


default search action
Fang Zuo
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j12]Zuolong Zhang
, Fang Liu, Xiaonan Shang, Shengbo Chen, Fang Zuo, Yi Wu, Dazhi Long:
ComNet: A Multiview Deep Learning Model for Predicting Drug Combination Side Effects. J. Chem. Inf. Model. 65(2): 626-639 (2025) - 2024
- [j11]Jingsen Liu
, Yang Chen, Xiaoyu Liu, Fang Zuo
, Huan Zhou:
An efficient manta ray foraging optimization algorithm with individual information interaction and fractional derivative mutation for solving complex function extremum and engineering design problems. Appl. Soft Comput. 150: 111042 (2024) - [j10]Yuxi Zhao, Longge Wang
, Junyang Yu, Fang Zuo, Tingyu Wang, Zhicheng Wang, Han Li:
Subspace clustering based on a multichannel attention mechanism. Int. J. Mach. Learn. Cybern. 15(4): 1415-1430 (2024) - [j9]Guanghui Wang
, Yajie Li, Rui Liu
, Fei Tong
, Jianping Pan
, Fang Zuo
, Xin He
:
Enhancing Privacy-Preserving Localization by Integrating Random Noise With Blockchain in Internet of Things. IEEE Trans. Netw. Serv. Manag. 21(2): 2445-2459 (2024) - [c17]Hongtu Zhang
, Wenhao Li
, Jiahao Hu
, Fang Zuo
:
DeviceLLM: Synergistic Recognition of Device Attributes in Cyberspace Based on Large Language Models. CAIBDA 2024: 355-360 - [c16]Wenhao Li
, Hongtu Zhang
, Jiahao Hu
, Fang Zuo
:
Research on the Influence of Inter-Industry Cascade Relationships Based on Reinforcement Learning. CAIBDA 2024: 436-440 - [c15]Cheng Cheng
, Guanghui Wang
, Lingfeng Shen
, Fang Zuo
:
STA: Securing Task Allocation Using AHP and CVSS for IoT Crowdsensing Applications. CAIBDA 2024: 467-472 - [c14]Zhuo Wang, Hongtu Zhang, Jingdong Guo, Laile Xi, Sidy Tambadou, Fang Zuo, Hong Li, Yan Hu:
Precise and Efficient Third-party Java Libraries Identification Tool for Collaborative Software. CSCWD 2024: 2541-2546 - 2023
- [j8]Fang Zuo
, Yajie Li
, Guanghui Wang
, Xin He
:
Towards accurate and privacy-preserving localization using anchor quality assessment in Internet of Things. Future Gener. Comput. Syst. 148: 524-537 (2023) - [j7]Wei Gong
, Linxiao Cao
, Yifei Zhu
, Fang Zuo
, Xin He
, Haoquan Zhou
:
Federated Inverse Reinforcement Learning for Smart ICUs With Differential Privacy. IEEE Internet Things J. 10(21): 19117-19124 (2023) - [j6]Xiuli Chai
, Xiuhui Chen, Yakun Ma, Fang Zuo
, Zhihua Gan
, Yushu Zhang:
TPE-H2MWD: an exact thumbnail preserving encryption scheme with hidden Markov model and weighted diffusion. Frontiers Inf. Technol. Electron. Eng. 24(8): 1169-1180 (2023) - [c13]Wenming Liu, Rui Zhai, Fang Zuo:
A Vulnerability Threat Assessment Model Based on Bayesian Networks. CAIBDA 2023: 525-533 - [c12]Guanghui Wang, Xiaolin Huang, Xueyuan Zhang, Geyuan Liu, Fang Zuo:
Design and Analysis of Secure Localization Against Vulnerability-Induced Attack for Internet of Things. ICCC Workshops 2023: 1-6 - 2022
- [j5]Guanghui Wang
, Yifan Xu, Jianping He
, Jianping Pan
, Fang Zuo, Xin He
:
Resilient Participant Selection Under Vulnerability Induced Colluding Attacks for Crowdsourcing. IEEE Trans. Veh. Technol. 71(7): 7904-7918 (2022) - [c11]Jinbo Li, Guanghui Wang, Fang Zuo, Xin He:
Highway Accident Localization Based on Virtual Fence for Intelligent Transportation Systems. WISA 2022: 240-253 - [c10]Jiameng Liu, Fang Zuo, Guanghui Wang:
An Improved Monte Carlo Denoising Algorithm Based on Kernel-Predicting Convolutional Network. WISA 2022: 444-452 - [c9]Mingyuan Gao, Fang Zuo, Guanghui Wang:
Efficient Differential Privacy Federated Learning Mechanism for Intelligent Selection of Optimal Privacy Protection Levels. WISA 2022: 603-614 - [c8]Weifeng Wang, Peipei Liu, Zhiyu Wang, Yimo Ren, Hong Li, Fang Zuo:
Automatic Construction of Large-Scale IoT Datasets with Multi-strategy Fusion. CWSN 2022: 31-43 - [c7]Zhiyu Wang
, Xulun Hu, Fang Zuo, Hong Li, Yiran Zhang, Weifeng Wang:
A Graph Neural Network Based Model for IoT Binary Components Similarity Detection. CWSN 2022: 120-131 - 2021
- [j4]Yan Lu, A-Li Luo
, Li-Li Wang, Li Qin, Rui Wang
, Xiang-Lei Chen, Bing Du, Fang Zuo, Wen Hou, Jian-Jun Chen, Yan-Ke Tang, Jin-Shu Han, Yongheng Zhao
:
Study on outliers in the big stellar spectral dataset of the fifth data release (DR5) of the Large Sky Area Multi-Object Fiber Spectroscopic Telescope (LAMOST). Astron. Comput. 36: 100485 (2021) - [c6]Yajie Li, Guanghui Wang
, Fang Zuo:
Efficient Privacy Preserving Single Anchor Localization Using Noise-Adding Mechanism for Internet of Things. WISA 2021: 261-273 - [c5]Chengzong Li, Rui Zhai, Fang Zuo, Junyang Yu, Libo Zhang:
Mixed Multi-channel Graph Convolution Network on Complex Relation Graph. WISA 2021: 497-504 - [c4]Ying Wang, Zhengyang Hao, Fang Zuo, Zixiang Su:
Fabric Defect Target Detection Algorithm Based on YOLOv4 Improvement. WISA 2021: 647-658 - 2020
- [c3]ShenYao Sun, Xianji Wang, Fang Zuo:
RPCC: A Replica Placement Method to Alleviate the Replica Consistency under Dynamic Cloud. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2020: 729-734
2010 – 2019
- 2014
- [j3]Fang Zuo, Wei Zhang:
A group strategy-proof incentive approach for eliminating selfish behaviors in peer-to-peer file allocation. Int. J. Commun. Syst. 27(12): 3545-3564 (2014) - [j2]Fang Zuo, Wei Zhang:
An Evolutionary Game-Based Mechanism for Routing P2P Network Flow among Selfish Peers. J. Networks 9(1): 10-17 (2014) - 2013
- [j1]Fang Zuo, Wei Zhang:
An Auction Based Distribute Mechanism for P2P Adaptive Bandwidth Allocation. IEICE Trans. Inf. Syst. 96-D(12): 2704-2712 (2013) - 2012
- [c2]Fang Zuo, Wei Zhang:
A Game Theoretic Schema for Overcoming Selfish Allocation in P2P File Application. CIT 2012: 541-548 - [c1]Fang Zuo, Wei Zhang:
Selfish allocation avoidance for P2P file application: A game theoretic approach. ICON 2012: 441-446
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-21 02:15 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint