Dali Zhu

According to our database1, Dali Zhu authored at least 65 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
rFaceNet: An End-to-End Network for Enhanced Physiological Signal Extraction through Identity-Specific Facial Contours.
CoRR, 2024

2023
ESMO: Joint Frame Scheduling and Model Caching for Edge Video Analytics.
IEEE Trans. Parallel Distributed Syst., August, 2023

A Speech Enhancement Algorithm for Speech Reconstruction Based on Laser Speckle Images.
Sensors, 2023

A Novel Approach based on Improved Naive Bayes for 5G Air Interface DDoS Detection.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2023

Dynamic PBFT with Active Removal.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

SPYRAPTOR: A Stream-based Smart Query System for Real-Time Threat Hunting within Enterprise.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

LADA-Trans-NER: Adaptive Efficient Transformer for Chinese Named Entity Recognition Using Lexicon-Attention and Data-Augmentation.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
Speech Acquisition Using a Lightweight Convolutional Neural Network.
Proceedings of the IEEE Smartworld, 2022

Remote Speech Reconstruction Based on Convolutional Neural Network and Laser Speckle Images.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2022

TraceDroid: A Robust Network Traffic Analysis Framework for Privacy Leakage in Android Apps.
Proceedings of the Science of Cyber Security - 4th International Conference, 2022

Non-Contact Heart Rate Signal Extraction and Identification Based on Speckle Image.
Proceedings of the IEEE Symposium on Computers and Communications, 2022

LibHunter: An Unsupervised Approach for Third-party Library Detection without Prior Knowledge.
Proceedings of the IEEE Symposium on Computers and Communications, 2022

RAP-Net: A Resource Access Pattern Network for Insider Threat Detection.
Proceedings of the International Joint Conference on Neural Networks, 2022

2021
Privacy-Aware Online Task Offloading for Mobile-Edge Computing.
Wirel. Commun. Mob. Comput., 2021

Speed-Aware and Customized Task Offloading and Resource Allocation in Mobile Edge Computing.
IEEE Commun. Lett., 2021

Multi-Head Attention Based Popularity Prediction Caching in Social Content-Centric Networking With Mobile Edge Computing.
IEEE Commun. Lett., 2021

Deep Reinforcement Learning-based Task Offloading in Satellite-Terrestrial Edge Computing Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2021

BS-Net: A Behavior Sequence Network for Insider Threat Detection.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

Fusion of Wireless Signal and Computer Vision for Identification and Tracking.
Proceedings of the 28th International Conference on Telecommunications, 2021

Remote Recovery of Sound from Speckle Pattern Video Based on Convolutional LSTM.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

2020
A survey on space-aerial-terrestrial integrated 5G networks.
Comput. Networks, 2020

Towards artificial intelligence enabled 6G: State of the art, challenges, and opportunities.
Comput. Networks, 2020

Sadroid: A Deep Classification Model For Android Malware Detection Based On Semantic Analysis.
Proceedings of the 2020 IEEE Wireless Communications and Networking Conference, 2020

C-DAG: Community-Assisted DAG Mechanism with High Throughput and Eventual Consistency.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2020

A Flexible Attentive Temporal Graph Networks for Anomaly Detection in Dynamic Networks.
Proceedings of the 19th IEEE International Conference on Trust, 2020

QPBFT: Practical Byzantine Fault Tolerance Consensus Algorithm Based on Quantified-role.
Proceedings of the 19th IEEE International Conference on Trust, 2020

UIDroid: User-driven Based Hierarchical Access Control for Sensitive Information.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Remote Speech Extraction from Speckle Image by Convolutional Neural Network.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

Anomaly Detection with Deep Graph Autoencoders on Attributed Networks.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

A Novel Caching Strategy in Social Content-Centric Networking with Mobile Edge Computing.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

ExpectDroid: User Expectation Based Authorization Management in Android.
Proceedings of the 27th International Conference on Telecommunications, 2020

DeepAD: A Joint Embedding Approach for Anomaly Detection on Attributed Networks.
Proceedings of the Computational Science - ICCS 2020, 2020

2019
Convolutional neural network and dual-factor enhanced variational Bayes adaptive Kalman filter based indoor localization with Wi-Fi.
Comput. Networks, 2019

Joint RSS and CSI Based Access Point Authentication Scheme in WiFi Networks via XGBoost.
Proceedings of the 18th IEEE International Conference On Trust, 2019

A Transparent and Multimodal Malware Detection Method for Android Apps.
Proceedings of the 22nd International ACM Conference on Modeling, 2019

Indoor localization based on subcarrier parameter estimation of LoS with wi-fi.
Proceedings of the MobiQuitous 2019, 2019

Permission-Based Feature Scaling Method for Lightweight Android Malware Detection.
Proceedings of the Knowledge Science, Engineering and Management, 2019

FSNet: Android Malware Detection with Only One Feature.
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019

2018
基于Web操作系统的移动瘦终端多安全策略模型 (Multi-policy Security Model of Mobile Thin Client Based on Web Operating System).
计算机科学, 2018

Location Verification Assisted by a Moving Obstacle for Wireless Sensor Networks.
IEEE Internet Things J., 2018

Mobile target indoor tracking based on Multi-Direction Weight Position Kalman Filter.
Comput. Networks, 2018

Direct-path based fingerprint extraction algorithm for indoor localization.
Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2018

Public-Key Encryption with Selective Opening Security from General Assumptions.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

2017
Public-Key Encryption with Simulation-Based Sender Selective-Opening Security.
Proceedings of the Provable Security, 2017

WarnFi: Non-invasive wifi-based abnormal activity sensing using non-parametric model.
Proceedings of the 2017 IEEE Military Communications Conference, 2017

Device-Free Intruder Sensing Leveraging Fine-Grained Physical Layer Signatures.
Proceedings of the Knowledge Science, Engineering and Management, 2017

Analyzing Customer's Product Preference Using Wireless Signals.
Proceedings of the Knowledge Science, Engineering and Management, 2017

DeepFlow: Deep learning-based malware detection by mining Android application for abnormal usage of sensitive data.
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017

NotiFi: A ubiquitous WiFi-based abnormal activity detection system.
Proceedings of the 2017 International Joint Conference on Neural Networks, 2017

Multi-attribute Counterfeiting Tag Identification Protocol in Large-Scale RFID System.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

Lightweight Anonymous RFID Group Ownership Transfer Protocol in Multi-owner Environment.
Proceedings of the 19th IEEE International Conference on High Performance Computing and Communications; 15th IEEE International Conference on Smart City; 3rd IEEE International Conference on Data Science and Systems, 2017

2016
Application of Modified BLP Model on Mobile Web Operating System.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

WiN: Non-invasive Abnormal Activity Detection Leveraging Fine-Grained WiFi Signals.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

An Efficient Approach of Integrating RFID and Vision Techniques in Object Surveillance System.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

A novel cooperative caching scheme for Content Centric Mobile Ad Hoc Networks.
Proceedings of the IEEE Symposium on Computers and Communication, 2016

Opportunistic Probe: An Efficient Adaptive Detection Model for Collaborative Intrusion Detection.
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016

A Practical Scheme for Data Secure Transport in VoIP Conferencing.
Proceedings of the Information and Communications Security - 18th International Conference, 2016

WiseFi: Activity Localization and Recognition on Commodity Off-the-Shelf WiFi Devices.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

An Android System Vulnerability Risk Evaluation Method for Heap Overflow.
Proceedings of the 4th International Conference on Enterprise Systems, 2016

2015
A Dynamic Credible Factory Reset Mechanism of Personal Data in Android Device.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

A Simple RFID-Based Architecture for Privacy Preservation.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

A QoE-oriented scheduling scheme for HTTP streaming service in LTE system.
Proceedings of the 2015 IEEE Symposium on Computers and Communication, 2015

Trusted access in wireless network on mutual interactive authentication mechanism.
Proceedings of the 10th International Conference on Communications and Networking in China, 2015

2007
A Practical Digital Watermarking Protocol Based On PKI-CA.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

New Solutions for Cell Phone Detection.
Proceedings of the First International Conference on the Digital Society (ICDS 2007), 2007


  Loading...