Weifeng Chen

According to our database1, Weifeng Chen
  • authored at least 65 papers between 2000 and 2018.
  • has a "Dijkstra number"2 of four.



In proceedings 
PhD thesis 


On csauthors.net:


LDSScanner: Exploratory Analysis of Low-Dimensional Structures in High-Dimensional Datasets.
IEEE Trans. Vis. Comput. Graph., 2018

Surface Normals in the Wild.
CoRR, 2017

CAKA: a novel certificateless-based cross-domain authenticated key agreement protocol for wireless mesh networks.
Wireless Networks, 2016

Visual inspection of multivariate volume data based on multi-class noise sampling.
The Visual Computer, 2016

Multi-Viewpoint Panorama Construction With Wide-Baseline Images.
IEEE Trans. Image Processing, 2016

NCLAS: a novel and efficient certificateless aggregate signature scheme.
Security and Communication Networks, 2016

Guest Editorial: Data Mining and Machine Learning Technologies for Multimedia Information Retrieval and Recommendation.
Multimedia Tools Appl., 2016

Cyber-physical systems technologies and application - Part II.
Future Generation Comp. Syst., 2016

Cyber physical systems technologies and applications.
Future Generation Comp. Syst., 2016

Single-Image Depth Perception in the Wild.
CoRR, 2016

An energy-saving color scheme for direct volume rendering.
Computers & Graphics, 2016

Trajectory optimization for lunar soft landing with a Hamiltonian-based adaptive mesh refinement strategy.
Advances in Engineering Software, 2016

A unified trajectory optimization framework for lunar ascent.
Advances in Engineering Software, 2016

Single-Image Depth Perception in the Wild.
Proceedings of the Advances in Neural Information Processing Systems 29: Annual Conference on Neural Information Processing Systems 2016, 2016

A near lossless compression domain volume rendering algorithm for floating-point time-varying volume data.
J. Visualization, 2015

VFA: A Variable-Factor Authentication Framework for Mobile Users.
JCM, 2015

Advanced Service Technology and Application in Smart Sensor Networks.
IJDSN, 2015

Mobile OS security: Current situation and future directions.
Proceedings of the IEEE International Conference on Electro/Information Technology, 2015

An examination of distributed denial of service attacks.
Proceedings of the IEEE International Conference on Electro/Information Technology, 2015

Visual Abstraction and Exploration of Multi-class Scatterplots.
IEEE Trans. Vis. Comput. Graph., 2014

Privacy-assured substructure similarity query over encrypted graph-structured data in cloud.
Security and Communication Networks, 2014

Advanced signal processing and HCI issues for interactive multimedia services.
Multimedia Tools Appl., 2014

Efficient quadratic reconstruction and visualization of tetrahedral volume datasets.
J. Visualization, 2014

Parallel and adaptive visibility sampling for rendering dynamic scenes with spatially varying reflectance.
Computers & Graphics, 2014

An image-space energy-saving visualization scheme for OLED displays.
Computers & Graphics, 2014

High-Quality Depth Recovery via Interactive Multi-view Stereo.
Proceedings of the 2nd International Conference on 3D Vision, 2014

Analytic Double Product Integrals for All-Frequency Relighting.
IEEE Trans. Vis. Comput. Graph., 2013

Editorial: advances in multimedia and ubiquitous technologies for the new era.
Multimedia Tools Appl., 2013

INCOME: Practical land monitoring in precision agriculture with sensor networks.
Computer Communications, 2013

COCA: Constructing optimal clustering architecture to maximize sensor network lifetime.
Computer Communications, 2013

Privacy-Assured Similarity Query over Graph-Structured Data in Mobile Cloud.
Proceedings of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), 2013

Sensitivity embedded homotopy-based backtracking method for chemical process simulation.
Proceedings of the 10th IEEE International Conference on Control and Automation, 2013

Advanced issues in artificial intelligence and pattern recognition for intelligent surveillance system in smart home environment.
Eng. Appl. of AI, 2012

Flow level detection and filtering of low-rate DDoS.
Computer Networks, 2012

Two Birds With One Stone: Wireless Access Point Deployment for Both Coverage and Localization.
IEEE Trans. Vehicular Technology, 2011

An Efficient Direct Volume Rendering Approach for Dichromats.
IEEE Trans. Vis. Comput. Graph., 2011

Investigating Knowledge Management Factors Affecting Chinese ICT Firms Performance: An Integrated KM Framework.
IS Management, 2011

Poster: collaborative policy administration.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Harmonic coordinates for real-time image cloning.
Journal of Zhejiang University - Science C, 2010

RRED: robust RED algorithm to counter low-rate denial-of-service attacks.
IEEE Communications Letters, 2010

On the privacy protection in publish/subscribe systems.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

On Estimating Cyber Adversaries' Capabilities: A Bayesian Model Approach.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010

Wireless Access Point Deployment for Both Coverage and Localization.
Proceedings of the Fifth International Conference on Networking, Architecture, and Storage, 2010

Attacks on BitTorrent - An Experimental Study.
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010

A modified mnemonic enhancement optimization method for solving parametric nonlinear programming problems.
Proceedings of the 49th IEEE Conference on Decision and Control, 2010

Fast, Sub-pixel Antialiased Shadow Maps.
Comput. Graph. Forum, 2009

Traffic and security analysis on Sony Playstation 3.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009

Identifying Google Talk packets.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009

Analyzing Privacy in Enterprise Packet Trace Anonymization.
Proceedings of the Network and Distributed System Security Symposium, 2008

Modelling Threshold Secret Sharing Schemes in Ad Hoc Networks.
Proceedings of The 2008 IEEE International Conference on Networking, 2008

Wireless Forensic: A New Radio Frequency Based Locating System.
Proceedings of the Intelligence and Security Informatics, 2008

Challenges of Location Tracking Techniques in Wireless Forensics.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

A Soft Constraint Privacy Model based on Identifiability.
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007

HPtaa database-potential target genes for clinical diagnosis and immunotherapy of human carcinoma.
Nucleic Acids Research, 2006

Transnational Information Sharing, Event Notification, Rule Enforcement and Process Coordination.
IJEGR, 2005

Exploiting the IPID Field to Infer Network Path and End-System Characteristics.
Proceedings of the Passive and Active Network Measurement, 6th International Workshop, 2005

Optimizing cost-sensitive trust-negotiation protocols.
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005

Optimizing Event Distribution in Publish/Subscribe Systems in the Presence of Policy-Constraints and Composite Events.
Proceedings of the 13th IEEE International Conference on Network Protocols (ICNP 2005), 2005

On Dynamic Subset Difference Revocation Scheme.
Proceedings of the NETWORKING 2004, 2004

A Prototype System for Transnational Information Sharing and Process Coordination: System Demo.
Proceedings of the 2004 Annual National Conference on Digital Government Research, 2004

A Prototype System for Transnational Information Sharing and Process Coordination.
Proceedings of the 2004 Annual National Conference on Digital Government Research, 2004

Agent-Based Data Mining Approach for the Prediction of UK and Irish Companies Performance.
Proceedings of the Key Technologies for Data Management, 2004

Recommendations in Using Group Key Management Algorithms.
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003

Performance Comparison of Stateful and Stateless Group Rekeying Algorithms.
Proceedings of the Networked Group Communication, Fourth International COST264 Workshop, 2002

The Defense Framework for Large-scale Computer Network System.
Proceedings of the Information Security for Global Information Infrastructures, 2000