Match!
Hong Shen
Sun Yat-sen University
Distributed computingTime complexityComputer networkMathematicsComputer science
737Publications
37H-index
6,520Citations
What is this?
Publications 663
Newest
#1Songyuan Li (SYSU: Sun Yat-sen University)H-Index: 1
#2Hong Shen (SYSU: Sun Yat-sen University)H-Index: 37
Last. Hui Tian (Griffith University)H-Index: 9
view all 4 authors...
Since Osman Abul et al. first proposed the k-anonymity-based privacy protection for trajectory data, researchers have proposed a variety of trajectory privacy-preserving methods. These methods mainly adopt a static anonymity algorithm, which only focusing on the trajectories in a specific time span, directly anonymizes data and publishes them without considering dynamic nature of trajectory data as the new time slice arriving. Furthermore, due to its correlation with time and position, the traje...
1 CitationsSource
#1Jia-pei Wu (Sichuan University)
#2Liao Peng (Sichuan University)H-Index: 1
Last. Deyi Luo (Sichuan University)H-Index: 9
view all 6 authors...
PURPOSE: Previous studies have included a limited number of randomized controlled trials (RCTs) and compared limited parameters after treatment with imidafenacin and other anticholinergic drugs (ADs) for overactive bladder syndrome (OAB), and controversy about the superiority of these ADs still remains. We aim to update the evidence and provide better clinical guidance. METHODS: A systematic search of PubMed, Embase, ClinicalTrial.gov and Cochrane Library Central Register of Controlled Trials wa...
Source
#1Neetesh Saxena (Georgia Institute of Technology)H-Index: 10
#2Hong Shen (University of Adelaide)H-Index: 37
Last. Narendra S. Chaudhari (VRCE: Visvesvaraya National Institute of Technology)H-Index: 12
view all 5 authors...
Short Message Service (SMS) is a widely used communication medium for mobile applications, such as banking, social networking, and e-commerce. Applications of SMS services also include real-time broadcasting messages, such as notification of natural disasters and terrorist attacks, and sharing the current whereabouts to other users, such as notifying urgent business meeting information, transmitting quick information in the battlefield to multiple users, notifying current location to our friends...
2 CitationsSource
#1Binmin Wu (CAS: Chinese Academy of Sciences)H-Index: 1
#2Xudong Wang (CAS: Chinese Academy of Sciences)H-Index: 59
Last. Weida Hu (CAS: Chinese Academy of Sciences)H-Index: 45
view all 14 authors...
MoS2 , one of the most valued 2D materials beyond graphene, shows potential for future applications in postsilicon digital electronics and optoelectronics. However, achieving hole transport in MoS2 , which is dominated by electron transport, is always a challenge. Here, MoS2 transistors gated by electrolyte gel exhibit the characteristics of hole and electron transport, a high on/off ratio over 10(5) , and a low subthreshold swing below 50 mV per decade. Due to the electrolyte gel, the density o...
Source
#2Hong ShenH-Index: 37
Last. X. X. YiH-Index: 10
view all 4 authors...
Bound states and their influence on the dynamics of an one-dimensional tight-binding system subject to environments are studied in this paper. We identify specifically three kinds of bound states. The first is a discrete bound state (DBS), of which the energy level exhibits a gap from the continuum. The DBS exhibits the similar features of localization as the edge states in the system and thus can suppress the decay of system. The second is a bound state in the continuum (BIC), which can suppres...
#1Jong Hyuk Park (Seoul National University of Science and Technology)H-Index: 32
#2Hong Shen (University of Adelaide)H-Index: 37
Source
#1Guangjian Wu (CAS: Chinese Academy of Sciences)H-Index: 8
#2Xudong Wang (CAS: Chinese Academy of Sciences)H-Index: 59
Last. Xinran Wang (NU: Nanjing University)H-Index: 48
view all 16 authors...
Doped p-n junctions are fundamental electrical components in modern electronics and optoelectronics. Due to the development of device miniaturization, the emergence of two-dimensional (2D) materials may initiate the next technological leap toward the post-Moore era owing to their unique structures and physical properties. The purpose of fabricating 2D p-n junctions has fueled many carrier-type modulation methods, such as electrostatic doping, surface modification, and element intercalation. Here...
2 CitationsSource
#1Guangjian Wu (CAS: Chinese Academy of Sciences)H-Index: 8
#2Xudong Wang (CAS: Chinese Academy of Sciences)H-Index: 59
Last. MENG-Xiangjian (CAS: Chinese Academy of Sciences)H-Index: 29
view all 12 authors...
Recently, a large amount of effort has been devoted to bringing p- and n-type two-dimensional (2D) materials in close contact to promise a p–n junction for photodetectors and photovoltaic devices. However, all solar cells based on 2D materials are single p–n junctions so far, where the open circuit voltage is usually limited by the bandgap of semiconductor materials. Here, by using a scanning-probe domain patterning method to polarize the ferroelectric film, we demonstrate a series connected MoT...
Source
#1Xiaoyu Zhang (USST: University of Shanghai for Science and Technology)H-Index: 1
#1Xiao-Yu ZhangH-Index: 11
Last. Jian Meng
view all 12 authors...
Gallium oxide (Ga2O3) has been studied as one of the most promising wide bandgap semiconductors during the past decade. Here, we prepared high quality β-Ga2O3 films by pulsed laser deposition. β-Ga2O3 films of different thicknesses were achieved and their crystal properties were comprehensively studied. As thickness increases, grain size and surface roughness are both increased. Based on these β-Ga2O3 films, a series of ultraviolet (UV) photodetectors with interdigital electrodes structure were ...
1 CitationsSource
#1Huimin Huang (SYSU: Sun Yat-sen University)H-Index: 3
#2Hong Shen (SYSU: Sun Yat-sen University)H-Index: 37
Last. Zaiqiao Meng (SYSU: Sun Yat-sen University)H-Index: 3
view all 3 authors...
Influence Maximization, aiming at selecting a small set of seed users in a social network to maximize the spread of influence, has attracted considerable attention recently. Most existing influence maximization algorithms focus on pure networks, while in many real-world social networks, nodes are often associated with a rich set of attributes or features, aka attributed networks. Moreover, most of existing influence maximization methods suffer from the problems of high computational cost and no ...
Source
12345678910