default search action
Zonghua Zhang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j70]Haichao Liu, Zhaozong Meng, Jingren Xu, Chenxi Li, Zhen Li, Nan Gao, Zonghua Zhang:
Simultaneous Detection of the Orientation and Position of Moving Objects With Simple RFID Array for Industrial IoT Applications. IEEE Internet Things J. 11(17): 28752-28764 (2024) - [j69]Zeqing Yang, Beibei Liu, Yanrui Zhang, Yingshu Chen, Hongwei Zhao, Guofeng Zhang, Wei Yi, Zonghua Zhang:
Intelligent Sensing of Thermal Error of CNC Machine Tool Spindle Based on Multi-Source Information Fusion. Sensors 24(11): 3614 (2024) - [j68]Shiqiang Wang, Hailong Qu, Zhaozong Meng, Nan Gao, Zonghua Zhang:
Intrinsic Parameters Calibration of Multibeam LiDAR by Particle Swarm Optimization Algorithm. IEEE Trans. Instrum. Meas. 73: 1-11 (2024) - [j67]Jian Wang, Guanyu Zhang, Wei Guo, Jun Zhang, Zonghua Zhang, Liangzhou Chen, Tukun Li, Xiangqian Jiang:
"3-2-1" PMP: Adding an Extra Pattern to Dual-Band Phase Shift Profilometry for Higher Precision 3-D Imaging. IEEE Trans. Instrum. Meas. 73: 1-14 (2024) - [c58]Romain Ilbert, Thai V. Hoang, Zonghua Zhang:
Data Augmentation for Multivariate Time Series Classification: An Experimental Study. ICDEW 2024: 128-139 - [i7]Romain Ilbert, Thai V. Hoang, Zonghua Zhang:
Data Augmentation for Multivariate Time Series Classification: An Experimental Study. CoRR abs/2406.06518 (2024) - 2023
- [j66]Hongpeng Li, Haichao Liu, Zhen Li, Chenxi Li, Zhaozong Meng, Nan Gao, Zonghua Zhang:
Adaptive Threshold-Based ZUPT for Single IMU-Enabled Wearable Pedestrian Localization. IEEE Internet Things J. 10(13): 11749-11760 (2023) - [j65]Celimuge Wu, Kok-Lim Alvin Yau, Zonghua Zhang, Damla Turgut, Shiwen Mao:
Guest Editorial Special Issue on Collaborative Intelligence for Green Internet of Things in the 6G Era. IEEE Trans. Green Commun. Netw. 7(2): 855-856 (2023) - [j64]Mohammed Lamine Bouchouia, Houda Labiod, Ons Jelassi, Jean-Philippe Monteuuis, Wafa Ben Jaballah, Jonathan Petit, Zonghua Zhang:
A survey on misbehavior detection for connected and autonomous vehicles. Veh. Commun. 41: 100586 (2023) - [c57]Romain Ilbert, Thai V. Hoang, Zonghua Zhang, Themis Palpanas:
Breaking Boundaries: Balancing Performance and Robustness in Deep Wireless Traffic Forecasting. ARTMAN@CCS 2023: 17-28 - [c56]Gregory Blanc, Takeshi Takahashi, Zonghua Zhang:
ARTMAN '23: First Workshop on Recent Advances in Resilient and Trustworthy ML Systems in Autonomous Networks. CCS 2023: 3662-3663 - [c55]Mohamed El Amine Sehili, Zonghua Zhang:
Multivariate Time Series Anomaly Detection: Fancy Algorithms and Flawed Evaluation Methodology. TPCTC 2023: 1-17 - [e2]Gregory Blanc, Takeshi Takahashi, Zonghua Zhang:
Proceedings of the 2023 Workshop on Recent Advances in Resilient and Trustworthy ML Systems in Autonomous Networks, ARTMAN 2023, Copenhagen, Denmark, 30 November 2023. ACM 2023 [contents] - [i6]Minh-Thanh Bui, Duc-Thinh Ngo, Demin Lu, Zonghua Zhang:
A Generic Approach to Integrating Time into Spatial-Temporal Forecasting via Conditional Neural Fields. CoRR abs/2305.06827 (2023) - [i5]Nhat-Minh Dao, Thai V. Hoang, Zonghua Zhang:
A Benchmarking Study of Matching Algorithms for Knowledge Graph Entity Alignment. CoRR abs/2308.03961 (2023) - [i4]Mohamed El Amine Sehili, Zonghua Zhang:
Multivariate Time Series Anomaly Detection: Fancy Algorithms and Flawed Evaluation Methodology. CoRR abs/2308.13068 (2023) - [i3]Romain Ilbert, Thai V. Hoang, Zonghua Zhang, Themis Palpanas:
Breaking Boundaries: Balancing Performance and Robustness in Deep Wireless Traffic Forecasting. CoRR abs/2311.09790 (2023) - 2022
- [j63]Yanjun Xiao, Shuhan Deng, Furong Han, Xiaoliang Wang, Zonghua Zhang, Kai Peng:
A Model-Data-Fusion Pole Piece Thickness Prediction Method With Multisensor Fusion for Lithium Battery Rolling Machine. IEEE Access 10: 55034-55050 (2022) - [j62]Gregory Blanc, Yang Liu, Rongxing Lu, Takeshi Takahashi, Zonghua Zhang:
Interactions between artificial intelligence and cybersecurity to protect future networks. Ann. des Télécommunications 77(11-12): 727-729 (2022) - [j61]Fabien Charmet, Harry Chandra Tanuwidjaja, Solayman Ayoubi, Pierre-François Gimenez, Yufei Han, Houda Jmila, Gregory Blanc, Takeshi Takahashi, Zonghua Zhang:
Explainable artificial intelligence for cybersecurity: a literature survey. Ann. des Télécommunications 77(11-12): 789-812 (2022) - [j60]Peng Liu, Zonghua Zhang, Zhaozong Meng, Nan Gao, Chao Wang:
PDR-Net: Progressive depth reconstruction network for color guided depth map super-resolution. Neurocomputing 479: 75-88 (2022) - [j59]Chao Chen, Ya Kong, Huaiwen Wang, Zonghua Zhang:
A High-Accuracy Calibration Method for a Telecentric Structured Light System. Sensors 22(17): 6370 (2022) - [j58]Yuzhuo Zhang, Yaqin Sun, Nan Gao, Zhaozong Meng, Zonghua Zhang:
Phase Target-Based Calibration of Projector Radial Chromatic Aberration for Color Fringe 3D Measurement Systems. Sensors 22(18): 6845 (2022) - [j57]Peng Liu, Zonghua Zhang, Zhaozong Meng, Nan Gao:
Deformable Enhancement and Adaptive Fusion for Depth Map Super-Resolution. IEEE Signal Process. Lett. 29: 204-208 (2022) - [i2]Hamza Bodor, Thai V. Hoang, Zonghua Zhang:
Little Help Makes a Big Difference: Leveraging Active Learning to Improve Unsupervised Time Series Anomaly Detection. CoRR abs/2201.10323 (2022) - 2021
- [j56]Zhaozong Meng, Yirou Liu, Nan Gao, Zonghua Zhang, Zhipeng Wu, John Gray:
Radio Frequency Identification and Sensing: Integration of Wireless Powering, Sensing, and Communication for IIoT Innovations. IEEE Commun. Mag. 59(3): 38-44 (2021) - [j55]Yanjun Xiao, Zhenpeng Zhang, Zhenhao Liu, Zonghua Zhang, Wei Zhou, Weiling Liu:
Research on integral separation control of warp tension based on fuzzy parameter optimization. J. Intell. Fuzzy Syst. 41(2): 3031-3044 (2021) - [j54]Peng Liu, Zonghua Zhang, Zhaozong Meng, Nan Gao:
Monocular Depth Estimation with Joint Attention Feature Distillation and Wavelet-Based Loss Function. Sensors 21(1): 54 (2021) - [j53]Arie Haenel, Yoram Haddad, Maryline Laurent, Zonghua Zhang:
Practical Cross-Layer Radio Frequency-Based Authentication Scheme for Internet of Things. Sensors 21(12): 4034 (2021) - [j52]Montida Pattaranantakul, Ruan He, Zonghua Zhang, Ahmed Meddahi, Ping Wang:
Leveraging Network Functions Virtualization Orchestrators to Achieve Software-Defined Access Control in the Clouds. IEEE Trans. Dependable Secur. Comput. 18(1): 372-383 (2021) - [j51]Jian Wang, Zonghua Zhang, Richard K. Leach, Wenlong Lu, Jianfeng Xu:
Predistorting Projected Fringes for High-Accuracy 3-D Phase Mapping in Fringe Projection Profilometry. IEEE Trans. Instrum. Meas. 70: 1-9 (2021) - [j50]Montida Pattaranantakul, Qipeng Song, Yanmei Tian, Licheng Wang, Zonghua Zhang, Ahmed Meddahi, Chalee Vorakulpipat:
On Achieving Trustworthy Service Function Chaining. IEEE Trans. Netw. Serv. Manag. 18(3): 3140-3153 (2021) - [c54]Hanan Mustapha, Soufiene Djahel, Philip Perry, Zonghua Zhang:
Rethinking Deep Packet Inspection Design and Deployment in the era of SDN and NFV. HPCC/DSS/SmartCity/DependSys 2021: 1505-1514 - [c53]Hamza Bodor, Thai V. Hoang, Zonghua Zhang:
Little Help Makes a Big Difference: Leveraging Active Learning to Improve Unsupervised Time Series Anomaly Detection. ICSOC Workshops 2021: 165-176 - [c52]Sixu Cai, Fen Zhou, Zonghua Zhang, Ahmed Meddahi:
Disaster-Resilient Service Function Chain Embedding Based on Multi-Path Routing. INFOCOM Workshops 2021: 1-7 - 2020
- [j49]Peng Liu, Zonghua Zhang, Zhaozong Meng, Nan Gao:
Joint Attention Mechanisms for Monocular Depth Estimation With Multi-Scale Convolutions and Adaptive Weight Adjustment. IEEE Access 8: 184437-184450 (2020) - [j48]Yanjun Xiao, Xuan Kong, Shuyu Wang, Zonghua Zhang, Yanchun Xiao:
Design and feasibility study of roots-type power machine rotor based on numerical simulation. Neural Comput. Appl. 32(1): 223-234 (2020) - [j47]Xuefei Bai, Zhaozong Meng, Nan Gao, Zonghua Zhang, David Zhang:
3D palmprint identification using blocked histogram and improved sparse representation-based classifier. Neural Comput. Appl. 32(16): 12547-12560 (2020) - [j46]Hui Zhang, Zonghua Zhang, Nan Gao, Yanjun Xiao, Zhaozong Meng, Zhen Li:
Cost-Effective Wearable Indoor Localization and Motion Analysis via the Integration of UWB and IMU. Sensors 20(2): 344 (2020) - [c51]Arie Haenel, Yoram Haddad, Zonghua Zhang:
Lightweight Authentication Scheme for Internet of Things. CCNC 2020: 1-2 - [c50]Zakirul Alam, Zonghua Zhang, Haibo Zhang:
Message from the Program Chairs CSCloud 2020 CSCloud-EdgeCom 2020. CSCloud/EdgeCom 2020: 1 - [c49]Mustafizur R. Shahid, Gregory Blanc, Houda Jmila, Zonghua Zhang, Hervé Debar:
Generative Deep Learning for Internet of Things Network Traffic Generation. PRDC 2020: 70-79 - [c48]Meng Ma, Jingmin Xu, Yuan Wang, Pengfei Chen, Zonghua Zhang, Ping Wang:
AutoMAP: Diagnose Your Microservice-based Web Applications Automatically. WWW 2020: 246-258
2010 – 2019
- 2019
- [j45]Zhe Liu, Zhaozong Meng, Nan Gao, Zonghua Zhang:
Calibration of the Relative Orientation between Multiple Depth Cameras Based on a Three-Dimensional Target. Sensors 19(13): 3008 (2019) - [j44]Lei Cui, Zonghua Zhang, Nan Gao, Zhaozong Meng, Zhen Li:
Radio Frequency Identification and Sensing Techniques and Their Applications - A Review of the State-of-the-Art. Sensors 19(18): 4012 (2019) - [j43]Caixia Chang, Zonghua Zhang, Nan Gao, Zhaozong Meng:
Measurement of the Three-Dimensional Shape of Discontinuous Specular Objects Using Infrared Phase-Measuring Deflectometry. Sensors 19(21): 4621 (2019) - [j42]Lichen Cheng, Jiqiang Liu, Guangquan Xu, Zonghua Zhang, Hao Wang, Hong-Ning Dai, Yulei Wu, Wei Wang:
SCTSC: A Semicentralized Traffic Signal Control Mode With Attribute-Based Blockchain in IoVs. IEEE Trans. Comput. Soc. Syst. 6(6): 1373-1385 (2019) - [j41]Xuefei Bai, Nan Gao, Zonghua Zhang, David Zhang:
Person Recognition Using 3-D Palmprint Data Based on Full-Field Sinusoidal Fringe Projection. IEEE Trans. Instrum. Meas. 68(9): 3287-3298 (2019) - [c47]Arie Haenel, Yoram Haddad, Zonghua Zhang:
Performance Evaluation of Sensors Lightweight Security Mechanism. MASS Workshops 2019: 176-177 - [c46]Mustafizur R. Shahid, Gregory Blanc, Zonghua Zhang, Hervé Debar:
Anomalous Communications Detection in IoT Networks Using Sparse Autoencoders. NCA 2019: 1-5 - [c45]Montida Pattaranantakul, Qipeng Song, Yanmei Tian, Licheng Wang, Zonghua Zhang, Ahmed Meddahi:
Footprints: Ensuring Trusted Service Function Chaining in the World of SDN and NFV. SecureComm (2) 2019: 287-301 - [i1]Mustafizur Rahman Shahid, Gregory Blanc, Zonghua Zhang, Hervé Debar:
Anomalous Communications Detection in IoT Networks Using Sparse Autoencoders. CoRR abs/1912.11831 (2019) - 2018
- [j40]Licheng Wang, Zonghua Zhang, Mianxiong Dong, Lihua Wang, Zhenfu Cao, Yixian Yang:
Securing Named Data Networking: Attribute-Based Encryption and Beyond. IEEE Commun. Mag. 56(11): 76-81 (2018) - [j39]Montida Pattaranantakul, Ruan He, Qipeng Song, Zonghua Zhang, Ahmed Meddahi:
NFV Security Survey: From Use Case Driven Threat Analysis to State-of-the-Art Countermeasures. IEEE Commun. Surv. Tutorials 20(4): 3330-3368 (2018) - [j38]Shujun Huang, Yue Liu, Nan Gao, Zonghua Zhang, Feng Gao, Xiangqian Jiang:
Distance Calibration between Reference Plane and Screen in Direct Phase Measuring Deflectometry. Sensors 18(1): 144 (2018) - [j37]Lun Li, Jiqiang Liu, Lichen Cheng, Shuo Qiu, Wei Wang, Xiangliang Zhang, Zonghua Zhang:
CreditCoin: A Privacy-Preserving Blockchain-Based Incentive Announcement Network for Communications of Smart Vehicles. IEEE Trans. Intell. Transp. Syst. 19(7): 2204-2220 (2018) - [j36]Hua Wang, Zonghua Zhang, Tarek Taleb:
Editorial: Special Issue on Security and Privacy of IoT. World Wide Web 21(1): 1-6 (2018) - [j35]Yang Liu, Chaoshun Zuo, Zonghua Zhang, Shanqing Guo, Xin-Shun Xu:
An automatically vetting mechanism for SSL error-handling vulnerability in android hybrid Web apps. World Wide Web 21(1): 127-150 (2018) - [c44]Mustafizur R. Shahid, Gregory Blanc, Zonghua Zhang, Hervé Debar:
IoT Devices Recognition Through Network Traffic Analysis. IEEE BigData 2018: 5187-5192 - [c43]Mengdi Liu, Guangquan Xu, Jun Zhang, Rajan Shankaran, Gang Luo, Xi Zheng, Zonghua Zhang:
Roundtable Gossip Algorithm: A Novel Sparse Trust Mining Method for Large-Scale Recommendation Systems. ICA3PP (4) 2018: 495-510 - [e1]David Naccache, Shouhuai Xu, Sihan Qing, Pierangela Samarati, Gregory Blanc, Rongxing Lu, Zonghua Zhang, Ahmed Meddahi:
Information and Communications Security - 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings. Lecture Notes in Computer Science 11149, Springer 2018, ISBN 978-3-030-01949-5 [contents] - 2017
- [j34]Rishikesh Sahay, Gregory Blanc, Zonghua Zhang, Hervé Debar:
ArOMA: An SDN based autonomic DDoS mitigation framework. Comput. Secur. 70: 482-499 (2017) - [j33]Hao Hu, Rongxing Lu, Zonghua Zhang:
TPSQ: Trust-based platoon service query via vehicular communications. Peer-to-Peer Netw. Appl. 10(1): 262-277 (2017) - [j32]Hao Hu, Rongxing Lu, Cheng Huang, Zonghua Zhang:
PTRS: A privacy-preserving trust-based relay selection scheme in VANETs. Peer-to-Peer Netw. Appl. 10(5): 1204-1218 (2017) - [j31]Xuefei Bai, Nan Gao, Zonghua Zhang, David Zhang:
3D palmprint identification combining blocked ST and PCA. Pattern Recognit. Lett. 100: 89-95 (2017) - [j30]Xiaohong Liu, Shujun Huang, Zonghua Zhang, Feng Gao, Xiangqian Jiang:
Full-Field Calibration of Color Camera Chromatic Aberration using Absolute Phase Maps. Sensors 17(5): 1048 (2017) - [j29]Yongjia Xu, Feng Gao, Hongyu Ren, Zonghua Zhang, Xiangqian Jiang:
An Iterative Distortion Compensation Algorithm for Camera Calibration Based on Phase Target. Sensors 17(6): 1188 (2017) - [j28]Zonghua Zhang, Yuemin Wang, Shujun Huang, Yue Liu, Caixia Chang, Feng Gao, Xiangqian Jiang:
Three-Dimensional Shape Measurements of Specular Objects Using Phase-Measuring Deflectometry. Sensors 17(12): 2835 (2017) - [j27]Hao Hu, Rongxing Lu, Zonghua Zhang, Jun Shao:
REPLACE: A Reliable Trust-Based Platoon Service Recommendation Scheme in VANET. IEEE Trans. Veh. Technol. 66(2): 1786-1797 (2017) - [c42]Montida Pattaranantakul, Yuchia Tseng, Ruan He, Zonghua Zhang, Ahmed Meddahi:
A First Step Towards Security Extension for NFV Orchestrator. SDN-NFV@CODASPY 2017: 25-30 - [c41]Rishikesh Sahay, Gregory Blanc, Zonghua Zhang, Khalifa Toumi, Hervé Debar:
Adaptive Policy-driven Attack Mitigation in SDN. XDOMO@EuroSys 2017: 4:1-4:6 - [c40]Yuchia Tseng, Montida Pattaranantakul, Ruan He, Zonghua Zhang, Farid Naït-Abdesselam:
Controller DAC: Securing SDN controller with dynamic access control. ICC 2017: 1-6 - [c39]Ruan He, Montida Pattaranantakul, Zonghua Zhang, Thomas Duval:
SDAC: A New Software-Defined Access Control Paradigm for Cloud-Based Systems. ICICS 2017: 570-581 - [c38]Xiangfeng Li, Bo Zhang, Zonghua Zhang, Lili Qu, Hui Liao:
A novel MMC sub-module based on controllability theory. IECON 2017: 4829-4833 - [c37]Xiangfeng Li, Lili Qu, Bo Zhang, Hui Liao, Zonghua Zhang:
A novel topolgoy of multi-level converters using split wound coupled inductors. IECON 2017: 4834-4838 - [c36]Xiangfeng Li, Lili Qu, Bo Zhang, Hui Liao, Zonghua Zhang:
An improved multi-level converter with a novel sub-module circuit. IECON 2017: 4863-4866 - 2016
- [j26]Liwen He, Feiyi Huang, Jie Zhang, Bin Liu, Chunling Chen, Zonghua Zhang, Yang Yang, Weifeng Lu:
Dynamic Secure Interconnection for Security Enhancement in Cloud Computing. Int. J. Comput. Commun. Control 11(3): 348-357 (2016) - [j25]Hao Hu, Rongxing Lu, Cheng Huang, Zonghua Zhang:
TripSense: A Trust-Based Vehicular Platoon Crowdsensing Scheme with Privacy Preservation in VANETs. Sensors 16(6): 803 (2016) - [j24]Yingpeng Sang, Hong Shen, Hui Tian, Zonghua Zhang:
Achieving Probabilistic Anonymity in a Linear and Hybrid Randomization Model. IEEE Trans. Inf. Forensics Secur. 11(10): 2187-2202 (2016) - [j23]Shen Wang, Soufiene Djahel, Zonghua Zhang, Jennifer McManis:
Next Road Rerouting: A Multiagent System for Mitigating Unexpected Urban Traffic Congestion. IEEE Trans. Intell. Transp. Syst. 17(10): 2888-2899 (2016) - [c35]Jing Li, Licheng Wang, Zonghua Zhang, Xinxin Niu:
Novel Constructions of Cramer-Shoup Like Cryptosystems Based on Index Exchangeable Family. AsiaCCS 2016: 895-900 - [c34]Yuchia Tseng, Zonghua Zhang, Farid Naït-Abdesselam:
SRV: Switch-based rules verification in software defined networking. NetSoft 2016: 477-482 - [c33]Yuchia Tseng, Zonghua Zhang, Farid Naït-Abdesselam:
ControllerSEPA: A Security-Enhancing SDN Controller Plug-in for OpenFlow Applications. PDCAT 2016: 268-273 - [c32]Montida Pattaranantakul, Ruan He, Ahmed Meddahi, Zonghua Zhang:
SecMANO: Towards Network Functions Virtualization (NFV) Based Security MANagement and Orchestration. Trustcom/BigDataSE/ISPA 2016: 598-605 - 2015
- [j22]Changhoon Yoon, Taejune Park, Seungsoo Lee, Heedo Kang, Seungwon Shin, Zonghua Zhang:
Enabling security functions with SDN: A feasibility study. Comput. Networks 85: 19-35 (2015) - [j21]Shuzhen Wang, Zonghua Zhang, Farid Naït-Abdesselam:
Towards cross-layer approaches to coping with misbehavior in mobile ad hoc networks: an anatomy of reputation systems. Secur. Commun. Networks 8(2): 232-244 (2015) - [j20]Intesab Hussain, Soufiene Djahel, Zonghua Zhang, Farid Naït-Abdesselam:
A comprehensive study of flooding attack consequences and countermeasures in Session Initiation Protocol (SIP). Secur. Commun. Networks 8(18): 4436-4451 (2015) - [j19]Miao Liu, Changku Sun, Shujun Huang, Zonghua Zhang:
An Accurate Projector Calibration Method Based on Polynomial Distortion Representation. Sensors 15(10): 26567-26582 (2015) - [c31]Paul-Edmond Berthier, Stéphane Cauchie, Zonghua Zhang:
Secure PUFs-Based Cipher Suite for Enabling TLS to Authenticate Hardware Devices. AsiaCCS 2015: 675 - [c30]Hao Hu, Rongxing Lu, Zonghua Zhang:
VTrust: A Robust Trust Framework for Relay Selection in Hybrid Vehicular Communications. GLOBECOM 2015: 1-6 - [c29]An Wan, Jing Xu, Song Zhang, Zonghua Zhang, Ken Chen:
Learning optimal measurement and control of assembly robot for large-scale heavy-weight parts. ROBIO 2015: 1240-1246 - [c28]An Wan, Jing Xu, Zonghua Zhang, Ken Chen:
A new survey adjustment method for laser tracker relocation. ROBIO 2015: 2383-2388 - 2014
- [j18]Jingwei Liu, Zonghua Zhang, Xiaofeng Chen, Kyung Sup Kwak:
Certificateless Remote Anonymous Authentication Schemes for WirelessBody Area Networks. IEEE Trans. Parallel Distributed Syst. 25(2): 332-342 (2014) - [c27]Sawand M. Ajmal, Stefano Paris, Zonghua Zhang, Farid Naït-Abdesselam:
An Efficient Admission Control Algorithm for Virtual Sensor Networks. HPCC/CSS/ICESS 2014: 735-742 - [c26]Ajmal Sawand, Soufiene Djahel, Zonghua Zhang, Farid Naït-Abdesselam:
Multidisciplinary approaches to achieving efficient and trustworthy eHealth monitoring systems. ICCC 2014: 187-192 - 2013
- [j17]Shuzhen Wang, Zonghua Zhang, Youki Kadobayashi:
Exploring attack graph for cost-benefit security hardening: A probabilistic approach. Comput. Secur. 32: 158-169 (2013) - [c25]Yingpeng Sang, Hong Shen, Hui Tian, Zonghua Zhang:
Achieving Probabilistic Anonymity Against One-to-Multiple Linkage Attacks. ICEBE 2013: 176-183 - 2012
- [j16]Mourad Amad, Ahmed Meddahi, Djamil Aïssani, Zonghua Zhang:
HPM: A novel hierarchical Peer-to-Peer model for lookup acceleration with provision of physical proximity. J. Netw. Comput. Appl. 35(6): 1818-1830 (2012) - [j15]Soufiene Djahel, Zonghua Zhang, Farid Naït-Abdesselam, John Murphy:
Fast and Efficient Countermeasure for MAC Layer Misbehavior in MANETs. IEEE Wirel. Commun. Lett. 1(5): 540-543 (2012) - [c24]Zonghua Zhang, Shuzhen Wang:
Boosting Logical Attack Graph for Efficient Security Control. ARES 2012: 218-223 - [c23]Jingwei Liu, Zonghua Zhang, Rong Sun, Kyung Sup Kwak:
Certificateless Partially Blind Signature. AINA Workshops 2012: 128-133 - [c22]Jingwei Liu, Zonghua Zhang, Rong Sun, Kyung Sup Kwak:
An efficient certificateless remote anonymous authentication scheme for wireless body area networks. ICC 2012: 3404-3408 - 2011
- [j14]Zonghua Zhang, Farid Naït-Abdesselam, Pin-Han Ho, Youki Kadobayashi:
Toward cost-sensitive self-optimizing anomaly detection and response in autonomic networks. Comput. Secur. 30(6-7): 525-537 (2011) - [j13]Soufiene Djahel, Farid Naït-Abdesselam, Zonghua Zhang:
Mitigating Packet Dropping Problem in Mobile Ad Hoc Networks: Proposals and Challenges. IEEE Commun. Surv. Tutorials 13(4): 658-672 (2011) - [j12]Licheng Wang, Lihua Wang, Yun Pan, Zonghua Zhang, Yixian Yang:
Discrete logarithm based additively homomorphic encryption and secure data aggregation. Inf. Sci. 181(16): 3308-3322 (2011) - [c21]Huaqun Guo, Fan Yu, Zonghua Zhang, Wai-Choong Wong, Maode Ma, Yongdong Wu:
HASVC: An Efficient Hybrid Authentication Scheme for Vehicular Communication. ICC 2011: 1-5 - [c20]Tao Ban, Shanqing Guo, Zonghua Zhang, Ruo Ando, Youki Kadobayashi:
Practical network traffic analysis in P2P environment. IWCMC 2011: 1801-1807 - 2010
- [j11]Zonghua Zhang, Pin-Han Ho, Farid Naït-Abdesselam:
RADAR: A reputation-driven anomaly detection system for wireless mesh networks. Wirel. Networks 16(8): 2221-2236 (2010) - [c19]Juan Li, Zonghua Zhang, Weiyi Zhang:
MobiTrust: Trust Management System in Mobile Social Computing. CIT 2010: 954-959 - [c18]Zonghua Zhang, Jingwei Liu, Youki Kadobayashi:
STARS: A Simple and Efficient Scheme for Providing Transparent Traceability and Anonymity to Reputation Systems. DPM/SETOP 2010: 170-187
2000 – 2009
- 2009
- [j10]Zonghua Zhang, Pin-Han Ho, Liwen He:
Measuring IDS-estimated attack impacts for rational incident response: A decision theoretic approach. Comput. Secur. 28(7): 605-614 (2009) - [j9]Zonghua Zhang, Pin-Han Ho:
Janus: A dual-purpose analytical model for understanding, characterizing and countermining multi-stage collusive attacks in enterprise networks. J. Netw. Comput. Appl. 32(3): 710-720 (2009) - [j8]Zonghua Zhang, Hong Shen:
M-AID: An adaptive middleware built upon anomaly detectors for intrusion detection and rational response. ACM Trans. Auton. Adapt. Syst. 4(4): 24:1-24:35 (2009) - [c17]Ruo Ando, Zonghua Zhang, Youki Kadobayashi, Yoichi Shinoda:
A Dynamic Protection System of Web Server in Virtual Cluster Using Live Migration. DASC 2009: 95-102 - [c16]Zonghua Zhang, Pin-Han Ho, Farid Naït-Abdesselam:
On Achieving Cost-Sensitive Anomaly Detection and Response in Mobile Ad Hoc Networks. ICC 2009: 1-5 - [c15]Licheng Wang, Lihua Wang, Yun Pan, Zonghua Zhang, Yixian Yang:
Discrete-Log-Based Additively Homomorphic Encryption and Secure WSN Data Aggregation. ICICS 2009: 493-502 - 2008
- [j7]Pin-Han Ho, Zonghua Zhang, Rongxing Lu:
Special Issue on "Security and Privacy Preservation in Vehicular Communications" Wiley's Security and Communication Networks Journal. Secur. Commun. Networks 1(3): 191-193 (2008) - [j6]Soufiene Djahel, Farid Naït-Abdesselam, Zonghua Zhang, Ashfaq A. Khokhar:
Defending against packet dropping attack in vehicular ad hoc networks. Secur. Commun. Networks 1(3): 245-258 (2008) - [c14]Zonghua Zhang, Farid Naït-Abdesselam, Pin-Han Ho:
Boosting Markov Reward Models for Probabilistic Security Evaluation by Characterizing Behaviors of Attacker and Defender. ARES 2008: 352-359 - [c13]Zonghua Zhang, Ruo Ando, Youki Kadobayashi:
Hardening Botnet by a Rational Botmaster. Inscrypt 2008: 348-369 - [c12]Haibo Zhang, Hong Shen, Yawen Chen, Zonghua Zhang:
Balancing energy consumption for uniform data gathering wireless sensor networks. PODC 2008: 436 - [c11]Zonghua Zhang, Farid Naït-Abdesselam, Xiaodong Lin, Pin-Han Ho:
A model-based semi-quantitative approach for evaluating security of enterprise networks. SAC 2008: 1069-1074 - [c10]Zonghua Zhang, Farid Naït-Abdesselam, Pin-Han Ho, Xiaodong Lin:
RADAR: A ReputAtion-Based Scheme for Detecting Anomalous Nodes in WiReless Mesh Networks. WCNC 2008: 2621-2626 - 2007
- [j5]Zonghua Zhang, Hong Shen:
Constructing a Multilayered Boundary to Defend against Intrusive Anomalies. IEICE Trans. Inf. Syst. 90-D(2): 490-499 (2007) - [j4]Zonghua Zhang, Hong Shen, Yingpeng Sang:
An Observation-Centric Analysis on the Modeling of Anomaly-based Intrusion Detection. Int. J. Netw. Secur. 4(3): 292-305 (2007) - [j3]Zonghua Zhang, Nikolaus F. Troje:
3D Periodic Human Motion Reconstruction from 2D Motion Sequences. Neural Comput. 19(5): 1400-1421 (2007) - 2006
- [c9]Zonghua Zhang, Pin-Han Ho, Xiaodong Lin, Hong Shen:
Janus: A Two-Sided Analytical Model for Multi-Stage Coordinated Attacks. ICISC 2006: 136-154 - 2005
- [j2]Zonghua Zhang, Hong Shen:
Application of online-training SVMs for real-time intrusion detection with different considerations. Comput. Commun. 28(12): 1428-1442 (2005) - [j1]Zonghua Zhang, Nikolaus F. Troje:
View-independent person identification from human gait. Neurocomputing 69(1-3): 250-256 (2005) - [c8]Zonghua Zhang, Hong Shen:
Constructing Multi-Layered Boundary to Defend Against Intrusive Anomalies: An Autonomic Detection Coordinator. DSN 2005: 118-127 - [c7]Zonghua Zhang, Hong Shen:
Dynamic Combination of Multiple Host-Based Anomaly Detectors with Broader Detection Coverage and Fewer False Alerts. ICN (2) 2005: 989-996 - [c6]Zonghua Zhang, Hong Shen:
A Brief Observation-Centric Analysis on Anomaly-Based Intrusion Detection. ISPEC 2005: 178-191 - [c5]Yingpeng Sang, Hong Shen, Zonghua Zhang:
An Efficient Protocol for the Problem of Secure Two-party Vector Dominance. PDCAT 2005: 488-492 - [c4]Zonghua Zhang, Hong Shen, Xavier Défago, Yingpeng Sang:
A Brief Comparative Study on Analytical Models of Computer System Dependability and Security. PDCAT 2005: 493-497 - 2004
- [c3]Zonghua Zhang, Hong Shen:
Online Training of SVMs for Real-time Intrusion Detection. AINA (1) 2004: 568-573 - [c2]Zonghua Zhang, Nikolaus F. Troje:
3D Periodic Human Motion Reconstruction from 2D Motion Sequences. CVPR Workshops 2004: 186 - [c1]Zonghua Zhang, Hong Shen:
Suppressing False Alarms of Intrusion Detection Using Improved Text Categorization Method. EEE 2004: 163-166
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-08 02:22 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint