TPENAS: A Two-Phase Evolutionary Neural Architecture Search for Remote Sensing Image Classification
Ao, Lei, Feng, Kaiyuan, Sheng, Kai, Zhao, Hongyu, He, Xin, Chen, Zigang
Published in Remote sensing (Basel, Switzerland) (01.04.2023)
Published in Remote sensing (Basel, Switzerland) (01.04.2023)
Get full text
Journal Article
Multi-constraint non-negative matrix factorization for community detection: orthogonal regular sparse constraint non-negative matrix factorization
Chen, Zigang, Xiao, Qi, Leng, Tao, Zhang, Zhenjiang, Pan, Ding, Liu, Yuhong, Li, Xiaoyong
Published in Complex & intelligent systems (01.08.2024)
Published in Complex & intelligent systems (01.08.2024)
Get full text
Journal Article
Sparse General Non-Negative Matrix Factorization Based on Left Semi-Tensor Product
Chen, Zigang, Li, Lixiang, Peng, Haipeng, Liu, Yuhong, Zhu, Haihua, Yang, Yixian
Published in IEEE access (2019)
Published in IEEE access (2019)
Get full text
Journal Article
A Novel Digital Watermarking Based on General Non-Negative Matrix Factorization
Chen, Zigang, Li, Lixiang, Peng, Haipeng, Liu, Yuhong, Yang, Yixian
Published in IEEE transactions on multimedia (01.08.2018)
Published in IEEE transactions on multimedia (01.08.2018)
Get full text
Journal Article
Digital Forensics for Automotive Intelligent Networked Terminal Devices
Chen, Zigang, Mu, Qinyu, Luo, Wenjun, Yang, Xingchun, Li, Danlong, Shao, Xin, Liu, Yuhong, Zhu, Haihua
Published in IEEE transactions on vehicular technology (01.04.2024)
Published in IEEE transactions on vehicular technology (01.04.2024)
Get full text
Journal Article
An encryption scheme for MQIR based on binary key image and qubit rotation
Chen, Zigang, Yan, Yi, Pan, Ji, Zhu, HaiHua, Liu, Yuhong
Published in Nonlinear dynamics (01.12.2023)
Published in Nonlinear dynamics (01.12.2023)
Get full text
Journal Article
A method for recovering adversarial samples with both adversarial attack forensics and recognition accuracy
Chen, Zigang, Wang, Zhen, Zhou, Yuening, Liu, Fan, Liu, Yuhong, Leng, Tao, Zhu, Haihua
Published in Computers & security (01.09.2024)
Published in Computers & security (01.09.2024)
Get full text
Journal Article
An explainable deepfake of speech detection method with spectrograms and waveforms
Yu, Ning, Chen, Long, Leng, Tao, Chen, Zigang, Yi, Xiaoyin
Published in Journal of information security and applications (01.03.2024)
Published in Journal of information security and applications (01.03.2024)
Get full text
Journal Article
Design and Implementation of MQIR Image Scaling
Chen, Zigang, Pan, Ji, Yan, Yi, Zhu, Haihua
Published in International journal of theoretical physics (01.03.2022)
Published in International journal of theoretical physics (01.03.2022)
Get full text
Journal Article
Attributed community mining using joint general non-negative matrix factorization with graph Laplacian
Chen, Zigang, Li, Lixiang, Peng, Haipeng, Liu, Yuhong, Yang, Yixian
Published in Physica A (01.04.2018)
Published in Physica A (01.04.2018)
Get full text
Journal Article
Incremental general non-negative matrix factorization without dimension matching constraints
Chen, Zigang, Li, Lixiang, Peng, Haipeng, Liu, Yuhong, Yang, Yixian
Published in Neurocomputing (Amsterdam) (15.10.2018)
Published in Neurocomputing (Amsterdam) (15.10.2018)
Get full text
Journal Article
Tripartite evolutionary game in the process of network attack and defense
Chen, Zigang, Fan, Chaochao, Leng, Tao, Chen, Long, Liu, Yuhong, Li, Xiaoyong, Yuan, Dongfeng
Published in Telecommunication systems (01.06.2024)
Published in Telecommunication systems (01.06.2024)
Get full text
Journal Article
Video security in logistics monitoring systems: a blockchain based secure storage and access control scheme
Chen, Zigang, Liu, Fan, Li, Danlong, Liu, Yuhong, Yang, Xingchun, Zhu, Haihua
Published in Cluster computing (01.11.2024)
Published in Cluster computing (01.11.2024)
Get full text
Journal Article
An Interpretive Adversarial Attack Method: Attacking Softmax Gradient Layer-Wise Relevance Propagation Based on Cosine Similarity Constraint and TS-Invariant
Chen, Zigang, Dai, Renjie, Liu, Zhenghao, Chen, Long, Liu, Yuhong, Sheng, Kai
Published in Neural processing letters (01.08.2023)
Published in Neural processing letters (01.08.2023)
Get full text
Journal Article
A dual-factor access authentication scheme for IoT terminal in 5G environments with network slice selection
Chen, Zigang, Ao, Jin, Luo, Wenjun, Cheng, Zhiquan, Liu, Yuhong, Sheng, Kai, Chen, Long
Published in Journal of information security and applications (01.08.2022)
Published in Journal of information security and applications (01.08.2022)
Get full text
Journal Article
FSMFA: Efficient firmware-secure multi-factor authentication protocol for IoT devices
Chen, Zigang, Cheng, Zhiquan, Luo, Wenjun, Ao, Jin, Liu, Yuhong, Sheng, Kai, Chen, Long
Published in Internet of things (Amsterdam. Online) (01.04.2023)
Published in Internet of things (Amsterdam. Online) (01.04.2023)
Get full text
Journal Article