default search action
Shuhui Zhang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j18]Shujiang Xu, Lulu Zhang, Lianhai Wang, Miodrag J. Mihaljevic, Shuhui Zhang, Wei Shao, Qizheng Wang:
Relay network-based cross-chain data interaction protocol with integrity audit. Comput. Electr. Eng. 117: 109262 (2024) - [j17]Shuhui Zhang, Hanwen Tian, Lianhai Wang, Shujiang Xu, Wei Shao:
A reputation-based dynamic reorganization scheme for blockchain network sharding. Connect. Sci. 36(1) (2024) - [j16]Lianhai Wang, Xiaoqian Liu, Wei Shao, Chenxi Guan, Qihao Huang, Shujiang Xu, Shuhui Zhang:
A Blockchain-Based Privacy-Preserving Healthcare Data Sharing Scheme for Incremental Updates. Symmetry 16(1): 89 (2024) - [j15]Rui Guo, Jinlong Gao, Shuai Fu, Yangjing Xiu, Shuhui Zhang, Xiaodong Huang, Qisheng Feng, Tiangang Liang:
Estimating Aboveground Biomass of Alpine Grassland During the Wilting Period Using In Situ Hyperspectral, Sentinel-2, and Sentinel-1 Data. IEEE Trans. Geosci. Remote. Sens. 62: 1-16 (2024) - 2023
- [j14]Shujiang Xu, Jinrong Zhong, Lianhai Wang, Debiao He, Shuhui Zhang, Wei Shao:
A privacy-preserving and efficient data sharing scheme with trust authentication based on blockchain for mHealth. Connect. Sci. 35(1) (2023) - [j13]Wei Shao, Jinpeng Wang, Lianhai Wang, Chunfu Jia, Shujiang Xu, Shuhui Zhang:
Auditable Blockchain Rewriting in Permissioned Setting With Mandatory Revocability for IoT. IEEE Internet Things J. 10(24): 21322-21336 (2023) - [j12]Shuhui Zhang, Changdong Hu, Lianhai Wang, Miodrag J. Mihaljevic, Shujiang Xu, Tian Lan:
A Malware Detection Approach Based on Deep Learning and Memory Forensics. Symmetry 15(3): 758 (2023) - [c24]Shujiang Xu, Fansheng Wang, Lianhai Wang, Miodrag J. Mihaljevic, Shuhui Zhang, Wei Shao, Qihao Huang:
Trusted Auditing of Data Operation Behaviors in Cloud based on Blockchain and TEE. ISPA/BDCloud/SocialCom/SustainCom 2023: 447-455 - [c23]Kuiye Ding, Shuhui Zhang, Feifei Yu, Guangqi Liu:
LOLWTC: A Deep Learning Approach for Detecting Living Off the Land Attacks. CCIS 2023: 176-181 - [c22]Ruochen Wang, Fei Song, Jun Ma, Shuhui Zhang:
We Want AI to Help Us - An Explorative Study Regarding How AI Could Assist Operators in the Main Control Room of Nuclear Power Plants. HCI (41) 2023: 298-310 - 2022
- [j11]Ying Li, Shuhui Zhang, Jingting Han, Yi Zhao, Quan Han, Liyun Wu, Xin Wang, Ziyi Qiu, Tongqian Zou, Cheng Fan:
A study of the temporal and spatial variations in the suitability of the environment in Chinese cities for tourism and in strategies for optimizing the environment. Int. J. Digit. Earth 15(1): 527-552 (2022) - [j10]Shuhui Zhang, Yuke Zhou, Yong Yu, Feng Li, Ruixin Zhang, Wenlong Li:
Using the Geodetector Method to Characterize the Spatiotemporal Dynamics of Vegetation and Its Interaction with Environmental Factors in the Qinba Mountains, China. Remote. Sens. 14(22): 5794 (2022) - [c21]Shibo Xu, Jing Wang, Shuhui Zhang:
Research on Protocol Optimization of Wireless Ad Hoc Network for Smart Container. ICCSIE 2022: 71-76 - [c20]Shujiang Xu, Chaoyang Zhang, Lianhai Wang, Shuhui Zhang, Wei Shao:
A Cross Data Center Access Control Model by Constructing GAS on Blockchain. ICPADS 2022: 312-321 - [c19]Sen Wang, Zhuheng Sheng, Jingwei Xu, Taolue Chen, Junjun Zhu, Shuhui Zhang, Yuan Yao, Xiaoxing Ma:
ADEPT: A Testing Platform for Simulated Autonomous Driving. ASE 2022: 150:1-150:4 - 2021
- [j9]Enqin Liu, Hui Zhao, Shuhui Zhang, Jing He, Xin Yang, Xiangming Xiao:
Identification of plant species in an alpine steppe of Northern Tibet using close-range hyperspectral imagery. Ecol. Informatics 61: 101213 (2021) - [j8]Shan He, Huaiyong Shao, Wei Xian, Shuhui Zhang, Jialong Zhong, Jiaguo Qi:
Extraction of Abandoned Land in Hilly Areas Based on the Spatio-Temporal Fusion of Multi-Source Remote Sensing Images. Remote. Sens. 13(19): 3956 (2021) - [c18]Kunlun Fu, Lianhai Wang, Wei Shao, Wei Wang, Shuhui Zhang, Shujiang Xu, Shanshan Hu:
Supervisory Scheme for Blockchain Privacy Protection Technique Based on Group Signature. ICEA 2021: 223-228 - 2020
- [j7]Shuhui Zhang, Na Zhang, Shanshan Zhu, Fengchao Liu:
A foot in two camps or your undivided attention? The impact of intra- and inter-community collaboration on firm innovation performance. Technol. Anal. Strateg. Manag. 32(7): 753-768 (2020) - [j6]Dawei Zhao, Shumian Yang, Xiaohui Han, Shuhui Zhang, Zhen Wang:
Dismantling and Vertex Cover of Network Through Message Passing. IEEE Trans. Circuits Syst. 67-II(11): 2732-2736 (2020) - [c17]Zheng Zhi, Qiuyu Wang, Haitao Lian, Yufan Wang, Fei Song, Shuhui Zhang:
Cognitive-Based Severe Accident Information System Development in a Human Factors Project. HCI (7) 2020: 104-113
2010 – 2019
- 2019
- [j5]Min Han, Shuhui Zhang, Meiling Xu, Tie Qiu, Ning Wang:
Multivariate Chaotic Time Series Online Prediction Based on Improved Kernel Recursive Least Squares Algorithm. IEEE Trans. Cybern. 49(4): 1160-1172 (2019) - [c16]Shuhui Zhang, Huaqian Cai, Ying Zhang:
TransDroid: Automatic Client-based Service Evolving in Android Apps. Internetware 2019: 3:1-3:8 - [c15]Shuhui Zhang, Lianhai Wang, Lijuan Xu, Shujiang Xu, Xiaohui Han, Shumian Yang:
Virtual Machine Memory Forensics Method for XenServer Platform. NaNA 2019: 302-308 - 2018
- [j4]Shaojie Qu, Kan Li, Shuhui Zhang, Yongchao Wang:
Predicting Achievement of Students in Smart Campus. IEEE Access 6: 60264-60273 (2018) - [j3]Shuhui Zhang, Xiangxu Meng, Lianhai Wang, Lijuan Xu, Xiaohui Han:
Secure Virtualization Environment Based on Advanced Memory Introspection. Secur. Commun. Networks 2018: 9410278:1-9410278:16 (2018) - [c14]Shuhui Zhang, Min Han, Meiling Xu:
Chaotic Time Series Online Prediction Based on Improved Kernel Adaptive Filter. IJCNN 2018: 1-6 - [c13]Shumian Yang, Lianhai Wang, Dawei Zhao, Guangqi Liu, Shuhui Zhang:
The Design of a Cloud Forensics Middleware System Base on Memory Analysis. SoCPaR 2018: 258-267 - 2017
- [j2]Xiaohui Han, Lianhai Wang, Chaoran Cui, Jun Ma, Shuhui Zhang:
Linking Multiple Online Identities in Criminal Investigations: A Spectral Co-Clustering Framework. IEEE Trans. Inf. Forensics Secur. 12(9): 2242-2255 (2017) - [c12]Shuhui Zhang, Xiangxu Meng, Lianhai Wang, Guangqi Liu:
Research on Linux Kernel Version Diversity for Precise Memory Analysis. ICPCSEE (1) 2017: 373-385 - 2016
- [j1]Shuhui Zhang, Xiangxu Meng, Lianhai Wang:
An adaptive approach for Linux memory analysis based on kernel code reconstruction. EURASIP J. Inf. Secur. 2016: 14 (2016) - 2015
- [c11]Yun Ma, Xuanzhe Liu, Shuhui Zhang, Ruirui Xiang, Yunxin Liu, Tao Xie:
Measurement and Analysis of Mobile Web Cache Performance. WWW 2015: 691-701 - 2014
- [c10]Shuhui Zhang, Lianhai Wang, Xiaohui Han:
A KVM Virtual Machine Memory Forensics Method Based on VMCS. CIS 2014: 657-661 - [c9]Yun Ma, Xuan Lu, Shuhui Zhang, Xuanzhe Liu:
Characterizing cache usage for mobile web applications. Internetware 2014: 68-71 - 2013
- [c8]Shuhui Zhang, Lianhai Wang:
Forensic analysis of social networking application on iOS devices. ICMV 2013: 906715 - 2010
- [c7]Lianhai Wang, Lijuan Xu, Shuhui Zhang:
Network Connections Information Extraction of 64-Bit Windows 7 Memory Images. e-Forensics 2010: 90-98 - [c6]Lei Zhang, Lianhai Wang, Ruichao Zhang, Shuhui Zhang, Yang Zhou:
Live Memory Acquisition through FireWire. e-Forensics 2010: 159-167 - [c5]Jiangtao Qi, Shuhui Zhang, Yingjie Yu, Ye Li, Yan Xu:
Experimental analysis of ground speed measuring systems for the intelligent agricultural machinery. FSKD 2010: 668-671
2000 – 2009
- 2009
- [c4]Ruichao Zhang, Lianhai Wang, Shuhui Zhang:
Windows Memory Analysis Based on KPCR. IAS 2009: 677-680 - 2006
- [c3]Shijun Liu, Xiangxu Meng, Ruyue Ma, Lei Wu, Shuhui Zhang:
Design and Implementation of a Service-Oriented Manufacturing Grid System. APWeb Workshops 2006: 643-647 - [c2]Shuhui Zhang, Xiangxu Meng, Shijun Liu, Ruyue Ma, Lei Wu:
Dynamic Manufacturing Job Management in Manufacturing Grid. CSCWD 2006: 1344-1349 - 2004
- [c1]Caicong Wu, Xiuwan Chen, Yunxia Han, Shuhui Zhang:
System modeling and control of automatically variable rate fertilizer applicator. SMC (1) 2004: 513-518
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-04 00:32 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint