Name
Papers
Collaborators
ZHIYONG ZHANG
44
91
Citations 
PageRank 
Referers 
164
18.42
365
Referees 
References 
895
399
Search Limit
100895
Title
Citations
PageRank
Year
Research on Perpendicularity of Axial End Face Parts Based on New Generation GPS - This document explains and embodies the process of the solution to perpendicularity error which is used in the axial end face parts.00.342021
Short-Long Correlation Based Graph Neural Networks for Residential Load Forecasting.00.342021
Large-scale Transfer Learning for Low-resource Spoken Language Understanding00.342020
A Novel Social Situation Analytics-Based Recommendation Algorithm For Multimedia Social Networks00.342019
Detecting Malicious Social Bots Based on Clickstream Sequences.10.352019
ProCTA: program characteristic-based thread partition approach.00.342019
Multimedia Social Network Authorization Scheme of Comparison-based Encryption.00.342019
An improvement for combination rule in evidence theory.40.382019
A Novel Authorization Scheme for Multimedia Social Networks Under Cloud Storage Method by Using MA-CP-ABE10.352018
基于SWIFT的海量数据存储平台设计 (Design of Storage Platform for Large Scale Data Based on SWIFT System).00.342018
面向多媒体数字版权保护的委托授权远程证明协议 (Delegation Authorization Protocol Based on Remote Attestation Applied in Multimedia DRM).00.342018
Crowd computing for social media ecosystems00.342018
The convergence of new computing paradigms and big data analytics methodologies for online social networks.10.342018
Efficient Compressed Ciphertext Length Scheme Using Multi-Authority CP-ABE for Hierarchical Attributes.30.382018
A novel crowd evaluation method for security and trustworthiness of online social networks platforms based on signaling theory.30.402018
Recent research in computational intelligence paradigms into security and privacy for online social networks (OSNs).00.342018
Social media security and trustworthiness: Overview and new direction.230.802018
More permutation polynomials with differential uniformity six.00.342018
Guest Editorial: Recent Advances on Security and Privacy of Multimedia Big Data in the Critical Infrastructure.00.342018
A New Conflict Management Method In Dempster-Shafer Theory30.372017
CyVOD: a novel trinity multimedia social network scheme.140.572017
Guest Editorial: Multimedia Social Network Security and Applications.00.342017
A novel authorization delegation scheme for multimedia social networks by using proxy re-encryption80.502016
人脸识别中基于系数相似性的字典学习算法 (Coefficient-similarity-based Dictionary Learning Algorithm for Face Recognition).00.342016
Security, Trust and Risk in Multimedia Social Networks.00.342015
A Formal Analytic Approach to Credible Potential Path and Mining Algorithms for Multimedia Social Networks.60.472015
A novel approach to rights sharing-enabling digital rights management for mobile multimedia130.592015
A trust model for multimedia social networks.381.122013
A Social Network Information Propagation Model Considering Different Types of Social Relationships.00.342013
An Approach to Mobile Multimedia Digital Rights Management Based on Android.20.382013
Application Of Improved Hu Moments In Object Recognition10.352012
Advance on Trust Model and Evaluation Method in Social Networks00.342012
SAR and panchromatic image fusion based on region features in nonsubsampled contourlet transform domain00.342012
True Random Bit Generator Based On Cell Phone Recording And Chaotic Encryption00.342012
Usage Control Model for Digital Rights Management in Digital Home Networks.30.452011
Analytic study on micro electromechanical systems sensor00.342011
Game-theoretic analyses and simulations of adoptions of security policies for DRM in contents sharing scenario10.352011
Utility-Analytic Approach and Swarm Simulations of Security Policies in Digital Rights Management.00.342010
Automatic Segmentation for Breast Skin-line70.562010
Security, trust and risk in Digital Rights Management ecosystem70.542010
Cooperative and non-cooperative game-theoretic analyses of adoptions of security policies for DRM40.452010
Security and Trust in Digital Rights Management: A Survey140.722009
A Fine-Grained Digital Rights Transfer Policy and Trusted Distribution and Enforcement10.362008
Blind source separation/channel equalization of nonlinear channels with binary inputs60.552005