Sign in
Fang Zuo
ORCID
Publication Activity (10 Years)
Years Active: 2012-2024
Publications (10 Years): 16
Top Topics
Iron Ore
Privacy Preserving
Differential Privacy
Convolutional Network
Top Venues
WISA
CWSN
Future Gener. Comput. Syst.
IEEE Internet Things J.
</>
Publications
</>
Jingsen Liu
,
Yang Chen
,
Xiaoyu Liu
,
Fang Zuo
,
Huan Zhou
An efficient manta ray foraging optimization algorithm with individual information interaction and fractional derivative mutation for solving complex function extremum and engineering design problems.
Appl. Soft Comput.
150 (2024)
Wei Gong
,
Linxiao Cao
,
Yifei Zhu
,
Fang Zuo
,
Xin He
,
Haoquan Zhou
Federated Inverse Reinforcement Learning for Smart ICUs With Differential Privacy.
IEEE Internet Things J.
10 (21) (2023)
Wenming Liu
,
Rui Zhai
,
Fang Zuo
A Vulnerability Threat Assessment Model Based on Bayesian Networks.
CAIBDA
(2023)
Fang Zuo
,
Yajie Li
,
Guanghui Wang
,
Xin He
Towards accurate and privacy-preserving localization using anchor quality assessment in Internet of Things.
Future Gener. Comput. Syst.
148 (2023)
Guanghui Wang
,
Xiaolin Huang
,
Xueyuan Zhang
,
Geyuan Liu
,
Fang Zuo
Design and Analysis of Secure Localization Against Vulnerability-Induced Attack for Internet of Things.
ICCC Workshops
(2023)
Xiuli Chai
,
Xiuhui Chen
,
Yakun Ma
,
Fang Zuo
,
Zhihua Gan
,
Yushu Zhang
TPE-H2MWD: an exact thumbnail preserving encryption scheme with hidden Markov model and weighted diffusion.
Frontiers Inf. Technol. Electron. Eng.
24 (8) (2023)
Jinbo Li
,
Guanghui Wang
,
Fang Zuo
,
Xin He
Highway Accident Localization Based on Virtual Fence for Intelligent Transportation Systems.
WISA
(2022)
Guanghui Wang
,
Yifan Xu
,
Jianping He
,
Jianping Pan
,
Fang Zuo
,
Xin He
Resilient Participant Selection Under Vulnerability Induced Colluding Attacks for Crowdsourcing.
IEEE Trans. Veh. Technol.
71 (7) (2022)
Mingyuan Gao
,
Fang Zuo
,
Guanghui Wang
Efficient Differential Privacy Federated Learning Mechanism for Intelligent Selection of Optimal Privacy Protection Levels.
WISA
(2022)
Zhiyu Wang
,
Xulun Hu
,
Fang Zuo
,
Hong Li
,
Yiran Zhang
,
Weifeng Wang
A Graph Neural Network Based Model for IoT Binary Components Similarity Detection.
CWSN
(2022)
Jiameng Liu
,
Fang Zuo
,
Guanghui Wang
An Improved Monte Carlo Denoising Algorithm Based on Kernel-Predicting Convolutional Network.
WISA
(2022)
Weifeng Wang
,
Peipei Liu
,
Zhiyu Wang
,
Yimo Ren
,
Hong Li
,
Fang Zuo
Automatic Construction of Large-Scale IoT Datasets with Multi-strategy Fusion.
CWSN
(2022)
Ying Wang
,
Zhengyang Hao
,
Fang Zuo
,
Zixiang Su
Fabric Defect Target Detection Algorithm Based on YOLOv4 Improvement.
WISA
(2021)
Chengzong Li
,
Rui Zhai
,
Fang Zuo
,
Junyang Yu
,
Libo Zhang
Mixed Multi-channel Graph Convolution Network on Complex Relation Graph.
WISA
(2021)
Yajie Li
,
Guanghui Wang
,
Fang Zuo
Efficient Privacy Preserving Single Anchor Localization Using Noise-Adding Mechanism for Internet of Things.
WISA
(2021)
ShenYao Sun
,
Xianji Wang
,
Fang Zuo
RPCC: A Replica Placement Method to Alleviate the Replica Consistency under Dynamic Cloud.
iThings/GreenCom/CPSCom/SmartData/Cybermatics
(2020)
Fang Zuo
,
Wei Zhang
A group strategy-proof incentive approach for eliminating selfish behaviors in peer-to-peer file allocation.
Int. J. Commun. Syst.
27 (12) (2014)
Fang Zuo
,
Wei Zhang
An Evolutionary Game-Based Mechanism for Routing P2P Network Flow among Selfish Peers.
J. Networks
9 (1) (2014)
Fang Zuo
,
Wei Zhang
An Auction Based Distribute Mechanism for P2P Adaptive Bandwidth Allocation.
IEICE Trans. Inf. Syst.
(12) (2013)
Fang Zuo
,
Wei Zhang
A Game Theoretic Schema for Overcoming Selfish Allocation in P2P File Application.
CIT
(2012)
Fang Zuo
,
Wei Zhang
Selfish allocation avoidance for P2P file application: A game theoretic approach.
ICON
(2012)