


default search action
Zhaohui Tang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Zhaohui Tang 0001
— University of Southern Queensland, Toowoomba, QLD, Australia - Zhaohui Tang 0002
— Inner Mongolia Agricultural University, Hohhot, China - Zhaohui Tang 0003
— Central South University, Changsha, China - Zhaohui Tang 0004
— Central South University, Changsha, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[j15]Wencheng Yang, Song Wang, Di Wu, Taotao Cai, Yanming Zhu, Shicheng Wei, Yi-Ying Zhang, Xu Yang, Zhaohui Tang, Yan Li:
Deep learning model inversion attacks and defenses: a comprehensive survey. Artif. Intell. Rev. 58(8): 242 (2025)
[j14]Cheng Peng, Yanyan Sheng, Weihua Gui, Zhaohui Tang, Longxin Zhang, Xinpan Yuan:
Bearing fault diagnosis based on multimodal knowledge graphs under few-shot samples. Knowl. Based Syst. 330: 114604 (2025)
[c11]Cheng Peng, Cheng Deng, Yuanyuan Zhao, Mingxi Wang, Zhaohui Tang, Weihua Gui:
DSH-RUL: A Dual-Stage Hybrid Framework for Remaining Useful Life Prediction of Rolling Bearings. ICIC (16) 2025: 303-315- 2024
[j13]Xiwen Zhang
, Chuanzhong Xuan
, Yanhua Ma, Zhaohui Tang, Jiahe Cui, Haoyu Zhang:
High-similarity sheep face recognition method based on a Siamese network with fewer training samples. Comput. Electron. Agric. 225: 109295 (2024)
[j12]Xiwen Zhang
, Chuanzhong Xuan
, Yanhua Ma, Zhaohui Tang, Xinyu Gao
:
An efficient method for multi-view sheep face recognition. Eng. Appl. Artif. Intell. 134: 108697 (2024)- 2023
[j11]Cheng Peng, Yuanyuan Zhao, Changyun Li, Zhaohui Tang, Weihua Gui:
A Multi-Featured Factor Analysis and Dynamic Window Rectification Method for Remaining Useful Life Prognosis of Rolling Bearings. Entropy 25(11): 1539 (2023)
[j10]Wencheng Yang
, Song Wang
, Hui Cui, Zhaohui Tang, Yan Li:
A Review of Homomorphic Encryption for Privacy-Preserving Biometrics. Sensors 23(7): 3566 (2023)
[j9]Cheng Peng
, Xin Hu, Zhaohui Tang:
Turbofan Engine Health Assessment Based on Spatial-Temporal Similarity Calculation. Sensors 23(24): 9748 (2023)- 2022
[j8]Wenhui Xiao, Zhaohui Tang, Ce Yang, Wei Liang
, Meng-Yen Hsieh:
ASM-VoFDehaze: a real-time defogging method of zinc froth image. Connect. Sci. 34(1): 709-731 (2022)
[j7]Cheng Peng
, Jiaqi Wu, Qilong Wang, Weihua Gui, Zhaohui Tang:
Remaining Useful Life Prediction Using Dual-Channel LSTM with Time Feature and Its Difference. Entropy 24(12): 1818 (2022)
[j6]Wenhui Xiao, Zhaohui Tang, Jinping Liu:
Spatial-temporal joint zinc flotation froth image denoising based on bubble dynamic features. Int. J. Embed. Syst. 15(2): 108-118 (2022)
[p1]Sye Loong Keoh, Heng Chuan Tan, Zhaohui Tang:
Authentication and Integrity Protection for Real-Time Cyber-Physical Systems. Handbook of Real-Time Computing 2022: 569-590- 2021
[j5]Ziwei Deng, Zhuoyue Wang, Zhaohui Tang, Keke Huang, Hongqiu Zhu:
A deep transfer learning method based on stacked autoencoder for cross-domain fault diagnosis. Appl. Math. Comput. 408: 126318 (2021)- 2020
[j4]Cheng Peng
, Zhaohui Tang, Weihua Gui, Qing Chen, Longxin Zhang, Xinpan Yuan, Xiaojun Deng:
Review of Key Technologies and Progress in Industrial Equipment Health Management. IEEE Access 8: 151764-151776 (2020)
[j3]Cheng Peng, Qing Chen, Xiaohong Zhou, Songsong Wang, Zhaohui Tang:
Wind turbine blades icing failure prognosis based on balanced data and improved entropy. Int. J. Sens. Networks 34(2): 126-135 (2020)
[c10]Zhaohui Tang, Sye Loong Keoh:
An Efficient Scheme to Secure Data Provenance in Home Area Networks. 5G World Forum 2020: 115-120
2010 – 2019
- 2019
[c9]Cheng Peng, Zhaohui Tang, Qing Chen, Songsong Wang, Xiaohong Zhou, Hao Chi:
Short-Term Prediction of Generator Blade Ice Fault Based on Multi-AN. CBD 2019: 291-296
[c8]Ying Fan, Zhaohui Tang, Guoyong Zhang, Jin Luo:
Abnormally detection based on feature similarity measure of image time series in zinc flotation. SSCI 2019: 1115-1118- 2018
[c7]Xinxing Zhao
, Chandra Sekar Veerappan, Peter K. K. Loh, Zhaohui Tang, Forest Tan:
Multi-Agent Cross-Platform Detection of Meltdown and Spectre Attacks. ICARCV 2018: 1834-1838
[c6]Joshua Ng, Sye Loong Keoh
, Zhaohui Tang, Hajoon Ko:
SEABASS: Symmetric-keychain encryption and authentication for building automation systems. WF-IoT 2018: 219-224
[c5]Heng Chuan Tan
, Kelvin Lim, Sye Loong Keoh
, Zhaohui Tang, David Leong, Chin-Sean Sum:
Chameleon: A blind double trapdoor hash function for securing AMI data aggregation. WF-IoT 2018: 225-230
[c4]Chandra Sekar Veerappan, Peter Kok Keong Loh, Zhaohui Tang, Forest Tan:
Taxonomy on malware evasion countermeasures techniques. WF-IoT 2018: 558-563- 2017
[c3]Ming Hong Chia, Sye Loong Keoh
, Zhaohui Tang:
Secure Data Provenance in Home Energy Monitoring Networks. ICSS 2017: 7-14- 2015
[j2]Zhaohui Tang:
Homomorphic authentication codes for network coding. Concurr. Comput. Pract. Exp. 27(15): 3892-3911 (2015)
[c2]Sye Loong Keoh, Yi Han Ang, Zhaohui Tang:
A lightweight privacy-preserved spatial and temporal aggregation of energy data. IAS 2015: 1-6- 2014
[j1]Yifei Tong, Zhaohui Tang, Kaijun Zhou, Ying Dong:
A service oriented manufacturing grid system with uncertain information. Kybernetes 43(5): 764-782 (2014)
[c1]Sye Loong Keoh
, Zhaohui Tang:
Towards secure end-to-end data aggregation in AMI through delayed-integrity-verification. IAS 2014: 6-11
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-01-10 23:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







