
Hongsong Zhu
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j20]Zuoguang Wang
, Limin Sun, Hongsong Zhu:
Defining Social Engineering in Cybersecurity. IEEE Access 8: 85094-85115 (2020) - [c34]Yucheng Wang, Bowen Yu, Yueyang Zhang, Tingwen Liu, Hongsong Zhu, Limin Sun:
TPLinker: Single-stage Joint Extraction of Entities and Relations Through Token Pair Linking. COLING 2020: 1572-1582 - [c33]Liting Deng, Hui Wen, Mingfeng Xin, Yue Sun, Limin Sun, Hongsong Zhu:
Malware Classification Using Attention-Based Transductive Learning Network. SecureComm (2) 2020: 403-418 - [c32]Zhaoteng Yan, Nan Yu, Hui Wen, Zhi Li, Hongsong Zhu, Limin Sun:
Detecting Internet-Scale NATs for IoT Devices Based on Tri-Net. WASA (1) 2020: 602-614 - [c31]Zhihui Zhao, Weizhong Wang, Hongsong Zhu, Hong Li, Limin Sun, Sen Zhao, Yan Hu:
EdgeCC: An Authentication Framework for the Fast Migration of Edge Services Under Mobile Clients. WASA (1) 2020: 755-767 - [i2]Yucheng Wang, Hongsong Zhu, Jinfa Wang, Jie Liu, Yong Wang, Limin Sun:
XLBoost-Geo: An IP Geolocation System Based on Extreme Landmark Boosting. CoRR abs/2010.13396 (2020) - [i1]Yucheng Wang, Bowen Yu, Yueyang Zhang, Tingwen Liu, Hongsong Zhu, Limin Sun:
TPLinker: Single-stage Joint Extraction of Entities and Relations Through Token Pair Linking. CoRR abs/2010.13415 (2020)
2010 – 2019
- 2019
- [j19]Zhihao Wang, Hong Li, Qiang Li, Wei Li, Hongsong Zhu, Limin Sun:
Towards IP geolocation with intermediate routers based on topology discovery. Cybersecur. 2(1): 13 (2019) - [c30]Zhaoteng Yan, Shichao Lv, Yueyang Zhang, Hongsong Zhu, Limin Sun:
Remote Fingerprinting on Internet-Wide Printers Based on Neural Network. GLOBECOM 2019: 1-6 - [c29]Ke Li, Hong Li, Hongsong Zhu, Limin Sun, Hui Wen:
Side-Channel Information Leakage of Traffic Data in Instant Messaging. IPCCC 2019: 1-8 - [c28]Yaowen Zheng, Zhanwei Song, Yuyan Sun, Kai Cheng, Hongsong Zhu, Limin Sun:
An Efficient Greybox Fuzzing Scheme for Linux-based IoT Programs Through Binary Static Analysis. IPCCC 2019: 1-8 - [c27]Xuan Feng, Xiaojing Liao, XiaoFeng Wang, Haining Wang, Qiang Li, Kai Yang, Hongsong Zhu, Limin Sun:
Understanding and Securing Device Vulnerabilities through Automated Bug Report Analysis. USENIX Security Symposium 2019: 887-903 - [c26]Yaowen Zheng, Ali Davanian, Heng Yin, Chengyu Song, Hongsong Zhu, Limin Sun:
FIRM-AFL: High-Throughput Greybox Fuzzing of IoT Firmware via Augmented Process Emulation. USENIX Security Symposium 2019: 1099-1114 - [c25]Yucheng Wang, Xu Wang, Hongsong Zhu, Hai Zhao, Hong Li, Limin Sun:
ONE-Geo: Client-Independent IP Geolocation Based on Owner Name Extraction. WASA 2019: 346-357 - [c24]Hui Wen, Weidong Zhang, Yan Hu, Qing Hu, Hongsong Zhu, Limin Sun:
Lightweight IoT Malware Visualization Analysis via Two-Bits Networks. WASA 2019: 613-621 - [c23]Xu Wang, Yucheng Wang, Xuan Feng, Hongsong Zhu, Limin Sun, Yuchi Zou:
IoTTracker: An Enhanced Engine for Discovering Internet-of-Thing Devices. WOWMOM 2019: 1-9 - 2018
- [j18]Jinfa Wang
, Hai Zhao, Jiu-Qiang Xu, Hequn Li, Hongsong Zhu, Shuai Chao, Chunyang Zheng:
Using Intuitionistic Fuzzy Set for Anomaly Detection of Network Traffic From Flow Interaction. IEEE Access 6: 64801-64816 (2018) - [c22]Weidong Zhang, Hong Li, Hui Wen, Hongsong Zhu, Limin Sun:
A graph neural network based efficient firmware information extraction method for IoT devices. IPCCC 2018: 1-8 - [c21]Feng Yi, Libo Yin, Hui Wen, Hongsong Zhu, Limin Sun, Gang Li:
Mining Human Periodic Behaviors Using Mobility Intention and Relative Entropy. PAKDD (1) 2018: 488-499 - [c20]Ke Li, Hui Wen, Hong Li, Hongsong Zhu, Limin Sun:
Security OSIF: Toward Automatic Discovery and Analysis of Event Based Cyber Threat Intelligence. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 741-747 - 2017
- [j17]Hongtao Wang, Hui Wen, Feng Yi, Hongsong Zhu, Limin Sun:
Road Traffic Anomaly Detection via Collaborative Path Inference from GPS Snippets. Sensors 17(3): 550 (2017) - 2016
- [j16]Shiming Ge
, Rui Yang, Yuqing He, Kaixuan Xie, Hongsong Zhu, Shuixian Chen:
Learning multi-channel correlation filter bank for eye localization. Neurocomputing 173: 418-424 (2016) - [c19]Xuan Feng, Qiang Li
, Qi Han, Hongsong Zhu, Yan Liu, Limin Sun:
Identification of visible industrial control devices at Internet scale. ICC 2016: 1-6 - [c18]Xuan Feng, Qiang Li
, Qi Han, Hongsong Zhu, Yan Liu, Jie Cui, Limin Sun:
Active Profiling of Physical Devices at Internet Scale. ICCCN 2016: 1-9 - [c17]Yaowen Zheng, Kai Cheng, Zhi Li, Shiran Pan, Hongsong Zhu, Limin Sun:
A Lightweight Method for Accelerating Discovery of Taint-Style Vulnerabilities in Embedded Systems. ICICS 2016: 27-36 - 2015
- [j15]Hong Li, Yunhua He, Xiuzhen Cheng, Hongsong Zhu, Limin Sun:
Security and privacy in localization for underwater sensor networks. IEEE Commun. Mag. 53(11): 56-62 (2015) - [j14]Yongle Chen
, Wei Liu, Yongping Xiong, Jing Duan, Zhi Li, Hongsong Zhu:
A Fuzzy Similarity Elimination Algorithm for Indoor Fingerprint Positioning. Int. J. Distributed Sens. Networks 11: 753191:1-753191:10 (2015) - [j13]Hong Yang, Hongsong Zhu, Limin Sun:
B-RPL: 低存储开销的RPL路由协议 (B-RPL: Low Memory Cost RPL Routing Protocol). 计算机科学 42(1): 96-100 (2015) - [j12]Liqun Li, Limin Sun, Guoliang Xing, Wei Huangfu, Ruogu Zhou, Hongsong Zhu:
ROCS: Exploiting FM Radio Data System for Clock Calibration in Sensor Networks. IEEE Trans. Mob. Comput. 14(10): 2130-2144 (2015) - [j11]Zhi Li, Yan Liu, Hongsong Zhu, Limin Sun:
Coff: Contact-Duration-Aware Cellular Traffic Offloading Over Delay Tolerant Networks. IEEE Trans. Veh. Technol. 64(11): 5257-5268 (2015) - [c16]Yuyan Sun, Hongsong Zhu, Yong Liao, Limin Sun:
Vehicle Anomaly Detection Based on Trajectory Data of ANPR System. GLOBECOM 2015: 1-6 - [c15]Yongming Jin, Hongsong Zhu, Zhiqiang Shi, Xiang Lu, Limin Sun:
Cryptanalysis and improvement of two RFID-OT protocols based on quadratic residues. ICC 2015: 7234-7239 - [c14]Ying Chen, Changying Li, Jiguo Yu
, Hongsong Zhu, Yuyan Sun:
k-Perimeter Coverage Evaluation and Deployment in Wireless Sensor Networks. WASA 2015: 50-59 - 2014
- [j10]Wei Liu, Hong Li, Yongle Chen, Hongsong Zhu, Limin Sun:
LARES: latency-reduced neighbour discovery for contagious diseases prevention. Int. J. Ad Hoc Ubiquitous Comput. 16(1): 3-13 (2014) - [j9]Wei Liu, Yongle Chen, Yongping Xiong, Limin Sun, Hongsong Zhu:
Optimization of Sampling Cell Size for Fingerprint Positioning. Int. J. Distributed Sens. Networks 10 (2014) - [j8]Di Wu, He Liu, Yingrong Bi, Hongsong Zhu:
Evolutionary Game Theoretic Modeling and Repetition of Media Distributed Shared in P2P-Based VANET. Int. J. Distributed Sens. Networks 10 (2014) - [c13]Shanyan Gao, Hongsong Zhu, Xinyun Zhou, Yan Liu, Limin Sun:
Design and Implementation of Smart Home Linkage System Based on OSGI and REST Architecture. CWSN 2014: 568-582 - [c12]Yuyan Sun, Hongsong Zhu, Xinyun Zhou, Limin Sun:
VAPA: Vehicle Activity Patterns Analysis based on Automatic Number Plate Recognition System Data. ITQM 2014: 48-57 - 2013
- [j7]Yongle Chen, Ci Chen, Hongsong Zhu, Limin Sun:
Efficient Deterministic Anchor Deployment for Sensor Network Positioning. Int. J. Distributed Sens. Networks 9 (2013) - [j6]Di Wu
, Yan Ling
, Hongsong Zhu, Jie Liang
:
The RSU Access Problem Based on Evolutionary Game Theory for VANET. Int. J. Distributed Sens. Networks 9 (2013) - [j5]Chaonong Xu, Yongjun Xu, Xinrong Li, Hongsong Zhu, Guangjie Han
:
Distributed Middleware of Large-Scale Wireless Networks. Int. J. Distributed Sens. Networks 9 (2013) - [c11]Weijun Qin, Hongsong Zhu, Jiadi Zhang, Bo Li:
Mo-Fi: Discovering Human Presence Activity with Smartphones using Non-intrusive Wi-Fi Monitors. GreenCom/iThings/CPScom 2013: 2241-2242 - [c10]Weijun Qin, Jiadi Zhang, Bo Li, Hongsong Zhu, Yuyan Sun:
Mo-Fi: Discovering Human Presence Activity with Smartphones Using Non-intrusive Wi-Fi Sniffers. HPCC/EUC 2013: 2143-2150 - [c9]Ke Wang, Weidong Yang, Pan Li, Hongsong Zhu:
A decentralized adaptive TDMA scheduling strategy for VANET. WCNC Workshops 2013: 216-221 - 2012
- [j4]Hongsong Zhu, Xinrong Li, Yongjun Xu, Xiaowei Li, Yan Liu:
An energy-efficient link quality monitoring scheme for wireless networks. Wirel. Commun. Mob. Comput. 12(4): 333-344 (2012) - [c8]Xi Chen, Limin Sun, Hongsong Zhu, Yan Zhen, Hongbin Chen:
Application of Internet of Things in Power-Line Monitoring. CyberC 2012: 423-426 - [c7]Wei Liu, Limin Sun, Yunhuai Liu, Hongsong Zhu, Ziguo Zhong, Tian He:
Exploiting ephemeral link correlation for mobile wireless networks. SenSys 2012: 239-252 - 2011
- [j3]Zhulin An, Hongsong Zhu, Xinrong Li, Chaonong Xu, Yongjun Xu, Xiaowei Li:
Nonidentical Linear Pulse-Coupled Oscillators Model With Application to Time Synchronization in Wireless Sensor Networks. IEEE Trans. Ind. Electron. 58(6): 2205-2215 (2011) - [c6]Weijun Qin, Qiang Li, Limin Sun, Hongsong Zhu, Yan Liu:
RestThing: A Restful Web Service Infrastructure for Mash-Up Physical and Web Resources. EUC 2011: 197-204 - [c5]Liqun Li, Guoliang Xing, Limin Sun, Wei Huangfu, Ruogu Zhou, Hongsong Zhu:
Exploiting FM radio data system for adaptive clock calibration in sensor networks. MobiSys 2011: 169-182 - [c4]Liqun Li, Guoliang Xing, Limin Sun, Wei Huangfu, Ruogu Zhou, Hongsong Zhu:
Demo: a sensor network time synchronization protocol based on fm radio data system. MobiSys 2011: 367-368 - 2010
- [j2]Zhulin An, Hongsong Zhu, Meilin Zhang, Chaonong Xu, Yongjun Xu, Xiaowei Li:
Linear Pulse-Coupled Oscillators Model¬ - A New Approach for Time Synchronization in Wireless Sensor Networks. Wirel. Sens. Netw. 2(2): 108-114 (2010) - [c3]Weidong Yang, Ji-Zhao Liu, Hongsong Zhu:
A mobility model based on traffic flow theory for Vehicular Delay Tolerant Network. BIC-TA 2010: 1071-1075
2000 – 2009
- 2008
- [j1]Limin Sun, Hongsong Zhu, Bin Duan, Xiaowei Li, Yi Sun:
Analysis of Forwarding Mechanisms on Fine-Grain Gradient Sinking Model in WSN. J. Signal Process. Syst. 51(2): 145-159 (2008) - 2006
- [c2]Lei Xie, Hongsong Zhu, Yongjun Xu, Yuefei Zhu:
A Tamper-resistance Key Pre-distribution Scheme for Wireless Sensor Networks. GCC Workshops 2006: 437-443 - 2005
- [c1]Tingxin Yan, Yanzhong Bi, Limin Sun, Hongsong Zhu:
Probability Based Dynamic Load-Balancing Tree Algorithm for Wireless Sensor Networks. ICCNMC 2005: 682-691
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2021-01-10 01:47 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint