
Hongliang Zhu
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [c5]Hongliang Zhu, Hoseung Lung, Nang Lin:
Carrier-based Aircraft Detection on Flight Deck of Aircraft Carrier with Simulated 3-D Model by Deep Neural Network. CSSE 2020: 96-101
2010 – 2019
- 2019
- [j16]Hongliang Zhu
, Ying Yuan
, Yuling Chen, Yaxing Zha
, Wanying Xi, Bin Jia, Yang Xin:
A Secure and Efficient Data Integrity Verification Scheme for Cloud-IoT Based on Short Signature. IEEE Access 7: 90036-90044 (2019) - [j15]Kai Zhang
, Fei Zhao
, Shoushan Luo, Yang Xin, Hongliang Zhu
:
An Intrusion Action-Based IDS Alert Correlation Analysis and Prediction Framework. IEEE Access 7: 150540-150551 (2019) - [j14]Guangcan Yang
, Shoushan Luo, Hongliang Zhu
, Yang Xin, Ke Xiao
, Yuling Chen
, Mingzhen Li
, Yunfeng Wang:
A Mechanism to Improve Effectiveness and Privacy Preservation for Review Publication in LBS. IEEE Access 7: 156659-156674 (2019) - [j13]Yunfeng Wang, Mingzhen Li, Shoushan Luo, Yang Xin
, Hongliang Zhu
, Yuling Chen
, Guangcan Yang
, Yixian Yang
:
LRM: A Location Recombination Mechanism for Achieving Trajectory k-Anonymity Privacy Protection. IEEE Access 7: 182886-182905 (2019) - [c4]Shuangshuang Xu, Yang Xin, Hongliang Zhu, Shoushan Luo, Yuling Chen:
A Authentication and Access Authorization Mechanism on the PaaS Platform. SSCI 2019: 893-900 - 2018
- [j12]Yang Xin, Lingshuang Kong, Zhi Liu
, Chunhua Wang, Hongliang Zhu, Mingcheng Gao, Chensu Zhao, Xiaoke Xu:
Multimodal Feature-Level Fusion for Biometrics Identification System on IoMT Platform. IEEE Access 6: 21418-21426 (2018) - [j11]Yang Xin, Lingshuang Kong, Zhi Liu
, Yuling Chen, Yan-Miao Li, Hongliang Zhu, Mingcheng Gao, Haixia Hou, Chunhua Wang:
Machine Learning and Deep Learning Methods for Cybersecurity. IEEE Access 6: 35365-35381 (2018) - [j10]Song Liang, Dan Lu, Lingjuan Zhao, Hongliang Zhu, Baojun Wang, Daibing Zhou, Wei Wang:
Fabrication of InP-based monolithically integrated laser transmitters. Sci. China Inf. Sci. 61(8): 080405:1-080405:19 (2018) - [j9]Jiahua Wang, Hongliang Zhu
, Dongxin Li
:
Price Dynamics in an Order-Driven Market with Bayesian Learning. Complex. 2018: 8254068:1-8254068:15 (2018) - [j8]Hongliang Zhu, Zhihua Zhang
, Juan Du, Shoushan Luo, Yang Xin:
Detection of selective forwarding attacks based on adaptive learning automata and communication quality in wireless sensor networks. Int. J. Distributed Sens. Networks 14(11) (2018) - [j7]Zhihua Zhang
, Shoushan Luo, Hongliang Zhu
, Yang Xin:
A Clone Detection Algorithm with Low Resource Expenditure for Wireless Sensor Networks. J. Sensors 2018: 4396381:1-4396381:16 (2018) - [j6]Hongliang Zhu
, Meiqi Chen, Maohua Sun
, Xin Liao, Lei Hu:
Outsourcing Set Intersection Computation Based on Bloom Filter for Privacy Preservation in Multimedia Processing. Secur. Commun. Networks 2018: 5841967:1-5841967:12 (2018) - 2017
- [j5]Zhihua Zhang
, Hongliang Zhu, Shoushan Luo, Yang Xin, Xiaoming Liu:
Intrusion Detection Based on State Context and Hierarchical Trust in Wireless Sensor Networks. IEEE Access 5: 12088-12102 (2017) - 2016
- [c3]Hongliang Zhu, Wenhan Liu, Jing Wang, Yang Xin:
Based on the character of cloud storage string encryption and cipher text retrieval of string research. CCIS 2016: 409-413 - 2014
- [j4]Yi Xu, Yixian Yang, Yang Xin, Hongliang Zhu:
An Improved Directed Diffusion Protocol based on Opportunistic Routing. J. Networks 9(5): 1163-1168 (2014) - [j3]Chao Feng, Yang Xin, Hongliang Zhu, Yixian Yang:
A Weakly Homomorphic Encryption with LDN. J. Networks 9(6): 1464-1470 (2014) - 2013
- [j2]Feng Xiao, Yajian Zhou, Jingxian Zhou, Hongliang Zhu, Xinxin Niu:
Security Protocol for RFID System Conforming to EPC-C1G2 Standard. J. Comput. 8(3): 605-612 (2013) - [j1]Ting Han, Shoushan Luo, Hongliang Zhu, Yang Xin, Yong Peng:
A Novel Trust Evaluation Model Based on Grey Clustering Theory for Routing Networks. J. Comput. 8(11): 2743-2749 (2013) - 2011
- [c2]Yang Xin, Fen Xu, Hongliang Zhu:
Some results on preserving K-member simply separable relations in partial K-valued logic. ICDIP 2011: 80091I - 2010
- [c1]Haifei Liu, Chengyao Wu, Xindan Li, Hongliang Zhu:
New asymptotical stability conditions for delayed neural networks model with distribution. ICNC 2010: 782-784
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2020-09-26 00:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint