Zhendong Wang

ORCID: 0000-0002-7082-2478
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Energy Efficient Wireless Sensor Networks
  • Anomaly Detection Techniques and Applications
  • Advanced Malware Detection Techniques
  • Metaheuristic Optimization Algorithms Research
  • Reinforcement Learning in Robotics
  • Energy Harvesting in Wireless Networks
  • Graph theory and applications
  • Software-Defined Networks and 5G
  • Advanced Fiber Laser Technologies
  • Computational Drug Discovery Methods
  • Advanced Optical Network Technologies
  • Adversarial Robustness in Machine Learning
  • Cognitive Radio Networks and Spectrum Sensing
  • Laser-Matter Interactions and Applications
  • Quantum optics and atomic interactions
  • Security and Verification in Computing
  • Dental Implant Techniques and Outcomes
  • Advanced Computational Techniques and Applications
  • Coal Properties and Utilization
  • Internet Traffic Analysis and Secure E-voting
  • Parallel Computing and Optimization Techniques
  • Traffic Prediction and Management Techniques
  • Automated Road and Building Extraction
  • Wireless Communication Networks Research

Jiangxi University of Science and Technology
2015-2025

Nanjing Medical University
2009-2025

Chinese Academy of Sciences
2024

University of Science and Technology of China
2013-2024

University of Science and Technology Beijing
2014-2024

China Telecom (China)
2023-2024

Shanghai Tongji Urban Planning and Design Institute
2023

Tongji University
2023

The University of Texas at Dallas
2019-2023

China Mobile (China)
2023

Deep learning has become a research hotspot in the field of network intrusion detection. In order to further improve detection accuracy and performance, we proposed an model based on improved deep belief (DBN). Traditional neural training methods, like Back Propagation (BP), start train with preset parameters such as randomly initialized weights thresholds, which may bring some issues, e.g., attracting local optimal solutions, or requiring long period. We use Kernel-based Extreme Learning...

10.1109/access.2021.3051074 article EN cc-by IEEE Access 2021-01-01

Intrusion detection ensures that IoT can protect itself against malicious intrusions in extensive and intricate network traffic data. In recent years, deep learning has been extensively effectively employed intrusion detection. However, the limited computing power storage space of devices restrict feasibility deploying resource-intensive systems on them. This article introduces DL-BiLSTM lightweight model. By combining neural networks (DNNs) bidirectional long short-term memory (BiLSTMs),...

10.7717/peerj-cs.1569 article EN cc-by PeerJ Computer Science 2023-09-22

There are many tricky optimization problems in real life, and metaheuristic algorithms the most effective way to solve at a lower cost. The dung beetle algorithm (DBO) is more innovative proposed 2022, which affected by action of beetles such as ball rolling, foraging, reproduction. Therefore, A based on quasi-oppositional learning Q-learning (QOLDBO). First, quantum state update idea cleverly integrated into increase randomness generated population. And best behavior pattern selected adding...

10.1016/j.aej.2023.09.042 article EN cc-by-nc-nd Alexandria Engineering Journal 2023-09-22

For the wireless sensor networks (WSNs) heterogeneous node deployment optimization problem with obstacles in monitoring area, two new flower pollination algorithms (FPA) are proposed to deploy network. Firstly, an improved algorithm (IFPA) is based on FPA, aiming at shortcomings of convergence speed slow and precision not high enough FPA. The nonlinear factor designed correct scaling Tent chaotic map effectively maintains diversity population late iteration, a greedy crossover strategy...

10.1109/access.2019.2959949 article EN cc-by IEEE Access 2019-01-01

The non-destructive detection of soluble solids content (SSC) in fruit by near-infrared (NIR) spectroscopy has a good application prospect. At present, the portable devices is more common. construction an accurate and stable prediction model key for successful device. In this study, visible (Vis/NIR) spectra Korla fragrant pears were collected commercial measurement Different pretreatment methods used to preprocess raw spectra, partial least squares (PLS) was constructed predict SSC...

10.3389/fpls.2022.938162 article EN cc-by Frontiers in Plant Science 2022-07-06

Offline reinforcement learning (RL), which aims to learn an optimal policy using a previously collected static dataset, is important paradigm of RL. Standard RL methods often perform poorly in this regime due the function approximation errors on out-of-distribution actions. While variety regularization have been proposed mitigate issue, they are constrained by classes with limited expressiveness that can lead highly suboptimal solutions. In paper, we propose representing as diffusion model,...

10.48550/arxiv.2208.06193 preprint EN other-oa arXiv (Cornell University) 2022-01-01

Topology impacts important network performance metrics, including link utilization, throughput and latency, is of central importance to operators. However, due the combinatorial nature topology, it extremely difficult obtain an optimal solution, especially since topology planning in networks also often comes with management-specific constraints. As a result, local optimization hand-tuned heuristic methods from human experts adopted practice. Yet, cannot cover global design space while taking...

10.1109/tcomm.2023.3244239 article EN IEEE Transactions on Communications 2023-02-16

Objectives Hepatic osteodystrophy (HOD) is an important public health issue that severely affects human health. The pathogenesis of HOD complex, and exposure to environmental pollutants plays role. Di-(2-ethylhexyl) phthalate (DEHP) a persistent endocrine toxicant present in many products, the liver target organ for its toxic effects. Our research aimed investigate effects DEHP on HOD, reveal underlying mechanisms potential key preventive approaches. Methods daily intake EDI bone density...

10.3389/fimmu.2025.1552150 article EN cc-by Frontiers in Immunology 2025-03-10

It is feasible and safe to use unmanned aerial vehicle (UAV) as the data collection platform of Internet things (IoT). In order save energy loss make UAV perform work effectively, it necessary optimize deployment UAV. The objective problem minimize sum lost transmission devices. key solving calculate location docking points number when working collect data. This paper proposes a coding scheme based on swarm intelligence optimization, which encapsulates position into dimension, so be...

10.1109/access.2020.3025409 article EN cc-by IEEE Access 2020-01-01

Cutting-edge embedded system applications, such as self-driving cars and unmanned drone software, are reliant on integrated CPU/GPU platforms for their DNNs-driven workload, perception other highly parallel components. In this work, we set out to explore the hidden performance implication of GPU memory management methods architecture. Through a series experiments micro-benchmarks real-world workloads, find that under different may vary according application characteristics. Based...

10.1109/rtas48715.2020.00007 article EN 2020-04-01

Lifetime is a vital performance metric for wireless sensor networks (WSNs), with current hierarchical routing protocols suffering from the premature death of overloaded nodes, affecting network's lifetime. Spurred by this problem, we propose low-energy first electoral multipath alternating multihop (LEMH) scheme. To avoid overloading these are given contention radius that adaptively changes topology and affords nodes to combine remaining energy vote those participating in cluster heads...

10.1109/jsen.2022.3191321 article EN IEEE Sensors Journal 2022-07-21

Phycobilisomes and chlorophyll-a (Chla) play important roles in the photosynthetic physiology of red macroalgae serve as primary light-harvesting antennae reaction center for photosystem II. Neopyropia is an economically macroalga widely cultivated East Asian countries. The contents ratios 3 main phycobiliproteins Chla are visible traits to evaluate its commercial quality. traditional analytical methods used measuring these components have several limitations. Therefore, a high-throughput,...

10.34133/plantphenomics.0012 article EN cc-by Plant Phenomics 2023-01-01

The combination of deep learning and intrusion detection has become a hot topic in today’s network security. In the face massive, high-dimensional traffic with uneven sample distribution, how to be able accurately detect anomalous is primary task detection. Most research on systems based focused supervised learning; however, process obtaining labeled data often requires lot time effort, as well support experts. Therefore, it worthwhile investigating development label-free self-supervised...

10.1155/2021/9486949 article EN cc-by Security and Communication Networks 2021-10-28
Coming Soon ...