default search action
Jiangfan Zhang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j25]Jiangfan Zhang, Yan Zhang, Zhiguang Shi, Yu Zhang, Ruobin Gao:
Unmanned Aerial Vehicle Object Detection Based on Information-Preserving and Fine-Grained Feature Aggregation. Remote. Sens. 16(14): 2590 (2024) - [j24]Qiushi Liang, Shengjie Zhao, Jiangfan Zhang, Hao Deng:
Unsupervised BLSTM-Based Electricity Theft Detection with Training Data Contaminated. ACM Trans. Cyber Phys. Syst. 8(1): 1:1-1:20 (2024) - [j23]Yiming Jiang, Jiangfan Zhang:
Profitability Analysis of Time-Restricted Double-Spending Attack on PoW-Based Large Scale Blockchain With the Aid of Multiple Types of Attacks. IEEE Trans. Inf. Forensics Secur. 19: 8155-8171 (2024) - [i8]Yiming Jiang, Jiangfan Zhang:
Time-Restricted Double-Spending Attack on PoW-based Blockchains. CoRR abs/2402.17223 (2024) - 2023
- [j22]Yiming Jiang, Jiangfan Zhang:
Distributed Detection Over Blockchain-Aided Internet of Things in the Presence of Attacks. IEEE Trans. Inf. Forensics Secur. 18: 3445-3460 (2023) - [i7]Yiming Jiang, Jiangfan Zhang:
Vulnerability of Finitely-long Blockchains in Securing Data. CoRR abs/2304.09965 (2023) - [i6]Yiming Jiang, Jiangfan Zhang:
Distributed Detection over Blockchain-aided Internet of Things in the Presence of Attacks. CoRR abs/2305.05070 (2023) - 2022
- [j21]Baiping Xiong, Zaichen Zhang, Hao Jiang, Hongming Zhang, Jiangfan Zhang, Liang Wu, Jian Dang:
A Statistical MIMO Channel Model for Reconfigurable Intelligent Surface Assisted Wireless Communications. IEEE Trans. Commun. 70(2): 1360-1375 (2022) - [j20]Baiping Xiong, Zaichen Zhang, Hao Jiang, Jiangfan Zhang, Liang Wu, Jian Dang:
A 3D Non-Stationary MIMO Channel Model for Reconfigurable Intelligent Surface Auxiliary UAV-to-Ground mmWave Communications. IEEE Trans. Wirel. Commun. 21(7): 5658-5672 (2022) - 2021
- [j19]Jiangfan Zhang, Xiaodong Wang:
Low-Complexity Quickest Change Detection in Linear Systems With Unknown Time-Varying Pre- and Post-Change Distributions. IEEE Trans. Inf. Theory 67(3): 1804-1824 (2021) - [j18]Jiangfan Zhang, Xiaodong Wang:
Consensus-Based Distributed Quickest Detection of Attacks With Unknown Parameters. IEEE Trans. Inf. Theory 67(3): 1864-1885 (2021) - [j17]Baiping Xiong, Zaichen Zhang, Jiangfan Zhang, Hao Jiang, Jian Dang, Liang Wu:
Novel Multi-Mobility V2X Channel Model in the Presence of Randomly Moving Clusters. IEEE Trans. Wirel. Commun. 20(5): 3180-3195 (2021) - [j16]Xiang Pan, Yining Shen, Jiangfan Zhang:
IoUT Based Underwater Target Localization in the Presence of Time Synchronization Attacks. IEEE Trans. Wirel. Commun. 20(6): 3958-3973 (2021) - [j15]Hao Jiang, Baiping Xiong, Zaichen Zhang, Jiangfan Zhang, Hongming Zhang, Jian Dang, Liang Wu:
Novel Statistical Wideband MIMO V2V Channel Modeling Using Unitary Matrix Transformation Algorithm. IEEE Trans. Wirel. Commun. 20(8): 4947-4961 (2021) - 2020
- [j14]Xiang Pan, Yue Bao, Yiting Zhu, Huangyu Dai, Jiangfan Zhang:
Deconvolved Conventional Beamforming and Adaptive Cubature Kalman Filter Based Distant Speech Perception System. IEEE Access 8: 187948-187958 (2020) - [j13]Yue Cui, Junfeng Wang, Haixin Sun, Hao Jiang, Kai Yang, Jiangfan Zhang:
Gridless Underdetermined DOA Estimation of Wideband LFM Signals With Unknown Amplitude Distortion Based on Fractional Fourier Transform. IEEE Internet Things J. 7(12): 11612-11625 (2020) - [j12]Hao Jiang, Zaichen Zhang, Cheng-Xiang Wang, Jiangfan Zhang, Jian Dang, Liang Wu, Hongming Zhang:
A Novel 3D UAV Channel Model for A2G Communication Environments Using AoD and AoA Estimation Algorithms. IEEE Trans. Commun. 68(11): 7232-7246 (2020) - [j11]Jiangfan Zhang, Xiaodong Wang:
Asymptotically Optimal Stochastic Encryption for Quantized Sequential Detection in the Presence of Eavesdroppers. IEEE Trans. Inf. Theory 66(3): 1530-1548 (2020)
2010 – 2019
- 2019
- [j10]Yicheng Chen, Rick S. Blum, Brian M. Sadler, Jiangfan Zhang:
Testing the Structure of a Gaussian Graphical Model With Reduced Transmissions in a Distributed Setting. IEEE Trans. Signal Process. 67(20): 5391-5401 (2019) - [c7]Jiangfan Zhang:
Secure Quantized Sequential Detection in the Internet of Things with Eavesdroppers. GLOBECOM Workshops 2019: 1-6 - [c6]Jiangfan Zhang:
Quickest Detection of Time-varying False Data Injection Attacks in Dynamic Smart Grids. ICASSP 2019: 2432-2436 - 2018
- [j9]Li Hu, Jiangfan Zhang, Xiaodong Wang, Shilian Wang, Eryang Zhang:
Decentralized Truncated One-Sided Sequential Detection of a Noncooperative Moving Target. IEEE Signal Process. Lett. 25(10): 1490-1494 (2018) - [j8]Jiangfan Zhang, Rick S. Blum, H. Vincent Poor:
Approaches to Secure Inference in the Internet of Things: Performance Bounds, Algorithms, and Effective Attacks on IoT Sensor Networks. IEEE Signal Process. Mag. 35(5): 50-63 (2018) - [j7]Jiangfan Zhang, Rick S. Blum, Lance M. Kaplan, Xuanxuan Lu:
A Fundamental Limitation on Maximum Parameter Dimension for Accurate Estimation With Quantized Data. IEEE Trans. Inf. Theory 64(9): 6180-6195 (2018) - [j6]Jiangfan Zhang, Xiaodong Wang, Rick S. Blum, Lance M. Kaplan:
Attack Detection in Sensor Network Target Localization Systems With Quantized Data. IEEE Trans. Signal Process. 66(8): 2070-2085 (2018) - [i5]Jiangfan Zhang, Xiaodong Wang:
Consensus-based Distributed Quickest Detection of Attacks with Unknown Parameters. CoRR abs/1802.00167 (2018) - [i4]Jiangfan Zhang, Xiaodong Wang:
Quickest Detection of Time-Varying False Data Injection Attacks in Dynamic Linear Regression Models. CoRR abs/1811.05423 (2018) - 2017
- [j5]Jiangfan Zhang, Rick S. Blum, Lance M. Kaplan, Xuanxuan Lu:
Functional Forms of Optimum Spoofing Attacks for Vector Parameter Estimation in Quantized Sensor Networks. IEEE Trans. Signal Process. 65(3): 705-720 (2017) - [j4]Jiangfan Zhang, Zhongyue Chen, Rick S. Blum, Xuanxuan Lu, Wen Xu:
Ordering for Reduced Transmission Energy Detection in Sensor Networks Testing a Shift in the Mean of a Gaussian Graphical Model. IEEE Trans. Signal Process. 65(8): 2178-2189 (2017) - [c5]Jiangfan Zhang, Rick S. Blum, Lance M. Kaplan:
Cyber attacks on estimation sensor networks and iots: Impact, mitigation and implications to unattacked systems. ICASSP 2017: 3316-3320 - [i3]Jiangfan Zhang, Xiaodong Wang:
Asymptotically Optimal Stochastic Encryption for Quantized Sequential Detection in the Presence of Eavesdroppers. CoRR abs/1703.02141 (2017) - [i2]Jiangfan Zhang, Xiaodong Wang, Rick S. Blum, Lance M. Kaplan:
Attack Detection in Sensor Network Target Localization Systems with Quantized Data. CoRR abs/1705.05424 (2017) - 2016
- [i1]Jiangfan Zhang, Rick S. Blum, Lance M. Kaplan, Xuanxuan Lu:
Functional Forms of Optimum Spoofing Attacks for Vector Parameter Estimation in Quantized Sensor Networks. CoRR abs/1605.07284 (2016) - 2015
- [j3]Jiangfan Zhang, Rick S. Blum, Xuanxuan Lu, Daniel Conus:
Asymptotically Optimum Distributed Estimation in the Presence of Attacks. IEEE Trans. Signal Process. 63(5): 1086-1101 (2015) - [j2]Basel Alnajjab, Jiangfan Zhang, Rick S. Blum:
Attacks on Sensor Network Parameter Estimation With Quantization: Performance and Asymptotically Optimum Processing. IEEE Trans. Signal Process. 63(24): 6659-6672 (2015) - [c4]Jiangfan Zhang, Rick S. Blum:
Distributed joint spoofing attack identification and estimation in sensor networks. ChinaSIP 2015: 701-705 - 2014
- [j1]Jiangfan Zhang, Rick S. Blum:
Asymptotically Optimal Truncated Multivariate Gaussian Hypothesis Testing With Application to Consensus Algorithms. IEEE Trans. Signal Process. 62(2): 431-442 (2014) - [c3]Jiangfan Zhang, Rick S. Blum:
Distributed estimation in the presence of attacks for large scale sensor networks. CISS 2014: 1-6 - 2013
- [c2]Jiangfan Zhang, Rick S. Blum:
Asymptotically optimal truncated hypothesis test for a large sensor network described by a multivariate Gaussian distribution. ACSSC 2013: 2012-2016 - 2012
- [c1]Jiangfan Zhang, Chuanming Wei, Rick S. Blum:
Ordering for shift-in-mean of Gauss-Markov random fields with dependent observations. SAM 2012: 65-68
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint