Jizhong Zhao

Orcid: 0000-0003-1037-9619

According to our database1, Jizhong Zhao authored at least 167 papers between 2000 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
RoseAgg: Robust Defense Against Targeted Collusion Attacks in Federated Learning.
IEEE Trans. Inf. Forensics Secur., 2024

UFDA: Universal Federated Domain Adaptation with Practical Assumptions.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Co-MDA: Federated Multisource Domain Adaptation on Black-Box Models.
IEEE Trans. Circuits Syst. Video Technol., December, 2023

FedRich: Towards efficient federated learning for heterogeneous clients using heuristic scheduling.
Inf. Sci., October, 2023

Cross-technology Communication between Visible Light and Battery-free RFIDs.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., September, 2023

Platform-Oriented Event Time Allocation.
IEEE Trans. Knowl. Data Eng., March, 2023

MI-Mesh: 3D Human Mesh Construction by Fusing Image and Millimeter Wave.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., March, 2023

A Generalized Method to Combat Multipaths for RFID Sensing.
IEEE/ACM Trans. Netw., February, 2023

Concurrent Rate-Adaptive Reading With Passive RFIDs.
IEEE Internet Things J., 2023

mmYodar: Lightweight and Robust Object Detection using mmWave Signals.
Proceedings of the 20th Annual IEEE International Conference on Sensing, 2023

Knowledge-Graph Augmented Music Representation for Genre Classification.
Proceedings of the IEEE International Conference on Acoustics, 2023

2022
Arbitrator2.0: Preventing Unauthorized Access on Passive Tags.
IEEE Trans. Mob. Comput., 2022

Robust Traffic Speed Inference With Ensemble Learning.
IEEE Trans. Intell. Transp. Syst., 2022

Wisual: Indoor Crowd Density Estimation and Distribution Visualization Using Wi-Fi.
IEEE Internet Things J., 2022

Utilizing Tag Interference for Refined Localization of Passive RFID.
IEEE Internet Things J., 2022

RF-Chain: Decentralized, Credible, and Counterfeit-proof Supply Chain Management with Commodity RFIDs.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2022

UltraSpeech: Speech Enhancement by Interaction between Ultrasound and Speech.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2022

M2N: Mutual constraint network for multi-level unsupervised domain adaptation.
Neurocomputing, 2022

High-efficient hierarchical federated learning on non-IID data with progressive collaboration.
Future Gener. Comput. Syst., 2022

3D target location based on RFID polarization phase model.
EURASIP J. Wirel. Commun. Netw., 2022

Dual-Decoder Transformer For end-to-end Mandarin Chinese Speech Recognition with Pinyin and Character.
CoRR, 2022

RF-Wise: Pushing the Limit of RFID-based Sensing.
Proceedings of the IEEE INFOCOM 2022, 2022

Platform-Oriented Event Time Allocation(Extended Abstract).
Proceedings of the 38th IEEE International Conference on Data Engineering, 2022

2021
Corrections to "HMO: Ordering RFID Tags With Static Devices in Mobile Environments".
IEEE Trans. Mob. Comput., 2021

An Energy-Efficient Accelerator for Rain Removal Based on Convolutional Neural Network.
IEEE Trans. Circuits Syst. II Express Briefs, 2021

Indoor Geofencing Based on Sensorless Motion Sensing and Fingerprint Self-Updating.
Mob. Networks Appl., 2021

KEEP: Secure and Efficient Communication for Distributed IoT Devices.
IEEE Internet Things J., 2021

Anti-Spoofing Voice Commands: A Generic Wireless Assisted Design.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2021

RF-ray: Joint RF and Linguistics Domain Learning for Object Recognition.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2021

Worker Collaborative group estimation in spatial crowdsourcing.
Neurocomputing, 2021

HCAR: Human continuous activity recognition using latent structure features.
Trans. Emerg. Telecommun. Technol., 2021

Measuring and Modeling Multipath of Wi-Fi to Locate People in Indoor Environments.
Proceedings of the 27th IEEE International Conference on Parallel and Distributed Systems, 2021

Human Motion Recognition Based on Wi-Fi Imaging.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2021

2020
Hu-Fu: Replay-Resilient RFID Authentication.
IEEE/ACM Trans. Netw., 2020

HMO: Ordering RFID Tags with Static Devices in Mobile Environments.
IEEE Trans. Mob. Comput., 2020

RFnet: Automatic Gesture Recognition and Human Identification Using Time Series RFID Signals.
Mob. Networks Appl., 2020

PHYAlert: identity spoofing attack detection and prevention for a wireless edge network.
J. Cloud Comput., 2020

SMSS: Secure Member Selection Strategy in Federated Learning.
IEEE Intell. Syst., 2020

Research on Super-Resolution Image Reconstruction Based on Low-Resolution Infrared Sensor.
IEEE Access, 2020

Control Your Home With a Smartwatch.
IEEE Access, 2020

A Universal Method to Combat Multipaths for RFID Sensing.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Speech2Stroke: Generate Chinese Character Strokes Directly from Speech.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2020

2019
Verifiable Smart Packaging with Passive RFID.
IEEE Trans. Mob. Comput., 2019

Counting Human Objects Using Backscattered Radio Frequency Signals.
IEEE Trans. Mob. Comput., 2019

Close-Proximity Detection for Hand Approaching Using Backscatter Communication.
IEEE Trans. Mob. Comput., 2019

Visibility restoration of single foggy images under local surface analysis.
Neurocomputing, 2019

i-VALS: Visual Attention Localization for Mobile Service Computing.
IEEE Access, 2019

A (Near) Zero-cost and Universal Method to Combat Multipaths for RFID Sensing.
Proceedings of the 27th IEEE International Conference on Network Protocols, 2019

Poster: Continuous Human Activity Recognition Based on WiFi Imaging.
Proceedings of the 2019 International Conference on Embedded Wireless Systems and Networks, 2019

2018
Hierarchical and Parallel Pipelined Heterogeneous SoC for Embedded Vision Processing.
IEEE Trans. Circuits Syst. Video Technol., 2018

<i>SCFSen</i>: A Sensor Node for Regional Soil Carbon Flux Monitoring.
Sensors, 2018

Effective haze removal under mixed domain and retract neighborhood.
Neurocomputing, 2018

Towards Replay-resilient RFID Authentication.
Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, 2018

Replay-resilient Authentication for IoT.
Proceedings of the 10th on Wireless of the Students, 2018

Hardware Implementation of Reconfigurable Separable Convolution.
Proceedings of the 2018 IEEE Computer Society Annual Symposium on VLSI, 2018

Topic Model Based Management Frame Authentication Using CSI Information.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Towards Secure Device Pairing via Vibration Detection.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
Elementary Function Computing Method for Floating-Point Unit.
J. Signal Process. Syst., 2017

Hardware Implementation for Real-Time Haze Removal.
IEEE Trans. Very Large Scale Integr. Syst., 2017

A Platform for Free-Weight Exercise Monitoring with Passive Tags.
IEEE Trans. Mob. Comput., 2017

Haze Removal Using the Difference- Structure-Preservation Prior.
IEEE Trans. Image Process., 2017

Combining local and global hypotheses in deep neural network for multi-label image classification.
Neurocomputing, 2017

A power-delay-product efficient and SEU-tolerant latch design.
IEICE Electron. Express, 2017

SALM: Smartphone-Based Identity Authentication Using Lip Motion Characteristics.
Proceedings of the 2017 IEEE International Conference on Smart Computing, 2017

HMRL: Relative Localization of RFID Tags with Static Devices.
Proceedings of the 14th Annual IEEE International Conference on Sensing, 2017

Replay-resilient Physical-layer Authentication for Battery-free IoT Devices.
Proceedings of the 4th ACM Workshop on Hot Topics in Wireless, 2017

RFIPad: Enabling Cost-Efficient and Device-Free In-air Handwriting Using Passive Tags.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Poster: Bidimensional Relative Localization Leveraging Interference among Passive Tags.
Proceedings of the 2017 International Conference on Embedded Wireless Systems and Networks, 2017

Efficient CSI Correction with CFO for Uplink MU-MIMO Networks.
Proceedings of the 3rd International Conference on Big Data Computing and Communications, 2017

2016
Hardware Implementation of Reconfigurable 1D Convolution.
J. Signal Process. Syst., 2016

GenePrint: Generic and Accurate Physical-Layer Identification for UHF RFID Tags.
IEEE/ACM Trans. Netw., 2016

Twins: Device-Free Object Tracking Using Passive Tags.
IEEE/ACM Trans. Netw., 2016

CBID: A Customer Behavior Identification System Using Passive Tags.
IEEE/ACM Trans. Netw., 2016

Task Assignment on Multi-Skill Oriented Spatial Crowdsourcing.
IEEE Trans. Knowl. Data Eng., 2016

Algorithm and VLSI Architecture of Edge-Directed Image Upscaling for 4k Display System.
IEEE Trans. Circuits Syst. Video Technol., 2016

A novel image enhancement method using fuzzy Sure entropy.
Neurocomputing, 2016

Leveraging Topic Model for CSI Based Human Activity Recognition.
Proceedings of the 12th International Conference on Mobile Ad-Hoc and Sensor Networks, 2016

CSI feedback reduction by checking its validity period: poster.
Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, 2016

VADS: Visual attention detection with a smartphone.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Smart retransmission for CSI recovery in uplink multi-user MIMO networks.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

Device-free detection of approach and departure behaviors using backscatter communication.
Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2016

Template-Free 3D Reconstruction of Poorly-Textured Nonrigid Surfaces.
Proceedings of the Computer Vision - ECCV 2016, 2016

Instant and Robust Authentication and Key Agreement among Mobile Devices.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Reliable Diversity-Based Spatial Crowdsourcing by Moving Workers.
Proc. VLDB Endow., 2015

A lightweight identity authentication method by exploiting network covert channel.
Peer-to-Peer Netw. Appl., 2015

Matrix computing coprocessor for an embedded system.
Microprocess. Microsystems, 2015

Time Domain Similarity of Lightweight Parameters Based Soil Respiration Sensor Network Deployment.
Int. J. Distributed Sens. Networks, 2015

An Empirical Study on Hidden Tag Problem.
Int. J. Distributed Sens. Networks, 2015

Device-Free Mobile Target Tracking Using Passive Tags.
Int. J. Distributed Sens. Networks, 2015

Event Localization and Actuation in Wireless Sensor Network without Locations.
Ad Hoc Sens. Wirel. Networks, 2015

FEMO: A Platform for Free-weight Exercise Monitoring with RFIDs.
Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems, 2015

Human object estimation via backscattered radio frequency signal.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Accelerating Crowdsourcing Based Indoor Localization Using CSI.
Proceedings of the 21st IEEE International Conference on Parallel and Distributed Systems, 2015

EMoD: Efficient Motion Detection of Device-Free Objects Using Passive RFID Tags.
Proceedings of the 23rd IEEE International Conference on Network Protocols, 2015

NFV: Near Field Vibration Based Group Device Pairing.
Proceedings of the Collaborative Computing: Networking, Applications, and Worksharing, 2015

2014
Efficient and secure key extraction using channel state information.
J. Supercomput., 2014

Assessing Diagnosis Approaches for Wireless Sensor Networks: Concepts and Analysis.
J. Comput. Sci. Technol., 2014

Communicating Is Crowdsourcing: Wi-Fi Indoor Localization with CSI-Based Speed Estimation.
J. Comput. Sci. Technol., 2014

Reliable Diversity-Based Spatial Crowdsourcing by Moving Workers.
CoRR, 2014

Error Estimation of Iterative Maximum Likelihood Localization in Wireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2014

Throughput Optimization in Wireless Mesh Networks Using Zero-Sum Game.
Ad Hoc Sens. Wirel. Networks, 2014

Poster: locating RFID tags by rotation.
Proceedings of the 20th Annual International Conference on Mobile Computing and Networking, 2014

KEEP: Fast secret key extraction protocol for D2D communication.
Proceedings of the IEEE 22nd International Symposium of Quality of Service, 2014

Electronic frog eye: Counting crowd using WiFi.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Twins: Device-free object tracking using passive tags.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Nowhere to hide: An empirical study on hidden UHF RFID tags.
Proceedings of the 20th IEEE International Conference on Parallel and Distributed Systems, 2014

A fine-grained indoor localization using multidimensional Wi-Fi fingerprinting.
Proceedings of the 20th IEEE International Conference on Parallel and Distributed Systems, 2014

2013
Localization of Wireless Sensor Networks in the Wild: Pursuit of Ranging Quality.
IEEE/ACM Trans. Netw., 2013

Secure and Efficient Control Transfer for IoT Devices.
Int. J. Distributed Sens. Networks, 2013

Segmental Dynamic Duty Cycle Control for Sampling Scheduling in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2013

Near-Optimal Diagnosis System Deployment in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2013

Tracer: Taming Anomalous Events with CRFID Tags for Trajectory Management.
Int. J. Distributed Sens. Networks, 2013

Communicating Is Crowdsourcing: Wi-Fi Indoor Localization with CSI-based Speed Estimation.
CoRR, 2013

Ranking-based Feature Selection for Anomaly Detection in Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2013

Wi-Fi Fingerprint Based Indoor Localization without Indoor Space Measurement.
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013

MISS: Multi-dimensional Information Sensing Surveillance for Cold Chain Logistics.
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013

Rejecting the attack: Source authentication for Wi-Fi management frames using CSI Information.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

GenePrint: Generic and accurate physical-layer identification for UHF RFID tags.
Proceedings of the 2013 21st IEEE International Conference on Network Protocols, 2013

2012
Using Magnetic RAM to Build Low-Power and Soft Error-Resilient L1 Cache.
IEEE Trans. Very Large Scale Integr. Syst., 2012

Footprint: Detecting Sybil Attacks in Urban Vehicular Networks.
IEEE Trans. Parallel Distributed Syst., 2012

Efficient and Secure Key Extraction using CSI without Chasing down Errors
CoRR, 2012

A Scalable P2P Video Conferencing System Based on VCStream Model.
Proceedings of the 2012 IEEE/ACIS 11th International Conference on Computer and Information Science, Shanghai, China, May 30, 2012

2011
On "Movement-Assisted Connectivity Restoration in Wireless Sensor and Actor Networks".
IEEE Trans. Parallel Distributed Syst., 2011

Efficient and Strategyproof Spectrum Allocations in Multichannel Wireless Networks.
IEEE Trans. Computers, 2011

Removing dubious feedback from mobile wireless ad hoc peer-to-peer systems.
Int. J. Ad Hoc Ubiquitous Comput., 2011

Using Potential to Guide Mobile Nodes in Wireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2011

Crowd Density Estimation Using Wireless Sensor Networks.
Proceedings of the Seventh International Conference on Mobile Ad-hoc and Sensor Networks, 2011

Lazy Schema: An Optimal Sampling Frequency Assignment for Real-Time Sensor Systems.
Proceedings of the Seventh International Conference on Mobile Ad-hoc and Sensor Networks, 2011

Exploiting the Associated Information to Locate Mobile Users in Ubiquitous Computing Environment.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011

CCD: Locating Event in Wireless Sensor Network without Locations.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011

Does wireless sensor network scale? A measurement study on GreenOrbs.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Does feature matter: anomaly detection in sensor networks.
Proceedings of the 6th International Conference on Body Area Networks, 2011

2010
Long-term large-scale sensing in the forest: recent advances and future directions of GreenOrbs.
Frontiers Comput. Sci. China, 2010

Efficient Data Retrieving in Distributed Data-streaming Environments.
Ad Hoc Sens. Wirel. Networks, 2010

Locating sensors in the wild: pursuit of ranging quality.
Proceedings of the 8th International Conference on Embedded Networked Sensor Systems, 2010

Filtering Cache Pollution by Using Replacement Operation Based on Confidence Estimation.
Proceedings of the Fifth International Conference on Networking, Architecture, and Storage, 2010

An Adaptive and Selective Instruction Active Push Mechanism for Multi-core Architecture.
Proceedings of the Fifth International Conference on Networking, Architecture, and Storage, 2010

DAWN: Energy efficient data aggregation in WSN with mobile sinks.
Proceedings of the 18th International Workshop on Quality of Service, 2010

CSDA: An Adaptive Data Storage Strategy for Predictive Branch Path on Multi-Core Architecture.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
Joint Throughput Optimization for Wireless Mesh Networks.
IEEE Trans. Mob. Comput., 2009

Canopy closure estimates with GreenOrbs: sustainable sensing in the forest.
Proceedings of the 7th International Conference on Embedded Networked Sensor Systems, 2009

Randomizing RFID Private Authentication.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009

An Enhanced Synchronization Approach for RFID Private Authentication.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

Efficient Data Aggregation in Multi-hop Wireless Sensor Networks under Physical Interference Model.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

Scaling Laws on Multicast Capacity of Large Scale Wireless Networks.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Run to Potential: Sweep Coverage in Wireless Sensor Networks.
Proceedings of the ICPP 2009, 2009

EUL: An Efficient and Universal Localization Method for Wireless Sensor Network.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), 2009

VLSI design of 3D display processing chip for head-mounted display.
Proceedings of the 2009 International IEEE Consumer Electronics Society's Games Innovations Conference, 2009

2008
Signature-File-Based Approach for Query Answering Over Wireless Sensor Networks.
IEEE Trans. Veh. Technol., 2008

Supporting <i>K</i> nearest neighbors query on high-dimensional data in P2P systems.
Frontiers Comput. Sci. China, 2008

Efficient Throughput for Wireless Mesh Networks by CDMA/OVSF Code Assignment.
Ad Hoc Sens. Wirel. Networks, 2008

Safety assurance for archeologists using sensor network.
Proceedings of the 6th International Conference on Embedded Networked Sensor Systems, 2008

Broadcast capacity for wireless ad hoc networks.
Proceedings of the IEEE 5th International Conference on Mobile Adhoc and Sensor Systems, 2008

Bouncing Tracks in Sensor Networks.
Proceedings of the 14th International Conference on Parallel and Distributed Systems, 2008

2007
An Offset Algorithm for Conflict Resolution in Context-Aware Computing.
Proceedings of the Ubiquitous Intelligence and Computing, 4th International Conference, 2007

Research on context-aware architecture for personal information privacy protection.
Proceedings of the IEEE International Conference on Systems, 2007

Isotope Programming Model: a Kind of Program Model for Context-Aware Application.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

Context-Aware Learning Privacy Disclosure Policy from Interaction History.
Proceedings of the Third International Conference on Natural Computation, 2007

A Study on Context-aware Privacy Protection for Personal Information.
Proceedings of the 16th International Conference on Computer Communications and Networks, 2007

Uncertain Privacy Decision about Access Personal Information in Pervasive Computing Environments.
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007

Cache Predicting Algorithm Based on Context-Aware in Pervasive Computing.
Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007

A Conflict Resolution Method in Context-Aware Computing.
Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007

2006
Software Aging Prediction Model Based on Fuzzy Wavelet Network with Adaptive Genetic Algorithm.
Proceedings of the 18th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2006), 2006

2005
Secure Multimedia Streaming with Trusted Digital Rights Management.
Proceedings of the 30th Annual IEEE Conference on Local Computer Networks (LCN 2005), 2005

Information Push-Delivery for User-Centered and Personalized Service.
Proceedings of the Fuzzy Systems and Knowledge Discovery, Second International Conference, 2005

Integrating Collaborate and Content-Based Filtering for Personalized Information Recommendation.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

2000
OTMS-A CORBA-Compliant Object Transaction Management System.
Proceedings of the TOOLS Asia 2000: 36th International Conference on Technology of Object-Oriented Languages and Systems, Xi'an, China, 30 October, 2000


  Loading...