default search action
Zihao Shen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j21]Zihao Shen, Yuyang Zhang, Hui Wang, Peiqian Liu, Kun Liu, Yanmei Shen:
BiGRU-DP: Improved differential privacy protection method for trajectory data publishing. Expert Syst. Appl. 252: 124264 (2024) - [j20]Peiqian Liu, Duoduo Wu, Zihao Shen, Hui Wang, Kun Liu:
Personalized trajectory privacy data publishing scheme based on differential privacy. Internet Things 25: 101074 (2024) - [j19]Zijing Tian, Yan Dai, Feng Hu, Zihao Shen, Hongling Xu, Hongwen Zhang, Jinhang Xu, Yuting Hu, Yanyan Diao, Honglin Li:
Enhancing Chemical Reaction Monitoring with a Deep Learning Model for NMR Spectra Image Matching to Target Compounds. J. Chem. Inf. Model. 64(14): 5624-5633 (2024) - [j18]Zihao Shen, Yuanjie Wang, Hui Wang, Peiqian Liu, Kun Liu, Jun Zhang:
Trust Mechanism Privacy Protection Scheme Combining Blockchain and Multi-Party Evaluation. IEEE Trans. Intell. Veh. 9(2): 3885-3894 (2024) - [j17]Zihao Shen, Fei Ren, Hui Wang, Peiqian Liu, Kun Liu, Jun Zhang:
Combining blockchain and crowd-sensing for location privacy protection in Internet of vehicles. Veh. Commun. 45: 100724 (2024) - [j16]Zihao Shen, Yuanjie Wang, Hui Wang, Peiqian Liu, Kun Liu, Mengke Liu:
Privacy-protecting predictive cache method based on blockchain and machine learning in Internet of vehicles. Veh. Commun. 47: 100771 (2024) - 2023
- [j15]Yanyan Diao, Feng Hu, Zihao Shen, Honglin Li:
MacFrag: segmenting large-scale molecules to obtain diverse fragments with high qualities. Bioinform. 39(1) (2023) - [j14]Peiqian Liu, Duoduo Wu, Zihao Shen, Hui Wang:
Trajectory privacy data publishing scheme based on local optimisation and R-tree. Connect. Sci. 35(1) (2023) - [j13]Hui Wang, Shangqing Cai, Peiqian Liu, Jingyi Zhang, Zihao Shen, Kun Liu:
DP-STGAT: Traffic statistics publishing with differential privacy and a spatial-temporal graph attention network. Inf. Sci. 623: 258-274 (2023) - [j12]Zihao Shen, Shuhan He, Hui Wang, Peiqian Liu, Kun Liu, Fangfang Lian:
A Differential Privacy Budget Allocation Method Combining Privacy Security Level. J. Commun. Inf. Networks 8(1): 90-98 (2023) - [j11]Peiqian Liu, Shangchen Xie, Zihao Shen, Hui Wang:
Learning-based small cell base station selection scheme involving location privacy in service migration. J. Reliab. Intell. Environ. 9(4): 433-445 (2023) - 2022
- [j10]Ziyan Feng, Zihao Shen, Honglin Li, Shiliang Li:
e-TSN: an interactive visual exploration platform for target-disease knowledge mapping from literature. Briefings Bioinform. 23(6) (2022) - [j9]Jie Wang, Zihao Shen, Yichen Liao, Zhen Yuan, Shiliang Li, Gaoqi He, Man Lan, Xuhong Qian, Kai Zhang, Honglin Li:
Multi-modal chemical information reconstruction from images and texts for exploring the near-drug space. Briefings Bioinform. 23(6) (2022) - [j8]Peiqian Liu, Shangchen Xie, Zihao Shen, Hui Wang:
Enhancing Location Privacy through P2P Network and Caching in Anonymizer. KSII Trans. Internet Inf. Syst. 16(5): 1653-1670 (2022) - [j7]Jianhua Li, Guanlong Liu, Zhiyuan Zhen, Zihao Shen, Shiliang Li, Honglin Li:
Molecular Docking for Ligand-Receptor Binding Process Based on Heterogeneous Computing. Sci. Program. 2022: 9197606:1-9197606:13 (2022) - 2021
- [j6]Hui Wang, Chengjie Wang, Zihao Shen, Kun Liu, Peiqian Liu, Dengwei Lin:
A MADM Location Privacy Protection Method Based on Blockchain. IEEE Access 9: 27802-27812 (2021) - [j5]Zihao Shen, Wei Zhen, Pengfei Li, Hui Wang, Kun Liu, Peiqian Liu:
KPDR : An Effective Method of Privacy Protection. Complex. 2021: 6674639:1-6674639:10 (2021) - [j4]Zihao Shen, Hui Wang, Kun Liu, Peiqian Liu, Menglong Ba, Mengyao Zhao:
RP-NBSR: A Novel Network Attack Detection Model Based on Machine Learning. Comput. Syst. Sci. Eng. 37(1): 121-133 (2021) - [j3]Hui Wang, Chuanhan Zhu, Zihao Shen, Dengwei Lin, Kun Liu, Mengyao Zhao:
A Network Security Risk Assessment Method Based on a B_NAG Model. Comput. Syst. Sci. Eng. 38(1): 103-117 (2021) - 2020
- [j2]Hui Wang, Chengjie Wang, Zihao Shen, Dengwei Lin:
IKPCA-ELM-based Intrusion Detection Method. KSII Trans. Internet Inf. Syst. 14(7): 3076-3092 (2020)
2010 – 2019
- 2019
- [c3]Wenju Li, Zihao Shen, Peigang Li:
Crack Detection of Track Plate Based on YOLO. ISCID (2) 2019: 15-18 - 2018
- [c2]Wenju Li, Meng Zhang, Zihao Shen, Wenkang Hu, Peigang Li:
Track Crack Detection Method in Complex Environment. ISCID (1) 2018: 356-359 - 2014
- [j1]Zihao Shen, Shufen Liu:
A Rule-based Attacks Detection Method for Wireless Sensor Networks. Int. J. Online Eng. 10(1): 33-36 (2014)
2000 – 2009
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint