关注
Hong Zhen
标题
引用次数
引用次数
年份
A clustering-tree topology control based on the energy forecast for heterogeneous wireless sensor networks
Z Hong, R Wang, X Li
IEEE/CAA Journal of Automatica Sinica 3 (1), 68-77, 2016
932016
An improved LDA-based ELM classification for intrusion detection algorithm in IoT application
D Zheng, Z Hong, N Wang, P Chen
Sensors 20 (6), 1706, 2020
642020
Design of building monitoring systems based on wireless sensor networks
Q Dong, L Yu, H Lu, Z Hong, Y Chen
Announcement: Special Issue of Wireless Sensor Network, 2010
582010
A topology control with energy balance in underwater wireless sensor networks for IoT-based application
Z Hong, X Pan, P Chen, X Su, N Wang, W Lu
Sensors 18 (7), 2306, 2018
532018
A wearable-based posture recognition system with AI-assisted approach for healthcare IoT
Z Hong, M Hong, N Wang, Y Ma, X Zhou, W Wang
Future Generation Computer Systems 127, 286-296, 2022
372022
Attacker location evaluation-based fake source scheduling for source location privacy in cyber-physical systems
Z Hong, R Wang, S Ji, R Beyah
IEEE Transactions on Information Forensics and Security 14 (5), 1337-1350, 2018
352018
Machine learning-based intrusion detection for iot devices in smart home
T Li, Z Hong, L Yu
2020 IEEE 16th International Conference on Control & Automation (ICCA), 277-282, 2020
282020
FineFool: A novel DNN object contour attack on image recognition based on the attention perturbation adversarial technique
J Chen, H Zheng, H Xiong, R Chen, T Du, Z Hong, S Ji
Computers & Security 104, 102220, 2021
262021
无线传感器网络自适应分布式聚簇路由协议
洪榛, 俞立, 张贵军
自动化学报 37 (010), 1197-1205, 2011
242011
Networked nonlinear fusion estimation under DoS attacks
D Zhu, B Chen, Z Hong, L Yu
IEEE Sensors Journal 21 (5), 7058-7066, 2020
162020
Near-complete privacy protection: Cognitive optimal strategy in location-based services
M Han, J Wang, M Yan, C Ai, Z Duan, Z Hong
Procedia Computer Science 129, 298-304, 2018
142018
EfficientTDNN: Efficient architecture search for speaker recognition
R Wang, Z Wei, H Duan, S Ji, Y Long, Z Hong
IEEE/ACM Transactions on Audio, Speech, and Language Processing 30, 2267-2279, 2022
132022
工业控制系统网络入侵检测方法综述
张文安, 洪榛, 朱俊威, 陈博
控制与决策 34 (11), 2277-2288, 2019
132019
A secure routing protocol with regional partitioned clustering and Beta trust management in smart home
Z Hong, Q Shao, X Liao, R Beyah
Wireless Networks 25 (7), 3805-3823, 2019
132019
Neural Mode Estimation
P Sun, Z Wen, Y Zhou, Z Hong, T Lin
ICASSP 2023-2023 IEEE International Conference on Acoustics, Speech and …, 2023
122023
基于近邻算法的无线传感器网络功率控制
陈友荣, 俞立, 董齐芬, 洪榛
浙江大学学报: 工学版, 1321-1326, 2010
122010
Fusion estimation in clustering sensor networks under stochastic deception attacks
H Song, Z Hong, H Song, WA Zhang
International Journal of Systems Science 49 (10), 2257-2266, 2018
112018
移动无线传感网中的迭代蒙特卡罗定位算法研究
董齐芬, 俞立, 陈友荣, 洪榛
传感技术学报 23 (12), 1803-1809, 2010
112010
A tree-based topology construction algorithm with probability distribution and competition in the same layer for wireless sensor network
Z Hong, R Wang, X Li, N Wang
Peer-to-Peer Networking and Applications 10, 658-669, 2017
102017
An energy-efficient topology control algorithm for earth building monitoring using heterogeneous wireless sensor networks
N Wang, Z Hong
IEEE Access 7, 76120-76130, 2019
92019
系统目前无法执行此操作,请稍后再试。
文章 1–20