default search action
Hongfei Zhu
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j22]Hongfei Zhu, Lianhe Yang, Zhongzhi Han:
Quantitative aflatoxin B1 detection and mining key wavelengths based on deep learning and hyperspectral imaging in subpixel level. Comput. Electron. Agric. 206: 107561 (2023) - [j21]Hongfei Zhu, Zhiwei Cao, Yuping Zhao, Dou Li, Yanjun Yang:
Fast list decoders for polarization-adjusted convolutional (PAC) codes. IET Commun. 17(7): 842-851 (2023) - [j20]Hongfei Zhu, Jinhai Liu, Zhigang Zhang, Shuo Zhang, Fuming Qu, Xiuchong Liu:
H∞ Consensus of multi-agent systems under hybrid cyber attacks via a sampled-data-based dynamic event-triggered resilient consensus protocol. J. Frankl. Inst. 360(13): 9924-9949 (2023) - [j19]Hongfei Zhu, Jinhai Liu, Zhigang Zhang, Shuo Zhang, Fuming Qu:
Consensus Control of Multiagent Systems Under Switching Topology and Denial-of-Service Attacks. IEEE Syst. J. 17(4): 5911-5919 (2023) - [c8]Liqi Zhang, Lianhe Yang, Yinhao Bai, Hongfei Zhu, Xingyu Liu:
R-TES: Regularized Template Style for Generative Joint Relational Triple Extraction. MLNLP 2023: 21-26 - 2022
- [j18]Yanjuan Ma, Jinhai Liu, Fuming Qu, Hongfei Zhu:
Evolved fuzzy min-max neural network for new-labeled data classification. Appl. Intell. 52(1): 305-320 (2022) - [j17]Zequn Niu, Jingfeng Xue, Dacheng Qu, Yong Wang, Jun Zheng, Hongfei Zhu:
A novel approach based on adaptive online analysis of encrypted traffic for identifying Malware in IIoT. Inf. Sci. 601: 162-174 (2022) - [j16]Zhigang Zhang, Jinhai Liu, Hongfei Zhu, Shuo Zhang, Xiuchong Liu, Xue Yu:
Co-design of output-based security control and dynamic event-triggered mechanism for NCSs under hybrid cyber attacks. J. Frankl. Inst. 359(11): 5533-5558 (2022) - [j15]Dawei Dai, Zhiguo Zhuang, Jianchao Wei, Shuyin Xia, Yutang Li, Hongfei Zhu:
Random Sharing Parameters in the Global Region of Convolutional Neural Network. IEEE Trans. Artif. Intell. 3(5): 738-748 (2022) - 2021
- [j14]Hongfei Zhu, Lianhe Yang, Jianwu Fei, Longgang Zhao, Zhongzhi Han:
Recognition of carrot appearance quality based on deep feature and support vector machine. Comput. Electron. Agric. 186: 106185 (2021) - [j13]Hongfei Zhu, Ye Wang, Chonghua Wang, Xiaochun Cheng:
An efficient identity-based proxy signcryption using lattice. Future Gener. Comput. Syst. 117: 321-327 (2021) - [j12]Zhiwei Cao, Hongfei Zhu, Yuping Zhao, Dou Li:
Nonuniform Quantized Decoder for Polar Codes With Minimum Distortion Quantizer. IEEE Commun. Lett. 25(3): 835-839 (2021) - [j11]Hongfei Zhu, Pengxin Guan, Zhiwei Cao, Yuping Zhao:
Rate-compatible systematic polar codes. IET Commun. 15(15): 1930-1940 (2021) - [j10]Fuming Qu, Jinhai Liu, Hongfei Zhu, Huaguang Zhang:
A Data-Driven Interpretable Method Based on Reversely Built FIS and Its Applications in Measurement. IEEE Trans. Instrum. Meas. 70: 1-10 (2021) - [c7]Kunyuan Zhao, Qikun Zhang, Yimeng Wu, Liang Zhu, Hongfei Zhu, Ruifang Wang:
A Security Data Sharing Model for Cloud Network. DMBD (2) 2021: 303-315 - [c6]Shan Jin, Ruodong Duan, Lin Xiao, Hongfei Zhu, Deqi Li, Tianshu Wang:
Based on Brillouin Scattering Photoelectric Research of Oscillator. ICAIT 2021: 16-19 - 2020
