Wei Zong

Orcid: 0000-0001-9714-6759

According to our database1, Wei Zong authored at least 33 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
IPRemover: A Generative Model Inversion Attack against Deep Neural Network Fingerprinting and Watermarking.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Biases on visual warnings during multiple target visual searches on mine monitoring interface.
Displays, April, 2023

Neurochemical and functional reorganization of the cognitive-ear link underlies cognitive impairment in presbycusis.
NeuroImage, March, 2023

DiffCircaPipeline: a framework for multifaceted characterization of differential rhythmicity.
Bioinform., January, 2023

TrojanModel: A Practical Trojan Attack against Automatic Speech Recognition Systems.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

2022
Detecting Audio Adversarial Examples in Automatic Speech Recognition Systems Using Decision Boundary Patterns.
J. Imaging, December, 2022

Process-driven quality improvement for scientific data based on information product map.
Electron. Libr., 2022

Defense Against Multi-target Trojan Attacks.
CoRR, 2022

High Quality Audio Adversarial Examples Without Using Psychoacoustics.
Proceedings of the Cyberspace Safety and Security - 14th International Symposium, 2022

2021
Exploiting QR Code Error Correction for Digital Image Watermarking.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2021

Trojan Attacks and Defense for Speech Recognition.
Proceedings of the Mobile Internet Security - 5th International Symposium, 2021

Targeted Universal Adversarial Perturbations for Automatic Speech Recognition.
Proceedings of the Information Security - 24th International Conference, 2021

Black-Box Audio Adversarial Example Generation Using Variational Autoencoder.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

Towards Visualizing and Detecting Audio Adversarial Examples for Automatic Speech Recognition.
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021

2020
Interactive three-dimensional visualization of network intrusion detection data for machine learning.
Future Gener. Comput. Syst., 2020

2019
Improving data quality during ERP implementation based on information product map.
Enterp. Inf. Syst., 2019

The order and transshipment decisions in a two-location inventory system with demand forecast updates.
Comput. Ind. Eng., 2019

Dimensionality Reduction and Visualization of Network Intrusion Detection Data.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019

2018
A Two-Stage Classifier Approach for Network Intrusion Detection.
Proceedings of the Information Security Practice and Experience, 2018

A 3D Approach for the Visualization of Network Intrusion Detection Data.
Proceedings of the 2018 International Conference on Cyberworlds, 2018

2017
A Markov-Based Update Policy for Constantly Changing Database Systems.
IEEE Trans. Engineering Management, 2017

Identification of approximately duplicate material records in ERP systems.
Enterp. Inf. Syst., 2017

A QR Code Watermarking Approach Based on the DWT-DCT Technique.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2015
A Study on Optimal Policy for Purchase Data Updating in ERP Systems.
Proceedings of the Data Science - Second International Conference, 2015

A Vehicle Routing Problem with Time Windows for Attended Home Distribution.
Proceedings of the Data Science - Second International Conference, 2015

Reduction of False Critical ECG Alarms using Waveform Features of Arterial Blood Pressure and/or Photoplethysmogram Signals.
Proceedings of the Computing in Cardiology, 2015

2014
Gait recognition based on joint distribution of motion angles.
J. Vis. Lang. Comput., 2014

Image Retrieval via Relevance Vector Machine with Multiple Features.
J. Multim., 2014

Complicated Graphics Model based on Neural Network of Particle Swarm.
J. Multim., 2014

Gait Recognition Based on Joint Distribution of Motion Angles.
Proceedings of the 20th International Conference on Distributed Multimedia Systems: Research papers on distributed multimedia systems, 2014

A Real-time ST-segment Monitoring Algorithm Based on a Multi-channel Waveform-Length-TransformMethod for Q-onset and J-point Detection.
Proceedings of the Computing in Cardiology, CinC 2014, 2014

2013
Image Classification Optimization Algorithm based on SVM.
J. Multim., 2013

2008
Development and Evaluation of Predictive Alerts for Hemodynamic Instability in ICU Patients.
Proceedings of the AMIA 2008, 2008


  Loading...