Wei Zou

According to our database1, Wei Zou authored at least 122 papers between 2001 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Action Machine: Toward Person-Centric Action Recognition in Videos.
IEEE Signal Process. Lett., 2019

Scalable and Occlusion-Aware Multi-cues Correlation filter for robust Stereo Visual tracking.
I. J. Robotics and Automation, 2019

Convolutional relation network for skeleton-based action recognition.
Neurocomputing, 2019

An Optimized Low-Power Optical Memory Access Network for Kilocore Systems.
IEICE Transactions, 2019

From proof-of-concept to exploitable.
Cybersecurity, 2019

Cross-task pre-training for acoustic scene classification.
CoRR, 2019

Improving Transformer-based Speech Recognition Using Unsupervised Pre-training.
CoRR, 2019

EPOSIT: An Absolute Pose Estimation Method for Pinhole and Fish-Eye Cameras.
CoRR, 2019

The Field-of-View Constraint of Markers for Mobile Robot with Pan-Tilt Camera.
CoRR, 2019

Human Following for Wheeled Robot with Monocular Pan-tilt Camera.
CoRR, 2019

High Performance Visual Object Tracking with Unified Convolutional Networks.
CoRR, 2019

Camera Pose Correction in SLAM Based on Bias Values of Map Points.
CoRR, 2019

FastPose: Towards Real-time Pose Estimation and Tracking via Scale-normalized Multi-task Networks.
CoRR, 2019

DELTA: A DEep learning based Language Technology plAtform.
CoRR, 2019

Motion Control on Bionic Eyes: A Comprehensive Review.
CoRR, 2019

KEPLER: Facilitating Control-flow Hijacking Primitive Evaluation for Linux Kernel Vulnerabilities.
Proceedings of the 28th USENIX Security Symposium, 2019

Devils in the Guidance: Predicting Logic Vulnerabilities in Payment Syndication Services through Automated Documentation Analysis.
Proceedings of the 28th USENIX Security Symposium, 2019

Demystifying Hidden Privacy Settings in Mobile Apps.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

2018
Design and Application of Incremental Music Recommendation System Based on Slope One Algorithm.
Wireless Personal Communications, 2018

Exploiting Proximity-Based Mobile Apps for Large-Scale Location Privacy Probing.
Security and Communication Networks, 2018

Trajectory tracking control for rotary steerable systems using interval type-2 fuzzy logic and reinforcement learning.
J. Franklin Institute, 2018

A velocity compensation Visual servo method for oculomotor control of bionic eyes.
I. J. Robotics and Automation, 2018

Action Machine: Rethinking Action Recognition in Trimmed Videos.
CoRR, 2018

An Efficient Optical Flow Based Motion Detection Method for Non-stationary Scenes.
CoRR, 2018

Optical Flow Based Online Moving Foreground Analysis.
CoRR, 2018

Towards End-to-End Code-Switching Speech Recognition.
CoRR, 2018

Optical Flow Based Real-time Moving Object Detection in Unconstrained Scenes.
CoRR, 2018

A comparable study of modeling units for end-to-end Mandarin speech recognition.
CoRR, 2018

Reconstruction and analysis of a genome-scale metabolic model of Methylovorus sp. MP688, a high-level pyrroloquinolone quinone producer.
Biosystems, 2018

FUZE: Towards Facilitating Exploit Generation for Kernel Use-After-Free Vulnerabilities.
Proceedings of the 27th USENIX Security Symposium, 2018

Research on CodeCache Management Strategy Based on Code Heat in Dynamic Binary Translator.
Proceedings of the 2018 IEEE International Conference on Software Quality, 2018

αDiff: cross-version binary code similarity detection with DNN.
Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, 2018

Comparable Study Of Modeling Units For End-To-End Mandarin Speech Recognition.
Proceedings of the 11th International Symposium on Chinese Spoken Language Processing, 2018

An Analysis of Decoding for Attention-Based End-to-End Mandarin Speech Recognition.
Proceedings of the 11th International Symposium on Chinese Spoken Language Processing, 2018

End-to-end Video-level Representation Learning for Action Recognition.
Proceedings of the 24th International Conference on Pattern Recognition, 2018

Two-Stream Gated Fusion ConvNets for Action Recognition.
Proceedings of the 24th International Conference on Pattern Recognition, 2018

Learning Evasion Strategy in Pursuit-Evasion by Deep Q-network.
Proceedings of the 24th International Conference on Pattern Recognition, 2018

The Sixth Visual Object Tracking VOT2018 Challenge Results.
, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,
Proceedings of the Computer Vision - ECCV 2018 Workshops, 2018

End-to-End Flow Correlation Tracking With Spatial-Temporal Attention.
Proceedings of the 2018 IEEE Conference on Computer Vision and Pattern Recognition, 2018

Revery: From Proof-of-Concept to Exploitable.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Robust Spatiotemporal LS-SVM Modeling for Nonlinear Distributed Parameter System With Disturbance.
IEEE Trans. Industrial Electronics, 2017

Global Stability of the Sync with Amplitude Effects.
SIAM J. Applied Dynamical Systems, 2017

UCT: Learning Unified Convolutional Networks for Real-time Visual Tracking.
CoRR, 2017

End-to-end Video-level Representation Learning for Action Recognition.
CoRR, 2017

End-to-end Flow Correlation Tracking with Spatial-temporal Attention.
CoRR, 2017

Learning Gating ConvNet for Two-Stream based Methods in Action Recognition.
CoRR, 2017

Three Dimensional Comprehensive Analytical Solutions for Locating Sources of Sensor Networks in Unknown Velocity Mining System.
IEEE Access, 2017

UCT: Learning Unified Convolutional Networks for Real-Time Visual Tracking.
Proceedings of the 2017 IEEE International Conference on Computer Vision Workshops, 2017

The Visual Object Tracking VOT2017 Challenge Results.
, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,
Proceedings of the 2017 IEEE International Conference on Computer Vision Workshops, 2017

Mass Discovery of Android Traffic Imprints through Instantiated Partial Execution.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30, 2017

2016
A Novel Spatiotemporal LS-SVM Method for Complex Distributed Parameter Systems With Applications to Curing Thermal Process.
IEEE Trans. Industrial Informatics, 2016

Following Devil's Footprints: Cross-Platform Analysis of Potentially Harmful Libraries on Android and iOS.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

STD: A Stereo Tracking Dataset for evaluating binocular tracking algorithms.
Proceedings of the 2016 IEEE International Conference on Robotics and Biomimetics, 2016

A low phase noise wideband VCO with 8-shaped inductor.
Proceedings of the International Symposium on Integrated Circuits, 2016

A 0.2-2.5 GHz CMOS power amplifier using transformer-based broadband matching network.
Proceedings of the International Symposium on Integrated Circuits, 2016

I Know Where You All Are! Exploiting Mobile Social Apps for Large-Scale Location Privacy Probing.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Two-Dimensional Automatic Measurement for Nozzle Flow Distribution Using Improved Ultrasonic Sensor.
Sensors, 2015

Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale.
Proceedings of the 24th USENIX Security Symposium, 2015

Overview of motion control on bionic eyes.
Proceedings of the 2015 IEEE International Conference on Robotics and Biomimetics, 2015

Curvature continuous path smoothing based on cubic Bezier curves for car-like vehicles.
Proceedings of the 2015 IEEE International Conference on Robotics and Biomimetics, 2015

Development of Variable Rate System for Disinfection Based on Injection Technique.
Proceedings of the Computer and Computing Technologies in Agriculture IX, 2015

2014
On the expected discounted penalty function and optimal dividend strategy for a risk model with random incomes and interclaim-dependent claim sizes.
J. Computational Applied Mathematics, 2014

Research on the Competitiveness of Hubei Manufacturing Post Financial Crisis Era - - Panel Data of 2008~2011.
Proceedings of the Thirteenth Wuhan International Conference on E-Business, 2014

2013
Distributed Synchronization in Networks of Agent Systems With Nonlinearities and Random Switchings.
IEEE Trans. Cybernetics, 2013

Wideband 5-bit MMIC Digital Attenuator With High Precision.
iJES, 2013

Practical Control Flow Integrity and Randomization for Binary Executables.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

2012
On the expected penalty function for a risk model perturbed by diffusion.
IJCAT, 2012

How many eyes are spying on your shared folders?
Proceedings of the 11th annual ACM Workshop on Privacy in the Electronic Society, 2012

A Framework to Eliminate Backdoors from Response-Computable Authentication.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

Small data transmission at the detached machine-type-communication device.
Proceedings of the 23rd IEEE International Symposium on Personal, 2012

Revisiting why Kad lookup fails.
Proceedings of the 12th IEEE International Conference on Peer-to-Peer Computing, 2012

A Multi-dimensional Data Association Algorithm for Multi-sensor Fusion.
Proceedings of the Intelligent Science and Intelligent Data Engineering, 2012

The Chinese Bag-of-Opinions Method for Hot-Topic-Oriented Sentiment Analysis on Weibo.
Proceedings of the Semantic Web and Web Science, 2012

SmartDroid: an automatic system for revealing UI-based trigger conditions in android applications.
Proceedings of the SPSM'12, 2012

2011
Checksum-Aware Fuzzing Combined with Dynamic Taint Analysis and Symbolic Execution.
ACM Trans. Inf. Syst. Secur., 2011

Orchard tree structure digital test system and its application.
Mathematical and Computer Modelling, 2011

Using type analysis in compiler to mitigate integer-overflow-to-buffer-overflow threat.
Journal of Computer Security, 2011

On the expected discounted penalty function for the compound Poisson risk model with delayed claims.
J. Computational Applied Mathematics, 2011

Contour detection and localization of intelligent wheelchair for parking into and docking with U-shape bed.
Proceedings of the 2011 IEEE International Conference on Robotics and Biomimetics, 2011

Overlay networks measurement for resource indexing under different routing scheme.
Proceedings of the 16th IEEE Symposium on Computers and Communications, 2011

On the Dividend Problem in a Risk Model with Delayed Claims.
Proceedings of the Information Computing and Applications, 2011

2010
Selective Random Cyclic Delay Diversity for HARQ in Cooperative Relay.
Proceedings of the 2010 IEEE Wireless Communications and Networking Conference, 2010

TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010

On the Ruin Problem in an Erlang(2) Risk Model with Delayed Claims.
Proceedings of the Information Computing and Applications - International Conference, 2010

IntPatch: Automatically Fix Integer-Overflow-to-Buffer-Overflow Vulnerability at Compile-Time.
Proceedings of the Computer Security, 2010

Heap Taichi: exploiting memory allocation granularity in heap-spraying attacks.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

2009
Splay States in a Ring of Coupled Oscillators: From Local to Global Coupling.
SIAM J. Applied Dynamical Systems, 2009

Real-time elliptical head contour detection under arbitrary pose and wide distance range.
J. Visual Communication and Image Representation, 2009

A Wavelet-Based Multiresolution Reconstruction Method for Fluorescent Molecular Tomography.
Int. J. Biomedical Imaging, 2009

Pattern Recognition and Pathway Analysis with Genetic Algorithms in Mass Spectrometry Based Metabolomics.
Algorithms, 2009

IntScope: Automatically Detecting Integer Overflow Vulnerability in X86 Binary Using Symbolic Execution.
Proceedings of the Network and Distributed System Security Symposium, 2009

Head orientation estimation for covert-tracking robot.
Proceedings of the IEEE International Symposium on Computational Intelligence in Robotics and Automation, 2009

2008
Studying Malicious Websites and the Underground Economy on the Chinese Web.
Proceedings of the 7th Annual Workshop on the Economics of Information Security, 2008

Modeling of Spatially Cross-Correlated Shadow Fading in Distributed Radio Access Networks.
Proceedings of IEEE International Conference on Communications, 2008

Hyperactive Faults Dictionary to Increase Diagnosis Throughput.
Proceedings of the 17th IEEE Asian Test Symposium, 2008

2007
On the Security of Huang-Chang Multi-signature Schemes.
I. J. Network Security, 2007

eQTL Viewer: visualizing how sequence variation affects genome-wide transcription.
BMC Bioinformatics, 2007

Speeding Up Effect-Cause Defect Diagnosis Using a Small Dictionary.
Proceedings of the 25th IEEE VLSI Test Symposium (VTS 2007), 2007

A New Algorithm for Identifying Loops in Decompilation.
Proceedings of the Static Analysis, 14th International Symposium, 2007

Interconnect open defect diagnosis with minimal physical information.
Proceedings of the 2007 IEEE International Test Conference, 2007

A High Performance Low Power Consumption Robot Vision System.
Proceedings of the Third International Conference on Natural Computation, 2007

Collecting Autonomous Spreading Malware Using High-Interaction Honeypots.
Proceedings of the Information and Communications Security, 9th International Conference, 2007

Structuring 2-way Branches in Binary Executables.
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007

2006
A Novel Circle Construction for SONET/WDM Wavelength Assignment.
IEICE Transactions, 2006

On Methods to Improve Location Based Logic Diagnosis.
Proceedings of the 19th International Conference on VLSI Design (VLSI Design 2006), 2006

Multi-User MIMO Detection for Enhanced High Speed Uplink Packet Access (HSUPA).
Proceedings of the IEEE 17th International Symposium on Personal, 2006

Linkability of Two Blind Signature Schemes.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

Linkability of a Blind Signature Scheme and Its Improved Scheme.
Proceedings of the Computational Science and Its Applications, 2006

A Robust Verifiably Encrypted Signature Scheme.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006

Collusion secure convolutional fingerprinting information codes.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

2005
On the Security of a Digital Signature with Message Recovery Using Self-certified Public Key.
Informatica (Slovenia), 2005

On the Security of A Group Signature Scheme.
IACR Cryptology ePrint Archive, 2005

Real-time region-based obstacle detection with monocular vision.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2005

Collusion Secure Convolutional Spread Spectrum Fingerprinting.
Proceedings of the Digital Watermarking, 4th International Workshop, 2005

Bridge Defect Diagnosis with Physical Information.
Proceedings of the 14th Asian Test Symposium (ATS 2005), 2005

2004
Mining Constrained Gradients in Large Databases.
IEEE Trans. Knowl. Data Eng., 2004

Mining Condensed Frequent-Pattern Bases.
Knowl. Inf. Syst., 2004

2003
SOC Test Scheduling Using Simulated Annealing.
Proceedings of the 21st IEEE VLSI Test Symposium (VTS 2003), 27 April, 2003

Optimizing SOC Test Resources Using Dual Sequences.
Proceedings of the VLSI-SOC: From Systems to Chips, 2003

Optimizing SOC Test Resources using Dual Sequences.
Proceedings of the IFIP VLSI-SoC 2003, 2003

2002
On Computing Condensed Frequent Pattern Bases.
Proceedings of the 2002 IEEE International Conference on Data Mining (ICDM 2002), 2002

2001
Viewing use cases as active objects.
ACM SIGSOFT Software Engineering Notes, 2001


  Loading...