default search action
Sheng Hong
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j32]Tuo Wu, Cunhua Pan, Yijin Pan, Sheng Hong, Hong Ren, Maged Elkashlan, Feng Shu, Jiangzhou Wang:
Joint Angle Estimation Error Analysis and 3-D Positioning Algorithm Design for mmWave Positioning System. IEEE Internet Things J. 11(2): 2181-2197 (2024) - [j31]Sheng Hong, Junjie He, Xinhu Zheng, Chunran Zheng:
LIV-GaussMap: LiDAR-Inertial-Visual Fusion for Real-Time 3D Radiance Field Map Rendering. IEEE Robotics Autom. Lett. 9(11): 9765-9772 (2024) - [j30]Sheng Hong, Cunhua Pan, Gui Zhou, Hong Ren, Kezhi Wang:
Outage Constrained Robust Transmission Design for IRS-Aided Secure Communications With Direct Communication Links. IEEE Trans. Commun. 72(3): 1548-1564 (2024) - [c25]Zhiwei Wang, An Li, Sheng Hong, Peiling Shuai:
Joint Beamforming and Phase-Shifting Optimization for STAR-RIS Assisted Secure Communication. ICC Workshops 2024: 1992-1997 - [i4]Sheng Hong, Junjie He, Xinhu Zheng, Hesheng Wang, Hao Fang, Kangcheng Liu, Chunran Zheng, Shaojie Shen:
LIV-GaussMap: LiDAR-Inertial-Visual Fusion for Real-time 3D Radiance Field Map Rendering. CoRR abs/2401.14857 (2024) - 2023
- [j29]Yuning Zheng, Sheng Hong, Jun Wang, Yuejiao Zhang, Bin Zhang:
Research on mapping algorithm of distributed virtual storage space based on digital certificate authentication. J. Ambient Intell. Humaniz. Comput. 14(6): 7247-7254 (2023) - [c24]An Li, Tao Guo, Qingqing Wu, Zhiwei Wang, Liyan Yan, Sheng Hong:
Secure IRS-Aided Cognitive UAV Communications. ICCT 2023: 1468-1473 - [c23]Sheng Hong, Yizhong Lai, Yuzhou Li, Yang You, Shuai Ou, Fei Han, Tiejun Wu:
A Reference Model for Information Security Applications of Generative Adversarial Network Variants. ICCVIT 2023: 7:1-7:8 - [c22]Sheng Hong, Yuchen Xiao, Hongwei Yin, Ziyun Yu:
A Security Feature Extraction Method for RF Amplifier Module of 5G Base Station. ICCVIT 2023: 10:1-10:5 - [c21]Sheng Hong, Wenhao Wang, Hongwei Yin, Ziyun Yu:
Research on Intelligent Maintenance Technology for Industrial Internet Equipment. ICCVIT 2023: 40:1-40:5 - [c20]Sheng Hong, Chunran Zheng, Huan Yin, Shaojie Shen:
Rollvox: Real-Time and High-Quality LiDAR Colorization with Rolling Shutter Camera. IROS 2023: 7195-7201 - [c19]Yineng Li, Qinghua Zeng, Ziqi Jin, Sheng Hong, Bowen Li, Xiaorong Sun:
Research on Rough Scene Matching Navigation Method Based on Semantic Bag of Words Model. ISCSIC 2023: 79-83 - [c18]Ke Li, Sheng Hong, Cai Fu, Yunhe Zhang, Ming Liu:
Discriminating Human-authored from ChatGPT-Generated Code Via Discernable Feature Analysis. ISSREW 2023: 120-127 - [c17]Sheng Hong, Pengzhen Xu, Junhong Zeng, Mengdan Liang:
Channel Model Mismatch Analysis for 3D Positioning in Massive-MIMO Systems. WCSP 2023: 396-401 - [i3]Ke Li, Sheng Hong, Cai Fu, Yunhe Zhang, Ming Liu:
Deciphering the Code: Distinguishing ChatGPT-Generated Code from Human-authored Code through Discriminative Feature Analysis and Dataset Optimization. CoRR abs/2306.14397 (2023) - 2022
- [j28]Sheng Hong, Tianyu Yue, Hao Liu:
Vehicle energy system active defense: A health assessment of lithium-ion batteries. Int. J. Intell. Syst. 37(12): 10081-10099 (2022) - [j27]Cunhua Pan, Gui Zhou, Kangda Zhi, Sheng Hong, Tuo Wu, Yijin Pan, Hong Ren, Marco Di Renzo, A. Lee Swindlehurst, Rui Zhang, Yingjun Angela Zhang:
An Overview of Signal Processing Techniques for RIS/IRS-Aided Wireless Systems. IEEE J. Sel. Top. Signal Process. 16(5): 883-917 (2022) - [j26]Zhouyao Zheng, Sheng Hong, Haijun Deng, Zhongqin Li, Shuang Jin, Xingwei Chen, Lu Gao, Ying Chen, Meibing Liu, Pingping Luo:
Impact of Elevation-Dependent Warming on Runoff Changes in the Headwater Region of Urumqi River Basin. Remote. Sens. 14(8): 1780 (2022) - [c16]Yu Liu, Sheng Hong, Cunhua Pan, Yinlu Wang, Yijin Pan, Ming Chen:
Cramér-Rao Lower Bound Analysis of Multiple-RIS-Aided mmWave Positioning Systems. PIMRC 2022: 1110-1115 - [c15]Fengming Yang, Jianxin Dai, Cunhua Pan, Sheng Hong, Hong Ren, Kezhi Wang:
Robust Beamforming Design for RIS-Aided NOMA Networks With Imperfect Channels. VTC Spring 2022: 1-6 - 2021
- [j25]Sheng Hong, Yining Zeng:
A health assessment framework of lithium-ion batteries for cyber defense. Appl. Soft Comput. 101: 107067 (2021) - [j24]Jie Yin, Liang Guo, Wei Jiang, Sheng Hong, Jie Yang:
ShuffleNet-inspired lightweight neural network design for automatic modulation classification methods in ubiquitous IoT cyber-physical systems. Comput. Commun. 176: 249-257 (2021) - [j23]Shan Ai, Sheng Hong, Xinyang Zheng, Yue Wang, Xiaozhang Liu:
CSRT rumor spreading model based on complex network. Int. J. Intell. Syst. 36(5): 1903-1913 (2021) - [j22]Sheng Hong, Cunhua Pan, Hong Ren, Kezhi Wang, Kok Keong Chai, Arumugam Nallanathan:
Robust Transmission Design for Intelligent Reflecting Surface-Aided Secure Communication Systems With Imperfect Cascaded CSI. IEEE Trans. Wirel. Commun. 20(4): 2487-2501 (2021) - [c14]Gui Zhou, Cunhua Pan, Hong Ren, Kangda Zhi, Sheng Hong, Kok Keong Chai:
User Cooperation for RIS-aided Secure SWIPT MIMO Systems under the passive eavesdropping. ICCC Workshops 2021: 171-176 - 2020
- [j21]Jie Shi, Sheng Hong, Changxin Cai, Yu Wang, Hao Huang, Guan Gui:
Deep Learning-Based Automatic Modulation Recognition Method in the Presence of Phase Offset. IEEE Access 8: 42841-42847 (2020) - [j20]Sheng Hong, Yantao Dong, Rui Xie, Yu Ai, Yuhao Wang:
Constrained Transmit Beampattern Design Using a Correlated LFM-PC Waveform Set in MIMO Radar. Sensors 20(3): 773 (2020) - [j19]Sheng Hong, Cunhua Pan, Hong Ren, Kezhi Wang, Arumugam Nallanathan:
Artificial-Noise-Aided Secure MIMO Wireless Communications via Intelligent Reflecting Surface. IEEE Trans. Commun. 68(12): 7851-7866 (2020) - [c13]Sheng Hong, Cunhua Pan, Hong Ren, Kezhi Wang, Arumugam Nallanathan, Haimeng Li:
Robust Transmission Design for Intelligent Reflecting Surface Aided Secure Communications. GLOBECOM 2020: 1-6 - [c12]Hao Gu, Yu Wang, Sheng Hong, Yongjun Xu, Guan Gui:
Deep Learning based Intelligent Recognition Method in Heterogeneous Communication Networks. ICCC 2020: 478-482 - [c11]Sheng Hong, Yining Zeng:
A New Health Assessment Approach of Lithium-Ion Batteries Under Variable Operation Conditions. ML4CS (2) 2020: 190-200 - [c10]Sheng Hong, Tianyu Yue:
Health Evaluation of Lithium Ion Battery Based on Weighted Kalman Filter Algorithm. ML4CS (2) 2020: 201-213 - [c9]Min Lv, Cong Lin, Tianran Ma, Sheng Hong:
Performance Evaluation of Multirotor UAV by Considering the Balanced Pattern. ML4CS (2) 2020: 452-462 - [c8]Sheng Hong, Yue Wang:
Attack and Repair Strategies for Computer Network About Viruses. ML4CS (1) 2020: 500-510 - [c7]Na Pang, Sheng Hong, Yang Pan, Yuqi Ji:
Efficient Defense Against Adversarial Attacks and Security Evaluation of Deep Learning System. ML4CS (2) 2020: 592-602 - [c6]Sheng Hong, Yu Wang, Yuwen Pan, Hao Gu, Miao Liu, Jie Yang, Guan Gui:
Convolutional Neural Network Aided Signal Modulation Recognition in OFDM Systems. VTC Spring 2020: 1-5 - [i2]Sheng Hong, Cunhua Pan, Hong Ren, Kezhi Wang, Arumugam Nallanathan:
Artificial-Noise-Aided Secure MIMO Wireless Communications via Intelligent Reflecting Surface. CoRR abs/2002.07063 (2020) - [i1]Sheng Hong, Cunhua Pan, Hong Ren, Kezhi Wang, Kok Keong Chai, Arumugam Nallanathan:
Robust Transmission Design for Intelligent Reflecting Surface Aided Secure Communication Systems with Imperfect Cascaded CSI. CoRR abs/2004.11580 (2020)
2010 – 2019
- 2019
- [j18]Yingyi Sun, Xianfeng Mao, Sheng Hong, Wenhua Xu, Guan Gui:
Template Matching-Based Method for Intelligent Invoice Information Identification. IEEE Access 7: 28392-28401 (2019) - [j17]Yingyi Sun, Wei Zhang, Hao Gu, Chao Liu, Sheng Hong, Wenhua Xu, Jie Yang, Guan Gui:
Convolutional Neural Network Based Models for Improving Super-Resolution Imaging. IEEE Access 7: 43042-43051 (2019) - [j16]Yue Yin, Wei Zhang, Sheng Hong, Jie Yang, Jian Xiong, Guan Gui:
Deep Learning-Aided OCR Techniques for Chinese Uppercase Characters in the Application of Internet of Things. IEEE Access 7: 47043-47049 (2019) - [j15]Hao Gu, Yu Wang, Sheng Hong, Guan Gui:
Blind Channel Identification Aided Generalized Automatic Modulation Recognition Based on Deep Learning. IEEE Access 7: 110722-110729 (2019) - [j14]Sheng Hong, Yibin Zhang, Yu Wang, Hao Gu, Guan Gui, Hikmet Sari:
Deep Learning-Based Signal Modulation Identification in OFDM Systems. IEEE Access 7: 114631-114638 (2019) - [c5]Hao Gu, Yu Wang, Sheng Hong, Guan Gui:
Deep Learning Aided Friendly Coexistence of WiFi and LTE in Unlicensed Bands. WCSP 2019: 1-5 - 2018
- [j13]Sheng Hong, Fuhui Zhou, Yantao Dong, Zhixin Zhao, Yuhao Wang, Maosong Yan:
Chaotic Phase-Coded Waveforms With Space-Time Complementary Coding for MIMO Radar Applications. IEEE Access 6: 42066-42083 (2018) - [j12]Lei Ren, Li Zhao, Sheng Hong, Shiqiang Zhao, Hao Wang, Lin Zhang:
Remaining Useful Life Prediction for Lithium-Ion Battery: A Deep Learning Approach. IEEE Access 6: 50587-50598 (2018) - [j11]Kan Hong, Guodong Liu, Wentao Chen, Sheng Hong:
Classification of the emotional stress and physical stress using signal magnification and canonical correlation analysis. Pattern Recognit. 77: 140-149 (2018) - [c4]Sheng Hong, Jiawei Yin:
Remaining Useful Life Prediction of Bearing Based on Deep Perceptron Neural Networks. BDIOT 2018: 175-179 - 2017
- [j10]Zhixin Zhao, Xinhua Zhou, Sihang Zhu, Sheng Hong:
Reduced Complexity Multipath Clutter Rejection Approach for DRM-Based HF Passive Bistatic Radar. IEEE Access 5: 20228-20234 (2017) - [j9]Rui Xie, Xianrong Wan, Sheng Hong, Jianxin Yi:
Joint Optimization of Receiver Placement and Illuminator Selection for a Multiband Passive Radar Network. Sensors 17(6): 1378 (2017) - 2016
- [j8]Sheng Hong, Hongqi Yang, Tingdi Zhao, Xiaomin Ma:
Epidemic spreading model of complex dynamical network with the heterogeneity of nodes. Int. J. Syst. Sci. 47(11): 2745-2752 (2016) - [j7]Kan Hong, Sheng Hong:
Real-time stress assessment using thermal imaging. Vis. Comput. 32(11): 1369-1377 (2016) - 2015
- [j6]Sheng Hong, Xianrong Wan, Hengyu Ke:
Spatial difference smoothing for coherent sources location in MIMO radar. Signal Process. 109: 69-83 (2015) - 2014
- [j5]Sheng Hong, Hongqi Yang, Enrico Zio, Ning Huang:
A novel dynamics model of fault propagation and equilibrium analysis in complex dynamical communication network. Appl. Math. Comput. 247: 1021-1029 (2014) - [j4]Sheng Hong, Zheng Zhou, Enrico Zio, Kan Hong:
Condition assessment for the performance degradation of bearing based on a combinatorial feature extraction method. Digit. Signal Process. 27: 159-166 (2014) - [j3]Sheng Hong, Zheng Zhou, Enrico Zio, Wenbin Wang:
An adaptive method for health trend prediction of rotating bearings. Digit. Signal Process. 35: 117-123 (2014) - 2012
- [c3]Sheng Hong, Zheng Zhou:
Remaining useful life prognosis of bearing based on Gauss process regression. BMEI 2012: 1575-1579 - [c2]Ying Li, Sheng Hong, Jun Huang, Song Mo:
The new environment model building method of penetration mission based on the artificial potential field approach. CogSIMA 2012: 121-125 - 2011
- [j2]Shuliang Gao, Sheng Hong, Cheng Gao, Dong Zhang, Zhigang Huang, Hailiang Wang:
The high-accuracy ionosphere correcting algorithm for GNSS signals based on kalman filter. IEICE Electron. Express 8(5): 266-272 (2011)
2000 – 2009
- 2009
- [j1]Sheng Hong, Dongkai Yang, Kefei Liu, Xiaoxiang He, Manos M. Tentzeris:
Robust passive beamformer using bridge function sequences as weights. IEICE Electron. Express 6(16): 1192-1198 (2009) - 2007
- [c1]Yun-Sheng Yen, Sheng Hong, Ruay-Shiung Chang, Han-Chieh Chao:
An Energy Efficient and Coverage Guaranteed Wireless Sensor Network. WCNC 2007: 2923-2928
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 21:25 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint