default search action
Honglong Chen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j93]Anqing Zhang, Honglong Chen, Xiaomeng Wang, Junjian Li, Yudong Gao, Xingang Wang:
Defending against backdoor attack on deep neural networks based on multi-scale inactivation. Inf. Sci. 690: 121562 (2025) - 2024
- [j92]Vladimir V. Shakhov, Denis A. Migov, Honglong Chen, Polina V. Mishchenko, Insoo Koo:
Toward Reliability of Long Wireless Sensor Networks. IEEE Access 12: 124506-124516 (2024) - [j91]Junjian Li, Honglong Chen, Yudong Gao, Shaozhong Guo, Kai Lin, Yuping Liu, Peng Sun:
BABE: Backdoor attack with bokeh effects via latent separation suppression. Eng. Appl. Artif. Intell. 138: 109462 (2024) - [j90]Xiaolong Liu, Honglong Chen, Yuping Liu, Wentao Wei, Huansheng Xue, Feng Xia:
Multitask Data Collection With Limited Budget in Edge-Assisted Mobile Crowdsensing. IEEE Internet Things J. 11(9): 16845-16858 (2024) - [j89]Guoxin Li, Honglong Chen, Liantao Wu, Xuejian Chi, Junmei Yao, Feng Xia, Jiguo Yu:
Efficient Deployment and Scheduling of Shared VNF Instances in Mobile Edge Computing Networks. IEEE Internet Things J. 11(19): 32259-32271 (2024) - [j88]Zhimin Gao, Honglong Chen, Zhe Li, Bolun Ma:
Multiscale Residual Convolution Neural Network for Seismic Data Denoising. IEEE Geosci. Remote. Sens. Lett. 21: 1-5 (2024) - [j87]Jianyao Yin, Honglong Chen, Junjian Li, Yudong Gao:
Enhanced Coalescence Backdoor Attack Against DNN Based on Pixel Gradient. Neural Process. Lett. 56(2): 114 (2024) - [j86]Huansheng Xue, Honglong Chen, Qiuli Dai, Kai Lin, Junjian Li, Zhe Li:
CSCT: Charging Scheduling for Maximizing Coverage of Targets in WRSNs. IEEE Trans. Comput. Soc. Syst. 11(3): 3049-3059 (2024) - [j85]Honglong Chen, Yudong Gao, Anqing Zhang, Peng Sun, Nan Jiang, Weifeng Liu, Xingang Wang:
Investigating the Backdoor on DNNs Based on Recolorization and Reconstruction: From a Multi-Channel Perspective. IEEE Trans. Inf. Forensics Secur. 19: 6923-6934 (2024) - [j84]Junjian Li, Honglong Chen, Peng Sun, Zhibo Wang, Zhichen Ni, Weifeng Liu:
Call White Black: Enhanced Image-Scaling Attack in Industrial Artificial Intelligence Systems. IEEE Trans. Ind. Informatics 20(4): 6222-6233 (2024) - [j83]Kai Lin, Honglong Chen, Zhe Li, Na Yan, Huansheng Xue, Feng Xia:
Efficiently Identifying Unknown COTS RFID Tags for Intelligent Transportation Systems. IEEE Trans. Intell. Transp. Syst. 25(1): 987-997 (2024) - [j82]Kai Lin, Honglong Chen, Na Yan, Zhichen Ni, Zhibo Wang, Jiguo Yu:
Double Polling-Based Tag Information Collection for Sensor-Augmented RFID Systems. IEEE Trans. Mob. Comput. 23(5): 3496-3509 (2024) - [j81]Huansheng Xue, Honglong Chen, Zhichen Ni, Xiaolong Liu, Feng Xia:
Towards Maximizing Coverage of Targets for WRSNs by Multiple Chargers Scheduling. IEEE Trans. Mob. Comput. 23(10): 9959-9970 (2024) - [j80]Xiaomeng Wang, Honglong Chen, Peng Sun, Junjian Li, Anqing Zhang, Weifeng Liu, Nan Jiang:
AdvST: Generating Unrestricted Adversarial Images via Style Transfer. IEEE Trans. Multim. 26: 4846-4858 (2024) - [j79]Liantao Wu, Peng Sun, Honglong Chen, Yong Zuo, Yong Zhou, Yang Yang:
NOMA-Enabled Multiuser Offloading in Multicell Edge Computing Networks: A Coalition Game Based Approach. IEEE Trans. Netw. Sci. Eng. 11(2): 2170-2181 (2024) - [j78]Kan Yu, Jiguo Yu, Zhiyong Feng, Honglong Chen:
A Reassessment on Applying Protocol Interference Model Under Rayleigh Fading: From Perspective of Link Scheduling. IEEE/ACM Trans. Netw. 32(1): 238-252 (2024) - [j77]Mingliang Hou, Feng Xia, Xin Chen, Vidya Saikrishna, Honglong Chen:
Adaptive Spatio-temporal Graph Learning for Bus Station Profiling. ACM Trans. Spatial Algorithms Syst. 10(3): 25:1-25:23 (2024) - [j76]Xinglong Fan, Honglong Chen, Zhichen Ni, Guoxin Li, Haiyang Sun, Jiguo Yu:
Multi-Agent Collaborative Caching Strategies in Dynamic Heterogeneous D2D Networks. IEEE Trans. Veh. Technol. 73(5): 7204-7217 (2024) - [j75]Xuejian Chi, Honglong Chen, Guoxin Li, Zhichen Ni, Nan Jiang, Feng Xia:
EDSP-Edge: Efficient Dynamic Edge Service Entity Placement for Mobile Virtual Reality Systems. IEEE Trans. Wirel. Commun. 23(4): 2771-2783 (2024) - [c30]Yudong Gao, Honglong Chen, Peng Sun, Junjian Li, Anqing Zhang, Zhibo Wang, Weifeng Liu:
A Dual Stealthy Backdoor: From Both Spatial and Frequency Perspectives. AAAI 2024: 1851-1859 - [c29]Jin Wang, Bingfeng Zhang, Jian Pang, Honglong Chen, Weifeng Liu:
Rethinking Prior Information Generation with CLIP for Few-Shot Segmentation. CVPR 2024: 3941-3951 - [c28]Yudong Gao, Honglong Chen, Peng Sun, Zhe Li, Junjian Li, Huajie Shao:
Energy-based Backdoor Defense without Task-Specific Samples and Model Retraining. ICML 2024 - [c27]Shubin Cai, Honglong Chen, Youyi Huang, Zhong Ming:
ComPAT: A Compiler Principles Course Assistant. KSEM (5) 2024: 74-83 - [i9]Jin Wang, Bingfeng Zhang, Jian Pang, Honglong Chen, Weifeng Liu:
Rethinking Prior Information Generation with CLIP for Few-Shot Segmentation. CoRR abs/2405.08458 (2024) - 2023
- [j74]Na Yan, Honglong Chen, Kai Lin, Zhichen Ni, Zhe Li, Huansheng Xue:
BFSearch: Bloom filter based tag searching for large-scale RFID systems. Ad Hoc Networks 139: 103022 (2023) - [j73]Wentao Wei, Honglong Chen, Xiang Liu, Guoqi Ma, Yuping Liu, Xiaolong Liu:
Towards time-constrained task allocation in semi-opportunistic mobile crowdsensing. Ad Hoc Networks 150: 103282 (2023) - [j72]Guoqi Ma, Honglong Chen, Yang Huang, Wentao Wei, Xiang Liu, Zhibo Wang:
Utility-Based Heterogeneous User Recruitment of Multitask in Mobile Crowdsensing. IEEE Internet Things J. 10(11): 9796-9808 (2023) - [j71]Xinghao Yang, Yupeng Qi, Honglong Chen, Baodi Liu, Weifeng Liu:
Generation-based parallel particle swarm optimization for adversarial text attacks. Inf. Sci. 644: 119237 (2023) - [j70]Yuying Cai, Jinfeng Li, Baodi Liu, Weijia Cao, Honglong Chen, Weifeng Liu:
Shared Dictionary Learning Via Coupled Adaptations for Cross-Domain Classification. Neural Process. Lett. 55(2): 1869-1888 (2023) - [j69]Rongjie Che, Honglong Chen:
Channel State Information Based Indoor Fingerprinting Localization. Sensors 23(13): 5830 (2023) - [j68]Zhe Li, Xiaolong Liu, Yang Huang, Honglong Chen:
Probabilistic Coverage Constraint Task Assignment with Privacy Protection in Vehicular Crowdsensing. Sensors 23(18): 7798 (2023) - [j67]Zhichen Ni, Honglong Chen, Zhe Li, Xiaomeng Wang, Na Yan, Weifeng Liu, Feng Xia:
MSCET: A Multi-Scenario Offloading Schedule for Biomedical Data Processing and Analysis in Cloud-Edge-Terminal Collaborative Vehicular Networks. IEEE ACM Trans. Comput. Biol. Bioinform. 20(4): 2376-2386 (2023) - [j66]Wei Lu, Nan Jiang, Di Jin, Honglong Chen, Ximeng Liu:
Learning Distinct Relationship in Package Recommendation With Graph Attention Networks. IEEE Trans. Comput. Soc. Syst. 10(6): 3308-3320 (2023) - [j65]Zhe Li, Honglong Chen, Zhichen Ni, Xiaogang Deng, Baodi Liu, Weifeng Liu:
ARPCNN: Auxiliary Review-Based Personalized Attentional CNN for Trustworthy Recommendation. IEEE Trans. Ind. Informatics 19(1): 1018-1029 (2023) - [c26]Yaowu Xie, Ting Pan, Baodi Liu, Honglong Chen, Weifeng Liu:
Interpretable Drawing Psychoanalysis via House-Tree-Person Test. AI (2) 2023: 221-233 - [c25]Honglong Chen, Mindong Liu, Jing Huang, Zhiling Zheng, Weihong Huang, Yufeng Xiao:
A Heuristic-based Dynamic Scheduling and Routing Method for Industrial TSN Networks. CSCloud/EdgeCom 2023: 440-445 - [c24]Chen Li, Xinghao Yang, Baodi Liu, Weifeng Liu, Honglong Chen:
Annealing Genetic-based Preposition Substitution for Text Rubbish Example Generation. IJCAI 2023: 5122-5130 - [c23]Jie Wen, Nan Jiang, Jin Li, Ximeng Liu, Honglong Chen, Yanzhi Ren, Zhaohui Yuan, Ziang Tu:
DTrust: Toward Dynamic Trust Levels Assessment in Time-Varying Online Social Networks. INFOCOM 2023: 1-10 - [c22]Junjian Li, Honglong Chen, Yudong Gao, Kai Lin, Yuping Liu:
B³A: Bokeh Based Backdoor Attack with Feature Restrictions. MSN 2023: 677-684 - [i8]Zhe Li, Honglong Chen, Zhichen Ni, Huajie Shao:
Balancing Privacy Protection and Interpretability in Federated Learning. CoRR abs/2302.08044 (2023) - [i7]Yudong Gao, Honglong Chen, Peng Sun, Junjian Li, Anqing Zhang, Zhibo Wang:
A Dual Stealthy Backdoor: From Both Spatial and Frequency Perspectives. CoRR abs/2307.10184 (2023) - 2022
- [j64]Feng Liang, Honglong Chen, Kai Lin, Junjian Li, Zhe Li, Huansheng Xue, Vladimir V. Shakhov, Hannan Bin Liaqat:
Route recommendation based on temporal-spatial metric. Comput. Electr. Eng. 97: 107549 (2022) - [j63]Nan Jiang, Li Gao, Fuxian Duan, Jie Wen, Tao Wan, Honglong Chen:
SAN: Attention-based social aggregation neural networks for recommendation system. Int. J. Intell. Syst. 37(6): 3373-3393 (2022) - [j62]Nan Jiang, Zilin Zeng, Jie Wen, Jie Zhou, Ziyu Liu, Tao Wan, Ximeng Liu, Honglong Chen:
Incorporating multi-interest into recommendation with graph convolution networks. Int. J. Intell. Syst. 37(11): 9192-9212 (2022) - [j61]Xuefei Li, Baodi Liu, Kai Zhang, Honglong Chen, Weijia Cao, Weifeng Liu, Dapeng Tao:
Multi-view learning for hyperspectral image classification: An overview. Neurocomputing 500: 499-517 (2022) - [j60]Yahui Ji, Jiguo Yu, Yan Yao, Kan Yu, Honglong Chen, Shanchao Zheng:
Securing wireless communications from the perspective of physical layer: A survey. Internet Things 19: 100524 (2022) - [j59]Liantao Wu, Zening Liu, Peng Sun, Honglong Chen, Kunlun Wang, Yong Zuo, Yang Yang:
DOT: Decentralized Offloading of Tasks in OFDMA-Based Heterogeneous Computing Networks. IEEE Internet Things J. 9(20): 20071-20082 (2022) - [j58]Nan Jiang, Fuxian Duan, Honglong Chen, Wei Huang, Ximeng Liu:
MAFI: GNN-Based Multiple Aggregators and Feature Interactions Network for Fraud Detection Over Heterogeneous Graph. IEEE Trans. Big Data 8(4): 905-919 (2022) - [j57]Shuo Yu, Feng Xia, Chen Zhang, Haoran Wei, Kathleen Keogh, Honglong Chen:
Familiarity-Based Collaborative Team Recognition in Academic Social Networks. IEEE Trans. Comput. Soc. Syst. 9(5): 1432-1445 (2022) - [j56]Mingliang Hou, Feng Xia, Haoran Gao, Xin Chen, Honglong Chen:
Urban Region Profiling With Spatio-Temporal Graph Neural Networks. IEEE Trans. Comput. Soc. Syst. 9(6): 1736-1747 (2022) - [j55]Zhu Wang, Honglong Chen, Zhe Li, Kai Lin, Nan Jiang, Feng Xia:
VRConvMF: Visual Recurrent Convolutional Matrix Factorization for Movie Recommendation. IEEE Trans. Emerg. Top. Comput. Intell. 6(3): 519-529 (2022) - [j54]Honglong Chen, Xin Ai, Kai Lin, Na Yan, Zhibo Wang, Nan Jiang, Jiguo Yu:
DAP: Efficient Detection Against Probabilistic Cloning Attacks in Anonymous RFID Systems. IEEE Trans. Ind. Informatics 18(1): 345-355 (2022) - [j53]Yang Huang, Honglong Chen, Guoqi Ma, Kai Lin, Zhichen Ni, Na Yan, Zhibo Wang:
OPAT: Optimized Allocation of Time-Dependent Tasks for Mobile Crowdsensing. IEEE Trans. Ind. Informatics 18(4): 2476-2485 (2022) - [j52]Kai Lin, Honglong Chen, Na Yan, Zhe Li, Junjian Li, Nan Jiang:
Fast and Reliable Missing Tag Detection for Multiple-Group RFID Systems. IEEE Trans. Ind. Informatics 18(4): 2656-2664 (2022) - [j51]Honglong Chen, Joel J. P. C. Rodrigues, Feng Xia, Sajal K. Das:
Guest Editorial: Special Section on Distributed Intelligence Over Internet of Things. IEEE Trans. Ind. Informatics 18(9): 6233-6235 (2022) - [j50]Nan Jiang, Debin Huang, Jing Chen, Jie Wen, Heng Zhang, Honglong Chen:
Semi-Direct Monocular Visual-Inertial Odometry Using Point and Line Features for IoV. ACM Trans. Internet Techn. 22(1): 5:1-5:23 (2022) - [j49]Honglong Chen, Zhe Li, Zhu Wang, Zhichen Ni, Junjian Li, Ge Xu, Abdul Aziz, Feng Xia:
Edge data based trailer inception probabilistic matrix factorization for context-aware movie recommendation. World Wide Web 25(5): 1863-1882 (2022) - [c21]Dongkai Liu, Jiaxing Li, Honglong Chen, Baodi Liu, Xiaoping Lu, Weifeng Liu:
EMAS: Efficient Meta Architecture Search for Few-Shot Learning. ICTAI 2022: 638-643 - [c20]Vladimir V. Shakhov, Anastasia N. Yurgenson, Honglong Chen:
On Reliability of Pipeline Monitoring Sensor Networks. IMCOM 2022: 1-3 - [c19]Xuan Liu, Honglong Chen:
The 4th International Workshop on Artificial Intelligence Applications in Internet of Things (AI2OT 2022): Preface. MSN 2022: 1 - [c18]Kai Lin, Honglong Chen, Na Yan, Zhichen Ni, Zhe Li:
Compact Unknown Tag Identification for Large-Scale RFID Systems. MSN 2022: 700-707 - [i6]Xiangtai Chen, Tao Tang, Jing Ren, Ivan Lee, Honglong Chen, Feng Xia:
Heterogeneous Graph Learning for Explainable Recommendation over Academic Networks. CoRR abs/2202.07832 (2022) - [i5]Honglong Chen, Zhe Li, Zhu Wang, Zhichen Ni, Junjian Li, Ge Xu, Abdul Aziz, Feng Xia:
Edge Data Based Trailer Inception Probabilistic Matrix Factorization for Context-Aware Movie Recommendation. CoRR abs/2202.10236 (2022) - [i4]Zhu Wang, Honglong Chen, Zhe Li, Kai Lin, Nan Jiang, Feng Xia:
VRConvMF: Visual Recurrent Convolutional Matrix Factorization for Movie Recommendation. CoRR abs/2202.10241 (2022) - [i3]Zhichen Ni, Honglong Chen, Zhe Li, Xiaomeng Wang, Na Yan, Weifeng Liu, Feng Xia:
MSCET: A Multi-Scenario Offloading Schedule for Biomedical Data Processing and Analysis in Cloud-Edge-Terminal Collaborative Vehicular Networks. CoRR abs/2203.07999 (2022) - [i2]Shuo Yu, Feng Xia, Chen Zhang, Kathleen Keogh, Honglong Chen:
Familiarity-based Collaborative Team Recognition in Academic Social Networks. CoRR abs/2204.02667 (2022) - [i1]Junjian Li, Honglong Chen:
Adversarial RAW: Image-Scaling Attack Against Imaging Pipeline. CoRR abs/2206.01733 (2022) - 2021
- [j48]Kan Yu, Biwei Yan, Jiguo Yu, Honglong Chen, Anming Dong:
Methods of improving Secrecy Transmission Capacity in wireless random networks. Ad Hoc Networks 117: 102492 (2021) - [j47]Honglong Chen, Shuai Wang, Nan Jiang, Zhe Li, Na Yan, Leyi Shi:
Trust-aware generative adversarial network with recurrent neural network for recommender systems. Int. J. Intell. Syst. 36(2): 778-795 (2021) - [j46]Leyi Shi, Xiaoyu Li, Zhenbo Gao, Pengfei Duan, Na Liu, Honglong Chen:
Worm computing: A blockchain-based resource sharing and cybersecurity framework. J. Netw. Comput. Appl. 185: 103081 (2021) - [j45]Zhe Li, Honglong Chen, Kai Lin, Vladimir V. Shakhov, Leyi Shi, Jiguo Yu:
From edge data to recommendation: A double attention-based deformable convolutional network. Peer-to-Peer Netw. Appl. 14(6): 3984-3997 (2021) - [j44]Baodi Liu, Lifei Zhao, Jiaoyue Li, Hengle Zhao, Weifeng Liu, Ye Li, Yanjiang Wang, Honglong Chen, Weijia Cao:
Saliency-Guided Remote Sensing Image Super-Resolution. Remote. Sens. 13(24): 5144 (2021) - [j43]Xin Ai, Honglong Chen, Kai Lin, Zhibo Wang, Jiguo Yu:
Nowhere to Hide: Efficiently Identifying Probabilistic Cloning Attacks in Large-Scale RFID Systems. IEEE Trans. Inf. Forensics Secur. 16: 714-727 (2021) - [c17]Xiangtai Chen, Tao Tang, Jing Ren, Ivan Lee, Honglong Chen, Feng Xia:
Heterogeneous Graph Learning for Explainable Recommendation over Academic Networks. WI/IAT (Workshop/Special Session) 2021: 29-36 - 2020
- [j42]Honglong Chen, Yuting Qin, Kai Lin, Yingxin Luan, Zhibo Wang, Jiguo Yu, Yanjun Li:
PWEND: Proactive wakeup based energy-efficient neighbor discovery for mobile sensor networks. Ad Hoc Networks 107: 102247 (2020) - [j41]Nan Jiang, Jing Chen, Ri-Gui Zhou, Changxing Wu, Honglong Chen, Jiaqi Zheng, Tao Wan:
PAN: Pipeline assisted neural networks model for data-to-text generation in social internet of things. Inf. Sci. 530: 167-179 (2020) - [j40]Kai Lin, Honglong Chen, Xin Ai, Vladimir V. Shakhov, Lina Ni, Jiguo Yu, Yanjun Li:
EUMD: Efficient slot utilization based missing tag detection with unknown tags. J. Netw. Comput. Appl. 160: 102640 (2020) - [j39]Leyi Shi, Yuxiao Song, Zhiyu Xue, Yihao Liu, Honglong Chen:
SACT: A New Model of Covert Communication Based on SDN. Sensors 20(24): 7300 (2020) - [j38]Jiahui Hu, Zhibo Wang, Jian Wei, Ruizhao Lv, Jing Zhao, Qian Wang, Honglong Chen, Dejun Yang:
Towards Demand-Driven Dynamic Incentive for Mobile Crowdsensing Systems. IEEE Trans. Wirel. Commun. 19(7): 4907-4918 (2020) - [j37]Jiguo Yu, Kan Yu, Dongxiao Yu, Weifeng Lv, Xiuzhen Cheng, Honglong Chen, Wei Cheng:
Efficient Link Scheduling in Wireless Networks Under Rayleigh-Fading and Multiuser Interference. IEEE Trans. Wirel. Commun. 19(8): 5621-5634 (2020) - [c16]Zhe Li, Honglong Chen, Kai Lin, Vladimir V. Shakhov, Leyi Shi:
Double Attention-based Deformable Convolutional Network for Recommendation. ICCC 2020: 1051-1056 - [c15]Honglong Chen, Shuai Wang, Nan Jiang, Zhe Li, Na Yan, Leyi Shi:
TagRec: Trust-Aware Generative Adversarial Network with Recurrent Neural Network for Recommender Systems. ML4CS (3) 2020: 20-32
2010 – 2019
- 2019
- [j36]Honglong Chen, Jinnan Fu, Lei Zhang, Shuai Wang, Kai Lin, Leyi Shi, Lianhai Wang:
Deformable Convolutional Matrix Factorization for Document Context-Aware Recommendation in Social Networks. IEEE Access 7: 66347-66357 (2019) - [j35]Leyi Shi, Yang Li, Tianxu Liu, Jia Liu, Baoying Shan, Honglong Chen:
Dynamic Distributed Honeypot Based on Blockchain. IEEE Access 7: 72234-72246 (2019) - [j34]Zhibo Wang, Jiahui Hu, Qian Wang, Ruizhao Lv, Jian Wei, Honglong Chen, Xiaoguang Niu:
Task-Bundling-Based Incentive for Location-Dependent Mobile Crowdsourcing. IEEE Commun. Mag. 57(2): 54-59 (2019) - [j33]Zhibo Wang, Jiahui Hu, Qian Wang, Ruizhao Lv, Jian Wei, Honglong Chen, Xiaoguang Niu:
Task Bundling Based Incentive for Location-Dependent Mobile Crowdsourcing. IEEE Commun. Mag. 57(3): 132-137 (2019) - [j32]Zhibo Wang, Xiaoyi Pang, Jiahui Hu, Wenxin Liu, Qian Wang, Yanjun Li, Honglong Chen:
When Mobile Crowdsensing Meets Privacy. IEEE Commun. Mag. 57(9): 72-78 (2019) - [j31]Behrouz Jedari, Feng Xia, Honglong Chen, Sajal K. Das, Amr Tolba, Zafer Al-Makhadmeh:
A social-based watchdog system to detect selfish nodes in opportunistic mobile networks. Future Gener. Comput. Syst. 92: 777-788 (2019) - [j30]Leyi Shi, Yuwen Cui, Xu Han, Honglong Chen, Deli Liu:
Mimicry honeypot: an evolutionary decoy system. Int. J. High Perform. Comput. Netw. 14(2): 157-164 (2019) - [j29]Xuxin Zhang, Honglong Chen, Kai Lin, Zhibo Wang, Jiguo Yu, Leyi Shi:
RMTS: A robust clock synchronization scheme for wireless sensor networks. J. Netw. Comput. Appl. 135: 1-10 (2019) - [j28]Zhibo Wang, Xiaoyi Pang, Yahong Chen, Huajie Shao, Qian Wang, Libing Wu, Honglong Chen, Hairong Qi:
Privacy-Preserving Crowd-Sourced Statistical Data Publishing with An Untrusted Server. IEEE Trans. Mob. Comput. 18(6): 1356-1367 (2019) - 2018
- [j27]Kai Lin, Honglong Chen, Tianjiao Dai, Denghui Liu, Lu Liu, Leyi Shi:
Segmented Bloom Filter Based Missing Tag Detection for Large-Scale RFID Systems With Unknown Tags. IEEE Access 6: 54435-54446 (2018) - [j26]Honglong Chen, Lu Liu, Rongjie Che, Kai Lin, Xin Ai, Yanjun Li:
On Using Sampling Bloom Filter for Unknown Tag Identification in Large-Scale RFID Systems. IEEE Access 6: 57095-57104 (2018) - [j25]Noor Ullah, Xiangjie Kong, Liangtian Wan, Honglong Chen, Zhibo Wang, Feng Xia:
A Social Utility-Based Dissemination Scheme for Emergency Warning Messages in Vehicular Social Networks. Comput. J. 61(7): 971-986 (2018) - [j24]Chuanwen Luo, Jiguo Yu, Deying Li, Honglong Chen, Yi Hong, Lina Ni:
A Novel Distributed algorithm for constructing virtual backbones in wireless sensor networks. Comput. Networks 146: 104-114 (2018) - [j23]Yanjun Li, Kaikai Chi, Honglong Chen, Zhibo Wang, Yihua Zhu:
Narrowband Internet of Things Systems With Opportunistic D2D Communication. IEEE Internet Things J. 5(3): 1474-1484 (2018) - [j22]Honglong Chen, Zhibo Wang, Feng Xia, Yanjun Li, Leyi Shi:
Efficiently and Completely Identifying Missing Key Tags for Anonymous RFID Systems. IEEE Internet Things J. 5(4): 2915-2926 (2018) - [j21]Shaoqing Wang, Jiguo Yu, Mohammed Atiquzzaman, Honglong Chen, Lina Ni:
CRPD: a novel clustering routing protocol for dynamic wireless sensor networks. Pers. Ubiquitous Comput. 22(3): 545-559 (2018) - [j20]Honglong Chen, Wei Lou, Zhibo Wang, Feng Xia:
On Achieving Asynchronous Energy-Efficient Neighbor Discovery for Mobile Sensor Networks. IEEE Trans. Emerg. Top. Comput. 6(4): 553-565 (2018) - [j19]Honglong Chen, Guolei Ma, Zhibo Wang, Qian Wang, Jiguo Yu:
MAC: Missing Tag Iceberg Queries for Multi-Category RFID Systems. IEEE Trans. Veh. Technol. 67(10): 9947-9958 (2018) - [c14]Zhibo Wang, Jiahui Hu, Jing Zhao, Dejun Yang, Honglong Chen, Qian Wang:
Pay On-Demand: Dynamic Incentive and Task Selection for Location-Dependent Mobile Crowdsensing Systems. ICDCS 2018: 611-621 - [c13]Zhibo Wang, Yongquan Zhang, Honglong Chen, Zhetao Li, Feng Xia:
Deep User Modeling for Content-based Event Recommendation in Event-based Social Networks. INFOCOM 2018: 1304-1312 - 2017
- [j18]Zhibo Wang, Qing Cao, Hairong Qi, Honglong Chen, Qian Wang:
Cost-effective barrier coverage formation in heterogeneous wireless sensor networks. Ad Hoc Networks 64: 65-79 (2017) - [j17]Zhibo Wang, Honglong Chen, Qing Cao, Hairong Qi, Zhi Wang, Qian Wang:
Achieving location error tolerant barrier coverage for wireless sensor networks. Comput. Networks 112: 314-328 (2017) - [j16]Honglong Chen, Guoliang Xue, Zhibo Wang:
Efficient and Reliable Missing Tag Identification for Large-Scale RFID Systems With Unknown Tags. IEEE Internet Things J. 4(3): 736-748 (2017) - [j15]Baogui Huang, Jiguo Yu, Xiuzhen Cheng, Honglong Chen, Hang Liu:
SINR based shortest link scheduling with oblivious power control in wireless networks. J. Netw. Comput. Appl. 77: 64-72 (2017) - [j14]Honglong Chen, Guolei Ma, Zhibo Wang, Jiguo Yu, Leyi Shi, Xiangyuan Jiang:
Efficient 3-dimensional localization for RFID systems using jumping probe. Pervasive Mob. Comput. 41: 300-318 (2017) - [j13]Honglong Chen, Guolei Ma, Zhibo Wang, Feng Xia, Jiguo Yu:
Probabilistic Detection of Missing Tags for Anonymous Multicategory RFID Systems. IEEE Trans. Veh. Technol. 66(12): 11295-11305 (2017) - 2016
- [j12]Honglong Chen, Wei Lou:
Contact expectation based routing for delay tolerant networks. Ad Hoc Networks 36: 244-257 (2016) - [j11]Weiwei Wang, Yu Chen, Honglong Chen, Xiangcui Kong, Jingjing Chen:
Parameter Characteristics of Gauss-Markov Mobility Model in Mobile Wireless Sensor Networks. Ad Hoc Sens. Wirel. Networks 34(1-4): 257-272 (2016) - [j10]Honglong Chen, Wei Lou, Zhibo Wang, Qian Wang:
A Secure Credit-Based Incentive Mechanism for Message Forwarding in Noncooperative DTNs. IEEE Trans. Veh. Technol. 65(8): 6377-6388 (2016) - 2015
- [j9]Honglong Chen, Wei Lou, Zhi Wang, Junfeng Wu, Zhibo Wang, Aihua Xia:
Securing DV-Hop localization against wormhole attacks in wireless sensor networks. Pervasive Mob. Comput. 16: 22-35 (2015) - [j8]Honglong Chen, Wei Lou:
On protecting end-to-end location privacy against local eavesdropper in Wireless Sensor Networks. Pervasive Mob. Comput. 16: 36-50 (2015) - [j7]Honglong Chen, Wei Lou, Zhi Wang:
On providing wormhole-attack-resistant localization using conflicting sets. Wirel. Commun. Mob. Comput. 15(15): 1865-1881 (2015) - 2014
- [j6]Honglong Chen, Wei Lou:
GAR: Group aware cooperative routing protocol for resource-constraint opportunistic networks. Comput. Commun. 48: 20-29 (2014) - [j5]Honglong Chen, Wendong Chen, Zhibo Wang, Zhi Wang, Yanjun Li:
Mobile Beacon Based Wormhole Attackers Detection and Positioning in Wireless Sensor Networks. Int. J. Distributed Sens. Networks 10 (2014) - [c12]Zhibo Wang, Honglong Chen, Qing Cao, Hairong Qi, Zhi Wang:
Fault tolerant barrier coverage for wireless sensor networks. INFOCOM 2014: 1869-1877 - 2013
- [j4]Zhibo Wang, Wei Lou, Zhi Wang, Junchao Ma, Honglong Chen:
A Hybrid Cluster-Based Target Tracking Protocol for Wireless Sensor Networks. Int. J. Distributed Sens. Networks 9 (2013) - [j3]Zhibo Wang, Zhi Wang, Honglong Chen, Jianfeng Li, Hongbin Li, Jie Shen:
HierTrack: an energy-efficient cluster-based target tracking system forwireless sensor networks. J. Zhejiang Univ. Sci. C 14(6): 395-406 (2013) - [c11]Lianfang Cai, Xuemin Tian, Honglong Chen:
Nonlinear Process Fault Diagnosis Using Kernel ICA and Improved FDA. ALCOSP 2013: 736-741 - [c10]Honglong Chen, Wei Lou:
Making Nodes Cooperative: A Secure Incentive Mechanism for Message Forwarding in DTNs. ICCCN 2013: 1-7 - 2012
- [c9]Honglong Chen, Wei Lou:
Group aware cooperative routing for opportunistic networks under resource constraints. GLOBECOM 2012: 5705-5710 - 2011
- [c8]Honglong Chen, Wei Lou:
On Using Contact Expectation for Routing in Delay Tolerant Networks. ICPP 2011: 683-692 - [c7]Zhibo Wang, Zhi Wang, Honglong Chen, Jianfeng Li, Hongbin Li:
HierTrack: an energy efficient target tracking system for wireless sensor networks. SenSys 2011: 377-378 - 2010
- [j2]Honglong Chen, Wei Lou, Xice Sun, Zhi Wang:
A Secure Localization Approach against Wormhole Attacks Using Distance Consistency. EURASIP J. Wirel. Commun. Netw. 2010 (2010) - [j1]Honglong Chen, Wei Lou, Zhi Wang:
A Novel Secure Localization Approach in Wireless Sensor Networks. EURASIP J. Wirel. Commun. Netw. 2010 (2010) - [c6]Zhibo Wang, Wei Lou, Zhi Wang, Junchao Ma, Honglong Chen:
A Novel Mobility Management Scheme for Target Tracking in Cluster-Based Sensor Networks. DCOSS 2010: 172-186 - [c5]Honglong Chen, Wei Lou:
From nowhere to somewhere: Protecting end-to-end location privacy in wireless sensor networks. IPCCC 2010: 1-8 - [c4]Honglong Chen, Wei Lou, Zhi Wang:
Secure localization against wormhole attacks using conflicting sets. IPCCC 2010: 25-33 - [c3]Junfeng Wu, Honglong Chen, Wei Lou, Zhibo Wang, Zhi Wang:
Label-Based DV-Hop Localization Against Wormhole Attacks in Wireless Sensor Networks. NAS 2010: 79-88
2000 – 2009
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint