Wenzheng Zhang

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Known people with the same name:

Bibliography

2025
Adaptive Smith Predictive Active Disturbance Rejection Control of Magnetic Suspended Rotor System Considering Time Delay.
IEEE Trans. Ind. Electron., September, 2025

Deformable Cluster Manipulation via Whole-Arm Policy Learning.
CoRR, July, 2025

ImpRAG: Retrieval-Augmented Generation with Implicit Queries.
CoRR, June, 2025

Optimization of multi-objective feature regression models for designing performance assessment methods in college and university educational reform.
PeerJ Comput. Sci., 2025

A dual-index Boolean retrieval scheme with dynamic and revocable attribute-based policies.
J. Syst. Archit., 2025

Encryption Algorithm MLOL: Security and Efficiency Enhancement Based on the LOL Framework.
Cryptogr., 2025

PGrid-Align: An Efficient Fine-tuning Method for Large-scale Language Models via Sparse Power Grid Operations Data.
Proceedings of the 11th IEEE Conference on Big Data Security on Cloud, 2025

Poplar: Efficient Scaling of Distributed DNN Training on Heterogeneous GPU Clusters.
Proceedings of the AAAI-25, Sponsored by the Association for the Advancement of Artificial Intelligence, February 25, 2025

2024
Grasping by parallel shape matching.
CoRR, 2024

A Privacy Preserving Method for IoT Forensics.
Proceedings of the 2024 IEEE Global Communications Conference, 2024

2023
Dual-Channel Semi-Supervised Adversarial Network for Building Segmentation from UAV-Captured Images.
Remote. Sens., December, 2023

Research on privacy information retrieval model based on hybrid homomorphic encryption.
Cybersecur., December, 2023

<i>Poly-ABE</i>: A traceable and revocable fully hidden policy CP-ABE scheme for integrated demand response in multi-energy systems.
J. Syst. Archit., October, 2023

Multiauthority Attribute-Based Encryption for Assuring Data Deletion.
IEEE Syst. J., June, 2023

An improved chaotic-map based two-factor authentication and key agreement protocol for WSNs.
Proceedings of the 2nd International Conference on Algorithms, 2023

2022
Privacy protection in social applications: A ciphertext policy attribute-based encryption with keyword search.
Int. J. Intell. Syst., December, 2022

Privacy Preserving Data Aggregation for Smart Grid with User Anonymity and Designated Recipients.
Symmetry, 2022

A Real-time Cutting Model Based on Finite Element and Order Reduction.
Comput. Syst. Sci. Eng., 2022

A new soft tissue deformation model based on Runge-Kutta: Application in lung.
Comput. Biol. Medicine, 2022

Multi-Scale Distillation from Multiple Graph Neural Networks.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
On the Modified Transparency Order of n , m -Functions.
Secur. Commun. Networks, 2021

Building Outline Extraction Directly Using the U2-Net Semantic Segmentation Model from High-Resolution Aerial Images and a Comparison Study.
Remote. Sens., 2021

Phenomena of Bifurcation and Chaos in the Dynamically Loaded Hyperelastic Spherical Membrane Based on a Noninteger Power-Law Constitutive Model.
Int. J. Bifurc. Chaos, 2021

Public-key encryption with bidirectional keyword search and its application to encrypted emails.
Comput. Stand. Interfaces, 2021

Construction of MDS Matrices Based on the Primitive Elements of the Finite Field.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021

Generalizing Message Passing Neural Networks to Heterophily Using Position Information.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2021, 2021

Parametrical Construction of MDS Based on Block Cyclic Shift.
Proceedings of the CSSE 2021: 2021 4th International Conference on Computer Science and Software Engineering, Singapore, October 22, 2021

Fast MILP Modelings for Sboxes.
Proceedings of the CSSE 2021: 2021 4th International Conference on Computer Science and Software Engineering, Singapore, October 22, 2021

2020
The physical pattern evaluation and identification method of infrared thermal image of human health state in Traditional Chinese Medicine.
Int. J. Comput. Appl. Technol., 2020

2019
Accurate detection of selective forwarding attack in wireless sensor networks.
Int. J. Distributed Sens. Networks, 2019

2016
New secondary constructions of Bent functions.
Appl. Algebra Eng. Commun. Comput., 2016

2015
An automatic and simple method for specifying dislocation features in atomistic simulations.
Comput. Phys. Commun., 2015

A Needs Analysis Survey for Open EAP Courses for Chinese Graduates on Overseas Exchange Programs.
Proceedings of the Workshop Proceedings of the 11th International Conference on Intelligent Environments, 2015

2014
A Near-Infrared Face Detection and Recognition System Using ASM and PCA+LDA.
J. Networks, 2014

Gaussian sampling of lattices for cryptographic applications.
Sci. China Inf. Sci., 2014

2013
Hard fault analysis of Trivium.
Inf. Sci., 2013

Threshold public key encryption scheme resilient against continual leakage without random oracles.
Frontiers Comput. Sci., 2013

New forward-secure signature schemes with untrusted update.
Frontiers Comput. Sci., 2013

Efficient Chosen Ciphertext Secure Threshold Public-Key Encryption with Forward Security.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

2012
Nonlinear Periodic Oscillation of a Cylindrical Microvoid Centered at an Isotropic Incompressible Ogden Cylinder.
J. Appl. Math., 2012

The global avalanche characteristics of two Boolean functions and algebraic immunity.
Int. J. Comput. Math., 2012

Secondary Constructions of Bent Functions and Highly Nonlinear Resilient Functions
CoRR, 2012

New bounds on the sum-of-squares indicator.
Proceedings of the 7th International Conference on Communications and Networking in China, 2012

Attack Based on Direct Sum Decomposition against the Nonlinear Filter Generator.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2012, 2012


  Loading...