Hong Zhang

ORCID: 0000-0001-7347-8062
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Energy Efficient Wireless Sensor Networks
  • Anomaly Detection Techniques and Applications
  • Advanced Computational Techniques and Applications
  • Service-Oriented Architecture and Web Services
  • Data Mining Algorithms and Applications
  • Network Security and Intrusion Detection
  • Metaheuristic Optimization Algorithms Research
  • Mobile Agent-Based Network Management
  • Semantic Web and Ontologies
  • Web Data Mining and Analysis
  • Time Series Analysis and Forecasting
  • IoT-based Smart Home Systems
  • Data-Driven Disease Surveillance
  • Human Pose and Action Recognition
  • Data Stream Mining Techniques
  • Embedded Systems and FPGA Design
  • Sentiment Analysis and Opinion Mining
  • Advanced Decision-Making Techniques
  • Simulation and Modeling Applications
  • Cloud Computing and Resource Management
  • Energy Harvesting in Wireless Networks
  • Advanced Software Engineering Methodologies
  • Graph Theory and Algorithms
  • Digital Media Forensic Detection
  • Cryptography and Data Security

National Computer Network Emergency Response Technical Team/Coordination Center of Chinar
2023-2025

Anhui Polytechnic University
2023

Lanzhou University of Technology
2016-2021

Gansu University of Traditional Chinese Medicine
2020

Nanjing University of Science and Technology
2007-2018

Beijing Institute of Technology
2015

University of Alberta
2015

University of Manitoba
2015

Beihang University
2014

Nanjing Tech University
2011

In this paper, we propose a novel implicit semantic data augmentation (ISDA) approach to complement traditional techniques like flipping, translation or rotation. Our work is motivated by the intriguing property that deep networks are surprisingly good at linearizing features, such certain directions in feature space correspond meaningful transformations, e.g., adding sunglasses changing backgrounds. As consequence, translating training samples along many can effectively augment dataset...

10.48550/arxiv.1909.12220 preprint EN other-oa arXiv (Cornell University) 2019-01-01

10.1109/icassp49660.2025.10888035 article EN ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2025-03-12

Industrial wireless sensor network (IWSN) has changed the information transmission way for existing industrial control system. In mobile sink-based networks, energy consumption optimization data collection always been a hot research issue. To meet delay requirements and minimize consumption, strategy based on ant colony with sink is proposed networks. Firstly, in order to reduce number of nodes directly accessed by shorten traversed path, selection rendezvous entropy weight method introduced...

10.1186/s13638-019-1472-7 article EN cc-by EURASIP Journal on Wireless Communications and Networking 2019-06-10

In order to mitigate the hot spot problem and prolong network lifetime, data gathering with mobile sink is an effective measure enhance system performance. However, movement strategy of node can be regarded as traveling salesman problem, which hardly obtain solution polynomial running time. To address above energy-aware mechanism for in wireless sensor networks using particle swarm optimization introduced. Firstly, mathematical model established according total energy consumption delay...

10.1109/access.2020.3026113 article EN cc-by IEEE Access 2020-01-01

Using a forward-lockstep build-test process that combines theoretic and pragmatic approaches to ontology building.

10.1145/966389.966393 article EN Communications of the ACM 2004-02-01

Urban sensor networks often consist of a large number low-cost nodes. Due to the constrained resource devices and hazardous deployment, urban sensing is vulnerable interference destruction external factors or impact environmental emergencies. Abnormal data, outliers, anomalies have affected utility in various domains seriously. Timely accurate detection unexpected events, monitoring network performance, anomaly data flow are great significance improve decision-making ability system. In this...

10.1109/access.2019.2909967 article EN cc-by-nc-nd IEEE Access 2019-01-01

As the scale of data on Internet continues to increase, management and monitoring time series are facing significant challenges. Efficient stable time-series anomaly detection methods necessary for fields such as traffic detection, power grid operation maintenance, financial stock market, industry. However, there fewer abnormal labels in data, labeling cost is high. Traditional expert knowledge-based supervised have been difficult adapt large-scale metric timely alarms. At same time, way...

10.1109/cscwd57460.2023.10152838 article EN 2023-05-24

Aiming at the waste of computing resources resulting from sequential control running mechanism MapReduce model on Hadoop platform,Fork/Join framework has been introduced into this to make full use CPU resource each node. From perspective fine-grained parallel data processing, combined with Fork/Join framework,a and multi-thread model,this paper optimizes puts forward a MapReduce+Fork/Join programming which is distributed architecture coarse-grained platform Support two-tier levels...

10.12928/telkomnika.v14i4.3606 article EN cc-by-nc TELKOMNIKA (Telecommunication Computing Electronics and Control) 2016-12-01

10.1007/s11760-015-0797-x article EN Signal Image and Video Processing 2015-07-11

This paper describes the realization of a kind wireless data acquisition system based on nRF24E1. In this system, acquired from sensor modules, through transceiver terminal, which adopts mode ShockBurst <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">¿</sup> , transmit to host server and then send computer. The can be analyzed by developing computer software. Through establishing communication protocols star-network, conflict avoided when no...

10.1109/cnmt.2009.5374638 article EN International Symposium on Computer Network and Multimedia Technology 2009-12-01

Existing trust evaluation models for wireless sensor networks can accurately and objectively evaluate value of nodes, but the nodes' energy saving problem was ignored.Especially when there are a few malicious nodes in network, overall calculation all would waste lots energy.Beside that, network failure caused by death also not considered.In this paper, we proposed method avoiding hole which applied based on information entropy, so as to achieve purpose improving utilization.Simulation...

10.3837/tiis.2018.03.008 article EN KSII Transactions on Internet and Information Systems 2018-03-31

DOI: 10.1049/cp:20061590 ISBN: 0 86341 644 6 Location: Hangzhou, China Conference date: 6-9 Nov. 2006 Format: PDF By deep analysis of J2EE platform and WebGIS systematic structure, this section settles the key technology coordinated operation WebGIS, expatiates cooperation principle, proposes a developing architecture based on platform, then gives working mechanism directed by architecture. The avoids illogicalities problems which lying in nowadays correlative research application about...

10.1049/cp:20061590 article EN IET International Conference on Wireless Mobile and Multimedia Networks Proceedings (ICWMMN 2006) 2006-01-01

10.1137/1035141 article ES SIAM Review 1993-12-01

In order to make full use of multiple types data and improve the accuracy recommendation algorithm, a scoring prediction model combining multi-source heterogeneous such as product attributes, user reviews friend relationships is proposed for recommendation. this attributes comment information are combined, combination method LDA Word2vec adopted extract user-commodity joint features, community division algorithm used divide users into communities, features ratings integrated establish rating...

10.1145/3478905.3478916 article EN 2021-07-23

Abnormal event detection in crowded scenes is one of the most challenging tasks video surveillance for public security control. Different from previous work based on learning. We proposed an unsupervised Interaction Power model with adaptive threshold strategy to detect abnormal group activity by analyzing steady state individuals' behaviors crowed scene. Firstly, optical flow field potential pedestrians only calculated within extracted foreground reduce computational cost. Secondly, each...

10.1117/12.2073551 article EN Proceedings of SPIE, the International Society for Optical Engineering/Proceedings of SPIE 2014-11-04

The term software architecture (SA) intuitively denotes the high level structures of a system.It can be defined as set needed to reason about system, which comprise components and connectors, their relations properties.Nowadays SA has become an important factor in process development researches mainly focus on languages, modeling, dynamic evolution process, etc.In this article, complex system brittleness theory are applied into field SA, concept graph collapse path is introduced analytical...

10.2174/1874110x01509011094 article EN The Open Cybernetics & Systemics Journal 2015-09-10

Aiming at the problems of insufficient labeled samples and high missed detection rate in common textured surface anomaly detection, paper designs a self-supervised learning model based on masked Autoencoder, which can realize accurate location anomalies without providing mass samples. Autoencoder is widely used, but it difficult to detect locate by reconstruction error due its strong generalization ability reconstructed with small errors. Then, method proposed reduce performance. First, each...

10.1117/12.2673155 article EN 2023-03-01

In this letter, we point out that key substitution attacks should be taken into account for multisignature schemes, which implies the existing security notions schemes are not sufficient. As an example, show scheme proposed by Boldyreva at PKC'03 is susceptible to attacks.

10.1587/transfun.e96.a.244 article EN IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences 2012-12-31
Coming Soon ...