default search action
Shihong Zou
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j24]Shihong Zou, Qiang Cao, Ruichao Lu, Chenyu Wang, Guoai Xu, Huanhuan Ma, Yingyi Cheng, Jinwen Xi:
A robust and effective 3-factor authentication protocol for smart factory in IIoT. Comput. Commun. 220: 81-93 (2024) - [j23]Shihong Zou, Qiang Cao, Chonghui Huangqi, Anpeng Huang, Yanping Li, Chenyu Wang, Guoai Xu:
A Physician's Privacy-Preserving Authentication and Key Agreement Protocol Based on Decentralized Identity for Medical Data Sharing in IoMT. IEEE Internet Things J. 11(17): 29174-29189 (2024) - 2023
- [j22]Xin Zhang, Yipeng Hao, Jin Zhang, Yanuo Ji, Shihong Zou, Shijie Zhao, Songyun Xie, Lei Du:
A multi-task SCCA method for brain imaging genetics and its application in neurodegenerative diseases. Comput. Methods Programs Biomed. 232: 107450 (2023) - [j21]Jinwen Xi, Guosheng Xu, Shihong Zou, Yueming Lu, Guoqiang Li, Jiuyun Xu, Ruisheng Wang:
A Blockchain Dynamic Sharding Scheme Based on Hidden Markov Model in Collaborative IoT. IEEE Internet Things J. 10(16): 14896-14907 (2023) - 2022
- [j20]Shihong Zou, Jinwen Xi, Guoai Xu, Miao Zhang, Yueming Lu:
CrowdHB: A Decentralized Location Privacy-Preserving Crowdsensing System Based on a Hybrid Blockchain Network. IEEE Internet Things J. 9(16): 14803-14817 (2022) - [j19]Jinwen Xi, Shihong Zou, Guoai Xu, Yueming Lu:
CrowdLBM: A lightweight blockchain-based model for mobile crowdsensing in the Internet of Things. Pervasive Mob. Comput. 84: 101623 (2022) - [j18]Shihong Zou, Qiang Cao, Chenyu Wang, Zifu Huang, Guoai Xu:
A Robust Two-Factor User Authentication Scheme-Based ECC for Smart Home in IoT. IEEE Syst. J. 16(3): 4938-4949 (2022) - [c26]Kaixuan Zheng, Shihong Zou, Guosheng Xu, Zixiang Bi:
Segment Detection Algorithm: CAN bus intrusion detection based on Bit Constraint. WoWMoM 2022: 450-456 - 2021
- [c25]Xin Zhang, Yipeng Hao, Jin Zhang, Shihong Zou, Songyun Xie, Lei Du:
Improved Multi-task SCCA for Brain Imaging Genetics via Joint Consideration of the Diagnosis, Parameter Decomposition and Network Constraints. BIBM 2021: 1159-1164 - [c24]Wenjing Xu, Yongwang Zhao, Chengtao Cao, Jean Raphael Ngnie Sighom, Lei Wang, Zhe Jiang, Shihong Zou:
Apply Formal Methods in Certifying the SyberX High-Assurance Kernel. FM 2021: 788-798 - [c23]Wenqing Yang, Meilin Wang, Shihong Zou, Junhao Peng, Guosheng Xu:
An Implicit Identity Authentication Method Based on Deep Connected Attention CNN for Wild Environment. ICCBN 2021: 94-100 - 2020
- [j17]Shihong Zou, Jinwen Xi, Honggang Wang, Guoai Xu:
CrowdBLPS: A Blockchain-Based Location-Privacy-Preserving Mobile Crowdsensing System. IEEE Trans. Ind. Informatics 16(6): 4206-4218 (2020) - [c22]Wenqi Xie, Shengwei Xu, Shihong Zou, Jinwen Xi:
A System-call Behavior Language System for Malware Detection Using A Sensitivity-based LSTM Model. CSSE 2020: 112-118
2010 – 2019
- 2019
- [j16]Shihong Zou, Jinwen Xi, Siyuan Wang, Yueming Lu, Guosheng Xu:
Reportcoin: A Novel Blockchain-Based Incentive Anonymous Reporting System. IEEE Access 7: 65544-65559 (2019) - 2018
- [j15]Rui Shao, Vaibhav Rastogi, Yan Chen, Xiang Pan, Guanyu Guo, Shihong Zou, Ryan D. Riley:
Understanding In-App Ads and Detecting Hidden Attacks through the Mobile App-Web Interface. IEEE Trans. Mob. Comput. 17(11): 2675-2688 (2018) - 2017
- [j14]Shihong Zou, Yanhong Xu, Honggang Wang, Zhouzhou Li, Shanzhi Chen, Bo Hu:
A Survey on Secure Wireless Body Area Networks. Secur. Commun. Networks 2017: 3721234:1-3721234:9 (2017) - 2016
- [j13]Chenfei Gao, Jian Tang, Xiang Sheng, Weiyi Zhang, Shihong Zou, Mohsen Guizani:
Enabling Green Wireless Networking With Device-to-Device Links: A Joint Optimization Approach. IEEE Trans. Wirel. Commun. 15(4): 2770-2779 (2016) - [j12]Shihong Zou, Li Gui, Xiaofeng Zhong, Chonggang Wang, Chunqi Tian:
A delay-centric parallel multi-path routing protocol for cognitive radio ad hoc networks. Wirel. Commun. Mob. Comput. 16(10): 1334-1348 (2016) - [c21]Vaibhav Rastogi, Rui Shao, Yan Chen, Xiang Pan, Shihong Zou, Ryan D. Riley:
Are these Ads Safe: Detecting Hidden Attacks through the Mobile App-Web Interfaces. NDSS 2016 - 2015
- [j11]Shihong Zou, Jing Zhang, Xiaodong Lin:
An effective behavior-based Android malware detection system. Secur. Commun. Networks 8(12): 2079-2089 (2015) - 2014
- [j10]Shihong Zou, Xitao Wen, Kai Chen, Shan Huang, Yan Chen, Yongqiang Liu, Yong Xia, Chengchen Hu:
VirtualKnotter: Online virtual machine shuffling for congestion resolving in virtualized datacenter. Comput. Networks 67: 141-153 (2014) - [j9]Chunqi Tian, Xiaojian Liu, Lisheng Wang, Shihong Zou:
Spreading evidence models for trust propagation and aggregation in peer-to-peer networks. Concurr. Comput. Pract. Exp. 26(2): 601-614 (2014) - [c20]Chenfei Gao, Xiang Sheng, Jian Tang, Weiyi Zhang, Shihong Zou, Mohsen Guizani:
Joint mode selection, channel allocation and power assignment for green device-to-device communications. ICC 2014: 178-183 - [c19]Chenfei Gao, Weiyi Zhang, Jian Tang, Chonggang Wang, Shihong Zou, Sen Su:
Relax, but Do Not Sleep: A new perspective on Green Wireless Networking. INFOCOM 2014: 907-915 - [c18]Bo Hu, Zhiyan Li, Shihong Zou:
Provider mobility management based on domain proxies in content centric networks. ISCIT 2014: 393-397 - 2013
- [j8]Jianmin Chen, Shihong Zou, Aihong Ren:
A Novel Stream Video Integrity Method. J. Comput. 8(7): 1861-1866 (2013) - [c17]Wu Zhou, Yajin Zhou, Michael C. Grace, Xuxian Jiang, Shihong Zou:
Fast, scalable detection of "Piggybacked" mobile applications. CODASPY 2013: 185-196 - [c16]Li Gui, Xiaofeng Zhong, Shihong Zou:
Traffic assignment algorithm for multi-path routing in Cognitive Radio Ad Hoc Networks. WCNC 2013: 1168-1173 - 2012
- [c15]Michael C. Grace, Yajin Zhou, Qiang Zhang, Shihong Zou, Xuxian Jiang:
RiskRanker: scalable and accurate zero-day android malware detection. MobiSys 2012: 281-294
2000 – 2009
- 2009
- [j7]Weiqi Hu, Shihong Zou, Shiduan Cheng:
A Novel Location Management Scheme for Wireless Mesh Networks. Int. J. Distributed Sens. Networks 5(1): 69-70 (2009) - [c14]Shaoshuai Liu, Haiyong Luo, Shihong Zou:
A Low-Cost and Accurate Indoor Localization Algorithm Using Label Propagation Based Semi-supervised Learning. MSN 2009: 108-111 - 2008
- [j6]Junfeng Xiao, Shihong Zou, Jing Qiu, Shiduan Cheng:
A cross-layer adaptive transmission scheme combined with SR-ARQ over correlated fading channels. Comput. Electr. Eng. 34(4): 324-337 (2008) - [j5]LingWei Chu, Shihong Zou, Shiduan Cheng, Wendong Wang:
Active probing based Internet service fault management in uncertain and noisy environment. Sci. China Ser. F Inf. Sci. 51(11): 1857-1870 (2008) - [c13]Chunqi Tian, Shihong Zou, LingWei Chu, Shiduan Cheng:
A New Trust Framework Based on Reputation for Unstructured P2P Networks. IPCCC 2008: 209-216 - [c12]Boubacar Kimba, Dit Adamou, Shihong Zou, Shiduan Cheng:
Video streaming with network coding and opportunistic relay in wireless mesh networks. LCN 2008: 572-573 - 2006
- [j4]Huirong Tian, Shihong Zou, Wendong Wang, Shiduan Cheng:
Constructing efficient peer-to-peer overlay topologies by adaptive connection establishment. Comput. Commun. 29(17): 3567-3579 (2006) - [j3]Shihong Zou, Bo Li, Haitao Wu, Qian Zhang, Wenwu Zhu, Shiduan Cheng:
A Relay-Aided Media Access (RAMA) Protocol in Multirate Wireless Networks. IEEE Trans. Veh. Technol. 55(5): 1657-1667 (2006) - [c11]Huirong Tian, Shihong Zou, Wendong Wang, Shiduan Cheng:
A Group Based Reputation System for P2P Networks. ATC 2006: 342-351 - [c10]Junfeng Xiao, Shihong Zou, Biao Ren, Shiduan Cheng:
An Enhanced Energy Saving Mechanism in IEEE 802.16e. GLOBECOM 2006 - [c9]Xiaohui Huang, Shihong Zou, Wendong Wang, Shiduan Cheng:
Fault management for Internet Services: Modeling and Algorithms. ICC 2006: 854-859 - [c8]Huirong Tian, Shihong Zou, Wendong Wang, Shiduan Cheng:
A Reciprocal Capacity Based Adaptive Topology Protocol for P2P Networks. ICOIN 2006: 985-994 - [c7]Chunqi Tian, Shihong Zou, Wendong Wang, Shiduan Cheng:
A New Trust Model Based on Advanced D-S Evidence Theory for P2P Networks. Formal Aspects in Security and Trust 2006: 270-284 - [c6]Junfeng Xiao, Shihong Zou, Biao Ren, Shiduan Cheng:
An Enhanced Energy Saving Scheme in Mobile Broadband Wireless Access Systems. WASA 2006: 81-92 - 2005
- [j2]Shihong Zou, Haitao Wu, Shiduan Cheng:
Adaptive Power Saving Mechanisms for DCF in IEEE 802.11. Mob. Networks Appl. 10(5): 763-770 (2005) - [c5]Shihong Zou, Le Tian, Shiduan Cheng, Yu Lin:
A Service Discovery Protocol with Maximal Area Disjoint Paths for Mobile Ad Hoc Networks. ADHOC-NOW 2005: 349-357 - [c4]Xiaohui Huang, Shihong Zou, Wendong Wang, Shiduan Cheng:
MDFM: Multi-domain Fault Management for Internet Services. MMNS 2005: 121-132 - [c3]Shihong Zou, Shiduan Cheng, Yu Lin:
Multi-rate aware topology control in multi-hop ad hoc networks. WCNC 2005: 2207-2212 - 2004
- [j1]Yu Lin, Shiduan Cheng, Chonggang Wang, Haitao Wu, Keping Long, Shihong Zou:
A new approach for path capacity measurement in Internet. J. High Speed Networks 13(3): 183-206 (2004) - [c2]Yu Lin, Geng-Sheng Kuo, Hongbo Wang, Shiduan Cheng, Shihong Zou:
A fuzzy-based algorithm to remove clock skew and reset from one-way delay measurement [Internet end-to-end performance measurement]. GLOBECOM 2004: 1425-1430 - 2003
- [c1]Huasheng Lin, Rui Fan, Shihong Zou, Yu Lin, Shiduan Cheng:
An enhanced buffer forwarding control scheme in smooth handover to improve TCP performance. PIMRC 2003: 476-481
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 01:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint