Shiwei Zhang

According to our database1, Shiwei Zhang authored at least 23 papers between 1993 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 




An empirical study of mobile network behavior and application performance in the wild.
Proceedings of the International Symposium on Quality of Service, 2019

Discriminative Part Selection for Human Action Recognition.
IEEE Trans. Multimedia, 2018

A Study of Cell-Free DNA Fragmentation Pattern and Its Application in DNA Sample Type Classification.
IEEE/ACM Trans. Comput. Biology Bioinform., 2018

Personalised ranking online reviews based on user individual preferences.
IJRIS, 2018

Group Sparse-Based Mid-Level Representation for Action Recognition.
IEEE Trans. Systems, Man, and Cybernetics: Systems, 2017

One-Round Attribute-Based Key Exchange in the Multi-Party Setting.
Int. J. Found. Comput. Sci., 2017

Provably Secure Homomorphic Signcryption.
Proceedings of the Provable Security, 2017

Efficient Web-Based Data Imputation with Graph Model.
Proceedings of the Database Systems for Advanced Applications, 2017

Language-Independent Twitter Classification Using Character-Based Convolutional Networks.
Proceedings of the Advanced Data Mining and Applications - 13th International Conference, 2017

A Word-Character Convolutional Neural Network for Language-Agnostic Twitter Sentiment Analysis.
Proceedings of the 22nd Australasian Document Computing Symposium, 2017

Hierarchical Functional Encryption for Linear Transformations.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

Privacy-Preserving k-time Authenticated Secret Handshakes.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

Fiber-optic sensing interrogation based on a dual-passband microwave filter for simultaneous measurement of temperature and transversal loading.
Proceedings of the 25th Wireless and Optical Communication Conference, 2016

Achieving IND-CCA Security for Functional Encryption for Inner Products.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016

Linear Encryption with Keyword Search.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

Light Path Model of Fiber Optic Liquid Level Sensor Considering Residual Liquid Film on the Wall.
J. Sensors, 2015

Threshold Broadcast Encryption with Keyword Search.
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015

Mid-level parts mined by feature selection for action recognition.
Proceedings of the 3rd IAPR Asian Conference on Pattern Recognition, 2015

CPMC-Lab: A Matlab package for Constrained Path Monte Carlo calculations.
Computer Physics Communications, 2014

A review of wireless sensor networks and its applications.
Proceedings of the 2012 IEEE International Conference on Automation and Logistics, 2012

Quantum simulations of realistic systems by auxiliary fields.
Computer Physics Communications, 2005

Independent component analysis of digital image watermarking.
Proceedings of the 2002 International Symposium on Circuits and Systems, 2002

Exact Monte Carlo Calculations for Fermions On a Parallel Machine.
IJHPCA, 1993