default search action
Dezhi Han
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j127]Mengyan Qiao, Lifei Wei, Dezhi Han, Huafeng Wu:
Efficient multi-party PSI and its application in port management. Comput. Stand. Interfaces 91: 103884 (2025) - [j126]Jiatao Li, Dezhi Han, Tien-Hsiung Weng, Huafeng Wu, Kuan-Ching Li, Arcangelo Castiglione:
A secure data storage and sharing scheme for port supply chain based on blockchain and dynamic searchable encryption. Comput. Stand. Interfaces 91: 103887 (2025) - [j125]Yuqin Huang, Dezhi Han, Bing Han, Zhongdai Wu:
ADV-YOLO: improved SAR ship detection model based on YOLOv8. J. Supercomput. 81(1): 34 (2025) - 2024
- [j124]Wenlong Jiang, Dezhi Han, Bing Han, Zhongdai Wu:
YOLOv8-FDF: A Small Target Detection Algorithm in Complex Scenes. IEEE Access 12: 119223-119237 (2024) - [j123]Linlin Zheng, Dezhi Han, Xiaoqi Xin:
GPAN-PS: Global-Response Pedestrian Attention Network for End-to-End Person Search. IEEE Access 12: 157686-157698 (2024) - [j122]Xiang Shen, Dezhi Han, Liang Zong, Zihan Guo, Jie Hua:
Relational reasoning and adaptive fusion for visual question answering. Appl. Intell. 54(6): 5062-5080 (2024) - [j121]Aoao Bian, Dezhi Han, Mingming Cui, Dun Li:
Medical record information storage scheme based on blockchain and attribute role-based access control. Comput. Sci. Inf. Syst. 21(3): 807-830 (2024) - [j120]Shuxin Shi, Bing Han, Zhongdai Wu, Dezhi Han, Huafeng Wu, Xiaojun Mei:
BLSAE-SNIDS: A Bi-LSTM sparse autoencoder framework for satellite network intrusion detection. Comput. Sci. Inf. Syst. 21(4): 1389-1410 (2024) - [j119]Wei Wang, Dezhi Han, Chongqing Chen, Zhongdai Wu:
FastPFM: a multi-scale ship detection algorithm for complex scenes based on SAR images. Connect. Sci. 36(1) (2024) - [j118]Dun Li, Dezhi Han, Tien-Hsiung Weng, Zibin Zheng, Hongzhi Li, Kuan-Ching Li:
On Stablecoin: Ecosystem, architecture, mechanism and applicability as payment method. Comput. Stand. Interfaces 87: 103747 (2024) - [j117]Xiaojun Mei, Dezhi Han, Nasir Saeed, Huafeng Wu, Bing Han, Kuan-Ching Li:
Localization in Underwater Acoustic IoT Networks: Dealing With Perturbed Anchors and Stratification. IEEE Internet Things J. 11(10): 17757-17769 (2024) - [j116]Chongqing Chen, Dezhi Han, Chin-Chen Chang:
MPCCT: Multimodal vision-language learning paradigm with context-based compact Transformer. Pattern Recognit. 147: 110084 (2024) - [j115]Lijun Xiao, Dezhi Han, Ce Yang, Jiahong Cai, Wei Liang, Kuan-Ching Li:
TS-DP: An Efficient Data Processing Algorithm for Distribution Digital Twin Grid for Industry 5.0. IEEE Trans. Consumer Electron. 70(1): 1983-1994 (2024) - [j114]Huafeng Wu, Feng Wang, Xiaojun Mei, Linian Liang, Bing Han, Dezhi Han, Tien-Hsiung Weng, Kuan-Ching Li:
A novel fuzzy control path planning algorithm for intelligent ship based on scale factors. J. Supercomput. 80(1): 202-225 (2024) - [j113]Huafeng Wu, Yuxuan Zhang, Linian Liang, Xiaojun Mei, Dezhi Han, Bing Han, Tien-Hsiung Weng, Kuan-Ching Li:
Correction to: Multi‑head attention‑based model for reconstructing continuous missing time series data. J. Supercomput. 80(1): 1363-1364 (2024) - [j112]Songyou Xie, Lijun Xiao, Dezhi Han, Kun Xie, Xiong Li, Wei Liang:
HCVC: A High-Capacity Off-Chain Virtual Channel Scheme Based on Bidirectional Locking Mechanism. IEEE Trans. Netw. Sci. Eng. 11(5): 3995-4006 (2024) - 2023
- [j111]Zihan Guo, Dezhi Han:
Sparse co-attention visual question answering networks based on thresholds. Appl. Intell. 53(1): 586-600 (2023) - [j110]Xiang Shen, Dezhi Han, Zihan Guo, Chongqing Chen, Jie Hua, Gaofeng Luo:
Local self-attention in transformer for visual question answering. Appl. Intell. 53(13): 16706-16723 (2023) - [j109]Zhijie Sun, Dezhi Han, Dun Li, Tien-Hsiung Weng, Kuan-Ching Li, Xiaojun Mei:
MedRSS: A blockchain-based scheme for secure storage and sharing of medical records. Comput. Ind. Eng. 183: 109521 (2023) - [j108]Yimin Li, Dezhi Han, Mingming Cui, Yuan Fan, Yachao Zhou:
RESNETCNN: An abnormal network traffic flows detection model. Comput. Sci. Inf. Syst. 20(3): 997-1014 (2023) - [j107]Yan Wang, Dezhi Han, Mingming Cui:
Intrusion detection model of internet of things based on deep learning. Comput. Sci. Inf. Syst. 20(4): 1519-1540 (2023) - [j106]Shuxin Shi, Dezhi Han, Mingming Cui:
A multimodal hybrid parallel network intrusion detection model. Connect. Sci. 35(1) (2023) - [j105]Hao Wang, Dezhi Han, Mingming Cui, Chongqing Chen:
NAS-YOLOX: a SAR ship detection using neural architecture search and multi-scale attention. Connect. Sci. 35(1): 1-32 (2023) - [j104]Jiatao Li, Dezhi Han, Zhongdai Wu, Junxiang Wang, Kuan-Ching Li, Arcangelo Castiglione:
A novel system for medical equipment supply chain traceability based on alliance chain and attribute and role access control. Future Gener. Comput. Syst. 142: 195-211 (2023) - [j103]Huimin Li, Dezhi Han, Chongqing Chen, Chin-Chen Chang, Kuan-Ching Li, Dun Li:
A Visual Question Answering Network Merging High- and Low-Level Semantic Information. IEICE Trans. Inf. Syst. 106(5): 581-589 (2023) - [j102]Qiannan Zhang, Huafeng Wu, Xiaojun Mei, Dezhi Han, Mario Donato Marino, Kuan-Ching Li, Song Guo:
A Sparse Sensor Placement Strategy Based on Information Entropy and Data Reconstruction for Ocean Monitoring. IEEE Internet Things J. 10(22): 19681-19694 (2023) - [j101]Chongqing Chen, Dezhi Han, Xiang Shen:
CLVIN: Complete language-vision interaction network for visual question answering. Knowl. Based Syst. 275: 110706 (2023) - [j100]Yiru Jiang, Dezhi Han, Mingming Cui, Yuan Fan, Yachao Zhou:
A Video Target Tracking and Correction Model with Blockchain and Robust Feature Location. Sensors 23(5): 2408 (2023) - [j99]Shaokang Cai, Dezhi Han, Dun Li:
A Feedback Semi-Supervised Learning With Meta-Gradient for Intrusion Detection. IEEE Syst. J. 17(1): 1158-1169 (2023) - [j98]Lijun Xiao, Dezhi Han, Dun Li, Wei Liang, Ce Yang, Kuan-Ching Li, Arcangelo Castiglione:
CTDM: cryptocurrency abnormal transaction detection method with spatio-temporal and global representation. Soft Comput. 27(16): 11647-11660 (2023) - [j97]Han Liu, Dezhi Han, Mingming Cui, Kuan-Ching Li, Alireza Souri, Mohammad Shojafar:
IdenMultiSig: Identity-Based Decentralized Multi-Signature in Internet of Things. IEEE Trans. Comput. Soc. Syst. 10(4): 1711-1721 (2023) - [j96]Dezhi Han, Hongxu Zhou, Tien-Hsiung Weng, Zhongdai Wu, Bing Han, Kuan-Ching Li, Al-Sakib Khan Pathan:
LMCA: a lightweight anomaly network traffic detection model integrating adjusted mobilenet and coordinate attention mechanism for IoT. Telecommun. Syst. 84(4): 549-564 (2023) - [j95]Dun Li, Dezhi Han, Noël Crespi, Roberto Minerva, Kuan-Ching Li:
A blockchain-based secure storage and access control scheme for supply chain finance. J. Supercomput. 79(1): 109-138 (2023) - [j94]Hongzhi Li, Dezhi Han:
Blockchain-assisted secure message authentication with reputation management for VANETs. J. Supercomput. 79(17): 19903-19933 (2023) - [j93]Huafeng Wu, Yuxuan Zhang, Linian Liang, Xiaojun Mei, Dezhi Han, Bing Han, Tien-Hsiung Weng, Kuan-Ching Li:
Multi-head attention-based model for reconstructing continuous missing time series data. J. Supercomput. 79(18): 20684-20711 (2023) - [j92]Zihan Guo, Dezhi Han:
Multi-modal co-attention relation networks for visual question answering. Vis. Comput. 39(11): 5783-5795 (2023) - [c23]Yichen Bao, Lifei Wei, Dezhi Han:
Efficient and Secure Multi-Party Private Set Operation Protocol Suitable for IoT Devices. AISNS 2023: 283-290 - [c22]Xiaojun Mei, Huafeng Wu, Dezhi Han, Xinqiang Chen, Jiangfeng Xian, Bing Han:
A Computationally Efficient Target Localization Algorithm in Underwater Wireless Sensor Networks. ICCCS 2023: 181-186 - [c21]Hao Wang, Dezhi Han, Zhongdai Wu, Junxiang Wang, Yuan Fan, Yachao Zhou:
NAS-YOLOX: ship detection based on improved YOLOX for SAR imagery. CSCloud/EdgeCom 2023: 126-131 - [c20]Lijun Xiao, Dezhi Han, Sisi Zhou, Nengxiang Xu, Lin Chen, Siqi Xie:
A Blockchain-empowered Federated Learning Framework Supprting GDPR-compliance. CSCloud/EdgeCom 2023: 399-404 - [c19]Wenmin Zeng, Dezhi Han, Mingming Cui, Zhongdai Wu, Bing Han, Hongxu Zhou:
IFLV: Wireless network intrusion detection model integrating FCN, LSTM, and ViT. CSCloud/EdgeCom 2023: 470-475 - [c18]Ming Li, Dezhi Han, Dun Li:
A method combining improved Mahalanobis distance and adversarial autoencoder to detect abnormal network traffic. IDEAS 2023: 161-169 - [c17]Yijie Liu, Lijun Xiao, Dezhi Han, Jing Long:
Telematics Communication Based on Blockchain Technology. SmartCloud 2023: 136-141 - 2022
- [j91]Gao Na, Dezhi Han, Tien-Hsiung Weng, Benhui Xia, Dun Li, Arcangelo Castiglione, Kuan-Ching Li:
Modeling and analysis of port supply chain system based on Fabric blockchain. Comput. Ind. Eng. 172(Part): 108527 (2022) - [j90]Benhui Xia, Dezhi Han, Ximing Yin, Gao Na:
RICNN: A ResNet&Inception convolutional neural network for intrusion detection of abnormal traffic. Comput. Sci. Inf. Syst. 19(1): 309-326 (2022) - [j89]Manjie Zhai, Dezhi Han, Chin-Chen Chang, Zhijie Sun:
A consortium blockchain-based information management system for unmanned vehicle logistics. Comput. Sci. Inf. Syst. 19(2): 935-955 (2022) - [j88]Dun Li, Dezhi Han, Benhui Xia, Tien-Hsiung Weng, Arcangelo Castiglione, Kuan-Ching Li:
Fabric-GC: A Blockchain-based Gantt chart system for cross-organizational project management. Comput. Sci. Inf. Syst. 19(3): 1213-1240 (2022) - [j87]Shaokang Cai, Dezhi Han, Xinming Yin, Dun Li, Chin-Chen Chang:
A Hybrid parallel deep learning model for efficient intrusion detection based on metric learning. Connect. Sci. 34(1): 551-577 (2022) - [j86]Zhenhui Wang, Dezhi Han, Ming Li, Han Liu, Mingming Cui:
The abnormal traffic detection scheme based on PCA and SSH. Connect. Sci. 34(1): 1201-1220 (2022) - [j85]Dun Li, Dezhi Han, Zibin Zheng, Tien-Hsiung Weng, Hongzhi Li, Han Liu, Arcangelo Castiglione, Kuan-Ching Li:
MOOCsChain: A blockchain-based secure storage and sharing scheme for MOOCs learning. Comput. Stand. Interfaces 81: 103597 (2022) - [j84]Ming Li, Dezhi Han, Dun Li, Han Liu, Chin-Chen Chang:
MFVT: an anomaly traffic detection method merging feature fusion network and vision transformer architecture. EURASIP J. Wirel. Commun. Netw. 2022(1): 39 (2022) - [j83]Zhijie Sun, Dezhi Han, Dun Li, Xiangsheng Wang, Chin-Chen Chang, Zhongdai Wu:
A blockchain-based secure storage scheme for medical information. EURASIP J. Wirel. Commun. Netw. 2022(1): 40 (2022) - [j82]Yuqi Chen, Dezhi Han, Mingming Cui, Zhongdai Wu, Chin-Chen Chang:
ABOS: an attention-based one-stage framework for person search. EURASIP J. Wirel. Commun. Netw. 2022(1): 75 (2022) - [j81]Xiang Lv, Dezhi Han, Dun Li, Lijun Xiao, Chin-Chen Chang:
Network abnormal traffic detection method based on fusion of chord similarity and multiple loss encoder. EURASIP J. Wirel. Commun. Netw. 2022(1): 105 (2022) - [j80]Xiang Shen, Dezhi Han, Chin-Chen Chang, Liang Zong:
Dual Self-Guided Attention with Sparse Question Networks for Visual Question Answering. IEICE Trans. Inf. Syst. 105-D(4): 785-796 (2022) - [j79]Hongzhi Li, Dezhi Han, Mingdong Tang:
A Privacy-Preserving Storage Scheme for Logistics Data With Assistance of Blockchain. IEEE Internet Things J. 9(6): 4704-4720 (2022) - [j78]Chongqing Chen, Dezhi Han, Chin-Chen Chang:
CAAN: Context-Aware attention network for visual question answering. Pattern Recognit. 132: 108980 (2022) - [j77]Xiaojun Mei, Dezhi Han, Nasir Saeed, Huafeng Wu, Chin-Chen Chang, Bin Han, Teng Ma, Jiangfeng Xian:
Trajectory Optimization of Autonomous Surface Vehicles with Outliers for Underwater Target Localization. Remote. Sens. 14(17): 4343 (2022) - [j76]Dun Li, Dezhi Han, Tien-Hsiung Weng, Zibin Zheng, Hongzhi Li, Han Liu, Arcangelo Castiglione, Kuan-Ching Li:
Blockchain for federated learning toward secure distributed machine learning systems: a systemic survey. Soft Comput. 26(9): 4423-4440 (2022) - [j75]Dezhi Han, Nannan Pan, Kuan-Ching Li:
A Traceable and Revocable Ciphertext-Policy Attribute-based Encryption Scheme Based on Privacy Protection. IEEE Trans. Dependable Secur. Comput. 19(1): 316-327 (2022) - [j74]Dezhi Han, Mengxiao Liu, Tien-Hsiung Weng, Canren Tang, Mario Donato Marino, Kuan-Ching Li:
A novel secure DV-Hop localization algorithm against wormhole attacks. Telecommun. Syst. 80(3): 413-430 (2022) - [j73]Xiaohu Huang, Dezhi Han, Tien-Hsiung Weng, Zhongdai Wu, Bing Han, Junxiang Wang, Mingming Cui, Kuan-Ching Li:
A localization algorithm for DV-Hop wireless sensor networks based on manhattan distance. Telecommun. Syst. 81(2): 207-224 (2022) - [j72]Dezhi Han, Yujie Zhu, Dun Li, Wei Liang, Alireza Souri, Kuan-Ching Li:
A Blockchain-Based Auditable Access Control System for Private Data in Service-Centric IoT Environments. IEEE Trans. Ind. Informatics 18(5): 3530-3540 (2022) - [j71]Tabi Fouda Bernard Marie, Yang Bin, Dezhi Han, Bowen An:
A Hybrid Model Integrating MPSE and IGNN for Events Recognition Along Submarine Cables. IEEE Trans. Instrum. Meas. 71: 1-13 (2022) - [j70]Shaokang Cai, Dezhi Han, Dun Li, Zibin Zheng, Noël Crespi:
An reinforcement learning-based speech censorship chatbot system. J. Supercomput. 78(6): 8751-8773 (2022) - [j69]Xiaojun Mei, Dezhi Han, Nasir Saeed, Huafeng Wu, Teng Ma, Jiangfeng Xian:
Range Difference-Based Target Localization Under Stratification Effect and NLOS Bias in UWSNs. IEEE Wirel. Commun. Lett. 11(10): 2080-2084 (2022) - [j68]Ting Zhang, Dezhi Han, Mario Donato Marino, Lin Wang, Kuan-Ching Li:
An Evolutionary-Based Approach for Low-Complexity Intrusion Detection in Wireless Sensor Networks. Wirel. Pers. Commun. 126(3): 2019-2042 (2022) - [c16]Wei Li, Xiantao Jiang, Tian Song, Dezhi Han:
Adaptive Cross Component Linear Model for Chroma Intra-Prediction in VVC. ICCBN 2022: 52-59 - [i4]Zhijie Sun, Dezhi Han, Dun Li, Xiangsheng Wang, Chin-Chen Chang, Zhongdai Wu:
A blockchain-based secure storage scheme for medical information. CoRR abs/2207.06102 (2022) - [i3]Dun Li, Dezhi Han, Benhui Xia, Tien-Hsiung Weng, Arcangelo Castiglione, Kuan-Ching Li:
Fabric-GC: A Blockchain-based Gantt Chart System for Cross-organizational Project Management. CoRR abs/2207.09249 (2022) - [i2]Shaokang Cai, Dezhi Han, Zibin Zheng, Dun Li, Noël Crespi:
A Reinforcement Learning-based Offensive semantics Censorship System for Chatbots. CoRR abs/2207.10569 (2022) - 2021
- [j67]Zihan Guo, Dezhi Han, Francisco Isidro Massetto, Kuan-Ching Li:
Double-layer affective visual question answering network. Comput. Sci. Inf. Syst. 18(1): 155-168 (2021) - [j66]Haiyan Li, Dezhi Han:
Multimodal encoders and decoders with gate attention for visual question answering. Comput. Sci. Inf. Syst. 18(3): 1023-1040 (2021) - [j65]Tingting Xiao, Dezhi Han, Junhui He, Kuan-Ching Li, Rodrigo Fernandes de Mello:
Multi-Keyword ranked search based on mapping set matching in cloud ciphertext storage system. Connect. Sci. 33(1): 95-112 (2021) - [j64]Jiajia Jiao, Libao Wang, Yanxiang Li, Dezhi Han, Min Yao, Kuan-Ching Li, Hai Jiang:
CASH: correlation-aware scheduling to mitigate soft error impact on heterogeneous multicores. Connect. Sci. 33(2): 113-135 (2021) - [j63]Lijun Xiao, Songyou Xie, Dezhi Han, Wei Liang, Jun Guo, Wen-Kuang Chou:
A lightweight authentication scheme for telecare medical information system. Connect. Sci. 33(3): 769-785 (2021) - [j62]Hongzhi Li, Dezhi Han:
A time-aware hybrid recommendation scheme combining content-based and collaborative filtering. Frontiers Comput. Sci. 15(4): 154613 (2021) - [j61]Dezhi Han, Jing Wang, Canren Tang, Tien-Hsiung Weng, Kuan-Ching Li, Ciprian Dobre:
A multi-objective distance vector-hop localization algorithm based on differential evolution quantum particle swarm optimization. Int. J. Commun. Syst. 34(14) (2021) - [j60]Kun Bi, Dezhi Han, Guichen Zhang, Kuan-Ching Li, Aniello Castiglione:
K maximum probability attack paths generation algorithm for target nodes in networked systems. Int. J. Inf. Sec. 20(4): 535-551 (2021) - [j59]Peng Chen, Dezhi Han, Tien-Hsiung Weng, Kuan-Ching Li, Arcangelo Castiglione:
A novel Byzantine fault tolerance consensus for Green IoT with intelligence based on reinforcement. J. Inf. Secur. Appl. 59: 102821 (2021) - [j58]Han Liu, Dezhi Han, Dun Li:
Behavior analysis and blockchain based trust management in VANETs. J. Parallel Distributed Comput. 151: 61-69 (2021) - [j57]Xu Zhang, Dezhi Han, Chin-Chen Chang:
RDMMFET: Representation of Dense Multimodality Fusion Encoder Based on Transformer. Mob. Inf. Syst. 2021: 2662064:1-2662064:9 (2021) - [j56]Hongzhi Li, Dezhi Han, Mingdong Tang:
Logisticschain: A Blockchain-Based Secure Storage Scheme for Logistics Data. Mob. Inf. Syst. 2021: 8840399:1-8840399:15 (2021) - [j55]Ming Li, Dezhi Han, Xinming Yin, Han Liu, Dun Li:
Design and Implementation of an Anomaly Network Traffic Detection Model Integrating Temporal and Spatial Features. Secur. Commun. Networks 2021: 7045823:1-7045823:15 (2021) - [j54]Xiaohu Huang, Dezhi Han, Mingming Cui, Guanghan Lin, Xinming Yin:
Three-Dimensional Localization Algorithm Based on Improved A* and DV-Hop Algorithms in Wireless Sensor Network. Sensors 21(2): 448 (2021) - [j53]Hongzhi Li, Dezhi Han, Mingdong Tang:
A Privacy-Preserving Charging Scheme for Electric Vehicles Using Blockchain and Fog Computing. IEEE Syst. J. 15(3): 3189-3200 (2021) - [j52]Hongzhi Li, Dezhi Han:
A Novel Time-Aware Hybrid Recommendation Scheme Combining User Feedback and Collaborative Filtering. IEEE Syst. J. 15(4): 5301-5312 (2021) - [j51]Dezhi Han, Shuli Zhou, Kuan-Ching Li, Rodrigo Fernandes de Mello:
Cross-modality co-attention networks for visual question answering. Soft Comput. 25(7): 5411-5421 (2021) - [j50]Qiuting Tian, Dezhi Han, Meng-Yen Hsieh, Kuan-Ching Li, Arcangelo Castiglione:
A two-stage intrusion detection approach for software-defined IoT networks. Soft Comput. 25(16): 10935-10951 (2021) - [c15]Han Liu, Dezhi Han:
Non-interactive Zero Knowledge Proof Based Access Control in Information-Centric Internet of Things. ICA3PP (2) 2021: 617-631 - [c14]Yujie Zhu, Dezhi Han, Xinming Yin:
A hierarchical network intrusion detection model based on unsupervised clustering. MEDES 2021: 22-29 - [i1]Dun Li, Dezhi Han, Noël Crespi, Roberto Minerva, Zhijie Sun:
Fabric-SCF: A Blockchain-based Secure Storage and Access Control Scheme for Supply Chain Finance. CoRR abs/2111.13538 (2021) - 2020
- [j49]Han Liu, Dezhi Han, Dun Li:
Fabric-iot: A Blockchain-Based Access Control System in IoT. IEEE Access 8: 18207-18218 (2020) - [j48]Peng Chen, Dezhi Han, Fuxiao Tan, Jun Wang:
Reinforcement-Based Robust Variable Pitch Control of Wind Turbines. IEEE Access 8: 20493-20502 (2020) - [j47]Chongqing Chen, Dezhi Han, Jun Wang:
Multimodal Encoder-Decoder Attention Networks for Visual Question Answering. IEEE Access 8: 35662-35671 (2020) - [j46]Canren Tang, Dezhi Han:
A Low Resource Consumption Clone Detection Method for Multi-Base Station Wireless Sensor Networks. IEEE Access 8: 128349-128361 (2020) - [j45]Lijun Xiao, Dezhi Han, Xiangwei Meng, Wei Liang, Kuan-Ching Li:
A Secure Framework for Data Sharing in Private Blockchain-Based WBANs. IEEE Access 8: 153956-153968 (2020) - [j44]Peng Chen, Dezhi Han, Kuan-Ching Li:
Robust Adaptive Control of Maximum Power Point Tracking for Wind Power System. IEEE Access 8: 214538-214550 (2020) - [j43]Qiuting Tian, Dezhi Han, Kuan-Ching Li, XingAo Liu, Letian Duan, Arcangelo Castiglione:
An intrusion detection approach based on improved deep belief network. Appl. Intell. 50(10): 3162-3178 (2020) - [j42]Jing Xu, Dezhi Han, Kuan-Ching Li, Hai Jiang:
A K-means algorithm based on characteristics of density applied to network intrusion detection. Comput. Sci. Inf. Syst. 17(2): 665-687 (2020) - [j41]Jiajia Jiao, Dezhi Han:
Mitigating multi-cell upsets impacts on approximate network on chip through unequal message protection. IEICE Electron. Express 17(7): 20200056 (2020) - [j40]Xue Lu, Dezhi Han, Letian Duan, Qiuting Tian:
Intrusion detection of wireless sensor networks based on IPSO algorithm and BP neural network. Int. J. Comput. Sci. Eng. 22(2/3): 221-232 (2020) - [j39]Jing Wang, Dezhi Han:
Design of network intrusion detection system based on parallel DPC clustering algorithm. Int. J. Embed. Syst. 13(3): 318-327 (2020) - [j38]Tabi Fouda Bernard Marie, Dezhi Han, Bowen An, Xiangzhi Chen:
Research and Software Design of an Φ-OTDR-Based Optical Fiber Vibration Recognition Algorithm. J. Electr. Comput. Eng. 2020: 5720695:1-5720695:13 (2020) - [j37]Hongzhi Li, Dezhi Han:
A Novel Time-Aware Hybrid Recommendation Scheme Combining User Feedback and Collaborative Filtering. Mob. Inf. Syst. 2020: 8896694:1-8896694:16 (2020) - [j36]Dezhi Han, Yunping Yu, Kuan-Ching Li, Rodrigo Fernandes de Mello:
Enhancing the Sensor Node Localization Algorithm Based on Improved DV-Hop and DE Algorithms in Wireless Sensor Networks. Sensors 20(2): 343 (2020) - [j35]Shirong He, Dezhi Han:
An Effective Dense Co-Attention Networks for Visual Question Answering. Sensors 20(17): 4897 (2020) - [j34]Xinming Yin, Junhui He, Yi Guo, Dezhi Han, Kuan-Ching Li, Arcangelo Castiglione:
An Efficient Two-Factor Authentication Scheme Based on the Merkle Tree. Sensors 20(20): 5735 (2020) - [j33]Zihan Guo, Dezhi Han:
Multi-Modal Explicit Sparse Attention Networks for Visual Question Answering. Sensors 20(23): 6758 (2020) - [j32]Junhui He, Dezhi Han, Kuan-Ching Li:
On one-time cookies protocol based on one-time password. Soft Comput. 24(8): 5657-5670 (2020) - [j31]Wenjie Zhang, Dezhi Han, Kuan-Ching Li, Francisco Isidro Massetto:
Wireless sensor network intrusion detection system based on MK-ELM. Soft Comput. 24(16): 12361-12374 (2020) - [j30]Jun Wang, Dezhi Han, Jiangling Yin, Xiaobo Zhou, Changjun Jiang:
ODDS: Optimizing Data-Locality Access for Scientific Data Analysis. IEEE Trans. Cloud Comput. 8(1): 220-231 (2020) - [j29]Mingming Cui, Dezhi Han, Jun Wang, Kuan-Ching Li, Chin-Chen Chang:
ARFV: An Efficient Shared Data Auditing Scheme Supporting Revocation for Fog-Assisted Vehicular Ad-Hoc Networks. IEEE Trans. Veh. Technol. 69(12): 15815-15827 (2020) - [c13]Han Liu, Dezhi Han, Dun Li:
Blockchain Based Trust Management in Vehicular Networks. BlockSys 2020: 333-346 - [c12]Dun Li, Dezhi Han, Han Liu:
Fabric-Chain & Chain: A Blockchain-Based Electronic Document System for Supply Chain Finance. BlockSys 2020: 601-608
2010 – 2019
- 2019
- [j28]Hongzhi Li, Dezhi Han:
EduRSS: A Blockchain-Based Educational Records Secure Storage and Sharing Scheme. IEEE Access 7: 179273-179289 (2019) - [j27]Letian Duan, Dezhi Han, Qiuting Tian:
Design of intrusion detection system based on improved ABC_elite and BP neural networks. Comput. Sci. Inf. Syst. 16(3): 773-795 (2019) - [j26]Qiuting Tian, Dezhi Han, Yanmei Jiang:
Hierarchical authority based weighted attribute encryption scheme. Comput. Sci. Inf. Syst. 16(3): 797-813 (2019) - [j25]Xixi Yan, Hao Ni, Yuan Liu, Dezhi Han:
Privacy-preserving multi-authority attribute-based encryption with dynamic policy updating in PHR. Comput. Sci. Inf. Syst. 16(3): 831-847 (2019) - [j24]Xueshan Yu, Dezhi Han, Zhenxin Du, Qiuting Tian, Gongjun Yin:
Design of DDoS attack detection system based on intelligent bee colony algorithm. Int. J. Comput. Sci. Eng. 19(2): 223-232 (2019) - [j23]Qiuting Tian, Dezhi Han, XingAo Liu, Xueshan Yu:
LWE-based multi-authority attribute-based encryption scheme with hidden policies. Int. J. Comput. Sci. Eng. 19(2): 233-241 (2019) - [j22]Fucheng Pan, Dezhi Han, Yuping Hu:
Design and application of real-time network abnormal traffic detection system based on Spark Streaming. Int. J. Embed. Syst. 11(5): 562-572 (2019) - [j21]Qiuting Tian, Dezhi Han, Zhenxin Du:
DDoS attack detection based on global unbiased search strategy bee colony algorithm and artificial neural network. Int. J. Embed. Syst. 11(5): 584-593 (2019) - [j20]Mingming Cui, Dezhi Han, Jun Wang:
An Efficient and Safe Road Condition Monitoring Authentication Scheme Based on Fog Computing. IEEE Internet Things J. 6(5): 9076-9084 (2019) - [j19]Zhenxin Du, Dezhi Han, Kuan-Ching Li:
Improving the performance of feature selection and data clustering with novel global search and elite-guided artificial bee colony algorithm. J. Supercomput. 75(8): 5189-5226 (2019) - [j18]Jian Zhou, Dezhi Han, Jun Wang, Xiaobo Zhou, Changjun Jiang:
A Correlation-Aware Page-Level FTL to Exploit Semantic Links in Workloads. IEEE Trans. Parallel Distributed Syst. 30(4): 723-737 (2019) - [c11]Dun Li, Dezhi Han, Xiaofeng Zhang, Li Zhang:
Panoramic image mosaic technology based on SIFT algorithm in power monitoring. ICSAI 2019: 1329-1333 - 2018
- [j17]Jianxin Jia, Guangzhong Liu, Dezhi Han, Jun Wang:
A Novel Packets Transmission Scheme Based on Software Defined Open Wireless Platform. IEEE Access 6: 17093-17118 (2018) - [j16]Jianxin Jia, Guangzhong Liu, Dezhi Han, Jun Wang:
Towards Studying the Two-Tier Intra-Frequency X2 Handover Based on Software-Defined Open LTE Platform. IEEE Access 6: 39643-39684 (2018) - [j15]Jiajia Jiao, Dezhi Han, Yuzhuo Fu:
A virtual filter based fast assessment methodology for fault tolerant NoCs. IEICE Electron. Express 15(18): 20180655 (2018) - [j14]Jiajia Jiao, JiaBin Wang, Dezhi Han:
A place-aware redundancy methodology for multi-cell upsets mitigation in NoC. IEICE Electron. Express 15(21): 20180777 (2018) - [j13]Xueshan Yu, Dezhi Han, Zhengxin Du:
基于智能蜂群算法的DDoS攻击检测系统 (DDoS Attack Detection System Based on Intelligent Bee Colony Algorithm). 计算机科学 45(12): 123-129 (2018) - [j12]Jun Wang, Xuhong Zhang, Jiangling Yin, Ruijun Wang, Huafeng Wu, Dezhi Han:
Speed Up Big Data Analytics by Unveiling the Storage Distribution of Sub-Datasets. IEEE Trans. Big Data 4(2): 231-244 (2018) - [j11]Dan Huang, Dezhi Han, Jun Wang, Jiangling Yin, Xunchao Chen, Xuhong Zhang, Jian Zhou, Mao Ye:
Achieving Load Balance for Parallel Data Access on Distributed File Systems. IEEE Trans. Computers 67(3): 388-402 (2018) - [j10]Jun Wang, Dezhi Han, Junyao Zhang, Jiangling Yin:
G-SD: Achieving Fast Reverse Lookup using Scalable Declustering Layout in Large-Scale File Systems. IEEE Trans. Cloud Comput. 6(4): 1017-1030 (2018) - [j9]Jun Wang, Dezhi Han, Ruijun Wang:
A new rule-based power-aware job scheduler for supercomputers. J. Supercomput. 74(6): 2508-2527 (2018) - [c10]Jiajia Jiao, Dezhi Han, Yuhao Liu:
Exploiting critical factors for higher education course construction of teaching in a second language: case study of 'computer architecture'. ICETC 2018: 39-43 - [c9]Dan Huang, Jun Wang, Dezhi Han:
Performance Evaluation and Analysis for MPI-Based Data Movement in Virtual Switch Network. NAS 2018: 1-4 - [c8]Jiajia Jiao, Dezhi Han:
A Fast Global AVF Calculation Methodology for Multi-core Reliability Assessment. PDCAT 2018: 63-72 - 2017
- [j8]Zhenxin Du, Dezhi Han, Guangzhong Liu, Jianxin Jia:
An improved artificial bee colony algorithm with elite-guided search equations. Comput. Sci. Inf. Syst. 14(3): 751-767 (2017) - [j7]Dezhi Han, Kun Bi, Han Liu, Jianxin Jia:
A DDoS attack detection system based on spark framework. Comput. Sci. Inf. Syst. 14(3): 769-788 (2017) - [j6]Jianxin Jia, Guangzhong Liu, Dezhi Han:
DANCER: The routing algorithm in delay tolerant networks based on dynamic and polymorphic combination of dimensions and energy consideration. Int. J. Distributed Sens. Networks 13(6) (2017) - [j5]Jun Wang, Xuhong Zhang, Junyao Zhang, Jiangling Yin, Dezhi Han, Ruijun Wang, Dan Huang:
Deister: A light-weight autonomous block management in data-intensive file systems using deterministic declustering distribution. J. Parallel Distributed Comput. 108: 3-13 (2017) - [j4]Ying Zhang, Jun Wang, Dezhi Han, Huafeng Wu, Rundong Zhou:
Fuzzy-Logic Based Distributed Energy-Efficient Clustering Algorithm for Wireless Sensor Networks. Sensors 17(7): 1554 (2017) - 2016
- [j3]Dezhi Han, Kun Bi, Bolin Xie, Lili Huang, Ruijun Wang:
An anomaly detection on the application-layer-based QoS in the cloud storage system. Comput. Sci. Inf. Syst. 13(2): 659-676 (2016) - [j2]Kun Bi, Dezhi Han, Jun Wang:
K maximum probability attack paths dynamic generation algorithm. Comput. Sci. Inf. Syst. 13(2): 677-689 (2016) - [j1]Ying Zhang, Wei Xiong, Dezhi Han, Wei Chen, Jun Wang:
Routing Algorithm with Uneven Clustering for Energy Heterogeneous Wireless Sensor Networks. J. Sensors 2016: 7542907:1-7542907:9 (2016) - [c7]Anne M. Tall, Jun Wang, Dezhi Han:
Survey of data intensive computing technologies application to to security log data management. BDCAT 2016: 268-273 - [c6]Mao Ye, Jun Wang, Jiangling Yin, Dezhi Han:
Taming Big Data Scheduling with Locality-Aware Scheduling. CBD 2016: 37-44 - 2015
- [c5]Jian Zhou, Jun Wang, Fei Wu, Changsheng Xie, Dezhi Han:
On the Cooling of Energy Efficient Storage. NAS 2015: 64-70 - [c4]Xuhong Zhang, Ruijun Wang, Xunchao Chen, Jun Wang, Tyler Lukasiewicz, Dezhi Han:
Achieving up to zero communication delay in BSP-based graph processing via vertex categorization. NAS 2015: 112-121
2000 – 2009
- 2009
- [c3]Yunshan Hou, Dezhi Han:
Fast Algorithm of the ML Estimator for Passive Synthetic Arrays. FSKD (1) 2009: 470-474 - 2004
- [c2]Dezhi Han, Changsheng Xie, Faling Yi:
iNASC: A iSCSI-Based NAS Storage Cluster. GCC Workshops 2004: 195-202 - [c1]Dezhi Han, Changsheng Xie, Qiang Cao:
Research on Security of the United Storage Network. GCC 2004: 364-371
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 20:27 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint