Dawei Zhao
Orcid: 0000-0002-1812-1316Affiliations:
- Qilu University of Technology, Shandong Academy of Sciences, National Supercomputer Center in Jinan, China
- Beijing University of Posts and Telecommunications, cryptology Department, China (PhD 2014)
According to our database1,
Dawei Zhao
authored at least 61 papers
between 2012 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
MACS-BNet: A Stealthy Multiconstraint Adversarial Backdoor Network Against Compressed Learning.
IEEE Internet Things J., July, 2025
High-Precision Indoor Visible Light Positioning Method for Line-Of-Sight Scenes Based on a Spatiotemporal Sequence Attention Mechanism.
Concurr. Comput. Pract. Exp., May, 2025
TFHSVul: A Fine-Grained Hybrid Semantic Vulnerability Detection Method Based on Self-Attention Mechanism in IoT.
IEEE Internet Things J., 2025
An intrusion response approach based on multi-objective optimization and deep Q network for industrial control systems.
Expert Syst. Appl., 2025
Expert Syst. Appl., 2025
AJSAGE: A intrusion detection scheme based on Jump-Knowledge Connection To GraphSAGE.
Comput. Secur., 2025
Comput. Electr. Eng., 2025
Reset observer-based containment protocol via event-triggered strategy for multi-agent networks against aperiodic DoS attacks.
Appl. Math. Comput., 2025
DCCT-Net: A Network Combined Dynamic CNN and Transformer for Image Compressive Sensing.
Proceedings of the 2025 IEEE International Conference on Acoustics, 2025
Multi-Level Privacy Preserving Scheme for Visual IoT Data Based on Compressive Sensing.
Proceedings of the 28th International Conference on Computer Supported Cooperative Work in Design, 2025
Proceedings of the 28th International Conference on Computer Supported Cooperative Work in Design, 2025
2024
Finding Component Relationships: A Deep-Learning-Based Anomaly Detection Interpreter.
IEEE Trans. Comput. Soc. Syst., June, 2024
Addressing Concept Drift in IoT Anomaly Detection: Drift Detection, Interpretation, and Adaptation.
IEEE Trans. Sustain. Comput., 2024
Knowl. Based Syst., 2024
Dual-domain sampling and feature-domain optimization network for image compressive sensing.
Eng. Appl. Artif. Intell., 2024
Adversarial sample attacks and defenses based on LSTM-ED in industrial control systems.
Comput. Secur., 2024
Designing incoherent unit norm tight frames via block coordinate descent-based alternating projection.
Appl. Math. Comput., 2024
Proceedings of the Natural Language Processing and Chinese Computing, 2024
Visible Light Positioning Method for Indoor Line-of-Sight Scene Based on Time Series Coding.
Proceedings of the 9th IEEE International Conference on Data Science in Cyberspace, 2024
Contrastive Learning for Chest X-ray Classification: A Fusion of Topological Data Analysis and ResNet.
Proceedings of the 9th IEEE International Conference on Data Science in Cyberspace, 2024
Multi-Interest Granularity Guided Semi-Joint Learning for N-Successive POI Recommendation.
Proceedings of the Database Systems for Advanced Applications, 2024
GNN-ASG: A Double Feature Selection-based Adversarial Sample Generation Method in Industrial Control System.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024
2023
Composite Effective Degree Markov Chain for Epidemic Dynamics on Higher-Order Networks.
IEEE Trans. Syst. Man Cybern. Syst., December, 2023
IEEE Internet Things J., September, 2023
BotFinder: a novel framework for social bots detection in online social networks based on graph embedding and community detection.
World Wide Web (WWW), July, 2023
GRU-Based Interpretable Multivariate Time Series Anomaly Detection in Industrial Control System.
Comput. Secur., April, 2023
A Three-Dimensional ResNet and Transformer-Based Approach to Anomaly Detection in Multivariate Temporal-Spatial Data.
Entropy, February, 2023
Cooperation and Competition Coupled Diffusion of Multi-Feature on Multiplex Networks and Its Control.
IEEE Trans. Netw. Sci. Eng., 2023
Signal Process., 2023
A Malicious Code Family Classification Method Based on RGB Images and Lightweight Model.
Proceedings of the Neural Information Processing - 30th International Conference, 2023
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023
2022
Optimal Security Protection Strategy Selection Model Based on Q-Learning Particle Swarm Optimization.
Entropy, December, 2022
Detecting Semantic Attack in SCADA System: A Behavioral Model Based on Secondary Labeling of States-Duration Evolution Graph.
IEEE Trans. Netw. Sci. Eng., 2022
Progressive coherence and spectral norm minimization scheme for measurement matrices in compressed sensing.
Signal Process., 2022
WSNEAP: An Efficient Authentication Protocol for IIoT-Oriented Wireless Sensor Networks.
Sensors, 2022
Providing impersonation resistance for biometric-based authentication scheme in mobile cloud computing service.
Comput. Commun., 2022
2021
Minimum Dominating Set of Multiplex Networks: Definition, Application, and Identification.
IEEE Trans. Syst. Man Cybern. Syst., 2021
Appl. Math. Comput., 2021
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021
2020
IEEE Trans. Circuits Syst., 2020
IEEE Trans. Circuits Syst., 2020
PLC-SEIFF: A programmable logic controller security incident forensics framework based on automatic construction of security constraints.
Comput. Secur., 2020
Appl. Math. Comput., 2020
2019
Virus Propagation and Patch Distribution in Multiplex Networks: Modeling, Analysis, and Optimal Allocation.
IEEE Trans. Inf. Forensics Secur., 2019
Recognizing roles of online illegal gambling participants: An ensemble learning approach.
Comput. Secur., 2019
2018
Optimal Dismantling of Interdependent Networks Based on Inverse Explosive Percolation.
IEEE Trans. Circuits Syst. II Express Briefs, 2018
Proceedings of the Tenth International Conference on Soft Computing and Pattern Recognition, 2018
Role Recognition of Illegal Online Gambling Participants Using Monetary Transaction Data.
Proceedings of the Information and Communications Security - 20th International Conference, 2018
2017
State analysis of Boolean control networks with impulsive and uncertain disturbances.
Appl. Math. Comput., 2017
Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics, 2017
Proceedings of the Cloud Computing and Security - Third International Conference, 2017
2016
The robustness of interdependent networks under the interplay between cascading failures and virus propagation.
CoRR, 2016
2015
2014
A Secure and Effective Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks.
Wirel. Pers. Commun., 2014
2013
An efficient dynamic ID based remote user authentication scheme using self-certified public keys for multi-server environment
CoRR, 2013
2012
A secret sharing scheme with a short share realizing the (t, n) threshold and the adversary structure.
Comput. Math. Appl., 2012