Follow
Hongsong Zhu
Title
Cited by
Cited by
Year
Wireless sensor networks
S Limin, L Jianzhong, C Yu, Z Hongsong
Beijing: Tsinghua University Press 5, 7-8, 2005
4172005
TPLinker: Single-stage joint extraction of entities and relations through token pair linking
Y Wang, B Yu, Y Zhang, T Liu, H Zhu, L Sun
arXiv preprint arXiv:2010.13415, 2020
2832020
{FIRM-AFL}:{High-Throughput} greybox fuzzing of {IoT} firmware via augmented process emulation
Y Zheng, A Davanian, H Yin, C Song, H Zhu, L Sun
28th USENIX Security Symposium (USENIX Security 19), 1099-1114, 2019
2752019
Social engineering in cybersecurity: Effect mechanisms, human vulnerabilities and attack methods
Z Wang, H Zhu, L Sun
Ieee Access 9, 11895-11910, 2021
1102021
Defining social engineering in cybersecurity
Z Wang, L Sun, H Zhu
IEEE Access 8, 85094-85115, 2020
1042020
Security and privacy in localization for underwater sensor networks
H Li, Y He, X Cheng, H Zhu, L Sun
IEEE Communications Magazine 53 (11), 56-62, 2015
912015
Application of internet of things in power-line monitoring
X Chen, L Sun, H Zhu, Y Zhen, H Chen
2012 International conference on cyber-enabled distributed computing and …, 2012
792012
Exploiting FM radio data system for adaptive clock calibration in sensor networks
L Li, G Xing, L Sun, W Huangfu, R Zhou, H Zhu
Proceedings of the 9th international conference on Mobile systems …, 2011
622011
Nonidentical linear pulse-coupled oscillators model with application to time synchronization in wireless sensor networks
Z An, H Zhu, X Li, C Xu, Y Xu, X Li
IEEE Transactions on Industrial Electronics 58 (6), 2205-2215, 2009
592009
Understanding and securing device vulnerabilities through automated bug report analysis
X Feng, X Liao, X Wang, H Wang, Q Li, K Yang, H Zhu, L Sun
SEC'19: Proceedings of the 28th USENIX Conference on Security Symposium, 2019
542019
Asteria: Deep learning-based AST-encoding for cross-platform binary code similarity detection
S Yang, L Cheng, Y Zeng, Z Lang, H Zhu, Z Shi
2021 51st Annual IEEE/IFIP International Conference on Dependable Systems …, 2021
522021
Adaptive TDMA slot assignment protocol for vehicular ad-hoc networks
W YANG, LI Pan, H ZHU
The Journal of China Universities of Posts and Telecommunications 20 (1), 11-25, 2013
512013
RestThing: A Restful Web service infrastructure for mash-up physical and Web resources
W Qin, Q Li, L Sun, H Zhu, Y Liu
2011 IFIP 9th International Conference on Embedded and Ubiquitous Computing …, 2011
472011
Social engineering in cybersecurity: a domain ontology and knowledge graph application examples
Z Wang, H Zhu, P Liu, L Sun
Cybersecurity 4, 1-21, 2021
442021
Coff: Contact-duration-aware cellular traffic offloading over delay tolerant networks
Z Li, Y Liu, H Zhu, L Sun
IEEE Transactions on Vehicular Technology 64 (11), 5257-5268, 2014
402014
Discontinuous named entity recognition as maximal clique discovery
Y Wang, B Yu, H Zhu, T Liu, N Yu, L Sun
arXiv preprint arXiv:2106.00218, 2021
392021
Probability based dynamic load-balancing tree algorithm for wireless sensor networks
T Yan, Y Bi, L Sun, H Zhu
International Conference on Networking and Mobile Computing, 682-691, 2005
342005
A decentralized adaptive tdma scheduling strategy for vanet
W Ke, Y Weidong, L Pan, Z Hongsong
2013 IEEE Wireless Communications and Networking Conference Workshops (WCNCW …, 2013
272013
Security OSIF: Toward automatic discovery and analysis of event based cyber threat intelligence
K Li, H Wen, H Li, H Zhu, L Sun
2018 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced …, 2018
262018
Efficient greybox fuzzing of applications in Linux-based IoT devices via enhanced user-mode emulation
Y Zheng, Y Li, C Zhang, H Zhu, Y Liu, L Sun
Proceedings of the 31st ACM SIGSOFT International Symposium on Software …, 2022
232022
The system can't perform the operation now. Try again later.
Articles 1–20