default search action
Hongqi Zhang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j40]Hongqi Zhang, Hongmin Gao, He Sun, Xu Sun, Bing Zhang:
A Spatial-Spectrum Fully Attention Network for Band Selection of Hyperspectral Images. IEEE Geosci. Remote. Sens. Lett. 21: 1-5 (2024) - [j39]Yuqian He, Lu Zhang, Hang Yang, Hongqi Zhang, Xianbin Yu:
Impacts of sampling on the artificial noise-assisted terahertz secure communication systems. Phys. Commun. 67: 102507 (2024) - [c20]Hongqi Zhang, Zuomin Yang, Zhidong Lyu, Hang Yang, Lu Zhang, Oskars Ozolins, Xiaodan Pang, Xianmin Zhang, Xianbin Yu:
300 GHz photonic-wireless transmission with aggregated 1.034 Tbit/s data rate over 100 m wireless distance. OFC 2024: 1-3 - [c19]Hangtian Liu, Shuitao Gan, Chao Zhang, Zicong Gao, Hongqi Zhang, Xiangzhi Wang, Guangming Gao:
Labrador: Response Guided Directed Fuzzing for Black-box IoT Devices. SP 2024: 1920-1938 - 2023
- [j38]Jinglei Tan, Hui Jin, Hongqi Zhang, Yuchen Zhang, Dexian Chang, Xiaohu Liu, Hengwei Zhang:
A survey: When moving target defense meets game theory. Comput. Sci. Rev. 48: 100544 (2023) - [j37]Heyu Chang, Dan Qu, Kun Wang, Hongqi Zhang, Nianwen Si, Gengxiao Yan, Huazhong Li:
Attribute-guided attention and dependency learning for improving person re-identification based on data analysis technology. Enterp. Inf. Syst. 17(3) (2023) - [j36]Jinglei Tan, Hui Jin, Hao Hu, Ruiqin Hu, Hongqi Zhang, Hengwei Zhang:
WF-MTD: Evolutionary Decision Method for Moving Target Defense Based on Wright-Fisher Process. IEEE Trans. Dependable Secur. Comput. 20(6): 4719-4732 (2023) - [c18]Qiuzhuo Deng, Lu Zhang, Hongqi Zhang, Zuomin Yang, Xiaodan Pang, Vjaceslavs Bobrovs, Sergei Popov, Yixin Wu, Xiongbin Yu, Oskars Ozolins, Xianbin Yu:
Quantum Noise Secured Terahertz Communications. OFC 2023: 1-3 - [c17]Xianbin Yu, Hongqi Zhang, Zuomin Yang, Zhidong Lyu, Hang Yang, Yuqian He, Siqi Liu, Nan Li, Oskars Ozolins, Xiaodan Pang, Lu Zhang, Xianmin Zhang:
Photonic-wireless Communication and Sensing in the Terahertz Band. OFC 2023: 1-3 - 2022
- [j35]Xiaoyu Xu, Hao Hu, Yuling Liu, Jinglei Tan, Hongqi Zhang, Haotian Song:
Moving target defense of routing randomization with deep reinforcement learning against eavesdropping attack. Digit. Commun. Networks 8(3): 373-387 (2022) - [j34]Hongqi Zhang, Yixiong Wei, Hongqiao Zhou, Qianhao Wu:
ED-Dehaze Net: Encoder and Decoder Dehaze Network. Int. J. Interact. Multim. Artif. Intell. 7(5): 93 (2022) - [j33]Hongqi Zhang, Jun Zhao, Henry Leung, Wei Wang:
Multi-stage dynamic optimization method for long-term planning of the concentrate ingredient in copper industry. Inf. Sci. 605: 333-350 (2022) - [j32]Nazar Muhammad Idrees, Zijie Lu, Muhammad Saqlain, Hongqi Zhang, Shiwei Wang, Lu Zhang, Xianbin Yu:
Improvement in Sensing Accuracy of an OFDM-Based W-Band System. J. Commun. Inf. Networks 7(1): 37-47 (2022) - [j31]Hongqi Zhang, Xudong Sun, Yuan Zhu, Fengqiang Xu, Xianping Fu:
A Global-Local Spectral Weight Network Based on Attention for Hyperspectral Band Selection. IEEE Geosci. Remote. Sens. Lett. 19: 1-5 (2022) - [j30]Man Bao, Hongqi Zhang, Hao Wu, Chao Zhang, Zixu Wang, Xiaohui Zhang:
Multiobjective Optimal Dispatching of Smart Grid Based on PSO and SVM. Mob. Inf. Syst. 2022: 2051773:1-2051773:9 (2022) - [j29]Zhongyang Han, Xinyu Zhang, Hongqi Zhang, Jun Zhao, Wei Wang:
A hybrid granular-evolutionary computing method for cooperative scheduling optimization on integrated energy system in steel industry. Swarm Evol. Comput. 73: 101123 (2022) - [j28]Hongqi Zhang, Jun Zhao, Henry Leung, Wei Wang:
Adaptive Weighted Optimization Framework for Multiobjective Long-Term Planning of Concentrate Ingredients in Copper Industry. IEEE Trans. Instrum. Meas. 71: 1-13 (2022) - [c16]Siqi Liu, Hongqi Zhang, Yuqian He, Lu Zhang, Xianbin Yu:
Analysis of the Absorption Attenuation and Phase Shift of Terahertz Wireless Propagation. ICCT 2022: 516-519 - [c15]Yixiong Wei, Hongqi Zhang, Hongqiao Zhou, Qianhao Wu, Zihan Niu:
Object Detection Networks and Mixed Reality for Cable Harnesses Identification in Assembly Environment. ICIC (3) 2022: 331-340 - [c14]Zijie Lu, Hongqi Zhang, Zuomin Yang, Xianmin Zhang, Lu Zhang, Xianbin Yu:
THz continuous-wave imaging system based on a photomixing receiver. OECC/PSC 2022: 1-3 - [c13]Zhi Yang, Zhanhui Yuan, Shuyuan Jin, Xingyuan Chen, Lei Sun, Xuehui Du, Wenfa Li, Hongqi Zhang:
FSAFlow: Lightweight and Fast Dynamic Path Tracking and Control for Privacy Protection on Android Using Hybrid Analysis with State-Reduction Strategy. SP 2022: 2114-2129 - 2021
- [j27]Jinglei Tan, Hengwei Zhang, Hongqi Zhang, Hao Hu, Cheng Lei, Zhenxiang Qin:
Optimal temporospatial strategy selection approach to moving target defense: A FlipIt differential game model. Comput. Secur. 108: 102342 (2021) - [j26]Zhanhui Yuan, Wenfa Li, Zhi Yang, Lei Sun, Xuehui Du, Hongqi Zhang:
A Noninterference Model for Mobile OS Information Flow Control and Its Policy Verification. Secur. Commun. Networks 2021: 2481818:1-2481818:22 (2021) - [j25]Xiaoyu Xu, Hao Hu, Yuling Liu, Hongqi Zhang, Dexian Chang:
An Adaptive IP Hopping Approach for Moving Target Defense Using a Light-Weight CNN Detector. Secur. Commun. Networks 2021: 8848473:1-8848473:17 (2021) - [j24]Xudong Sun, Hongqi Zhang, Fengqiang Xu, Yuan Zhu, Xianping Fu:
Constrained-Target Band Selection With Subspace Partition for Hyperspectral Target Detection. IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. 14: 9147-9161 (2021) - [c12]Xudong Sun, Site Li, Hongqi Zhang, Fengqiang Xu, Xianping Fu:
Band Selection for Specific Target Detection of Hyperspectral Imagery. IGARSS 2021: 3404-3407 - 2020
- [j23]Jiewen Geng, Peng Hu, Zhe Ji, Chuanjie Li, Li Li, Jie Shen, Xue Feng, Wenzhi Wang, Guangming Yang, Jianjun Li, Hongqi Zhang:
Accuracy and reliability of computer-assisted semi-automated morphological analysis of intracranial aneurysms: an experimental study with digital phantoms and clinical aneurysm cases. Int. J. Comput. Assist. Radiol. Surg. 15(10): 1749-1759 (2020) - [j22]Jing-Lei Tan, Cheng Lei, Hongqi Zhang, Hao Hu, Hengwei Zhang:
Network dynamic defense system based on holographic transformation. Int. J. Distributed Sens. Networks 16(5) (2020) - [j21]Jinglei Tan, Hengwei Zhang, Hongqi Zhang, Cheng Lei, Hui Jin, Bo-wen Li, Hao Hu:
Optimal Timing Selection Approach to Moving Target Defense: A FlipIt Attack-Defense Game Model. Secur. Commun. Networks 2020: 3151495:1-3151495:12 (2020) - [j20]Yi Liu, Hongqi Zhang, Dexian Chang, Hao Hu:
GDM: A General Distributed Method for Cross-Domain Service Function Chain Embedding. IEEE Trans. Netw. Serv. Manag. 17(3): 1446-1459 (2020) - [j19]Hao Hu, Yuling Liu, Chen Chen, Hongqi Zhang, Yi Liu:
Optimal Decision Making Approach for Cyber Security Defense Using Evolutionary Game. IEEE Trans. Netw. Serv. Manag. 17(3): 1683-1700 (2020)
2010 – 2019
- 2019
- [j18]Jing-Lei Tan, Cheng Lei, Hongqi Zhang, Yu-qiao Cheng:
Optimal strategy selection approach to moving target defense based on Markov robust game. Comput. Secur. 85: 63-76 (2019) - 2018
- [j17]Hao Hu, Yuling Liu, Hongqi Zhang, Ruixuan Pan:
Optimal Network Defense Strategy Selection Based on Incomplete Information Evolutionary Game. IEEE Access 6: 29806-29821 (2018) - [j16]Yi Liu, Hongqi Zhang, Hongtao Guan, Yang Wang:
A Method for Adaptive Resource Adjustment of Dynamic Service Function Chain. IEEE Access 6: 69988-70004 (2018) - [j15]Cheng Lei, Hongqi Zhang, Liming Wang, Lu Liu, Duohe Ma:
Incomplete information Markov game theoretic approach to strategy generation for moving target defense. Comput. Commun. 116: 184-199 (2018) - [j14]Erqi Xu, Hongqi Zhang:
A model for integrated spatial land use characteristics linking to surface nutrient concentration. Int. J. Digit. Earth 11(10): 1064-1084 (2018) - [j13]Hao Hu, Hongqi Zhang, Yingjie Yang:
Security risk situation quantification method based on threat prediction for multimedia communication network. Multim. Tools Appl. 77(16): 21693-21723 (2018) - [j12]Erping Shang, Erqi Xu, Hongqi Zhang, Fang Liu:
Analysis of Spatiotemporal Dynamics of the Chinese Vegetation Net Primary Productivity from the 1960s to the 2000s. Remote. Sens. 10(6): 860 (2018) - [j11]Erqi Xu, Hongqi Zhang, Lina Yao:
An Elevation-Based Stratification Model for Simulating Land Use Change. Remote. Sens. 10(11): 1730 (2018) - [j10]Cheng Lei, Hongqi Zhang, Jing-Lei Tan, Yu-Chen Zhang, Xiao-Hu Liu:
Moving Target Defense Techniques: A Survey. Secur. Commun. Networks 2018: 3759626:1-3759626:25 (2018) - [j9]Hao Hu, Yuling Liu, Hongqi Zhang, Yuchen Zhang:
Security Metric Methods for Network Multistep Attacks Using AMC and Big Data Correlation Analysis. Secur. Commun. Networks 2018: 5787102:1-5787102:14 (2018) - 2017
- [j8]Cheng Lei, Duohe Ma, Hongqi Zhang:
Optimal Strategy Selection for Moving Target Defense Based on Markov Game. IEEE Access 5: 156-169 (2017) - [j7]Hongqi Zhang, Cheng Lei, Dexian Chang, Yingjie Yang:
Network moving target defense technique based on collaborative mutation. Comput. Secur. 70: 51-71 (2017) - [j6]Jiang Liu, Hongqi Zhang, Zhencheng Guo:
A Defense Mechanism of Random Routing Mutation in SDN. IEICE Trans. Inf. Syst. 100-D(5): 1046-1054 (2017) - [j5]Hao Hu, Hongqi Zhang, Yuling Liu, Yongwei Wang:
Quantitative Method for Network Security Situation Based on Attack Prediction. Secur. Commun. Networks 2017: 3407642:1-3407642:19 (2017) - [j4]Yi Liu, Hongqi Zhang, Jiang Liu, Yingjie Yang:
A New Approach for Delivering Customized Security Everywhere: Security Service Chain. Secur. Commun. Networks 2017: 9534754:1-9534754:17 (2017) - [c11]Duohe Ma, Liming Wang, Cheng Lei, Zhen Xu, Hongqi Zhang, Meng Li:
Quantitative Security Assessment Method based on Entropy for Moving Target Defense. AsiaCCS 2017: 920-922 - 2016
- [j3]Cheng Lei, Hongqi Zhang, Yi Sun, Xuehui Du, Xudong Jia:
Multilayer collaborative traceback technique based on net-flow fingerprint. Int. J. Embed. Syst. 8(1): 1-11 (2016) - [j2]Youjun Wang, Yuntian Zhao, Hongqi Zhang, Chuanfu Zhang, Chao Yang:
基于超图的Cyber空间故障传播研究方法 (Method for Cyberspace Failure Spreading and Diffusion Based on Hypergraph). 计算机科学 43(3): 145-150 (2016) - [c10]Duohe Ma, Cheng Lei, Liming Wang, Hongqi Zhang, Zhen Xu, Meng Li:
A Self-adaptive Hopping Approach of Moving Target Defense to thwart Scanning Attacks. ICICS 2016: 39-53 - [c9]Duohe Ma, Liming Wang, Cheng Lei, Zhen Xu, Hongqi Zhang, Meng Li:
Thwart eavesdropping attacks on network communication based on moving target defense. IPCCC 2016: 1-2 - [c8]Yong Zhao, Cheng Lei, Yingjie Yang, Hongqi Zhang, Tong Yang, Zongyi Zhao, Xiaomei Sun:
Self-Adaptive End-Point Mutation Technique Based on Adversary Strategy Awareness. LCN 2016: 587-590 - 2015
- [j1]Cheng Si, Hongqi Zhang, Yongwei Wang, Yingjie Yang:
基于本体的网络安全态势要素知识库模型研究 (Research on Network Security Situational Elements Knowledge Base Model Based on Ontology). 计算机科学 42(5): 173-177 (2015) - [c7]Cheng Lei, Hongqi Zhang, Minglu Li, Yi Liu:
Network Watermarking Model Based on Optimization Theory. CCBD 2015: 101-104 - [c6]Yi Liu, Cheng Lei, Hongqi Zhang:
MR-Verifier: Verifying Open Flow Network Properties Based on MapReduce. CyberC 2015: 546-553 - 2014
- [c5]Dexian Chang, Hongqi Zhang, Yingjie Yang:
Construction and Verification of the Trusted Cloud Service. CLOSER 2014: 179-185
2000 – 2009
- 2009
- [c4]Hongqi Zhang, Oliver Yang, Jiying Zhao:
VoIP Implementation and Experiments on a Mobile Wireless AdHoc Network. ADHOCNETS 2009: 537-548 - 2008
- [c3]Wenbo Zhang, Hongqi Zhang, Bin Zhang, Yan Yang:
An Identity-Based Authentication Model for Multi-domain in Grid Environment. CSSE (3) 2008: 165-169 - [c2]Hongqi Zhang, Jiying Zhao, Oliver Yang:
Adaptive Rate Control for VoIP in Wireless Ad Hoc Networks. ICC 2008: 3166-3170 - [c1]Yanbin Qian, Xingyuan Chen, Xuehui Du, Hongqi Zhang:
Layered Secure Access Research for Space Network. ISCSCT (1) 2008: 307-311
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-18 19:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint