default search action
Xudong Zhong
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j10]Chao Zou, Kang An, Zhi Lin, Yuanzhi He, Xudong Zhong, Gan Zheng, Naofal Al-Dhahir:
Multi-Layer RIS-Assisted Anti-Jamming Communications: A Hierarchical Game Learning Approach. IEEE Commun. Lett. 27(11): 2998-3002 (2023) - [j9]Nannan Dong, Baoquan Ren, Hongjun Li, Xudong Zhong, Xiangwu Gong, Junmei Han, Jiazheng Lv, Jianhua Cheng:
A novel anomaly score based on kernel density fluctuation factor for improving the local and clustered anomalies detection of isolation forests. Inf. Sci. 637: 118979 (2023) - [c3]Ji He, Xiaodan Zhang, Baoquan Ren, Hongjun Li, Tianzhu Hu, Xiangwu Gong, Xudong Zhong:
ML-Based Detection Approaches for Covert Communication with Multi-D Signal Features. NaNA 2023: 465-470 - 2022
- [j8]Dongmei Yang, Hongjun Li, Baoquan Ren, Xudong Zhong:
Robust security transmission design for multi-user peer-to-peer wireless relay networks. Int. J. Distributed Sens. Networks 18(6): 155013292211075 (2022) - [j7]Yuanzhi He, Yun Liu, Chunxiao Jiang, Xudong Zhong:
Multiobjective Anti-Collision for Massive Access Ranging in MF-TDMA Satellite Communication System. IEEE Internet Things J. 9(16): 14655-14666 (2022) - [j6]Xudong Zhong, Baoquan Ren, Xiangwu Gong, Hongjun Li:
Traffic Load Optimization for Multi-Satellite Relay Systems in Space Information Network: A Proportional Fairness Approach. Sensors 22(22): 8806 (2022) - [j5]Zhangyong Wu, Ke Meng, Yan Wo, Xudong Zhong:
Masquerade attack on biometric hashing via BiohashGAN. Vis. Comput. 38(3): 821-835 (2022) - 2021
- [j4]Jianhong Chen, Xudong Zhong, Zitong Xu, Shan Yang, Ying Shi:
Analysis of Mine Safety Performance Evaluation Law Based on Matter-Element Analysis and Rough Set of Concept Lattice Reduction. IEEE Access 9: 94169-94180 (2021) - 2020
- [j3]Xudong Zhong, Yuanzhi He, Baoquan Ren, Feihong Dong:
基于合作博弈的认知卫星网络信道分配与上行功率控制算法 (Channel Allocation and Power Control Algorithm for Cognitive Satellite Networks Based on Cooperative Game Theory). 计算机科学 47(1): 252-257 (2020)
2010 – 2019
- 2019
- [j2]Xudong Zhong, Hao Yin, Yuanzhi He, Hai Zhu:
Joint Transmit Power and Bandwidth Allocation for Cognitive Satellite Network Based on Bargaining Game Theory. IEEE Access 7: 6435-6449 (2019) - 2018
- [c2]Mingxing Ke, Shiwei Tian, Chuang Wang, Xudong Zhong:
A Link Selection Algorithm Based on EKF and Overlapping Coalition Formation Game for Hybrid Cooperative Positioning. SINC 2018: 177-188 - 2017
- [j1]Xudong Zhong, Hao Yin, Yuanzhi He, Yuzhen Huang:
Joint Downlink Power and Time-Slot Allocation for Distributed Satellite Cluster Network Based on Pareto Optimization. IEEE Access 5: 25081-25096 (2017) - 2015
- [c1]Zhouquan Du, Qijian Xu, Jie Zhang, Xudong Zhong:
The Design of a Key Expansion Algorithm Based on Dynamic Dislocation Counts. CIS 2015: 345-349
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-04 01:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint