Linfeng Zhou

Orcid: 0000-0003-4520-5344

According to our database1, Linfeng Zhou authored at least 13 papers between 2009 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Classification on Boundary-Equilibria and Singular Continuums of Continuous Piecewise Linear Systems.
Int. J. Bifurc. Chaos, March, 2023

2022
An Energy-Efficient Wearable Functional Near-infrared Spectroscopy System Employing Dual-level Adaptive Sampling Technique.
IEEE Trans. Biomed. Circuits Syst., 2022

A Sub-0.01° Phase Resolution 6.8-mW fNIRS Readout Circuit Employing a Mixer-First Frequency-Domain Architecture.
Proceedings of the 48th IEEE European Solid State Circuits Conference, 2022

2021
An Energy Efficient Functional near Infrared Spectroscopy System Employing Spatial Adaptive Sampling Technique.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2021

2020
A Multichannel fNIRS System for Prefrontal Mental Task Classification with Dual-level Excitation and Deep Forest Algorithm.
J. Sensors, 2020

Anonymous Lottery in the Proof-of-Stake Setting.
IACR Cryptol. ePrint Arch., 2020

2016
Collusion Resistant Broadcast Encryption with Tight Reductions and Beyond.
IACR Cryptol. ePrint Arch., 2016

From Weakly Selective to Selective Security in Compact Functional Encryption.
IACR Cryptol. ePrint Arch., 2016

2012
Measuring and ranking attacks based on vulnerability analysis.
Inf. Syst. E Bus. Manag., 2012

2010
Measuring Similarity for Security Vulnerabilities.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010

Ranking Attacks Based on Vulnerability Analysis.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010

2009
Environmental Metrics for Software Security Based on a Vulnerability Ontology.
Proceedings of the Third IEEE International Conference on Secure Software Integration and Reliability Improvement, 2009

Ontology-based security assessment for software products.
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009


  Loading...