Dali Zhu

According to our database1, Dali Zhu authored at least 26 papers between 2007 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Location Verification Assisted by a Moving Obstacle for Wireless Sensor Networks.
IEEE Internet of Things Journal, 2018

Mobile target indoor tracking based on Multi-Direction Weight Position Kalman Filter.
Computer Networks, 2018

Direct-path based fingerprint extraction algorithm for indoor localization.
Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2018

Public-Key Encryption with Selective Opening Security from General Assumptions.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

2017
Public-Key Encryption with Simulation-Based Sender Selective-Opening Security.
Proceedings of the Provable Security, 2017

WarnFi: Non-invasive wifi-based abnormal activity sensing using non-parametric model.
Proceedings of the 2017 IEEE Military Communications Conference, 2017

Device-Free Intruder Sensing Leveraging Fine-Grained Physical Layer Signatures.
Proceedings of the Knowledge Science, Engineering and Management, 2017

Analyzing Customer's Product Preference Using Wireless Signals.
Proceedings of the Knowledge Science, Engineering and Management, 2017

DeepFlow: Deep learning-based malware detection by mining Android application for abnormal usage of sensitive data.
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017

NotiFi: A ubiquitous WiFi-based abnormal activity detection system.
Proceedings of the 2017 International Joint Conference on Neural Networks, 2017

Multi-attribute Counterfeiting Tag Identification Protocol in Large-Scale RFID System.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

Lightweight Anonymous RFID Group Ownership Transfer Protocol in Multi-owner Environment.
Proceedings of the 19th IEEE International Conference on High Performance Computing and Communications; 15th IEEE International Conference on Smart City; 3rd IEEE International Conference on Data Science and Systems, 2017

2016
Application of Modified BLP Model on Mobile Web Operating System.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

WiN: Non-invasive Abnormal Activity Detection Leveraging Fine-Grained WiFi Signals.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

An Efficient Approach of Integrating RFID and Vision Techniques in Object Surveillance System.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

A novel cooperative caching scheme for Content Centric Mobile Ad Hoc Networks.
Proceedings of the IEEE Symposium on Computers and Communication, 2016

Opportunistic Probe: An Efficient Adaptive Detection Model for Collaborative Intrusion Detection.
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016

A Practical Scheme for Data Secure Transport in VoIP Conferencing.
Proceedings of the Information and Communications Security - 18th International Conference, 2016

WiseFi: Activity Localization and Recognition on Commodity Off-the-Shelf WiFi Devices.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

An Android System Vulnerability Risk Evaluation Method for Heap Overflow.
Proceedings of the 4th International Conference on Enterprise Systems, 2016

2015
A Dynamic Credible Factory Reset Mechanism of Personal Data in Android Device.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

A Simple RFID-Based Architecture for Privacy Preservation.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

A QoE-oriented scheduling scheme for HTTP streaming service in LTE system.
Proceedings of the 2015 IEEE Symposium on Computers and Communication, 2015

Trusted access in wireless network on mutual interactive authentication mechanism.
Proceedings of the 10th International Conference on Communications and Networking in China, 2015

2007
A Practical Digital Watermarking Protocol Based On PKI-CA.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

New Solutions for Cell Phone Detection.
Proceedings of the First International Conference on the Digital Society (ICDS 2007), 2007


  Loading...