


default search action
Zhitao He
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Zhitao He 0001
— Hong Kong University of Science and Technology (and 1 more)
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[j10]Zhitao He
, Yongyi Chen
, Yang Zhao
, Dan Zhang
, Andong Liu
, Hui Zhang
:
TSAN: A New Deep Learning-Based Detection Method for Sensor Anomaly in Mobile Robots. IEEE Trans. Ind. Electron. 72(4): 4166-4174 (2025)- 2024
[j9]Shuwen Liang
, Zhitao He
:
Automated Test Case Generation for Path Coverage by Using Multi-Objective Particle Swarm Optimization Algorithm with Reinforcement Learning and Relationship Matrix Strategies. Int. J. Softw. Eng. Knowl. Eng. 34(8): 1221-1249 (2024)
[c24]Jiaxin Wang, Zhitao He:
AFLGo_D: A Novel Power Schedule Scheme Considering Multiple Factors Dynamically for Directed Fuzzing. APSEC 2024: 517-518
[c23]Ankang Chen, Zhitao He, Dan Zhang:
An Anomaly Detection Model for CAN Networks Based on CNN and Transformer. IECON 2024: 1-6- 2023
[j8]Zhitao He, Yongyi Chen, Dan Zhang, Wutao Yin, Hamid Reza Karimi:
A new intelligent ECG recognition approach based on CNN and improved ALO-SVM. Signal Image Video Process. 17(4): 965-972 (2023)
[j7]Zhitao He, Yongyi Chen
, Hui Zhang
, Dan Zhang
:
WKN-OC: A New Deep Learning Method for Anomaly Detection in Intelligent Vehicles. IEEE Trans. Intell. Veh. 8(3): 2162-2172 (2023)
[c22]Zhitao He, Yongyi Chen, Dan Zhang, Mohammed Abdulaal:
Vehicle Anomaly Detection by Attention-Enhanced Temporal Convolutional Network. ICPS 2023: 1-6- 2021
[j6]Jun Wang
, Xiaohang Liu
, Zhitao He
, Yadan Zhang
, Song Gao
:
An Improved Triggering Updating Method of Interest Message with Adaptive Threshold Determination for Directed Diffusion Routing Protocol. J. Sensors 2021: 8814839:1-8814839:15 (2021)
[c21]John Kanwar, Niclas Finne, Nicolas Tsiftes, Joakim Eriksson, Thiemo Voigt, Zhitao He, Christer Åhlund, Saguna Saguna
:
JamSense: Interference and Jamming Classification for Low-power Wireless Networks. WMNC 2021: 9-16- 2020
[j5]Xin Jin, Kaixuan Zhao, Jiangtao Ji, Zhaomei Qiu, Zhitao He, Hao Ma:
Design and experiment of intelligent monitoring system for vegetable fertilizing and sowing. J. Supercomput. 76(5): 3338-3354 (2020)
[j4]Jun Wang
, Zhuangzhuang Du
, Zhitao He:
Quantitative Invulnerability Analysis of Artificial Spider-Web Topology Model Based on End-to-End Delay. Wirel. Commun. Mob. Comput. 2020: 4617239:1-4617239:11 (2020)
2010 – 2019
- 2019
[c20]Zhitao He, Martin Furuhed, Shahid Raza
:
Indraj: digital certificate enrollment for battery-powered wireless devices. WiSec 2019: 117-127- 2017
[j3]Shahid Raza
, Prasant Misra, Zhitao He, Thiemo Voigt:
Building the Internet of Things with bluetooth smart. Ad Hoc Networks 57: 19-31 (2017)
[c19]Xiuming Liu, Abdul Rahman Khankan, Mohamad Alsioufi, Zhitao He, Edith C. H. Ngai:
Poster: Cloud-Based Data Fusion in GreenIoT for Smart Cities. EWSN 2017: 216-217- 2016
[c18]Zhitao He, Kasun Hewage, Thiemo Voigt:
Arpeggio: A Penetration Attack on Glossy Networks. SECON 2016: 1-9- 2015
[j2]Zhitao He, Chao Liu, Haihua Yan:
Software testing evolution process model and growth of software testing quality. Sci. China Inf. Sci. 58(3): 1-6 (2015)
[c17]Shahid Raza
, Prasant Misra, Zhitao He, Thiemo Voigt:
Bluetooth smart: An enabling technology for the Internet of Things. WiMob 2015: 155-162- 2013
[c16]Zhitao He, Thiemo Voigt:
Droplet: A New Denial-of-Service Attack on Low Power Wireless Sensor Networks. MASS 2013: 542-550- 2012
[j1]Zhitao He, Thiemo Voigt:
Zooming into radio events by bus snooping. SIGBED Rev. 9(3): 21-23 (2012)- 2011
[c15]Zhitao He, Thiemo Voigt:
Precise packet loss pattern generation by intentional interference. DCOSS 2011: 1-6
[c14]Wolf-Bastian Pöttner, Lars C. Wolf, José Cecílio
, Pedro Furtado
, Ricardo M. Silva, Jorge Sá Silva
, Amâncio Santos
, Paulo Gil
, Alberto Cardoso
, Zinon Zinonos
, Jose Manuel do Ó, Ben McCarthy, James Brown, Utz Roedig, Tony O'Donovan, Cormac J. Sreenan, Zhitao He, Thiemo Voigt, Anja Jugel:
WSN evaluation in industrial environments first results and lessons learned. DCOSS 2011: 1-8
[c13]Yian Qin, Zhitao He, Thiemo Voigt:
Towards accurate and agile link quality estimation in wireless sensor networks. Med-Hoc-Net 2011: 179-185- 2010
[c12]Tony O'Donovan, Nicolas Tsiftes, Zhitao He, Thiemo Voigt, Cormac J. Sreenan:
Detailed diagnosis of performance anomalies in sensornets. HotEmNets 2010: 9:1-9:5
2000 – 2009
- 2009
[c11]Nicolas Tsiftes, Adam Dunkels, Zhitao He, Thiemo Voigt:
Enabling large-scale storage in sensor networks with the Coffee file system. IPSN 2009: 349-360
[c10]Fredrik Österlind, Adam Dunkels, Zhitao He, Nicolas Tsiftes:
Demo abstract: Sensornet checkpointing between simulated and deployed networks. IPSN 2009: 411-412
[c9]Carlo Alberto Boano, Zhitao He, Yafei Li, Thiemo Voigt, Marco Antonio Zúñiga Zamalloa
, Andreas Willig:
Controllable radio interference for experimental and testing purposes in Wireless Sensor Networks. LCN 2009: 865-872
[c8]Carlo Alberto Boano, James Brown, Zhitao He, Utz Roedig, Thiemo Voigt:
Low-Power Radio Communication in Industrial Outdoor Deployments: The Impact of Weather Conditions and ATEX-Compliance. SENSAPPEAL 2009: 159-176
[c7]Carlo Alberto Boano, Kay Römer
, Zhitao He, Thiemo Voigt, Marco Antonio Zúñiga Zamalloa
, Andreas Willig:
Generation of controllable radio interference for protocol testing in wireless sensor networks. SenSys 2009: 301-302
[i1]Thiemo Voigt, Nicolas Tsiftes, Zhitao He:
Remote Water Monitoring With Sensor Networking Technology. ERCIM News 2009(76) (2009)- 2008
[c6]Zhitao He, Wei Shang, Yubo:
Design a RPR-Based Negotiation Mechanism for E-Marketplaces. CSSE (1) 2008: 184-187- 2007
[c5]Adam Dunkels, Fredrik Österlind, Nicolas Tsiftes, Zhitao He:
Software-based on-line energy estimation for sensor nodes. EmNets 2007: 28-32
[c4]Thiemo Voigt, Fredrik Österlind, Niclas Finne, Nicolas Tsiftes, Zhitao He, Joakim Eriksson, Adam Dunkels, Ulf Bamstedt, Jochen H. Schiller, Klas Hjort:
Sensor Networking in Aquatic Environments - Experiences and New Challenges. LCN 2007: 793-798
[c3]Adam Dunkels, Fredrik Österlind, Zhitao He:
An adaptive communication architecture for wireless sensor networks. SenSys 2007: 335-349
[c2]Adam Dunkels, Fredrik Österlind, Nicolas Tsiftes, Zhitao He:
Software-based sensor node energy estimation. SenSys 2007: 409-410
1990 – 1999
- 1998
[c1]Yi Deng, Zhitao He:
BATOOM: A Practical Approach to Testing Object-Oriented Software. TOOLS (27) 1998: 328-
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-12-17 21:08 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







