default search action
Jianzhong Zhang 0003
Person information
- affiliation: Nankai University, Tianjin, College of Computer and Control Engineering
Other persons with the same name
- Jianzhong Zhang — disambiguation page
- Jianzhong Zhang 0001 — City University of Hong Kong, Department of Mathematics (and 1 more)
- Jianzhong Zhang 0002 (aka: Jianzhong (Charlie) Zhang, Jianzhong Charlie Zhang, Charlie Jianzhong Zhang, Charlie Zhang 0002) — Samsung Research America, Plano, TX, USA (and 2 more)
- Jianzhong Zhang 0004 — Iowa State University
- Jianzhong Zhang 0005 (aka: Jian-Zhong Zhang 0005) — Shaanxi Normal University, School of Mathematics and Statistics, China
- Jianzhong Zhang 0006 — Southeast University, Nanjing
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c41]Zhe Sun, Zongwen Yang, Zhongyu Huang, Yu Zhang, Jianzhong Zhang:
Interesting Near-boundary Data: Inferring Model Ownership for DNNs. IJCNN 2023: 1-8 - 2022
- [j4]Song Chen, Jing-Hao Xue, Jianlong Chang, Jianzhong Zhang, Jufeng Yang, Qi Tian:
SSL++: Improving Self-Supervised Learning by Mitigating the Proxy Task-Specificity Problem. IEEE Trans. Image Process. 31: 1134-1148 (2022) - 2021
- [j3]Yu Zhang, Yani Ge, Peiran Yu, Jianzhong Zhang, Yongzheng Zhang, Thar Baker:
A Novel Method to Prevent Misconfigurations of Industrial Automation and Control Systems. IEEE Trans. Ind. Informatics 17(6): 4210-4218 (2021) - [c40]Wenping Yu, Jianzhong Zhang, Junyu Cai, Jingdong Xu:
A Novel iBeacon Deployment Scheme for Indoor Pedestrian Positioning. ICPADS 2021: 8-17 - [c39]Jiachao Zhang, Peiran Yu, Le Qi, Song Liu, Haiyu Zhang, Jianzhong Zhang:
FLDDoS: DDoS Attack Detection Model based on Federated Learning. TrustCom 2021: 635-642 - 2020
- [j2]Changhai Wang, Bo Wang, Hui Liang, Jianzhong Zhang, Wanwei Huang, Wangwei Zhang:
W-Trans: A Weighted Transition Matrix Learning Algorithm for the Sensor-Based Human Activity Recognition. IEEE Access 8: 72870-72880 (2020)
2010 – 2019
- 2019
- [c38]Rongkang Wang, Jianzhong Zhang, Yu Zhang, Mingxin Yin, Jingdong Xu:
A Real-Time Identification System for VoIP Traffic in Large-Scale Networks. HPCC/SmartCity/DSS 2019: 646-653 - [c37]Yu Zhang, Shiman Zhao, Jianzhong Zhang:
RTMA: Real Time Mining Algorithm for Multi-Step Attack Scenarios Reconstruction. HPCC/SmartCity/DSS 2019: 2103-2110 - [c36]Mengyao Sun, Lingjun Pu, Jianzhong Zhang, Jingdong Xu:
Matryoshka: Joint Resource Scheduling for Cost-Efficient MEC in NGFI-Based C-RAN. ICC 2019: 1-7 - [c35]Yu Zhang, Shiman Zhao, Jianzhong Zhang, Xiaowei Ma, Feilong Huang:
STNN: A Novel TLS/SSL Encrypted Traffic Classification System Based on Stereo Transform Neural Network. ICPADS 2019: 907-910 - [c34]Feilong Huang, Jianzhong Zhang, Jingdong Xu, Yiran Shao, Lingjun Pu:
An SDN-Based QoS Guaranteed Mechanism for Geospatial Flows. ISPA/BDCloud/SocialCom/SustainCom 2019: 1394-1401 - 2018
- [c33]Jianzhong Zhang, Jingjing Wang, Yu Zhang, Jingdong Xu, Huan Wu:
A Novel SPITters Detection Approach with Unsupervised Density-Based Clustering. DMBD 2018: 314-324 - [c32]Wenping Yu, Jianzhong Zhang, Jingdong Xu, Yuwei Xu:
Motion Trajectory Sequence-Based Map Matching Assisted Indoor Autonomous Mobile Robot Positioning. ICA3PP (3) 2018: 327-341 - [c31]Yu Zhang, Yufei Jin, Jianzhong Zhang, Huan Wu, Xueqiang Zou:
RFGRU: A Novel Approach for Mobile Application Traffic Identification. ICA3PP (2) 2018: 491-506 - [c30]Ningjia Fu, Yuwei Xu, Jianzhong Zhang, Rongkang Wang, Jingdong Xu:
FlowCop: Detecting "Stranger" in Network Traffic Classification. ICCCN 2018: 1-9 - [c29]Yu Zhang, Huan Wu, Jianzhong Zhang, Jingjing Wang, Xueqiang Zou:
TW-FCM: An Improved Fuzzy-C-Means Algorithm for SPIT Detection. ICCCN 2018: 1-9 - [c28]Siyan Yao, Yuwei Xu, Shuai Tong, Jianzhong Zhang, Jingdong Xu:
N-Guide: Achieving Efficient Named Data Transmission in Smart Buildings. WASA 2018: 580-592 - [c27]Bowen Yu, Lingjun Pu, Qinyi Xie, Jingdong Xu, Jianzhong Zhang:
U-MEC: Energy-Efficient Mobile Edge Computing for IoT Applications in Ultra Dense Networks. WASA 2018: 622-634 - 2017
- [c26]Ningjia Fu, Jianzhong Zhang, Wenping Yu, Changhai Wang:
Crowdsourcing-based wifi fingerprint update for indoor localization. ACM TUR-C 2017: 34:1-34:9 - [c25]Wenping Yu, Yuwei Xu, Jianzhong Zhang, Chao Ma, Jingdong Xu:
A Smartphone-Based Online Pedestrian Positioning Approach for Both Structured and Open Indoor Spaces. ISPA/IUCC 2017: 1194-1198 - 2016
- [c24]Changhai Wang, Yuwei Xu, Jianzhong Zhang, Wenping Yu:
COPO: A Novel Position-Adaptive Method for Smartphone-Based Human Activity Recognition. APSCC 2016: 1-14 - [c23]Zhengyang Chen, Bowen Yu, Yu Zhang, Jianzhong Zhang, Jingdong Xu:
Automatic Mobile Application Traffic Identification by Convolutional Neural Networks. Trustcom/BigDataSE/ISPA 2016: 301-307 - [c22]Changhai Wang, Meng Li, Jianzhong Zhang, Yuwei Xu:
A Model with Hierarchical Classifiers for Activity Recognition on Mobile Devices. Trustcom/BigDataSE/ISPA 2016: 1295-1301 - [c21]Changhai Wang, Yuwei Xu, Jianzhong Zhang, Wenping Yu:
SW-HMM: A Method for Evaluating Confidence of Smartphone-Based Activity Recognition. Trustcom/BigDataSE/ISPA 2016: 2086-2091 - [c20]Yanbin Guo, Jianzhong Zhang, Yu Zhang:
An Algorithm for Analyzing the City Residents' Activity Information through Mobile Big Data Mining. Trustcom/BigDataSE/ISPA 2016: 2133-2138 - [c19]Zhengyang Chen, Renjie Chen, Yu Zhang, Jianzhong Zhang, Jingdong Xu:
A Statistical-Feature ML Approach to IP Traffic Classification Based on CUDA. Trustcom/BigDataSE/ISPA 2016: 2235-2239 - 2014
- [j1]Yu Zhang, Yue Sun, Jianzhong Zhang, Jingdong Xu, Ying Wu:
An efficient framework for parallel and continuous frequent item monitoring. Concurr. Comput. Pract. Exp. 26(18): 2856-2879 (2014) - [c18]Renjie Chen, Yu Zhang, Jianzhong Zhang, Jingdong Xu:
Design and Optimizations of the MD5 Crypt Cracking Algorithm Based on CUDA. CloudComp 2014: 155-164 - [c17]Yangda Zhu, Changhai Wang, Jianzhong Zhang, Jingdong Xu:
Human Activity Recognition Based on Similarity. CSE 2014: 1382-1387 - [c16]Yuan Yuan, Changhai Wang, Jianzhong Zhang, Jingdong Xu, Meng Li:
An Ensemble Approach for Activity Recognition with Accelerometer in Mobile-Phone. CSE 2014: 1469-1474 - [c15]Changhai Wang, Jianzhong Zhang, Meng Li, Yuan Yuan, Yuwei Xu:
A Smartphone Location Independent Activity Recognition Method Based on the Angle Feature. ICA3PP (1) 2014: 179-191 - [c14]Shiwei Ran, Jinzhi Lin, Ying Wu, Jianzhong Zhang, Yuwei Xu:
Converting Ptolemy II Models to SpaceEx for Applied Verification. ICA3PP (1) 2014: 669-683 - [c13]Anhua Lin, Jianzhong Zhang, Kai Lu, Wen Zhang:
An efficient outdoor localization method for smartphones. ICCCN 2014: 1-8 - 2013
- [c12]Lingjun Pu, Jingdong Xu, Xing Jin, Jianzhong Zhang:
SmartVirtCloud: Virtual cloud assisted application offloading execution at mobile devices' discretion. WCNC 2013: 4398-4403 - 2012
- [c11]Anhua Lin, Jianzhong Zhang, Yu Zhang, Zhicheng Wang, Gang Yu:
An Efficient Mechanism for Querying Offline Map Database on Smartphones. CIT 2012: 76-81 - [c10]Lingjun Pu, Jingdong Xu, Xing Jin, Ying Wu, Jianzhong Zhang:
Measurements Study on the I/O Performance of Virtualized Cloud System. NAS 2012: 298-302 - 2010
- [c9]Jianzhong Zhang, Kai Pan, Yuntao Yu, Jingdong Xu:
iCTPH: An Approach to Publish and Lookup CTPH Digests in Chord. ICA3PP (2) 2010: 244-253
2000 – 2009
- 2009
- [c8]Jianzhong Zhang, Tianyan Zhang, Xiaofeng Lan, Jingdong Xu:
An Aggregation-Based Raw Reputation Generation Approach. NAS 2009: 109-113 - 2008
- [c7]Jianzhong Zhang, Hongbo Lu, Xiaofeng Lan, Dafan Dong:
DHTnil: An Approach to Publish and Lookup Nilsimsa Digests in DHT. HPCC 2008: 213-218 - [c6]Dafan Dong, Jianzhong Zhang, Ying Wu, Hongbo Lu, Gongyi Wu:
A Spam Filter System Based on P2P Architecture. NAS 2008: 155-156 - 2006
- [c5]Qi Zhao, Yun He, Jianzhong Zhang:
A Hybrid Approach for Overlay Multicast. IMSCCS (1) 2006: 496-502 - 2005
- [c4]Yun He, Jianzhong Zhang, Xiaoguang Niu, Qi Zhao:
Search and index in locality-based clustering overlay. CCGRID 2005: 229-236 - [c3]Hailan Yang, Gongyi Wu, Jianzhong Zhang:
On-Demand Resource Allocation for Service Level Guarantee in Grid Environment. GCC 2005: 678-689 - [c2]Bo Yang, Yunhao Chen, Jing Li, Adu Gong, Claudia Künzer, Jianzhong Zhang:
Simple normalization of multi-temporal thermal ir data and applied research on the monitoring of typical coal fires in Northern China. IGARSS 2005: 5725-5728 - [c1]Yun He, Qi Zhao, Jianzhong Zhang, Gongyi Wu:
Topology-Aware Multi-cluster Architecture Based on Efficient Index Techniques. NPC 2005: 163-171
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 22:23 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint