default search action
Hongli Zhang 0001
Person information
- unicode name: 张宏莉
- affiliation (PhD 1999): Harbin Institute of Technology, Computer Science and Technology Department, China
Other persons with the same name
- Hongli Zhang (aka: Hong-li Zhang, Hong-Li Zhang) — disambiguation page
- Hongli Zhang 0002 — Beijing Institute of Technology, School of Computer Science and Technology, China
- Hongli Zhang 0003 — Shanghai University, School of Mechatronics Engineering and Automation, China
- Hongli Zhang 0004 (aka: Hong-li Zhang 0004) — Xinjiang University, School of Electrical Engineering, Urumqi, China (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j90]Chunyu Liu, Hongli Zhang, Guopu Zhu, Haotian Guan, Sam Kwong:
Exploring trajectory embedding via spatial-temporal propagation for dynamic region representations. Inf. Sci. 668: 120516 (2024) - [j89]Zuquan Liu, Guopu Zhu, Yu Zhang, Hongli Zhang, Sam Kwong:
An efficient cheating-detectable secret image sharing scheme with smaller share sizes. J. Inf. Secur. Appl. 81: 103709 (2024) - [j88]Yunting Zhang, Shang Li, Lin Ye, Hongli Zhang, Zhe Chen, Binxing Fang:
Kalt: generating adversarial explainable chinese legal texts. Mach. Learn. 113(9): 6341-6371 (2024) - [j87]Yunting Zhang, Lin Ye, Zeshu Tian, Zhe Chen, Hongli Zhang, Baisong Li, Binxing Fang:
UCTT: universal and low-cost adversarial example generation for tendency classification. Neural Comput. Appl. 36(22): 13865-13894 (2024) - [j86]Kai Tan, Dongyang Zhan, Lin Ye, Hongli Zhang, Binxing Fang:
A Practical Adversarial Attack Against Sequence-Based Deep Learning Malware Classifiers. IEEE Trans. Computers 73(3): 708-721 (2024) - [j85]Benxin Zhang, Guopu Zhu, Zhibin Zhu, Hongli Zhang, Yicong Zhou, Sam Kwong:
Impulse Noise Image Restoration Using Nonconvex Variational Model and Difference of Convex Functions Algorithm. IEEE Trans. Cybern. 54(4): 2257-2270 (2024) - [c123]Zeshu Tian, Hongli Zhang, Yan Wang:
Reinforcement-Based Denoising for Crowdsourcing Named Entity Recognition in Social Networks. ICC 2024: 1163-1169 - [c122]Kai Tan, Dongyang Zhan, Zhaofeng Yu, Lin Ye, Hongli Zhang, Binxing Fang:
Multi-Stage Defense: Enhancing Robustness in Sequence-Based Log Anomaly Detection. ICC 2024: 2725-2730 - 2023
- [j84]Zhe Chen, Shang Li, Lin Ye, Hongli Zhang:
Multi-label classification of legal text based on label embedding and capsule network. Appl. Intell. 53(6): 6873-6886 (2023) - [j83]Dongyang Zhan, Zhaofeng Yu, Xiangzhan Yu, Hongli Zhang, Lin Ye, Likun Liu:
Securing Operating Systems Through Fine-Grained Kernel Access Limitation for IoT Systems. IEEE Internet Things J. 10(6, March 15): 5378-5392 (2023) - [j82]Dongyang Zhan, Kai Tan, Lin Ye, Xiangzhan Yu, Hongli Zhang, Zheng He:
An Adversarial Robust Behavior Sequence Anomaly Detection Approach Based on Critical Behavior Unit Learning. IEEE Trans. Computers 72(11): 3286-3299 (2023) - [j81]Yulan Zhang, Guopu Zhu, Xing Wang, Xiangyang Luo, Yicong Zhou, Hongli Zhang, Ligang Wu:
CNN-Transformer Based Generative Adversarial Network for Copy-Move Source/ Target Distinguishment. IEEE Trans. Circuits Syst. Video Technol. 33(5): 2019-2032 (2023) - [j80]Haining Yu, Hongli Zhang, Xiaohua Jia, Xiao Chen, Xiangzhan Yu:
pSafety: Privacy-Preserving Safety Monitoring in Online Ride Hailing Services. IEEE Trans. Dependable Secur. Comput. 20(1): 209-224 (2023) - [j79]Jinkun You, Yuan-Gen Wang, Guopu Zhu, Ligang Wu, Hongli Zhang, Sam Kwong:
Estimating the Secret Key of Spread Spectrum Watermarking Based on Equivalent Keys. IEEE Trans. Multim. 25: 2459-2473 (2023) - [j78]Yang Gao, Hongli Zhang, Xiangzhan Yu:
Higher-Order Community Detection: On Information Degeneration and Its Elimination. IEEE/ACM Trans. Netw. 31(2): 891-903 (2023) - [j77]Dongyang Zhan, Zhaofeng Yu, Xiangzhan Yu, Hongli Zhang, Lin Ye:
Shrinking the Kernel Attack Surface Through Static and Dynamic Syscall Limitation. IEEE Trans. Serv. Comput. 16(2): 1431-1443 (2023) - [j76]Dongyang Zhan, Xiangzhan Yu, Hongli Zhang, Lin Ye:
ErrHunter: Detecting Error-Handling Bugs in the Linux Kernel Through Systematic Static Analysis. IEEE Trans. Software Eng. 49(2): 684-698 (2023) - [c121]Yue Wu, Lin Ye, Baisong Li, Hongli Zhang, Jing Cao:
Comparative Performance Analysis of Lightweight BERT-derived Models for Cybersecurity Corpus in Cloud Networks. CloudNet 2023: 443-447 - [c120]Gongzhu Yin, Xing Wang, Hongli Zhang, Chao Meng, Yuchen Yang, Kun Lu, Yi Luo:
Beyond Individuals: Modeling Mutual and Multiple Interactions for Inductive Link Prediction between Groups. WSDM 2023: 751-759 - 2022
- [j75]Yang Gao, Xiangzhan Yu, Hongli Zhang:
Graph clustering using triangle-aware measures in large networks. Inf. Sci. 584: 618-632 (2022) - [j74]Fanghui Sun, Shen Wang, Hongli Zhang:
A progressive learning method on unknown protocol behaviors. J. Netw. Comput. Appl. 197: 103249 (2022) - [j73]Gongzhu Yin, Xing Wang, Hongli Zhang, Jinlin Wang:
Cost-effective CNNs-based prototypical networks for few-shot relation classification across domains. Knowl. Based Syst. 253: 109470 (2022) - [j72]Yulan Zhang, Guopu Zhu, Ligang Wu, Sam Kwong, Hongli Zhang, Yicong Zhou:
Multi-Task SE-Network for Image Splicing Localization. IEEE Trans. Circuits Syst. Video Technol. 32(7): 4828-4840 (2022) - [j71]Jie Chang, Guopu Zhu, Hongli Zhang, Yicong Zhou, Xiangyang Luo, Ligang Wu:
Reversible Data Hiding for Color Images Based on Adaptive 3D Prediction-Error Expansion and Double Deep Q-Network. IEEE Trans. Circuits Syst. Video Technol. 32(8): 5055-5067 (2022) - [j70]Xiaojie Fang, Zhaopeng Du, Xinyu Yin, Lei Liu, Xuejun Sha, Hongli Zhang:
Toward Physical Layer Security and Efficiency for SAGIN: A WFRFT-Based Parallel Complex-Valued Spectrum Spreading Approach. IEEE Trans. Intell. Transp. Syst. 23(3): 2819-2829 (2022) - [j69]Ahmed Samy, Ibrahim A. Elgendy, Haining Yu, Weizhe Zhang, Hongli Zhang:
Secure Task Offloading in Blockchain-Enabled Mobile Edge Computing With Deep Reinforcement Learning. IEEE Trans. Netw. Serv. Manag. 19(4): 4872-4887 (2022) - [j68]Haining Yu, Xiaohua Jia, Hongli Zhang, Jiangang Shu:
Efficient and Privacy-Preserving Ride Matching Using Exact Road Distance in Online Ride Hailing Services. IEEE Trans. Serv. Comput. 15(4): 1841-1854 (2022) - [c119]Chuanwang Ma, Yu Zhang, Binxing Fang, Hongli Zhang:
DWBFT: A Weighted Byzantine Fault Tolerant Protocol with Decentralized Trust. ICC 2022: 5384-5390 - 2021
- [j67]Xiaoding Guo, Hongli Zhang, Lin Ye, Shang Li:
TenLa: an approach based on controllable tensor decomposition and optimized lasso regression for judgement prediction of legal cases. Appl. Intell. 51(4): 2233-2252 (2021) - [j66]Yang Gao, Xiangzhan Yu, Hongli Zhang:
Overlapping community detection by constrained personalized PageRank. Expert Syst. Appl. 173: 114682 (2021) - [j65]Haining Yu, Hongli Zhang, Xiangzhan Yu, Xiaojiang Du, Mohsen Guizani:
PGRide: Privacy-Preserving Group Ridesharing Matching in Online Ride Hailing Services. IEEE Internet Things J. 8(7): 5722-5735 (2021) - [j64]Ahmed Samy, Haining Yu, Hongli Zhang, Guangyao Zhang:
SPETS: Secure and Privacy-Preserving Energy Trading System in Microgrid. Sensors 21(23): 8121 (2021) - [j63]Haining Yu, Xiaohua Jia, Hongli Zhang, Xiangzhan Yu, Jiangang Shu:
PSRide: Privacy-Preserving Shared Ride Matching for Online Ride Hailing Systems. IEEE Trans. Dependable Secur. Comput. 18(3): 1425-1440 (2021) - [j62]Yu Zhang, Wenfeng Liu, Zhongda Xia, Zhongze Wang, Lu Liu, Weizhe Zhang, Hongli Zhang, Binxing Fang:
Blockchain-Based DNS Root Zone Management Decentralization for Internet of Things. Wirel. Commun. Mob. Comput. 2021: 6620236:1-6620236:20 (2021) - [c118]Zhaofeng Yu, Lin Ye, Hongli Zhang, Dongyang Zhan:
A Container-Oriented Virtual-Machine-Introspection-Based Security Monitor to Secure Containers in Cloud Computing. ICAIS (2) 2021: 102-111 - [c117]Xiaojie Fang, Xinyu Yin, Ning Zhang, Xuejun Sha, Hongli Zhang, Zhu Han:
Demonstrating Physical Layer Security Via Weighted Fractional Fourier Transform. INFOCOM Workshops 2021: 1-2 - 2020
- [j61]Ahmed Samy, Haining Yu, Hongli Zhang:
Fog-Based Attack Detection Framework for Internet of Things Using Deep Learning. IEEE Access 8: 74571-74585 (2020) - [j60]Xiaoding Guo, Hongli Zhang, Lin Ye, Shang Li, Guangyao Zhang:
TenRR: An Approach Based on Innovative Tensor Decomposition and Optimized Ridge Regression for Judgment Prediction of Legal Cases. IEEE Access 8: 167914-167929 (2020) - [j59]Fanghui Sun, Shen Wang, Chunrui Zhang, Hongli Zhang:
Clustering of unknown protocol messages based on format comparison. Comput. Networks 179: 107296 (2020) - [j58]Xiaomeng Wang, Binxing Fang, Hongli Zhang, Xing Wang:
Predicting the security threats on the spreading of rumor, false information of Facebook content based on the principle of sociology. Comput. Commun. 150: 455-462 (2020) - [j57]Ning Zhang, Xiaojie Fang, Ye Wang, Shaohua Wu, Huici Wu, Dulal Kar, Hongli Zhang:
Physical-Layer Authentication for Internet of Things via WFRFT-Based Gaussian Tag Embedding. IEEE Internet Things J. 7(9): 9001-9010 (2020) - [j56]Yang Gao, Xiangzhan Yu, Hongli Zhang:
Uncovering overlapping community structure in static and dynamic networks. Knowl. Based Syst. 201-202: 106060 (2020) - [j55]Haining Yu, Hongli Zhang, Xiangzhan Yu:
Hail the Closest Driver on Roads: Privacy-Preserving Ride Matching in Online Ride Hailing Services. Secur. Commun. Networks 2020: 4948387:1-4948387:13 (2020) - [c116]Jiaxi Liu, Lin Ye, Hongli Zhang, Xiaoding Guo:
Named entity recognition of legal judgment based on small-scale labeled data. CIAT 2020: 549-555 - [c115]Wenfeng Liu, Yu Zhang, Lu Liu, Shuyan Liu, Hongli Zhang, Binxing Fang:
A secure domain name resolution and management architecture based on blockchain. ISCC 2020: 1-7
2010 – 2019
- 2019
- [j54]Shang Li, Hongli Zhang, Lin Ye, Xiaoding Guo, Binxing Fang:
MANN: A Multichannel Attentive Neural Network for Legal Judgment Prediction. IEEE Access 7: 151144-151155 (2019) - [j53]Yuxi Xie, Lizhi Peng, Zhenxiang Chen, Bo Yang, Hongli Zhang, Haibo Zhang:
Generative learning for imbalanced data using the Gaussian mixed model. Appl. Soft Comput. 79: 439-451 (2019) - [j52]Xiaoding Guo, Hongli Zhang, Lin Ye, Shang Li:
RnRTD: Intelligent Approach Based on the Relationship-Driven Neural Network and Restricted Tensor Decomposition for Multiple Accusation Judgment in Legal Cases. Comput. Intell. Neurosci. 2019: 6705405:1-6705405:18 (2019) - [j51]Xiaomeng Wang, Binxing Fang, Hongli Zhang, Yuhang Wang:
A competitive model of popularity prediction using correlation matrix. Clust. Comput. 22(Supplement): 2747-2759 (2019) - [j50]Fanghui Sun, Shen Wang, Chunrui Zhang, Hongli Zhang:
Unsupervised field segmentation of unknown protocol messages. Comput. Commun. 146: 121-130 (2019) - [j49]Dongyang Zhan, Lin Ye, Binxing Fang, Hongli Zhang:
SAVM: A practical secure external approach for automated in-VM management. Concurr. Comput. Pract. Exp. 31(23) (2019) - [j48]Jinlin Wang, Haining Yu, Xing Wang, Hongli Zhang, Binxing Fang, Yuchen Yang, Xiaozhou Zhu:
DRAV: Detection and repair of data availability violations in Internet of Things. Int. J. Distributed Sens. Networks 15(11) (2019) - [j47]Ying Pang, Lizhi Peng, Zhenxiang Chen, Bo Yang, Hongli Zhang:
Imbalanced learning based on adaptive weighting and Gaussian function synthesizing with an application on Android malware detection. Inf. Sci. 484: 95-112 (2019) - [j46]Yuhang Wang, Zhihong Tian, Hongli Zhang, Shen Su, Wei Shi:
Erratum: Wang, Y. et al., A Privacy Preserving Scheme for Nearest Neighbor Query. Sensors 2018, 18, 2440. Sensors 19(14): 3187 (2019) - [j45]Nabin Kumar Karn, Hongli Zhang, Feng Jiang, Rahul Yadav, Asif Ali Laghari:
Measuring bandwidth and buffer occupancy to improve the QoE of HTTP adaptive streaming. Signal Image Video Process. 13(7): 1367-1375 (2019) - [j44]Haining Yu, Jiangang Shu, Xiaohua Jia, Hongli Zhang, Xiangzhan Yu:
lpRide: Lightweight and Privacy-Preserving Ride Matching Over Road Networks in Online Ride Hailing Systems. IEEE Trans. Veh. Technol. 68(11): 10418-10428 (2019) - [j43]Xiaoding Guo, Hongli Zhang, Lin Ye, Shang Li:
Learning Users' Intention of Legal Consultation through Pattern-Oriented Tensor Decomposition with Bi-LSTM. Wirel. Commun. Mob. Comput. 2019: 2589784:1-2589784:16 (2019) - [c114]Xiaoding Guo, Hongli Zhang, Lin Ye, Shang Li:
RnnTd: An Approach Based on LSTM and Tensor Decomposition for Classification of Crimes in Legal Cases. DSC 2019: 16-22 - [c113]Likun Liu, Jiantao Shi, Hongli Zhang, Xiangzhan Yu:
No Way to Evade: Detecting Multi-Path Routing Attacks for NIDS. GLOBECOM 2019: 1-6 - [c112]Xiaomeng Wang, Binxing Fang, Hongli Zhang, Xing Wang:
Analyzing and Predicting the Popularity of Online Content Using the Weak Ties Theory. HPCC/SmartCity/DSS 2019: 1743-1748 - [c111]Jinlin Wang, Hongli Zhang, Binxing Fang, Xing Wang, Gongzhu Yin, Ximiao Yu:
EDCleaner: Data Cleaning for Entity Information in Social Network. ICC 2019: 1-7 - [c110]Dongyang Zhan, Huhua Li, Lin Ye, Hongli Zhang, Binxing Fang, Xiaojiang Du:
A Low-Overhead Kernel Object Monitoring Approach for Virtual Machine Introspection. ICC 2019: 1-6 - [c109]Shang Li, Bin Guo, Yilei Cai, Lin Ye, Hongli Zhang, Binxing Fang:
Legal Case Inspection: An Analogy-Based Approach to Judgment Evaluation. ICAIS (1) 2019: 148-158 - [c108]Shang Li, Boyang Liu, Lin Ye, Hongli Zhang, Binxing Fang:
Element-Aware Legal Judgment Prediction for Criminal Cases with Confusing Charges. ICTAI 2019: 660-667 - [c107]Likun Liu, Hongli Zhang, Jiantao Shi, Xiangzhan Yu, Haixiao Xu:
I2P Anonymous Communication Network Measurement and Analysis. SmartCom 2019: 105-115 - [i5]Zhihong Tian, Shen Su, Xiang Yu, Yuhang Wang, Hongli Zhang, Xiaojiang Du, Mohsen Guizani:
Vcash: A Novel Reputation Framework for Identifying Denial of Traffic Service in Internet of Connected Vehicles. CoRR abs/1902.03994 (2019) - [i4]Dongyang Zhan, Huhua Li, Lin Ye, Hongli Zhang, Binxing Fang, Xiaojiang Du:
A Low-overhead Kernel Object Monitoring Approach for Virtual Machine Introspection. CoRR abs/1902.05135 (2019) - 2018
- [j42]Zhigang Zhou, Hongli Zhang, Shang Li, Xiaojiang Du:
Hermes: A Privacy-Preserving Approximate Search Framework for Big Data. IEEE Access 6: 20009-20020 (2018) - [j41]Dongyang Zhan, Lin Ye, Hongli Zhang, Binxing Fang, Huhua Li, Yang Liu, Xiaojiang Du, Mohsen Guizani:
A high-performance virtual machine filesystem monitor in cloud-assisted cognitive IoT. Future Gener. Comput. Syst. 88: 209-219 (2018) - [j40]Xianyan Wu, Qi Han, Xiamu Niu, Hongli Zhang, Siu-Ming Yiu, Jun-bin Fang:
JPEG image width estimation for file carving. IET Image Process. 12(7): 1245-1252 (2018) - [j39]Majing Su, Hongli Zhang, Md. Zakirul Alam Bhuiyan, Xiaojiang Du, Peng Zhang:
An effective copyright-protected content delivery scheme for P2P file sharing networks. Int. J. Commun. Syst. 31(16) (2018) - [j38]Nabin Kumar Karn, Hongli Zhang, Feng Jiang:
User-perceived quality aware adaptive streaming of 3D multi-view video plus depth over the internet. Multim. Tools Appl. 77(17): 22965-22983 (2018) - [j37]Yuhang Wang, Zhihong Tian, Hongli Zhang, Shen Su, Wei Shi:
A Privacy Preserving Scheme for Nearest Neighbor Query. Sensors 18(8): 2440 (2018) - [j36]Dongyang Zhan, Lin Ye, Binxing Fang, Hongli Zhang, Xiaojiang Du:
Checking virtual machine kernel control-flow integrity using a page-level dynamic tracing approach. Soft Comput. 22(23): 7977-7987 (2018) - [j35]Hongli Zhang, Zhigang Zhou, Lin Ye, Xiaojiang Du:
Towards Privacy Preserving Publishing of Set-Valued Data on Hybrid Cloud. IEEE Trans. Cloud Comput. 6(2): 316-329 (2018) - [j34]Likun Liu, Hongli Zhang, Xiangzhan Yu, Yi Xin, Muhammad Shafiq, Mengmeng Ge:
An Efficient Security System for Mobile Data Monitoring. Wirel. Commun. Mob. Comput. 2018: 9809345:1-9809345:10 (2018) - [c106]Rui Jin, Hongli Zhang, Yu Zhang:
The social negative mood index for social networks. DSC 2018: 1-5 - [c105]Xiaomeng Wang, Binxing Fang, Hongli Zhang, Shen Su:
Predicting the Popularity of Online Content Based on the Weak Ties Theory. DSC 2018: 386-391 - [c104]Shang Li, Hongli Zhang, Lin Ye, Xiaoding Guo, Binxing Fang:
Evaluating the Rationality of Judicial Decision with LSTM-Based Case Modeling. DSC 2018: 392-397 - [c103]Guangwei Yang, Haining Yu, Hongli Zhang, Xiangzhan Yu:
A Metadata-Based Representation Method of the Internet of Things. DSC 2018: 498-505 - [c102]Yuhang Wang, Hongli Zhang, Shen Su, Zhihong Tian:
A Location Privacy-Aware Method for kNN Query in Location Based Services. DSC 2018: 537-541 - [c101]Jinlin Wang, Hongli Zhang, Binxing Fang, Xing Wang, Yuanxin Zhang:
Evaluation on Availability of Entity Information in Cyberspace. DSC 2018: 811-818 - [c100]Ming Hou, Hongli Zhang, Yuhang Wang:
OFC: An Approach for Protecting Location Privacy from Location Provider in Location-Based Services. DSC 2018: 917-922 - [c99]Jingwei Liu, Xiaolu Li, Lin Ye, Hongli Zhang, Xiaojiang Du, Mohsen Guizani:
BPDS: A Blockchain Based Privacy-Preserving Data Sharing for Electronic Medical Records. GLOBECOM 2018: 1-6 - [c98]Yuhang Wang, Hongli Zhang, Shen Su:
VAT: A Velocity-Aware Trajectory Privacy Preservation Scheme for IoT Searching. ICCCS (2) 2018: 357-365 - [c97]Ke Li, Xiangzhan Yu, Hongli Zhang, Longfei Wu, Xiaojiang Du, E. Paul Ratazzi, Mohsen Guizani:
Security Mechanisms to Defend against New Attacks on Software-Defined Radio. ICNC 2018: 537-541 - [c96]Likun Liu, Jiantao Shi, Hongli Zhang, Xiangzhan Yu:
Tearing Down the Face of Algorithmic Complexity Attacks for DPI Engines. ISPA/IUCC/BDCloud/SocialCom/SustainCom 2018: 751-758 - [i3]Dongyang Zhan, Lin Ye, Hongli Zhang, Binxing Fang, Huhua Li, Yang Liu, Xiaojiang Du, Mohsen Guizani:
A high-performance virtual machine filesystem monitor in cloud-assisted cognitive IoT. CoRR abs/1804.01633 (2018) - [i2]Hongli Zhang, Yuhang Wang, Xiaojiang Du, Mohsen Guizani:
Preserving Location Privacy in Mobile Edge Computing. CoRR abs/1804.01636 (2018) - [i1]Jingwei Liu, Xiaolu Li, Lin Ye, Hongli Zhang, Xiaojiang Du, Mohsen Guizani:
BPDS: A Blockchain based Privacy-Preserving Data Sharing for Electronic Medical Records. CoRR abs/1811.03223 (2018) - 2017
- [j33]Yanbin Sun, Yu Zhang, Binxing Fang, Hongli Zhang:
Succinct and practical greedy embedding for geometric routing. Comput. Commun. 114: 51-61 (2017) - [j32]Lizhi Peng, Hongli Zhang, Haibo Zhang, Bo Yang:
A fast feature weighting algorithm of data gravitation classification. Inf. Sci. 375: 54-78 (2017) - [c95]Jinlin Wang, Hongli Zhang, Binxing Fang, Xing Wang, Lin Ye:
A Survey on Data Cleaning Methods in Cyberspace. DSC 2017: 74-81 - [c94]Xiaomeng Wang, Binxing Fang, Hongli Zhang, XuanYu:
Predicting the Popularity of News Based on Competitive Matrix. DSC 2017: 151-155 - [c93]Shang Li, Zhigang Zhou, Hongli Zhang, Binxing Fang:
An approximate search framework for big data. ICC 2017: 1-6 - 2016
- [j31]Yanbin Sun, Yu Zhang, Binxing Fang, Hongli Zhang:
SNGR: Scalable Name-Based Geometric Routing for ICN. IEICE Trans. Commun. 99-B(8): 1835-1845 (2016) - [j30]Zhikai Xu, Hongli Zhang, Xiang-Zhan Yu, Shen Su:
Privacy-Aware Information Sharing in Location-Based Services: Attacks and Defense. IEICE Trans. Inf. Syst. 99-D(8): 1991-2001 (2016) - [j29]Mahmoud Emam, Qi Han, Liyang Yu, Hongli Zhang:
A Keypoint-Based Region Duplication Forgery Detection Algorithm. IEICE Trans. Inf. Syst. 99-D(9): 2413-2416 (2016) - [j28]Hongli Zhang, Zhikai Xu, Xiaojiang Du, Zhigang Zhou, Jiantao Shi:
CAPR: context-aware participant recruitment mechanism in mobile crowdsourcing. Wirel. Commun. Mob. Comput. 16(15): 2179-2193 (2016) - [j27]Zhigang Zhou, Hongli Zhang, Lin Ye, Xiaojiang Du:
Cuckoo: flexible compute-intensive task offloading in mobile cloud computing. Wirel. Commun. Mob. Comput. 16(18): 3256-3268 (2016) - [c92]Shen Su, Hongli Zhang, Yue Zhang, Dongyang Zhan, Junxi Guo:
Shrinking the Sentiment Analysis for Signed Network Construction. DSC 2016: 353-357 - [c91]Pengfule Ding, Zhihong Tian, Hongli Zhang, Yong Wang, Liang Zhang, Sanchuan Guo:
Detection and Defense of SYN Flood Attacks Based on Dual Stack Network Firewall. DSC 2016: 526-531 - [c90]Yang Gao, Hongli Zhang, Yue Zhang:
A Fast and High Quality Approach for Overlapping Community Detection through Minimizing Conductance. DSC 2016: 688-693 - [c89]Hongli Zhang, Zhikai Xu, Xiang-Zhan Yu, Xiaojiang Du:
LPPS: Location privacy protection for smartphones. ICC 2016: 1-6 - [c88]Mahmoud Emam, Qi Han, Hongli Zhang:
Detection of Copy-Scale-Move Forgery in Digital Images Using SFOP and MROGH. ICYCSEE (1) 2016: 326-334 - [c87]Zhikai Xu, Hongli Zhang, Xiang-Zhan Yu:
Multiple Mix-Zones Deployment for Continuous Location Privacy Protection. Trustcom/BigDataSE/ISPA 2016: 760-766 - 2015
- [j26]Hongli Zhang, Qiang Zhang, Zhigang Zhou, Xiaojiang Du, Wei Yu, Mohsen Guizani:
Processing geo-dispersed big data in an advanced mapreduce framework. IEEE Netw. 29(5): 24-30 (2015) - [j25]Hongli Zhang, Dongliang Xu, Zhihong Tian, Yujian Fan:
An efficient parallel algorithm for exact multi-pattern matching. Secur. Commun. Networks 8(9): 1688-1697 (2015) - [j24]Hongli Zhang, Qiang Zhang, Xiaojiang Du:
Toward Vehicle-Assisted Cloud Computing for Smartphones. IEEE Trans. Veh. Technol. 64(12): 5610-5618 (2015) - [c86]Yanbin Sun, Yu Zhang, Hongli Zhang, Binxing Fang, Xiaojiang Du:
Geometric Routing on Flat Names for ICN. GLOBECOM 2015: 1-6 - [c85]Zhigang Zhou, Hongli Zhang, Xiang-Zhan Yu, Junwu Guo:
Continuous resource allocation in cloud computing. ICC 2015: 319-324 - [c84]Hongli Zhang, Zhikai Xu, Zhigang Zhou, Jiantao Shi, Xiaojiang Du:
CLPP: Context-aware location privacy protection for location-based social network. ICC 2015: 1164-1169 - [c83]Longfei Wu, Xiaojiang Du, Hongli Zhang, Wei Yu, Chonggang Wang:
Effective task scheduling in proximate mobile device based communication systems. ICC 2015: 3503-3508 - [c82]Majing Su, Hongli Zhang, Xiaojiang Du, Qiong Dai:
A novel stochastic-encryption-based P2P Digital Rights Management scheme. ICC 2015: 5541-5545 - [c81]Hongli Zhang, Dongliang Xu, Lei Zhang, Yanbin Sun:
Matrix-based parallel pattern matching method. ICC 2015: 7114-7119 - [c80]Shen Su, Beichuan Zhang, Lin Ye, Hongli Zhang, Nathan Yee:
Towards real-time route leak events detection. ICC 2015: 7192-7197 - [c79]Zhigang Zhou, Hongli Zhang, Xiang-Zhan Yu, Junwu Guo:
Audit meets game theory: Verifying reliable execution of SLA for compute-intensive program in cloud. ICC 2015: 7456-7461 - [c78]Longfei Wu, Xiaojiang Du, Hongli Zhang:
An effective access control scheme for preventing permission leak in Android. ICNC 2015: 57-61 - [c77]Yanbin Sun, Yu Zhang, Hongli Zhang, Binxing Fang, Jiantao Shi:
An ICN-Oriented Name-Based Routing Scheme. ICYCSEE 2015: 101-108 - [c76]Junwu Guo, Zhigang Zhou, Hongli Zhang:
Cocktail: A New Tool for Audit by Performance Evaluation on Local Machine. SOSE 2015: 241-246 - [c75]Hongli Zhang, Panpan Li, Zhigang Zhou:
Performance Difference Prediction in Cloud Services for SLA-Based Auditing. SOSE 2015: 253-258 - 2014
- [j23]Lizhi Peng, Hongli Zhang, Bo Yang, Yuehui Chen:
A new approach for imbalanced data classification based on data gravitation. Inf. Sci. 288: 347-373 (2014) - [j22]Hongli Zhang, Panpan Li, Zhigang Zhou, Junchao Wu, Xiang-Zhan Yu:
A Privacy-aware Virtual Machine Migration Framework on Hybrid Clouds. J. Networks 9(5): 1086-1095 (2014) - [j21]Hongli Zhang, Lin Ye, Jiantao Shi, Xiaojiang Du, Mohsen Guizani:
Verifying cloud service-level agreement by a third-party auditor. Secur. Commun. Networks 7(3): 492-502 (2014) - [j20]Juan Chen, Hongli Zhang, Xiaojiang Du, Binxing Fang, Liu Yan:
Designing robust routing protocols to protect base stations in wireless sensor networks. Wirel. Commun. Mob. Comput. 14(17): 1613-1626 (2014) - [c74]Yu Zhang, Hongli Zhang, Lixia Zhang:
Kite: a mobility support scheme for NDN. ICN 2014: 179-180 - [c73]Hongli Zhang, Qiang Zhang:
A Novel Road Topology-aware Routing in VANETs. APWeb Workshophs 2014: 167-176 - [c72]Dongliang Xu, Hongli Zhang, Miao Hou:
The Improved AC High-Performance Pattern-Matching Algorithm for Intrusion Detection. APWeb Workshophs 2014: 200-213 - [c71]Qiang Zhang, Hongli Zhang, Xiaojiang Du, Zhigang Zhou, Shen Su, Rui Jin:
Contention-based adaptive position update for intermittently connected VANETs. GLOBECOM 2014: 51-56 - [c70]Zhigang Zhou, Hongli Zhang, Qiang Zhang, Yang Xu, Panpan Li:
Privacy-preserving granular data retrieval indexes for outsourced cloud data. GLOBECOM 2014: 601-606 - [c69]Lin Ye, Hongli Zhang, Xiaojiang Du:
Modeling Leechers attack in BitTorrent. GLOBECOM 2014: 681-685 - [c68]Lizhi Peng, Hongli Zhang, Bo Yang, Yuehui Chen:
Feature Evaluation for Early Stage Internet Traffic Identification. ICA3PP (1) 2014: 511-525 - [c67]Shen Su, Hongli Zhang, Binxing Fang, Lin Ye:
Quantifying AS-level routing policy changes. ICC 2014: 1148-1153 - [e1]Weihong Han, Zi Huang, Changjun Hu, Hongli Zhang, Li Guo:
Web Technologies and Applications - APWeb 2014 Workshops, SNA, NIS, and IoTS, Changsha, China, September 5, 2014. Proceedings. Lecture Notes in Computer Science 8710, Springer 2014, ISBN 978-3-319-11118-6 [contents] - 2013
- [j19]Yu Cui, Zhihong Tian, Binxing Fang, Hongli Zhang, Weizhe Zhang:
Data Spoofing Attacks by IPv6 Tunnels. IEICE Trans. Commun. 96-B(11): 2875-2882 (2013) - [j18]Lei Zhang, Hongli Zhang, Xiajiong Shen, Lihua Yin:
A bottom-up algorithm of vertical assembling concept lattices. Int. J. Data Min. Bioinform. 7(3): 229-244 (2013) - [j17]Hongli Zhang, Lin Ye, Jiantao Shi, Xiaojiang Du, Hsiao-Hwa Chen:
Preventing Piracy Content Propagation in Peer-to-Peer Networks. IEEE J. Sel. Areas Commun. 31(9-Supplement): 105-114 (2013) - [j16]Majing Su, Hongli Zhang, Xiaojiang Du, Binxing Fang, Mohsen Guizani:
A Measurement Study on the Topologies of BitTorrent Networks. IEEE J. Sel. Areas Commun. 31(9-Supplement): 338-347 (2013) - [c66]Hongli Zhang, Zhigang Zhou, Xiaojiang Du, Panpan Li, Xiang-Zhan Yu:
Practical and privacy-assured data indexes for outsourced cloud data. GLOBECOM 2013: 671-676 - [c65]Hongli Zhang, Lin Ye, Xiaojiang Du, Mohsen Guizani:
Protecting private cloud located within public cloud. GLOBECOM 2013: 677-681 - [c64]Hongli Zhang, Panpan Li, Zhigang Zhou, Xiaojiang Du, Weizhe Zhang:
A performance prediction scheme for computation-intensive applications on cloud. ICC 2013: 1957-1961 - [c63]Xia Liu, Zhigang Zhou, Xiaojiang Du, Hongli Zhang, Junchao Wu:
Glaucus: Predicting Computing-Intensive Program's Performance for Cloud Customers. ICIC (1) 2013: 285-294 - [c62]Hongli Zhang, Jiantao Shi, Lin Ye, Xiaojiang Du:
PPBD: A piracy preventing system for BT DHT networks. INFOCOM 2013: 1806-1814 - [c61]Zhigang Zhou, Hongli Zhang, Xiaojiang Du, Panpan Li, Xiang-Zhan Yu:
Prometheus: Privacy-aware data retrieval on hybrid cloud. INFOCOM 2013: 2643-2651 - 2012
- [j15]Hongli Zhang, Gang Lu, Mahmoud T. Qassrawi, Yu Zhang, Xiang-Zhan Yu:
Feature selection for optimizing traffic classification. Comput. Commun. 35(12): 1457-1471 (2012) - [j14]Haining Yu, Hongli Zhang, Binxing Fang, Xiang-Zhan Yu:
A Large Scale Code Resolution Service Network in the Internet of Things. Sensors 12(11): 15206-15243 (2012) - [c60]Yifei Zhang, Hongli Zhang:
Synthetic evaluation on the performance of network coordinate systems. CCIS 2012: 642-645 - [c59]Majing Su, Hongli Zhang, Binxing Fang, Ning Yan:
A measurement. CyberC 2012: 512-518 - [c58]Lin Ye, Hongli Zhang, Jiantao Shi, Xiaojiang Du:
Verifying cloud Service Level Agreement. GLOBECOM 2012: 777-782 - [c57]Majing Su, Hongli Zhang, Xiaojiang Du, Binxing Fang, Mohsen Guizani:
Understanding the topologies of BitTorrent networks: A measurement view. GLOBECOM 2012: 1994-1999 - [c56]Juan Chen, Hongli Zhang, Binxing Fang, Xiaojiang Du, Haining Yu, Xiang-Zhan Yu:
An efficient and sustainable self-healing protocol for Unattended Wireless Sensor Networks. GLOBECOM 2012: 5356-5361 - [c55]Juan Chen, Hongli Zhang, Xiaojiang Du, Binxing Fang, Yan Liu, Haining Yu:
Base station location protection in wireless sensor networks: Attacks and defense. ICC 2012: 554-559 - [c54]Majing Su, Hongli Zhang, Binxing Fang, Xiaojiang Du:
DDoS vulnerability of BitTorrent Peer Exchange extension: Analysis and defense. ICC 2012: 1048-1052 - [c53]Gang Lu, Hongli Zhang, Mahmoud T. Qassrawi, Xiangzhan Yu:
Comparison and Analysis of Flow Features at the Packet Level for Traffic Classification. ICCVE 2012: 262-267 - [c52]Qiao Li, Hui He, Binxing Fang, Hongli Zhang:
A Novel Cache Replacement Policy for ISP Merged CDN. ICPADS 2012: 708-709 - [c51]Weizhe Zhang, Hongli Zhang, Huixiang Chen, Qizhen Zhang, Albert M. K. Cheng:
Improving the QoS of Web Applications across Multiple Virtual Machines in Cloud Computing Environment. IPDPS Workshops 2012: 2247-2253 - [c50]Bing Rao, Zhigang Zhou, Hongli Zhang, Shuofei Tang, Renfu Yao:
Outsourcing Cloud Data Privacy-Preserving Based on Over-Encryption. ISCTCS 2012: 109-116 - [c49]Meng Zhang, Hongli Zhang, Bo Zhang, Gang Lu:
Encrypted Traffic Classification Based on an Improved Clustering Algorithm. ISCTCS 2012: 124-131 - [c48]Haining Yu, Hongli Zhang, Xingzhan Yu:
A Flexible Framework for Representations of Entities in the Internet of Things. ISCTCS 2012: 295-302 - [c47]Hongli Zhang, Panpan Li, Zhigang Zhou, Xiangzhan Yu:
A PSO-Based Hierarchical Resource Scheduling Strategy on Cloud Computing. ISCTCS 2012: 325-332 - [c46]Yujian Fan, Hongli Zhang, Jiahui Liu, Dongliang Xu:
An Efficient Parallel String Matching Algorithm Based on DFA. ISCTCS 2012: 349-356 - [c45]Junchao Wu, Panpan Li, Hongli Zhang, Binsheng Chu:
A Reliable Query Scheme for Outsourced Data in Cloud. ISCTCS 2012: 730-736 - 2011
- [j13]Yu Zhang, Ricardo V. Oliveira, Yangyang Wang, Shen Su, Baobao Zhang, Jun Bi, Hongli Zhang, Lixia Zhang:
A Framework to Quantify the Pitfalls of Using Traceroute in AS-Level Topology Measurement. IEEE J. Sel. Areas Commun. 29(9): 1822-1836 (2011) - [c44]Jiantao Shi, Hongli Zhang, Xiang-Zhan Yu, Jianhong Zhai:
Reliable object rating framework for content sharing system. CSS 2011: 27-32 - [c43]Juan Chen, Hongli Zhang, Binxing Fang, Xiaojiang Du, Lihua Yin, Xiang-Zhan Yu:
Towards Efficient Anonymous Communications in Sensor Networks. GLOBECOM 2011: 1-5 - [c42]Phillip Reindl, Xiaojiang Du, Kendall E. Nygard, Hongli Zhang:
Lightweight Source Anonymity in Wireless Sensor Networks. GLOBECOM 2011: 1-5 - 2010
- [j12]Xiao Xu, Weizhe Zhang, Hongli Zhang, Binxing Fang:
Efficient Distributed Web Crawling Utilizing Internet Resources. IEICE Trans. Inf. Syst. 93-D(10): 2747-2762 (2010) - [j11]Xiao Xu, Weizhe Zhang, Hongli Zhang, Binxing Fang:
Exploring Web Partition in DHT-Based Distributed Web Crawling. IEICE Trans. Inf. Syst. 93-D(11): 2907-2921 (2010) - [j10]Lin Ye, Hongli Zhang, Fei Li, Majing Su:
A Measurement Study on BitTorrent System. Int. J. Commun. Netw. Syst. Sci. 3(12): 916-924 (2010) - [j9]Xiao Xu, Weizhe Zhang, Hongli Zhang, Binxing Fang:
Exploiting Location-aware Mechanism for Distributed Web Crawling over DHTs. J. Comput. 5(11): 1646-1654 (2010) - [j8]Safaa O. Al-Mamory, Hongli Zhang:
New data mining technique to enhance IDS alarms quality. J. Comput. Virol. 6(1): 43-55 (2010) - [c41]Wenmao Liu, Lihua Yin, Weizhe Zhang, Hongli Zhang:
A General Distributed Object Locating Architecture in the Internet of Things. ICPADS 2010: 730-735 - [c40]Lizhi Peng, Hongli Zhang, Bo Yang, Yuehui Chen, Mahmoud T. Qassrawi, Gang Lu:
Traffic identification using flexible neural trees. IWQoS 2010: 1-5 - [c39]Xiao Xu, Weizhe Zhang, Hongli Zhang, Binxing Fang:
Scale-Adaptable Recrawl Strategies for DHT-Based Distributed Web Crawling System. NPC 2010: 91-105 - [c38]Yu Zhang, Ricardo V. Oliveira, Hongli Zhang, Lixia Zhang:
Quantifying the Pitfalls of Traceroute in AS Connectivity Inference. PAM 2010: 91-100
2000 – 2009
- 2009
- [j7]Safaa O. Al-Mamory, Hongli Zhang:
Intrusion detection alarms reduction using root cause analysis and clustering. Comput. Commun. 32(2): 419-430 (2009) - [j6]Safaa O. Al-Mamory, Hongli Zhang:
IDS alerts correlation using grammar-based approach. J. Comput. Virol. 5(4): 271-282 (2009) - [c37]Lin Ye, Hongli Zhang, Weizhe Zhang, Jian Tan:
Measurement and Analysis of BitTorrent Availability. ICPADS 2009: 787-792 - [c36]Xiao Xu, Weizhe Zhang, Hongli Zhang, Binxing Fang, Xinran Liu:
A Forwarding-Based Task Scheduling Algorithm for Distributed Web Crawling over DHTs. ICPADS 2009: 854-859 - [c35]Yifei Zhang, Hongli Zhang:
A Steady Network Coordinate System for Network Distance Estimating. ICPADS 2009: 860-863 - [c34]Wei Jiang, Binxing Fang, Hongli Zhang, Zhihong Tian, Xin-fang Song:
Optimal Network Security Strengthening Using Attack-Defense Game Model. ITNG 2009: 475-480 - [c33]Guangyu Shi, Youshui Long, Hao Gong, Changqing Wan, Chuanliang Yu, Xianqing Yang, Hongli Zhang, Yunfei Zhang:
HiFiP2P: The Simulator Capable of Massive Nodes and MeasuredUnderlay. PDP 2009: 285-292 - 2008
- [c32]Zhihong Tian, Baoshan Qin, Jianwei Ye, Hongli Zhang:
Alertclu: A Realtime Alert Aggregation and Correlation System. CW 2008: 778-781 - [c31]Yu Zhang, Binxing Fang, Hongli Zhang:
On Destination Set in IP-Level Topology Measurement. ICN 2008: 168-173 - [c30]Wei Jiang, Zhihong Tian, Hongli Zhang, Xin-fang Song:
A Stochastic Game Theoretic Approach to Attack Prediction and Optimal Active Defense Strategy Decision. ICNSC 2008: 648-653 - [c29]Weizhe Zhang, Hongli Zhang, Xinran Liu, Xuemai Gu:
Parallel Job Scheduling with Time-varying Constraints for Heterogeneous Multiple-Cluster Systems. ICYCS 2008: 1843-1848 - [c28]Safaa O. Al-Mamory, Hongli Zhang, Ayad R. Abbas:
Modeling network attacks for scenario construction. IJCNN 2008: 1495-1502 - [c27]Safaa O. Al-Mamory, Hongli Zhang, Ayad R. Abbas:
IDS alarms reduction using data mining. IJCNN 2008: 3564-3570 - [c26]Guangyu Shi, Youshui Long, Hao Gong, Changqing Wan, Chuanliang Yu, Xianqing Yang, Hongli Zhang:
A High Scalability P2P Simulation Framework with Measured Realistic Network Layer Support. IPCCC 2008: 311-318 - [c25]Guangyu Shi, Youshui Long, Jian Chen, Hao Gong, Hongli Zhang:
2MC-Match: A topology matching technique with 2-means clustering algorithm in P2P systems. ISCC 2008 - [c24]Guangyu Shi, Youshui Long, Jian Chen, Hao Gong, Hongli Zhang:
T2MC: A Peer-to-Peer Mismatch Reduction Technique by Traceroute and 2-Means Classification Algorithm. Networking 2008: 366-374 - 2007
- [c23]Safaa O. Al-Mamory, Hongli Zhang:
Scenario Discovery Using Abstracted Correlation Graph. CIS 2007: 702-706 - [c22]Wei Jiang, Hongli Zhang, Zhihong Tian, Xin-fang Song:
A Game Theoretic Method for Decision and Analysis of the Optimal Active Defense Strategy. CIS 2007: 819-823 - 2006
- [j5]Weizhe Zhang, Binxing Fang, Mingzeng Hu, Xinran Liu, Hongli Zhang, Lei Gao:
Multisite co-allocation scheduling algorithms for parallel jobs in computing grid environments. Sci. China Ser. F Inf. Sci. 49(6): 906-926 (2006) - [j4]Jianqi Tang, Binxing Fang, Mingzeng Hu, Hongli Zhang:
A parallel programming interface for out-of-core cluster applications. Clust. Comput. 9(3): 321-327 (2006) - [j3]Weizhe Zhang, Mingzeng Hu, Hongli Zhang, Kaipeng Liu:
A Multiobjective Evolutionary Algorithm for Grid Job Scheduling of Multi-QoS Constraints. J. Comput. Res. Dev. 43(11): 1855-1862 (2006) - [j2]Zhihong Tian, Mingzeng Hu, Bin Li, Bo Liu, Hongli Zhang:
Defending against distributed denial-of-service attacks with an auction-based method. Web Intell. Agent Syst. 4(3): 341-351 (2006) - [c21]Hongjie Sun, Binxing Fang, Hongli Zhang:
User-Perceived Web QoS Measurement and Evaluation System. APWeb 2006: 157-165 - [c20]Hui He, Mingzeng Hu, Hongli Zhang:
Clustering of Network Link Characteristic for Detector Placement of Macroscopical Prewarning. IMSCCS (2) 2006: 155-159 - 2005
- [c19]Hui He, Mingzeng Hu, Weizhe Zhang, Hongli Zhang, Zhi Yang:
Topology-Based Macroscopical Response and Control Technology for Network Security Event. CIS (2) 2005: 560-566 - [c18]Jun Zheng, Mingzeng Hu, Hongli Zhang:
Usage Behavior Profiling for Anomaly Detection using Vector Quantization. Communication Systems and Applications 2005: 107-112 - [c17]Hui He, Mingzeng Hu, Weizhe Zhang, Hongli Zhang:
Fast Detection of Worm Infection for Large-Scale Networks. ICMLC 2005: 672-681 - [c16]Hui He, Mingzeng Hu, Hongli Zhang, Zhenjiang Tang:
On the Effectiveness of multi-similarity for early detection of worms. PDCAT 2005: 229-233 - [c15]Hongjie Sun, Binxing Fang, Hongli Zhang:
A Distributed Architecture for Network Performance Measurement and Evaluation System. PDCAT 2005: 471-475 - [c14]Weizhe Zhang, Mingzeng Hu, Hongli Zhang:
Load Balance Heuristics for Synchronous Iterative Applications on Heterogeneous Cluster Systems. PDCAT 2005: 1063-1067 - [c13]Xiaofeng Wang, Binxing Fang, Hongli Zhang, Weizhe Zhang:
A Model for Estimating the Performance of Synchronous Parallel Network Simulation. IASTED PDCS 2005: 548-553 - 2004
- [j1]Wu Yang, Binxing Fang, Bo Liu, Hongli Zhang:
Intrusion detection system for high-speed network. Comput. Commun. 27(13): 1288-1294 (2004) - [c12]Jianqi Tang, Binxing Fang, Mingzeng Hu, Hongli Zhang:
Developing a user-level middleware for out-of-core computation on Grids. CCGRID 2004: 686-690 - [c11]Wei Wang, Binxing Fang, Hongli Zhang, Yuanzhe Yao:
Ad Hoc Debugging Environment for Grid Applications. GCC 2004: 113-120 - [c10]Gang Liu, Mingzeng Hu, Binxing Fang, Hongli Zhang:
Measurement and Modeling of Large-Scale Peer-to-Peer Storage System. GCC Workshops 2004: 270-277 - [c9]Yuanzhe Yao, Binxing Fang, Hongli Zhang, Wei Wang:
Network Performance Measurement Methodologies in PGMS. GCC Workshops 2004: 466-473 - [c8]Jun Zheng, Mingzeng Hu, Binxing Fang, Hongli Zhang:
Anomaly Detection Using Fast SOFM. GCC Workshops 2004: 530-537 - [c7]Yuanzhe Yao, Binxing Fang, Hongli Zhang, Wei Wang:
PGMS: A P2P-Based Grid Monitoring System. GCC 2004: 903-906 - [c6]Weizhe Zhang, Binxing Fang, Hui He, Hongli Zhang, Mingzeng Hu:
Multisite Resource Selection and Scheduling Algorithm on Computational Grid. IPDPS 2004 - [c5]Jianqi Tang, Binxing Fang, Mingzeng Hu, Hongli Zhang:
The Practice of I/O Optimizations for Out-of-Core Computation. PDCAT 2004: 81-85 - [c4]Gang Liu, Mingzeng Hu, Binxing Fang, Hongli Zhang:
Explaining BitTorrent Traffic Self-Similarity. PDCAT 2004: 839-843 - [c3]Wei Wang, Binxing Fang, Hongli Zhang:
Grid-Enabled Parallel Debugging Environment: A Portal Solution. PDPTA 2004: 856-862 - [c2]Jianqi Tang, Binxing Fang, Mingzeng Hu, Hongli Zhang:
A parallel out-of-core computing system using PVFS for Linux clusters. SNAPI@PACT 2004: 33-39 - 2003
- [c1]Weizhe Zhang, Hongli Zhang, Hui He, Mingzeng Hu:
Multisite Task Scheduling on Distributed Computing Grid. GCC (2) 2003: 57-64
Coauthor Index
aka: Xiang-Zhan Yu
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 21:44 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint