Lei Zhu

Orcid: 0000-0001-5925-5743

Affiliations:
  • Xi'an University of Technology, College of Computer Science and Engineering, China


According to our database1, Lei Zhu authored at least 49 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Subspace clustering via adaptive-loss regularized representation learning with latent affinities.
Pattern Anal. Appl., March, 2024

2023
Joint Dual-Structural Constrained and Non-negative Analysis Representation Learning for Pattern Classification.
Appl. Artif. Intell., December, 2023

Semi-automatic representation of design code based on knowledge graph for automated compliance checking.
Comput. Ind., September, 2023

Class-oriented and label embedding analysis dictionary learning for pattern classification.
Multim. Tools Appl., July, 2023

Formal Modeling and Defense Methods for 5G Network Endpoint Access Denial of Service Attacks.
Proceedings of the International Conference on Networking and Network Applications, 2023

Smart Contract Symbol Execution Vulnerability Detection Method Based on CFG Path Pruning.
Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2023

2022
Just-in-time defect prediction for software hunks.
Softw. Pract. Exp., 2022

A Fault-Diagnosis Method for Railway Turnout Systems Based on Improved Autoencoder and Data Augmentation.
Sensors, 2022

Effective Secrecy Throughput Analysis for Communication Systems with a DF Satellite Relay.
Proceedings of the International Conference on Networking and Network Applications, 2022

Discriminative and Robust Analysis Dictionary Learning for Pattern Classification.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2022, 2022

2021
A Novel IoV Block-Streaming Service Awareness and Trusted Verification Scheme in 6G.
IEEE Trans. Veh. Technol., 2021

Deep Learning Data Privacy Protection Based on Homomorphic Encryption in AIoT.
Mob. Inf. Syst., 2021

An intelligent fault diagnosis method based on curve segmentation and SVM for rail transit turnout.
J. Intell. Fuzzy Syst., 2021

An unknown protocol syntax analysis method based on convolutional neural network.
Trans. Emerg. Telecommun. Technol., 2021

A Heuristic SAT Problems Solving Method based on LSTM Network.
Proceedings of the 12th International Symposium on Parallel Architectures, 2021

A permission generation and configuration method based on Rules and FP-Growth algorithm.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021

A fine-grained petri model for SQL time-blind injection.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021

Signature Scheme Based on The SM2 Algorithm in Fabric.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021

Petri net modeling and vulnerability analysis of the Heartbleed.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021

A Method for Fast Outlier Detection in High Dimensional Database Log.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021

A Driving Risk Prediction Approach Based on Generative Adversarial Networks and VANET for Autonomous Trams.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021

Chinese named entity recognition method for the field of network security based on RoBERTa.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021

ConvCatb: An Attention-based CNN-CATBOOST Risk Prediction Model for Driving Safety.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021

2020
From Hardware to Operating System: A Static Measurement Method of Android System Based on TrustZone.
Wirel. Commun. Mob. Comput., 2020

Inference of Suspicious Co-Visitation and Co-Rating Behaviors and Abnormality Forensics for Recommender Systems.
IEEE Trans. Inf. Forensics Secur., 2020

Combined access control model embedding configurable policy for fine-grained data security.
Microprocess. Microsystems, 2020

A trusted feature aggregator federated learning for distributed malicious attack detection.
Comput. Secur., 2020

A study on exercise recommendation method using Knowledge Graph for computer network course.
Proceedings of the International Conference on Networking and Network Applications, 2020

A Framework for Audit Analysis of Heterogeneous Logs from PaaS.
Proceedings of the International Conference on Networking and Network Applications, 2020

Deep Learning as a Service Based on Encrypted Data.
Proceedings of the International Conference on Networking and Network Applications, 2020

Optimizing Scoring and Sorting Operations for Faster WAND Processing.
Proceedings of the Advanced Data Mining and Applications - 16th International Conference, 2020

2019
A novel subgraph querying method based on paths and spectra.
Neural Comput. Appl., 2019

RSU authentication in vehicular ad hoc networks base on verifiable secret sharing.
J. Intell. Fuzzy Syst., 2019

An energy saving based on task migration for mobile edge computing.
EURASIP J. Wirel. Commun. Netw., 2019

Efficient group authentication in RFID using secret sharing scheme.
Clust. Comput., 2019

Feature Extraction Optimization for Bitstream Communication Protocol Format Reverse Analysis.
Proceedings of the 18th IEEE International Conference On Trust, 2019

A Novel Chinese Word Segmentation Method for Rail Transit Codes.
Proceedings of the International Conference on Artificial Intelligence and Advanced Manufacturing, 2019

2018
Gleer: A Novel Gini-Based Energy Balancing Scheme for Mobile Botnet Retopology.
Wirel. Commun. Mob. Comput., 2018

Software change-proneness prediction through combination of bagging and resampling methods.
J. Softw. Evol. Process., 2018

Cheating identifiable secret sharing scheme using symmetric bivariate polynomial.
Inf. Sci., 2018

A novel energy-aware trustworthy multi-hop routing model for Internet of things.
Int. J. Distributed Sens. Networks, 2018

Analysis and Protection of DDOS Attack Based on RSSP-II Protocol.
Proceedings of the International Conference on Networking and Network Applications, 2018

A RMM Based Word Segmentation Method for Chinese Design Specifications of Building Stairs.
Proceedings of the 14th International Conference on Computational Intelligence and Security, 2018

A Novel Subgraph Querying Method on Directed Weighted Graphs.
Proceedings of the 14th International Conference on Computational Intelligence and Security, 2018

2017
Efficient (k, n) Secret Sharing Scheme Secure against k - 2 Cheaters.
Proceedings of the International Conference on Networking and Network Applications, 2017

2016
Towards energy efcient cloud: an optimized ant colony model for virtual machine placement.
J. Commun. Inf. Networks, 2016

(k, n) Secret Sharing Scheme against Two Types of Cheaters.
Proceedings of the International Conference on Networking and Network Applications, 2016

A New Interference Aware Routing Metric for Multi-radio Multi-channel Wireless Mesh Networks.
Proceedings of the International Conference on Networking and Network Applications, 2016

2015
A Selective Detector Ensemble for Concept Drift Detection.
Comput. J., 2015


  Loading...