Liwei Zhang

According to our database1, Liwei Zhang
  • authored at least 97 papers between 2003 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Scene flow for 3D laser scanner and camera system.
IET Image Processing, 2018

Kernel-smoothed proper orthogonal decomposition (KSPOD)-based emulation for prediction of spatiotemporally evolving flow dynamics.
CoRR, 2018

2017
A Conjugate Gradient Method for Electronic Structure Calculations.
SIAM J. Scientific Computing, 2017

Convergence Analysis for Mathematical Programs with Distributionally Robust Chance Constraint.
SIAM Journal on Optimization, 2017

Characterization of the Robust Isolated Calmness for a Class of Conic Programming Problems.
SIAM Journal on Optimization, 2017

Probability approximation schemes for stochastic programs with distributionally robust second-order dominance constraints.
Optimization Methods and Software, 2017

ccNET: Database of co-expression networks with functional modules for diploid and polyploid Gossypium.
Nucleic Acids Research, 2017

Quantitative stability analysis of stochastic quasi-variational inequality problems and applications.
Math. Program., 2017

Multiple Vehicle Formation Control Based on Robust Adaptive Control Algorithm.
IEEE Intell. Transport. Syst. Mag., 2017

Towards Sound and Optimal Leakage Detection Procedure.
IACR Cryptology ePrint Archive, 2017

Differential Fault Analysis of SHA-3 under Relaxed Fault Models.
IACR Cryptology ePrint Archive, 2017

Data-Driven Analysis and Common Proper Orthogonal Decomposition (CPOD)-Based Spatio-Temporal Emulator for Design Exploration.
CoRR, 2017

Dynamic objects detection and tracking for a laser scanner and camera system.
Proceedings of the 2017 IEEE International Conference on Robotics and Biomimetics, 2017

Compiler-Assisted Threshold Implementation against Power Analysis Attacks.
Proceedings of the 2017 IEEE International Conference on Computer Design, 2017

EEG Features Extraction and Classification of Rifle Shooters in the Aiming Period.
Proceedings of the Digital Human Modeling. Applications in Health, Safety, Ergonomics, and Risk Management: Health and Safety, 2017

Towards Sound and Optimal Leakage Detection Procedure.
Proceedings of the Smart Card Research and Advanced Applications, 2017

Precise calibration for the coordinates of surgical needle's tip based on transform invariant matrix and spherical constraints.
Proceedings of the 2017 IEEE EMBS International Conference on Biomedical & Health Informatics, 2017

2016
Quantitative Stability Analysis for Distributionally Robust Optimization with Moment Constraints.
SIAM Journal on Optimization, 2016

On the upper Lipschitz property of the KKT mapping for nonlinear semidefinite optimization.
Oper. Res. Lett., 2016

Measure prediction capability of data for collaborative filtering.
Knowl. Inf. Syst., 2016

A Unified Metric for Quantifying Information Leakage of Cryptographic Devices under Power Analysis Attacks.
IACR Cryptology ePrint Archive, 2016

Statistical Analysis for Access-Driven Cache Attacks Against AES.
IACR Cryptology ePrint Archive, 2016

An Improvement of Both Security and Reliability for Keccak Implementations on Smart Card.
IACR Cryptology ePrint Archive, 2016

Differential Fault Analysis of SHA3-224 and SHA3-256.
IACR Cryptology ePrint Archive, 2016

SorghumFDB: sorghum functional genomics database with multidimensional network analysis.
Database, 2016

No Gap Second-order Optimality Conditions for a Matrix Cone Programming Induced by the Nuclear Norm.
APJOR, 2016

A Sequential Convex Program Approach to an Inverse Linear Semidefinite Programming Problem.
APJOR, 2016

An automatic calibration between an omni-directional camera and a laser rangefinder for dynamic scenes reconstruction.
Proceedings of the 2016 IEEE International Conference on Robotics and Biomimetics, 2016

Task execution based-on human-robot dialogue and deictic gestures.
Proceedings of the 2016 IEEE International Conference on Robotics and Biomimetics, 2016

Vision-based real-time 3D mapping for UAV with laser sensor.
Proceedings of the 2016 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2016

Differential Fault Analysis of SHA3-224 and SHA3-256.
Proceedings of the 2016 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2016

Experience Representation of Artificial Cognitive System in Interaction with Real World.
Proceedings of the 38th Annual Meeting of the Cognitive Science Society, 2016

2015
Smoothing SQP Methods for Solving Degenerate Nonsmooth Constrained Optimization Problems with Applications to Bilevel Programs.
SIAM Journal on Optimization, 2015

A smoothing majorization method for l22-lpp matrix minimization.
Optimization Methods and Software, 2015

An inexact Newton method for stationary points of mathematical programs constrained by parameterized quasi-variational inequalities.
Numerical Algorithms, 2015

A perturbation approach for an inverse quadratic programming problem over second-order cones.
Math. Comput., 2015

First order necessary optimality conditions for mathematical programs with second-order cone complementarity constraints.
J. Global Optimization, 2015

On the coderivative of the solution mapping to a second-order cone constrained parametric variational inequality.
J. Global Optimization, 2015

Smoothing augmented Lagrangian method for nonsmooth constrained optimization problems.
J. Global Optimization, 2015

A statistics-based success rate model for DPA and CPA.
J. Cryptographic Engineering, 2015

A sample average approximation regularization method for a stochastic mathematical program with general vertical complementarity constraints.
J. Computational Applied Mathematics, 2015

Towards Secure Cryptographic Software Implementation Against Side-Channel Power Analysis Attacks.
IACR Cryptology ePrint Archive, 2015

The augmented Lagrangian method based on the APG strategy for an inverse damped gyroscopic eigenvalue problem.
Comp. Opt. and Appl., 2015

GraP: platform for functional genomics analysis of Gossypium raimondii.
Database, 2015

The Rate of Convergence of a NLM Based on F-B NCP for Constrained Optimization Problems Without Strict Complementarity.
APJOR, 2015

A novel optical tracking based tele-control system for tabletop object manipulation tasks.
Proceedings of the 2015 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2015

Efficient 2nd-order power analysis on masked devices utilizing multiple leakage.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2015

A Unified Metric for Quantifying Information Leakage of Cryptographic Devices Under Power Analysis Attacks.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015

Towards secure cryptographic software implementation against side-channel power analysis attacks.
Proceedings of the 26th IEEE International Conference on Application-specific Systems, 2015

2014
Calibrating low-rank correlation matrix problem: an SCA-based approach.
Optimization Methods and Software, 2014

The RACE Project - Robustness by Autonomous Competence Enhancement.
KI, 2014

A Smoothing Function Approach to Joint Chance-Constrained Programs.
J. Optimization Theory and Applications, 2014

Conditional Value-at-Risk Approximation to Value-at-Risk Constrained Programs: A Remedy via Monte Carlo.
INFORMS Journal on Computing, 2014

Side-channel Power Analysis of Different Protection Schemes Against Fault Attacks on AES.
IACR Cryptology ePrint Archive, 2014

A Statistics-based Fundamental Model for Side-channel Attack Analysis.
IACR Cryptology ePrint Archive, 2014

A Statistical Model for Higher Order DPA on Masked Devices.
IACR Cryptology ePrint Archive, 2014

An improved Bayesian NMF-based speech enhancement method using multivariate Laplace distribution.
Proceedings of the Sixth International Conference on Wireless Communications and Signal Processing, 2014

Side-channel power analysis of different protection schemes against fault attacks on AES.
Proceedings of the 2014 International Conference on ReConFigurable Computing and FPGAs, 2014

Fourier analysis techniques applied in data registration: A survey.
Proceedings of the International Conference on Multisensor Fusion and Information Integration for Intelligent Systems, 2014

An hyperreality imagination based reasoning and evaluation system (HIRES).
Proceedings of the 2014 IEEE International Conference on Robotics and Automation, 2014

A Statistical Model for Higher Order DPA on Masked Devices.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2014, 2014

2013
Nonsingularity in matrix conic optimization induced by spectral norm via a smoothing metric projector.
Math. Meth. of OR, 2013

A smoothing Newton method for mathematical programs governed by second-order cone constrained generalized equations.
J. Global Optimization, 2013

Multiview triangulation with uncertain data.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2013

MNSM-inspired method for the motion control of dual-arm robot.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2013

Parallel plan execution and re-planning on a mobile robot using state machines with HTN planning systems.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2013

2012
Differential Properties of the Symmetric Matrix-Valued Fischer-Burmeister Function.
J. Optimization Theory and Applications, 2012

An Energy Supply System for Wireless Sensor Network Nodes.
IJDSN, 2012

Overall Development of Logistics in Wuhan Urban Agglomeration and Its Influence to Regional Economy.
Proceedings of the 11th Wuhan International Conference on E-Business, 2012

Active piezoelectric energy harvester based on impedance matching.
Proceedings of the 2012 IEEE International Conference on Automation and Logistics, 2012

An Improved Self-organization Antibody Network for Pattern Recognition and Its Performance Study.
Proceedings of the Pattern Recognition - Chinese Conference, 2012

2011
Sequential Convex Approximations to Joint Chance Constrained Programs: A Monte Carlo Approach.
Operations Research, 2011

A perturbation approach for a type of inverse linear programming problems.
Int. J. Comput. Math., 2011

Blind Multiuser Detection Based on Tikhonov Regularization.
IEEE Communications Letters, 2011

A class of nonlinear Lagrangians for nonconvex second order cone programming.
Comp. Opt. and Appl., 2011

Optimizing Single-Source Capacitated FLP in Fuzzy Decision Systems.
Proceedings of the Advances in Swarm Intelligence - Second International Conference, 2011

Measurement and prediction of DTMB reception quality in single frequency networks.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011

Discrimination of person names based on contexts co-occurrence.
Proceedings of the Eighth International Conference on Fuzzy Systems and Knowledge Discovery, 2011

2010
A Perturbation approach for an inverse quadratic programming problem.
Math. Meth. of OR, 2010

Homography estimation in omnidirectional vision under the L∞-norm.
Proceedings of the 2010 IEEE International Conference on Robotics and Biomimetics, 2010

A comparative study for fast-flux service networks detection.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2010

Detecting Trojan horses based on system behavior using machine learning method.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2010

A novel watermarking scheme with compensation in bit-stream domain for H.264/AVC.
Proceedings of the IEEE International Conference on Acoustics, 2010

2009
ABS Algorithms for Optimization.
Proceedings of the Encyclopedia of Optimization, Second Edition, 2009

Properties of equation reformulation of the Karush-Kuhn-Tucker condition for nonlinear second order cone optimization problems.
Math. Meth. of OR, 2009

A globally convergent method based on Fischer-Burmeister operators for solving second-order cone constrained variational inequality problems.
Computers & Mathematics with Applications, 2009

Research on Web Information Filtering Based on Incremental Feedback Algorithm.
Proceedings of the Sixth International Conference on Fuzzy Systems and Knowledge Discovery, 2009

Modular Certification of Low-Level Intermediate Representation Programs.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009

2008
The rate of convergence of the augmented Lagrangian method for nonlinear semidefinite programming.
Math. Program., 2008

Development and Policy Proposals of Ruralinformatization in China.
Proceedings of the Computer and Computing Technologies in Agriculture II, Volume 3, 2008

Development Strategy for Mobilecommunications Market in Chinese Rural Area.
Proceedings of the Computer and Computing Technologies in Agriculture II, Volume 3, 2008

2007
Convergence analysis of a differential equation approach for solving nonlinear programming problems.
Applied Mathematics and Computation, 2007

A Log-Sigmoid lagrangisn neutral network for solving nonlinear programming.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

A Lloyd-Max-based Non-Uniform Quantization Scheme for Distributed Video Coding.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

2005
Real-time automated visual inspection system for contaminant removal from wool.
Real-Time Imaging, 2005

Integration of sorting system for contaminant removal from wool using a second computer.
Computers in Industry, 2005

2003
On the Log-exponential Trajectory of Linear Programming.
J. Global Optimization, 2003


  Loading...