Su Zhang

According to our database1, Su Zhang
  • authored at least 29 papers between 2000 and 2017.
  • has a "Dijkstra number"2 of three.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
Efficient Range Estimation in Beat Radio Interferometry.
IEEE Access, 2017

Maintenance for Case Streams: A Streaming Approach to Competence-Based Deletion.
Proceedings of the Case-Based Reasoning Research and Development, 2017

2016
Case-Base Maintenance: A Streaming Approach.
Proceedings of the Workshops Proceedings for the Twenty-fourth International Conference on Case-Based Reasoning (ICCBR 2016), Atlanta, Georgia, USA, October 31, 2016

Information recovery via block compressed sensing in wireless sensor networks.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

2015
Performance of ML Range Estimator in Radio Interferometric Positioning Systems.
IEEE Signal Process. Lett., 2015

Predicting Cyber Risks through National Vulnerability Database.
Information Security Journal: A Global Perspective, 2015

A Research Approach to Detect Unreliable Information in Online Professional Social Networks: Using LinkedIn Mobile as an Example.
IJHCR, 2015

Assessing Attack Surface with Component-Based Package Dependency.
Proceedings of the Network and System Security - 9th International Conference, 2015

2014
Modified Alternating Direction Methods for the Modified Multiple-Sets Split Feasibility Problems.
J. Optimization Theory and Applications, 2014

The Unambiguous Distance in a Phase-based Ranging System with Hopping Frequencies.
CoRR, 2014

Performance of ML Range Estimator in Radio Interferometric Positioning Systems.
CoRR, 2014

A phase-based ranging method for fast frequency hopping system.
Proceedings of the Sixth International Conference on Wireless Communications and Signal Processing, 2014

After we knew it: empirical study and modeling of cost-effectiveness of exploiting prevalent known vulnerabilities across IaaS cloud.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

2013
Aggregating vulnerability metrics in enterprise networks using attack graphs.
Journal of Computer Security, 2013

A Hybrid Reconfigurable System for Parallel and Intensive Computation.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

Design of a hybrid reconfigurable coprocessor.
Proceedings of the IEEE 10th International Conference on ASIC, 2013

2011
Effective Network Vulnerability Assessment through Model Abstraction.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2011

An Empirical Study on Using the National Vulnerability Database to Predict Software Vulnerabilities.
Proceedings of the Database and Expert Systems Applications, 2011

Model-driven, Moving-Target Defense for Enterprise Network Security.
Proceedings of the Models@run.time - Foundations, Applications, and Roadmaps [Dagstuhl Seminar 11481, November 27, 2011

Distilling critical attack graph surface iteratively through minimum-cost SAT solving.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

2010
A modified alternating direction method for convex quadratically constrained quadratic semidefinite programs.
European Journal of Operational Research, 2010

A variational multiphase level set approach to simultaneous segmentation and bias correction.
Proceedings of the International Conference on Image Processing, 2010

Rotation invariant texture classification using adaptive LBP with directional statistical features.
Proceedings of the International Conference on Image Processing, 2010

2008
Deformation estimation and analysis for adaptive radiation therapy.
Proceedings of the Medical Imaging 2008: Image Processing, 2008

Development on the Partial Discharge On-Line Monitoring System of Transformer Based on Embedded System.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

2007
Offline and Online Network Traffic Characterization.
Proceedings of the NETWORKING 2007. Ad Hoc and Sensor Networks, 2007

2006
Web Services Based GIS Model Sharing Service.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2006

2005
A Unified Authorization Platform Based on RBAC4WAS Model for Web Application System Integration.
Proceedings of the 4th International Conference on Cyberworlds (CW 2005), 2005

2000


  Loading...