Shiwei Zhang

According to our database1, Shiwei Zhang authored at least 22 papers between 1993 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Discriminative Part Selection for Human Action Recognition.
IEEE Trans. Multimedia, 2018

A Study of Cell-Free DNA Fragmentation Pattern and Its Application in DNA Sample Type Classification.
IEEE/ACM Trans. Comput. Biology Bioinform., 2018

Personalised ranking online reviews based on user individual preferences.
IJRIS, 2018

2017
Group Sparse-Based Mid-Level Representation for Action Recognition.
IEEE Trans. Systems, Man, and Cybernetics: Systems, 2017

One-Round Attribute-Based Key Exchange in the Multi-Party Setting.
Int. J. Found. Comput. Sci., 2017

Provably Secure Homomorphic Signcryption.
Proceedings of the Provable Security, 2017

Efficient Web-Based Data Imputation with Graph Model.
Proceedings of the Database Systems for Advanced Applications, 2017

Language-Independent Twitter Classification Using Character-Based Convolutional Networks.
Proceedings of the Advanced Data Mining and Applications - 13th International Conference, 2017

A Word-Character Convolutional Neural Network for Language-Agnostic Twitter Sentiment Analysis.
Proceedings of the 22nd Australasian Document Computing Symposium, 2017

Hierarchical Functional Encryption for Linear Transformations.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

Privacy-Preserving k-time Authenticated Secret Handshakes.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
Fiber-optic sensing interrogation based on a dual-passband microwave filter for simultaneous measurement of temperature and transversal loading.
Proceedings of the 25th Wireless and Optical Communication Conference, 2016

Achieving IND-CCA Security for Functional Encryption for Inner Products.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016

Linear Encryption with Keyword Search.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Light Path Model of Fiber Optic Liquid Level Sensor Considering Residual Liquid Film on the Wall.
J. Sensors, 2015

Threshold Broadcast Encryption with Keyword Search.
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015

Mid-level parts mined by feature selection for action recognition.
Proceedings of the 3rd IAPR Asian Conference on Pattern Recognition, 2015

2014
CPMC-Lab: A Matlab package for Constrained Path Monte Carlo calculations.
Computer Physics Communications, 2014

2012
A review of wireless sensor networks and its applications.
Proceedings of the 2012 IEEE International Conference on Automation and Logistics, 2012

2005
Quantum simulations of realistic systems by auxiliary fields.
Computer Physics Communications, 2005

2002
Independent component analysis of digital image watermarking.
Proceedings of the 2002 International Symposium on Circuits and Systems, 2002

1993
Exact Monte Carlo Calculations for Fermions On a Parallel Machine.
IJHPCA, 1993


  Loading...