default search action
Kuo Zhao
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j31]Zhongfei Zhang, Ting Qu, Kuo Zhao, Kai Zhang, Yongheng Zhang, Wenyou Guo, Lei Liu, Zefeng Chen:
Enhancing trusted synchronization in open production logistics: A platform framework integrating blockchain and digital twin under social manufacturing. Adv. Eng. Informatics 61: 102404 (2024) - [j30]Kuo Zhao, Huajian Zhang, Jiaxin Li, Qifu Pan, Li Lai, Yike Nie, Zhongfei Zhang:
Social Network Forensics Analysis Model Based on Network Representation Learning. Entropy 26(7): 579 (2024) - 2023
- [c14]Jiezhi Yang, Jun Gao, Yanyan Li, Antong Zhou, Chaochao Qu, Kuo Zhao, Linjing Wei, Le Zhang, Zirong Liu, Ning Jiang, Wenjing Tao, Kangzhe Ma, Quan Lu, Huiru Zheng:
A smart chicken farming platform for chicken behavior identification and feed residual estimation. BIBM 2023: 1627-1634 - 2022
- [b1]Kuo Zhao:
Efficient Implementation Techniques for Lattice-based Cryptosystems. Monash University, Australia, 2022 - [j29]Tao Hu, Bowei Zhang, Kuo Zhao, Yang Wang, Jie Zhang:
Data BER analysis of OAM-assisted physical layer authentication system. IEICE Electron. Express 19(23): 20220434 (2022) - [j28]Dao Gong, Kuo Zhao, Guangyu Liu, Zegen Wang, Taiwen You, Jinsong Zhou:
Modal vibration decomposition method and its application on multi-mode vibration control of high-speed railway car bodies. J. Frankl. Inst. 359(10): 4699-4726 (2022)
2010 – 2019
- 2019
- [j27]Liang Hu, Yongheng Xing, Yanlei Gong, Kuo Zhao, Feng Wang:
Nonnegative matrix tri-factorization with user similarity for clustering in point-of-interest. Neurocomputing 363: 58-65 (2019) - [j26]Pingting Hao, Liang Hu, Jingyan Jiang, Xilong Che, Tong Li, Kuo Zhao:
Framework for replica placement over cooperative edge networks. J. Ambient Intell. Humaniz. Comput. 10(8): 3011-3021 (2019) - [j25]Pingting Hao, Liang Hu, Kuo Zhao, Jingyan Jiang, Tong Li, Xilong Che:
Dynamic pricing with traffic engineering for adaptive video streaming over software-defined content delivery networking. Multim. Tools Appl. 78(3): 3471-3492 (2019) - 2018
- [j24]Zhenzhen Xie, Liang Hu, Kuo Zhao, Feng Wang, Junjie Pang:
Topology2Vec: Topology Representation Learning For Data Center Networking. IEEE Access 6: 33840-33848 (2018) - [j23]Liang Hu, Wanfu Gao, Kuo Zhao, Ping Zhang, Feng Wang:
Feature selection considering two types of feature relevancy and feature interdependency. Expert Syst. Appl. 93: 423-434 (2018) - [j22]Feng Wang, Liang Hu, Rui Sun, Jiejun Hu, Kuo Zhao:
SRMCS: A semantic-aware recommendation framework for mobile crowd sensing. Inf. Sci. 433-434: 333-345 (2018) - 2017
- [j21]Junjie Pang, Gaochao Xu, Xiaodong Fu, Kuo Zhao:
Horizon: a QoS management framework for SDN-based data center networks. Ann. des Télécommunications 72(9-10): 597-605 (2017) - [j20]Feng Wang, Liang Hu, Jin Zhou, Jiejun Hu, Kuo Zhao:
A semantics-based approach to multi-source heterogeneous information fusion in the internet of things. Soft Comput. 21(8): 2005-2013 (2017) - [j19]Fu Tao, Liang Hu, Xiaodi Yu, Jiejun Hu, Kuo Zhao:
Role-based intelligent application state computing for OpenFlow distributed controllers in software-defined networking. Soft Comput. 21(21): 6269-6277 (2017) - [c13]Hua-Feng Zhang, Chen-Guang He, Wen-Bin Zhang, Kuo Zhao:
Channel Compressed Estimation Based on k-Nearest Neighbor Learning. CSPS 2017: 1018-1024 - 2016
- [j18]Liang Hu, Rui Sun, Feng Wang, Xiuhong Fei, Kuo Zhao:
A Stream Processing System for Multisource Heterogeneous Sensor Data. J. Sensors 2016: 4287834:1-4287834:8 (2016) - [j17]Feng Wang, Liang Hu, Jiejun Hu, Kuo Zhao:
Computer forensic analysis model for the reconstruction of chain of evidence of volatile memory data. Multim. Tools Appl. 75(16): 10097-10107 (2016) - [c12]Mingde Gong, Kaiwen Chen, Kuo Zhao, Peiyu Chang:
Trajectory planning based on multi-objective optimization for redundant robots. ICSAI 2016: 133-138 - 2015
- [j16]Feng Wang, Liang Hu, Dongdai Zhou, Rui Sun, Jiejun Hu, Kuo Zhao:
Estimating online vacancies in real-time road traffic monitoring with traffic sensor data stream. Ad Hoc Networks 35: 3-13 (2015) - [j15]Feng Wang, Liang Hu, Jin Zhou, Kuo Zhao:
A Survey from the Perspective of Evolutionary Process in the Internet of Things. Int. J. Distributed Sens. Networks 11: 462752:1-462752:9 (2015) - [j14]Feng Wang, Liang Hu, Jin Zhou, Yang Wu, Jiejun Hu, Kuo Zhao:
Software Toolkits: Practical Aspects of the Internet of Things - A Survey. Int. J. Distributed Sens. Networks 11: 534378:1-534378:9 (2015) - [j13]Feng Wang, Liang Hu, Jin Zhou, Kuo Zhao:
A Data Processing Middleware Based on SOA for the Internet of Things. J. Sensors 2015: 827045:1-827045:8 (2015) - [c11]Zhenzhen Xie, Liang Hu, Feng Wang, Jin Li, Kuo Zhao:
PEMM: A Privacy-Aware Data Aggregation Solution for Mobile Sensing Networks. ISICA 2015: 474-482 - 2014
- [j12]Xiaolu Zhang, Liang Hu, Shinan Song, Zhenzhen Xie, Xiangyu Meng, Kuo Zhao:
Windows Volatile Memory Forensics Based on Correlation Analysis. J. Networks 9(3): 645-652 (2014) - [j11]Liang Hu, Bofeng Liu, Kuo Zhao, Xiangyu Meng, Feng Wang:
Research and Implementation of the Localization Algorithm Based on RSSI Technology. J. Networks 9(11): 3135-3142 (2014) - 2013
- [j10]Xiaobo Yan, Feng Wang, Liang Hu, Kuo Zhao, Weiqing Xiong:
Application-oriented Network Performance Evaluation for the Internet of Things. Int. J. Online Biomed. Eng. 9(S7): 51-56 (2013) - [j9]Kuo Zhao, Longhe Huang, Hongtu Li, Fangming Wu, Jianfeng Chu, Liang Hu:
A Survey on Key Management of Identity-based Schemes in Mobile Ad Hoc Networks. J. Commun. 8(11): 768-779 (2013) - [j8]Weiwu Ren, Liang Hu, Kuo Zhao, Jianfeng Chu, Bing Jia:
Intrusion Classifier based on Multiple Attribute Selection Algorithms. J. Comput. 8(10): 2536-2543 (2013) - [j7]Weiwu Ren, Liang Hu, Kuo Zhao, Jianfeng Chu:
An Efficient Parallel Anomaly Detection Algorithm Based on Hierarchical Clustering. J. Networks 8(3): 672-679 (2013) - [j6]Xiaolu Zhang, Liang Hu, Shinan Song, Zhenzhen Xie, Xiangyu Meng, Kuo Zhao:
An Intelligent Analysis Model for Multisource Volatile Memory. J. Networks 8(9): 1943-1949 (2013) - [j5]Liang Hu, Shinan Song, Xiaolu Zhang, Zhenzhen Xie, Xiangyu Meng, Kuo Zhao:
Analyzing Malware Based on Volatile Memory. J. Networks 8(11): 2512-2519 (2013) - [j4]Xiaolu Zhang, Liang Hu, Shinan Song, Zhenzhen Xie, Xiangyu Meng, Kuo Zhao:
An Intelligent Analysis Model for Multisource Volatile Memory. J. Networks 8(11): 2699-2705 (2013) - [j3]Liang Hu, Jingyan Jiang, Jin Zhou, Kuo Zhao, Liang Chen, Huimin Lu:
Environment Observation System based on Semantics in the Internet of Things. J. Networks 8(12): 2721-2727 (2013) - 2012
- [j2]Liang Hu, Wenbo Wang, Feng Wang, Xiaolu Zhang, Kuo Zhao:
The Design and Implementation of Composite Collaborative Filtering Algorithm for Personalized Recommendation. J. Softw. 7(9): 2040-2045 (2012) - [c10]Liang Hu, Nannan Xie, Zhejun Kuang, Kuo Zhao:
Review of Cyber-Physical System Architecture. ISORC Workshops 2012: 25-30 - 2011
- [c9]Nannan Xie, Liang Hu, Nurbol Luktarhan, Kuo Zhao:
A Classification of Cluster Validity Indexes Based on Membership Degree and Applications. WISM (1) 2011: 43-50 - [c8]Xiaolong Bai, Liang Hu, Zixing Song, Feiyan Chen, Kuo Zhao:
Defense against DNS Man-In-The-Middle Spoofing. WISM (1) 2011: 312-319 - 2010
- [j1]Liang Hu, Kuo Tang, Yu Ku, Kuo Zhao:
Improvement on Intrusion Detection Technology Based on Protocol Analysis and Pattern Matching. J. Convergence Inf. Technol. 5(3): 86-94 (2010) - [c7]Kexin Yang, Liang Hu, Ning Zhang, Yan-mei Huo, Kuo Zhao:
Improving the Defence against Web Server Fingerprinting by Eliminating Compliance Variation. FCST 2010: 227-232
2000 – 2009
- 2009
- [c6]Yan Guo, Sanyou Zeng, Lishan Kang, Gang Liu, Nannan Hu, Kuo Zhao:
A Route System Based on Genetic Algorithm for Coarse-Grain Reconfigurable Architecture. ISICA 2009: 11-17 - 2008
- [c5]Meng Zhang, Yi Zhang, Kuo Zhao, Liang Hu:
Automata for Weak Factor Recognition. ICYCS 2008: 1771-1776 - 2007
- [c4]Kuo Zhao, Meng Zhang, Kexin Yang, Liang Hu:
Data Collection for Intrusion Detection System Based on Stratified Random Sampling. ICNSC 2007: 852-855 - 2006
- [c3]Liang Hu, Kuo Tang, Kuo Zhao, Dong Guo, Bing Liang:
Extended Resource Information Services Based-on Directory Service Technology. CSCWD 2006: 905-909 - [c2]Guannan Gong, Liang Hu, Kuo Zhao, Jinxin He, Yuefeng Xu, Ying Duan:
SPS-VN: Research on the Security Policy System for Virtual Network. Security and Management 2006: 44-47 - [c1]Kuo Zhao, Liang Hu, Guannan Gong, Meng Zhang, Kexin Yang:
Comparison of Two Sampling-Based Data Collection Mechanisms for Intrusion Detection System. Security and Management 2006: 261-265
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-28 23:30 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint