Feng Zhu

According to our database1, Feng Zhu
  • authored at least 156 papers between 1997 and 2017.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
Exploring Tag Distribution in Multi-Reader RFID Systems.
IEEE Trans. Mob. Comput., 2017

An Optimal Estimation Approach for the Calibration of the Car-Following Behavior of Connected Vehicles in a Mixed Traffic Environment.
IEEE Trans. Intelligent Transportation Systems, 2017

Evaluation Scheme for EMI of Train Body Voltage Fluctuation on the BCU Speed Sensor Measurement.
IEEE Trans. Instrumentation and Measurement, 2017

Efficient Physical-Layer Unknown Tag Identification in Large-scale RFID Systems.
IEEE Trans. Communications, 2017

On Passivity Analysis and Passivation of Event-Triggered Feedback Systems Using Passivity Indices.
IEEE Trans. Automat. Contr., 2017

Passivity and Dissipativity Analysis of a System and Its Approximation.
IEEE Trans. Automat. Contr., 2017

A hierarchical composite framework of parallel discrete event simulation for modelling complex adaptive systems.
Simulation Modelling Practice and Theory, 2017

InSAR Time-Series Analysis of Land Subsidence under Different Land Use Types in the Eastern Beijing Plain, China.
Remote Sensing, 2017

Three-level-parallelization support framework for large-scale analytic simulation.
J. Simulation, 2017

Expert Sources in Warnings May Reduce the Extent of Identity Disclosure in Cyber Contexts.
Int. J. Hum. Comput. Interaction, 2017

A robust cascaded strategy of in-motion alignment for inertial navigation systems.
IJDSN, 2017

Learning Spatial Regularization with Image-level Supervisions for Multi-label Image Classification.
CoRR, 2017

Missing Tag Identification in Blocker-Enabled RFID Systems.
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017

Dynamic Grouping in RFID Systems.
Proceedings of the 14th Annual IEEE International Conference on Sensing, 2017

Efficient Tag Identification in Blocker-Assisted RFID Systems.
Proceedings of the 14th Annual IEEE International Conference on Sensing, 2017

A Short Term Wind Speed Forecasting Method Using Signal Decomposition and Extreme Learning Machine.
Proceedings of the Advanced Computational Methods in Energy, Power, Electric Vehicles, and Their Integration, 2017

RF-scanner: Shelf scanning with robot-assisted RFID systems.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Missing tag identification in open RFID systems.
Proceedings of the IEEE International Conference on Communications, 2017

Learning Spatial Regularization with Image-Level Supervisions for Multi-label Image Classification.
Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition, 2017

2016
Efficient RFID Grouping Protocols.
IEEE/ACM Trans. Netw., 2016

The enhanced measurement-device-independent quantum key distribution with two-intensity decoy states.
Quantum Information Processing, 2016

The Impact of Patent Wars on Firm Strategy: Evidence from the Global Smartphone Industry.
Organization Science, 2016

Therapeutic target database update 2016: enriched resource for bench to clinical drug target and targeted pathway information.
Nucleic Acids Research, 2016

Open Content, Linus' Law, and Neutral Point of View.
Information Systems Research, 2016

Multi-level visual tracking with hierarchical tree structural constraint.
Neurocomputing, 2016

TOSI: A trust-oriented social influence evaluation method in contextual social networks.
Neurocomputing, 2016

Numerical simulations of the 10-year-old head response in drop impacts and compression tests.
Computer Methods and Programs in Biomedicine, 2016

Revisiting the structural basis and energetic landscape of susceptibility difference between HLA isotypes to allergic rhinitis.
Computational Biology and Chemistry, 2016

PLAT: A Physical-Layer Tag Searching Protocol in Large RFID Systems.
Proceedings of the 13th Annual IEEE International Conference on Sensing, 2016

A Robust Approach to Finding Trustworthy Influencer in Trust-Oriented E-Commerce Environments.
Proceedings of the Service-Oriented Computing - 14th International Conference, 2016

Hug the Elephant: Migrating a Legacy Data Analytics Application to Hadoop Ecosystem.
Proceedings of the 2016 IEEE International Conference on Software Maintenance and Evolution, 2016

Let's work together: Fast tag identification by interference elimination for multiple RFID readers.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

Consistent matching based on boosted salience channels for group re-identification.
Proceedings of the 2016 IEEE International Conference on Image Processing, 2016

Towards effective web page classification.
Proceedings of the 2016 International Conference on Behavioral, 2016

2015
Robust FMO algorithm and adaptive redundant slice allocation for wireless video transmission.
Telecommunication Systems, 2015

A new scheme on improving the performance of the quantum key distribution with two-intensity weak coherent light.
Quantum Information Processing, 2015

Fractal descriptors based on quaternion Fourier transform for color texture analysis.
J. Electronic Imaging, 2015

A high performance framework for modeling and simulation of large-scale complex systems.
Future Generation Comp. Syst., 2015

Optimal control of hybrid switched systems: A brief survey.
Discrete Event Dynamic Systems, 2015

Computational Modeling of the Trauma Injury.
Comp. Math. Methods in Medicine, 2015

Biomechanical Analysis of the Fixation System for T-Shaped Acetabular Fracture.
Comp. Math. Methods in Medicine, 2015

The Discrimination of Learning Styles by Bayes-Based Statistics: an Extended Study on ILS System.
Control and Intelligent Systems, 2015

Experience report: A characteristic study on out of memory errors in distributed data-parallel applications.
Proceedings of the 26th IEEE International Symposium on Software Reliability Engineering, 2015

Fast RFID grouping protocols.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

A Context-Aware Trust-Oriented Influencers Finding in Online Social Networks.
Proceedings of the 2015 IEEE International Conference on Web Services, 2015

Investigating the cognitive efficiency of interpretive animated diagram in thematic atlas: A quantitative test and evaluation.
Proceedings of the 23rd International Conference on Geoinformatics, 2015

Thematic atlas information expansion design: A storytelling concept under web environment.
Proceedings of the 23rd International Conference on Geoinformatics, 2015

Can MIC Find Its Place in the Field of PDES? An Early Performance Evaluation of PDES Simulator on Intel Many Integrated Cores Coprocessor.
Proceedings of the 19th IEEE/ACM International Symposium on Distributed Simulation and Real Time Applications, 2015

A Lightweight Evaluation Framework for Table Layouts in MapReduce Based Query Systems.
Proceedings of the Web Technologies and Applications - 17th Asia-PacificWeb Conference, 2015

2014
Three-dimensional precession feature extraction of space targets.
IEEE Trans. Aerospace and Electronic Systems, 2014

Therapeutic target database update 2014: a resource for targeted therapeutics.
Nucleic Acids Research, 2014

Responses to Entry in Multi-Sided Markets: The Impact of Craigslist on Local Newspapers.
Management Science, 2014

Static analysis based invariant detection for commodity operating systems.
Computers & Security, 2014

An Evolution-Based Robust Social Influence Evaluation Method in Online Social Networks.
Proceedings of the Web Information Systems Engineering - WISE 2014, 2014

Fast physical-layer unknown tag identification in large-scale RFID systems.
Proceedings of the IEEE Global Communications Conference, 2014

Crowd Tracking with Dynamic Evolution of Group Structures.
Proceedings of the Computer Vision - ECCV 2014, 2014

A Port&Event-Graph-Based Method for PDES Objects Development.
Proceedings of the AsiaSim 2014, 2014

Passivity analysis and passivation of feedback systems using passivity indices.
Proceedings of the American Control Conference, 2014

Design and Implementation of a Mobile Broadcast System.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014

2013
Analysis of the Phenology in the Mongolian Plateau by Inter-Comparison of Global Vegetation Datasets.
Remote Sensing, 2013

Ad Revenue and Content Commercialization: Evidence from Blogs.
Management Science, 2013

Modelling and simulation on arc generatrix cone cover forming of shaped jet.
IJCAT, 2013

Numerical simulation of non-linear wave tank based on the ALE algorithm.
IJCAT, 2013

Modelling and analysis of arch dam withstand underwater explosion.
IJCAT, 2013

Control of cyberphysical systems using passivity and dissipativity based methods.
Eur. J. Control, 2013

A hierarchical parallel discrete event simulation kernel for multicore platform.
Cluster Computing, 2013

An expansion-aided synchronous conservative time management algorithm on GPU.
Proceedings of the SIGSIM Principles of Advanced Discrete Simulation, 2013

Building an Efficient Hadoop Workflow Engine Using BPEL.
Proceedings of the Current Trends in Web Engineering, 2013

System Model of University Finance Based on Quantitative Decision-Making Process and Chain Interaction.
Proceedings of the Information Computing and Applications - 4th International Conference, 2013

Software Internationalization and Localization: An Industrial Experience.
Proceedings of the 2013 18th International Conference on Engineering of Complex Computer Systems, 2013

Information integration strategy of the petrochemical industry from the multi-scale perspective.
Proceedings of the 10th IEEE International Conference on Control and Automation, 2013

KQguard: Binary-Centric Defense against Kernel Queue Injection Attacks.
Proceedings of the Computer Security - ESORICS 2013, 2013

Efficient design of Petri-net supervisors with disjunctive specifications.
Proceedings of the 2013 IEEE International Conference on Automation Science and Engineering, 2013

2012
Medical image segmentation based on non-parametric mixture models with spatial information.
Signal, Image and Video Processing, 2012

Understanding identity exposure in pervasive computing environments.
Pervasive and Mobile Computing, 2012

Color image segmentation using nonparametric mixture models with multivariate orthogonal polynomials.
Neural Computing and Applications, 2012

Therapeutic target database update 2012: a resource for facilitating target-oriented drug discovery.
Nucleic Acids Research, 2012

A novel cognitive ISAR imaging method with random stepped frequency chirp signal.
SCIENCE CHINA Information Sciences, 2012

A Fast and High Throughput SQL Query System for Big Data.
Proceedings of the Web Information Systems Engineering - WISE 2012, 2012

A Bug Locating Method for the Debugging of Parallel Discrete Event Simulation.
Proceedings of the 26th ACM/IEEE/SCS Workshop on Principles of Advanced and Distributed Simulation, 2012

SAR RAW data processing approach based on a combination of LBG algorithm and compressed sensing.
Proceedings of the 2012 IEEE International Geoscience and Remote Sensing Symposium, 2012

Towards an Author Intention Based Computational Model of Story Generation.
Proceedings of the Intelligent Information Processing VI, 2012

Pose Determination from One Point and Two Coplanar Line Features.
Proceedings of the Intelligent Computing Theories and Applications, 2012

The study of automobile enterprise logistics supply chain integrated performance evaluation method.
Proceedings of the 2012 IEEE International Conference on Automation and Logistics, 2012

Study on military vehicle equipment grading method based on clustering analysis and fisher discriminant analysis.
Proceedings of the 2012 IEEE International Conference on Automation and Logistics, 2012

Passivity and stability of switched systems under quantization.
Proceedings of the Hybrid Systems: Computation and Control (part of CPS Week 2012), 2012

Sentential access control.
Proceedings of the 50th Annual Southeast Regional Conference, 2012

Contexts and sharing/not sharing private information.
Proceedings of the 50th Annual Southeast Regional Conference, 2012

2011
Reciprocity attacks.
Proceedings of the Symposium On Usable Privacy and Security, 2011

One Optimization Method on the Navigation Performance Reliability of Planing Craft.
Proceedings of the 17th IEEE Pacific Rim International Symposium on Dependable Computing, 2011

Error Resilient Coding Based on Reversible Data Hiding and Redundant Slice.
Proceedings of the Sixth International Conference on Image and Graphics, 2011

Applying the Radio over Fiber Technique to Broadband Wireless Access.
Proceedings of the Second International Conference on Digital Manufacturing and Automation, 2011

DynamicSD: Discover Dynamic and Uncertain Services in Pervasive Computing Environments.
Proceedings of 20th International Conference on Computer Communications and Networks, 2011

Semantic segmentation using regions in natural scenes.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011

The effect of spinning missile on the position calculating of the reticle infrared detecting system.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011

Design and implementation of network-based embedded electricity management system.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011

Static analysis based invariant detection for commodity operating systems.
Proceedings of the 7th International Conference on Collaborative Computing: Networking, 2011

Stabilization of large-scale distributed control systems using I/O event-driven control and passivity.
Proceedings of the 50th IEEE Conference on Decision and Control and European Control Conference, 2011

2010
Update of TTD: Therapeutic Target Database.
Nucleic Acids Research, 2010

Strategies to Fight Ad-Sponsored Rivals.
Management Science, 2010

ISAR Imaging for Avian Species Identification With Frequency-Stepped Chirp Signals.
IEEE Geosci. Remote Sensing Lett., 2010

Secure and Private Service Discovery in Pervasive Computing Environments.
IJAPUC, 2010

Theme-Based Multi-class Object Recognition and Segmentation.
Proceedings of the 20th International Conference on Pattern Recognition, 2010

SAUR: A Service Aided UWB Routing for Wireless Mesh Networks.
Proceedings of IEEE International Conference on Communications, 2010

Research of multi-level data exchange mechanism based on Land and Resource E-government.
Proceedings of the 18th International Conference on Geoinformatics: GIScience in Change, 2010

Modeling the Runtime Integrity of Cloud Servers: A Scoped Invariant Perspective.
Proceedings of the Cloud Computing, Second International Conference, 2010

2009
Enhanced robust cooperative spectrum sensing in cognitive radio.
Journal of Communications and Networks, 2009

Secure and Private Service Discovery in Pervasive Computing Environments.
IJISP, 2009

Approximation Algorithms for Key Management in Secure Multicast
CoRR, 2009

RationalExposure: a Game Theoretic Approach to Optimize Identity Exposure in Pervasive Computing Environments.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009

Understanding and minimizing identity exposure in ubiquitous computing environments.
Proceedings of the 6th Annual International Conference on Mobile and Ubiquitous Systems: Computing, 2009

Automation technique of software internationalization and localization based on lexical analysis.
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009

Approximation Algorithms for Key Management in Secure Multicast.
Proceedings of the Computing and Combinatorics, 15th Annual International Conference, 2009

2008
Solving the generalized Sylvester matrix equation AV + BW = EVF via a Kronecker map.
Appl. Math. Lett., 2008

Structural Elucidation of Three Anthraquinones from a Marine-Derived Mangrove Endophytic Fungus (Isolate 1850).
Proceedings of the 2008 International Conference on BioMedical Engineering and Informatics, 2008

2007
Nonstationary Hidden Markov Models for Multiaspect Discriminative Feature Extraction From Radar Targets.
IEEE Trans. Signal Processing, 2007

Robust analysis of P3P pose estimation.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2007

An Overview of 3D Video Transmission and Display Technologies for Telemedicine Applications.
Proceedings of the Medicine Meets Virtual Reality 15, 2007

Reliable Depth Map Regeneration Via a Novel Omnidirectional Stereo Sensor.
Proceedings of the Advances in Visual Computing, Third International Symposium, 2007

A Comparative Study on Pose Estimation for Monocular Vision and Binocular Vision Without Modeling.
Proceedings of the 2007 International Conference on Image Processing, 2007

Dynamics of Platform Competition: Exploring the Role of Installed Base, Platform Quality and Consumer Expectations.
Proceedings of the International Conference on Information Systems, 2007

On Multidimensional k-Anonymity with Local Recoding Generalization.
Proceedings of the 23rd International Conference on Data Engineering, 2007

Depth Map Regeneration via Improved Graph Cuts Using a Novel Omnidirectional Stereo Sensor.
Proceedings of the IEEE 11th International Conference on Computer Vision, 2007

Multiple Entity Types Wireless Broadcast Database System.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
Visualized CAD models of objects made of a multiphase perfect material.
Advances in Engineering Software, 2006

Hidden Markov Model Networks for Multiaspect Discriminative Features Extraction from Radar Targets.
Proceedings of the Advances in Neural Networks - ISNN 2006, Third International Symposium on Neural Networks, Chengdu, China, May 28, 2006

The BP Network for Carrier Frequency Offset Estimation in OFDM-Based WLANs.
Proceedings of the Advances in Neural Networks - ISNN 2006, Third International Symposium on Neural Networks, Chengdu, China, May 28, 2006

A Versatile Method for Omnidirectional Stereo Camera Calibration Based on BP Algorithm.
Proceedings of the Advances in Neural Networks - ISNN 2006, Third International Symposium on Neural Networks, Chengdu, China, May 28, 2006

Handwritten Digit Recognition Using Low Rank Approximation Based Competitive Neural Network.
Proceedings of the Advances in Neural Networks - ISNN 2006, Third International Symposium on Neural Networks, Chengdu, China, May 28, 2006

Estimation of the Fundamental Matrix Based on EV Mode.
Proceedings of the 18th International Conference on Pattern Recognition (ICPR 2006), 2006

The Influence of Online Consumer Reviews on the Demand for Experience Goods: The Case of Video Games.
Proceedings of the International Conference on Information Systems, 2006

Reliable Omnidirectional Depth Map Generation for Indoor Mobile Robot Navigation Via a Single Perspective Camera.
Proceedings of the Advances in Artificial Reality and Tele-Existence, 2006

3D Reconstruction Based on Pseudo-Linearization and Errors-in-Variables Model.
Proceedings of the 16th International Conference on Artificial Reality and Telexistence, 2006

2005
Rapid Embedded System Testing Using Verification Patterns.
IEEE Software, 2005

Derivation of camera parameters based on geometric meaning.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2005

A model-based monocular vision system for station keeping of an underwater vehicle.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2005

Design of a novel stereo vision navigation system for mobile robots.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2005

A Novel Approach for License Plate Recognition Using Subspace Projection and Probabilistic Neural Network.
Proceedings of the Advances in Neural Networks - ISNN 2005, Second International Symposium on Neural Networks, Chongqing, China, May 30, 2005

Feedforward reversed nested Miller compensation techniques for three-stage amplifiers.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2005), 2005

Supporting Load Balancing and Efficient Reorganization During System Scaling.
Proceedings of the 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), 2005

Password Authenticated Key Exchange for Resource-Constrained Wireless Communications (Extended Abstract).
Proceedings of the Networking, 2005

2004
Kalman Filter for 3D Motion Estimation via Lagrange Interpolation and Numerical Integration.
Proceedings of the 2004 IEEE International Conference on Robotics and Biomimetics, 2004

A high-precision calibration method for distorted camera.
Proceedings of the 2004 IEEE/RSJ International Conference on Intelligent Robots and Systems, Sendai, Japan, September 28, 2004

A filter method for pose estimation of maneuvering target.
Proceedings of the 2004 IEEE/RSJ International Conference on Intelligent Robots and Systems, Sendai, Japan, September 28, 2004

Filter Algorithm for 3D Pose Estimation of Maneuvering Target.
Proceedings of the 17th International Conference on Pattern Recognition, 2004

A high-precision binocular method for model-based pose estimation.
Proceedings of the 8th International Conference on Control, 2004

2003
More Efficient Password Authenticated Key Exchange Based on RSA.
Proceedings of the Progress in Cryptology, 2003

A Stateless Network Architecture for Inter-Enterprise Authentication, Authorization and Accounting.
Proceedings of the International Conference on Web Services, ICWS '03, June 23, 2003

A CAD modeling system for the components made of multi heterogeneous materials.
Proceedings of 9th IEEE International Conference on Emerging Technologies and Factory Automation, 2003

Verification Patterns for Rapid Embedded System Verification.
Proceedings of the International Conference on Embedded Systems and Applications, 2003

Rapid Verification of Embedded Systems Using Patterns.
Proceedings of the 27th International Computer Software and Applications Conference (COMPSAC 2003): Design and Assessment of Trustworthy Software-Based Systems, 2003

A planar homography estimation method for camera calibration.
Proceedings of the IEEE International Symposium on Computational Intelligence in Robotics and Automation: Computational Intelligence in Robotics and Automation for the New Millennium, 2003

2002
Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks.
Proceedings of the Information Security, 5th International Conference, 2002

1998
Automating Regression Testing for Real-Time Software in a Distributed Environment.
Proceedings of the 1st International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC '98), 1998

Framework-Oriented Analysis.
Proceedings of the COMPSAC '98, 1998

1997
A multiplication-addition structure against differential attack.
Proceedings of the Information and Communication Security, First International Conference, 1997


  Loading...