- [j9]Fuming Qu, Jinhai Liu, Hongfei Zhu, Dong Zang:
Wind Turbine Condition Monitoring Based on Assembled Multidimensional Membership Functions Using Fuzzy Inference System. IEEE Trans. Ind. Informatics 16(6): 4028-4037 (2020) - [j8]Hongfei Zhu, Zhiwei Cao, Yuping Zhao, Dou Li:
Learning to Denoise and Decode: A Novel Residual Neural Network Decoder for Polar Codes. IEEE Trans. Veh. Technol. 69(8): 8725-8738 (2020) - [c5]Pengxin Guan, Hongkang Yu, Hongfei Zhu, Yuping Zhao:
A Novel Residual Carrier Frequency Offset Estimation Approach for LoRa Systems. ICCCS 2020: 830-834 - [c4]Hongfei Zhu, Zhiwei Cao, Yuping Zhao, Dou Li:
A Novel Neural Network Denoiser for BCH Codes. ICCC 2020: 272-276 - [c3]Zhiwei Cao, Hongfei Zhu, Yuping Zhao, Dou Li:
Learning to Denoise and Decode: A Novel Residual Neural Network Decoder for Polar Codes. VTC Fall 2020: 1-6 - [i3]Zhiwei Cao, Hongfei Zhu, Yuping Zhao, Dou Li:
Nonuniform Quantized Decoder for Polar Codes with Minimum Distortion Quantizer. CoRR abs/2011.07202 (2020) - [i2]Hongfei Zhu, Zhiwei Cao, Yuping Zhao, Dou Li, Yanjun Yang:
Fast List Decoders for Polarization-Adjusted Convolutional (PAC) Codes. CoRR abs/2012.09425 (2020)
2010 – 2019
- 2019
- [j7]Hongfei Zhu, Yuping Zhao:
A Mapping Shortening Algorithm for Polar Codes. IEEE Access 7: 87110-87117 (2019) - [j6]Xiaosong Zhang, Liehuang Zhu, Xianmin Wang, Changyou Zhang, Hongfei Zhu, Yu-an Tan:
A packet-reordering covert channel over VoLTE voice and video traffics. J. Netw. Comput. Appl. 126: 29-38 (2019) - [j5]Xianmin Wang, Yu Zhang, Brij Bhooshan Gupta, Hongfei Zhu, Dongxi Liu:
An Identity-Based Signcryption on Lattice without Trapdoor. J. Univers. Comput. Sci. 25(3): 282-293 (2019) - [i1]Zhiwei Cao, Hongfei Zhu, Yuping Zhao, Dou Li:
Learning to Denoise and Decode: A Novel Residual Neural Network Decoder for Polar Codes. CoRR abs/1908.00460 (2019) - 2018
- [j4]Xiao Yu, Changyou Zhang, Yuan Xue, Hongfei Zhu, Yuanzhang Li, Yu-an Tan:
An extra-parity energy saving data layout for video surveillance. Multim. Tools Appl. 77(4): 4563-4583 (2018) - [j3]Hongfei Zhu, Yu-an Tan, Liehuang Zhu, Xianmin Wang, Quan-Xin Zhang, Yuanzhang Li:
An Identity-Based Anti-Quantum Privacy-Preserving Blind Authentication in Wireless Sensor Networks. Sensors 18(5): 1663 (2018) - [j2]Hongfei Zhu, Yu-an Tan, Liehuang Zhu, Quan-Xin Zhang, Yuanzhang Li:
An Efficient Identity-Based Proxy Blind Signature for Semioffline Services. Wirel. Commun. Mob. Comput. 2018: 5401890:1-5401890:9 (2018) - 2017
- [j1]Hongfei Zhu, Yu-an Tan, Xiaosong Zhang, Liehuang Zhu, Changyou Zhang, Jun Zheng:
A round-optimal lattice-based blind signature scheme for cloud services. Future Gener. Comput. Syst. 73: 106-114 (2017) - [c2]Xiaochun Yang, Hongfei Zhu, Xiaosong Zhang, Aourra Khaled:
A SDIO-Interface Wi-Fi Packet Capture Scheme Based on Android Kernel Extension. CSE/EUC (1) 2017: 842-845
2000 – 2009
- 2006
- [c1]Guobin Sun, Yanling Yao, Hongfei Zhu:
Quality of Service Scheduling for 802.16 Broadband Wireless Access Systems. VTC Spring 2006: 1221-1225
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-20 20:28 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint