![](https://dblp.dagstuhl.de/img/logo.320x120.png)
![search dblp search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
![search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
default search action
Chen Zhong
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
![note](https://dblp.dagstuhl.de/img/note-mark.dark.12x12.png)
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j47]Chen Zhong
:
Oracle-efficient estimation and trend inference in non-stationary time series with trend and heteroscedastic ARMA error. Comput. Stat. Data Anal. 193: 107917 (2024) - [j46]Chen Zhong
, J. B. (Joo Baek) Kim
, Hong Liu
:
The Art of Inclusive Gamification in Cybersecurity Training. IEEE Secur. Priv. 22(5): 40-51 (2024) - [j45]Chen Zhong, Chegnyu Wu, Xiangyang Li, Ao Zhan, Zhengqiang Wang:
A Novel Frequency Hopping Prediction Model Based on TCN-GRU. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 107(9): 1577-1581 (2024) - [j44]Chen Zhong, Hong Liu, Hwee-Joo Kam:
Mining Reddit users' perspectives on cybersecurity competitions: a mixed method approach. Inf. Comput. Secur. 32(5): 636-655 (2024) - [j43]Chen Zhong
, Xianzhong Nie:
Feasibility of LoRa for Smart Home: Real Time and Coverage Considerations. IEEE Internet Things J. 11(14): 25213-25226 (2024) - [j42]Haoming Zhang, Ke Wang, Chen Zhong, Kaijie Yun, Zilong Wang, Yifan Yang, Xianshui Tao:
LSPConv: local spatial projection convolution for point cloud analysis. PeerJ Comput. Sci. 10: e1738 (2024) - [j41]Qiuling Yue
, Chen Zhong, Hong Lei:
Quantum sealed-bid auction protocol with post-confirmation based on blind signature. Quantum Inf. Process. 23(3): 70 (2024) - [j40]Lanjun Liu
, Dechuan Wang, Jiabin Yu
, Peng Yao
, Chen Zhong, Dongfei Fu:
A Hierarchical Heuristic Architecture for Unmanned Aerial Vehicle Coverage Search with Optical Camera in Curve-Shape Area. Remote. Sens. 16(9): 1502 (2024) - [j39]Mengqi Sun, Yang Xu, Chen Zhong, Mengyao Ren, Sangwon Park:
Unraveling changes of spending behavior in pandemic cities: A nationwide study of South Korea. Comput. Environ. Urban Syst. 114: 102181 (2024) - [c49]Xinlang Yue
, Yiran Liu
, Fangzhou Shi
, Sihong Luo
, Chen Zhong
, Min Lu
, Zhe Xu
:
An End-to-End Reinforcement Learning Based Approach for Micro-View Order-Dispatching in Ride-Hailing. CIKM 2024: 5054-5061 - [c48]Chen Zhong, Qingqing Zhou, Yuxing Chen
, Xingsheng Zhao, Kuang He, Anqun Pan, Song Jiang:
IndeXY: A Framework for Constructing Indexes Larger than Memory. ICDE 2024: 516-529 - [c47]Chen Zhong, Motahareh Pourbehzadi, Giti Javidi:
Insider Detection Based on Behavior Sequences: A Transformer Approach. ICIS 2024 - [c46]Xiaoji Zheng, Lixiu Wu, Zhijie Yan, Yuanrong Tang, Hao Zhao, Chen Zhong, Bokui Chen, Jiangtao Gong:
Large Language Models Powered Context-aware Motion Prediction in Autonomous Driving. IROS 2024: 980-985 - [c45]Chen Zhong
, Sam Zaza
, Valerie L. Bartelt
:
Understanding Communication Preferences in Collaborative Cybersecurity Incident Response. SIGMIS-CPR 2024: 25:1 - [c44]Chang Yue, Chen Zhong, Kai Chen, Zhiyu Zhang, Yeonjoon Lee:
DARKFLEECE: Probing the Dark Side of Android Subscription Apps. USENIX Security Symposium 2024 - [c43]Xingsheng Zhao
, Prajwal Challa
, Chen Zhong
, Song Jiang
:
Developing Index Structures in Persistent Memory Using Spot-on Optimizations with DRAM. ICPE 2024: 107-117 - [i18]Xiaoji Zheng, Lixiu Wu, Zhijie Yan, Yuanrong Tang, Hao Zhao, Chen Zhong, Bokui Chen, Jiangtao Gong:
Large Language Models Powered Context-aware Motion Prediction. CoRR abs/2403.11057 (2024) - [i17]Xinlang Yue, Yiran Liu, Fangzhou Shi, Sihong Luo, Chen Zhong, Min Lu, Zhe Xu:
An End-to-End Reinforcement Learning Based Approach for Micro-View Order-Dispatching in Ride-Hailing. CoRR abs/2408.10479 (2024) - [i16]Lixiu Wu, Yuanrong Tang, Qisen Pan, Xianyang Zhan, Yucheng Han, Mingyang You, Lanxi Xiao, Tianhong Wang, Chen Zhong, Jiangtao Gong:
An LLM-based Simulation Framework for Embodied Conversational Agents in Psychological Counseling. CoRR abs/2410.22041 (2024) - 2023
- [j38]Divya Sharma
, Chen Zhong
, Howard Wong
:
Lockdown lifted: measuring spatial resilience from London's public transport demand recovery. Geo spatial Inf. Sci. 26(4): 685-702 (2023) - [j37]Chen Zhong
, Andreas Springer
:
Analysis of a Novel Media Access Control Protocol for LoRa. IEEE Internet Things J. 10(1): 341-356 (2023) - [j36]Chen Zhong
, J. B. (Joo Baek) Kim
, Ali Alper Yayla
:
Enhancing Communication Among Remote Cybersecurity Analysts With Visual Traces. IT Prof. 25(5): 29-36 (2023) - [j35]Xuecong Zhang, Chen Zhong, Laith Abualigah
:
Foreign exchange forecasting and portfolio optimization strategy based on hybrid-molecular differential evolution algorithms. Soft Comput. 27(7): 3921-3939 (2023) - [j34]Geethu Joseph
, Chen Zhong
, Mustafa Cenk Gursoy
, Senem Velipasalar
, Pramod K. Varshney
:
Scalable and Decentralized Algorithms for Anomaly Detection via Learning-Based Controlled Sensing. IEEE Trans. Signal Inf. Process. over Networks 9: 640-654 (2023) - [c42]Chen Zhong:
Supporting Effective Communication in Remote Cybersecurity Analyst Team. AMCIS 2023 - [c41]Chen Zhong, Qinwei Ni, Ping Chen:
Predicting Analysts' Needs for Explainable Artificial Intelligence (XAI) in Cybersecurity Analysis. AMCIS 2023 - [c40]Ed Marcavage, Jake Mason, Chen Zhong
:
Predicting the Effectiveness of Blockchain Bug Bounty Programs. FLAIRS 2023 - [c39]Wenlan Zhang, Chen Zhong
, Faith Taylor
:
Digital Injustice: A Case Study of Land Use Classification Using Multisource Data in Nairobi, Kenya (Short Paper). GIScience 2023: 94:1-94:6 - [c38]Xingsheng Zhao
, Chen Zhong
, Song Jiang
:
TurboHash: A Hash Table for Key-value Store on Persistent Memory. SYSTOR 2023: 35-48 - [i15]Geethu Joseph, Chen Zhong, Mustafa Cenk Gursoy, Senem Velipasalar, Pramod K. Varshney:
Anomaly Detection via Learning-Based Sequential Controlled Sensing. CoRR abs/2312.00088 (2023) - 2022
- [j33]Yijing Li
, Qunshan Zhao
, Chen Zhong
:
GIS and urban data science. Ann. GIS 28(2): 89-92 (2022) - [j32]Wei Tu
, Tingting Zhu, Chen Zhong
, Xiaohu Zhang
, Yang Xu
, Qingquan Li
:
Exploring metro vibrancy and its relationship with built environment: a cross-city comparison using multi-source urban data. Geo spatial Inf. Sci. 25(2): 182-196 (2022) - [j31]Chen Zhong
, Andreas Springer
:
Design and evaluation of innovative protocols for LoRa. IET Wirel. Sens. Syst. 12(1): 12-20 (2022) - [j30]Cailing Wang, Chen Zhong, Guoping Jiang:
Learning speed equalization network for few-shot learning. J. Electronic Imaging 31(1) (2022) - [j29]Ziyang Lu
, Chen Zhong
, Mustafa Cenk Gursoy
:
Dynamic Channel Access and Power Control in Wireless Interference Networks via Multi-Agent Deep Reinforcement Learning. IEEE Trans. Veh. Technol. 71(2): 1588-1601 (2022) - [j28]Bowen Zhang
, Chen Zhong
, Qi-Li Gao, Zahratu Shabrina
, Wei Tu
:
Delineating urban functional zones using mobile phone data: A case study of cross-boundary integration in Shenzhen-Dongguan-Huizhou area. Comput. Environ. Urban Syst. 98: 101872 (2022) - [j27]Qingquan Li, Yang Yue, Qi-Li Gao
, Chen Zhong
, Joana Barros
:
Towards a new paradigm for segregation measurement in an age of big data. Urban Inform. 1(1) (2022) - [j26]Yikang Wang
, Chen Zhong
, Qili Gao, Carmen Cabrera Arnau
:
Understanding internal migration in the UK before and during the COVID-19 pandemic using twitter data. Urban Inform. 1(1) (2022) - [c37]Chen Zhong, J. B. (Joo Baek) Kim, Hong Liu:
The Impact of Gamification on Students' Learning Outcome and Career Interest in Cybersecurity Education. AMCIS 2022 - [c36]Wei Li, Jiwei Song, Yao Liu, Chen Zhong, Li Geng, Wenfeng Wang:
Gait Recognition with Various Data Modalities: A Review. CCBR 2022: 414-423 - [c35]Chen Zhong, Mustafa Cenk Gursoy, Senem Velipasalar:
Controlled Sensing and Anomaly Detection Via Soft Actor-Critic Reinforcement Learning. ICASSP 2022: 4198-4202 - [c34]Chen Zhong
, Prajwal Challa, Xingsheng Zhao, Song Jiang:
Buffered Hash Table: Leveraging DRAM to Enhance Hash Indexes in the Persistent Memory. NVMSA 2022: 8-13 - [c33]Chen Zhong, Mustafa Cenk Gursoy, Senem Velipasalar:
Learning-Based Robust Anomaly Detection in the Presence of Adversarial Attacks. WCNC 2022: 1206-1211 - [i14]Chen Zhong, Chunrong Gu, Lan Tang, Yechao Bai, Mengting Lou:
Performance Optimization and Parameters Estimation for MIMO-OFDM Dual-functional Communication-radar Systems. CoRR abs/2210.06951 (2022) - 2021
- [j25]Feng Wang
, Chen Zhong
, Mustafa Cenk Gursoy
, Senem Velipasalar
:
Resilient Dynamic Channel Access via Robust Deep Reinforcement Learning. IEEE Access 9: 163188-163203 (2021) - [j24]Chen Zhong
, Andreas Springer
:
A Novel Network Architecture and MAC Protocol for Confirmed Traffic in LoRaWAN. IEEE Access 9: 165145-165153 (2021) - [j23]Chen Zhong
, Lijian Yang
:
Simultaneous confidence bands for comparing variance functions of two samples based on deterministic designs. Comput. Stat. 36(2): 1197-1218 (2021) - [j22]Hong Liu, Chen Zhong
, Awny Alnusair
, Sheikh Rabiul Islam:
FAIXID: A Framework for Enhancing AI Explainability of Intrusion Detection Results Using Data Cleaning Techniques. J. Netw. Syst. Manag. 29(4): 40 (2021) - [c32]Brock Floyd, Jared Jackson, Emma Probst, Hong Liu, Nischal Mishra, Chen Zhong:
Understanding Learners' Interests in Cybersecurity Competitions on Reddit. ICETC 2021: 444-449 - [c31]Chen Zhong
, Xingsheng Zhao, Song Jiang:
LIRS2: an improved LIRS replacement algorithm. SYSTOR 2021: 19:1-19:12 - [i13]Geethu Joseph, Chen Zhong, Mustafa Cenk Gursoy, Senem Velipasalar, Pramod K. Varshney:
Anomaly Detection via Controlled Sensing and Deep Active Inference. CoRR abs/2105.06288 (2021) - [i12]Geethu Joseph, Chen Zhong, Mustafa Cenk Gursoy, Senem Velipasalar, Pramod K. Varshney:
Scalable and Decentralized Algorithms for Anomaly Detection via Learning-Based Controlled Sensing. CoRR abs/2112.04912 (2021) - [i11]Rui Ma, Sara Eftekharnejad, Chen Zhong, Mustafa Cenk Gursoy:
A Predictive Online Transient Stability Assessment with Hierarchical Generative Adversarial Networks. CoRR abs/2112.07840 (2021) - [i10]Ziyang Lu, Chen Zhong, Mustafa Cenk Gursoy:
Dynamic Channel Access and Power Control in Wireless Interference Networks via Multi-Agent Deep Reinforcement Learning. CoRR abs/2112.14709 (2021) - 2020
- [j21]Chen Zhong
, Mustafa Cenk Gursoy
, Senem Velipasalar
:
Deep Reinforcement Learning-Based Edge Caching in Wireless Networks. IEEE Trans. Cogn. Commun. Netw. 6(1): 48-61 (2020) - [c30]Chen Zhong, Zhijia Tian, Hongjun Ding, Ke Wang:
Video Flame Recognition Based on Feature Fusion and Extreme Learning Machine. CACRE 2020: 702-705 - [c29]Feng Wang, Chen Zhong, Mustafa Cenk Gursoy, Senem Velipasalar:
Defense Strategies Against Adversarial Jamming Attacks via Deep Reinforcement Learning. CISS 2020: 1-6 - [c28]Joshua Ian Bertrand, Alex Martakis, Hong Liu, Chen Zhong
, Jun Yao:
Exploring Participants' Views of Cybersecurity Competitions through the Lens of Social Media. CogSIMA 2020: 155-162 - [c27]Chen Zhong, Xin Yuan:
A Method of Resource Isolation and Security Enhancement of Container Cloud Based on Multiple Security Domains. CSIA (1) 2020: 639-646 - [c26]Geethu Joseph, Chen Zhong, Mustafa Cenk Gursoy, Senem Velipasalar, Pramod K. Varshney:
Anomaly Detection via Controlled Sensing and Deep Active Inference. GLOBECOM 2020: 1-6 - [c25]Chen Zhong, Mustafa Cenk Gursoy, Senem Velipasalar:
Anomaly Detection and Sampling Cost Control via Hierarchical GANs. GLOBECOM 2020: 1-6 - [c24]Chen Zhong, Feng Wang, Mustafa Cenk Gursoy, Senem Velipasalar:
Adversarial Jamming Attacks on Deep Reinforcement Learning Based Dynamic Multichannel Access. WCNC 2020: 1-6 - [p3]Chen Zhong
, John Yen, Peng Liu:
Can Cyber Operations Be Made Autonomous? An Answer from the Situational Awareness Viewpoint. Adaptive Autonomous Secure Cyber Systems 2020: 63-88 - [i9]Feng Wang, Chen Zhong, Mustafa Cenk Gursoy, Senem Velipasalar:
Adversarial jamming attacks and defense strategies via adaptive deep reinforcement learning. CoRR abs/2007.06055 (2020) - [i8]Chen Zhong, Mustafa Cenk Gursoy, Senem Velipasalar:
Anomaly Detection and Sampling Cost Control via Hierarchical GANs. CoRR abs/2009.13598 (2020)
2010 – 2019
- 2019
- [j20]Mingliang Zhou
, Qin Mao, Chen Zhong, Weiqin Zhang, Changzhi Chen:
Spatial Error Concealment by Jointing Gauss Bayes Model and SVD for High Efficiency Video Coding. Int. J. Pattern Recognit. Artif. Intell. 33(14): 1954037:1-1954037:20 (2019) - [j19]Takashi Nicholas Maeda, Narushige Shiode
, Chen Zhong
, Junichiro Mori
, Tetsuo Sakimoto:
Detecting and understanding urban changes through decomposing the numbers of visitors' arrivals using human mobility data. J. Big Data 6: 4 (2019) - [j18]Chen Zhong
, John Yen, Peng Liu
, Robert F. Erbacher:
Learning From Experts' Experience: Toward Automated Cyber Security Data Triage. IEEE Syst. J. 13(1): 603-614 (2019) - [j17]Chen Zhong
, Ziyang Lu, Mustafa Cenk Gursoy
, Senem Velipasalar
:
A Deep Actor-Critic Reinforcement Learning Framework for Dynamic Multichannel Access. IEEE Trans. Cogn. Commun. Netw. 5(4): 1125-1139 (2019) - [c23]Chen Zhong
, Awny Alnusair, Brandon Sayger, Aaron Troxell, Jun Yao:
AOH-Map: A Mind Mapping System for Supporting Collaborative Cyber Security Analysis. CogSIMA 2019: 74-80 - [c22]Chen Zhong, Mustafa Cenk Gursoy, Senem Velipasalar:
Deep Actor-Critic Reinforcement Learning for Anomaly Detection. GLOBECOM 2019: 1-6 - [c21]Chen Zhong, Mustafa Cenk Gursoy, Senem Velipasalar:
Deep Multi-Agent Reinforcement Learning Based Cooperative Edge Caching in Wireless Networks. ICC 2019: 1-6 - [c20]Chen Zhong, Tianxiang Zhou, Ke Wang:
Paper Form Image Recognition Based on SSIM. ICMSS 2019: 78-82 - [c19]Lindsey Thomas, Moises Balders, Zach Countney, Chen Zhong
, Jun Yao, Chunxia Xu:
Cybersecurity Education: From Beginners to Advanced Players in Cybersecurity Competitions. ISI 2019: 149-151 - [i7]Chen Zhong, Mustafa Cenk Gursoy, Senem Velipasalar:
Deep Multi-Agent Reinforcement Learning Based Cooperative Edge Caching in Wireless Networks. CoRR abs/1905.05256 (2019) - [i6]Chen Zhong, Ziyang Lu, Mustafa Cenk Gursoy, Senem Velipasalar:
A Deep Actor-Critic Reinforcement Learning Framework for Dynamic Multichannel Access. CoRR abs/1908.08401 (2019) - [i5]Chen Zhong, Mustafa Cenk Gursoy, Senem Velipasalar:
Deep Actor-Critic Reinforcement Learning for Anomaly Detection. CoRR abs/1908.10755 (2019) - 2018
- [j16]Yi Li, Chen Zhong, Mustafa Cenk Gursoy
, Senem Velipasalar:
Learning-Based Delay-Aware Caching in Wireless D2D Caching Networks. IEEE Access 6: 77250-77264 (2018) - [j15]Chen Zhong
, Tao Lin, Peng Liu, John Yen, Kai Chen:
A cyber security data triage operation retrieval system. Comput. Secur. 76: 12-31 (2018) - [j14]Chen Zhong
, Shi Zeng
, Wei Tu
, Mitsuo Yoshida
:
Profiling the Spatial Structure of London: From Individual Tweets to Aggregated Functional Zones. ISPRS Int. J. Geo Inf. 7(10): 386 (2018) - [j13]Patrizia Sulis, Ed Manley, Chen Zhong, Michael Batty:
Using mobility data as proxy for measuring urban vitality. J. Spatial Inf. Sci. 16(1): 137-162 (2018) - [c18]Tao Lin, Chen Zhong, John Yen, Peng Liu:
Retrieval of Relevant Historical Data Triage Operations in Security Operation Centers. From Database to Cyber Security 2018: 227-243 - [c17]Chen Zhong, Mustafa Cenk Gursoy, Senem Velipasalar:
A deep reinforcement learning-based framework for content caching. CISS 2018: 1-6 - [c16]Chen Zhong, Ziyang Lu, Mustafa Cenk Gursoy, Senem Velipasalar:
Actor-Critic Deep Reinforcement Learning for Dynamic Multichannel Access. GlobalSIP 2018: 599-603 - [c15]Hong Liu, Chen Zhong:
Assessing programming education approaches for college beginners with different backgrounds. ICETC 2018: 136-139 - [c14]Lindsey Thomas, Adam Vaughan, Zachary Courtney, Chen Zhong
, Awny Alnusair:
Supporting Collaboration Among Cyber Security Analysts Through Visualizing Their Analytical Reasoning Processes. ICME Workshops 2018: 1-6 - [i4]Yi Li, Chen Zhong, Mustafa Cenk Gursoy, Senem Velipasalar:
Learning-Based Delay-Aware Caching in Wireless D2D Caching Networks. CoRR abs/1809.10296 (2018) - [i3]Chen Zhong, Ziyang Lu, Mustafa Cenk Gursoy, Senem Velipasalar:
Actor-Critic Deep Reinforcement Learning for Dynamic Multichannel Access. CoRR abs/1810.03695 (2018) - 2017
- [j12]Xin Li, Zhihan Lv
, Zhigao Zheng, Chen Zhong
, Ihab Hamzi Hijazi, Shidan Cheng:
Assessment of lively street network based on geographic information system and space syntax. Multim. Tools Appl. 76(17): 17801-17819 (2017) - [j11]Awny Alnusair, Chen Zhong
, Majdi Rawashdeh, M. Shamim Hossain, Atif Alamri:
Context-aware multimodal recommendations of multimedia data in cyber situational awareness. Multim. Tools Appl. 76(21): 22823-22843 (2017) - [p2]Chen Zhong
, John Yen, Peng Liu, Robert F. Erbacher, Christopher Garneau, Bo Chen:
Studying Analysts' Data Triage Operations in Cyber Defense Situational Analysis. Theory and Models for Cyber Situation Awareness 2017: 128-169 - [i2]Chen Zhong, Mustafa Cenk Gursoy, Senem Velipasalar:
A Deep Reinforcement Learning-Based Framework for Content Caching. CoRR abs/1712.08132 (2017) - 2016
- [j10]Jiaqiu Wang
, Ioannis Tsapakis, Chen Zhong
:
A space-time delay neural network model for travel time prediction. Eng. Appl. Artif. Intell. 52: 145-160 (2016) - [j9]Xin Li, Ihab Hamzi Hijazi, Reinhard Koenig, Zhihan Lv
, Chen Zhong
, Gerhard Schmitt:
Assessing Essential Qualities of Urban Space with Emotional and Visual Data Based on GIS Technique. ISPRS Int. J. Geo Inf. 5(11): 218 (2016) - [j8]Chen Zhong, Qizhi Xu, Bo Li:
Relative Radiometric Normalization for Multitemporal Remote Sensing Images by Hierarchical Regression. IEEE Geosci. Remote. Sens. Lett. 13(2): 217-221 (2016) - [j7]Zhihan Lv
, Chen Zhong
, Dingde Jiang:
Guest Editorial: Smart Transportation Based on Multimedia Data Mining. Multim. Tools Appl. 75(24): 17443-17448 (2016) - [c13]Chen Zhong
, John Yen, Peng Liu, Robert F. Erbacher:
Automate Cybersecurity Data Triage by Leveraging Human Analysts' Cognitive Process. BigDataSecurity/HPSC/IDS 2016: 357-363 - [c12]Chen Zhong, Rijiang Wang, Hongjun Ding:
Smoke-based video fire detectors sensitivity tests using smouldering cotton fire. ICSAI 2016: 992-996 - 2015
- [j6]Chen Zhong
, Ed Manley
, Stefan Müller Arisona, Michael Batty, Gerhard Schmitt:
Measuring variability of mobility patterns from multiday smart-card data. J. Comput. Sci. 9: 125-130 (2015) - [c11]Xiaoming Li, Zhihan Lv
, Jinxing Hu, Baoyun Zhang, Ling Yin, Chen Zhong
, Weixi Wang, Shengzhong Feng:
Traffic Management and Forecasting System Based on 3D GIS. CCGRID 2015: 991-998 - [c10]Chen Zhong
, John Yen, Peng Liu, Rob Erbacher, Renee Etoty, Christopher Garneau:
ARSCA: a computer tool for tracing the cognitive processes of cyber-attack analysis. CogSIMA 2015: 165-171 - [c9]Zack Zhu, Jing Yang, Chen Zhong
, Julia Seiter, Gerhard Tröster:
Learning functional compositions of urban spaces with crowd-augmented travel survey data. SIGSPATIAL/GIS 2015: 22:1-22:10 - [c8]Chen Zhong
, John Yen, Peng Liu, Rob Erbacher, Renee Etoty, Christopher Garneau:
An integrated computer-aided cognitive task analysis method for tracing cyber-attack analysis processes. HotSoS 2015: 9:1-9:11 - [c7]Chen Zhong, Qizhi Xu, Feng Yang, Lei Hu:
Building change detection for high-resolution remotely sensed images based on a semantic dependency. IGARSS 2015: 3345-3348 - [i1]Xiaoming Li, Zhihan Lv, Jinxing Hu, Baoyun Zhang, Ling Yin, Chen Zhong, Weixi Wang, Shengzhong Feng:
Traffic Management and Forecasting System Based on 3D GIS. CoRR abs/1504.01375 (2015) - 2014
- [j5]Chen Zhong
, Stefan Müller Arisona, Xianfeng Huang, Michael Batty, Gerhard Schmitt:
Detecting the dynamics of urban structure through spatial network analysis. Int. J. Geogr. Inf. Sci. 28(11): 2178-2199 (2014) - [j4]Feng Gao, Bo Li, Qizhi Xu, Chen Zhong:
Moving Vehicle Information Extraction from Single-Pass WorldView-2 Imagery Based on ERGAS-SNS Analysis. Remote. Sens. 6(7): 6500-6523 (2014) - [j3]Chen Zhong
, Xianfeng Huang, Stefan Müller Arisona, Gerhard Schmitt, Michael Batty:
Inferring building functions from a probabilistic model using public transportation data. Comput. Environ. Urban Syst. 48: 124-137 (2014) - [c6]Chen Zhong
, Deepak Samuel, John Yen, Peng Liu, Robert F. Erbacher, Steve E. Hutchinson, Renee Etoty, Hasan Cam, William Glodek:
RankAOH: Context-driven similarity-based retrieval of experiences in cyber analysis. CogSIMA 2014: 230-236 - [p1]John Yen, Robert F. Erbacher, Chen Zhong
, Peng Liu:
Cognitive Process. Cyber Defense and Situational Awareness 2014: 119-144 - 2013
- [j2]Stefan Müller Arisona, Chen Zhong
, Xianfeng Huang, Rongjun Qin:
Increasing detail of 3D models through combined photogrammetric and procedural modelling. Geo spatial Inf. Sci. 16(1): 45-53 (2013) - [c5]Chen Zhong
, Xianfeng Huang, Stefan Müller Arisona, Gerhard Schmitt:
Identifying Spatial Structure of Urban Functional Centers Using Travel Survey Data: A Case Study of Singapore. COMP@SIGSPATIAL 2013: 28-33 - [c4]Chen Zhong
, Deepak S. Kirubakaran, John Yen, Peng Liu, Steve E. Hutchinson, Hasan Cam:
How to use experience in cyber analysis: An analytical reasoning support system. ISI 2013: 263-265 - 2012
- [c3]Mingyi Zhao, Chen Zhong, Richard Ciamaichelo, Michael Konek, Neela Sawant, Nicklaus A. Giacobe:
Federating geovisual analytic tools for cyber security analysis. IEEE VAST 2012: 303-304 - [c2]Chen Zhong
, Tao Wang, Stephen Cairns, Stefan Müller Arisona:
Using an Interactive Dymaxion Map to Convey Research Information through Visualization. IV 2012: 422-425 - 2011
- [j1]Chen Zhong, Jens Eliasson, Rumen Kyusakov, Jerker Delsing:
Evaluation of a Heterogeneous Sensor Network Architecture for Highly Mobile Users. Commun. Netw. 3(2): 57-64 (2011) - [c1]Chen Zhong, Yan Zhuang, Wei Wang:
Stairway detection using Gabor Filter and FFPG. SoCPaR 2011: 578-582
Coauthor Index
![](https://dblp.dagstuhl.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-10 21:41 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint