
Zhihong Tian
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2021
- [j71]Ning Hu, Zhihong Tian, Yanbin Sun, Lihua Yin, Baokang Zhao, Xiaojiang Du, Nadra Guizani:
Building Agile and Resilient UAV Networks Based on SDN and Blockchain. IEEE Netw. 35(1): 57-63 (2021) - [j70]Weihong Han
, Zhihong Tian
, Chunsheng Zhu, Zizhong Huang, Yan Jia, Mohsen Guizani
:
A Topic Representation Model for Online Social Networks Based on Hybrid Human-Artificial Intelligence. IEEE Trans. Comput. Soc. Syst. 8(1): 191-200 (2021) - 2020
- [j69]Hong-Li Zhang, Rui Jin
, Yu Zhang, Zhihong Tian
:
A Public Psychological Pressure Index for Social Networks. IEEE Access 8: 23457-23469 (2020) - [j68]Zhaoquan Gu
, Weixiong Hu
, Chuanjing Zhang
, Le Wang
, Chunsheng Zhu
, Zhihong Tian
:
Restricted Region Based Iterative Gradient Method for Non-Targeted Attack. IEEE Access 8: 25262-25271 (2020) - [j67]Xi Luo
, Lihua Yin, Chao Li, Chonghua Wang, Fuyang Fang, Chunsheng Zhu
, Zhihong Tian
:
A Lightweight Privacy-Preserving Communication Protocol for Heterogeneous IoT Environment. IEEE Access 8: 67192-67204 (2020) - [j66]Shudong Li, Dawei Zhao, Xiaobo Wu, Zhihong Tian
, Aiping Li, Zhen Wang:
Functional immunization of networks based on message passing. Appl. Math. Comput. 366 (2020) - [j65]Yuanyuan Chen, Jing Qiu, Xiaojiang Du, Lihua Yin, Zhihong Tian:
Security of Mobile Multimedia Data: The Adversarial Examples for Spatio-temporal Data. Comput. Networks 181: 107432 (2020) - [j64]Muhammad Shafiq, Zhihong Tian
, Ali Kashif Bashir
, Xiaojiang Du, Mohsen Guizani:
IoT malicious traffic identification using wrapper-based feature selection mechanisms. Comput. Secur. 94: 101863 (2020) - [j63]Zhe Sun
, Lihua Yin, Chao Li, Weizhe Zhang, Ang Li, Zhihong Tian
:
The QoS and privacy trade-off of adversarial deep learning: An evolutionary game approach. Comput. Secur. 96: 101876 (2020) - [j62]Weixiang Chen, Xiaohan Helu, Chengjie Jin, Man Zhang, Hui Lu, Yanbin Sun, Zhihong Tian:
Advanced persistent threat organization identification based on software gene of malware. Trans. Emerg. Telecommun. Technol. 31(12) (2020) - [j61]Muhammad Shafiq, Zhihong Tian, Yanbin Sun, Xiaojiang Du, Mohsen Guizani:
Selection of effective machine learning algorithm and Bot-IoT attacks traffic identification for internet of things in smart city. Future Gener. Comput. Syst. 107: 433-442 (2020) - [j60]Lihua Yin, Binxing Fang, Yunchuan Guo, Zhe Sun
, Zhihong Tian
:
Hierarchically defining Internet of Things security: From CIA to CACA. Int. J. Distributed Sens. Networks 16(1) (2020) - [j59]Yang Zhang
, Shixin Sun
, Dongwen Zhang, Jing Qiu
, Zhihong Tian
:
A consistency-guaranteed approach for Internet of Things software refactoring. Int. J. Distributed Sens. Networks 16(1) (2020) - [j58]Haitao Sun, Chengjie Jin, Xiaohan Helu, Hui Lu, Man Zhang, Zhihong Tian
:
Research on android infiltration technology based on the silent installation of an accessibility service. Int. J. Distributed Sens. Networks 16(2) (2020) - [j57]Dongliang Xu, Zhihong Tian, Rufeng Lai, Xiangtao Kong, Zhiyuan Tan, Wei Shi:
Deep learning based emotion analysis of microblog texts. Inf. Fusion 64: 1-11 (2020) - [j56]Zhihong Tian
, Xiangsong Gao
, Shen Su
, Jing Qiu:
Vcash: A Novel Reputation Framework for Identifying Denial of Traffic Service in Internet of Connected Vehicles. IEEE Internet Things J. 7(5): 3901-3909 (2020) - [j55]Jing Qiu
, Zhihong Tian
, Chunlai Du, Qi Zuo, Shen Su
, Binxing Fang:
A Survey on Access Control in the Age of Internet of Things. IEEE Internet Things J. 7(6): 4682-4696 (2020) - [j54]Mohan Li
, Yanbin Sun
, Hui Lu
, Sabita Maharjan
, Zhihong Tian
:
Deep Reinforcement Learning for Partially Observable Data Poisoning Attack in Crowdsensing Systems. IEEE Internet Things J. 7(7): 6266-6278 (2020) - [j53]Tiantian Ji
, Zhongru Wang, Zhihong Tian, Binxing Fang, Qiang Ruan, Haichen Wang, Wei Shi:
AFLPro: Direction sensitive fuzzing. J. Inf. Secur. Appl. 54: 102497 (2020) - [j52]Jie Han, Zhihong Tian:
The effect of trade creation in China-Asean free trade area based on the gravity model. J. Intell. Fuzzy Syst. 38(6): 7061-7065 (2020) - [j51]Yaping Liu, Shuo Zhang, Haojin Zhu, Peng-Jun Wan, Lixin Gao, Yaoxue Zhang, Zhihong Tian:
A novel routing verification approach based on blockchain for inter-domain routing in smart metropolitan area networks. J. Parallel Distributed Comput. 142: 77-89 (2020) - [j50]Xiaowei Wang, Maowei Cheng, Yefu Wang, Shaohui Liu
, Zhihong Tian, Feng Jiang, Hongjun Zhang:
Obstructive sleep apnea detection using ecg-sensor with convolutional neural networks. Multim. Tools Appl. 79(23-24): 15813-15827 (2020) - [j49]Zhihong Tian, Yuhang Wang, Yanbin Sun, Jing Qiu:
Location Privacy Challenges in Mobile Edge Computing: Classification and Exploration. IEEE Netw. 34(2): 52-56 (2020) - [j48]Yuhang Wang, Zhihong Tian, Yanbin Sun, Xiaojiang Du, Nadra Guizani:
Preserving Location Privacy in UASN through Collaboration and Semantic Encapsulation. IEEE Netw. 34(4): 284-290 (2020) - [j47]Yanbin Sun, Zhihong Tian, Mohan Li, Chunsheng Zhu, Nadra Guizani:
Automated Attack and Defense Framework toward 5G Security. IEEE Netw. 34(5): 247-253 (2020) - [j46]Zhaoquan Gu
, Zhen Cao, Zhihong Tian
, Yuexuan Wang, Xiaojiang Du, Mohsen Guizani:
A Low-Latency and Energy-Efficient Neighbor Discovery Algorithm for Wireless Sensor Networks. Sensors 20(3): 657 (2020) - [j45]Jing Qiu
, Yuhan Chai, Zhihong Tian
, Xiaojiang Du
, Mohsen Guizani
:
Automatic Concept Extraction Based on Semantic Graphs From Big Data in Smart City. IEEE Trans. Comput. Soc. Syst. 7(1): 225-233 (2020) - [j44]Zhihong Tian
, Chaochao Luo
, Jing Qiu
, Xiaojiang Du
, Mohsen Guizani
:
A Distributed Deep Learning System for Web Attack Detection on Edge Devices. IEEE Trans. Ind. Informatics 16(3): 1963-1971 (2020) - [j43]Jing Qiu
, Lei Du
, Dongwen Zhang, Shen Su
, Zhihong Tian
:
Nei-TTE: Intelligent Traffic Time Estimation Based on Fine-Grained Time Derivation of Road Segments for Smart City. IEEE Trans. Ind. Informatics 16(4): 2659-2666 (2020) - [j42]Menghai Pan, Weixiao Huang, Yanhua Li, Xun Zhou, Zhenming Liu, Rui Song
, Hui Lu, Zhihong Tian, Jun Luo:
DHPA: Dynamic Human Preference Analytics Framework: A Case Study on Taxi Drivers' Learning Curve Analysis. ACM Trans. Intell. Syst. Technol. 11(1): 8:1-8:19 (2020) - [j41]Feng Jiang
, Yunsheng Fu
, B. B. Gupta
, Yongsheng Liang, Seungmin Rho
, Fang Lou, Fanzhi Meng, Zhihong Tian:
Deep Learning Based Multi-Channel Intelligent Attack Detection for Data Security. IEEE Trans. Sustain. Comput. 5(2): 204-212 (2020) - [j40]Shen Su, Zhihong Tian, Siyu Liang, Shuang Li, Sha-sha Du, Nadra Guizani:
A Reputation Management Scheme for Efficient Malicious Vehicle Identification over 5G Networks. IEEE Wirel. Commun. 27(3): 46-52 (2020) - [j39]Muhammad Shafiq
, Zhihong Tian
, Ali Kashif Bashir
, Korhan Cengiz
, Adnan Tahir
:
SoftSystem: Smart Edge Computing Device Selection Method for IoT Based on Soft Set Technique. Wirel. Commun. Mob. Comput. 2020: 8864301:1-8864301:10 (2020) - [j38]Weihong Han, Zhihong Tian
, Zizhong Huang, Shudong Li, Yan Jia:
Topic representation model based on microblogging behavior analysis. World Wide Web 23(6): 3083-3097 (2020) - [c36]Meihua Fan, Shudong Li, Weihong Han, Xiaobo Wu, Zhaoquan Gu, Zhihong Tian:
A Novel Malware Detection Framework Based on Weighted Heterograph. CIAT 2020: 39-43 - [c35]Dongqiu Huang, Zhihong Tian, Shen Su, Yu Jiang:
A defense scheme of voice control system against DolphinAttack. CIAT 2020: 136-142 - [c34]Hanwen Liu, Xiaohan Helu, Chengjie Jin, Hui Lu, Zhihong Tian, Xiaojiang Du, Khalid Abualsaud:
A Malware Detection Method for Health Sensor Data Based on Machine Learning. ICIoT 2020: 277-282 - [c33]Yan Sun, Lihua Yin, Zhe Sun, Zhihong Tian, Xiaojiang Du:
An IoT data sharing privacy preserving scheme. INFOCOM Workshops 2020: 984-990 - [c32]Yuhan Chai, Jing Qiu, Shen Su, Chunsheng Zhu, Lihua Yin, Zhihong Tian:
LGMal: A Joint Framework Based on Local and Global Features for Malware Detection. IWCMC 2020: 463-468 - [c31]Jinta Weng, Wensheng Gan, Guozhu Ding, Zhihong Tian, Ying Gao, Jing Qiu:
SESM: Emotional Social Semantic and Time Series Analysis of Learners' Comments. SMC 2020: 4134-4139 - [c30]Mingzhou Yang, Yanhua Li, Xun Zhou, Hui Lu, Zhihong Tian, Jun Luo:
Inferring Passengers' Interactive Choices on Public Transits via MA-AL: Multi-Agent Apprenticeship Learning. WWW 2020: 1637-1647 - [e1]Zhihong Tian, Lihua Yin, Zhaoquan Gu:
CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, Virtual Event / Guangzhou, China, December 5, 2020. ACM 2020, ISBN 978-1-4503-8782-8 [contents]
2010 – 2019
- 2019
- [j37]Yanbin Sun
, Zhihong Tian
, Yuhang Wang, Mohan Li, Shen Su, Xianzhi Wang
, Dunqiu Fan:
Lightweight Anonymous Geometric Routing for Internet of Things. IEEE Access 7: 29754-29762 (2019) - [j36]Weihong Han, Zhihong Tian
, Zizhong Huang, Dongqiu Huang, Yan Jia:
Quantitative Assessment of Wireless Connected Intelligent Robot Swarms Network Security Situation. IEEE Access 7: 134293-134300 (2019) - [j35]Le Wang, Zhihong Tian
, Zhaoquan Gu, Hui Lu
:
Crowdsourcing Approach for Developing Hands-On Experiments in Cybersecurity Education. IEEE Access 7: 169066-169072 (2019) - [j34]Hui Lu, Xiaohan Helu, Chengjie Jin
, Yanbin Sun
, Man Zhang
, Zhihong Tian
:
Salaxy: Enabling USB Debugging Mode Automatically to Control Android Devices. IEEE Access 7: 178321-178330 (2019) - [j33]Jiwei Xu, Zhenghong Deng, Bo Gao, Qun Song, Zhihong Tian, Qiuling Wang, Mingyu Gao, Zhenxi Niu:
Popularity-driven strategy updating rule promotes cooperation in the spatial prisoner's dilemma game. Appl. Math. Comput. 353: 82-87 (2019) - [j32]Zhihong Tian
, Shen Su, Wei Shi
, Xiaojiang Du, Mohsen Guizani, Xiang Yu
:
A data-driven method for future Internet route decision modeling. Future Gener. Comput. Syst. 95: 212-220 (2019) - [j31]Xiongrui Xu, Zhihai Rong
, Zhihong Tian
, Zhi-Xi Wu:
Timescale diversity facilitates the emergence of cooperation-extortion alliances in networked systems. Neurocomputing 350: 195-201 (2019) - [j30]Qingfeng Tan
, Yue Gao
, Jinqiao Shi, Xuebin Wang
, Binxing Fang, Zhihong Tian
:
Toward a Comprehensive Insight Into the Eclipse Attacks of Tor Hidden Services. IEEE Internet Things J. 6(2): 1584-1593 (2019) - [j29]Bo Li, Yanyu Huang
, Zheli Liu, Jin Li, Zhihong Tian, Siu-Ming Yiu:
HybridORAM: Practical oblivious cloud storage with constant bandwidth. Inf. Sci. 479: 651-663 (2019) - [j28]Zhihong Tian
, Mohan Li, Meikang Qiu
, Yanbin Sun, Shen Su
:
Block-DEF: A secure digital evidence framework using blockchain. Inf. Sci. 491: 151-165 (2019) - [j27]Juan Chen, Zhihong Tian
, Xiang Cui, Lihua Yin, Xianzhi Wang
:
Trust architecture and reputation evaluation for internet of things. J. Ambient Intell. Humaniz. Comput. 10(8): 3099-3107 (2019) - [j26]Weihong Han, Zhihong Tian
, Zizhong Huang, Shudong Li, Yan Jia:
Bidirectional self-adaptive resampling in internet of things big data learning. Multim. Tools Appl. 78(21): 30111-30126 (2019) - [j25]Zhaoquan Gu
, Yuexuan Wang, Wei Shi
, Zhihong Tian, Kui Ren, Francis C. M. Lau
:
A Practical Neighbor Discovery Framework for Wireless Sensor Networks. Sensors 19(8): 1887 (2019) - [j24]Weihong Han, Zhihong Tian
, Wei Shi, Zizhong Huang, Shudong Li:
Low-Power Distributed Data Flow Anomaly-Monitoring Technology for Industrial Internet of Things. Sensors 19(12): 2804 (2019) - [j23]Yuhang Wang, Zhihong Tian
, Hongli Zhang, Shen Su, Wei Shi:
Erratum: Wang, Y. et al., A Privacy Preserving Scheme for Nearest Neighbor Query. Sensors 2018, 18, 2440. Sensors 19(14): 3187 (2019) - [j22]Zhongru Wang, Yuntao Zhang, Zhihong Tian
, Qiang Ruan, Tong Liu, Haichen Wang, Zhehui Liu, Jiayi Lin, Binxing Fang, Wei Shi
:
Automated Vulnerability Discovery and Exploitation in the Internet of Things. Sensors 19(15): 3362 (2019) - [j21]Hao Li
, Zhaoquan Gu
, Lianbing Deng, Yi Han, Cheng Yang, Zhihong Tian
:
A Fine-Grained Video Encryption Service Based on the Cloud-Fog-Local Architecture for Public and Private Videos. Sensors 19(24): 5366 (2019) - [j20]Zhihong Tian
, Wei Shi
, Yuhang Wang, Chunsheng Zhu
, Xiaojiang Du
, Shen Su
, Yanbin Sun
, Nadra Guizani:
Real-Time Lateral Movement Detection Based on Evidence Reasoning Network for Edge Computing Environment. IEEE Trans. Ind. Informatics 15(7): 4285-4294 (2019) - [j19]Zhihong Tian
, Xiangsong Gao
, Shen Su
, Jing Qiu, Xiaojiang Du
, Mohsen Guizani
:
Evaluating Reputation Management Schemes of Internet of Vehicles Based on Evolutionary Game Theory. IEEE Trans. Veh. Technol. 68(6): 5971-5980 (2019) - [c29]Cong Zhang, Yanhua Li, Jie Bao, Sijie Ruan, Tianfu He, Hui Lu, Zhihong Tian, Cong Liu, Chao Tian, Jianfeng Lin, Xianen Li:
Effective Recycling Planning for Dockless Sharing Bikes. SIGSPATIAL/GIS 2019: 62-70 - [c28]Dongwen Zhang, Yaqi Si, Zhihong Tian, Lihua Yin, Jing Qiu, Xiaojiang Du:
A Genetic-Algorithm Based Method for Storage Location Assignments in Mobile Rack Warehouses. GLOBECOM 2019: 1-6 - [c27]Yuhang Wang, Zhihong Tian, Shen Su, Yanbin Sun, Chunsheng Zhu:
Preserving Location Privacy in Mobile Edge Computing. ICC 2019: 1-6 - [c26]Zheng Shen, Zhaoquan Gu, Yuexuan Wang, Zhihong Tian, Mingli Song, Chunsheng Zhu:
Can the Max-Min Fairness-Based Coalitional Mechanism in Competitive Networks be Trustful? IWCMC 2019: 348-353 - [i5]Zhihong Tian, Shen Su, Xiang Yu, Yuhang Wang, Hongli Zhang, Xiaojiang Du, Mohsen Guizani:
Vcash: A Novel Reputation Framework for Identifying Denial of Traffic Service in Internet of Connected Vehicles. CoRR abs/1902.03994 (2019) - [i4]Zhihong Tian, Yanbin Sun, Shen Su, Mohan Li, Xiaojiang Du, Mohsen Guizani:
Automated Attack and Defense Framework for 5G Security on Physical and Logical Layers. CoRR abs/1902.04009 (2019) - [i3]Zhihong Tian, Wei Shi, Yuhang Wang, Chunsheng Zhu, Xiaojiang Du, Shen Su, Yanbin Sun, Nadra Guizani:
Real Time Lateral Movement Detection based on Evidence Reasoning Network for Edge Computing Environment. CoRR abs/1902.04387 (2019) - [i2]Zhihong Tian, Xiangsong Gao, Shen Su, Jing Qiu, Xiaojiang Du, Mohsen Guizani:
Evaluating Reputation Management Schemes of Internet of Vehicles based on Evolutionary Game Theory. CoRR abs/1902.04667 (2019) - [i1]Keke Tang, Peng Song, Yuexin Ma, Zhaoquan Gu, Yu Su, Zhihong Tian, Wenping Wang:
Decision Propagation Networks for Image Classification. CoRR abs/1911.12101 (2019) - 2018
- [j18]Zhihong Tian
, Yu Cui, Lun An, Shen Su, Xiaoxia Yin, Lihua Yin, Xiang Cui:
A Real-Time Correlation of Host-Level Events in Cyber Range Service for Smart Campus. IEEE Access 6: 35355-35364 (2018) - [j17]Jing Qiu, Yuhan Chai, Yan Liu, Zhaoquan Gu, Shudong Li, Zhihong Tian
:
Automatic Non-Taxonomic Relation Extraction from Big Data in Smart City. IEEE Access 6: 74854-74864 (2018) - [j16]Wuzhen Shi, Shaohui Liu
, Feng Jiang, Debin Zhao, Zhihong Tian:
Anchored neighborhood deep network for single-image super-resolution. EURASIP J. Image Video Process. 2018: 34 (2018) - [j15]Feng Jiang, Aleksei Grigorev, Seungmin Rho, Zhihong Tian, Yunsheng Fu, Worku Jifara Sori, Adil Khan
, Shaohui Liu
:
Medical image semantic segmentation based on deep learning. Neural Comput. Appl. 29(5): 1257-1265 (2018) - [j14]Honglu Liu, Zhihong Tian, Anqiang Huang, Zaili Yang
:
Analysis of vulnerabilities in maritime supply chains. Reliab. Eng. Syst. Saf. 169: 475-484 (2018) - [j13]Yuhang Wang, Zhihong Tian
, Hongli Zhang, Shen Su, Wei Shi:
A Privacy Preserving Scheme for Nearest Neighbor Query. Sensors 18(8): 2440 (2018) - [j12]Mohan Li, Yanbin Sun, Yu Jiang, Zhihong Tian
:
Answering the Min-Cost Quality-Aware Query on Multi-Sources in Sensor-Cloud Systems. Sensors 18(12): 4486 (2018) - [j11]Xiang Yu, Zhihong Tian
, Jing Qiu
, Feng Jiang
:
A Data Leakage Prevention Method Based on the Reduction of Confidential and Context Terms for Smart Mobile Devices. Wirel. Commun. Mob. Comput. 2018: 5823439:1-5823439:11 (2018) - [j10]Zihan Wang
, Chaoge Liu
, Jing Qiu
, Zhihong Tian
, Xiang Cui, Shen Su:
Automatically Traceback RDP-Based Targeted Ransomware Attacks. Wirel. Commun. Mob. Comput. 2018: 7943586:1-7943586:13 (2018) - [c25]Zhaoquan Gu, Yongcai Wang, Jing Qiu, Lihua Yin, Zhihong Tian:
How to Control Target Nodes in Dynamic Networks. DSC 2018: 266-273 - [c24]Shudong Li, Xiaobo Wu, Aiping Li, Bin Zhou, Zhihong Tian, Dawei Zhao:
Structural Vulnerability of Complex Networks Under Multiple Edge-Based Attacks. DSC 2018: 405-409 - [c23]Yunsheng Fu, Fang Lou, Fangzhi Meng, Zhihong Tian, Hua Zhang, Feng Jiang:
An Intelligent Network Attack Detection Method Based on RNN. DSC 2018: 483-489 - [c22]Yuhang Wang, Hongli Zhang, Shen Su, Zhihong Tian:
A Location Privacy-Aware Method for kNN Query in Location Based Services. DSC 2018: 537-541 - [c21]Fanzhi Meng, Fang Lou, Yunsheng Fu, Zhihong Tian:
Deep Learning Based Attribute Classification Insider Threat Detection for Data Security. DSC 2018: 576-581 - [c20]Jing Qiu, Yaqi Si, Zhihong Tian:
Automatic Taxonomy Construction for Eye Colors Data without Using Context Information. DSC 2018: 837-841 - [c19]Jie Yin, Heyang Lv, Fangjiao Zhang, Zhihong Tian, Xiang Cui:
Study on Advanced Botnet Based on Publicly Available Resources. ICICS 2018: 57-74 - [c18]Mohan Li, Yu Jiang, Yanbin Sun, Zhihong Tian:
Answering the Min-Cost Quality-Aware Query on Multi-sources in Sensor-Cloud Systems. SpaCCS 2018: 156-165 - 2017
- [c17]Hua Zhang, Fang Lou, Yunsheng Fu, Zhihong Tian:
A Conditional Probability Computation Method for Vulnerability Exploitation Based on CVSS. DSC 2017: 238-241 - 2016
- [j9]Zhihong Tian, Honglu Liu:
Evaluation method for node importance in container supply chain network. Int. J. Serv. Technol. Manag. 22(3/4/5): 145-161 (2016) - [j8]Zhihong Tian, Zhenji Zhang, Ruize Gao:
Optimization in e-commerce market network based on value order parameter. Inf. Technol. Manag. 17(2): 187-197 (2016) - [c16]Xinxing Zhang, Zhihong Tian, Luchen Zhang:
A Measurement Study on Mainline DHT and Magnet Link. DSC 2016: 11-19 - [c15]Pengfule Ding, Zhihong Tian, Hongli Zhang, Yong Wang, Liang Zhang, Sanchuan Guo:
Detection and Defense of SYN Flood Attacks Based on Dual Stack Network Firewall. DSC 2016: 526-531 - [c14]Qianqian Zhang, Honglu Liu, Shifeng Liu, Zhihong Tian:
Dynamic online consumer trust forming mechanism research based on Beijing, China. LISS 2016: 1-9 - 2015
- [j7]Hongli Zhang, Dongliang Xu, Zhihong Tian, Yujian Fan:
An efficient parallel algorithm for exact multi-pattern matching. Secur. Commun. Networks 8(9): 1688-1697 (2015) - 2013
- [j6]Yu Cui, Zhihong Tian, Binxing Fang, Hongli Zhang, Weizhe Zhang:
Data Spoofing Attacks by IPv6 Tunnels. IEICE Trans. Commun. 96-B(11): 2875-2882 (2013) - [j5]Zhihong Tian, Zhenji Zhang, Xiaolan Guan:
A new evolution model for B2C e-commerce market. Inf. Technol. Manag. 14(3): 205-215 (2013) - [j4]Zhihong Tian, Zhenji Zhang, Xiaolan Guan:
A New Evolution Mechanism Model for B2B E-Commerce Network. J. Electron. Commer. Organ. 11(2): 12-22 (2013) - [c13]Huiping Chen, Zhihong Tian, Yubin Wang, Xue Han:
The Analysis of County Science and Technology Worker Internet Usage and Its Influence Factors. CCTA (2) 2013: 434-443 - [c12]Pingping Liu, Zhihong Tian, Xu Wu, Wei Liu:
An Improved Common Vulnerability Scoring System Based on K-means. ISCTCS 2013: 62-69 - 2011
- [c11]Zhihong Tian, Zhenji Zhang, Dongpo Xiao:
Study on the Knowledge -Sharing Network of Innovation Teams using Social Network Analysis. ICEIS (2) 2011: 438-443 - [c10]Honglu Liu, Zhihong Tian:
Study on the Evolution Mechanisms of the Network Public Opinion. ICEIS (3) 2011: 444-448 - [c9]Dongpo Xiao, Zhenji Zhang, Zhihong Tian, Jingyuan Zeng, Feng Cao:
A New Chinese Public Welfare Operation Mode based on Value Network Model. ICEIS (1) 2011: 510-514
2000 – 2009
- 2009
- [j3]Yang Li, Jun-Li Wang, Zhihong Tian, Tianbo Lu, Chen Young:
Building lightweight intrusion detection system using wrapper-based feature selection mechanisms. Comput. Secur. 28(6): 466-475 (2009) - [c8]Yang Li, Tianbo Lu, Li Guo, Zhihong Tian, Lin Qi:
Optimizing Network Anomaly Detection Scheme Using Instance Selection Mechanism. GLOBECOM 2009: 1-7 - [c7]Wei Jiang, Binxing Fang, Hongli Zhang, Zhihong Tian, Xin-fang Song:
Optimal Network Security Strengthening Using Attack-Defense Game Model. ITNG 2009: 475-480 - [c6]Yang Li, Tianbo Lu, Li Guo, Zhihong Tian, Qin-Wu Nie:
Towards lightweight and efficient DDOS attacks detection for web server. WWW 2009: 1139-1140 - 2008
- [j2]Yang Li, Li Guo, Zhihong Tian, Tianbo Lu:
A lightweight web server anomaly detection method based on transductive scheme and genetic algorithms. Comput. Commun. 31(17): 4018-4025 (2008) - [c5]Zhihong Tian, Baoshan Qin, Jianwei Ye, Hongli Zhang:
Alertclu: A Realtime Alert Aggregation and Correlation System. CW 2008: 778-781 - [c4]Wei Jiang, Zhihong Tian, Hongli Zhang, Xin-fang Song:
A Stochastic Game Theoretic Approach to Attack Prediction and Optimal Active Defense Strategy Decision. ICNSC 2008: 648-653 - [c3]Yang Li, Binxing Fang, Li Guo, Zhihong Tian, Yongzheng Zhang, Zhi-Gang Wu:
UBSF: A novel online URL-Based Spam Filter. ISCC 2008: 332-339 - 2007
- [c2]Wei Jiang, Hongli Zhang, Zhihong Tian, Xin-fang Song:
A Game Theoretic Method for Decision and Analysis of the Optimal Active Defense Strategy. CIS 2007: 819-823 - 2006
- [j1]Zhihong Tian, Mingzeng Hu, Bin Li, Bo Liu, Hongli Zhang:
Defending against distributed denial-of-service attacks with an auction-based method. Web Intell. Agent Syst. 4(3): 341-351 (2006) - 2004
- [c1]Zhihong Tian, Binxing Fang, Xiao-chun Yun:
Defending Against Flash Crowds and Malicious Traffic Attacks with An Auction-Based Method. Web Intelligence 2004: 24-28
Coauthor Index
<