Bo Zhu

According to our database1, Bo Zhu authored at least 134 papers between 2003 and 2019.

Collaborative distances:



In proceedings 
PhD thesis 




Learning to fly: computational controller design for hybrid UAVs with reinforcement learning.
ACM Trans. Graph., 2019

A Novel Gaussian-Bernoulli Based Convolutional Deep Belief Networks for Image Feature Extraction.
Neural Processing Letters, 2019

Narrow-band topology optimization on a sparsely populated grid.
ACM Trans. Graph., 2018

Impacts of 3D Aerosol, Cloud, and Water Vapor Variations on the Recent Brightening during the South Asian Monsoon Season.
Remote Sensing, 2018

CF4J: Collaborative filtering for Java.
Knowl.-Based Syst., 2018

VisualRS: Java framework for visualization of recommender systems information.
Knowl.-Based Syst., 2018

Assigning reliability values to recommendations using matrix factorization.
J. Comput. Science, 2018

Reliability quality measures for recommender systems.
Inf. Sci., 2018

Fast genomic prediction of breeding values using parallel Markov chain Monte Carlo with convergence diagnosis.
BMC Bioinformatics, 2018

An Efficient Recommender System Method Based on the Numerical Relevances and the Non-Numerical Structures of the Ratings.
IEEE Access, 2018

Ultra-Wideband Microwave Absorption by Design and Optimization of Metasurface Salisbury Screen.
IEEE Access, 2018

Design and Implementation of Shoulder Exoskeleton Robot.
Proceedings of the Social Robotics - 10th International Conference, 2018

An Estimator-Based Feedback Control Approach for Measurement Noise Rejection.
Proceedings of the 14th IEEE International Conference on Control and Automation, 2018

Two-Scale Topology Optimization with Microstructures.
ACM Trans. Graph., 2017

Two-scale topology optimization with microstructures.
ACM Trans. Graph., 2017

Interactive design space exploration and optimization for CAD models.
ACM Trans. Graph., 2017

A novel asymmetric semantic similarity measurement for semantic job matching.
Proceedings of the International Conference on Security, Pattern Analysis, and Cybernetics, 2017

An improved head pose estimation method for the robotic wheelchair interaction control.
Proceedings of the 2017 IEEE International Conference on Robotics and Biomimetics, 2017

RGBD finger detection based on the 3D K-curvature.
Proceedings of the 2nd International Conference on Advanced Robotics and Mechatronics, 2017

An optimal allocation method of law enforcement monitoring based on the saptio-temporal evolution of land use.
Proceedings of the 25th International Conference on Geoinformatics, 2017

Computational multicopter design.
ACM Trans. Graph., 2016

Excitation Wavelength Analysis of Laser-Induced Fluorescence LiDAR for Identifying Plant Species.
IEEE Geosci. Remote Sensing Lett., 2016

Enhanced criteria on differential uniformity and nonlinearity of cryptographically significant functions.
Cryptography and Communications, 2016

Local and global existence of mild solutions for a class of nonlinear fractional reaction-diffusion equations with delay.
Appl. Math. Lett., 2016

Estimation of rice leaf nitrogen contents based on hyperspectral LIDAR.
Int. J. Applied Earth Observation and Geoinformation, 2016

PSCEG: an unbiased parallel subspace clustering algorithm using exact grids.
Proceedings of the 24th European Symposium on Artificial Neural Networks, 2016

The Research of S-Box Based on Reconstruction Design Method.
Proceedings of the 12th International Conference on Computational Intelligence and Security, 2016

Spark2Fires: A New Parallel Approximate Subspace Clustering Algorithm.
Proceedings of the New Trends in Databases and Information Systems, 2016

Analysis and Design of Authentication and Encryption Algorithms for Secure Cloud Systems.
PhD thesis, 2015

Codimensional non-Newtonian fluids.
ACM Trans. Graph., 2015

Nonlinear Robust Attitude Tracking Control of a Table-Mount Experimental Helicopter Using Output Feedback.
IEEE Trans. Industrial Electronics, 2015

Investigating the Potential of Using the Spatial and Spectral Information of Multispectral LiDAR for Object Classification.
Sensors, 2015

Improving Backscatter Intensity Calibration for Multispectral LiDAR.
IEEE Geosci. Remote Sensing Lett., 2015

Deformable image registration with geometric changes.
Frontiers of IT & EE, 2015

A new incompressibility discretization for a hybrid particle MAC grid representation with surface tension.
J. Comput. Physics, 2015

Writer adaptive feature extraction based on convolutional neural networks for online handwritten Chinese character recognition.
Proceedings of the 13th International Conference on Document Analysis and Recognition, 2015

Pleco and Plectron - Two Provably Secure Password Hashing Algorithms.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

The Simeck Family of Lightweight Block Ciphers.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2015, 2015

A comparative study of robust attitude synchronization controllers for multiple 3-DOF helicopters.
Proceedings of the American Control Conference, 2015

A novel dynamic decoupling control algorithm for PMSA by utilizing single neural adaptive controllers.
Proceedings of the IEEE International Conference on Advanced Intelligent Mechatronics, 2015

CLUS: Parallel Subspace Clustering Algorithm on Spark.
Proceedings of the New Trends in Databases and Information Systems, 2015

Codimensional surface tension flow on simplicial complexes.
ACM Trans. Graph., 2014

TuLP: A Family of Lightweight Message Authentication Codes for Body Sensor Networks.
J. Comput. Sci. Technol., 2014

Distinguishing properties and applications of higher order derivatives of Boolean functions.
Inf. Sci., 2014

Multidimensional meet-in-the-middle attack and its applications to KATAN32/48/64.
Cryptography and Communications, 2014

Theoretical analysis and numerical simulation of inter-modal four-wave-mixing in few mode fibers.
Proceedings of the 23rd Wireless and Optical Communication Conference, 2014

Loxin - A solution to password-less universal login.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

A Study of Designing Compact Classifiers Using Deep Neural Networks for Online Handwritten Chinese Character Recognition.
Proceedings of the 22nd International Conference on Pattern Recognition, 2014

Writer Adaptation Using Bottleneck Features and Discriminative Linear Regression for Online Handwritten Chinese Character Recognition.
Proceedings of the 14th International Conference on Frontiers in Handwriting Recognition, 2014

Distributed second-order tracking control of a multi-vehicle system using only noisy position measurements.
Proceedings of the 11th IEEE International Conference on Control & Automation, 2014

Hall-sensor-based orientation measurement method in three-dimensional space for electromagnetic actuators.
Proceedings of the 2014 IEEE International Conference on Automation Science and Engineering, 2014

Robust second-order tracking of multi-vehicle systems without velocity measurements on directed communication topologies.
Proceedings of the American Control Conference, 2014

A new grid structure for domain extension.
ACM Trans. Graph., 2013

Harmful Gas Recognition Exploiting a CTL Sensor Array.
Sensors, 2013

An efficient projection defocus algorithm based on multi-scale convolution kernel templates.
Journal of Zhejiang University - Science C, 2013

Facial Features Extraction based on Active Shape Model.
Journal of Multimedia, 2013

Non-overshooting output tracking of feedback linearisable nonlinear systems.
Int. J. Control, 2013

A new method based on Spatial Dimension Correlation and Fast Fourier Transform for SNR estimation in remote sensing images.
Proceedings of the 2013 IEEE International Geoscience and Remote Sensing Symposium, 2013

Estimation of maize LAI by assimilating remote sensing data into crop model.
Proceedings of the 2013 IEEE International Geoscience and Remote Sensing Symposium, 2013

A realtime method for evaluate aerial remote sensing task.
Proceedings of the 2013 IEEE International Geoscience and Remote Sensing Symposium, 2013

Revisiting MAC Forgeries, Weak Keys and Provable Security of Galois/Counter Mode of Operation.
Proceedings of the Cryptology and Network Security - 12th International Conference, 2013

Position tracking of multi double-integrator dynamics by bounded distributed control without velocity measurements.
Proceedings of the American Control Conference, 2013

Comparison Theorems for the Multidimensional BDSDEs and Applications.
J. Applied Mathematics, 2012

Stochastic PDEs and Infinite Horizon Backward Doubly Stochastic Differential Equations.
J. Applied Mathematics, 2012

A hybrid deformable model for real-time surgical simulation.
Comp. Med. Imag. and Graph., 2012

Sketch-based Dynamic Illustration of Fluid Systems.
ACM Trans. Graph., 2011

Output tracking for nonlinear non-minimum phase systems with output delay and application to an F-16 jet fighter.
Int. J. Systems Science, 2011

Guess-then-Meet-in-the-Middle Attacks on the KTANTAN Family of Block Ciphers.
IACR Cryptology ePrint Archive, 2011

The space fractional diffusion equation with Feller's operator.
Applied Mathematics and Computation, 2011

Role-based access to facilities lifecycle information on RFID tags.
Advanced Engineering Informatics, 2011

The Application of Genetic-Neural Network on Wind Power Prediction.
Proceedings of the Information Computing and Applications, 2011

PEKSrand: Providing Predicate Privacy in Public-Key Encryption with Keyword Search.
Proceedings of IEEE International Conference on Communications, 2011

A novel approach to solving weapon-target assignment problem based on hybrid particle swarm optimization algorithm.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011

Research and Simulation on Grid Resources Location.
Proceedings of the Advances in Computer Science, Environment, Ecoinformatics, and Education, 2011

Localized Multicast: Efficient and Distributed Replica Detection in Large-Scale Sensor Networks.
IEEE Trans. Mob. Comput., 2010

Providing witness anonymity under peer-to-peer settings.
IEEE Trans. Information Forensics and Security, 2010

PCM: a privacy-preserving detection mechanism in mobile ad hoc networks.
Security and Communication Networks, 2010

A Practical Platform for Cube-Attack-like Cryptanalyses.
IACR Cryptology ePrint Archive, 2010

Distinguishing Properties of Higher Order Derivatives of Boolean Functions.
IACR Cryptology ePrint Archive, 2010

The influence of higher-order effects on the transmission performances of the ultra-short soliton pulses and its suppression method.
SCIENCE CHINA Information Sciences, 2010

Creating and Preserving Vortical Details in SPH Fluid.
Comput. Graph. Forum, 2010

BoBlossom: modeling growing plants in games.
Proceedings of the 2010 Symposium on Interactive 3D Graphics, 2010

Particle-Based Deformable Modeling with Pre-computed Surface Data in Real-Time Surgical Simulation.
Proceedings of the Medical Imaging and Augmented Reality - 5th International Workshop, 2010

A framework to strengthen password authentication using mobile devices and browser extensions.
Proceedings of the IEEE International Symposium on Signal Processing and Information Technology, 2010

A Point-Based Simulation Framework for Minimally Invasive Surgery.
Proceedings of the Biomedical Simulation, 5th International Symposium, 2010

The design and implementation of a malicious code behavior detecting model based on virtualization techology.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2010

Animating Sand as a Surface Flow.
Proceedings of the Eurographics 2010 - Short Papers, Norrköping, Sweden, May 3-7, 2010, 2010

Composing fuzzy cardinal direction relations.
Proceedings of the 9th IEEE International Conference on Cognitive Informatics, 2010

Secure and Efficient Multicast in Wireless Sensor Networks Allowing Ad hoc Group Formation.
IEEE Trans. Vehicular Technology, 2009

Impossible Differential Cryptanalysis of FOX.
IACR Cryptology ePrint Archive, 2009

Revisiting the Indifferentiability of PGV Hash Functions.
IACR Cryptology ePrint Archive, 2009

A New Approach to Malware Detection.
Proceedings of the Advances in Information Security and Assurance, 2009

Key-Insulated Encryption Based Key Pre-distribution Scheme for WSN.
Proceedings of the Advances in Information Security and Assurance, 2009

A PIN Entry Scheme Resistant to Recording-Based Shoulder-Surfing.
Proceedings of the Third International Conference on Emerging Security Information, 2009

How to Break LU Matrix Based Key Predistribution Schemes for Wireless Sensor Networks.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

Privacy-Aware Attribute-Based Encryption with User Accountability.
Proceedings of the Information Security, 12th International Conference, 2009

Bitwise Higher Order Differential Cryptanalysis.
Proceedings of the Trusted Systems, First International Conference, 2009

Improved Cryptanalysis of the FOX Block Cipher.
Proceedings of the Trusted Systems, First International Conference, 2009

Towards Secure and Practical MACs for Body Sensor Networks.
Proceedings of the Progress in Cryptology, 2009

A Narrow Band Combination Model to Determine Leaf Nitrogen and Water Content in Rice.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2009

Spectral Ratio Lidar for Objects Detection.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2009

Research on Tension Control Strategy of Dry-Powder-Embedded Zinc-Air Battery Pole Manufacturing Line.
Proceedings of the International Forum on Information Technology and Applications, 2009

A rotary PIN entry scheme resilient to shoulder-surfing.
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009

Data Protection on RFID-Based Distributed Storage.
Proceedings of the 18th International Conference on Computer Communications and Networks, 2009

On the phonetic information in ultrasonic microphone signals.
Proceedings of the IEEE International Conference on Acoustics, 2009

Output tracking of VTOL aircraft with delayed attitude measurements.
Proceedings of the 48th IEEE Conference on Decision and Control, 2009

Anonymous user communication for privacy protection in wireless metropolitan mesh networks.
Proceedings of the 2009 ACM Symposium on Information, 2009

Stochastic Decoding of Linear Block Codes With High-Density Parity-Check Matrices.
IEEE Trans. Signal Processing, 2008

Cryptanalysis of LU Decomposition-based Key Pre-distribution Scheme for Wireless Sensor Networks.
IACR Cryptology ePrint Archive, 2008

Opportunistic Cooperation with Receiver-Based Ratio Combining Strategy.
Proceedings of the Wireless Algorithms, 2008

An Integrity Lock Architecture for Supporting Distributed Authorizations in Database Federations.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

Investigation on Adaptation Using Different Discriminative Training Criteria Based Linear Regression and Map.
Proceedings of the 6th International Symposium on Chinese Spoken Language Processing, 2008

Anonymous Misbehavior Detection in Mobile Ad Hoc Networks.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 2008

Minimum word classification error training of HMMS for automatic speech recognition.
Proceedings of the IEEE International Conference on Acoustics, 2008

A Granulating Algorithm using Global Filled Function.
Proceedings of the 2008 IEEE International Conference on Granular Computing, 2008

Ontology and Metadata for E-learning Based on Grid.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

Adaptive Thresholds Algorithm of Image Denoising Based on Nonsubsampled Contourlet Transform.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

Fiber soliton-form 3R regenerator and its performance analysis.
Science in China Series F: Information Sciences, 2007

Multimodal speech recognition with ultrasonic sensors.
Proceedings of the INTERSPEECH 2007, 2007

Efficient Distributed Detection of Node Replication Attacks in Sensor Networks.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007

Preventing Collusion Attacks on the One-Way Function Tree (OFT) Scheme.
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007

Building trust in peer-to-peer systems: a review.
IJSN, 2006

Efficient key tree construction for group key agreement in ad hoc networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2006

An Anonymous Routing Protocol with The Local-repair Mechanism for Mobile Ad Hoc Networks.
Proceedings of the Third Annual IEEE Communications Society Conference on Sensor, 2006

Providing witness anonymity in peer-to-peer systems.
Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, Ioctober 30, 2006

Efficient and robust key management for large mobile ad hoc networks.
Computer Networks, 2005

DoS-resistant access control protocol with identity confidentiality for wireless networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005

A Generic Protocol for Controlling Access to Mobile Services.
Proceedings of the Applied Public Key Infrastructure, 2005

Providing efficient certification services against active attacks in ad hoc networks.
Proceedings of the 24th IEEE International Performance Computing and Communications Conference, 2005

Toward the Quantitative Prediction of T-Cell Epitopes: QSAR Studies on Peptides Having Affinity with the Class I MHC Molecular HLA-A*0201.
Journal of Computational Biology, 2004

Anonymous Secure Routing in Mobile Ad-Hoc Networks.
Proceedings of the 29th Annual IEEE Conference on Local Computer Networks (LCN 2004), 2004

Trust Establishment in Large Scale Grid Settings.
Proceedings of the Grid and Cooperative Computing, 2004

Remarks on Saeednia's Identity-based Society Oriented Signature Scheme with Anonymous Signers.
IACR Cryptology ePrint Archive, 2003

On the Security of Two Threshold Signature Schemes with Traceable Signers.
Proceedings of the Applied Cryptography and Network Security, 2003