Wei Zou

According to our database1, Wei Zou authored at least 230 papers between 2001 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Development of a predictive machine learning model for pathogen profiles in patients with secondary immunodeficiency.
BMC Medical Informatics Decis. Mak., December, 2024

Person re-identification based on multi-scale feature fusion and multi-attention mechanism.
Signal Image Video Process., February, 2024

Ordered weighted utility distance operators and their applications in group decision-making.
Appl. Soft Comput., January, 2024

PoisonedRAG: Knowledge Poisoning Attacks to Retrieval-Augmented Generation of Large Language Models.
CoRR, 2024

Provably Robust Multi-bit Watermarking for AI-generated Text via Error Correction Code.
CoRR, 2024

MAPO: Advancing Multilingual Reasoning through Multilingual Alignment-as-Preference Optimization.
CoRR, 2024

From LLM to Conversational Agent: A Memory Enhanced Architecture with Fine-Tuning of Large Language Models.
CoRR, 2024

2023
Design and analysis of a low phase noise low power ring-VCO.
IEICE Electron. Express, December, 2023

Curvilinear patchwork constructions of (quasi-)copulas with given curvilinear sections.
Fuzzy Sets Syst., December, 2023

PosFuzz: augmenting greybox fuzzing with effective position distribution.
Cybersecur., December, 2023

Weakly Supervised Instance Segmentation via Category-aware Centerness Learning with Localization Supervision.
Pattern Recognit., April, 2023

Registration of 3D medical images based on unsupervised cooperative cascade of deep networks.
Biomed. Signal Process. Control., April, 2023

Business Environment and Resource Allocation Based on the Perspective of the National Value Chain.
J. Syst. Sci. Complex., February, 2023

Multiple Sound Source Localization Exploiting Robot Motion and Approaching Control.
IEEE Trans. Instrum. Meas., 2023

Typical Facial Expression Network Using a Facial Feature Decoupler and Spatial-Temporal Learning.
IEEE Trans. Affect. Comput., 2023

Deep Learning-based Moving Object Segmentation: Recent Progress and Research Prospects.
Int. J. Autom. Comput., 2023

DUMA: a Dual-Mind Conversational Agent with Fast and Slow Thinking.
CoRR, 2023

ChatHome: Development and Evaluation of a Domain-Specific Language Model for Home Renovation.
CoRR, 2023

An advanced W-shaped network with adaptive multi-scale supervision for osteosarcoma segmentation.
Biomed. Signal Process. Control., 2023

AIFORE: Smart Fuzzing Based on Automatic Input Format Reverse Engineering.
Proceedings of the 32nd USENIX Security Symposium, 2023

Dual Mean-Teacher: An Unbiased Semi-Supervised Framework for Audio-Visual Source Localization.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Transitioning eMRAM from Pilot Project to Volume Production.
Proceedings of the IEEE International Test Conference, 2023

Research on the Evaluation of Financial Performance of Listed Companies in China's Automotive Manufacturing Industry -Based on PCA-DEA Model.
Proceedings of the 2023 6th International Conference on Information Management and Management Science, 2023

Research on closed-loop supply chain decision considering consumer sensitivity and green cost under product competition.
Proceedings of the 2023 6th International Conference on Information Management and Management Science, 2023

Popularity Cuckoo Filter: Always Keeping Popular Items in Mind.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2023

Improved Pseudo Data for Machine Translation Quality Estimation with Constrained Beam Search.
Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing, 2023

Local Interpretation of Transformer Based on Linear Decomposition.
Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2023

2022
One-stage self-distillation guided knowledge transfer for long-tailed visual recognition.
Int. J. Intell. Syst., December, 2022

Robust feedback feed-forward PD-type iterative learning control for uncertain discrete systems over finite frequency ranges.
Trans. Inst. Meas. Control, October, 2022

Localization Based on Improved Sparse Bayesian Learning in mmWave MIMO Systems.
IEEE Trans. Veh. Technol., 2022

Multi-Conditional Constraint Generative Adversarial Network-Based MR Imaging from CT Scan Data.
Sensors, 2022

Iterative brain tumor retrieval for MR images based on user's intention model.
Pattern Recognit., 2022

DSLA: Dynamic smooth label assignment for efficient anchor-free object detection.
Pattern Recognit., 2022

A 45MHz-2.5GHz broadband CMOS up-conversion mixer with a bisymmetric class-AB input stage.
IEICE Electron. Express, 2022

Best-possible bounds on the sets of copulas and quasi-copulas with given curvilinear sections.
Fuzzy Sets Syst., 2022

A generalization of Archimedean and Marshall-Olkin copulas family.
Fuzzy Sets Syst., 2022

CAMFuzz: Explainable Fuzzing with Local Interpretation.
Cybersecur., 2022

Analyzing Robustness of End-to-End Neural Models for Automatic Speech Recognition.
CoRR, 2022

DSLA: Dynamic smooth label assignment for efficient anchor-free object detection.
CoRR, 2022

Audio Deep Fake Detection System with Neural Stitching for ADD 2022.
CoRR, 2022

Stability of amplitude death in conjugate-coupled nonlinear oscillator networks.
Appl. Math. Lett., 2022

A new multi-feature fusion based convolutional neural network for facial expression recognition.
Appl. Intell., 2022

Assisting in Diagnosis of Temporomandibular Disorders: A Deep Learning Approach.
IEEE Access, 2022

Configurable BISR Chain For Fast Repair Data Loading.
Proceedings of the IEEE International Test Conference, 2022

Research of the Nonlinear Effect of Public Health Investment on High-quality Development from year of 2007 to 2017.
Proceedings of the 5th International Conference on Information Management and Management Science, 2022

Research on Financial Performance Evaluation of Chinese Transportation Logistics Listed Companies.
Proceedings of the 5th International Conference on Information Management and Management Science, 2022

A Spatio-Temporal Interactive Attention Network for Motor Imagery EEG Decoding.
Proceedings of the IEEE International Conference on Signal Processing, 2022

Research on Voltage Disturbance Analysis Method for Electric Vehicle Charging Pile.
Proceedings of the 5th International Conference on Information Technologies and Electrical Engineering, 2022

Identity-based Linkable Blind Ring Signature Scheme on Lattice.
Proceedings of the 12th International Conference on Communication and Network Security, 2022

Audio Deepfake Detection System with Neural Stitching for ADD 2022.
Proceedings of the IEEE International Conference on Acoustics, 2022

Audio-Visual Wake Word Spotting System for MISP Challenge 2021.
Proceedings of the IEEE International Conference on Acoustics, 2022

Time Domain Adversarial Voice Conversion for ADD 2022.
Proceedings of the IEEE International Conference on Acoustics, 2022

An Efficient Approach for Solving Robotic Task Sequencing Problems Considering Spatial Constraint.
Proceedings of the 18th IEEE International Conference on Automation Science and Engineering, 2022

Design of Remote Video Surveillance System Based on Cloud Computing.
Proceedings of the Advanced Hybrid Information Processing, 2022

Research on Large Data Mining for Online Education of Mobile Terminal Based on Block Chain Technology.
Proceedings of the Advanced Hybrid Information Processing, 2022

2021
Quality Inspection Based on Quadrangular Object Detection for Deep Aperture Component.
IEEE Trans. Syst. Man Cybern. Syst., 2021

Flexible Extrinsic Parameter Calibration for Multicameras With Nonoverlapping Field of View.
IEEE Trans. Instrum. Meas., 2021

Moving to OOP: An Active Observation Approach for a Novel Composite Visual Servoing Configuration.
IEEE Trans. Instrum. Meas., 2021

CADN: A weakly supervised learning-based category-aware object detection network for surface defect detection.
Pattern Recognit., 2021

Hospital embedded system and acupuncture treatment of vascular cognitive impairment after stroke.
Microprocess. Microsystems, 2021

A 0.20-2.43 GHz fractional-N frequency synthesizer with optimized VCO and reduced current mismatch CP.
Frontiers Inf. Technol. Electron. Eng., 2021

A Model of Spray Tool and a Parameter Optimization Method for Spraying Path Planning.
Int. J. Autom. Comput., 2021

GigaSpeech: An Evolving, Multi-domain ASR Corpus with 10, 000 Hours of Transcribed Audio.
CoRR, 2021

SEPAL: Towards a Large-scale Analysis of SEAndroid Policy Customization.
Proceedings of the WWW '21: The Web Conference 2021, 2021

VIVA: Binary Level Vulnerability Identification via Partial Signature.
Proceedings of the 28th IEEE International Conference on Software Analysis, 2021

MAZE: Towards Automated Heap Feng Shui.
Proceedings of the 30th USENIX Security Symposium, 2021

Combinational Metamorphic Testing for Deep Learning based Target Detection CPS Systems.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021

KeSpeech: An Open Source Speech Dataset of Mandarin and Its Eight Subdialects.
Proceedings of the Neural Information Processing Systems Track on Datasets and Benchmarks 1, 2021

Order-aware Pairwise Intoxication Detection.
Proceedings of the 12th International Symposium on Chinese Spoken Language Processing, 2021

The Relationship between Health Service Utilization and Psychological Distress among Rural to Urban Female Migrant workers-A Cross-Sectional Study in Urban China.
Proceedings of the IPEC 2021: 2nd Asia-Pacific Conference on Image Processing, 2021

Semantic Data Augmentation for End-to-End Mandarin Speech Recognition.
Proceedings of the Interspeech 2021, 22nd Annual Conference of the International Speech Communication Association, Brno, Czechia, 30 August, 2021

Speech SimCLR: Combining Contrastive and Reconstruction Objective for Self-Supervised Speech Representation Learning.
Proceedings of the Interspeech 2021, 22nd Annual Conference of the International Speech Communication Association, Brno, Czechia, 30 August, 2021

GigaSpeech: An Evolving, Multi-Domain ASR Corpus with 10, 000 Hours of Transcribed Audio.
Proceedings of the Interspeech 2021, 22nd Annual Conference of the International Speech Communication Association, Brno, Czechia, 30 August, 2021

Transformer Based Unsupervised Pre-Training for Acoustic Representation Learning.
Proceedings of the IEEE International Conference on Acoustics, 2021

A Further Study of Unsupervised Pretraining for Transformer Based Speech Recognition.
Proceedings of the IEEE International Conference on Acoustics, 2021

Didispeech: A Large Scale Mandarin Speech Corpus.
Proceedings of the IEEE International Conference on Acoustics, 2021

Fine-Grained Semantic Segmentation of National Costume Grayscale Image Based on Human Parsing.
Proceedings of the Data Mining and Big Data - 6th International Conference, 2021

Automatic Coloring Method for Ethnic Costume Sketch Based on Pix2Pix Network.
Proceedings of the Data Mining and Big Data - 6th International Conference, 2021

SoFi: Reflection-Augmented Fuzzing for JavaScript Engines.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Efficient 3D Path Planning for Underwater Vehicle Based on Non-Uniformly Modeling.
Proceedings of the 17th IEEE International Conference on Automation Science and Engineering, 2021

2020
Large-Scale Third-Party Library Detection in Android Markets.
IEEE Trans. Software Eng., 2020

Segmenting Diabetic Retinopathy Lesions in Multispectral Images Using Low-Dimensional Spatial-Spectral Matrix Representation.
IEEE J. Biomed. Health Informatics, 2020

PVDF Sensor Foils Employed to Measure Shear Stress and Temperature of Friction Welding.
Sensors, 2020

Biologically inspired jumping robots: A comprehensive review.
Robotics Auton. Syst., 2020

Smooth-optimal Adaptive Trajectory Tracking Using an Uncalibrated Fish-eye Camera.
Int. J. Autom. Comput., 2020

A wideband low-jitter PLL with an optimized Ring-VCO.
IEICE Electron. Express, 2020

A 500-2500 MHz fully integrated CMOS power amplifier with multilayer series inductors.
IEICE Electron. Express, 2020

A 45-2500 MHz high efficiency power amplifier with novel adaptive bias technique.
IEICE Electron. Express, 2020

Speech SIMCLR: Combining Contrastive and Reconstruction Objective for Self-supervised Speech Representation Learning.
CoRR, 2020

A Further Study of Unsupervised Pre-training for Transformer Based Speech Recognition.
CoRR, 2020

Improving accuracy of VI-SLAM with fish-eye camera based on biases of map points.
Adv. Robotics, 2020

MVP: Detecting Vulnerabilities using Patch-Enhanced Vulnerability Signatures.
Proceedings of the 29th USENIX Security Symposium, 2020

Software Entity Recognition Method Based on BERT Embedding.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020

Exploiting the Trust Between Boundaries: Discovering Memory Corruptions in Printers via Driver-Assisted Testing.
Proceedings of the 21st ACM SIGPLAN/SIGBED International Conference on Languages, 2020

TMT: A Transformer-Based Modal Translator for Improving Multimodal Sequence Representations in Audio Visual Scene-Aware Dialog.
Proceedings of the Interspeech 2020, 2020

JSidentify: a hybrid framework for detecting plagiarism among JavaScript code in online mini games.
Proceedings of the ICSE-SEIP 2020: 42nd International Conference on Software Engineering, Software Engineering in Practice, Seoul, South Korea, 27 June, 2020

A large-scale empirical study on vulnerability distribution within projects and the lessons learned.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020

A Survey on Side-Channel Attacks of Strong PUF.
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020

Analysis on Influencing Factors of Electricity Sales for Electric Data Security.
Proceedings of the Cyberspace Safety and Security - 12th International Symposium, 2020

Algorithm for Motion Video Based on Basketball Image.
Proceedings of the Cyber Security Intelligence and Analytics, 2020

A Reinforced Generation of Adversarial Examples for Neural Machine Translation.
Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics, 2020

2019
Action Machine: Toward Person-Centric Action Recognition in Videos.
IEEE Signal Process. Lett., 2019

Scalable and Occlusion-Aware Multi-cues Correlation filter for robust Stereo Visual tracking.
Int. J. Robotics Autom., 2019

Convolutional relation network for skeleton-based action recognition.
Neurocomputing, 2019

Selection of Observation Position and Orientation in Visual Servoing with Eye-in-vehicle Configuration for Manipulator.
Int. J. Autom. Comput., 2019

An Optimized Low-Power Optical Memory Access Network for Kilocore Systems.
IEICE Trans. Inf. Syst., 2019

From proof-of-concept to exploitable.
Cybersecur., 2019

TCT: A Cross-supervised Learning Method for Multimodal Sequence Representation.
CoRR, 2019

A Reinforced Generation of Adversarial Samples for Neural Machine Translation.
CoRR, 2019

Cross-task pre-training for acoustic scene classification.
CoRR, 2019

Improving Transformer-based Speech Recognition Using Unsupervised Pre-training.
CoRR, 2019

EPOSIT: An Absolute Pose Estimation Method for Pinhole and Fish-Eye Cameras.
CoRR, 2019

The Field-of-View Constraint of Markers for Mobile Robot with Pan-Tilt Camera.
CoRR, 2019

Human Following for Wheeled Robot with Monocular Pan-tilt Camera.
CoRR, 2019

High Performance Visual Object Tracking with Unified Convolutional Networks.
CoRR, 2019

Camera Pose Correction in SLAM Based on Bias Values of Map Points.
CoRR, 2019

FastPose: Towards Real-time Pose Estimation and Tracking via Scale-normalized Multi-task Networks.
CoRR, 2019

DELTA: A DEep learning based Language Technology plAtform.
CoRR, 2019

Motion Control on Bionic Eyes: A Comprehensive Review.
CoRR, 2019

KEPLER: Facilitating Control-flow Hijacking Primitive Evaluation for Linux Kernel Vulnerabilities.
Proceedings of the 28th USENIX Security Symposium, 2019

Devils in the Guidance: Predicting Logic Vulnerabilities in Payment Syndication Services through Automated Documentation Analysis.
Proceedings of the 28th USENIX Security Symposium, 2019

Constructing Benchmarks for Supporting Explainable Evaluations of Static Application Security Testing Tools.
Proceedings of the 2019 International Symposium on Theoretical Aspects of Software Engineering, 2019

Demystifying Hidden Privacy Settings in Mobile Apps.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

DeepCG: Classifying Metamorphic Malware Through Deep Learning of Call Graphs.
Proceedings of the Security and Privacy in Communication Networks, 2019

A Fast Adaptive Subpixel Extraction Method for Light Stripe Center.
Proceedings of the Image and Graphics - 10th International Conference, 2019

2018
Design and Application of Incremental Music Recommendation System Based on Slope One Algorithm.
Wirel. Pers. Commun., 2018

Exploiting Proximity-Based Mobile Apps for Large-Scale Location Privacy Probing.
Secur. Commun. Networks, 2018

Trajectory tracking control for rotary steerable systems using interval type-2 fuzzy logic and reinforcement learning.
J. Frankl. Inst., 2018

A velocity compensation Visual servo method for oculomotor control of bionic eyes.
Int. J. Robotics Autom., 2018

Action Machine: Rethinking Action Recognition in Trimmed Videos.
CoRR, 2018

An Efficient Optical Flow Based Motion Detection Method for Non-stationary Scenes.
CoRR, 2018

Optical Flow Based Online Moving Foreground Analysis.
CoRR, 2018

Towards End-to-End Code-Switching Speech Recognition.
CoRR, 2018

Optical Flow Based Real-time Moving Object Detection in Unconstrained Scenes.
CoRR, 2018

A comparable study of modeling units for end-to-end Mandarin speech recognition.
CoRR, 2018

Reconstruction and analysis of a genome-scale metabolic model of <i>Methylovorus</i> sp. MP688, a high-level pyrroloquinolone quinone producer.
Biosyst., 2018

FUZE: Towards Facilitating Exploit Generation for Kernel Use-After-Free Vulnerabilities.
Proceedings of the 27th USENIX Security Symposium, 2018

Research on CodeCache Management Strategy Based on Code Heat in Dynamic Binary Translator.
Proceedings of the 2018 IEEE International Conference on Software Quality, 2018

αDiff: cross-version binary code similarity detection with DNN.
Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, 2018

Comparable Study Of Modeling Units For End-To-End Mandarin Speech Recognition.
Proceedings of the 11th International Symposium on Chinese Spoken Language Processing, 2018

An Analysis of Decoding for Attention-Based End-to-End Mandarin Speech Recognition.
Proceedings of the 11th International Symposium on Chinese Spoken Language Processing, 2018

End-to-end Video-level Representation Learning for Action Recognition.
Proceedings of the 24th International Conference on Pattern Recognition, 2018

Two-Stream Gated Fusion ConvNets for Action Recognition.
Proceedings of the 24th International Conference on Pattern Recognition, 2018

Learning Evasion Strategy in Pursuit-Evasion by Deep Q-network.
Proceedings of the 24th International Conference on Pattern Recognition, 2018

The Sixth Visual Object Tracking VOT2018 Challenge Results.
, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,
Proceedings of the Computer Vision - ECCV 2018 Workshops, 2018

End-to-End Flow Correlation Tracking With Spatial-Temporal Attention.
Proceedings of the 2018 IEEE Conference on Computer Vision and Pattern Recognition, 2018

Revery: From Proof-of-Concept to Exploitable.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Robust Spatiotemporal LS-SVM Modeling for Nonlinear Distributed Parameter System With Disturbance.
IEEE Trans. Ind. Electron., 2017

Global Stability of the Sync with Amplitude Effects.
SIAM J. Appl. Dyn. Syst., 2017

End-to-end Video-level Representation Learning for Action Recognition.
CoRR, 2017

Learning Gating ConvNet for Two-Stream based Methods in Action Recognition.
CoRR, 2017

Three Dimensional Comprehensive Analytical Solutions for Locating Sources of Sensor Networks in Unknown Velocity Mining System.
IEEE Access, 2017

UCT: Learning Unified Convolutional Networks for Real-Time Visual Tracking.
Proceedings of the 2017 IEEE International Conference on Computer Vision Workshops, 2017

The Visual Object Tracking VOT2017 Challenge Results.
, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,
Proceedings of the 2017 IEEE International Conference on Computer Vision Workshops, 2017

Mass Discovery of Android Traffic Imprints through Instantiated Partial Execution.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
A Novel Spatiotemporal LS-SVM Method for Complex Distributed Parameter Systems With Applications to Curing Thermal Process.
IEEE Trans. Ind. Informatics, 2016

Viewpoint planning for freeform surface inspection using plane structured light scanners.
Int. J. Autom. Comput., 2016

Following Devil's Footprints: Cross-Platform Analysis of Potentially Harmful Libraries on Android and iOS.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

STD: A Stereo Tracking Dataset for evaluating binocular tracking algorithms.
Proceedings of the 2016 IEEE International Conference on Robotics and Biomimetics, 2016

A low phase noise wideband VCO with 8-shaped inductor.
Proceedings of the International Symposium on Integrated Circuits, 2016

A 0.2-2.5 GHz CMOS power amplifier using transformer-based broadband matching network.
Proceedings of the International Symposium on Integrated Circuits, 2016

I Know Where You All Are! Exploiting Mobile Social Apps for Large-Scale Location Privacy Probing.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Two-Dimensional Automatic Measurement for Nozzle Flow Distribution Using Improved Ultrasonic Sensor.
Sensors, 2015

Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale.
Proceedings of the 24th USENIX Security Symposium, 2015

Overview of motion control on bionic eyes.
Proceedings of the 2015 IEEE International Conference on Robotics and Biomimetics, 2015

Curvature continuous path smoothing based on cubic Bezier curves for car-like vehicles.
Proceedings of the 2015 IEEE International Conference on Robotics and Biomimetics, 2015

Development of Variable Rate System for Disinfection Based on Injection Technique.
Proceedings of the Computer and Computing Technologies in Agriculture IX, 2015

2014
On the expected discounted penalty function and optimal dividend strategy for a risk model with random incomes and interclaim-dependent claim sizes.
J. Comput. Appl. Math., 2014

Research on the Competitiveness of Hubei Manufacturing Post Financial Crisis Era - - Panel Data of 2008~2011.
Proceedings of the Thirteenth Wuhan International Conference on E-Business, 2014

2013
Distributed Synchronization in Networks of Agent Systems With Nonlinearities and Random Switchings.
IEEE Trans. Cybern., 2013

Wideband 5-bit MMIC Digital Attenuator With High Precision.
Int. J. Recent Contributions Eng. Sci. IT, 2013

Practical Control Flow Integrity and Randomization for Binary Executables.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

2012
On the expected penalty function for a risk model perturbed by diffusion.
Int. J. Comput. Appl. Technol., 2012

How many eyes are spying on your shared folders?
Proceedings of the 11th annual ACM Workshop on Privacy in the Electronic Society, 2012

A Framework to Eliminate Backdoors from Response-Computable Authentication.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

Small data transmission at the detached machine-type-communication device.
Proceedings of the 23rd IEEE International Symposium on Personal, 2012

Revisiting why Kad lookup fails.
Proceedings of the 12th IEEE International Conference on Peer-to-Peer Computing, 2012

A Multi-dimensional Data Association Algorithm for Multi-sensor Fusion.
Proceedings of the Intelligent Science and Intelligent Data Engineering, 2012

The Chinese Bag-of-Opinions Method for Hot-Topic-Oriented Sentiment Analysis on Weibo.
Proceedings of the Semantic Web and Web Science, 2012

SmartDroid: an automatic system for revealing UI-based trigger conditions in android applications.
Proceedings of the SPSM'12, 2012

2011
Checksum-Aware Fuzzing Combined with Dynamic Taint Analysis and Symbolic Execution.
ACM Trans. Inf. Syst. Secur., 2011

Orchard tree structure digital test system and its application.
Math. Comput. Model., 2011

Using type analysis in compiler to mitigate integer-overflow-to-buffer-overflow threat.
J. Comput. Secur., 2011

On the expected discounted penalty function for the compound Poisson risk model with delayed claims.
J. Comput. Appl. Math., 2011

Contour detection and localization of intelligent wheelchair for parking into and docking with U-shape bed.
Proceedings of the 2011 IEEE International Conference on Robotics and Biomimetics, 2011

Overlay networks measurement for resource indexing under different routing scheme.
Proceedings of the 16th IEEE Symposium on Computers and Communications, 2011

On the Dividend Problem in a Risk Model with Delayed Claims.
Proceedings of the Information Computing and Applications, 2011

2010
Selective Random Cyclic Delay Diversity for HARQ in Cooperative Relay.
Proceedings of the 2010 IEEE Wireless Communications and Networking Conference, 2010

TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010

On the Ruin Problem in an Erlang(2) Risk Model with Delayed Claims.
Proceedings of the Information Computing and Applications - International Conference, 2010

IntPatch: Automatically Fix Integer-Overflow-to-Buffer-Overflow Vulnerability at Compile-Time.
Proceedings of the Computer Security, 2010

Heap Taichi: exploiting memory allocation granularity in heap-spraying attacks.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

2009
Splay States in a Ring of Coupled Oscillators: From Local to Global Coupling.
SIAM J. Appl. Dyn. Syst., 2009

Real-time elliptical head contour detection under arbitrary pose and wide distance range.
J. Vis. Commun. Image Represent., 2009

A Wavelet-Based Multiresolution Reconstruction Method for Fluorescent Molecular Tomography.
Int. J. Biomed. Imaging, 2009

Pattern Recognition and Pathway Analysis with Genetic Algorithms in Mass Spectrometry Based Metabolomics.
Algorithms, 2009

IntScope: Automatically Detecting Integer Overflow Vulnerability in X86 Binary Using Symbolic Execution.
Proceedings of the Network and Distributed System Security Symposium, 2009

Head orientation estimation for covert-tracking robot.
Proceedings of the IEEE International Symposium on Computational Intelligence in Robotics and Automation, 2009

Studying Malicious Websites and the Underground Economy on the Chinese Web.
Proceedings of the Managing Information Risk and the Economics of Security, 2009

2008
Studying Malicious Websites and the Underground Economy on the Chinese Web.
Proceedings of the 7th Annual Workshop on the Economics of Information Security, 2008

Modeling of Spatially Cross-Correlated Shadow Fading in Distributed Radio Access Networks.
Proceedings of IEEE International Conference on Communications, 2008

Hyperactive Faults Dictionary to Increase Diagnosis Throughput.
Proceedings of the 17th IEEE Asian Test Symposium, 2008

2007
On the Security of Huang-Chang Multi-signature Schemes.
Int. J. Netw. Secur., 2007

eQTL Viewer: visualizing how sequence variation affects genome-wide transcription.
BMC Bioinform., 2007

Speeding Up Effect-Cause Defect Diagnosis Using a Small Dictionary.
Proceedings of the 25th IEEE VLSI Test Symposium (VTS 2007), 2007

A New Algorithm for Identifying Loops in Decompilation.
Proceedings of the Static Analysis, 14th International Symposium, 2007

Interconnect open defect diagnosis with minimal physical information.
Proceedings of the 2007 IEEE International Test Conference, 2007

A High Performance Low Power Consumption Robot Vision System.
Proceedings of the Third International Conference on Natural Computation, 2007

Collecting Autonomous Spreading Malware Using High-Interaction Honeypots.
Proceedings of the Information and Communications Security, 9th International Conference, 2007

Structuring 2-way Branches in Binary Executables.
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007

Improving Performance of Effect-Cause Diagnosis with Minimal Memory Overhead.
Proceedings of the 16th Asian Test Symposium, 2007

2006
A Novel Circle Construction for SONET/WDM Wavelength Assignment.
IEICE Trans. Commun., 2006

On Methods to Improve Location Based Logic Diagnosis.
Proceedings of the 19th International Conference on VLSI Design (VLSI Design 2006), 2006

Multi-User MIMO Detection for Enhanced High Speed Uplink Packet Access (HSUPA).
Proceedings of the IEEE 17th International Symposium on Personal, 2006

Linkability of Two Blind Signature Schemes.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

Linkability of a Blind Signature Scheme and Its Improved Scheme.
Proceedings of the Computational Science and Its Applications, 2006

A Robust Verifiably Encrypted Signature Scheme.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006

Collusion secure convolutional fingerprinting information codes.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

Interconnect Open Defect Diagnosis with Physical Information.
Proceedings of the 15th Asian Test Symposium, 2006

2005
On the Security of a Digital Signature with Message Recovery Using Self-certified Public Key.
Informatica (Slovenia), 2005

On the Security of A Group Signature Scheme.
IACR Cryptol. ePrint Arch., 2005

Real-time region-based obstacle detection with monocular vision.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2005

Collusion Secure Convolutional Spread Spectrum Fingerprinting.
Proceedings of the Digital Watermarking, 4th International Workshop, 2005

Bridge Defect Diagnosis with Physical Information.
Proceedings of the 14th Asian Test Symposium (ATS 2005), 2005

2004
Mining Constrained Gradients in Large Databases.
IEEE Trans. Knowl. Data Eng., 2004

Mining Condensed Frequent-Pattern Bases.
Knowl. Inf. Syst., 2004

2003
SOC Test Scheduling Using Simulated Annealing.
Proceedings of the 21st IEEE VLSI Test Symposium (VTS 2003), 27 April, 2003

Optimizing SOC Test Resources Using Dual Sequences.
Proceedings of the VLSI-SOC: From Systems to Chips, 2003

2002
On Computing Condensed Frequent Pattern Bases.
Proceedings of the 2002 IEEE International Conference on Data Mining (ICDM 2002), 2002

2001
Viewing use cases as active objects.
ACM SIGSOFT Softw. Eng. Notes, 2001


  Loading...