Calculated based on number of publications stored in Pure and citations from Scopus
20082024

Research activity per year

Filter
Conference contribution

Search results

  • 2024

    Adversarial Attacks Against Object Detection in Remote Sensing Images

    Huang, R., Chen, L., Zheng, J., Zhang, Q. & Yu, X., 2024, Artificial Intelligence Security and Privacy - 1st International Conference on Artificial Intelligence Security and Privacy, AIS and P 2023, Proceedings. Vaidya, J., Gabbouj, M. & Li, J. (eds.). Springer Science and Business Media Deutschland GmbH, p. 358-367 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14509 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • A Verifiable Dynamic Multi-secret Sharing Obfuscation Scheme Applied to Data LakeHouse

    Tang, S., Mu, T., Zheng, J., Fu, Y., Zhang, Q. & Yang, J., 2024, Artificial Intelligence Security and Privacy - 1st International Conference on Artificial Intelligence Security and Privacy, AIS and P 2023, Proceedings. Vaidya, J., Gabbouj, M. & Li, J. (eds.). Springer Science and Business Media Deutschland GmbH, p. 316-327 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14509 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2023

    Time Series Prediction Based on Random Convolution Kernel

    Su, B., Yang, J., Jiang, N. & Zheng, J., 2023, Proceedings - 2023 International Conference on Intelligent Media, Big Data and Knowledge Mining, IMBDKM 2023. Institute of Electrical and Electronics Engineers Inc., p. 25-30 6 p. (Proceedings - 2023 International Conference on Intelligent Media, Big Data and Knowledge Mining, IMBDKM 2023).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2022

    A Multi-agent Deep Reinforcement Learning-Based Collaborative Willingness Network for Automobile Maintenance Service

    Hao, S., Zheng, J., Yang, J., Ni, Z., Zhang, Q. & Zhang, L., 2022, Applied Cryptography and Network Security Workshops - ACNS 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S and P, SCI, SecMT, SiMLA, Proceedings. Zhou, J., Chattopadhyay, S., Adepu, S., Alcaraz, C., Batina, L., Casalicchio, E., Jin, C., Lin, J., Losiouk, E., Majumdar, S., Meng, W., Picek, S., Zhauniarovich, Y., Shao, J., Su, C., Wang, C. & Zonouz, S. (eds.). Springer Science and Business Media Deutschland GmbH, p. 84-103 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13285 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Citation (Scopus)
  • Detecting Malware Using Graph Embedding and DNN

    Wang, R., Zheng, J., Shi, Z. & Tan, Y., 2022, Proceedings - 2022 International Conference on Blockchain Technology and Information Security, ICBCTIS 2022. Institute of Electrical and Electronics Engineers Inc., p. 28-31 4 p. (Proceedings - 2022 International Conference on Blockchain Technology and Information Security, ICBCTIS 2022).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Hybrid Isolation Model for Device Application Sandboxing Deployment in Zero Trust Architecture

    Zhang, J., Zheng, J., Zhang, Z., Chen, T., Qiu, K., Zhang, Q. & Li, Y., 2022, Applied Cryptography and Network Security Workshops - ACNS 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S and P, SCI, SecMT, SiMLA, Proceedings. Zhou, J., Chattopadhyay, S., Adepu, S., Alcaraz, C., Batina, L., Casalicchio, E., Jin, C., Lin, J., Losiouk, E., Majumdar, S., Meng, W., Picek, S., Zhauniarovich, Y., Shao, J., Su, C., Wang, C. & Zonouz, S. (eds.). Springer Science and Business Media Deutschland GmbH, p. 104-123 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13285 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Citations (Scopus)
  • 2020

    Butterfly-based higher-order clustering on bipartite networks

    Zheng, Y., Qin, H., Zheng, J., Jin, F. & Li, R. H., 2020, Knowledge Science, Engineering and Management - 13th International Conference, KSEM 2020, Proceedings, Part 1. Li, G., Shen, H. T., Yuan, Y., Wang, X., Liu, H. & Zhao, X. (eds.). Springer, p. 485-497 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12274 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Citation (Scopus)
  • 2018

    Research on data recovery technology based on flash memory device

    Guan, L., Zheng, J., Li, C. & Wang, D., 2018, Algorithms and Architectures for Parallel Processing - 18th International Conference, ICA3PP 2018, Proceedings. Vaidya, J. & Li, J. (eds.). Springer Verlag, p. 263-271 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11335 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2017

    An Anti-Forensics Method against Memory Acquiring for Android Devices

    Zheng, J., Tan, Y. A., Zhang, X., Liang, C., Zhang, C. & Zheng, J., 8 Aug 2017, Proceedings - 2017 IEEE International Conference on Computational Science and Engineering and IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, CSE and EUC 2017. Institute of Electrical and Electronics Engineers Inc., p. 214-218 5 p. 8005797. (Proceedings - 2017 IEEE International Conference on Computational Science and Engineering and IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, CSE and EUC 2017; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    8 Citations (Scopus)
  • From the perspective of teaching scheme: Cultivating and training undergraduates driven by Engineering Education Accreditation

    Shi, S., Huang, H. & Zheng, J., 12 May 2017, Proceedings of the ACM Turing 50th Celebration Conference - China, ACM TUR-C 2017. Association for Computing Machinery, 3063969. (ACM International Conference Proceeding Series; vol. Part F127754).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Citations (Scopus)
  • 2015

    A key management scheme for wireless sensor networks based on bridge and ECC

    Zheng, J., Zhao, F. F., Wang, D. X. & Xu, S. C., 2015, Environmental Engineering and Computer Application - Proceedings of the International Conference on Environmental Engineering and Computer Application, ICEECA 2014. Chan, K. (ed.). CRC Press/Balkema, p. 439-446 8 p. (Environmental Engineering and Computer Application - Proceedings of the International Conference on Environmental Engineering and Computer Application, ICEECA 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Virtual experiments for introduction of computing: Using virtual reality technology

    Li, F., Li, D., Zheng, J. & Zhao, S., 2 Dec 2015, 2015 IEEE Frontiers in Education Conference: Launching a New Vision in Engineering Education, FIE 2015 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 7344376. (Proceedings - Frontiers in Education Conference, FIE; vol. 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    9 Citations (Scopus)
  • 2014

    A hot topic detection method for Chinese Microblog based on topic words

    Zheng, J. & Li, Y., 11 May 2014, Proceedings of 2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014. Institute of Electrical and Electronics Engineers Inc., p. 262-266 5 p. 7105615. (Proceedings of 2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Citations (Scopus)
  • Cryptanalysis and improvement of a SIP authentication scheme

    Zheng, J. & Wang, D., 11 May 2014, Proceedings of 2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014. Institute of Electrical and Electronics Engineers Inc., p. 199-203 5 p. 7105601. (Proceedings of 2nd International Conference on Information Technology and Electronic Commerce, ICITEC 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Citation (Scopus)
  • 2013

    A novel detective and self-organized certificateless key management scheme in mobile ad hoc networks

    Zheng, J., Xu, S., Zhao, F., Wang, D. & Li, Y., 2013, Proceedings - 2013 IEEE International Conference on Granular Computing, GrC 2013. IEEE Computer Society, p. 443-448 6 p. 6740452. (Proceedings - 2013 IEEE International Conference on Granular Computing, GrC 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Citations (Scopus)
  • 2011

    An improved cross-domain role-based authorization management model

    Zheng, J., Tan, Y., Zhang, Q., Sun, X. & Chen, Y., 2011, Applied Informatics and Communication - International Conference, ICAIC 2011, Proceedings. PART 4 ed. p. 526-537 12 p. (Communications in Computer and Information Science; vol. 227 CCIS, no. PART 4).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • An improvement model of analytic hierarchy process based on genetic algorithm

    Sun, X., Zheng, J., Pang, Y., Ye, C. & Zhang, L., 2011, High Performance Networking, Computing, and Communication Systems - Second International Conference, ICHCC 2011, Selected Papers. p. 237-244 8 p. (Communications in Computer and Information Science; vol. 163 CCIS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • A RBAC model based on multi-granularities of time constraints

    Zheng, J., Tan, Y., Zhang, Q., Gao, C. & Wang, S., 2011, Applied Informatics and Communication - International Conference, ICAIC 2011, Proceedings. PART 4 ed. p. 538-549 12 p. (Communications in Computer and Information Science; vol. 227 CCIS, no. PART 4).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • The application of neural network model based on genetic algorithm for comprehensive evaluation

    Sun, X., Zheng, J., Pang, Y., Ye, C. & Zhang, L., 2011, High Performance Networking, Computing, and Communication Systems - Second International Conference, ICHCC 2011, Selected Papers. p. 229-236 8 p. (Communications in Computer and Information Science; vol. 163 CCIS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Citations (Scopus)
  • 2010

    Multiple sub-spaces particle filtering for multi-target tracking

    Xu, W., Zhao, Q., Yu, G. & Zheng, J., 2010, Proceedings - 2010 3rd International Congress on Image and Signal Processing, CISP 2010. p. 340-344 5 p. 5646249. (Proceedings - 2010 3rd International Congress on Image and Signal Processing, CISP 2010; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2009

    Dynamic data replication based on access cost in distributed systems

    Sun, X., Zheng, J., Liu, Q. & Liu, Y., 2009, ICCIT 2009 - 4th International Conference on Computer Sciences and Convergence Information Technology. p. 829-834 6 p. 5368516. (ICCIT 2009 - 4th International Conference on Computer Sciences and Convergence Information Technology).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    22 Citations (Scopus)
  • 2008

    Constructing trust networks based on small-world theories

    Zheng, J., Qin, Y., Zhu, J. & Li, X., 2008, Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008. p. 1957-1962 6 p. 4709273. (Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Citation (Scopus)