Seguir
Hongsong Zhu
Título
Citado por
Citado por
Año
Wireless sensor networks
S Limin, L Jianzhong, C Yu, Z Hongsong
Beijing: Tsinghua University Press 5, 7-8, 2005
4172005
TPLinker: Single-stage joint extraction of entities and relations through token pair linking
Y Wang, B Yu, Y Zhang, T Liu, H Zhu, L Sun
arXiv preprint arXiv:2010.13415, 2020
2852020
{FIRM-AFL}:{High-Throughput} greybox fuzzing of {IoT} firmware via augmented process emulation
Y Zheng, A Davanian, H Yin, C Song, H Zhu, L Sun
28th USENIX Security Symposium (USENIX Security 19), 1099-1114, 2019
2752019
Social engineering in cybersecurity: Effect mechanisms, human vulnerabilities and attack methods
Z Wang, H Zhu, L Sun
Ieee Access 9, 11895-11910, 2021
1102021
Defining social engineering in cybersecurity
Z Wang, L Sun, H Zhu
IEEE Access 8, 85094-85115, 2020
1042020
Security and privacy in localization for underwater sensor networks
H Li, Y He, X Cheng, H Zhu, L Sun
IEEE Communications Magazine 53 (11), 56-62, 2015
912015
Application of internet of things in power-line monitoring
X Chen, L Sun, H Zhu, Y Zhen, H Chen
2012 International conference on cyber-enabled distributed computing and …, 2012
792012
Exploiting FM radio data system for adaptive clock calibration in sensor networks
L Li, G Xing, L Sun, W Huangfu, R Zhou, H Zhu
Proceedings of the 9th international conference on Mobile systems …, 2011
622011
Nonidentical linear pulse-coupled oscillators model with application to time synchronization in wireless sensor networks
Z An, H Zhu, X Li, C Xu, Y Xu, X Li
IEEE Transactions on Industrial Electronics 58 (6), 2205-2215, 2009
592009
Understanding and securing device vulnerabilities through automated bug report analysis
X Feng, X Liao, X Wang, H Wang, Q Li, K Yang, H Zhu, L Sun
SEC'19: Proceedings of the 28th USENIX Conference on Security Symposium, 2019
542019
Asteria: Deep learning-based AST-encoding for cross-platform binary code similarity detection
S Yang, L Cheng, Y Zeng, Z Lang, H Zhu, Z Shi
2021 51st Annual IEEE/IFIP International Conference on Dependable Systems …, 2021
522021
Adaptive TDMA slot assignment protocol for vehicular ad-hoc networks
W YANG, LI Pan, H ZHU
The Journal of China Universities of Posts and Telecommunications 20 (1), 11-25, 2013
512013
RestThing: A Restful Web service infrastructure for mash-up physical and Web resources
W Qin, Q Li, L Sun, H Zhu, Y Liu
2011 IFIP 9th International Conference on Embedded and Ubiquitous Computing …, 2011
482011
Social engineering in cybersecurity: a domain ontology and knowledge graph application examples
Z Wang, H Zhu, P Liu, L Sun
Cybersecurity 4, 1-21, 2021
452021
Coff: Contact-duration-aware cellular traffic offloading over delay tolerant networks
Z Li, Y Liu, H Zhu, L Sun
IEEE Transactions on Vehicular Technology 64 (11), 5257-5268, 2014
402014
Discontinuous named entity recognition as maximal clique discovery
Y Wang, B Yu, H Zhu, T Liu, N Yu, L Sun
arXiv preprint arXiv:2106.00218, 2021
392021
Probability based dynamic load-balancing tree algorithm for wireless sensor networks
T Yan, Y Bi, L Sun, H Zhu
International Conference on Networking and Mobile Computing, 682-691, 2005
342005
A decentralized adaptive tdma scheduling strategy for vanet
W Ke, Y Weidong, L Pan, Z Hongsong
2013 IEEE Wireless Communications and Networking Conference Workshops (WCNCW …, 2013
272013
Security OSIF: Toward automatic discovery and analysis of event based cyber threat intelligence
K Li, H Wen, H Li, H Zhu, L Sun
2018 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced …, 2018
262018
Efficient greybox fuzzing of applications in Linux-based IoT devices via enhanced user-mode emulation
Y Zheng, Y Li, C Zhang, H Zhu, Y Liu, L Sun
Proceedings of the 31st ACM SIGSOFT International Symposium on Software …, 2022
232022
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20