BibTeX records: Zhihong Tian

download as .bib file

@article{DBLP:journals/caaitrit/CongQZFGST24,
  author       = {Yue Cong and
                  Jing Qiu and
                  Kun Zhang and
                  Zhongyang Fang and
                  Chengliang Gao and
                  Shen Su and
                  Zhihong Tian},
  title        = {Ada-FFL: Adaptive computing fairness federated learning},
  journal      = {{CAAI} Trans. Intell. Technol.},
  volume       = {9},
  number       = {3},
  pages        = {573--584},
  year         = {2024},
  url          = {https://doi.org/10.1049/cit2.12232},
  doi          = {10.1049/CIT2.12232},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/caaitrit/CongQZFGST24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/LiPSSLT24,
  author       = {Mianjie Li and
                  Qihan Pei and
                  Chun Shan and
                  Shen Su and
                  Yuan Liu and
                  Zhihong Tian},
  title        = {Data tampering detection and recovery scheme based on multi-branch
                  target extraction for internet of vehicles},
  journal      = {Comput. Networks},
  volume       = {252},
  pages        = {110677},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.comnet.2024.110677},
  doi          = {10.1016/J.COMNET.2024.110677},
  timestamp    = {Sun, 08 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/LiPSSLT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcan/LiLWTGDS24,
  author       = {Mianjie Li and
                  Senfeng Lai and
                  Jiao Wang and
                  Zhihong Tian and
                  Nadra Guizani and
                  Xiaojiang Du and
                  Chun Shan},
  title        = {Analysis on unit maximum capacity of orthogonal multiple watermarking
                  for multimedia signals in {B5G} wireless communications},
  journal      = {Digit. Commun. Networks},
  volume       = {10},
  number       = {1},
  pages        = {38--44},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.dcan.2022.05.009},
  doi          = {10.1016/J.DCAN.2022.05.009},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcan/LiLWTGDS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ett/ZhangZTLQSXG24,
  author       = {Lejun Zhang and
                  Chendong Zhu and
                  Zhihong Tian and
                  Yuan Liu and
                  Jing Qiu and
                  Shen Su and
                  Guangxia Xu and
                  Ran Guo},
  title        = {{ICRB:} An improved consensus-based redactable blockchain considering
                  contextual consistency},
  journal      = {Trans. Emerg. Telecommun. Technol.},
  volume       = {35},
  number       = {1},
  year         = {2024},
  url          = {https://doi.org/10.1002/ett.4906},
  doi          = {10.1002/ETT.4906},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ett/ZhangZTLQSXG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/WangZLST24,
  author       = {Jingpei Wang and
                  Ming Zhu and
                  Mohan Li and
                  Yanbin Sun and
                  Zhihong Tian},
  title        = {An Access Control Method Against Unauthorized and Noncompliant Behaviors
                  of Real-Time Data in Industrial IoT},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {1},
  pages        = {708--727},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2023.3285992},
  doi          = {10.1109/JIOT.2023.3285992},
  timestamp    = {Fri, 09 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/WangZLST24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/LiWGLT24,
  author       = {Zhaohua Li and
                  Le Wang and
                  Zhaoquan Gu and
                  Yang Lv and
                  Zhihong Tian},
  title        = {Labels Are Culprits: Defending Gradient Attack on Privacy},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {4},
  pages        = {6007--6019},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2023.3309992},
  doi          = {10.1109/JIOT.2023.3309992},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/LiWGLT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/DongSSHLT24,
  author       = {Chongwu Dong and
                  Yanbin Sun and
                  Muhammad Shafiq and
                  Ning Hu and
                  Yuan Liu and
                  Zhihong Tian},
  title        = {Optimizing Mobility-Aware Task Offloading in Smart Healthcare for
                  Internet of Medical Things Through Multiagent Reinforcement Learning},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {8},
  pages        = {13677--13691},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2023.3338718},
  doi          = {10.1109/JIOT.2023.3338718},
  timestamp    = {Sun, 08 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/DongSSHLT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/WangQWHT24,
  author       = {Xu Wang and
                  Lingfeng Qu and
                  Hao{-}Tian Wu and
                  Yi Han and
                  Zhihong Tian},
  title        = {Reversible Image Thumbnail Preservation With High-Visual Naturalness},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {10},
  pages        = {18739--18752},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2024.3366328},
  doi          = {10.1109/JIOT.2024.3366328},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/WangQWHT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/LiuZSZDGT24,
  author       = {Yuan Liu and
                  Yanan Zhang and
                  Shen Su and
                  Lejun Zhang and
                  Xiaojiang Du and
                  Mohsen Guizani and
                  Zhihong Tian},
  title        = {BlockSC: {A} Blockchain Empowered Spatial Crowdsourcing Service in
                  Metaverse While Preserving User Location Privacy},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {42},
  number       = {4},
  pages        = {880--892},
  year         = {2024},
  url          = {https://doi.org/10.1109/JSAC.2023.3345416},
  doi          = {10.1109/JSAC.2023.3345416},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsac/LiuZSZDGT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/kbs/CongZQFZCLT24,
  author       = {Yue Cong and
                  Yuxiang Zeng and
                  Jing Qiu and
                  Zhongyang Fang and
                  Lejun Zhang and
                  Du Cheng and
                  Jia Liu and
                  Zhihong Tian},
  title        = {FedGA: {A} greedy approach to enhance federated learning with Non-IID
                  data},
  journal      = {Knowl. Based Syst.},
  volume       = {301},
  pages        = {112201},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.knosys.2024.112201},
  doi          = {10.1016/J.KNOSYS.2024.112201},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/kbs/CongZQFZCLT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pvldb/XieCCZLT24,
  author       = {Jiadong Xie and
                  Zehua Chen and
                  Deming Chu and
                  Fan Zhang and
                  Xuemin Lin and
                  Zhihong Tian},
  title        = {Influence Maximization via Vertex Countering},
  journal      = {Proc. {VLDB} Endow.},
  volume       = {17},
  number       = {6},
  pages        = {1297--1309},
  year         = {2024},
  url          = {https://www.vldb.org/pvldb/vol17/p1297-zhang.pdf},
  timestamp    = {Thu, 11 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pvldb/XieCCZLT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pvldb/LiangOZYLT24,
  author       = {Qi Liang and
                  Dian Ouyang and
                  Fan Zhang and
                  Jianye Yang and
                  Xuemin Lin and
                  Zhihong Tian},
  title        = {Efficient Regular Simple Path Queries under Transitive Restricted
                  Expressions},
  journal      = {Proc. {VLDB} Endow.},
  volume       = {17},
  number       = {7},
  pages        = {1710--1722},
  year         = {2024},
  url          = {https://www.vldb.org/pvldb/vol17/p1710-ouyang.pdf},
  timestamp    = {Mon, 29 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pvldb/LiangOZYLT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pvldb/YangFGMLT24,
  author       = {Jianye Yang and
                  Sheng Fang and
                  Zhaoquan Gu and
                  Ziyi Ma and
                  Xuemin Lin and
                  Zhihong Tian},
  title        = {TC-Match: Fast Time-constrained Continuous Subgraph Matching},
  journal      = {Proc. {VLDB} Endow.},
  volume       = {17},
  number       = {11},
  pages        = {2791--2804},
  year         = {2024},
  url          = {https://www.vldb.org/pvldb/vol17/p2791-yang.pdf},
  timestamp    = {Thu, 19 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pvldb/YangFGMLT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tce/DongSDST24,
  author       = {Chongwu Dong and
                  Muhammad Shafiq and
                  Maryam M. Al Dabel and
                  Yanbin Sun and
                  Zhihong Tian},
  title        = {{DNN} Inference Acceleration for Smart Devices in Industry 5.0 by
                  Decentralized Deep Reinforcement Learning},
  journal      = {{IEEE} Trans. Consumer Electron.},
  volume       = {70},
  number       = {1},
  pages        = {1519--1530},
  year         = {2024},
  url          = {https://doi.org/10.1109/TCE.2023.3339468},
  doi          = {10.1109/TCE.2023.3339468},
  timestamp    = {Sun, 08 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tce/DongSDST24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcss/YangHWLT24,
  author       = {Zhe{-}Rui Yang and
                  Zhen{-}Yu He and
                  Chang{-}Dong Wang and
                  Jian{-}Huang Lai and
                  Zhihong Tian},
  title        = {Collaborative Meta-Path Modeling for Explainable Recommendation},
  journal      = {{IEEE} Trans. Comput. Soc. Syst.},
  volume       = {11},
  number       = {2},
  pages        = {1805--1815},
  year         = {2024},
  url          = {https://doi.org/10.1109/TCSS.2023.3243939},
  doi          = {10.1109/TCSS.2023.3243939},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcss/YangHWLT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcss/ZhouLGQGT24,
  author       = {Ling Zhou and
                  Jianming Li and
                  Zhaoquan Gu and
                  Jing Qiu and
                  Brij B. Gupta and
                  Zhihong Tian},
  title        = {{PANNER:} POS-Aware Nested Named Entity Recognition Through Heterogeneous
                  Graph Neural Network},
  journal      = {{IEEE} Trans. Comput. Soc. Syst.},
  volume       = {11},
  number       = {4},
  pages        = {4718--4726},
  year         = {2024},
  url          = {https://doi.org/10.1109/TCSS.2022.3159366},
  doi          = {10.1109/TCSS.2022.3159366},
  timestamp    = {Sun, 08 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcss/ZhouLGQGT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcss/FangYXTTHWLT24,
  author       = {Mingqi Fang and
                  Lingyun Yu and
                  Hongtao Xie and
                  Qingfeng Tan and
                  Zhiyuan Tan and
                  Amir Hussain and
                  Zezheng Wang and
                  Jiahong Li and
                  Zhihong Tian},
  title        = {STIDNet: Identity-Aware Face Forgery Detection With Spatiotemporal
                  Knowledge Distillation},
  journal      = {{IEEE} Trans. Comput. Soc. Syst.},
  volume       = {11},
  number       = {4},
  pages        = {5354--5366},
  year         = {2024},
  url          = {https://doi.org/10.1109/TCSS.2024.3356549},
  doi          = {10.1109/TCSS.2024.3356549},
  timestamp    = {Sun, 08 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcss/FangYXTTHWLT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tetci/WuCGZHHT24,
  author       = {Hao{-}Tian Wu and
                  Xin Cao and
                  Ying Gao and
                  Kaihan Zheng and
                  Jiwu Huang and
                  Jiankun Hu and
                  Zhihong Tian},
  title        = {Fundus Image Enhancement via Semi-Supervised {GAN} and Anatomical
                  Structure Preservation},
  journal      = {{IEEE} Trans. Emerg. Top. Comput. Intell.},
  volume       = {8},
  number       = {1},
  pages        = {313--326},
  year         = {2024},
  url          = {https://doi.org/10.1109/TETCI.2023.3301337},
  doi          = {10.1109/TETCI.2023.3301337},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tetci/WuCGZHHT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tfs/CaiSSCWT24,
  author       = {Xiao Cai and
                  Kaibo Shi and
                  Yanbin Sun and
                  Jinde Cao and
                  Shiping Wen and
                  Zhihong Tian},
  title        = {Intelligent Event-Triggered Control Supervised by Mini-Batch Machine
                  Learning and Data Compression Mechanism for {T-S} Fuzzy NCSs Under
                  DoS Attacks},
  journal      = {{IEEE} Trans. Fuzzy Syst.},
  volume       = {32},
  number       = {3},
  pages        = {804--815},
  year         = {2024},
  url          = {https://doi.org/10.1109/TFUZZ.2023.3308933},
  doi          = {10.1109/TFUZZ.2023.3308933},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tfs/CaiSSCWT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WuCTLLH24,
  author       = {Hao{-}Tian Wu and
                  Yiu{-}Ming Cheung and
                  Zhihong Tian and
                  Dingcai Liu and
                  Xiangyang Luo and
                  Jiankun Hu},
  title        = {Lossless Data Hiding in {NTRU} Cryptosystem by Polynomial Encoding
                  and Modulation},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3719--3732},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3362592},
  doi          = {10.1109/TIFS.2024.3362592},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WuCTLLH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/CaiSSCWQT24,
  author       = {Xiao Cai and
                  Kaibo Shi and
                  Yanbin Sun and
                  Jinde Cao and
                  Shiping Wen and
                  Cheng Qiao and
                  Zhihong Tian},
  title        = {Stability Analysis of Networked Control Systems Under DoS Attacks
                  and Security Controller Design With Mini-Batch Machine Learning Supervision},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3857--3865},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3347889},
  doi          = {10.1109/TIFS.2023.3347889},
  timestamp    = {Sun, 08 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/CaiSSCWQT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/MeiHLLTL24,
  author       = {Yangyang Mei and
                  Weihong Han and
                  Shudong Li and
                  Kaihan Lin and
                  Zhihong Tian and
                  Shumei Li},
  title        = {A Novel Network Forensic Framework for Advanced Persistent Threat
                  Attack Attribution Through Deep Learning},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {25},
  number       = {9},
  pages        = {12131--12140},
  year         = {2024},
  url          = {https://doi.org/10.1109/TITS.2024.3360260},
  doi          = {10.1109/TITS.2024.3360260},
  timestamp    = {Fri, 20 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tits/MeiHLLTL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tiv/CaiSSST24,
  author       = {Xiao Cai and
                  Kaibo Shi and
                  Yanbin Sun and
                  YengChai Soh and
                  Zhihong Tian},
  title        = {Performance Analysis and Design of Intelligent Optimising Integral-Based
                  Event-Trigger Control for Autonomous Ground Vehicles Under DoS Attacks},
  journal      = {{IEEE} Trans. Intell. Veh.},
  volume       = {9},
  number       = {1},
  pages        = {2149--2159},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIV.2023.3317238},
  doi          = {10.1109/TIV.2023.3317238},
  timestamp    = {Sun, 08 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tiv/CaiSSST24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/ZhangGOYLT24,
  author       = {Fan Zhang and
                  Haicheng Guo and
                  Dian Ouyang and
                  Shiyu Yang and
                  Xuemin Lin and
                  Zhihong Tian},
  title        = {Size-Constrained Community Search on Large Networks: An Effective
                  and Efficient Solution},
  journal      = {{IEEE} Trans. Knowl. Data Eng.},
  volume       = {36},
  number       = {1},
  pages        = {356--371},
  year         = {2024},
  url          = {https://doi.org/10.1109/TKDE.2023.3280483},
  doi          = {10.1109/TKDE.2023.3280483},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tkde/ZhangGOYLT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/WangYGOTL24,
  author       = {Jianhua Wang and
                  Jianye Yang and
                  Zhaoquan Gu and
                  Dian Ouyang and
                  Zhihong Tian and
                  Xuemin Lin},
  title        = {Efficient Maximal Biclique Enumeration on Large Signed Bipartite Graphs},
  journal      = {{IEEE} Trans. Knowl. Data Eng.},
  volume       = {36},
  number       = {9},
  pages        = {4618--4631},
  year         = {2024},
  url          = {https://doi.org/10.1109/TKDE.2024.3373654},
  doi          = {10.1109/TKDE.2024.3373654},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tkde/WangYGOTL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnn/LinLZLZWT24,
  author       = {Xixun Lin and
                  Zhao Li and
                  Peng Zhang and
                  Luchen Liu and
                  Chuan Zhou and
                  Bin Wang and
                  Zhihong Tian},
  title        = {Structure-Aware Prototypical Neural Process for Few-Shot Graph Classification},
  journal      = {{IEEE} Trans. Neural Networks Learn. Syst.},
  volume       = {35},
  number       = {4},
  pages        = {4607--4621},
  year         = {2024},
  url          = {https://doi.org/10.1109/TNNLS.2022.3173318},
  doi          = {10.1109/TNNLS.2022.3173318},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnn/LinLZLZWT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnn/GuoZT24,
  author       = {Xiaoding Guo and
                  Lei Zhang and
                  Zhihong Tian},
  title        = {Judgment Prediction Based on Tensor Decomposition With Optimized Neural
                  Networks},
  journal      = {{IEEE} Trans. Neural Networks Learn. Syst.},
  volume       = {35},
  number       = {8},
  pages        = {11116--11127},
  year         = {2024},
  url          = {https://doi.org/10.1109/TNNLS.2023.3248275},
  doi          = {10.1109/TNNLS.2023.3248275},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnn/GuoZT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/XinLJLXLTZ24,
  author       = {Yao Xin and
                  Wenjun Li and
                  Chengjun Jia and
                  Xianfeng Li and
                  Yang Xu and
                  Bin Liu and
                  Zhihong Tian and
                  Weizhe Zhang},
  title        = {Recursive Multi-Tree Construction With Efficient Rule Sifting for
                  Packet Classification on {FPGA}},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {32},
  number       = {2},
  pages        = {1707--1722},
  year         = {2024},
  url          = {https://doi.org/10.1109/TNET.2023.3330381},
  doi          = {10.1109/TNET.2023.3330381},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ton/XinLJLXLTZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/WangCLSLDT24,
  author       = {Baocang Wang and
                  Yange Chen and
                  Furong Li and
                  Jian Song and
                  Rongxing Lu and
                  Pu Duan and
                  Zhihong Tian},
  title        = {Privacy-Preserving Convolutional Neural Network Classification Scheme
                  With Multiple Keys},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {17},
  number       = {1},
  pages        = {322--335},
  year         = {2024},
  url          = {https://doi.org/10.1109/TSC.2023.3349298},
  doi          = {10.1109/TSC.2023.3349298},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tsc/WangCLSLDT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/WenGYLTJW24,
  author       = {Xin{-}Cheng Wen and
                  Cuiyun Gao and
                  Jiaxin Ye and
                  Yichen Li and
                  Zhihong Tian and
                  Yan Jia and
                  Xuan Wang},
  title        = {Meta-Path Based Attentional Graph Learning Model for Vulnerability
                  Detection},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {50},
  number       = {3},
  pages        = {360--375},
  year         = {2024},
  url          = {https://doi.org/10.1109/TSE.2023.3340267},
  doi          = {10.1109/TSE.2023.3340267},
  timestamp    = {Tue, 27 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tse/WenGYLTJW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/vlsisp/ZhangLGWQSLXCT24,
  author       = {Lejun Zhang and
                  Yuan Li and
                  Ran Guo and
                  Guopeng Wang and
                  Jing Qiu and
                  Shen Su and
                  Yuan Liu and
                  Guangxia Xu and
                  Huiling Chen and
                  Zhihong Tian},
  title        = {A Novel Smart Contract Reentrancy Vulnerability Detection Model based
                  on BiGAS},
  journal      = {J. Signal Process. Syst.},
  volume       = {96},
  number       = {3},
  pages        = {215--237},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11265-023-01859-7},
  doi          = {10.1007/S11265-023-01859-7},
  timestamp    = {Fri, 26 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/vlsisp/ZhangLGWQSLXCT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/www/LiYJCT24,
  author       = {Yangchun Li and
                  Danfeng Yan and
                  Wei Jiang and
                  Yuanqiang Cai and
                  Zhihong Tian},
  title        = {Exploring highly concise and accurate text matching model with tiny
                  weights},
  journal      = {World Wide Web {(WWW)}},
  volume       = {27},
  number       = {4},
  pages        = {39},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11280-024-01262-7},
  doi          = {10.1007/S11280-024-01262-7},
  timestamp    = {Mon, 24 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/www/LiYJCT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaai/TangHPWSLZWT24,
  author       = {Keke Tang and
                  Xu He and
                  Weilong Peng and
                  Jianpeng Wu and
                  Yawen Shi and
                  Daizong Liu and
                  Pan Zhou and
                  Wenping Wang and
                  Zhihong Tian},
  editor       = {Michael J. Wooldridge and
                  Jennifer G. Dy and
                  Sriraam Natarajan},
  title        = {Manifold Constraints for Imperceptible Adversarial Attacks on Point
                  Clouds},
  booktitle    = {Thirty-Eighth {AAAI} Conference on Artificial Intelligence, {AAAI}
                  2024, Thirty-Sixth Conference on Innovative Applications of Artificial
                  Intelligence, {IAAI} 2024, Fourteenth Symposium on Educational Advances
                  in Artificial Intelligence, {EAAI} 2014, February 20-27, 2024, Vancouver,
                  Canada},
  pages        = {5127--5135},
  publisher    = {{AAAI} Press},
  year         = {2024},
  url          = {https://doi.org/10.1609/aaai.v38i6.28318},
  doi          = {10.1609/AAAI.V38I6.28318},
  timestamp    = {Thu, 20 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aaai/TangHPWSLZWT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icassp/TangZPFCZT24,
  author       = {Keke Tang and
                  Wenyu Zhao and
                  Weilong Peng and
                  Xiang Fang and
                  Xiaodong Cui and
                  Peican Zhu and
                  Zhihong Tian},
  title        = {Reparameterization Head for Efficient Multi-Input Networks},
  booktitle    = {{IEEE} International Conference on Acoustics, Speech and Signal Processing,
                  {ICASSP} 2024, Seoul, Republic of Korea, April 14-19, 2024},
  pages        = {6190--6194},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICASSP48485.2024.10447574},
  doi          = {10.1109/ICASSP48485.2024.10447574},
  timestamp    = {Tue, 06 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icassp/TangZPFCZT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/QiuLCCSZT23,
  author       = {Jing Qiu and
                  Yang Lin and
                  Hao Chen and
                  Du Cheng and
                  Muhammad Shafiq and
                  Lejun Zhang and
                  Zhihong Tian},
  title        = {Diverse classifiers with label dependencies for long-tail relation
                  extraction in big data},
  journal      = {Comput. Electr. Eng.},
  volume       = {110},
  pages        = {108812},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.compeleceng.2023.108812},
  doi          = {10.1016/J.COMPELECENG.2023.108812},
  timestamp    = {Tue, 26 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cee/QiuLCCSZT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cem/ZhouLSYT23,
  author       = {Haifeng Zhou and
                  Mohan Li and
                  Yanbin Sun and
                  Lei Yun and
                  Zhihong Tian},
  title        = {Digital Twin-Based Cyber Range for Industrial Internet of Things},
  journal      = {{IEEE} Consumer Electron. Mag.},
  volume       = {12},
  number       = {6},
  pages        = {66--77},
  year         = {2023},
  url          = {https://doi.org/10.1109/MCE.2022.3203202},
  doi          = {10.1109/MCE.2022.3203202},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cem/ZhouLSYT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/LiSTDG23,
  author       = {Mianjie Li and
                  Chun Shan and
                  Zhihong Tian and
                  Xiaojiang Du and
                  Mohsen Guizani},
  title        = {Adaptive Information Hiding Method Based on Feature Extraction for
                  Visible Light Communication},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {61},
  number       = {4},
  pages        = {102--106},
  year         = {2023},
  url          = {https://doi.org/10.1109/MCOM.001.2200035},
  doi          = {10.1109/MCOM.001.2200035},
  timestamp    = {Thu, 27 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/LiSTDG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/WangZGWQSLXT23,
  author       = {Zhujun Wang and
                  Lejun Zhang and
                  Ran Guo and
                  Guopeng Wang and
                  Jing Qiu and
                  Shen Su and
                  Yuan Liu and
                  Guangxia Xu and
                  Zhihong Tian},
  title        = {A covert channel over blockchain based on label tree without long
                  waiting times},
  journal      = {Comput. Networks},
  volume       = {232},
  pages        = {109843},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.comnet.2023.109843},
  doi          = {10.1016/J.COMNET.2023.109843},
  timestamp    = {Mon, 27 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/WangZGWQSLXT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijon/LiTDYSG23,
  author       = {Mianjie Li and
                  Zhihong Tian and
                  Xiaojiang Du and
                  Xiaochen Yuan and
                  Chun Shan and
                  Mohsen Guizani},
  title        = {Power normalized cepstral robust features of deep neural networks
                  in a cloud computing data privacy protection scheme},
  journal      = {Neurocomputing},
  volume       = {518},
  pages        = {165--173},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.neucom.2022.11.001},
  doi          = {10.1016/J.NEUCOM.2022.11.001},
  timestamp    = {Sun, 04 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijon/LiTDYSG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/TangSLPHZGT23,
  author       = {Keke Tang and
                  Yawen Shi and
                  Tianrui Lou and
                  Weilong Peng and
                  Xu He and
                  Peican Zhu and
                  Zhaoquan Gu and
                  Zhihong Tian},
  title        = {Rethinking Perturbation Directions for Imperceptible Adversarial Attacks
                  on Point Clouds},
  journal      = {{IEEE} Internet Things J.},
  volume       = {10},
  number       = {6, March 15},
  pages        = {5158--5169},
  year         = {2023},
  url          = {https://doi.org/10.1109/JIOT.2022.3222159},
  doi          = {10.1109/JIOT.2022.3222159},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/TangSLPHZGT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/LvSZLT23,
  author       = {Yangzixing Lv and
                  Wei Shi and
                  Weiyong Zhang and
                  Hui Lu and
                  Zhihong Tian},
  title        = {Do Not Trust the Clouds Easily: The Insecurity of Content Security
                  Policy Based on Object Storage},
  journal      = {{IEEE} Internet Things J.},
  volume       = {10},
  number       = {12},
  pages        = {10462--10470},
  year         = {2023},
  url          = {https://doi.org/10.1109/JIOT.2023.3238658},
  doi          = {10.1109/JIOT.2023.3238658},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/LvSZLT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/YuLBHWT23,
  author       = {Zhuocheng Yu and
                  Shudong Li and
                  Youming Bai and
                  Weihong Han and
                  Xiaobo Wu and
                  Zhihong Tian},
  title        = {{REMSF:} {A} Robust Ensemble Model of Malware Detection Based on Semantic
                  Feature Fusion},
  journal      = {{IEEE} Internet Things J.},
  volume       = {10},
  number       = {18},
  pages        = {16134--16143},
  year         = {2023},
  url          = {https://doi.org/10.1109/JIOT.2023.3267337},
  doi          = {10.1109/JIOT.2023.3267337},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/YuLBHWT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/QiaoBZT23,
  author       = {Cheng Qiao and
                  Kenneth N. Brown and
                  Yong Zhang and
                  Zhihong Tian},
  title        = {CWEmd: {A} Lightweight Similarity Measurement for Resource-Constrained
                  Vehicular Networks},
  journal      = {{IEEE} Internet Things J.},
  volume       = {10},
  number       = {22},
  pages        = {19655--19665},
  year         = {2023},
  url          = {https://doi.org/10.1109/JIOT.2023.3282968},
  doi          = {10.1109/JIOT.2023.3282968},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/QiaoBZT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/LiTL23,
  author       = {Songsong Li and
                  Zhihong Tian and
                  Yao Li},
  title        = {Residual long short-term memory network with multi-source and multi-frequency
                  information fusion: An application to China's stock market},
  journal      = {Inf. Sci.},
  volume       = {622},
  pages        = {133--147},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.ins.2022.11.136},
  doi          = {10.1016/J.INS.2022.11.136},
  timestamp    = {Thu, 16 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/LiTL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/kbs/LiangGX0T23,
  author       = {Xujian Liang and
                  Zhaoquan Gu and
                  Yushun Xie and
                  Le Wang and
                  Zhihong Tian},
  title        = {{MUSEDA:} Multilingual Unsupervised and Supervised Embedding for Domain
                  Adaption},
  journal      = {Knowl. Based Syst.},
  volume       = {273},
  pages        = {110560},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.knosys.2023.110560},
  doi          = {10.1016/J.KNOSYS.2023.110560},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/kbs/LiangGX0T23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/LiLWOT23,
  author       = {Shudong Li and
                  Yuan Li and
                  Xiaobo Wu and
                  Sattam Al Otaibi and
                  Zhihong Tian},
  title        = {Imbalanced Malware Family Classification Using Multimodal Fusion and
                  Weight Self-Learning},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {24},
  number       = {7},
  pages        = {7642--7652},
  year         = {2023},
  url          = {https://doi.org/10.1109/TITS.2022.3208891},
  doi          = {10.1109/TITS.2022.3208891},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tits/LiLWOT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/QiaoQTMZT23,
  author       = {Cheng Qiao and
                  Jing Qiu and
                  Zhiyuan Tan and
                  Geyong Min and
                  Albert Y. Zomaya and
                  Zhihong Tian},
  title        = {Evaluation Mechanism for Decentralized Collaborative Pattern Learning
                  in Heterogeneous Vehicular Networks},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {24},
  number       = {11},
  pages        = {13123--13132},
  year         = {2023},
  url          = {https://doi.org/10.1109/TITS.2022.3186630},
  doi          = {10.1109/TITS.2022.3186630},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tits/QiaoQTMZT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/QiaoBZT23,
  author       = {Cheng Qiao and
                  Kenneth N. Brown and
                  Fan Zhang and
                  Zhihong Tian},
  title        = {Adaptive Asynchronous Clustering Algorithms for Wireless Mesh Networks},
  journal      = {{IEEE} Trans. Knowl. Data Eng.},
  volume       = {35},
  number       = {3},
  pages        = {2610--2627},
  year         = {2023},
  url          = {https://doi.org/10.1109/TKDE.2021.3119550},
  doi          = {10.1109/TKDE.2021.3119550},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tkde/QiaoBZT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/ChaiDQYT23,
  author       = {Yuhan Chai and
                  Lei Du and
                  Jing Qiu and
                  Lihua Yin and
                  Zhihong Tian},
  title        = {Dynamic Prototype Network Based on Sample Adaptation for Few-Shot
                  Malware Detection},
  journal      = {{IEEE} Trans. Knowl. Data Eng.},
  volume       = {35},
  number       = {5},
  pages        = {4754--4766},
  year         = {2023},
  url          = {https://doi.org/10.1109/TKDE.2022.3142820},
  doi          = {10.1109/TKDE.2022.3142820},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tkde/ChaiDQYT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/RenXZZT23,
  author       = {Yitong Ren and
                  Yanjun Xiao and
                  Yinghai Zhou and
                  Zhiyong Zhang and
                  Zhihong Tian},
  title        = {{CSKG4APT:} {A} Cybersecurity Knowledge Graph for Advanced Persistent
                  Threat Organization Attribution},
  journal      = {{IEEE} Trans. Knowl. Data Eng.},
  volume       = {35},
  number       = {6},
  pages        = {5695--5709},
  year         = {2023},
  url          = {https://doi.org/10.1109/TKDE.2022.3175719},
  doi          = {10.1109/TKDE.2022.3175719},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tkde/RenXZZT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/GaoZYZHTLZ23,
  author       = {Yang Gao and
                  Peng Zhang and
                  Hong Yang and
                  Chuan Zhou and
                  Yue Hu and
                  Zhihong Tian and
                  Zhao Li and
                  Jingren Zhou},
  title        = {GraphNAS++: Distributed Architecture Search for Graph Neural Networks},
  journal      = {{IEEE} Trans. Knowl. Data Eng.},
  volume       = {35},
  number       = {7},
  pages        = {6973--6987},
  year         = {2023},
  url          = {https://doi.org/10.1109/TKDE.2022.3178153},
  doi          = {10.1109/TKDE.2022.3178153},
  timestamp    = {Sat, 20 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tkde/GaoZYZHTLZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnse/LiLTS23,
  author       = {Mianjie Li and
                  Yuan Liu and
                  Zhihong Tian and
                  Chun Shan},
  title        = {Privacy Protection Method Based On Multidimensional Feature Fusion
                  Under 6G Networks},
  journal      = {{IEEE} Trans. Netw. Sci. Eng.},
  volume       = {10},
  number       = {3},
  pages        = {1462--1471},
  year         = {2023},
  url          = {https://doi.org/10.1109/TNSE.2022.3186393},
  doi          = {10.1109/TNSE.2022.3186393},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnse/LiLTS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnse/LiuYAXZT23,
  author       = {Yuan Liu and
                  Wangyuan Yu and
                  Zhengpeng Ai and
                  Guangxia Xu and
                  Liang Zhao and
                  Zhihong Tian},
  title        = {A Blockchain-Empowered Federated Learning in Healthcare-Based Cyber
                  Physical Systems},
  journal      = {{IEEE} Trans. Netw. Sci. Eng.},
  volume       = {10},
  number       = {5},
  pages        = {2685--2696},
  year         = {2023},
  url          = {https://doi.org/10.1109/TNSE.2022.3168025},
  doi          = {10.1109/TNSE.2022.3168025},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnse/LiuYAXZT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnse/LiJZWTG23,
  author       = {Shudong Li and
                  Laiyuan Jiang and
                  Qianqing Zhang and
                  Zhen Wang and
                  Zhihong Tian and
                  Mohsen Guizani},
  title        = {A Malicious Mining Code Detection Method Based on Multi-Features Fusion},
  journal      = {{IEEE} Trans. Netw. Sci. Eng.},
  volume       = {10},
  number       = {5},
  pages        = {2731--2739},
  year         = {2023},
  url          = {https://doi.org/10.1109/TNSE.2022.3155187},
  doi          = {10.1109/TNSE.2022.3155187},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnse/LiJZWTG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/LiuZYZTZ23,
  author       = {Yuan Liu and
                  Chuang Zhang and
                  Yu Yan and
                  Xin Zhou and
                  Zhihong Tian and
                  Jie Zhang},
  title        = {A Semi-Centralized Trust Management Model Based on Blockchain for
                  Data Exchange in IoT System},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {16},
  number       = {2},
  pages        = {858--871},
  year         = {2023},
  url          = {https://doi.org/10.1109/TSC.2022.3181668},
  doi          = {10.1109/TSC.2022.3181668},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsc/LiuZYZTZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsusc/ZhouRYXTMT23,
  author       = {Yinghai Zhou and
                  Yitong Ren and
                  Ming Yi and
                  Yanjun Xiao and
                  Zhiyuan Tan and
                  Nour Moustafa and
                  Zhihong Tian},
  title        = {CDTier: {A} Chinese Dataset of Threat Intelligence Entity Relationships},
  journal      = {{IEEE} Trans. Sustain. Comput.},
  volume       = {8},
  number       = {4},
  pages        = {627--638},
  year         = {2023},
  url          = {https://doi.org/10.1109/TSUSC.2023.3240411},
  doi          = {10.1109/TSUSC.2023.3240411},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tsusc/ZhouRYXTMT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wc/ChenQZLZTDG23,
  author       = {Ximing Chen and
                  Jing Qiu and
                  Fasheng Zhou and
                  Hui Lu and
                  Lejun Zhang and
                  Zhihong Tian and
                  Xiaojiang Du and
                  Mohsen Guizani},
  title        = {Decentralized Cooperative Caching for Sustainable Metaverse Via Meta
                  Self-Supervision Learning},
  journal      = {{IEEE} Wirel. Commun.},
  volume       = {30},
  number       = {5},
  pages        = {96--103},
  year         = {2023},
  url          = {https://doi.org/10.1109/MWC.008.2300006},
  doi          = {10.1109/MWC.008.2300006},
  timestamp    = {Wed, 06 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/wc/ChenQZLZTDG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/www/LiCZTQ23,
  author       = {Jianming Li and
                  Yue Cong and
                  Ling Zhou and
                  Zhihong Tian and
                  Jing Qiu},
  title        = {Super-resolution-based part collaboration network for vehicle re-identification},
  journal      = {World Wide Web {(WWW)}},
  volume       = {26},
  number       = {2},
  pages        = {519--538},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11280-022-01060-z},
  doi          = {10.1007/S11280-022-01060-Z},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/www/LiCZTQ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/www/JiangYTXH23,
  author       = {Linyu Jiang and
                  Yukun Yan and
                  Zhihong Tian and
                  Zuobin Xiong and
                  Qilong Han},
  title        = {Personalized sampling graph collection with local differential privacy
                  for link prediction},
  journal      = {World Wide Web {(WWW)}},
  volume       = {26},
  number       = {5},
  pages        = {2669--2689},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11280-023-01136-4},
  doi          = {10.1007/S11280-023-01136-4},
  timestamp    = {Fri, 20 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/www/JiangYTXH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaai/TangWPS0GTW23,
  author       = {Keke Tang and
                  Jianpeng Wu and
                  Weilong Peng and
                  Yawen Shi and
                  Peng Song and
                  Zhaoquan Gu and
                  Zhihong Tian and
                  Wenping Wang},
  editor       = {Brian Williams and
                  Yiling Chen and
                  Jennifer Neville},
  title        = {Deep Manifold Attack on Point Clouds via Parameter Plane Stretching},
  booktitle    = {Thirty-Seventh {AAAI} Conference on Artificial Intelligence, {AAAI}
                  2023, Thirty-Fifth Conference on Innovative Applications of Artificial
                  Intelligence, {IAAI} 2023, Thirteenth Symposium on Educational Advances
                  in Artificial Intelligence, {EAAI} 2023, Washington, DC, USA, February
                  7-14, 2023},
  pages        = {2420--2428},
  publisher    = {{AAAI} Press},
  year         = {2023},
  url          = {https://doi.org/10.1609/aaai.v37i2.25338},
  doi          = {10.1609/AAAI.V37I2.25338},
  timestamp    = {Mon, 04 Sep 2023 12:29:24 +0200},
  biburl       = {https://dblp.org/rec/conf/aaai/TangWPS0GTW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloudnet/LiYTST23,
  author       = {Kebin Li and
                  Yang You and
                  Yuntian Tan and
                  Shen Su and
                  Zhihong Tian},
  title        = {{C2MDNIF:} {A} Cross Chain based Method for Domain Name Information
                  Fusion},
  booktitle    = {12th {IEEE} International Conference on Cloud Networking, CloudNet
                  2023, Hoboken, NJ, USA, November 1-3, 2023},
  pages        = {316--324},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CloudNet59005.2023.10490047},
  doi          = {10.1109/CLOUDNET59005.2023.10490047},
  timestamp    = {Sun, 28 Apr 2024 20:40:19 +0200},
  biburl       = {https://dblp.org/rec/conf/cloudnet/LiYTST23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloudnet/QiWWOHT23,
  author       = {Wuqi Qi and
                  Wei Wu and
                  Hao Wang and
                  Lu Ou and
                  Ning Hu and
                  Zhihong Tian},
  title        = {Intrusion Detection Techniques Analysis in Cloud Computing},
  booktitle    = {12th {IEEE} International Conference on Cloud Networking, CloudNet
                  2023, Hoboken, NJ, USA, November 1-3, 2023},
  pages        = {360--363},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CloudNet59005.2023.10490069},
  doi          = {10.1109/CLOUDNET59005.2023.10490069},
  timestamp    = {Sun, 28 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cloudnet/QiWWOHT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloudnet/ChenLZZHLYT23,
  author       = {Junhan Chen and
                  Rufeng Liang and
                  Man Zhang and
                  Chengcong Zheng and
                  Xun Huang and
                  Hui Lu and
                  Xiang Yu and
                  Zhihong Tian},
  title        = {Vulnerability Correlation, Multi-step Attack and Exploit Chain in
                  Breach and Attack Simulation},
  booktitle    = {12th {IEEE} International Conference on Cloud Networking, CloudNet
                  2023, Hoboken, NJ, USA, November 1-3, 2023},
  pages        = {398--402},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CloudNet59005.2023.10490046},
  doi          = {10.1109/CLOUDNET59005.2023.10490046},
  timestamp    = {Sun, 28 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cloudnet/ChenLZZHLYT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloudnet/TangZZZWLYT23,
  author       = {Xiang Tang and
                  Houlin Zhou and
                  Man Zhang and
                  Yuheng Zhang and
                  Guocheng Wu and
                  Hui Lu and
                  Xiang Yu and
                  Zhihong Tian},
  title        = {Research on the Exploitability of Binary Software Vulnerabilities},
  booktitle    = {12th {IEEE} International Conference on Cloud Networking, CloudNet
                  2023, Hoboken, NJ, USA, November 1-3, 2023},
  pages        = {403--407},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CloudNet59005.2023.10490070},
  doi          = {10.1109/CLOUDNET59005.2023.10490070},
  timestamp    = {Fri, 10 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cloudnet/TangZZZWLYT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloudnet/JiangRWTLHTZ23,
  author       = {Yunxin Jiang and
                  Yitong Ren and
                  Ziyu Wang and
                  Yi Tang and
                  Shengtao Lu and
                  Ning Hu and
                  Zhihong Tian and
                  Yinghai Zhou},
  title        = {{OPTIMA-DEM:} An Optimized Threat Behavior Prediction Method using
                  {DEMATEL-ISM}},
  booktitle    = {12th {IEEE} International Conference on Cloud Networking, CloudNet
                  2023, Hoboken, NJ, USA, November 1-3, 2023},
  pages        = {413--417},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CloudNet59005.2023.10490058},
  doi          = {10.1109/CLOUDNET59005.2023.10490058},
  timestamp    = {Sun, 28 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cloudnet/JiangRWTLHTZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloudnet/YiLWHT23,
  author       = {Haowen Yi and
                  Fan Liu and
                  Rui Wang and
                  Ning Hu and
                  Zhihong Tian},
  title        = {A Survey of Deception Defense: Approaches Used to Counter Malicious
                  Behavior},
  booktitle    = {12th {IEEE} International Conference on Cloud Networking, CloudNet
                  2023, Hoboken, NJ, USA, November 1-3, 2023},
  pages        = {418--422},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CloudNet59005.2023.10490043},
  doi          = {10.1109/CLOUDNET59005.2023.10490043},
  timestamp    = {Thu, 18 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cloudnet/YiLWHT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/SuXLWLQSLT23,
  author       = {Shen Su and
                  Yue Xue and
                  Liansheng Lin and
                  Chao Wang and
                  Hui Lu and
                  Jing Qiu and
                  Yanbin Sun and
                  Yuan Liu and
                  Zhihong Tian},
  title        = {Smart Contract Firewall: Protecting the on-Chain Smart Contract Projects},
  booktitle    = {{IEEE} Global Communications Conference, {GLOBECOM} 2023, Kuala Lumpur,
                  Malaysia, December 4-8, 2023},
  pages        = {5122--5128},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/GLOBECOM54140.2023.10437641},
  doi          = {10.1109/GLOBECOM54140.2023.10437641},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/SuXLWLQSLT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdm/TangCPLZZTW23,
  author       = {Keke Tang and
                  Xujian Cai and
                  Weilong Peng and
                  Daizong Liu and
                  Peican Zhu and
                  Pan Zhou and
                  Zhihong Tian and
                  Wenping Wang},
  editor       = {Guihai Chen and
                  Latifur Khan and
                  Xiaofeng Gao and
                  Meikang Qiu and
                  Witold Pedrycz and
                  Xindong Wu},
  title        = {Matching Words for Out-of-distribution Detection},
  booktitle    = {{IEEE} International Conference on Data Mining, {ICDM} 2023, Shanghai,
                  China, December 1-4, 2023},
  pages        = {578--587},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICDM58522.2023.00067},
  doi          = {10.1109/ICDM58522.2023.00067},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdm/TangCPLZZTW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwcmc/SunZHZSLT23,
  author       = {Yanbin Sun and
                  Jianxun Zhou and
                  Bo Hu and
                  Xiaoming Zhou and
                  Wei Song and
                  Mohan Li and
                  Zhihong Tian},
  title        = {Hierarchical Name-based Routing for Content Provider Mobility in {ICN}},
  booktitle    = {International Wireless Communications and Mobile Computing, {IWCMC}
                  2023, Marrakesh, Morocco, June 19-23, 2023},
  pages        = {941--946},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/IWCMC58020.2023.10182459},
  doi          = {10.1109/IWCMC58020.2023.10182459},
  timestamp    = {Thu, 27 Jul 2023 08:33:40 +0200},
  biburl       = {https://dblp.org/rec/conf/iwcmc/SunZHZSLT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwqos/LiLSSQT23,
  author       = {Weicheng Li and
                  Hui Lu and
                  Yanbin Sun and
                  Shen Su and
                  Jing Qiu and
                  Zhihong Tian},
  title        = {Improving Precision of Detecting Deserialization Vulnerabilities with
                  Bytecode Analysis},
  booktitle    = {31st {IEEE/ACM} International Symposium on Quality of Service, IWQoS
                  2023, Orlando, FL, USA, June 19-21, 2023},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/IWQoS57198.2023.10188756},
  doi          = {10.1109/IWQOS57198.2023.10188756},
  timestamp    = {Mon, 14 Aug 2023 15:24:20 +0200},
  biburl       = {https://dblp.org/rec/conf/iwqos/LiLSSQT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/metacom/SuTXWLTSD23,
  author       = {Shen Su and
                  Yuntian Tan and
                  Yue Xue and
                  Chao Wang and
                  Hui Lu and
                  Zhihong Tian and
                  Chun Shan and
                  Xiaojiang Du},
  title        = {Detecting Smart Contract Project Anomalies in Metaverse},
  booktitle    = {{IEEE} International Conference on Metaverse Computing, Networking
                  and Applications, MetaCom 2023, Kyoto, Japan, June 26-28, 2023},
  pages        = {524--532},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/MetaCom57706.2023.00095},
  doi          = {10.1109/METACOM57706.2023.00095},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/metacom/SuTXWLTSD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/TanGWZGT22,
  author       = {Hao Tan and
                  Zhaoquan Gu and
                  Le Wang and
                  Huan Zhang and
                  Brij B. Gupta and
                  Zhihong Tian},
  title        = {Improving adversarial transferability by temporal and spatial momentum
                  in urban speaker recognition systems},
  journal      = {Comput. Electr. Eng.},
  volume       = {104},
  number       = {Part},
  pages        = {108446},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.compeleceng.2022.108446},
  doi          = {10.1016/J.COMPELECENG.2022.108446},
  timestamp    = {Tue, 07 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cee/TanGWZGT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cmpb/YinHZT22,
  author       = {Xiao{-}Xia Yin and
                  Sillas Hadjiloucas and
                  Yanchun Zhang and
                  Zhihong Tian},
  title        = {{MRI} radiogenomics for intelligent diagnosis of breast tumors and
                  accurate prediction of neoadjuvant chemotherapy responses-a review},
  journal      = {Comput. Methods Programs Biomed.},
  volume       = {214},
  pages        = {106510},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cmpb.2021.106510},
  doi          = {10.1016/J.CMPB.2021.106510},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cmpb/YinHZT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/ChaiSQYT22,
  author       = {Yuhan Chai and
                  Zhe Sun and
                  Jing Qiu and
                  Lihua Yin and
                  Zhihong Tian},
  title        = {{TPRPF:} a preserving framework of privacy relations based on adversarial
                  training for texts in big data},
  journal      = {Frontiers Comput. Sci.},
  volume       = {16},
  number       = {4},
  pages        = {164618},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11704-022-1653-0},
  doi          = {10.1007/S11704-022-1653-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fcsc/ChaiSQYT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijon/ZhuGQLT22,
  author       = {Bin Zhu and
                  Zhaoquan Gu and
                  Yaguan Qian and
                  Francis C. M. Lau and
                  Zhihong Tian},
  title        = {Leveraging transferability and improved beam search in textual adversarial
                  attacks},
  journal      = {Neurocomputing},
  volume       = {500},
  pages        = {135--142},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.neucom.2022.05.054},
  doi          = {10.1016/J.NEUCOM.2022.05.054},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijon/ZhuGQLT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpdc/HouLLTZT22,
  author       = {Jian Hou and
                  Fangai Liu and
                  Hui Lu and
                  Zhiyuan Tan and
                  Xuqiang Zhuang and
                  Zhihong Tian},
  title        = {A novel flow-vector generation approach for malicious traffic detection},
  journal      = {J. Parallel Distributed Comput.},
  volume       = {169},
  pages        = {72--86},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jpdc.2022.06.004},
  doi          = {10.1016/J.JPDC.2022.06.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpdc/HouLLTZT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/kais/WenZWT22,
  author       = {Jing Wen and
                  Xi{-}Ran Zhu and
                  Chang{-}Dong Wang and
                  Zhihong Tian},
  title        = {A framework for personalized recommendation with conditional generative
                  adversarial networks},
  journal      = {Knowl. Inf. Syst.},
  volume       = {64},
  number       = {10},
  pages        = {2637--2660},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10115-022-01719-z},
  doi          = {10.1007/S10115-022-01719-Z},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/kais/WenZWT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/LiSZTSLS22,
  author       = {Mianjie Li and
                  Wei Shi and
                  Fusheng Zhu and
                  Zhihong Tian and
                  Muhammad Shafiq and
                  Zhiyong Luo and
                  Chun Shan},
  title        = {Large-Capacity Local Multi-Dimensional Information Hiding Method for
                  6G Networks},
  journal      = {{IEEE} Netw.},
  volume       = {36},
  number       = {4},
  pages        = {160--165},
  year         = {2022},
  url          = {https://doi.org/10.1109/MNET.001.2100412},
  doi          = {10.1109/MNET.001.2100412},
  timestamp    = {Tue, 26 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/network/LiSZTSLS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/simpra/ZhangWCGTDG22,
  author       = {Zhiqiang Zhang and
                  Le Wang and
                  Guangyao Chen and
                  Zhaoquan Gu and
                  Zhihong Tian and
                  Xiaojiang Du and
                  Mohsen Guizani},
  title        = {{STG2P:} {A} two-stage pipeline model for intrusion detection based
                  on improved LightGBM and K-means},
  journal      = {Simul. Model. Pract. Theory},
  volume       = {120},
  pages        = {102614},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.simpat.2022.102614},
  doi          = {10.1016/J.SIMPAT.2022.102614},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/simpra/ZhangWCGTDG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spe/GuZWDGT22,
  author       = {Zhaoquan Gu and
                  Yan Zhu and
                  Yuexuan Wang and
                  Xiaojiang Du and
                  Mohsen Guizani and
                  Zhihong Tian},
  title        = {Applying artificial bee colony algorithm to the multidepot vehicle
                  routing problem},
  journal      = {Softw. Pract. Exp.},
  volume       = {52},
  number       = {3},
  pages        = {756--771},
  year         = {2022},
  url          = {https://doi.org/10.1002/spe.2838},
  doi          = {10.1002/SPE.2838},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/spe/GuZWDGT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tgcn/GuLKDDGT22,
  author       = {Zhaoquan Gu and
                  Hao Li and
                  Sajid Khan and
                  Lianbing Deng and
                  Xiaojiang Du and
                  Mohsen Guizani and
                  Zhihong Tian},
  title        = {{IEPSBP:} {A} Cost-Efficient Image Encryption Algorithm Based on Parallel
                  Chaotic System for Green IoT},
  journal      = {{IEEE} Trans. Green Commun. Netw.},
  volume       = {6},
  number       = {1},
  pages        = {89--106},
  year         = {2022},
  url          = {https://doi.org/10.1109/TGCN.2021.3095707},
  doi          = {10.1109/TGCN.2021.3095707},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tgcn/GuLKDDGT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/LvWZZTT22,
  author       = {Lingling Lv and
                  Zongyu Wu and
                  Jinhua Zhang and
                  Lei Zhang and
                  Zhiyuan Tan and
                  Zhihong Tian},
  title        = {A {VMD} and {LSTM} Based Hybrid Model of Load Forecasting for Power
                  Grid Security},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {18},
  number       = {9},
  pages        = {6474--6482},
  year         = {2022},
  url          = {https://doi.org/10.1109/TII.2021.3130237},
  doi          = {10.1109/TII.2021.3130237},
  timestamp    = {Tue, 28 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tii/LvWZZTT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/LvWZGT22,
  author       = {Lingling Lv and
                  Zongyu Wu and
                  Lei Zhang and
                  Brij B. Gupta and
                  Zhihong Tian},
  title        = {An Edge-AI Based Forecasting Approach for Improving Smart Microgrid
                  Efficiency},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {18},
  number       = {11},
  pages        = {7946--7954},
  year         = {2022},
  url          = {https://doi.org/10.1109/TII.2022.3163137},
  doi          = {10.1109/TII.2022.3163137},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tii/LvWZGT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnse/GuWCTWDGT22,
  author       = {Zhaoquan Gu and
                  Le Wang and
                  Xiaolong Chen and
                  Yunyi Tang and
                  Xingang Wang and
                  Xiaojiang Du and
                  Mohsen Guizani and
                  Zhihong Tian},
  title        = {Epidemic Risk Assessment by a Novel Communication Station Based Method},
  journal      = {{IEEE} Trans. Netw. Sci. Eng.},
  volume       = {9},
  number       = {1},
  pages        = {332--344},
  year         = {2022},
  url          = {https://doi.org/10.1109/TNSE.2021.3058762},
  doi          = {10.1109/TNSE.2021.3058762},
  timestamp    = {Tue, 08 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tnse/GuWCTWDGT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnse/LuJHDGT22,
  author       = {Hui Lu and
                  Chengjie Jin and
                  Xiaohan Helu and
                  Xiaojiang Du and
                  Mohsen Guizani and
                  Zhihong Tian},
  title        = {DeepAutoD: Research on Distributed Machine Learning Oriented Scalable
                  Mobile Communication Security Unpacking System},
  journal      = {{IEEE} Trans. Netw. Sci. Eng.},
  volume       = {9},
  number       = {4},
  pages        = {2052--2065},
  year         = {2022},
  url          = {https://doi.org/10.1109/TNSE.2021.3100750},
  doi          = {10.1109/TNSE.2021.3100750},
  timestamp    = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnse/LuJHDGT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/ChaiQYZGT22,
  author       = {Yuhan Chai and
                  Jing Qiu and
                  Lihua Yin and
                  Lejun Zhang and
                  Brij B. Gupta and
                  Zhihong Tian},
  title        = {From Data and Model Levels: Improve the Performance of Few-Shot Malware
                  Classification},
  journal      = {{IEEE} Trans. Netw. Serv. Manag.},
  volume       = {19},
  number       = {4},
  pages        = {4248--4261},
  year         = {2022},
  url          = {https://doi.org/10.1109/TNSM.2022.3200866},
  doi          = {10.1109/TNSM.2022.3200866},
  timestamp    = {Fri, 10 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tnsm/ChaiQYZGT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/TanWSTT22,
  author       = {Qingfeng Tan and
                  Xuebin Wang and
                  Wei Shi and
                  Jian Tang and
                  Zhihong Tian},
  title        = {An Anonymity Vulnerability in Tor},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {30},
  number       = {6},
  pages        = {2574--2587},
  year         = {2022},
  url          = {https://doi.org/10.1109/TNET.2022.3174003},
  doi          = {10.1109/TNET.2022.3174003},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ton/TanWSTT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/LiuXHNZMLT22,
  author       = {Yuan Liu and
                  Zehui Xiong and
                  Qin Hu and
                  Dusit Niyato and
                  Jie Zhang and
                  Chunyan Miao and
                  Cyril Leung and
                  Zhihong Tian},
  title        = {VRepChain: {A} Decentralized and Privacy-Preserving Reputation System
                  for Social Internet of Vehicles Based on Blockchain},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {71},
  number       = {12},
  pages        = {13242--13253},
  year         = {2022},
  url          = {https://doi.org/10.1109/TVT.2022.3198004},
  doi          = {10.1109/TVT.2022.3198004},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tvt/LiuXHNZMLT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwcmc/ZhangCJTD22,
  author       = {Lei Zhang and
                  Huiping Chen and
                  Peiyan Jia and
                  Zhihong Tian and
                  Xiaojiang Du},
  title        = {{WGAN-GP} and {LSTM} based Prediction Model for Aircraft 4- {D} Traj
                  ectory},
  booktitle    = {2022 International Wireless Communications and Mobile Computing, {IWCMC}
                  2022, Dubrovnik, Croatia, May 30 - June 3, 2022},
  pages        = {937--942},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/IWCMC55113.2022.9824928},
  doi          = {10.1109/IWCMC55113.2022.9824928},
  timestamp    = {Mon, 28 Aug 2023 21:17:32 +0200},
  biburl       = {https://dblp.org/rec/conf/iwcmc/ZhangCJTD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ZhaoLQMYZT022,
  author       = {Bodong Zhao and
                  Zheming Li and
                  Shisong Qin and
                  Zheyu Ma and
                  Ming Yuan and
                  Wenyu Zhu and
                  Zhihong Tian and
                  Chao Zhang},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {StateFuzz: System Call-Based State-Aware Linux Driver Fuzzing},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {3273--3289},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/zhao-bodong},
  timestamp    = {Fri, 02 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ZhaoLQMYZT022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2201-09539,
  author       = {Tonghe Wang and
                  Songpu Ai and
                  Zhihong Tian and
                  Brij B. Gupta and
                  Chun Shan},
  title        = {A Blockchain-Based Distributed Computational Resource Trading System
                  for Industrial Internet of Things Considering Multiple Preferences},
  journal      = {CoRR},
  volume       = {abs/2201.09539},
  year         = {2022},
  url          = {https://arxiv.org/abs/2201.09539},
  eprinttype    = {arXiv},
  eprint       = {2201.09539},
  timestamp    = {Tue, 01 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2201-09539.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2211-04118,
  author       = {Jinta Weng and
                  Yue Hu and
                  Zhihong Tian and
                  Heyan Huang},
  title        = {ConsPrompt: Easily Exploiting Contrastive Samples for Few-shot Prompt
                  Learning},
  journal      = {CoRR},
  volume       = {abs/2211.04118},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2211.04118},
  doi          = {10.48550/ARXIV.2211.04118},
  eprinttype    = {arXiv},
  eprint       = {2211.04118},
  timestamp    = {Thu, 02 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2211-04118.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2212-14274,
  author       = {Xin{-}Cheng Wen and
                  Cuiyun Gao and
                  Jiaxin Ye and
                  Zhihong Tian and
                  Yan Jia and
                  Xuan Wang},
  title        = {Meta-Path Based Attentional Graph Learning Model for Vulnerability
                  Detection},
  journal      = {CoRR},
  volume       = {abs/2212.14274},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2212.14274},
  doi          = {10.48550/ARXIV.2212.14274},
  eprinttype    = {arXiv},
  eprint       = {2212.14274},
  timestamp    = {Sun, 08 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2212-14274.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/LiuLLMT21,
  author       = {Yuan Liu and
                  Yixiao Lan and
                  Boyang Li and
                  Chunyan Miao and
                  Zhihong Tian},
  title        = {Proof of Learning (PoLe): Empowering neural network training with
                  consensus building on blockchains},
  journal      = {Comput. Networks},
  volume       = {201},
  pages        = {108594},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.comnet.2021.108594},
  doi          = {10.1016/J.COMNET.2021.108594},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/LiuLLMT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computing/ZhangZJTDG21,
  author       = {Tianle Zhang and
                  Liwen Zheng and
                  Yu Jiang and
                  Zhihong Tian and
                  Xiaojiang Du and
                  Mohsen Guizani},
  title        = {A method of chained recommendation for charging piles in internet
                  of vehicles},
  journal      = {Computing},
  volume       = {103},
  number       = {2},
  pages        = {231--249},
  year         = {2021},
  url          = {https://doi.org/10.1007/s00607-020-00832-7},
  doi          = {10.1007/S00607-020-00832-7},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computing/ZhangZJTDG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/finr/GuTWLST21,
  author       = {Zhaoquan Gu and
                  Keke Tang and
                  Zhen Wang and
                  Yanhua Li and
                  Wei Shi and
                  Zhihong Tian},
  title        = {Editorial: Intelligence and Safety for Humanoid Robots: Design, Control,
                  and Applications},
  journal      = {Frontiers Neurorobotics},
  volume       = {15},
  year         = {2021},
  url          = {https://doi.org/10.3389/fnbot.2021.808369},
  doi          = {10.3389/FNBOT.2021.808369},
  timestamp    = {Sat, 19 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/finr/GuTWLST21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeejas/XuSZT21,
  author       = {Dongliang Xu and
                  Wei Shi and
                  Wensheng Zhai and
                  Zhihong Tian},
  title        = {Multi-Candidate Voting Model Based on Blockchain},
  journal      = {{IEEE} {CAA} J. Autom. Sinica},
  volume       = {8},
  number       = {12},
  pages        = {1891--1900},
  year         = {2021},
  url          = {https://doi.org/10.1109/JAS.2021.1004207},
  doi          = {10.1109/JAS.2021.1004207},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeejas/XuSZT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/ShafiqTBDG21,
  author       = {Muhammad Shafiq and
                  Zhihong Tian and
                  Ali Kashif Bashir and
                  Xiaojiang Du and
                  Mohsen Guizani},
  title        = {CorrAUC: {A} Malicious Bot-IoT Traffic Detection Method in IoT Network
                  Using Machine-Learning Techniques},
  journal      = {{IEEE} Internet Things J.},
  volume       = {8},
  number       = {5},
  pages        = {3242--3254},
  year         = {2021},
  url          = {https://doi.org/10.1109/JIOT.2020.3002255},
  doi          = {10.1109/JIOT.2020.3002255},
  timestamp    = {Tue, 26 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/ShafiqTBDG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipm/SuTLDYDG21,
  author       = {Shen Su and
                  Zhihong Tian and
                  Shuang Li and
                  Jinxi Deng and
                  Lihua Yin and
                  Xiaojiang Du and
                  Mohsen Guizani},
  title        = {IoT root union: {A} decentralized name resolving system for IoT based
                  on blockchain},
  journal      = {Inf. Process. Manag.},
  volume       = {58},
  number       = {3},
  pages        = {102553},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ipm.2021.102553},
  doi          = {10.1016/J.IPM.2021.102553},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipm/SuTLDYDG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LvYZHT21,
  author       = {Lingling Lv and
                  Zhipeng Yang and
                  Lei Zhang and
                  Quanzhen Huang and
                  Zhihong Tian},
  title        = {Multi-party transaction framework for drone services based on alliance
                  blockchain in smart cities},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {58},
  pages        = {102792},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.102792},
  doi          = {10.1016/J.JISA.2021.102792},
  timestamp    = {Sun, 16 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/LvYZHT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/js/LiCWCT21,
  author       = {Shudong Li and
                  Yanshan Chen and
                  Xiaobo Wu and
                  Xiaochun Cheng and
                  Zhihong Tian},
  title        = {Power Grid-Oriented Cascading Failure Vulnerability Identifying Method
                  Based on Wireless Sensors},
  journal      = {J. Sensors},
  volume       = {2021},
  pages        = {8820413:1--8820413:12},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/8820413},
  doi          = {10.1155/2021/8820413},
  timestamp    = {Tue, 20 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/js/LiCWCT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mlc/HuTLDG21,
  author       = {Ning Hu and
                  Zhihong Tian and
                  Hui Lu and
                  Xiaojiang Du and
                  Mohsen Guizani},
  title        = {A multiple-kernel clustering based intrusion detection scheme for
                  5G and IoT networks},
  journal      = {Int. J. Mach. Learn. Cybern.},
  volume       = {12},
  number       = {11},
  pages        = {3129--3144},
  year         = {2021},
  url          = {https://doi.org/10.1007/s13042-020-01253-w},
  doi          = {10.1007/S13042-020-01253-W},
  timestamp    = {Fri, 07 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mlc/HuTLDG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/monet/SunLSTSH21,
  author       = {Yanbin Sun and
                  Mohan Li and
                  Shen Su and
                  Zhihong Tian and
                  Wei Shi and
                  Meng Han},
  title        = {Secure Data Sharing Framework via Hierarchical Greedy Embedding in
                  Darknets},
  journal      = {Mob. Networks Appl.},
  volume       = {26},
  number       = {2},
  pages        = {940--948},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11036-019-01325-4},
  doi          = {10.1007/S11036-019-01325-4},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/monet/SunLSTSH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/monet/LuJHZSHT21,
  author       = {Hui Lu and
                  Chengjie Jin and
                  Xiaohan Helu and
                  Man Zhang and
                  Yanbin Sun and
                  Yi Han and
                  Zhihong Tian},
  title        = {Research on Intelligent Detection of Command Level Stack Pollution
                  for Binary Program Analysis},
  journal      = {Mob. Networks Appl.},
  volume       = {26},
  number       = {4},
  pages        = {1723--1732},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11036-019-01507-0},
  doi          = {10.1007/S11036-019-01507-0},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/monet/LuJHZSHT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/HuTSYZDG21,
  author       = {Ning Hu and
                  Zhihong Tian and
                  Yanbin Sun and
                  Lihua Yin and
                  Baokang Zhao and
                  Xiaojiang Du and
                  Nadra Guizani},
  title        = {Building Agile and Resilient {UAV} Networks Based on {SDN} and Blockchain},
  journal      = {{IEEE} Netw.},
  volume       = {35},
  number       = {1},
  pages        = {57--63},
  year         = {2021},
  url          = {https://doi.org/10.1109/MNET.011.2000176},
  doi          = {10.1109/MNET.011.2000176},
  timestamp    = {Mon, 22 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/network/HuTSYZDG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/LuJHZGT21,
  author       = {Hui Lu and
                  Chengjie Jin and
                  Xiaohan Helu and
                  Chunsheng Zhu and
                  Nadra Guizani and
                  Zhihong Tian},
  title        = {AutoD: Intelligent Blockchain Application Unpacking Based on {JNI}
                  Layer Deception Call},
  journal      = {{IEEE} Netw.},
  volume       = {35},
  number       = {2},
  pages        = {215--221},
  year         = {2021},
  url          = {https://doi.org/10.1109/MNET.011.2000467},
  doi          = {10.1109/MNET.011.2000467},
  timestamp    = {Fri, 07 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/network/LuJHZGT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/QiuCTGD21,
  author       = {Jing Qiu and
                  Yuanyuan Chen and
                  Zhihong Tian and
                  Nadra Guizani and
                  Xiaojiang Du},
  title        = {The Security of Internet of Vehicles Network: Adversarial Examples
                  for Trajectory Mode Detection},
  journal      = {{IEEE} Netw.},
  volume       = {35},
  number       = {5},
  pages        = {279--283},
  year         = {2021},
  url          = {https://doi.org/10.1109/MNET.121.2000435},
  doi          = {10.1109/MNET.121.2000435},
  timestamp    = {Tue, 16 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/network/QiuCTGD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pvldb/Lin000T21,
  author       = {Zhe Lin and
                  Fan Zhang and
                  Xuemin Lin and
                  Wenjie Zhang and
                  Zhihong Tian},
  title        = {Hierarchical Core Maintenance on Large Dynamic Graphs},
  journal      = {Proc. {VLDB} Endow.},
  volume       = {14},
  number       = {5},
  pages        = {757--770},
  year         = {2021},
  url          = {http://www.vldb.org/pvldb/vol14/p757-zhang.pdf},
  doi          = {10.14778/3446095.3446099},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pvldb/Lin000T21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/YangZLST21,
  author       = {Jiageng Yang and
                  Xinguo Zhang and
                  Hui Lu and
                  Muhammad Shafiq and
                  Zhihong Tian},
  title        = {StFuzzer: Contribution-Aware Coverage-Guided Fuzzing for Smart Devices},
  journal      = {Secur. Commun. Networks},
  volume       = {2021},
  pages        = {1987844:1--1987844:15},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/1987844},
  doi          = {10.1155/2021/1987844},
  timestamp    = {Tue, 26 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/YangZLST21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiZWHT21,
  author       = {Shudong Li and
                  Qianqing Zhang and
                  Xiaobo Wu and
                  Weihong Han and
                  Zhihong Tian},
  title        = {Attribution Classification Method of {APT} Malware in IoT Using Machine
                  Learning Techniques},
  journal      = {Secur. Commun. Networks},
  volume       = {2021},
  pages        = {9396141:1--9396141:12},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/9396141},
  doi          = {10.1155/2021/9396141},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LiZWHT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/simpra/LiLHDGT21,
  author       = {Shudong Li and
                  Yuan Li and
                  Weihong Han and
                  Xiaojiang Du and
                  Mohsen Guizani and
                  Zhihong Tian},
  title        = {Malicious mining code detection based on ensemble learning in cloud
                  computing environment},
  journal      = {Simul. Model. Pract. Theory},
  volume       = {113},
  pages        = {102391},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.simpat.2021.102391},
  doi          = {10.1016/J.SIMPAT.2021.102391},
  timestamp    = {Tue, 05 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/simpra/LiLHDGT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcss/HanTZHJG21,
  author       = {Weihong Han and
                  Zhihong Tian and
                  Chunsheng Zhu and
                  Zizhong Huang and
                  Yan Jia and
                  Mohsen Guizani},
  title        = {A Topic Representation Model for Online Social Networks Based on Hybrid
                  Human-Artificial Intelligence},
  journal      = {{IEEE} Trans. Comput. Soc. Syst.},
  volume       = {8},
  number       = {1},
  pages        = {191--200},
  year         = {2021},
  url          = {https://doi.org/10.1109/TCSS.2019.2959826},
  doi          = {10.1109/TCSS.2019.2959826},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcss/HanTZHJG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tgcn/HuTDGZ21,
  author       = {Ning Hu and
                  Zhihong Tian and
                  Xiaojiang Du and
                  Nadra Guizani and
                  Zhihan Zhu},
  title        = {Deep-Green: {A} Dispersed Energy-Efficiency Computing Paradigm for
                  Green Industrial IoT},
  journal      = {{IEEE} Trans. Green Commun. Netw.},
  volume       = {5},
  number       = {2},
  pages        = {750--764},
  year         = {2021},
  url          = {https://doi.org/10.1109/TGCN.2021.3064683},
  doi          = {10.1109/TGCN.2021.3064683},
  timestamp    = {Tue, 01 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tgcn/HuTDGZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tgcn/LvZZSTDG21,
  author       = {Lingling Lv and
                  Chan Zheng and
                  Lei Zhang and
                  Chun Shan and
                  Zhihong Tian and
                  Xiaojiang Du and
                  Mohsen Guizani},
  title        = {Contract and Lyapunov Optimization-Based Load Scheduling and Energy
                  Management for {UAV} Charging Stations},
  journal      = {{IEEE} Trans. Green Commun. Netw.},
  volume       = {5},
  number       = {3},
  pages        = {1381--1394},
  year         = {2021},
  url          = {https://doi.org/10.1109/TGCN.2021.3085561},
  doi          = {10.1109/TGCN.2021.3085561},
  timestamp    = {Wed, 01 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tgcn/LvZZSTDG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tgcn/HuTDG21,
  author       = {Ning Hu and
                  Zhihong Tian and
                  Xiaojiang Du and
                  Mohsen Guizani},
  title        = {An Energy-Efficient In-Network Computing Paradigm for 6G},
  journal      = {{IEEE} Trans. Green Commun. Netw.},
  volume       = {5},
  number       = {4},
  pages        = {1722--1733},
  year         = {2021},
  url          = {https://doi.org/10.1109/TGCN.2021.3099804},
  doi          = {10.1109/TGCN.2021.3099804},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tgcn/HuTDG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/SunTLSDG21,
  author       = {Yanbin Sun and
                  Zhihong Tian and
                  Mohan Li and
                  Shen Su and
                  Xiaojiang Du and
                  Mohsen Guizani},
  title        = {Honeypot Identification in Softwarized Industrial Cyber-Physical Systems},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {17},
  number       = {8},
  pages        = {5542--5551},
  year         = {2021},
  url          = {https://doi.org/10.1109/TII.2020.3044576},
  doi          = {10.1109/TII.2020.3044576},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tii/SunTLSDG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/LuoTMGST21,
  author       = {Chaochao Luo and
                  Zhiyuan Tan and
                  Geyong Min and
                  Jie Gan and
                  Wei Shi and
                  Zhihong Tian},
  title        = {A Novel Web Attack Detection System for Internet of Things via Ensemble
                  Classification},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {17},
  number       = {8},
  pages        = {5810--5818},
  year         = {2021},
  url          = {https://doi.org/10.1109/TII.2020.3038761},
  doi          = {10.1109/TII.2020.3038761},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tii/LuoTMGST21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/WangTSDG21,
  author       = {Yuhang Wang and
                  Zhihong Tian and
                  Yanbin Sun and
                  Xiaojiang Du and
                  Nadra Guizani},
  title        = {LocJury: An IBN-Based Location Privacy Preserving Scheme for IoCV},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {22},
  number       = {8},
  pages        = {5028--5037},
  year         = {2021},
  url          = {https://doi.org/10.1109/TITS.2020.2970610},
  doi          = {10.1109/TITS.2020.2970610},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tits/WangTSDG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnse/DuSGT21,
  author       = {Xiaojiang Du and
                  Willy Susilo and
                  Mohsen Guizani and
                  Zhihong Tian},
  title        = {Introduction to the Special Section on Artificial Intelligence Security:
                  Adversarial Attack and Defense},
  journal      = {{IEEE} Trans. Netw. Sci. Eng.},
  volume       = {8},
  number       = {2},
  pages        = {905--907},
  year         = {2021},
  url          = {https://doi.org/10.1109/TNSE.2021.3073637},
  doi          = {10.1109/TNSE.2021.3073637},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnse/DuSGT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wc/GuLGDT21,
  author       = {Zhaoquan Gu and
                  Dongda Li and
                  Nadra Guizani and
                  Xiaojiang Du and
                  Zhihong Tian},
  title        = {An Aerial-Computing-Assisted Architecture for Large-Scale Sensor Networks},
  journal      = {{IEEE} Wirel. Commun.},
  volume       = {28},
  number       = {5},
  pages        = {43--49},
  year         = {2021},
  url          = {https://doi.org/10.1109/MWC.101.2100045},
  doi          = {10.1109/MWC.101.2100045},
  timestamp    = {Tue, 23 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/wc/GuLGDT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/www/LiuXGYLT21,
  author       = {Chang Liu and
                  Gang Xiong and
                  Gaopeng Gou and
                  Siu{-}Ming Yiu and
                  Zhen Li and
                  Zhihong Tian},
  title        = {Classifying encrypted traffic using adaptive fingerprints with multi-level
                  attributes},
  journal      = {World Wide Web},
  volume       = {24},
  number       = {6},
  pages        = {2071--2097},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11280-021-00940-0},
  doi          = {10.1007/S11280-021-00940-0},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/www/LiuXGYLT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsc/XieDYGWT21,
  author       = {Wenrong Xie and
                  Fashan Dong and
                  Haiyang Yu and
                  Zhaoquan Gu and
                  Le Wang and
                  Zhihong Tian},
  title        = {Generate Adversarial Examples Combined with Image Entropy Distribution},
  booktitle    = {Sixth {IEEE} International Conference on Data Science in Cyberspace,
                  {DSC} 2021, Shenzhen, China, October 9-11, 2021},
  pages        = {272--279},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/DSC53577.2021.00044},
  doi          = {10.1109/DSC53577.2021.00044},
  timestamp    = {Fri, 22 Apr 2022 19:18:38 +0200},
  biburl       = {https://dblp.org/rec/conf/dsc/XieDYGWT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsc/ZhaoLWHTC21,
  author       = {Chuanyu Zhao and
                  Shudong Li and
                  Xiaobo Wu and
                  Weihong Han and
                  Zhihong Tian and
                  Maofei Chen},
  title        = {A Novel Malware Encrypted Traffic Detection Framework Based On Ensemble
                  Learning},
  booktitle    = {Sixth {IEEE} International Conference on Data Science in Cyberspace,
                  {DSC} 2021, Shenzhen, China, October 9-11, 2021},
  pages        = {614--620},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/DSC53577.2021.00097},
  doi          = {10.1109/DSC53577.2021.00097},
  timestamp    = {Fri, 22 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dsc/ZhaoLWHTC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccv/TangMPWSGTW21,
  author       = {Keke Tang and
                  Dingruibo Miao and
                  Weilong Peng and
                  Jianpeng Wu and
                  Yawen Shi and
                  Zhaoquan Gu and
                  Zhihong Tian and
                  Wenping Wang},
  title        = {CODEs: Chamfer Out-of-Distribution Examples against Overconfidence
                  Issue},
  booktitle    = {2021 {IEEE/CVF} International Conference on Computer Vision, {ICCV}
                  2021, Montreal, QC, Canada, October 10-17, 2021},
  pages        = {1133--1142},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ICCV48922.2021.00119},
  doi          = {10.1109/ICCV48922.2021.00119},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccv/TangMPWSGTW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdm/WenCWT21,
  author       = {Jing Wen and
                  Bi{-}Yi Chen and
                  Chang{-}Dong Wang and
                  Zhihong Tian},
  editor       = {James Bailey and
                  Pauli Miettinen and
                  Yun Sing Koh and
                  Dacheng Tao and
                  Xindong Wu},
  title        = {{PRGAN:} Personalized Recommendation with Conditional Generative Adversarial
                  Networks},
  booktitle    = {{IEEE} International Conference on Data Mining, {ICDM} 2021, Auckland,
                  New Zealand, December 7-10, 2021},
  pages        = {729--738},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ICDM51629.2021.00084},
  doi          = {10.1109/ICDM51629.2021.00084},
  timestamp    = {Mon, 31 Jan 2022 08:58:55 +0100},
  biburl       = {https://dblp.org/rec/conf/icdm/WenCWT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/Jia0CDCTJ21,
  author       = {Meng Jia and
                  Kun He and
                  Jing Chen and
                  Ruiying Du and
                  Weihang Chen and
                  Zhihong Tian and
                  Shouling Ji},
  title        = {{PROCESS:} Privacy-Preserving On-Chain Certificate Status Service},
  booktitle    = {40th {IEEE} Conference on Computer Communications, {INFOCOM} 2021,
                  Vancouver, BC, Canada, May 10-13, 2021},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/INFOCOM42981.2021.9488858},
  doi          = {10.1109/INFOCOM42981.2021.9488858},
  timestamp    = {Tue, 21 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/Jia0CDCTJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/WangZHATM21,
  author       = {Xingbin Wang and
                  Boyan Zhao and
                  Rui Hou and
                  Amro Awad and
                  Zhihong Tian and
                  Dan Meng},
  title        = {NASGuard: {A} Novel Accelerator Architecture for Robust Neural Architecture
                  Search {(NAS)} Networks},
  booktitle    = {48th {ACM/IEEE} Annual International Symposium on Computer Architecture,
                  {ISCA} 2021, Virtual Event / Valencia, Spain, June 14-18, 2021},
  pages        = {776--789},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ISCA52012.2021.00066},
  doi          = {10.1109/ISCA52012.2021.00066},
  timestamp    = {Mon, 19 Feb 2024 07:32:07 +0100},
  biburl       = {https://dblp.org/rec/conf/isca/WangZHATM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mm/QinZGWTJWW21,
  author       = {Xugong Qin and
                  Yu Zhou and
                  Youhui Guo and
                  Dayan Wu and
                  Zhihong Tian and
                  Ning Jiang and
                  Hongbin Wang and
                  Weiping Wang},
  editor       = {Heng Tao Shen and
                  Yueting Zhuang and
                  John R. Smith and
                  Yang Yang and
                  Pablo C{\'{e}}sar and
                  Florian Metze and
                  Balakrishnan Prabhakaran},
  title        = {Mask is All You Need: Rethinking Mask {R-CNN} for Dense and Arbitrary-Shaped
                  Scene Text Detection},
  booktitle    = {{MM} '21: {ACM} Multimedia Conference, Virtual Event, China, October
                  20 - 24, 2021},
  pages        = {414--423},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3474085.3475178},
  doi          = {10.1145/3474085.3475178},
  timestamp    = {Mon, 22 Apr 2024 21:24:20 +0200},
  biburl       = {https://dblp.org/rec/conf/mm/QinZGWTJWW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LvLCWT21,
  author       = {Ke Lv and
                  Yuan Liu and
                  Jienan Chen and
                  Dongxia Wang and
                  Zhihong Tian},
  title        = {An Interactive System for Unfair Rating Detection Models in a Customized
                  Perspective},
  booktitle    = {20th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2021, Shenyang, China, October
                  20-22, 2021},
  pages        = {871--878},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00123},
  doi          = {10.1109/TRUSTCOM53373.2021.00123},
  timestamp    = {Mon, 25 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LvLCWT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/ZhouLGT21,
  author       = {Huchen Zhou and
                  Mohan Li and
                  Zhaoquan Gu and
                  Zhihong Tian},
  editor       = {Yan Jia and
                  Zhaoquan Gu and
                  Aiping Li},
  title        = {Spatiotemporal Data Cleaning and Knowledge Fusion},
  booktitle    = {{MDATA:} {A} New Knowledge Representation Model - Theory, Methods
                  and Applications},
  series       = {Lecture Notes in Computer Science},
  volume       = {12647},
  pages        = {32--50},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-71590-8\_3},
  doi          = {10.1007/978-3-030-71590-8\_3},
  timestamp    = {Wed, 25 Jan 2023 17:51:20 +0100},
  biburl       = {https://dblp.org/rec/series/lncs/ZhouLGT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/Chen0THTG21,
  author       = {Xiaolong Chen and
                  Le Wang and
                  Yunyi Tang and
                  Weihong Han and
                  Zhihong Tian and
                  Zhaoquan Gu},
  editor       = {Yan Jia and
                  Zhaoquan Gu and
                  Aiping Li},
  title        = {Entity Alignment: Optimization by Seed Selection},
  booktitle    = {{MDATA:} {A} New Knowledge Representation Model - Theory, Methods
                  and Applications},
  series       = {Lecture Notes in Computer Science},
  volume       = {12647},
  pages        = {99--116},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-71590-8\_6},
  doi          = {10.1007/978-3-030-71590-8\_6},
  timestamp    = {Tue, 17 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/lncs/Chen0THTG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/Tang0CGT21,
  author       = {Yunyi Tang and
                  Le Wang and
                  Xiaolong Chen and
                  Zhaoquan Gu and
                  Zhihong Tian},
  editor       = {Yan Jia and
                  Zhaoquan Gu and
                  Aiping Li},
  title        = {Knowledge Extraction: Automatic Classification of Matching Rules},
  booktitle    = {{MDATA:} {A} New Knowledge Representation Model - Theory, Methods
                  and Applications},
  series       = {Lecture Notes in Computer Science},
  volume       = {12647},
  pages        = {117--130},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-71590-8\_7},
  doi          = {10.1007/978-3-030-71590-8\_7},
  timestamp    = {Tue, 17 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/lncs/Tang0CGT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2108-06024,
  author       = {Keke Tang and
                  Dingruibo Miao and
                  Weilong Peng and
                  Jianpeng Wu and
                  Yawen Shi and
                  Zhaoquan Gu and
                  Zhihong Tian and
                  Wenping Wang},
  title        = {CODEs: Chamfer Out-of-Distribution Examples against Overconfidence
                  Issue},
  journal      = {CoRR},
  volume       = {abs/2108.06024},
  year         = {2021},
  url          = {https://arxiv.org/abs/2108.06024},
  eprinttype    = {arXiv},
  eprint       = {2108.06024},
  timestamp    = {Wed, 18 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2108-06024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2109-03426,
  author       = {Xugong Qin and
                  Yu Zhou and
                  Youhui Guo and
                  Dayan Wu and
                  Zhihong Tian and
                  Ning Jiang and
                  Hongbin Wang and
                  Weiping Wang},
  title        = {Mask is All You Need: Rethinking Mask {R-CNN} for Dense and Arbitrary-Shaped
                  Scene Text Detection},
  journal      = {CoRR},
  volume       = {abs/2109.03426},
  year         = {2021},
  url          = {https://arxiv.org/abs/2109.03426},
  eprinttype    = {arXiv},
  eprint       = {2109.03426},
  timestamp    = {Tue, 21 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2109-03426.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2109-06176,
  author       = {Bin Zhu and
                  Zhaoquan Gu and
                  Le Wang and
                  Zhihong Tian},
  title        = {{TREATED:} Towards Universal Defense against Textual Adversarial Attacks},
  journal      = {CoRR},
  volume       = {abs/2109.06176},
  year         = {2021},
  url          = {https://arxiv.org/abs/2109.06176},
  eprinttype    = {arXiv},
  eprint       = {2109.06176},
  timestamp    = {Fri, 21 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2109-06176.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2110-03445,
  author       = {Lei Zhang and
                  Shuaimin Jiang and
                  Xiajiong Shen and
                  Brij B. Gupta and
                  Zhihong Tian},
  title        = {{PWG-IDS:} An Intrusion Detection Model for Solving Class Imbalance
                  in IIoT Networks Using Generative Adversarial Networks},
  journal      = {CoRR},
  volume       = {abs/2110.03445},
  year         = {2021},
  url          = {https://arxiv.org/abs/2110.03445},
  eprinttype    = {arXiv},
  eprint       = {2110.03445},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2110-03445.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZhangJZT20,
  author       = {Hong{-}Li Zhang and
                  Rui Jin and
                  Yu Zhang and
                  Zhihong Tian},
  title        = {A Public Psychological Pressure Index for Social Networks},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {23457--23469},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.2969270},
  doi          = {10.1109/ACCESS.2020.2969270},
  timestamp    = {Tue, 03 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/ZhangJZT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/GuHZWZT20,
  author       = {Zhaoquan Gu and
                  Weixiong Hu and
                  Chuanjing Zhang and
                  Le Wang and
                  Chunsheng Zhu and
                  Zhihong Tian},
  title        = {Restricted Region Based Iterative Gradient Method for Non-Targeted
                  Attack},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {25262--25271},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.2971004},
  doi          = {10.1109/ACCESS.2020.2971004},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/GuHZWZT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/LuoYLWFZT20,
  author       = {Xi Luo and
                  Lihua Yin and
                  Chao Li and
                  Chonghua Wang and
                  Fuyang Fang and
                  Chunsheng Zhu and
                  Zhihong Tian},
  title        = {A Lightweight Privacy-Preserving Communication Protocol for Heterogeneous
                  IoT Environment},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {67192--67204},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.2978525},
  doi          = {10.1109/ACCESS.2020.2978525},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/LuoYLWFZT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amc/LiZWTLW20,
  author       = {Shudong Li and
                  Dawei Zhao and
                  Xiaobo Wu and
                  Zhihong Tian and
                  Aiping Li and
                  Zhen Wang},
  title        = {Functional immunization of networks based on message passing},
  journal      = {Appl. Math. Comput.},
  volume       = {366},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.amc.2019.124728},
  doi          = {10.1016/J.AMC.2019.124728},
  timestamp    = {Fri, 06 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/amc/LiZWTLW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/ChenQDYT20,
  author       = {Yuanyuan Chen and
                  Jing Qiu and
                  Xiaojiang Du and
                  Lihua Yin and
                  Zhihong Tian},
  title        = {Security of Mobile Multimedia Data: The Adversarial Examples for Spatio-temporal
                  Data},
  journal      = {Comput. Networks},
  volume       = {181},
  pages        = {107432},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.comnet.2020.107432},
  doi          = {10.1016/J.COMNET.2020.107432},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/ChenQDYT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ShafiqTBDG20,
  author       = {Muhammad Shafiq and
                  Zhihong Tian and
                  Ali Kashif Bashir and
                  Xiaojiang Du and
                  Mohsen Guizani},
  title        = {IoT malicious traffic identification using wrapper-based feature selection
                  mechanisms},
  journal      = {Comput. Secur.},
  volume       = {94},
  pages        = {101863},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101863},
  doi          = {10.1016/J.COSE.2020.101863},
  timestamp    = {Tue, 26 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/ShafiqTBDG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SunYLZLT20,
  author       = {Zhe Sun and
                  Lihua Yin and
                  Chao Li and
                  Weizhe Zhang and
                  Ang Li and
                  Zhihong Tian},
  title        = {The QoS and privacy trade-off of adversarial deep learning: An evolutionary
                  game approach},
  journal      = {Comput. Secur.},
  volume       = {96},
  pages        = {101876},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101876},
  doi          = {10.1016/J.COSE.2020.101876},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SunYLZLT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ett/ChenHJZLST20,
  author       = {Weixiang Chen and
                  Xiaohan Helu and
                  Chengjie Jin and
                  Man Zhang and
                  Hui Lu and
                  Yanbin Sun and
                  Zhihong Tian},
  title        = {Advanced persistent threat organization identification based on software
                  gene of malware},
  journal      = {Trans. Emerg. Telecommun. Technol.},
  volume       = {31},
  number       = {12},
  year         = {2020},
  url          = {https://doi.org/10.1002/ett.3884},
  doi          = {10.1002/ETT.3884},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ett/ChenHJZLST20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/ShafiqTSDG20,
  author       = {Muhammad Shafiq and
                  Zhihong Tian and
                  Yanbin Sun and
                  Xiaojiang Du and
                  Mohsen Guizani},
  title        = {Selection of effective machine learning algorithm and Bot-IoT attacks
                  traffic identification for internet of things in smart city},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {107},
  pages        = {433--442},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.future.2020.02.017},
  doi          = {10.1016/J.FUTURE.2020.02.017},
  timestamp    = {Tue, 26 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/ShafiqTSDG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/YinFGST20,
  author       = {Lihua Yin and
                  Binxing Fang and
                  Yunchuan Guo and
                  Zhe Sun and
                  Zhihong Tian},
  title        = {Hierarchically defining Internet of Things security: From {CIA} to
                  {CACA}},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {16},
  number       = {1},
  year         = {2020},
  url          = {https://doi.org/10.1177/1550147719899374},
  doi          = {10.1177/1550147719899374},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdsn/YinFGST20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/ZhangSZQT20,
  author       = {Yang Zhang and
                  Shixin Sun and
                  Dongwen Zhang and
                  Jing Qiu and
                  Zhihong Tian},
  title        = {A consistency-guaranteed approach for Internet of Things \emph{software
                  refactoring}},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {16},
  number       = {1},
  year         = {2020},
  url          = {https://doi.org/10.1177/1550147720901680},
  doi          = {10.1177/1550147720901680},
  timestamp    = {Fri, 30 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdsn/ZhangSZQT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/SunJHLZT20,
  author       = {Haitao Sun and
                  Chengjie Jin and
                  Xiaohan Helu and
                  Hui Lu and
                  Man Zhang and
                  Zhihong Tian},
  title        = {Research on android infiltration technology based on the silent installation
                  of an accessibility service},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {16},
  number       = {2},
  year         = {2020},
  url          = {https://doi.org/10.1177/1550147720903628},
  doi          = {10.1177/1550147720903628},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdsn/SunJHLZT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/inffus/XuTLKTS20,
  author       = {Dongliang Xu and
                  Zhihong Tian and
                  Rufeng Lai and
                  Xiangtao Kong and
                  Zhiyuan Tan and
                  Wei Shi},
  title        = {Deep learning based emotion analysis of microblog texts},
  journal      = {Inf. Fusion},
  volume       = {64},
  pages        = {1--11},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.inffus.2020.06.002},
  doi          = {10.1016/J.INFFUS.2020.06.002},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/inffus/XuTLKTS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/TianGSQ20,
  author       = {Zhihong Tian and
                  Xiangsong Gao and
                  Shen Su and
                  Jing Qiu},
  title        = {Vcash: {A} Novel Reputation Framework for Identifying Denial of Traffic
                  Service in Internet of Connected Vehicles},
  journal      = {{IEEE} Internet Things J.},
  volume       = {7},
  number       = {5},
  pages        = {3901--3909},
  year         = {2020},
  url          = {https://doi.org/10.1109/JIOT.2019.2951620},
  doi          = {10.1109/JIOT.2019.2951620},
  timestamp    = {Fri, 30 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/TianGSQ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/QiuTDZSF20,
  author       = {Jing Qiu and
                  Zhihong Tian and
                  Chunlai Du and
                  Qi Zuo and
                  Shen Su and
                  Binxing Fang},
  title        = {A Survey on Access Control in the Age of Internet of Things},
  journal      = {{IEEE} Internet Things J.},
  volume       = {7},
  number       = {6},
  pages        = {4682--4696},
  year         = {2020},
  url          = {https://doi.org/10.1109/JIOT.2020.2969326},
  doi          = {10.1109/JIOT.2020.2969326},
  timestamp    = {Fri, 30 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/QiuTDZSF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/LiSLMT20,
  author       = {Mohan Li and
                  Yanbin Sun and
                  Hui Lu and
                  Sabita Maharjan and
                  Zhihong Tian},
  title        = {Deep Reinforcement Learning for Partially Observable Data Poisoning
                  Attack in Crowdsensing Systems},
  journal      = {{IEEE} Internet Things J.},
  volume       = {7},
  number       = {7},
  pages        = {6266--6278},
  year         = {2020},
  url          = {https://doi.org/10.1109/JIOT.2019.2962914},
  doi          = {10.1109/JIOT.2019.2962914},
  timestamp    = {Fri, 07 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/LiSLMT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/JiWTFRWS20,
  author       = {Tiantian Ji and
                  Zhongru Wang and
                  Zhihong Tian and
                  Binxing Fang and
                  Qiang Ruan and
                  Haichen Wang and
                  Wei Shi},
  title        = {AFLPro: Direction sensitive fuzzing},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {54},
  pages        = {102497},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102497},
  doi          = {10.1016/J.JISA.2020.102497},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/JiWTFRWS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jifs/HanT20,
  author       = {Jie Han and
                  Zhihong Tian},
  title        = {The effect of trade creation in China-Asean free trade area based
                  on the gravity model},
  journal      = {J. Intell. Fuzzy Syst.},
  volume       = {38},
  number       = {6},
  pages        = {7061--7065},
  year         = {2020},
  url          = {https://doi.org/10.3233/JIFS-179784},
  doi          = {10.3233/JIFS-179784},
  timestamp    = {Wed, 01 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jifs/HanT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpdc/LiuZZWGZT20,
  author       = {Yaping Liu and
                  Shuo Zhang and
                  Haojin Zhu and
                  Peng{-}Jun Wan and
                  Lixin Gao and
                  Yaoxue Zhang and
                  Zhihong Tian},
  title        = {A novel routing verification approach based on blockchain for inter-domain
                  routing in smart metropolitan area networks},
  journal      = {J. Parallel Distributed Comput.},
  volume       = {142},
  pages        = {77--89},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jpdc.2020.04.005},
  doi          = {10.1016/J.JPDC.2020.04.005},
  timestamp    = {Wed, 04 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpdc/LiuZZWGZT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/WangCWLTJZ20,
  author       = {Xiaowei Wang and
                  Maowei Cheng and
                  Yefu Wang and
                  Shaohui Liu and
                  Zhihong Tian and
                  Feng Jiang and
                  Hongjun Zhang},
  title        = {Obstructive sleep apnea detection using ecg-sensor with convolutional
                  neural networks},
  journal      = {Multim. Tools Appl.},
  volume       = {79},
  number       = {23-24},
  pages        = {15813--15827},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11042-018-6161-8},
  doi          = {10.1007/S11042-018-6161-8},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mta/WangCWLTJZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/TianWSQ20,
  author       = {Zhihong Tian and
                  Yuhang Wang and
                  Yanbin Sun and
                  Jing Qiu},
  title        = {Location Privacy Challenges in Mobile Edge Computing: Classification
                  and Exploration},
  journal      = {{IEEE} Netw.},
  volume       = {34},
  number       = {2},
  pages        = {52--56},
  year         = {2020},
  url          = {https://doi.org/10.1109/MNET.001.1900139},
  doi          = {10.1109/MNET.001.1900139},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/network/TianWSQ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/WangTSDG20,
  author       = {Yuhang Wang and
                  Zhihong Tian and
                  Yanbin Sun and
                  Xiaojiang Du and
                  Nadra Guizani},
  title        = {Preserving Location Privacy in {UASN} through Collaboration and Semantic
                  Encapsulation},
  journal      = {{IEEE} Netw.},
  volume       = {34},
  number       = {4},
  pages        = {284--290},
  year         = {2020},
  url          = {https://doi.org/10.1109/MNET.001.1900534},
  doi          = {10.1109/MNET.001.1900534},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/network/WangTSDG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/SunTLZG20,
  author       = {Yanbin Sun and
                  Zhihong Tian and
                  Mohan Li and
                  Chunsheng Zhu and
                  Nadra Guizani},
  title        = {Automated Attack and Defense Framework toward 5G Security},
  journal      = {{IEEE} Netw.},
  volume       = {34},
  number       = {5},
  pages        = {247--253},
  year         = {2020},
  url          = {https://doi.org/10.1109/MNET.011.1900635},
  doi          = {10.1109/MNET.011.1900635},
  timestamp    = {Fri, 02 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/network/SunTLZG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/GuCTWDG20,
  author       = {Zhaoquan Gu and
                  Zhen Cao and
                  Zhihong Tian and
                  Yuexuan Wang and
                  Xiaojiang Du and
                  Mohsen Guizani},
  title        = {A Low-Latency and Energy-Efficient Neighbor Discovery Algorithm for
                  Wireless Sensor Networks},
  journal      = {Sensors},
  volume       = {20},
  number       = {3},
  pages        = {657},
  year         = {2020},
  url          = {https://doi.org/10.3390/s20030657},
  doi          = {10.3390/S20030657},
  timestamp    = {Sat, 30 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/GuCTWDG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcss/QiuCTDG20,
  author       = {Jing Qiu and
                  Yuhan Chai and
                  Zhihong Tian and
                  Xiaojiang Du and
                  Mohsen Guizani},
  title        = {Automatic Concept Extraction Based on Semantic Graphs From Big Data
                  in Smart City},
  journal      = {{IEEE} Trans. Comput. Soc. Syst.},
  volume       = {7},
  number       = {1},
  pages        = {225--233},
  year         = {2020},
  url          = {https://doi.org/10.1109/TCSS.2019.2946181},
  doi          = {10.1109/TCSS.2019.2946181},
  timestamp    = {Fri, 30 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcss/QiuCTDG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdasci/TianLLSSZ20,
  author       = {Zhihong Tian and
                  Chaochao Luo and
                  Hui Lu and
                  Shen Su and
                  Yanbin Sun and
                  Man Zhang},
  title        = {User and Entity Behavior Analysis under Urban Big Data},
  journal      = {Trans. Data Sci.},
  volume       = {1},
  number       = {3},
  pages        = {16:1--16:19},
  year         = {2020},
  url          = {https://doi.org/10.1145/3374749},
  doi          = {10.1145/3374749},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdasci/TianLLSSZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/TianLQDG20,
  author       = {Zhihong Tian and
                  Chaochao Luo and
                  Jing Qiu and
                  Xiaojiang Du and
                  Mohsen Guizani},
  title        = {A Distributed Deep Learning System for Web Attack Detection on Edge
                  Devices},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {16},
  number       = {3},
  pages        = {1963--1971},
  year         = {2020},
  url          = {https://doi.org/10.1109/TII.2019.2938778},
  doi          = {10.1109/TII.2019.2938778},
  timestamp    = {Fri, 30 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tii/TianLQDG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/QiuDZST20,
  author       = {Jing Qiu and
                  Lei Du and
                  Dongwen Zhang and
                  Shen Su and
                  Zhihong Tian},
  title        = {Nei-TTE: Intelligent Traffic Time Estimation Based on Fine-Grained
                  Time Derivation of Road Segments for Smart City},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {16},
  number       = {4},
  pages        = {2659--2666},
  year         = {2020},
  url          = {https://doi.org/10.1109/TII.2019.2943906},
  doi          = {10.1109/TII.2019.2943906},
  timestamp    = {Fri, 30 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tii/QiuDZST20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tist/PanHLZLSLTL20,
  author       = {Menghai Pan and
                  Weixiao Huang and
                  Yanhua Li and
                  Xun Zhou and
                  Zhenming Liu and
                  Rui Song and
                  Hui Lu and
                  Zhihong Tian and
                  Jun Luo},
  title        = {{DHPA:} Dynamic Human Preference Analytics Framework: {A} Case Study
                  on Taxi Drivers' Learning Curve Analysis},
  journal      = {{ACM} Trans. Intell. Syst. Technol.},
  volume       = {11},
  number       = {1},
  pages        = {8:1--8:19},
  year         = {2020},
  url          = {https://doi.org/10.1145/3360312},
  doi          = {10.1145/3360312},
  timestamp    = {Mon, 02 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tist/PanHLZLSLTL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tomccap/GrigorevLTXRJ20,
  author       = {Aleksei Grigorev and
                  Shaohui Liu and
                  Zhihong Tian and
                  Jianxin Xiong and
                  Seungmin Rho and
                  Feng Jiang},
  title        = {Delving Deeper in Drone-Based Person Re-Id by Employing Deep Decision
                  Forest and Attributes Fusion},
  journal      = {{ACM} Trans. Multim. Comput. Commun. Appl.},
  volume       = {16},
  number       = {1s},
  pages        = {25:1--25:15},
  year         = {2020},
  url          = {https://doi.org/10.1145/3360050},
  doi          = {10.1145/3360050},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tomccap/GrigorevLTXRJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsusc/JiangFGLRLMT20,
  author       = {Feng Jiang and
                  Yunsheng Fu and
                  Brij B. Gupta and
                  Yongsheng Liang and
                  Seungmin Rho and
                  Fang Lou and
                  Fanzhi Meng and
                  Zhihong Tian},
  title        = {Deep Learning Based Multi-Channel Intelligent Attack Detection for
                  Data Security},
  journal      = {{IEEE} Trans. Sustain. Comput.},
  volume       = {5},
  number       = {2},
  pages        = {204--212},
  year         = {2020},
  url          = {https://doi.org/10.1109/TSUSC.2018.2793284},
  doi          = {10.1109/TSUSC.2018.2793284},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsusc/JiangFGLRLMT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/vtm/QiuDCTDG20,
  author       = {Jing Qiu and
                  Lei Du and
                  Yuanyuan Chen and
                  Zhihong Tian and
                  Xiaojiang Du and
                  Mohsen Guizani},
  title        = {Artificial Intelligence Security in 5G Networks: Adversarial Examples
                  for Estimating a Travel Time Task},
  journal      = {{IEEE} Veh. Technol. Mag.},
  volume       = {15},
  number       = {3},
  pages        = {95--100},
  year         = {2020},
  url          = {https://doi.org/10.1109/MVT.2020.3002487},
  doi          = {10.1109/MVT.2020.3002487},
  timestamp    = {Tue, 01 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/vtm/QiuDCTDG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wc/SuTLLDG20,
  author       = {Shen Su and
                  Zhihong Tian and
                  Siyu Liang and
                  Shuang Li and
                  Sha{-}sha Du and
                  Nadra Guizani},
  title        = {A Reputation Management Scheme for Efficient Malicious Vehicle Identification
                  over 5G Networks},
  journal      = {{IEEE} Wirel. Commun.},
  volume       = {27},
  number       = {3},
  pages        = {46--52},
  year         = {2020},
  url          = {https://doi.org/10.1109/MWC.001.1900456},
  doi          = {10.1109/MWC.001.1900456},
  timestamp    = {Tue, 30 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wc/SuTLLDG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/ShafiqTBCT20,
  author       = {Muhammad Shafiq and
                  Zhihong Tian and
                  Ali Kashif Bashir and
                  Korhan Cengiz and
                  Adnan Tahir},
  title        = {SoftSystem: Smart Edge Computing Device Selection Method for IoT Based
                  on Soft Set Technique},
  journal      = {Wirel. Commun. Mob. Comput.},
  volume       = {2020},
  pages        = {8864301:1--8864301:10},
  year         = {2020},
  url          = {https://doi.org/10.1155/2020/8864301},
  doi          = {10.1155/2020/8864301},
  timestamp    = {Tue, 26 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/wicomm/ShafiqTBCT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/www/HanTHLJ20,
  author       = {Weihong Han and
                  Zhihong Tian and
                  Zizhong Huang and
                  Shudong Li and
                  Yan Jia},
  title        = {Topic representation model based on microblogging behavior analysis},
  journal      = {World Wide Web},
  volume       = {23},
  number       = {6},
  pages        = {3083--3097},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11280-020-00822-x},
  doi          = {10.1007/S11280-020-00822-X},
  timestamp    = {Sat, 07 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/www/HanTHLJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ciat/FanLHWGT20,
  author       = {Meihua Fan and
                  Shudong Li and
                  Weihong Han and
                  Xiaobo Wu and
                  Zhaoquan Gu and
                  Zhihong Tian},
  editor       = {Zhihong Tian and
                  Lihua Yin and
                  Zhaoquan Gu},
  title        = {A Novel Malware Detection Framework Based on Weighted Heterograph},
  booktitle    = {{CIAT} 2020: International Conference on Cyberspace Innovation of
                  Advanced Technologies, Virtual Event / Guangzhou, China, December
                  5, 2020},
  pages        = {39--43},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3444370.3444545},
  doi          = {10.1145/3444370.3444545},
  timestamp    = {Thu, 21 Jan 2021 16:32:07 +0100},
  biburl       = {https://dblp.org/rec/conf/ciat/FanLHWGT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ciat/HuangTSJ20,
  author       = {Dongqiu Huang and
                  Zhihong Tian and
                  Shen Su and
                  Yu Jiang},
  editor       = {Zhihong Tian and
                  Lihua Yin and
                  Zhaoquan Gu},
  title        = {A defense scheme of voice control system against DolphinAttack},
  booktitle    = {{CIAT} 2020: International Conference on Cyberspace Innovation of
                  Advanced Technologies, Virtual Event / Guangzhou, China, December
                  5, 2020},
  pages        = {136--142},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3444370.3444560},
  doi          = {10.1145/3444370.3444560},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ciat/HuangTSJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciot3/LiuHJLTDA20,
  author       = {Hanwen Liu and
                  Xiaohan Helu and
                  Chengjie Jin and
                  Hui Lu and
                  Zhihong Tian and
                  Xiaojiang Du and
                  Khalid Abualsaud},
  title        = {A Malware Detection Method for Health Sensor Data Based on Machine
                  Learning},
  booktitle    = {{IEEE} International Conference on Informatics, IoT, and Enabling
                  Technologies, ICIoT 2020, Doha, Qatar, February 2-5, 2020},
  pages        = {277--282},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ICIoT48696.2020.9089478},
  doi          = {10.1109/ICIOT48696.2020.9089478},
  timestamp    = {Fri, 07 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iciot3/LiuHJLTDA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/SunYSTD20,
  author       = {Yan Sun and
                  Lihua Yin and
                  Zhe Sun and
                  Zhihong Tian and
                  Xiaojiang Du},
  title        = {An IoT data sharing privacy preserving scheme},
  booktitle    = {39th {IEEE} Conference on Computer Communications, {INFOCOM} Workshops
                  2020, Toronto, ON, Canada, July 6-9, 2020},
  pages        = {984--990},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/INFOCOMWKSHPS50562.2020.9162939},
  doi          = {10.1109/INFOCOMWKSHPS50562.2020.9162939},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/SunYSTD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwcmc/ChaiQSZYT20,
  author       = {Yuhan Chai and
                  Jing Qiu and
                  Shen Su and
                  Chunsheng Zhu and
                  Lihua Yin and
                  Zhihong Tian},
  title        = {LGMal: {A} Joint Framework Based on Local and Global Features for
                  Malware Detection},
  booktitle    = {16th International Wireless Communications and Mobile Computing Conference,
                  {IWCMC} 2020, Limassol, Cyprus, June 15-19, 2020},
  pages        = {463--468},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/IWCMC48107.2020.9148289},
  doi          = {10.1109/IWCMC48107.2020.9148289},
  timestamp    = {Fri, 30 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwcmc/ChaiQSZYT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smc/WengGDTGQ20,
  author       = {Jinta Weng and
                  Wensheng Gan and
                  Guozhu Ding and
                  Zhihong Tian and
                  Ying Gao and
                  Jing Qiu},
  title        = {{SESM:} Emotional Social Semantic and Time Series Analysis of Learners'
                  Comments},
  booktitle    = {2020 {IEEE} International Conference on Systems, Man, and Cybernetics,
                  {SMC} 2020, Toronto, ON, Canada, October 11-14, 2020},
  pages        = {4134--4139},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SMC42975.2020.9283241},
  doi          = {10.1109/SMC42975.2020.9283241},
  timestamp    = {Tue, 30 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/smc/WengGDTGQ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/YangLZLTL20,
  author       = {Mingzhou Yang and
                  Yanhua Li and
                  Xun Zhou and
                  Hui Lu and
                  Zhihong Tian and
                  Jun Luo},
  editor       = {Yennun Huang and
                  Irwin King and
                  Tie{-}Yan Liu and
                  Maarten van Steen},
  title        = {Inferring Passengers' Interactive Choices on Public Transits via {MA-AL:}
                  Multi-Agent Apprenticeship Learning},
  booktitle    = {{WWW} '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020},
  pages        = {1637--1647},
  publisher    = {{ACM} / {IW3C2}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3366423.3380235},
  doi          = {10.1145/3366423.3380235},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/www/YangLZLTL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ciat/2020,
  editor       = {Zhihong Tian and
                  Lihua Yin and
                  Zhaoquan Gu},
  title        = {{CIAT} 2020: International Conference on Cyberspace Innovation of
                  Advanced Technologies, Virtual Event / Guangzhou, China, December
                  5, 2020},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3444370},
  doi          = {10.1145/3444370},
  isbn         = {978-1-4503-8782-8},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ciat/2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/SunTWLSWF19,
  author       = {Yanbin Sun and
                  Zhihong Tian and
                  Yuhang Wang and
                  Mohan Li and
                  Shen Su and
                  Xianzhi Wang and
                  Dunqiu Fan},
  title        = {Lightweight Anonymous Geometric Routing for Internet of Things},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {29754--29762},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2902621},
  doi          = {10.1109/ACCESS.2019.2902621},
  timestamp    = {Fri, 12 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/SunTWLSWF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/HanTHHJ19,
  author       = {Weihong Han and
                  Zhihong Tian and
                  Zizhong Huang and
                  Dongqiu Huang and
                  Yan Jia},
  title        = {Quantitative Assessment of Wireless Connected Intelligent Robot Swarms
                  Network Security Situation},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {134293--134300},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2940822},
  doi          = {10.1109/ACCESS.2019.2940822},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/HanTHHJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/WangTGL19,
  author       = {Le Wang and
                  Zhihong Tian and
                  Zhaoquan Gu and
                  Hui Lu},
  title        = {Crowdsourcing Approach for Developing Hands-On Experiments in Cybersecurity
                  Education},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {169066--169072},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2952585},
  doi          = {10.1109/ACCESS.2019.2952585},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/WangTGL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/LuHJSZT19,
  author       = {Hui Lu and
                  Xiaohan Helu and
                  Chengjie Jin and
                  Yanbin Sun and
                  Man Zhang and
                  Zhihong Tian},
  title        = {Salaxy: Enabling {USB} Debugging Mode Automatically to Control Android
                  Devices},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {178321--178330},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2958837},
  doi          = {10.1109/ACCESS.2019.2958837},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/LuHJSZT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amc/XuDGSTWGN19,
  author       = {Jiwei Xu and
                  Zhenghong Deng and
                  Bo Gao and
                  Qun Song and
                  Zhihong Tian and
                  Qiuling Wang and
                  Mingyu Gao and
                  Zhenxi Niu},
  title        = {Popularity-driven strategy updating rule promotes cooperation in the
                  spatial prisoner's dilemma game},
  journal      = {Appl. Math. Comput.},
  volume       = {353},
  pages        = {82--87},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.amc.2019.01.060},
  doi          = {10.1016/J.AMC.2019.01.060},
  timestamp    = {Wed, 10 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/amc/XuDGSTWGN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/TianSSDGY19,
  author       = {Zhihong Tian and
                  Shen Su and
                  Wei Shi and
                  Xiaojiang Du and
                  Mohsen Guizani and
                  Xiang Yu},
  title        = {A data-driven method for future Internet route decision modeling},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {95},
  pages        = {212--220},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.future.2018.12.054},
  doi          = {10.1016/J.FUTURE.2018.12.054},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/TianSSDGY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijon/XuRTW19,
  author       = {Xiongrui Xu and
                  Zhihai Rong and
                  Zhihong Tian and
                  Zhi{-}Xi Wu},
  title        = {Timescale diversity facilitates the emergence of cooperation-extortion
                  alliances in networked systems},
  journal      = {Neurocomputing},
  volume       = {350},
  pages        = {195--201},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.neucom.2019.03.057},
  doi          = {10.1016/J.NEUCOM.2019.03.057},
  timestamp    = {Fri, 05 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijon/XuRTW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/TanGSWFT19,
  author       = {Qingfeng Tan and
                  Yue Gao and
                  Jinqiao Shi and
                  Xuebin Wang and
                  Binxing Fang and
                  Zhihong Tian},
  title        = {Toward a Comprehensive Insight Into the Eclipse Attacks of Tor Hidden
                  Services},
  journal      = {{IEEE} Internet Things J.},
  volume       = {6},
  number       = {2},
  pages        = {1584--1593},
  year         = {2019},
  url          = {https://doi.org/10.1109/JIOT.2018.2846624},
  doi          = {10.1109/JIOT.2018.2846624},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/TanGSWFT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/LiHLLTY19,
  author       = {Bo Li and
                  Yanyu Huang and
                  Zheli Liu and
                  Jin Li and
                  Zhihong Tian and
                  Siu{-}Ming Yiu},
  title        = {HybridORAM: Practical oblivious cloud storage with constant bandwidth},
  journal      = {Inf. Sci.},
  volume       = {479},
  pages        = {651--663},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ins.2018.02.019},
  doi          = {10.1016/J.INS.2018.02.019},
  timestamp    = {Thu, 01 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/LiHLLTY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/TianLQSS19,
  author       = {Zhihong Tian and
                  Mohan Li and
                  Meikang Qiu and
                  Yanbin Sun and
                  Shen Su},
  title        = {Block-DEF: {A} secure digital evidence framework using blockchain},
  journal      = {Inf. Sci.},
  volume       = {491},
  pages        = {151--165},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ins.2019.04.011},
  doi          = {10.1016/J.INS.2019.04.011},
  timestamp    = {Fri, 31 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/TianLQSS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jaihc/ChenTCYW19,
  author       = {Juan Chen and
                  Zhihong Tian and
                  Xiang Cui and
                  Lihua Yin and
                  Xianzhi Wang},
  title        = {Trust architecture and reputation evaluation for internet of things},
  journal      = {J. Ambient Intell. Humaniz. Comput.},
  volume       = {10},
  number       = {8},
  pages        = {3099--3107},
  year         = {2019},
  url          = {https://doi.org/10.1007/s12652-018-0887-z},
  doi          = {10.1007/S12652-018-0887-Z},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jaihc/ChenTCYW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/HanTHLJ19,
  author       = {Weihong Han and
                  Zhihong Tian and
                  Zizhong Huang and
                  Shudong Li and
                  Yan Jia},
  title        = {Bidirectional self-adaptive resampling in internet of things big data
                  learning},
  journal      = {Multim. Tools Appl.},
  volume       = {78},
  number       = {21},
  pages        = {30111--30126},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11042-018-6938-9},
  doi          = {10.1007/S11042-018-6938-9},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/HanTHLJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/GuWSTRL19,
  author       = {Zhaoquan Gu and
                  Yuexuan Wang and
                  Wei Shi and
                  Zhihong Tian and
                  Kui Ren and
                  Francis C. M. Lau},
  title        = {A Practical Neighbor Discovery Framework for Wireless Sensor Networks},
  journal      = {Sensors},
  volume       = {19},
  number       = {8},
  pages        = {1887},
  year         = {2019},
  url          = {https://doi.org/10.3390/s19081887},
  doi          = {10.3390/S19081887},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/GuWSTRL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/HanTSHL19,
  author       = {Weihong Han and
                  Zhihong Tian and
                  Wei Shi and
                  Zizhong Huang and
                  Shudong Li},
  title        = {Low-Power Distributed Data Flow Anomaly-Monitoring Technology for
                  Industrial Internet of Things},
  journal      = {Sensors},
  volume       = {19},
  number       = {12},
  pages        = {2804},
  year         = {2019},
  url          = {https://doi.org/10.3390/s19122804},
  doi          = {10.3390/S19122804},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/HanTSHL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/WangTZSS19,
  author       = {Yuhang Wang and
                  Zhihong Tian and
                  Hongli Zhang and
                  Shen Su and
                  Wei Shi},
  title        = {Erratum: Wang, Y. et al., {A} Privacy Preserving Scheme for Nearest
                  Neighbor Query. \emph{Sensors} 2018, \emph{18}, 2440},
  journal      = {Sensors},
  volume       = {19},
  number       = {14},
  pages        = {3187},
  year         = {2019},
  url          = {https://doi.org/10.3390/s19143187},
  doi          = {10.3390/S19143187},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/WangTZSS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/WangZTRLWLLFS19,
  author       = {Zhongru Wang and
                  Yuntao Zhang and
                  Zhihong Tian and
                  Qiang Ruan and
                  Tong Liu and
                  Haichen Wang and
                  Zhehui Liu and
                  Jiayi Lin and
                  Binxing Fang and
                  Wei Shi},
  title        = {Automated Vulnerability Discovery and Exploitation in the Internet
                  of Things},
  journal      = {Sensors},
  volume       = {19},
  number       = {15},
  pages        = {3362},
  year         = {2019},
  url          = {https://doi.org/10.3390/s19153362},
  doi          = {10.3390/S19153362},
  timestamp    = {Wed, 26 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/WangZTRLWLLFS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/LiGDHYT19,
  author       = {Hao Li and
                  Zhaoquan Gu and
                  Lianbing Deng and
                  Yi Han and
                  Cheng Yang and
                  Zhihong Tian},
  title        = {A Fine-Grained Video Encryption Service Based on the Cloud-Fog-Local
                  Architecture for Public and Private Videos},
  journal      = {Sensors},
  volume       = {19},
  number       = {24},
  pages        = {5366},
  year         = {2019},
  url          = {https://doi.org/10.3390/s19245366},
  doi          = {10.3390/S19245366},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/LiGDHYT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/TianSWZDSSG19,
  author       = {Zhihong Tian and
                  Wei Shi and
                  Yuhang Wang and
                  Chunsheng Zhu and
                  Xiaojiang Du and
                  Shen Su and
                  Yanbin Sun and
                  Nadra Guizani},
  title        = {Real-Time Lateral Movement Detection Based on Evidence Reasoning Network
                  for Edge Computing Environment},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {15},
  number       = {7},
  pages        = {4285--4294},
  year         = {2019},
  url          = {https://doi.org/10.1109/TII.2019.2907754},
  doi          = {10.1109/TII.2019.2907754},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tii/TianSWZDSSG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/TianGSQDG19,
  author       = {Zhihong Tian and
                  Xiangsong Gao and
                  Shen Su and
                  Jing Qiu and
                  Xiaojiang Du and
                  Mohsen Guizani},
  title        = {Evaluating Reputation Management Schemes of Internet of Vehicles Based
                  on Evolutionary Game Theory},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {68},
  number       = {6},
  pages        = {5971--5980},
  year         = {2019},
  url          = {https://doi.org/10.1109/TVT.2019.2910217},
  doi          = {10.1109/TVT.2019.2910217},
  timestamp    = {Fri, 30 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/TianGSQDG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gis/ZhangL0RHLTLTLL19,
  author       = {Cong Zhang and
                  Yanhua Li and
                  Jie Bao and
                  Sijie Ruan and
                  Tianfu He and
                  Hui Lu and
                  Zhihong Tian and
                  Cong Liu and
                  Chao Tian and
                  Jianfeng Lin and
                  Xianen Li},
  editor       = {Farnoush Banaei Kashani and
                  Goce Trajcevski and
                  Ralf Hartmut G{\"{u}}ting and
                  Lars Kulik and
                  Shawn D. Newsam},
  title        = {Effective Recycling Planning for Dockless Sharing Bikes},
  booktitle    = {Proceedings of the 27th {ACM} {SIGSPATIAL} International Conference
                  on Advances in Geographic Information Systems, {SIGSPATIAL} 2019,
                  Chicago, IL, USA, November 5-8, 2019},
  pages        = {62--70},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3347146.3359340},
  doi          = {10.1145/3347146.3359340},
  timestamp    = {Sat, 09 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gis/ZhangL0RHLTLTLL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/ZhangSTYQD19,
  author       = {Dongwen Zhang and
                  Yaqi Si and
                  Zhihong Tian and
                  Lihua Yin and
                  Jing Qiu and
                  Xiaojiang Du},
  title        = {A Genetic-Algorithm Based Method for Storage Location Assignments
                  in Mobile Rack Warehouses},
  booktitle    = {2019 {IEEE} Global Communications Conference, {GLOBECOM} 2019, Waikoloa,
                  HI, USA, December 9-13, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/GLOBECOM38437.2019.9013447},
  doi          = {10.1109/GLOBECOM38437.2019.9013447},
  timestamp    = {Fri, 30 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/ZhangSTYQD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/WangTSSZ19,
  author       = {Yuhang Wang and
                  Zhihong Tian and
                  Shen Su and
                  Yanbin Sun and
                  Chunsheng Zhu},
  title        = {Preserving Location Privacy in Mobile Edge Computing},
  booktitle    = {2019 {IEEE} International Conference on Communications, {ICC} 2019,
                  Shanghai, China, May 20-24, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICC.2019.8761370},
  doi          = {10.1109/ICC.2019.8761370},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/WangTSSZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwcmc/ShenGWTSZ19,
  author       = {Zheng Shen and
                  Zhaoquan Gu and
                  Yuexuan Wang and
                  Zhihong Tian and
                  Mingli Song and
                  Chunsheng Zhu},
  title        = {Can the Max-Min Fairness-Based Coalitional Mechanism in Competitive
                  Networks be Trustful?},
  booktitle    = {15th International Wireless Communications {\&} Mobile Computing
                  Conference, {IWCMC} 2019, Tangier, Morocco, June 24-28, 2019},
  pages        = {348--353},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/IWCMC.2019.8766678},
  doi          = {10.1109/IWCMC.2019.8766678},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/iwcmc/ShenGWTSZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1902-03994,
  author       = {Zhihong Tian and
                  Shen Su and
                  Xiang Yu and
                  Yuhang Wang and
                  Hongli Zhang and
                  Xiaojiang Du and
                  Mohsen Guizani},
  title        = {Vcash: {A} Novel Reputation Framework for Identifying Denial of Traffic
                  Service in Internet of Connected Vehicles},
  journal      = {CoRR},
  volume       = {abs/1902.03994},
  year         = {2019},
  url          = {http://arxiv.org/abs/1902.03994},
  eprinttype    = {arXiv},
  eprint       = {1902.03994},
  timestamp    = {Tue, 21 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1902-03994.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1902-04009,
  author       = {Zhihong Tian and
                  Yanbin Sun and
                  Shen Su and
                  Mohan Li and
                  Xiaojiang Du and
                  Mohsen Guizani},
  title        = {Automated Attack and Defense Framework for 5G Security on Physical
                  and Logical Layers},
  journal      = {CoRR},
  volume       = {abs/1902.04009},
  year         = {2019},
  url          = {http://arxiv.org/abs/1902.04009},
  eprinttype    = {arXiv},
  eprint       = {1902.04009},
  timestamp    = {Tue, 21 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1902-04009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1902-04387,
  author       = {Zhihong Tian and
                  Wei Shi and
                  Yuhang Wang and
                  Chunsheng Zhu and
                  Xiaojiang Du and
                  Shen Su and
                  Yanbin Sun and
                  Nadra Guizani},
  title        = {Real Time Lateral Movement Detection based on Evidence Reasoning Network
                  for Edge Computing Environment},
  journal      = {CoRR},
  volume       = {abs/1902.04387},
  year         = {2019},
  url          = {http://arxiv.org/abs/1902.04387},
  eprinttype    = {arXiv},
  eprint       = {1902.04387},
  timestamp    = {Fri, 25 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1902-04387.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1902-04667,
  author       = {Zhihong Tian and
                  Xiangsong Gao and
                  Shen Su and
                  Jing Qiu and
                  Xiaojiang Du and
                  Mohsen Guizani},
  title        = {Evaluating Reputation Management Schemes of Internet of Vehicles based
                  on Evolutionary Game Theory},
  journal      = {CoRR},
  volume       = {abs/1902.04667},
  year         = {2019},
  url          = {http://arxiv.org/abs/1902.04667},
  eprinttype    = {arXiv},
  eprint       = {1902.04667},
  timestamp    = {Fri, 30 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1902-04667.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1911-12101,
  author       = {Keke Tang and
                  Peng Song and
                  Yuexin Ma and
                  Zhaoquan Gu and
                  Yu Su and
                  Zhihong Tian and
                  Wenping Wang},
  title        = {Decision Propagation Networks for Image Classification},
  journal      = {CoRR},
  volume       = {abs/1911.12101},
  year         = {2019},
  url          = {http://arxiv.org/abs/1911.12101},
  eprinttype    = {arXiv},
  eprint       = {1911.12101},
  timestamp    = {Tue, 03 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1911-12101.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/TianCASYYC18,
  author       = {Zhihong Tian and
                  Yu Cui and
                  Lun An and
                  Shen Su and
                  Xiaoxia Yin and
                  Lihua Yin and
                  Xiang Cui},
  title        = {A Real-Time Correlation of Host-Level Events in Cyber Range Service
                  for Smart Campus},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {35355--35364},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2846590},
  doi          = {10.1109/ACCESS.2018.2846590},
  timestamp    = {Wed, 27 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/TianCASYYC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/QiuCLGLT18,
  author       = {Jing Qiu and
                  Yuhan Chai and
                  Yan Liu and
                  Zhaoquan Gu and
                  Shudong Li and
                  Zhihong Tian},
  title        = {Automatic Non-Taxonomic Relation Extraction from Big Data in Smart
                  City},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {74854--74864},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2881422},
  doi          = {10.1109/ACCESS.2018.2881422},
  timestamp    = {Fri, 30 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/QiuCLGLT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejivp/ShiL0ZT18,
  author       = {Wuzhen Shi and
                  Shaohui Liu and
                  Feng Jiang and
                  Debin Zhao and
                  Zhihong Tian},
  title        = {Anchored neighborhood deep network for single-image super-resolution},
  journal      = {{EURASIP} J. Image Video Process.},
  volume       = {2018},
  pages        = {34},
  year         = {2018},
  url          = {https://doi.org/10.1186/s13640-018-0269-7},
  doi          = {10.1186/S13640-018-0269-7},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejivp/ShiL0ZT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ress/LiuTHY18,
  author       = {Honglu Liu and
                  Zhihong Tian and
                  Anqiang Huang and
                  Zaili Yang},
  title        = {Analysis of vulnerabilities in maritime supply chains},
  journal      = {Reliab. Eng. Syst. Saf.},
  volume       = {169},
  pages        = {475--484},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.ress.2017.09.018},
  doi          = {10.1016/J.RESS.2017.09.018},
  timestamp    = {Tue, 25 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ress/LiuTHY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/WangT0SS18,
  author       = {Yuhang Wang and
                  Zhihong Tian and
                  Hongli Zhang and
                  Shen Su and
                  Wei Shi},
  title        = {A Privacy Preserving Scheme for Nearest Neighbor Query},
  journal      = {Sensors},
  volume       = {18},
  number       = {8},
  pages        = {2440},
  year         = {2018},
  url          = {https://doi.org/10.3390/s18082440},
  doi          = {10.3390/S18082440},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/WangT0SS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/LiSJT18,
  author       = {Mohan Li and
                  Yanbin Sun and
                  Yu Jiang and
                  Zhihong Tian},
  title        = {Answering the Min-Cost Quality-Aware Query on Multi-Sources in Sensor-Cloud
                  Systems},
  journal      = {Sensors},
  volume       = {18},
  number       = {12},
  pages        = {4486},
  year         = {2018},
  url          = {https://doi.org/10.3390/s18124486},
  doi          = {10.3390/S18124486},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/LiSJT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/YuTQJ18,
  author       = {Xiang Yu and
                  Zhihong Tian and
                  Jing Qiu and
                  Feng Jiang},
  title        = {A Data Leakage Prevention Method Based on the Reduction of Confidential
                  and Context Terms for Smart Mobile Devices},
  journal      = {Wirel. Commun. Mob. Comput.},
  volume       = {2018},
  pages        = {5823439:1--5823439:11},
  year         = {2018},
  url          = {https://doi.org/10.1155/2018/5823439},
  doi          = {10.1155/2018/5823439},
  timestamp    = {Fri, 30 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wicomm/YuTQJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/WangLQTCS18,
  author       = {Zihan Wang and
                  Chaoge Liu and
                  Jing Qiu and
                  Zhihong Tian and
                  Xiang Cui and
                  Shen Su},
  title        = {Automatically Traceback RDP-Based Targeted Ransomware Attacks},
  journal      = {Wirel. Commun. Mob. Comput.},
  volume       = {2018},
  pages        = {7943586:1--7943586:13},
  year         = {2018},
  url          = {https://doi.org/10.1155/2018/7943586},
  doi          = {10.1155/2018/7943586},
  timestamp    = {Fri, 30 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wicomm/WangLQTCS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsc/GuWQYT18,
  author       = {Zhaoquan Gu and
                  Yongcai Wang and
                  Jing Qiu and
                  Lihua Yin and
                  Zhihong Tian},
  title        = {How to Control Target Nodes in Dynamic Networks},
  booktitle    = {Third {IEEE} International Conference on Data Science in Cyberspace,
                  {DSC} 2018, Guangzhou, China, June 18-21, 2018},
  pages        = {266--273},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/DSC.2018.00045},
  doi          = {10.1109/DSC.2018.00045},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsc/GuWQYT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsc/LiWL0TZ18,
  author       = {Shudong Li and
                  Xiaobo Wu and
                  Aiping Li and
                  Bin Zhou and
                  Zhihong Tian and
                  Dawei Zhao},
  title        = {Structural Vulnerability of Complex Networks Under Multiple Edge-Based
                  Attacks},
  booktitle    = {Third {IEEE} International Conference on Data Science in Cyberspace,
                  {DSC} 2018, Guangzhou, China, June 18-21, 2018},
  pages        = {405--409},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/DSC.2018.00065},
  doi          = {10.1109/DSC.2018.00065},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsc/LiWL0TZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsc/FuLMTZJ18,
  author       = {Yunsheng Fu and
                  Fang Lou and
                  Fangzhi Meng and
                  Zhihong Tian and
                  Hua Zhang and
                  Feng Jiang},
  title        = {An Intelligent Network Attack Detection Method Based on {RNN}},
  booktitle    = {Third {IEEE} International Conference on Data Science in Cyberspace,
                  {DSC} 2018, Guangzhou, China, June 18-21, 2018},
  pages        = {483--489},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/DSC.2018.00078},
  doi          = {10.1109/DSC.2018.00078},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsc/FuLMTZJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsc/Wang0ST18,
  author       = {Yuhang Wang and
                  Hongli Zhang and
                  Shen Su and
                  Zhihong Tian},
  title        = {A Location Privacy-Aware Method for kNN Query in Location Based Services},
  booktitle    = {Third {IEEE} International Conference on Data Science in Cyberspace,
                  {DSC} 2018, Guangzhou, China, June 18-21, 2018},
  pages        = {537--541},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/DSC.2018.00086},
  doi          = {10.1109/DSC.2018.00086},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dsc/Wang0ST18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsc/MengLFT18,
  author       = {Fanzhi Meng and
                  Fang Lou and
                  Yunsheng Fu and
                  Zhihong Tian},
  title        = {Deep Learning Based Attribute Classification Insider Threat Detection
                  for Data Security},
  booktitle    = {Third {IEEE} International Conference on Data Science in Cyberspace,
                  {DSC} 2018, Guangzhou, China, June 18-21, 2018},
  pages        = {576--581},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/DSC.2018.00092},
  doi          = {10.1109/DSC.2018.00092},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsc/MengLFT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsc/QiuST18,
  author       = {Jing Qiu and
                  Yaqi Si and
                  Zhihong Tian},
  title        = {Automatic Taxonomy Construction for Eye Colors Data without Using
                  Context Information},
  booktitle    = {Third {IEEE} International Conference on Data Science in Cyberspace,
                  {DSC} 2018, Guangzhou, China, June 18-21, 2018},
  pages        = {837--841},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/DSC.2018.00134},
  doi          = {10.1109/DSC.2018.00134},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsc/QiuST18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/YinLZTC18,
  author       = {Jie Yin and
                  Heyang Lv and
                  Fangjiao Zhang and
                  Zhihong Tian and
                  Xiang Cui},
  editor       = {David Naccache and
                  Shouhuai Xu and
                  Sihan Qing and
                  Pierangela Samarati and
                  Gregory Blanc and
                  Rongxing Lu and
                  Zonghua Zhang and
                  Ahmed Meddahi},
  title        = {Study on Advanced Botnet Based on Publicly Available Resources},
  booktitle    = {Information and Communications Security - 20th International Conference,
                  {ICICS} 2018, Lille, France, October 29-31, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11149},
  pages        = {57--74},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01950-1\_4},
  doi          = {10.1007/978-3-030-01950-1\_4},
  timestamp    = {Sat, 05 Sep 2020 18:01:07 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/YinLZTC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spaccs/LiJST18,
  author       = {Mohan Li and
                  Yu Jiang and
                  Yanbin Sun and
                  Zhihong Tian},
  editor       = {Guojun Wang and
                  Jinjun Chen and
                  Laurence T. Yang},
  title        = {Answering the Min-Cost Quality-Aware Query on Multi-sources in Sensor-Cloud
                  Systems},
  booktitle    = {Security, Privacy, and Anonymity in Computation, Communication, and
                  Storage - 11th International Conference and Satellite Workshops, SpaCCS
                  2018, Melbourne, NSW, Australia, December 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11342},
  pages        = {156--165},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-05345-1\_13},
  doi          = {10.1007/978-3-030-05345-1\_13},
  timestamp    = {Tue, 03 Mar 2020 16:31:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spaccs/LiJST18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsc/ZhangLFT17,
  author       = {Hua Zhang and
                  Fang Lou and
                  Yunsheng Fu and
                  Zhihong Tian},
  title        = {A Conditional Probability Computation Method for Vulnerability Exploitation
                  Based on {CVSS}},
  booktitle    = {Second {IEEE} International Conference on Data Science in Cyberspace,
                  {DSC} 2017, Shenzhen, China, June 26-29, 2017},
  pages        = {238--241},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/DSC.2017.33},
  doi          = {10.1109/DSC.2017.33},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsc/ZhangLFT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijstm/TianL16,
  author       = {Zhihong Tian and
                  Honglu Liu},
  title        = {Evaluation method for node importance in container supply chain network},
  journal      = {Int. J. Serv. Technol. Manag.},
  volume       = {22},
  number       = {3/4/5},
  pages        = {145--161},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJSTM.2016.078534},
  doi          = {10.1504/IJSTM.2016.078534},
  timestamp    = {Thu, 30 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijstm/TianL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itm/TianZG16,
  author       = {Zhihong Tian and
                  Zhenji Zhang and
                  Ruize Gao},
  title        = {Optimization in e-commerce market network based on value order parameter},
  journal      = {Inf. Technol. Manag.},
  volume       = {17},
  number       = {2},
  pages        = {187--197},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10799-015-0244-2},
  doi          = {10.1007/S10799-015-0244-2},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itm/TianZG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsc/ZhangTZ16,
  author       = {Xinxing Zhang and
                  Zhihong Tian and
                  Luchen Zhang},
  title        = {A Measurement Study on Mainline {DHT} and Magnet Link},
  booktitle    = {{IEEE} First International Conference on Data Science in Cyberspace,
                  {DSC} 2016, Changsha, China, June 13-16, 2016},
  pages        = {11--19},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/DSC.2016.106},
  doi          = {10.1109/DSC.2016.106},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsc/ZhangTZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsc/DingTZWZG16,
  author       = {Pengfule Ding and
                  Zhihong Tian and
                  Hongli Zhang and
                  Yong Wang and
                  Liang Zhang and
                  Sanchuan Guo},
  title        = {Detection and Defense of {SYN} Flood Attacks Based on Dual Stack Network
                  Firewall},
  booktitle    = {{IEEE} First International Conference on Data Science in Cyberspace,
                  {DSC} 2016, Changsha, China, June 13-16, 2016},
  pages        = {526--531},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/DSC.2016.108},
  doi          = {10.1109/DSC.2016.108},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsc/DingTZWZG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/liss/ZhangLLT16,
  author       = {Qianqian Zhang and
                  Honglu Liu and
                  Shifeng Liu and
                  Zhihong Tian},
  title        = {Dynamic online consumer trust forming mechanism research based on
                  Beijing, China},
  booktitle    = {International Conference on Logistics, Informatics and Service Sciences,
                  {LISS} 2016, Sydney, Australia, July 24-27, 2016},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/LISS.2016.7854515},
  doi          = {10.1109/LISS.2016.7854515},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/liss/ZhangLLT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhangXTF15,
  author       = {Hongli Zhang and
                  Dongliang Xu and
                  Zhihong Tian and
                  Yujian Fan},
  title        = {An efficient parallel algorithm for exact multi-pattern matching},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {9},
  pages        = {1688--1697},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1115},
  doi          = {10.1002/SEC.1115},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZhangXTF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/CuiTFZZ13,
  author       = {Yu Cui and
                  Zhihong Tian and
                  Binxing Fang and
                  Hongli Zhang and
                  Weizhe Zhang},
  title        = {Data Spoofing Attacks by IPv6 Tunnels},
  journal      = {{IEICE} Trans. Commun.},
  volume       = {96-B},
  number       = {11},
  pages        = {2875--2882},
  year         = {2013},
  url          = {https://doi.org/10.1587/transcom.E96.B.2875},
  doi          = {10.1587/TRANSCOM.E96.B.2875},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/CuiTFZZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itm/TianZG13,
  author       = {Zhihong Tian and
                  Zhenji Zhang and
                  Xiaolan Guan},
  title        = {A new evolution model for {B2C} e-commerce market},
  journal      = {Inf. Technol. Manag.},
  volume       = {14},
  number       = {3},
  pages        = {205--215},
  year         = {2013},
  url          = {https://doi.org/10.1007/s10799-013-0159-8},
  doi          = {10.1007/S10799-013-0159-8},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itm/TianZG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jeco/TianZG13,
  author       = {Zhihong Tian and
                  Zhenji Zhang and
                  Xiaolan Guan},
  title        = {A New Evolution Mechanism Model for {B2B} E-Commerce Network},
  journal      = {J. Electron. Commer. Organ.},
  volume       = {11},
  number       = {2},
  pages        = {12--22},
  year         = {2013},
  url          = {https://doi.org/10.4018/jeco.2013040102},
  doi          = {10.4018/JECO.2013040102},
  timestamp    = {Wed, 27 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jeco/TianZG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip12/ChenTWH13,
  author       = {Huiping Chen and
                  Zhihong Tian and
                  Yubin Wang and
                  Xue Han},
  editor       = {Daoliang Li and
                  Yingyi Chen},
  title        = {The Analysis of County Science and Technology Worker Internet Usage
                  and Its Influence Factors},
  booktitle    = {Computer and Computing Technologies in Agriculture {VII} - 7th {IFIP}
                  {WG} 5.14 International Conference, {CCTA} 2013, Beijing, China, September
                  18-20, 2013, Revised Selected Papers, Part {II}},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {420},
  pages        = {434--443},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-54341-8\_45},
  doi          = {10.1007/978-3-642-54341-8\_45},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip12/ChenTWH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isctcs/LiuTWL13,
  author       = {Pingping Liu and
                  Zhihong Tian and
                  Xu Wu and
                  Wei Liu},
  editor       = {Yuyu Yuan and
                  Xu Wu and
                  Yueming Lu},
  title        = {An Improved Common Vulnerability Scoring System Based on K-means},
  booktitle    = {Trustworthy Computing and Services - International Conference, {ISCTCS}
                  2013, Beijing, China, November 2013, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {426},
  pages        = {62--69},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43908-1\_8},
  doi          = {10.1007/978-3-662-43908-1\_8},
  timestamp    = {Wed, 27 Jun 2018 10:47:48 +0200},
  biburl       = {https://dblp.org/rec/conf/isctcs/LiuTWL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iceis/TianZX11,
  author       = {Zhihong Tian and
                  Zhenji Zhang and
                  Dongpo Xiao},
  editor       = {Runtong Zhang and
                  Jos{\'{e}} Cordeiro and
                  Xuewei Li and
                  Zhenji Zhang and
                  Juliang Zhang},
  title        = {Study on the Knowledge -Sharing Network of Innovation Teams using
                  Social Network Analysis},
  booktitle    = {{ICEIS} 2011 - Proceedings of the 13th International Conference on
                  Enterprise Information Systems, Volume 2, Beijing, China, 8-11 June,
                  2011},
  pages        = {438--443},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Wed, 28 Sep 2011 14:47:16 +0200},
  biburl       = {https://dblp.org/rec/conf/iceis/TianZX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iceis/LiuT11,
  author       = {Honglu Liu and
                  Zhihong Tian},
  editor       = {Runtong Zhang and
                  Jos{\'{e}} Cordeiro and
                  Xuewei Li and
                  Zhenji Zhang and
                  Juliang Zhang},
  title        = {Study on the Evolution Mechanisms of the Network Public Opinion},
  booktitle    = {{ICEIS} 2011 - Proceedings of the 13th International Conference on
                  Enterprise Information Systems, Volume 3, Beijing, China, 8-11 June,
                  2011},
  pages        = {444--448},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Wed, 28 Sep 2011 15:01:13 +0200},
  biburl       = {https://dblp.org/rec/conf/iceis/LiuT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iceis/XiaoZTZC11,
  author       = {Dongpo Xiao and
                  Zhenji Zhang and
                  Zhihong Tian and
                  Jingyuan Zeng and
                  Feng Cao},
  editor       = {Runtong Zhang and
                  Jos{\'{e}} Cordeiro and
                  Xuewei Li and
                  Zhenji Zhang and
                  Juliang Zhang},
  title        = {A New Chinese Public Welfare Operation Mode based on Value Network
                  Model},
  booktitle    = {{ICEIS} 2011 - Proceedings of the 13th International Conference on
                  Enterprise Information Systems, Volume 1, Beijing, China, 8-11 June,
                  2011},
  pages        = {510--514},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Wed, 28 Sep 2011 14:19:01 +0200},
  biburl       = {https://dblp.org/rec/conf/iceis/XiaoZTZC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiWTLY09,
  author       = {Yang Li and
                  Jun{-}Li Wang and
                  Zhihong Tian and
                  Tianbo Lu and
                  Chen Young},
  title        = {Building lightweight intrusion detection system using wrapper-based
                  feature selection mechanisms},
  journal      = {Comput. Secur.},
  volume       = {28},
  number       = {6},
  pages        = {466--475},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.cose.2009.01.001},
  doi          = {10.1016/J.COSE.2009.01.001},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/LiWTLY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/LiLGTQ09,
  author       = {Yang Li and
                  Tianbo Lu and
                  Li Guo and
                  Zhihong Tian and
                  Lin Qi},
  title        = {Optimizing Network Anomaly Detection Scheme Using Instance Selection
                  Mechanism},
  booktitle    = {Proceedings of the Global Communications Conference, 2009. {GLOBECOM}
                  2009, Honolulu, Hawaii, USA, 30 November - 4 December 2009},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/GLOCOM.2009.5425547},
  doi          = {10.1109/GLOCOM.2009.5425547},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/LiLGTQ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itng/JiangFZTS09,
  author       = {Wei Jiang and
                  Binxing Fang and
                  Hongli Zhang and
                  Zhihong Tian and
                  Xin{-}fang Song},
  editor       = {Shahram Latifi},
  title        = {Optimal Network Security Strengthening Using Attack-Defense Game Model},
  booktitle    = {Sixth International Conference on Information Technology: New Generations,
                  {ITNG} 2009, Las Vegas, Nevada, USA, 27-29 April 2009},
  pages        = {475--480},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ITNG.2009.300},
  doi          = {10.1109/ITNG.2009.300},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itng/JiangFZTS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/LiLGTN09,
  author       = {Yang Li and
                  Tianbo Lu and
                  Li Guo and
                  Zhihong Tian and
                  Qin{-}Wu Nie},
  editor       = {Juan Quemada and
                  Gonzalo Le{\'{o}}n and
                  Yo{\"{e}}lle S. Maarek and
                  Wolfgang Nejdl},
  title        = {Towards lightweight and efficient {DDOS} attacks detection for web
                  server},
  booktitle    = {Proceedings of the 18th International Conference on World Wide Web,
                  {WWW} 2009, Madrid, Spain, April 20-24, 2009},
  pages        = {1139--1140},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1526709.1526896},
  doi          = {10.1145/1526709.1526896},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/www/LiLGTN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/LiGTL08,
  author       = {Yang Li and
                  Li Guo and
                  Zhihong Tian and
                  Tianbo Lu},
  title        = {A lightweight web server anomaly detection method based on transductive
                  scheme and genetic algorithms},
  journal      = {Comput. Commun.},
  volume       = {31},
  number       = {17},
  pages        = {4018--4025},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.comcom.2008.08.009},
  doi          = {10.1016/J.COMCOM.2008.08.009},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/LiGTL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cw/TianQYZ08,
  author       = {Zhihong Tian and
                  Baoshan Qin and
                  Jianwei Ye and
                  Hongli Zhang},
  title        = {Alertclu: {A} Realtime Alert Aggregation and Correlation System},
  booktitle    = {International Conference on Cyberworlds 2008, Hangzhou, China, 22-24
                  September 2008, Proceedings},
  pages        = {778--781},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CW.2008.116},
  doi          = {10.1109/CW.2008.116},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cw/TianQYZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnsc/JiangTZS08,
  author       = {Wei Jiang and
                  Zhihong Tian and
                  Hongli Zhang and
                  Xin{-}fang Song},
  title        = {A Stochastic Game Theoretic Approach to Attack Prediction and Optimal
                  Active Defense Strategy Decision},
  booktitle    = {Proceedings of the {IEEE} International Conference on Networking,
                  Sensing and Control, {ICNSC} 2008, Hainan, China, 6-8 April 2008},
  pages        = {648--653},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ICNSC.2008.4525297},
  doi          = {10.1109/ICNSC.2008.4525297},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/icnsc/JiangTZS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/LiFGTZW08,
  author       = {Yang Li and
                  Binxing Fang and
                  Li Guo and
                  Zhihong Tian and
                  Yongzheng Zhang and
                  Zhi{-}Gang Wu},
  title        = {{UBSF:} {A} novel online URL-Based Spam Filter},
  booktitle    = {Proceedings of the 13th {IEEE} Symposium on Computers and Communications
                  {(ISCC} 2008), July 6-9, Marrakech, Morocco},
  pages        = {332--339},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISCC.2008.4625689},
  doi          = {10.1109/ISCC.2008.4625689},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscc/LiFGTZW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/JiangZTS07,
  author       = {Wei Jiang and
                  Hongli Zhang and
                  Zhihong Tian and
                  Xin{-}fang Song},
  title        = {A Game Theoretic Method for Decision and Analysis of the Optimal Active
                  Defense Strategy},
  booktitle    = {Computational Intelligence and Security, International Conference,
                  {CIS} 2007, Harbin, Heilongjiang, China, December 15-19, 2007},
  pages        = {819--823},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/CIS.2007.31},
  doi          = {10.1109/CIS.2007.31},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/JiangZTS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wias/TianHLLZ06,
  author       = {Zhihong Tian and
                  Mingzeng Hu and
                  Bin Li and
                  Bo Liu and
                  Hongli Zhang},
  title        = {Defending against distributed denial-of-service attacks with an auction-based
                  method},
  journal      = {Web Intell. Agent Syst.},
  volume       = {4},
  number       = {3},
  pages        = {341--351},
  year         = {2006},
  url          = {http://content.iospress.com/articles/web-intelligence-and-agent-systems-an-international-journal/wia00095},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wias/TianHLLZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/webi/TianFX04,
  author       = {Zhihong Tian and
                  Binxing Fang and
                  Xiao{-}chun Yun},
  title        = {Defending Against Flash Crowds and Malicious Traffic Attacks with
                  An Auction-Based Method},
  booktitle    = {2004 {IEEE/WIC/ACM} International Conference on Web Intelligence {(WI}
                  2004), 20-24 September 2004, Beijing, China},
  pages        = {24--28},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/WI.2004.10152},
  doi          = {10.1109/WI.2004.10152},
  timestamp    = {Thu, 23 Mar 2023 14:30:18 +0100},
  biburl       = {https://dblp.org/rec/conf/webi/TianFX04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}