Liwei Zhang

Orcid: 0009-0002-5581-6552

According to our database1, Liwei Zhang authored at least 181 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Research on patent quality evaluation based on rough set and cloud model.
Expert Syst. Appl., January, 2024

2023
Perturbation analysis of the euclidean distance matrix optimization problem and its numerical implications.
Comput. Optim. Appl., December, 2023

Enhancing the security of image steganography via multiple adversarial networks and channel attention modules.
Digit. Signal Process., September, 2023

A Unified User-Generic Framework for Myoelectric Pattern Recognition: Mix-Up and Adversarial Training for Domain Generalization and Adaptation.
IEEE Trans. Biomed. Eng., August, 2023

The augmented Lagrangian method can approximately solve convex optimization with least constraint violation.
Math. Program., July, 2023

Alternating direction method of multipliers for linear hyperspectral unmixing.
Math. Methods Oper. Res., June, 2023

Is open science a double-edged sword?: data sharing and the changing citation pattern of Chinese economics articles.
Scientometrics, May, 2023

Stochastic Approximation Proximal Method of Multipliers for Convex Stochastic Programming.
Math. Oper. Res., February, 2023

Stochastic Regularized Newton Methods for Nonlinear Equations.
J. Sci. Comput., February, 2023

Statistical Robustness of Empirical Risks in Machine Learning.
J. Mach. Learn. Res., 2023

Regrets of proximal method of multipliers for online non-convex optimization with long term constraints.
J. Glob. Optim., 2023

A Robust Reversible Data Hiding Algorithm Based on Polar Harmonic Fourier Moments.
Proceedings of the Science of Cyber Security - 5th International Conference, 2023

Enhancing the Anti-steganalysis Ability of Image Steganography via Multiple Adversarial Networks.
Proceedings of the Science of Cyber Security - 5th International Conference, 2023

Efficient Membership Inference Attacks against Federated Learning via Bias Differences.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

2022
A Global Multiregional Proteomic Map of the Human Cerebral Cortex.
Genom. Proteom. Bioinform., August, 2022

Predictive Analysis of Machine Learning Error Classification Based on Bayesian Network.
Wirel. Pers. Commun., 2022

Spatio-Temporal Patterns of Ecosystem Services Provided by Urban Green Spaces and Their Equity along Urban-Rural Gradients in the Xi'an Metropolitan Area, China.
Remote. Sens., 2022

Yosida-regularization based differential equation approach to generalized equations with applications to nonlinear convex programming.
Numer. Algorithms, 2022

ompTG: From OpenMP Programs to Task Graphs.
J. Syst. Archit., 2022

The Analysis of the Power Law Feature in Complex Networks.
Entropy, 2022

A personalized image-guided intervention system for peripheral lung cancer on patient-specific respiratory motion model.
Int. J. Comput. Assist. Radiol. Surg., 2022

Polar Grid Based Point Cloud Ground Segmentation.
Proceedings of the Cognitive Systems and Information Processing, 2022

Region Clustering for Mobile Robot Autonomous Exploration in Unknown Environment.
Proceedings of the Cognitive Systems and Information Processing, 2022

2021
Encode-decode network with fully connected CRF for dynamic objects detection and static maps reconstruction.
Signal Process. Image Commun., 2021

Existence and Approximation of Continuous Bayesian Nash Equilibria in Games with Continuous Type and Action Spaces.
SIAM J. Optim., 2021

Modified Poisson-Nernst-Planck Model with Coulomb and Hard-sphere Correlations.
SIAM J. Appl. Math., 2021

What affects publications' popularity on Twitter?
Scientometrics, 2021

Does open data boost journal impact: evidence from Chinese economics.
Scientometrics, 2021

The rate of convergence of proximal method of multipliers for second-order cone optimization problems.
Optim. Lett., 2021

Generalized Poisson Hurdle Model for Count Data and Its Application in Ear Disease.
Entropy, 2021

Convergent and orthogonality preserving schemes for approximating the Kohn-Sham orbitals.
CoRR, 2021

High-Accuracy Real-Time Fish Detection Based on Self-Build Dataset and RIRD-YOLOv3.
Complex., 2021

Application Research of Fuzzy PID Control Optimized by Genetic Algorithm in Medium and Low Speed Maglev Train Charger.
IEEE Access, 2021

Hybrid Frontier Detection Strategy for Autonomous Exploration in Multi-obstacles Environment.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2021

H3K27M Mutations Prediction for Brainstem Gliomas Based on Diffusion Radiomics Learning.
Proceedings of the Machine Learning in Clinical Neuroimaging - 4th International Workshop, 2021

2020
Effects of Large Permanent Charges on Ionic Flows via Poisson-Nernst-Planck Models.
SIAM J. Appl. Dyn. Syst., 2020

Grasping Force Control of Multi-Fingered Robotic Hands through Tactile Sensing for Object Stabilization.
Sensors, 2020

Rapidly-exploring Random Trees multi-robot map exploration under optimization framework.
Robotics Auton. Syst., 2020

The rate of convergence of proximal method of multipliers for nonlinear programming.
Optim. Methods Softw., 2020

The rate of convergence of proximal method of multipliers for equality constrained optimization problems.
Optim. Lett., 2020

A neurodynamic optimization approach for complex-variables programming problem.
Neural Networks, 2020

A linearly convergent majorized ADMM with indefinite proximal terms for convex composite programming and its applications.
Math. Comput., 2020

计算机化神经认知评估系统研究综述 (Survey on Computerized Neurocognitive Assessment System).
计算机科学, 2020

Distributed Cooperative Obstacle Avoidance for Mobile Robots Using Independent Virtual Center Points.
J. Intell. Robotic Syst., 2020

Inverse semidefinite quadratic programming problem with l1 norm measure.
J. Comput. Appl. Math., 2020

Multimodal Multiobject Tracking by Fusing Deep Appearance Features and Motion Information.
Complex., 2020

Critical Multipliers in Semidefinite Programming.
Asia Pac. J. Oper. Res., 2020

Research on the Method of Suppressing the End Detent Force of Permanent Magnet Linear Synchronous Motor Based on Stepped Double Auxiliary Pole.
IEEE Access, 2020

Efficient and High-Quality Monocular Depth Estimation via Gated Multi-Scale Network.
IEEE Access, 2020

Load Segment Tracking Control of IPT System Based on Power Efficiency Optimization.
IEEE Access, 2020

Neuron Activation Frequency Based Test Case Prioritization.
Proceedings of the International Symposium on Theoretical Aspects of Software Engineering, 2020

100-Gbit/s/λ PAM-4 Signal Transmission over 80-km SSMF Based on an 18-GHz EML at O-Band.
Proceedings of the Optical Fiber Communications Conference and Exhibition, 2020

Fast Barcode Detection Method Based on ThinYOLOv4.
Proceedings of the Cognitive Systems and Signal Processing - 5th International Conference, 2020

Fingerprint-based Indoor Localization using Weighted K-Nearest Neighbor and Weighted Signal Intensity.
Proceedings of the AIAM2020: 2nd International Conference on Artificial Intelligence and Advanced Manufacture, 2020

2019
Efficient Nonprofiling 2nd-Order Power Analysis on Masked Devices Utilizing Multiple Leakage Points.
IEEE Trans. Dependable Secur. Comput., 2019

Combining Model-Based $Q$ -Learning With Structural Knowledge Transfer for Robot Skill Learning.
IEEE Trans. Cogn. Dev. Syst., 2019

Dark Channel: The Devil is in the Details.
IEEE Signal Process. Lett., 2019

Learning motion field of LiDAR point cloud with convolutional networks.
Pattern Recognit. Lett., 2019

Perturbation analysis of nonlinear semidefinite programming under Jacobian uniqueness conditions.
Optim. Lett., 2019

Enhanced high-frequency precuneus-cortical effective connectivity is associated with decreased sensory gating following total sleep deprivation.
NeuroImage, 2019

Scene flow estimation by depth map upsampling and layer assignment for camera-LiDAR system.
J. Vis. Commun. Image Represent., 2019

A Multilevel Terrain Rendering Method Based on Dynamic Stitching Strips.
ISPRS Int. J. Geo Inf., 2019

An Integrated Framework Combining Multiple Human Activity Features for Land Use Classification.
ISPRS Int. J. Geo Inf., 2019

From core-scale experiment to reservoir-scale modeling: A scale-up approach to investigate reaction-induced permeability evolution of CO<sub>2</sub> storage reservoir and caprock at a U.S. CO<sub>2</sub> storage site.
Comput. Geosci., 2019

A Multistage Feedback Control Strategy for Producing 1, 3-Propanediol in Microbial Continuous Fermentation.
Complex., 2019

Fault diagnosis for oil-filled transformers using voting based extreme learning machine.
Clust. Comput., 2019

Statistical Inference of Second-Order Cone Programming.
Asia Pac. J. Oper. Res., 2019

Design and Analysis of Platform Shielding for Wireless Charging Tram.
IEEE Access, 2019

Creating interdisciplinary collaborative teaching/learning praxis with design thinking, communication, and composition.
Proceedings of the 37th ACM International Conference on the Design of Communication, 2019

Demonstration of 260-Gb/s Single-Lane EML-Based PS-PAM-8 IM/DD for Datacenter Interconnects.
Proceedings of the Optical Fiber Communications Conference and Exhibition, 2019

Demonstration of 100-Gb/s/λ PAM-4 Transmission Over 45-km SSMF using one 10G-Class DML in the C-Band.
Proceedings of the Optical Fiber Communications Conference and Exhibition, 2019

2018
A Cascaded Deep Convolutional Neural Network for Joint Segmentation and Genotype Prediction of Brainstem Gliomas.
IEEE Trans. Biomed. Eng., 2018

Why highly cited articles are not highly tweeted? A biology case.
Scientometrics, 2018

A learning framework for semantic reach-to-grasp tasks integrating machine learning and optimization.
Robotics Auton. Syst., 2018

Linear Rate Convergence of the Alternating Direction Method of Multipliers for Convex Composite Programming.
Math. Oper. Res., 2018

A Regularized Semi-Smooth Newton Method with Projection Steps for Composite Convex Programs.
J. Sci. Comput., 2018

Proximal advantage in knowledge diffusion: The time dimension.
J. Informetrics, 2018

A note on distributionally robust optimization under moment uncertainty.
J. Num. Math., 2018

Power Analysis Attack of an AES GPU Implementation.
J. Hardw. Syst. Secur., 2018

Scene flow for 3D laser scanner and camera system.
IET Image Process., 2018

Static map reconstruction and dynamic object tracking for a camera and laser scanner system.
IET Comput. Vis., 2018

Synergistic Drug Combination Prediction by Integrating Multi-omics Data in Deep Learning Models.
CoRR, 2018

Kernel-smoothed proper orthogonal decomposition (KSPOD)-based emulation for prediction of spatiotemporally evolving flow dynamics.
CoRR, 2018

Hadamard Directional Differentiability of the Optimal Value Function of a Quadratic Programming Problem.
Asia Pac. J. Oper. Res., 2018

Statistical Inference of Second-Order Cone Programming.
Asia Pac. J. Oper. Res., 2018

Quantitative Stability of Two-Stage Linear Second-Order Conic Stochastic Programs with Full Random Recourse.
Asia Pac. J. Oper. Res., 2018

A Spacecraft AIT Visualization Control System Based on VR Technology.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2018

Real-time Indoor Dense 3D Reconstruction of Integration Inertial Measurements Into Surfels.
Proceedings of the IEEE International Conference on Information and Automation, 2018

Vision-and-Lidar Based Real-time Outdoor Localization for Unmanned Ground Vehicles without GPS.
Proceedings of the IEEE International Conference on Information and Automation, 2018

Multi-robot CSLAM in the Unknown Environment.
Proceedings of the IEEE International Conference on Information and Automation, 2018

2017
A Conjugate Gradient Method for Electronic Structure Calculations.
SIAM J. Sci. Comput., 2017

Convergence Analysis for Mathematical Programs with Distributionally Robust Chance Constraint.
SIAM J. Optim., 2017

Characterization of the Robust Isolated Calmness for a Class of Conic Programming Problems.
SIAM J. Optim., 2017

Probability approximation schemes for stochastic programs with distributionally robust second-order dominance constraints.
Optim. Methods Softw., 2017

ccNET: Database of co-expression networks with functional modules for diploid and polyploid Gossypium.
Nucleic Acids Res., 2017

Quantitative stability analysis of stochastic quasi-variational inequality problems and applications.
Math. Program., 2017

Differential Fault Analysis of SHA-3 Under Relaxed Fault Models.
J. Hardw. Syst. Secur., 2017

Multiple Vehicle Formation Control Based on Robust Adaptive Control Algorithm.
IEEE Intell. Transp. Syst. Mag., 2017

Towards Sound and Optimal Leakage Detection Procedure.
IACR Cryptol. ePrint Arch., 2017

Data-Driven Analysis and Common Proper Orthogonal Decomposition (CPOD)-Based Spatio-Temporal Emulator for Design Exploration.
CoRR, 2017

Dynamic objects detection and tracking for a laser scanner and camera system.
Proceedings of the 2017 IEEE International Conference on Robotics and Biomimetics, 2017

Compiler-Assisted Threshold Implementation against Power Analysis Attacks.
Proceedings of the 2017 IEEE International Conference on Computer Design, 2017

EEG Features Extraction and Classification of Rifle Shooters in the Aiming Period.
Proceedings of the Digital Human Modeling. Applications in Health, Safety, Ergonomics, and Risk Management: Health and Safety, 2017

Precise calibration for the coordinates of surgical needle's tip based on transform invariant matrix and spherical constraints.
Proceedings of the 2017 IEEE EMBS International Conference on Biomedical & Health Informatics, 2017

2016
Quantitative Stability Analysis for Distributionally Robust Optimization with Moment Constraints.
SIAM J. Optim., 2016

On the upper Lipschitz property of the KKT mapping for nonlinear semidefinite optimization.
Oper. Res. Lett., 2016

Measure prediction capability of data for collaborative filtering.
Knowl. Inf. Syst., 2016

A Unified Metric for Quantifying Information Leakage of Cryptographic Devices under Power Analysis Attacks.
IACR Cryptol. ePrint Arch., 2016

Statistical Analysis for Access-Driven Cache Attacks Against AES.
IACR Cryptol. ePrint Arch., 2016

An Improvement of Both Security and Reliability for Keccak Implementations on Smart Card.
IACR Cryptol. ePrint Arch., 2016

Differential Fault Analysis of SHA3-224 and SHA3-256.
IACR Cryptol. ePrint Arch., 2016

SorghumFDB: sorghum functional genomics database with multidimensional network analysis.
Database J. Biol. Databases Curation, 2016

No Gap Second-order Optimality Conditions for a Matrix Cone Programming Induced by the Nuclear Norm.
Asia Pac. J. Oper. Res., 2016

A Sequential Convex Program Approach to an Inverse Linear Semidefinite Programming Problem.
Asia Pac. J. Oper. Res., 2016

An automatic calibration between an omni-directional camera and a laser rangefinder for dynamic scenes reconstruction.
Proceedings of the 2016 IEEE International Conference on Robotics and Biomimetics, 2016

Task execution based-on human-robot dialogue and deictic gestures.
Proceedings of the 2016 IEEE International Conference on Robotics and Biomimetics, 2016

Vision-based real-time 3D mapping for UAV with laser sensor.
Proceedings of the 2016 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2016

Experience Representation of Artificial Cognitive System in Interaction with Real World.
Proceedings of the 38th Annual Meeting of the Cognitive Science Society, 2016

2015
Smoothing SQP Methods for Solving Degenerate Nonsmooth Constrained Optimization Problems with Applications to Bilevel Programs.
SIAM J. Optim., 2015

A smoothing majorization method for l<sub>2</sub><sup>2</sup>-l<sub>p</sub><sup>p</sup> matrix minimization.
Optim. Methods Softw., 2015

An inexact Newton method for stationary points of mathematical programs constrained by parameterized quasi-variational inequalities.
Numer. Algorithms, 2015

A perturbation approach for an inverse quadratic programming problem over second-order cones.
Math. Comput., 2015

First order necessary optimality conditions for mathematical programs with second-order cone complementarity constraints.
J. Glob. Optim., 2015

On the coderivative of the solution mapping to a second-order cone constrained parametric variational inequality.
J. Glob. Optim., 2015

Smoothing augmented Lagrangian method for nonsmooth constrained optimization problems.
J. Glob. Optim., 2015

A statistics-based success rate model for DPA and CPA.
J. Cryptogr. Eng., 2015

A sample average approximation regularization method for a stochastic mathematical program with general vertical complementarity constraints.
J. Comput. Appl. Math., 2015

Towards Secure Cryptographic Software Implementation Against Side-Channel Power Analysis Attacks.
IACR Cryptol. ePrint Arch., 2015

The augmented Lagrangian method based on the APG strategy for an inverse damped gyroscopic eigenvalue problem.
Comput. Optim. Appl., 2015

GraP: platform for functional genomics analysis of <i>Gossypium raimondii</i>.
Database J. Biol. Databases Curation, 2015

The Rate of Convergence of a NLM Based on F-B NCP for Constrained Optimization Problems Without Strict Complementarity.
Asia Pac. J. Oper. Res., 2015

A novel optical tracking based tele-control system for tabletop object manipulation tasks.
Proceedings of the 2015 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2015

Efficient 2nd-order power analysis on masked devices utilizing multiple leakage.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2015

2014
Calibrating low-rank correlation matrix problem: an SCA-based approach.
Optim. Methods Softw., 2014

The RACE Project - Robustness by Autonomous Competence Enhancement.
Künstliche Intell., 2014

A Smoothing Function Approach to Joint Chance-Constrained Programs.
J. Optim. Theory Appl., 2014

Conditional Value-at-Risk Approximation to Value-at-Risk Constrained Programs: A Remedy via Monte Carlo.
INFORMS J. Comput., 2014

Side-channel Power Analysis of Different Protection Schemes Against Fault Attacks on AES.
IACR Cryptol. ePrint Arch., 2014

A Statistics-based Fundamental Model for Side-channel Attack Analysis.
IACR Cryptol. ePrint Arch., 2014

A Statistical Model for Higher Order DPA on Masked Devices.
IACR Cryptol. ePrint Arch., 2014

An improved Bayesian NMF-based speech enhancement method using multivariate Laplace distribution.
Proceedings of the Sixth International Conference on Wireless Communications and Signal Processing, 2014

Fourier analysis techniques applied in data registration: A survey.
Proceedings of the International Conference on Multisensor Fusion and Information Integration for Intelligent Systems, 2014

An hyperreality imagination based reasoning and evaluation system (HIRES).
Proceedings of the 2014 IEEE International Conference on Robotics and Automation, 2014

2013
Nonsingularity in matrix conic optimization induced by spectral norm via a smoothing metric projector.
Math. Methods Oper. Res., 2013

A smoothing Newton method for mathematical programs governed by second-order cone constrained generalized equations.
J. Glob. Optim., 2013

Multiview triangulation with uncertain data.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2013

MNSM-inspired method for the motion control of dual-arm robot.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2013

Parallel plan execution and re-planning on a mobile robot using state machines with HTN planning systems.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2013

Exception handling for experience-based mobile cognitive systems in restaurant environments exemplified by guest detection.
Proceedings of the IEEE International Conference on Information and Automation, 2013

2012
Differential Properties of the Symmetric Matrix-Valued Fischer-Burmeister Function.
J. Optim. Theory Appl., 2012

An Energy Supply System for Wireless Sensor Network Nodes.
Int. J. Distributed Sens. Networks, 2012

Overall Development of Logistics in Wuhan Urban Agglomeration and Its Influence to Regional Economy.
Proceedings of the 11th Wuhan International Conference on E-Business, 2012

Active piezoelectric energy harvester based on impedance matching.
Proceedings of the 2012 IEEE International Conference on Automation and Logistics, 2012

An Improved Self-organization Antibody Network for Pattern Recognition and Its Performance Study.
Proceedings of the Pattern Recognition - Chinese Conference, 2012

2011
Sequential Convex Approximations to Joint Chance Constrained Programs: A Monte Carlo Approach.
Oper. Res., 2011

A perturbation approach for a type of inverse linear programming problems.
Int. J. Comput. Math., 2011

Blind Multiuser Detection Based on Tikhonov Regularization.
IEEE Commun. Lett., 2011

A class of nonlinear Lagrangians for nonconvex second order cone programming.
Comput. Optim. Appl., 2011

Optimizing Single-Source Capacitated FLP in Fuzzy Decision Systems.
Proceedings of the Advances in Swarm Intelligence - Second International Conference, 2011

Measurement and prediction of DTMB reception quality in single frequency networks.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011

Discrimination of person names based on contexts co-occurrence.
Proceedings of the Eighth International Conference on Fuzzy Systems and Knowledge Discovery, 2011

2010
A Perturbation approach for an inverse quadratic programming problem.
Math. Methods Oper. Res., 2010

Homography estimation in omnidirectional vision under the L∞-norm.
Proceedings of the 2010 IEEE International Conference on Robotics and Biomimetics, 2010

A comparative study for fast-flux service networks detection.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2010

Detecting Trojan horses based on system behavior using machine learning method.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2010

A novel watermarking scheme with compensation in bit-stream domain for H.264/AVC.
Proceedings of the IEEE International Conference on Acoustics, 2010

2009
ABS Algorithms for Optimization.
Proceedings of the Encyclopedia of Optimization, Second Edition, 2009

Properties of equation reformulation of the Karush-Kuhn-Tucker condition for nonlinear second order cone optimization problems.
Math. Methods Oper. Res., 2009

A globally convergent method based on Fischer-Burmeister operators for solving second-order cone constrained variational inequality problems.
Comput. Math. Appl., 2009

Research on Web Information Filtering Based on Incremental Feedback Algorithm.
Proceedings of the Sixth International Conference on Fuzzy Systems and Knowledge Discovery, 2009

Modular Certification of Low-Level Intermediate Representation Programs.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009

2008
The rate of convergence of the augmented Lagrangian method for nonlinear semidefinite programming.
Math. Program., 2008

Development and Policy Proposals of Ruralinformatization in China.
Proceedings of the Computer and Computing Technologies in Agriculture II, Volume 3, 2008

Development Strategy for Mobilecommunications Market in Chinese Rural Area.
Proceedings of the Computer and Computing Technologies in Agriculture II, Volume 3, 2008

Image Restoration Based on Fourth-Order PDE Model.
Proceedings of the Fourth International Conference on Natural Computation, 2008

2007
Convergence analysis of a differential equation approach for solving nonlinear programming problems.
Appl. Math. Comput., 2007

A Log-Sigmoid lagrangisn neutral network for solving nonlinear programming.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

A Lloyd-Max-based Non-Uniform Quantization Scheme for Distributed Video Coding.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

2005
Real-time automated visual inspection system for contaminant removal from wool.
Real Time Imaging, 2005

Integration of sorting system for contaminant removal from wool using a second computer.
Comput. Ind., 2005

2003
On the Log-exponential Trajectory of Linear Programming.
J. Glob. Optim., 2003


  Loading...