A clustering-tree topology control based on the energy forecast for heterogeneous wireless sensor networks Z Hong, R Wang, X Li IEEE/CAA Journal of Automatica Sinica 3 (1), 68-77, 2016 | 93 | 2016 |
An improved LDA-based ELM classification for intrusion detection algorithm in IoT application D Zheng, Z Hong, N Wang, P Chen Sensors 20 (6), 1706, 2020 | 64 | 2020 |
Design of building monitoring systems based on wireless sensor networks Q Dong, L Yu, H Lu, Z Hong, Y Chen Announcement: Special Issue of Wireless Sensor Network, 2010 | 58 | 2010 |
A topology control with energy balance in underwater wireless sensor networks for IoT-based application Z Hong, X Pan, P Chen, X Su, N Wang, W Lu Sensors 18 (7), 2306, 2018 | 53 | 2018 |
A wearable-based posture recognition system with AI-assisted approach for healthcare IoT Z Hong, M Hong, N Wang, Y Ma, X Zhou, W Wang Future Generation Computer Systems 127, 286-296, 2022 | 37 | 2022 |
Attacker location evaluation-based fake source scheduling for source location privacy in cyber-physical systems Z Hong, R Wang, S Ji, R Beyah IEEE Transactions on Information Forensics and Security 14 (5), 1337-1350, 2018 | 35 | 2018 |
Machine learning-based intrusion detection for iot devices in smart home T Li, Z Hong, L Yu 2020 IEEE 16th International Conference on Control & Automation (ICCA), 277-282, 2020 | 28 | 2020 |
FineFool: A novel DNN object contour attack on image recognition based on the attention perturbation adversarial technique J Chen, H Zheng, H Xiong, R Chen, T Du, Z Hong, S Ji Computers & Security 104, 102220, 2021 | 26 | 2021 |
无线传感器网络自适应分布式聚簇路由协议 洪榛, 俞立, 张贵军 自动化学报 37 (010), 1197-1205, 2011 | 24 | 2011 |
Networked nonlinear fusion estimation under DoS attacks D Zhu, B Chen, Z Hong, L Yu IEEE Sensors Journal 21 (5), 7058-7066, 2020 | 16 | 2020 |
Near-complete privacy protection: Cognitive optimal strategy in location-based services M Han, J Wang, M Yan, C Ai, Z Duan, Z Hong Procedia Computer Science 129, 298-304, 2018 | 14 | 2018 |
EfficientTDNN: Efficient architecture search for speaker recognition R Wang, Z Wei, H Duan, S Ji, Y Long, Z Hong IEEE/ACM Transactions on Audio, Speech, and Language Processing 30, 2267-2279, 2022 | 13 | 2022 |
工业控制系统网络入侵检测方法综述 张文安, 洪榛, 朱俊威, 陈博 控制与决策 34 (11), 2277-2288, 2019 | 13 | 2019 |
A secure routing protocol with regional partitioned clustering and Beta trust management in smart home Z Hong, Q Shao, X Liao, R Beyah Wireless Networks 25 (7), 3805-3823, 2019 | 13 | 2019 |
Neural Mode Estimation P Sun, Z Wen, Y Zhou, Z Hong, T Lin ICASSP 2023-2023 IEEE International Conference on Acoustics, Speech and …, 2023 | 12 | 2023 |
基于近邻算法的无线传感器网络功率控制 陈友荣, 俞立, 董齐芬, 洪榛 浙江大学学报: 工学版, 1321-1326, 2010 | 12 | 2010 |
Fusion estimation in clustering sensor networks under stochastic deception attacks H Song, Z Hong, H Song, WA Zhang International Journal of Systems Science 49 (10), 2257-2266, 2018 | 11 | 2018 |
移动无线传感网中的迭代蒙特卡罗定位算法研究 董齐芬, 俞立, 陈友荣, 洪榛 传感技术学报 23 (12), 1803-1809, 2010 | 11 | 2010 |
A tree-based topology construction algorithm with probability distribution and competition in the same layer for wireless sensor network Z Hong, R Wang, X Li, N Wang Peer-to-Peer Networking and Applications 10, 658-669, 2017 | 10 | 2017 |
An energy-efficient topology control algorithm for earth building monitoring using heterogeneous wireless sensor networks N Wang, Z Hong IEEE Access 7, 76120-76130, 2019 | 9 | 2019 |