-583 - 2018
- [j10]Jian Mao, Wenqian Tian, Jingbo Jiang, Zhaoyuan He, Zhihong Zhou, Jianwei Liu:
Understanding structure-based social network de-anonymization techniques via empirical analysis. EURASIP J. Wirel. Commun. Netw. 2018: 279 (2018) - [j9]Wei Li, Linfeng Liao, Dawu Gu, Chenyu Ge, Zhiyong Gao, Zhihong Zhou, Zheng Guo, Ya Liu, Zhiqiang Liu:
Security Analysis of the PHOTON Lightweight Cryptosystem in the Wireless Body Area Network. KSII Trans. Internet Inf. Syst. 12(1): 476-496 (2018) - [c3]Zhihong Zhou, Lihong Yao, Jianhua Li, Bin Hu, Chen Wang, Zhenglong Wang:
Classification of botnet families based on features self-learning under Network Traffic Censorship. SSIC 2018: 1-7 - 2017
- [j8]Wei Li, Zhiyong Gao, Dawu Gu, Chenyu Ge, Linfeng Liao, Zhihong Zhou, Ya Liu, Zhiqiang Liu:
Security Analysis of the Whirlpool Hash Function in the Cloud of Things. KSII Trans. Internet Inf. Syst. 11(1): 536-551 (2017) - [j7]Shu Min Pan, Ru Hong Wen, Zhihong Zhou, Nan Run Zhou:
Optical multi-image encryption scheme based on discrete cosine transform and nonlinear fractional Mellin transform. Multim. Tools Appl. 76(2): 2933-2953 (2017) - [c2]Wenqian Tian, Jian Mao, Jingbo Jiang, Zhaoyuan He, Zhihong Zhou, Jianwei Liu:
Deeply Understanding Structure-based Social Network De-anonymization. IIKI 2017: 52-58 - 2016
- [j6]Nan Run Zhou, Xiao Rong Liang, Zhihong Zhou, Ahmed Farouk:
Relay selection scheme for amplify-and-forward cooperative communication system with artificial noise. Secur. Commun. Networks 9(11): 1398-1404 (2016) - [j5]Wei Li, Wenwen Zhang, Dawu Gu, Yanqin Cao, Zhi Tao, Zhihong Zhou, Ya Liu, Zhiqiang Liu:
Impossible Differential Fault Analysis on the LED Lightweight Cryptosystem in the Vehicular Ad-Hoc Networks. IEEE Trans. Dependable Secur. Comput. 13(1): 84-92 (2016) - 2015
- [j4]Wei Li, Wenwen Zhang, Dawu Gu, Zhi Tao, Zhihong Zhou, Ya Liu, Zhiqiang Liu:
Security Analysis of the Lightweight Cryptosystem TWINE in the Internet of Things. KSII Trans. Internet Inf. Syst. 9(2): 793-810 (2015) - 2014
- [j3]Suvrajeet Sen, Zhihong Zhou:
Multistage Stochastic Decomposition: A Bridge between Stochastic Programming and Approximate Dynamic Programming. SIAM J. Optim. 24(1): 127-153 (2014) - 2013
- [j2]Jianni Xushuai, Zhihong Zhou, Wen Qin, Qiongxi Jiang, Nanrun Zhou:
Multi-Party Concurrent Signature Scheme Based on Designated Verifiers. J. Comput. 8(11): 2823-2830 (2013) - 2011
- [c1]Suvrajeet Sen, Zhihong Zhou:
Optimization simulation: the case of multi-stage stochastic decision models. WSC 2011: 4103-4114
2000 – 2009
- 2009
- [j1]Suvrajeet Sen, Zhihong Zhou, Kai Huang:
Enhancements of two-stage stochastic decomposition. Comput. Oper. Res. 36(8): 2434-2439 (2009)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:06 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint