Dawei Zhao

Orcid: 0000-0002-1812-1316

Affiliations:
  • Qilu University of Technology, Shandong Academy of Sciences, National Supercomputer Center in Jinan, China
  • Beijing University of Posts and Telecommunications, cryptology Department, China (PhD 2014)


According to our database1, Dawei Zhao authored at least 61 papers between 2012 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
MACS-BNet: A Stealthy Multiconstraint Adversarial Backdoor Network Against Compressed Learning.
IEEE Internet Things J., July, 2025

High-Precision Indoor Visible Light Positioning Method for Line-Of-Sight Scenes Based on a Spatiotemporal Sequence Attention Mechanism.
Concurr. Comput. Pract. Exp., May, 2025

TFHSVul: A Fine-Grained Hybrid Semantic Vulnerability Detection Method Based on Self-Attention Mechanism in IoT.
IEEE Internet Things J., 2025

An intrusion response approach based on multi-objective optimization and deep Q network for industrial control systems.
Expert Syst. Appl., 2025

DAN: Neural network based on dual attention for anomaly detection in ICS.
Expert Syst. Appl., 2025

AJSAGE: A intrusion detection scheme based on Jump-Knowledge Connection To GraphSAGE.
Comput. Secur., 2025

Dynamic malware detection based on supervised contrastive learning.
Comput. Electr. Eng., 2025

Reset observer-based containment protocol via event-triggered strategy for multi-agent networks against aperiodic DoS attacks.
Appl. Math. Comput., 2025

DCCT-Net: A Network Combined Dynamic CNN and Transformer for Image Compressive Sensing.
Proceedings of the 2025 IEEE International Conference on Acoustics, 2025

Multi-Level Privacy Preserving Scheme for Visual IoT Data Based on Compressive Sensing.
Proceedings of the 28th International Conference on Computer Supported Cooperative Work in Design, 2025

CBAT-ASG: Adversarial Sample Generation Method Based on CBA-Transformer.
Proceedings of the 28th International Conference on Computer Supported Cooperative Work in Design, 2025

2024
Finding Component Relationships: A Deep-Learning-Based Anomaly Detection Interpreter.
IEEE Trans. Comput. Soc. Syst., June, 2024

Addressing Concept Drift in IoT Anomaly Detection: Drift Detection, Interpretation, and Adaptation.
IEEE Trans. Sustain. Comput., 2024

Reinforcement learning and collective cooperation on higher-order networks.
Knowl. Based Syst., 2024

Dual-domain sampling and feature-domain optimization network for image compressive sensing.
Eng. Appl. Artif. Intell., 2024

Adversarial sample attacks and defenses based on LSTM-ED in industrial control systems.
Comput. Secur., 2024

Designing incoherent unit norm tight frames via block coordinate descent-based alternating projection.
Appl. Math. Comput., 2024

Speech Encryption Scheme Based on Chaotic Memristor Neural Network and S-Box.
Proceedings of the Natural Language Processing and Chinese Computing, 2024

Visible Light Positioning Method for Indoor Line-of-Sight Scene Based on Time Series Coding.
Proceedings of the 9th IEEE International Conference on Data Science in Cyberspace, 2024

Contrastive Learning for Chest X-ray Classification: A Fusion of Topological Data Analysis and ResNet.
Proceedings of the 9th IEEE International Conference on Data Science in Cyberspace, 2024

Multi-Interest Granularity Guided Semi-Joint Learning for N-Successive POI Recommendation.
Proceedings of the Database Systems for Advanced Applications, 2024

GNN-ASG: A Double Feature Selection-based Adversarial Sample Generation Method in Industrial Control System.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

2023
Composite Effective Degree Markov Chain for Epidemic Dynamics on Higher-Order Networks.
IEEE Trans. Syst. Man Cybern. Syst., December, 2023

ADTCD: An Adaptive Anomaly Detection Approach Toward Concept Drift in IoT.
IEEE Internet Things J., September, 2023

BotFinder: a novel framework for social bots detection in online social networks based on graph embedding and community detection.
World Wide Web (WWW), July, 2023

GRU-Based Interpretable Multivariate Time Series Anomaly Detection in Industrial Control System.
Comput. Secur., April, 2023

A Three-Dimensional ResNet and Transformer-Based Approach to Anomaly Detection in Multivariate Temporal-Spatial Data.
Entropy, February, 2023

Cooperation and Competition Coupled Diffusion of Multi-Feature on Multiplex Networks and Its Control.
IEEE Trans. Netw. Sci. Eng., 2023

Coherence-penalty minimization method for incoherent unit-norm tight frame design.
Signal Process., 2023

A Malicious Code Family Classification Method Based on RGB Images and Lightweight Model.
Proceedings of the Neural Information Processing - 30th International Conference, 2023

Image Compressed Sensing Using Multi-Scale Characteristic Residual Learning.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023

2022
Optimal Security Protection Strategy Selection Model Based on Q-Learning Particle Swarm Optimization.
Entropy, December, 2022

Detecting Semantic Attack in SCADA System: A Behavioral Model Based on Secondary Labeling of States-Duration Evolution Graph.
IEEE Trans. Netw. Sci. Eng., 2022

Progressive coherence and spectral norm minimization scheme for measurement matrices in compressed sensing.
Signal Process., 2022

WSNEAP: An Efficient Authentication Protocol for IIoT-Oriented Wireless Sensor Networks.
Sensors, 2022

Providing impersonation resistance for biometric-based authentication scheme in mobile cloud computing service.
Comput. Commun., 2022

2021
Minimum Dominating Set of Multiplex Networks: Definition, Application, and Identification.
IEEE Trans. Syst. Man Cybern. Syst., 2021

A weighted network community detection algorithm based on deep learning.
Appl. Math. Comput., 2021

A Security-Enhanced Modbus TCP Protocol and Authorized Access Mechanism.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

2020
Dismantling and Vertex Cover of Network Through Message Passing.
IEEE Trans. Circuits Syst., 2020

The Feedback Vertex Set Problem of Multiplex Networks.
IEEE Trans. Circuits Syst., 2020

PLC-SEIFF: A programmable logic controller security incident forensics framework based on automatic construction of security constraints.
Comput. Secur., 2020

Functional immunization of networks based on message passing.
Appl. Math. Comput., 2020

2019
Virus Propagation and Patch Distribution in Multiplex Networks: Modeling, Analysis, and Optimal Allocation.
IEEE Trans. Inf. Forensics Secur., 2019

Recognizing roles of online illegal gambling participants: An ensemble learning approach.
Comput. Secur., 2019

2018
Optimal Dismantling of Interdependent Networks Based on Inverse Explosive Percolation.
IEEE Trans. Circuits Syst. II Express Briefs, 2018

The Design of a Cloud Forensics Middleware System Base on Memory Analysis.
Proceedings of the Tenth International Conference on Soft Computing and Pattern Recognition, 2018

Role Recognition of Illegal Online Gambling Participants Using Monetary Transaction Data.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

2017
State analysis of Boolean control networks with impulsive and uncertain disturbances.
Appl. Math. Comput., 2017

Linking social network accounts by modeling user spatiotemporal habits.
Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics, 2017

The Categories of Quantum Information Hiding Protocol.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

2016
The robustness of interdependent networks under the interplay between cascading failures and virus propagation.
CoRR, 2016

Statistical physics of vaccination.
CoRR, 2016

2015
The robustness of multiplex networks under layer node-based attack.
CoRR, 2015

Finding another yourself in multiplex networks.
Appl. Math. Comput., 2015

2014
A Secure and Effective Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks.
Wirel. Pers. Commun., 2014

Novel way to research nonlinear feedback shift register.
Sci. China Inf. Sci., 2014

2013
An efficient dynamic ID based remote user authentication scheme using self-certified public keys for multi-server environment
CoRR, 2013

Multiple routes transmitted epidemics on multiplex networks.
CoRR, 2013

Multiple Vectors Propagation of Epidemics in Complex Networks.
CoRR, 2013

2012
A secret sharing scheme with a short share realizing the (t, n) threshold and the adversary structure.
Comput. Math. Appl., 2012


  Loading...