default search action
Hui Zhao 0007
Person information
- affiliation: Sichuan University, College of Computer Science, Chengdu, China
Other persons with the same name
- Hui Zhao — disambiguation page
- Hui Zhao 0001 — Beijing University of Posts and Telecommunications, Wireless Signal Processing and Network Lab, China
- Hui Zhao 0002 — Henan University, Software School, Kaifeng, China
- Hui Zhao 0003 — Xidian University, School of Computer Science and Technology, Xi'an, China (and 1 more)
- Hui Zhao 0004 — University of Florida, Department of Electrical and Computer Engineering, Gainesville, FL, USA
- Hui Zhao 0005 — Beijing Jiaotong University, School of Traffic and Transportation, China
- Hui Zhao 0006 — Tianjin University, School of Electrical Engineering and Automation, China (and 1 more)
- Hui Zhao 0008 — Beijing Institute of Technology, School of Automation, Beijing, China
- Hui Zhao 0009 — University of Jinan, Shandong Provincial Key Laboratory of Network Based Intelligent Computing, Jinan, China (and 1 more)
- Hui Zhao 0010 — (and 3 more)
- Hui Zhao 0011 — Zhongnan University of Economics and Law, School of Statistics and Mathematics, Wuhan, China (and 1 more)
- Hui Zhao 0012 — Chongqing University of Posts and Telecommunications, School of Communication and Information Engineering, Chongqing, China
- Hui Zhao 0013 — University of North Texas, TX, USA (and 1 more)
- Hui Zhao 0014 — University of California, Riverside, CA, USA
- Hui Zhao 0015 — Georgetown University, USA
- Hui Zhao 0016 — Cóte d'Azur University, I3S, INRIA, Nice, France
- Hui Zhao 0017 — Shenyang University of Technology, School of Artificial Intelligence, China (and 1 more)
- Hui Zhao 0018 — Beijing University of Technology, Department of Mathematics, Faculty of Science, China
- Hui Zhao 0019 — Shanghai Jiao Tong University, Department of Instrument and Engineering, Accept,China
- Hui Zhao 0020 — University of Burgundy - Franche-Comte, CIAD, LE2I, Belfort Cedex, France
- Hui Zhao 0021 — Pennsylvania State University, Smeal College of Business, PA, USA
Other persons with a similar name
- Zhaohui Jiang (aka: Zhao-Hui Jiang) — disambiguation page
- Zhaohui Liang (aka: Zhao-hui Liang)
- Zhaohui Liu (aka: Zhao-hui Liu) — disambiguation page
- Zhao-Hui Sun (aka: Poly Z. H. Sun) — Shanghai Jiao Tong University, Department of Industrial Engineering, China
- ZhaoHui Tang (aka: Zhao-Hui Tang)
- Zhaohui Yang 0001 (aka: Zhao-Hui Yang 0001) — Zhejiang University, College of Information Science and Electronic Engineering, Hangzhou, China (and 2 more)
- Huihuang Zhao (aka: Hui-Huang Zhao) — disambiguation page
- Kai-Hui Zhao
- Lin-hui Zhao (aka: Linhui Zhao) — disambiguation page
- Shenghui Zhao (aka: Sheng-Hui Zhao) — disambiguation page
- show all similar names
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Shaohong Zhou, Junjiang He, Tao Li, Xiaolong Lan, Yunpeng Wang, Hui Zhao, Yihong Li:
Automating the Deployment of Cyber Range with OpenStack. Comput. J. 67(3): 851-863 (2024) - 2023
- [j6]Yuting Guan, Junjiang He, Tao Li, Hui Zhao, Baoqiang Ma:
SSQLi: A Black-Box Adversarial Attack Method for SQL Injection Based on Reinforcement Learning. Future Internet 15(4): 133 (2023) - 2022
- [j5]Li Chen, Cong Tang, Junjiang He, Hui Zhao, Xiaolong Lan, Tao Li:
XSS adversarial example attacks based on deep reinforcement learning. Comput. Secur. 120: 102831 (2022) - [j4]Ya-Jun Ma, Hui Zhao, Tao Li:
Robust adaptive dual layer sliding mode controller: Methodology and application of uncertain robot manipulator. Trans. Inst. Meas. Control 44(4) (2022) - 2021
- [c9]Yongbin Zhu, Wenshan Li, Tao Li, Hui Zhao:
Construction of Agent Model Based on Emotional Interaction. ISEEIE 2021: 356-360 - 2020
- [c8]Meng Huang, Tao Li, Hui Zhao, Xiaojie Liu, Zhan Gao:
Immune-Based Network Dynamic Risk Control Strategy Knowledge Ontology Construction. SAI (3) 2020: 420-430
2010 – 2019
- 2019
- [c7]Junjiang He, Tao Li, Hui Zhao, Xiaojie Liu, Zhan Gao, Yunpeng Wang:
An Immune-Based Real-Time Quantitative Detection for Threat Change of Cyberspace Digital Virtual Assets. EECS 2019: 76-81 - 2018
- [j3]Wen Chen, Hui Zhao, Tao Li, Yuling Liu:
Optimal probabilistic encryption for distributed detection in wireless sensor networks based on immune differential evolution algorithm. Wirel. Networks 24(7): 2497-2507 (2018) - [c6]Ping Lin, Tao Li, Xiaojie Liu, Hui Zhao, Jin Yang, Fangdong Zhu:
An Immunity-Based Security Threat Detection System for Cyberspace Digital Virtual Assets. ICCCS (2) 2018: 601-611 - 2017
- [c5]Zhengjun Liu, Hui Zhao, Wen Chen, Xiaochun Cao, Haipeng Peng, Jin Yang, Tao Yang, Ping Lin:
Double-Spending Detection for Fast Bitcoin Payment Based on Artificial Immune. NCTCS 2017: 133-143 - 2015
- [j2]Wen Chen, Hui Zhao, Tao Li, Yuling Liu:
Intelligent traffic signal controller based on type-2 fuzzy logic and NSGAII. J. Intell. Fuzzy Syst. 29(6): 2611-2618 (2015) - 2011
- [j1]Wen Chen, XiaoJie Liu, Tao Li, Yuanquan Shi, Xufei Zheng, Hui Zhao:
A Negative Selection Algorithm Based on Hierarchical Clustering of Self Set and its Application in Anomaly Detection. Int. J. Comput. Intell. Syst. 4(4): 410-419 (2011) - 2010
- [c4]Wen Chen, Tao Li, Jian Qin, Hui Zhao:
A New Cluster Based Real Negative Selection Algorithm. ISIA 2010: 125-131
2000 – 2009
- 2007
- [c3]Caiming Liu, Tao Li, Hui Zhao, Lingxi Peng, Jinquan Zeng, Yan Zhang:
Exploration of Network Security Information Hid in Web Pages Based on Immunology. FSKD (1) 2007: 587-591 - [c2]Caiming Liu, XiaoJie Liu, Tao Li, Lingxi Peng, Jinquan Zeng, Hui Zhao:
Artificial Immunity-Based Discovery for Popular Information in WEB Pages. International Conference on Computational Science (4) 2007: 166-169 - 2006
- [c1]Tiefang Wang, Tao Li, Xun Gong, Jin Yang, Xiaoqin Hu, Diangang Wang, Hui Zhao:
Family Gene Based Grid Trust Model. ICNC (2) 2006: 110-113
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-13 19:08 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint