Man Zhou

According to our database1, Man Zhou authored at least 26 papers between 2015 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2021
Blockchain-Secured Smart Manufacturing in Industry 4.0: A Survey.
IEEE Trans. Syst. Man Cybern. Syst., 2021

Stealing Your Android Patterns via Acoustic Signals.
IEEE Trans. Mob. Comput., 2021

AgriPest: A Large-Scale Domain-Specific Benchmark Dataset for Practical Agricultural Pest Detection in the Wild.
Sensors, 2021

2020
LVID: A Multimodal Biometrics Authentication System on Smartphones.
IEEE Trans. Inf. Forensics Secur., 2020

A Recognition Method for Rice Plant Diseases and Pests Video Detection Based on Deep Convolutional Neural Network.
Sensors, 2020

Cooperative malicious network behavior recognition algorithm in E-commerce.
Comput. Secur., 2020

Distributed collaborative intrusion detection system for vehicular Ad Hoc networks based on invariant.
Comput. Networks, 2020

Active Link Obfuscation to Thwart Link-flooding Attacks for Internet of Things.
Proceedings of the 19th IEEE International Conference on Trust, 2020

2019
Hidden Voice Commands: Attacks and Defenses on the VCS of Autonomous Driving Cars.
IEEE Wirel. Commun., 2019

Dolphin: Real-Time Hidden Acoustic Signal Capture with Smartphones.
IEEE Trans. Mob. Comput., 2019

A Novel Technique for Fundamental and Harmonic Parameter Estimation Using Nonergodic $S$ -Transform.
IEEE Trans. Instrum. Meas., 2019

Intrusion detection model of wireless sensor networks based on game theory and an autoregressive model.
Inf. Sci., 2019

Two Novel Autocorrelation Based Methods for Frequency Estimation of Real Sinusoid Signal.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019

Targeting malware discrimination based on reversed association task.
Concurr. Comput. Pract. Exp., 2019

An Effective Data Augmentation Strategy for CNN-Based Pest Localization and Recognition in the Field.
IEEE Access, 2019

An Optimized Static Propositional Function Model to Detect Software Vulnerability.
IEEE Access, 2019

VoicePop: A Pop Noise based Anti-spoofing System for Voice Authentication on Smartphones.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

2018
Enabling Online Robust Barcode-Based Visible Light Communication With Realtime Feedback.
IEEE Trans. Wirel. Commun., 2018

A Hybrid Control with PID-Improved Sliding Mode for Flat-Top of Missile Electromechanical Actuator Systems.
Sensors, 2018

LncADeep: an ab initio lncRNA identification and functional annotation tool based on deep learning.
Bioinform., 2018

PatternListener: Cracking Android Pattern Lock Using Acoustic Signals.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Mitigating Link-flooding Attacks With Active Link Obfuscation.
CoRR, 2017

Poster: Enabling Secure Location Authentication in Drone.
Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking, 2017

2016
Real-time hidden acoustic signal capture with smartphones: demo.
Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, 2016

Messages behind the sound: real-time hidden acoustic signal capture with smartphones.
Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, 2016

2015
Rain Bar: Robust Application-Driven Visual Communication Using Color Barcodes.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015


  Loading...