Jizhong Zhao

According to our database1, Jizhong Zhao authored at least 121 papers between 2000 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Verifiable Smart Packaging with Passive RFID.
IEEE Trans. Mob. Comput., 2019

Counting Human Objects Using Backscattered Radio Frequency Signals.
IEEE Trans. Mob. Comput., 2019

Visibility restoration of single foggy images under local surface analysis.
Neurocomputing, 2019

i-VALS: Visual Attention Localization for Mobile Service Computing.
IEEE Access, 2019

Poster: Continuous Human Activity Recognition Based on WiFi Imaging.
Proceedings of the 2019 International Conference on Embedded Wireless Systems and Networks, 2019

2018
Hierarchical and Parallel Pipelined Heterogeneous SoC for Embedded Vision Processing.
IEEE Trans. Circuits Syst. Video Techn., 2018

SCFSen: A Sensor Node for Regional Soil Carbon Flux Monitoring.
Sensors, 2018

Effective haze removal under mixed domain and retract neighborhood.
Neurocomputing, 2018

Towards Replay-resilient RFID Authentication.
Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, 2018

Replay-resilient Authentication for IoT.
Proceedings of the 10th on Wireless of the Students, 2018

Hardware Implementation of Reconfigurable Separable Convolution.
Proceedings of the 2018 IEEE Computer Society Annual Symposium on VLSI, 2018

Topic Model Based Management Frame Authentication Using CSI Information.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Towards Secure Device Pairing via Vibration Detection.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
Elementary Function Computing Method for Floating-Point Unit.
Signal Processing Systems, 2017

Hardware Implementation for Real-Time Haze Removal.
IEEE Trans. VLSI Syst., 2017

A Platform for Free-Weight Exercise Monitoring with Passive Tags.
IEEE Trans. Mob. Comput., 2017

Haze Removal Using the Difference- Structure-Preservation Prior.
IEEE Trans. Image Processing, 2017

Combining local and global hypotheses in deep neural network for multi-label image classification.
Neurocomputing, 2017

A power-delay-product efficient and SEU-tolerant latch design.
IEICE Electronic Express, 2017

SALM: Smartphone-Based Identity Authentication Using Lip Motion Characteristics.
Proceedings of the 2017 IEEE International Conference on Smart Computing, 2017

HMRL: Relative Localization of RFID Tags with Static Devices.
Proceedings of the 14th Annual IEEE International Conference on Sensing, 2017

Replay-resilient Physical-layer Authentication for Battery-free IoT Devices.
Proceedings of the 4th ACM Workshop on Hot Topics in Wireless, 2017

RFIPad: Enabling Cost-Efficient and Device-Free In-air Handwriting Using Passive Tags.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Poster: Bidimensional Relative Localization Leveraging Interference among Passive Tags.
Proceedings of the 2017 International Conference on Embedded Wireless Systems and Networks, 2017

Efficient CSI Correction with CFO for Uplink MU-MIMO Networks.
Proceedings of the 3rd International Conference on Big Data Computing and Communications, 2017

2016
Hardware Implementation of Reconfigurable 1D Convolution.
Signal Processing Systems, 2016

GenePrint: Generic and Accurate Physical-Layer Identification for UHF RFID Tags.
IEEE/ACM Trans. Netw., 2016

Twins: Device-Free Object Tracking Using Passive Tags.
IEEE/ACM Trans. Netw., 2016

CBID: A Customer Behavior Identification System Using Passive Tags.
IEEE/ACM Trans. Netw., 2016

Task Assignment on Multi-Skill Oriented Spatial Crowdsourcing.
IEEE Trans. Knowl. Data Eng., 2016

Algorithm and VLSI Architecture of Edge-Directed Image Upscaling for 4k Display System.
IEEE Trans. Circuits Syst. Video Techn., 2016

A novel image enhancement method using fuzzy Sure entropy.
Neurocomputing, 2016

Leveraging Topic Model for CSI Based Human Activity Recognition.
Proceedings of the 12th International Conference on Mobile Ad-Hoc and Sensor Networks, 2016

CSI feedback reduction by checking its validity period: poster.
Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, 2016

VADS: Visual attention detection with a smartphone.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Smart retransmission for CSI recovery in uplink multi-user MIMO networks.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

Verifiable smart packaging with passive RFID.
Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2016

Device-free detection of approach and departure behaviors using backscatter communication.
Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2016

Template-Free 3D Reconstruction of Poorly-Textured Nonrigid Surfaces.
Proceedings of the Computer Vision - ECCV 2016, 2016

Instant and Robust Authentication and Key Agreement among Mobile Devices.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Reliable Diversity-Based Spatial Crowdsourcing by Moving Workers.
PVLDB, 2015

A lightweight identity authentication method by exploiting network covert channel.
Peer-to-Peer Networking and Applications, 2015

Matrix computing coprocessor for an embedded system.
Microprocessors and Microsystems - Embedded Hardware Design, 2015

Time Domain Similarity of Lightweight Parameters Based Soil Respiration Sensor Network Deployment.
IJDSN, 2015

An Empirical Study on Hidden Tag Problem.
IJDSN, 2015

Device-Free Mobile Target Tracking Using Passive Tags.
IJDSN, 2015

Event Localization and Actuation in Wireless Sensor Network without Locations.
Ad Hoc & Sensor Wireless Networks, 2015

FEMO: A Platform for Free-weight Exercise Monitoring with RFIDs.
Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems, 2015

Human object estimation via backscattered radio frequency signal.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Accelerating Crowdsourcing Based Indoor Localization Using CSI.
Proceedings of the 21st IEEE International Conference on Parallel and Distributed Systems, 2015

EMoD: Efficient Motion Detection of Device-Free Objects Using Passive RFID Tags.
Proceedings of the 23rd IEEE International Conference on Network Protocols, 2015

NFV: Near Field Vibration Based Group Device Pairing.
Proceedings of the Collaborative Computing: Networking, Applications, and Worksharing, 2015

2014
Efficient and secure key extraction using channel state information.
The Journal of Supercomputing, 2014

Assessing Diagnosis Approaches for Wireless Sensor Networks: Concepts and Analysis.
J. Comput. Sci. Technol., 2014

Communicating Is Crowdsourcing: Wi-Fi Indoor Localization with CSI-Based Speed Estimation.
J. Comput. Sci. Technol., 2014

Error Estimation of Iterative Maximum Likelihood Localization in Wireless Sensor Networks.
Ad Hoc & Sensor Wireless Networks, 2014

Throughput Optimization in Wireless Mesh Networks Using Zero-Sum Game.
Ad Hoc & Sensor Wireless Networks, 2014

Poster: locating RFID tags by rotation.
Proceedings of the 20th Annual International Conference on Mobile Computing and Networking, 2014

KEEP: Fast secret key extraction protocol for D2D communication.
Proceedings of the IEEE 22nd International Symposium of Quality of Service, 2014

Electronic frog eye: Counting crowd using WiFi.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Twins: Device-free object tracking using passive tags.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Nowhere to hide: An empirical study on hidden UHF RFID tags.
Proceedings of the 20th IEEE International Conference on Parallel and Distributed Systems, 2014

A fine-grained indoor localization using multidimensional Wi-Fi fingerprinting.
Proceedings of the 20th IEEE International Conference on Parallel and Distributed Systems, 2014

2013
Localization of Wireless Sensor Networks in the Wild: Pursuit of Ranging Quality.
IEEE/ACM Trans. Netw., 2013

Secure and Efficient Control Transfer for IoT Devices.
IJDSN, 2013

Segmental Dynamic Duty Cycle Control for Sampling Scheduling in Wireless Sensor Networks.
IJDSN, 2013

Near-Optimal Diagnosis System Deployment in Wireless Sensor Networks.
IJDSN, 2013

Tracer: Taming Anomalous Events with CRFID Tags for Trajectory Management.
IJDSN, 2013

Ranking-based Feature Selection for Anomaly Detection in Sensor Networks.
Ad Hoc & Sensor Wireless Networks, 2013

Wi-Fi Fingerprint Based Indoor Localization without Indoor Space Measurement.
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013

MISS: Multi-dimensional Information Sensing Surveillance for Cold Chain Logistics.
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013

Rejecting the attack: Source authentication for Wi-Fi management frames using CSI Information.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

GenePrint: Generic and accurate physical-layer identification for UHF RFID tags.
Proceedings of the 2013 21st IEEE International Conference on Network Protocols, 2013

2012
Using Magnetic RAM to Build Low-Power and Soft Error-Resilient L1 Cache.
IEEE Trans. VLSI Syst., 2012

Footprint: Detecting Sybil Attacks in Urban Vehicular Networks.
IEEE Trans. Parallel Distrib. Syst., 2012

A Scalable P2P Video Conferencing System Based on VCStream Model.
Proceedings of the 2012 IEEE/ACIS 11th International Conference on Computer and Information Science, Shanghai, China, May 30, 2012

2011
On "Movement-Assisted Connectivity Restoration in Wireless Sensor and Actor Networks".
IEEE Trans. Parallel Distrib. Syst., 2011

Efficient and Strategyproof Spectrum Allocations in Multichannel Wireless Networks.
IEEE Trans. Computers, 2011

Removing dubious feedback from mobile wireless ad hoc peer-to-peer systems.
IJAHUC, 2011

Using Potential to Guide Mobile Nodes in Wireless Sensor Networks.
Ad Hoc & Sensor Wireless Networks, 2011

Crowd Density Estimation Using Wireless Sensor Networks.
Proceedings of the Seventh International Conference on Mobile Ad-hoc and Sensor Networks, 2011

Lazy Schema: An Optimal Sampling Frequency Assignment for Real-Time Sensor Systems.
Proceedings of the Seventh International Conference on Mobile Ad-hoc and Sensor Networks, 2011

Exploiting the Associated Information to Locate Mobile Users in Ubiquitous Computing Environment.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011

CCD: Locating Event in Wireless Sensor Network without Locations.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011

Does wireless sensor network scale? A measurement study on GreenOrbs.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Does feature matter: anomaly detection in sensor networks.
Proceedings of the 6th International Conference on Body Area Networks, 2011

2010
Long-term large-scale sensing in the forest: recent advances and future directions of GreenOrbs.
Frontiers Comput. Sci. China, 2010

Efficient Data Retrieving in Distributed Data-streaming Environments.
Ad Hoc & Sensor Wireless Networks, 2010

Locating sensors in the wild: pursuit of ranging quality.
Proceedings of the 8th International Conference on Embedded Networked Sensor Systems, 2010

Filtering Cache Pollution by Using Replacement Operation Based on Confidence Estimation.
Proceedings of the Fifth International Conference on Networking, Architecture, and Storage, 2010

An Adaptive and Selective Instruction Active Push Mechanism for Multi-core Architecture.
Proceedings of the Fifth International Conference on Networking, Architecture, and Storage, 2010

DAWN: Energy efficient data aggregation in WSN with mobile sinks.
Proceedings of the 18th International Workshop on Quality of Service, 2010

CSDA: An Adaptive Data Storage Strategy for Predictive Branch Path on Multi-Core Architecture.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
Joint Throughput Optimization for Wireless Mesh Networks.
IEEE Trans. Mob. Comput., 2009

Canopy closure estimates with GreenOrbs: sustainable sensing in the forest.
Proceedings of the 7th International Conference on Embedded Networked Sensor Systems, 2009

Randomizing RFID Private Authentication.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009

An Enhanced Synchronization Approach for RFID Private Authentication.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

Efficient Data Aggregation in Multi-hop Wireless Sensor Networks under Physical Interference Model.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

Scaling Laws on Multicast Capacity of Large Scale Wireless Networks.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Run to Potential: Sweep Coverage in Wireless Sensor Networks.
Proceedings of the ICPP 2009, 2009

EUL: An Efficient and Universal Localization Method for Wireless Sensor Network.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), 2009

VLSI design of 3D display processing chip for head-mounted display.
Proceedings of the 2009 International IEEE Consumer Electronics Society's Games Innovations Conference, 2009

2008
Signature-File-Based Approach for Query Answering Over Wireless Sensor Networks.
IEEE Trans. Vehicular Technology, 2008

Supporting K nearest neighbors query on high-dimensional data in P2P systems.
Frontiers Comput. Sci. China, 2008

Efficient Throughput for Wireless Mesh Networks by CDMA/OVSF Code Assignment.
Ad Hoc & Sensor Wireless Networks, 2008

Safety assurance for archeologists using sensor network.
Proceedings of the 6th International Conference on Embedded Networked Sensor Systems, 2008

Broadcast capacity for wireless ad hoc networks.
Proceedings of the IEEE 5th International Conference on Mobile Adhoc and Sensor Systems, 2008

Bouncing Tracks in Sensor Networks.
Proceedings of the 14th International Conference on Parallel and Distributed Systems, 2008

2007
An Offset Algorithm for Conflict Resolution in Context-Aware Computing.
Proceedings of the Ubiquitous Intelligence and Computing, 4th International Conference, 2007

Research on context-aware architecture for personal information privacy protection.
Proceedings of the IEEE International Conference on Systems, 2007

Isotope Programming Model: a Kind of Program Model for Context-Aware Application.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

Context-Aware Learning Privacy Disclosure Policy from Interaction History.
Proceedings of the Third International Conference on Natural Computation, 2007

A Study on Context-aware Privacy Protection for Personal Information.
Proceedings of the 16th International Conference on Computer Communications and Networks, 2007

Uncertain Privacy Decision about Access Personal Information in Pervasive Computing Environments.
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007

Cache Predicting Algorithm Based on Context-Aware in Pervasive Computing.
Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007

A Conflict Resolution Method in Context-Aware Computing.
Proceedings of the 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007

2006
Software Aging Prediction Model Based on Fuzzy Wavelet Network with Adaptive Genetic Algorithm.
Proceedings of the 18th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2006), 2006

2005
Secure Multimedia Streaming with Trusted Digital Rights Management.
Proceedings of the 30th Annual IEEE Conference on Local Computer Networks (LCN 2005), 2005

Information Push-Delivery for User-Centered and Personalized Service.
Proceedings of the Fuzzy Systems and Knowledge Discovery, Second International Conference, 2005

Integrating Collaborate and Content-Based Filtering for Personalized Information Recommendation.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

2000
OTMS-A CORBA-Compliant Object Transaction Management System.
Proceedings of the TOOLS Asia 2000: 36th International Conference on Technology of Object-Oriented Languages and Systems, Xi'an, China, 30 October, 2000


  Loading...