Zhen Cao

According to our database1, Zhen Cao authored at least 93 papers between 2006 and 2023.

Collaborative distances:



In proceedings 
PhD thesis 


On csauthors.net:


Innovative Remote Sensing Identification of Cyanobacterial Blooms Inspired from Pseudo Water Color.
Remote. Sens., January, 2023

MultiLive: Adaptive Bitrate Control for Low-Delay Multi-Party Interactive Live Streaming.
IEEE/ACM Trans. Netw., 2022

CMANet: Cross-Modality Attention Network for Indoor-Scene Semantic Segmentation.
Sensors, 2022

CattleFaceNet: A cattle face identification approach based on RetinaFace and ArcFace loss.
Comput. Electron. Agric., 2022

Disease category-specific annotation of variants using an ensemble learning framework.
Briefings Bioinform., 2022

Analysis of Single BSA Protein Molecules Using MoS2 Nanopores<sup>*</sup>.
Proceedings of the 17th IEEE International Conference on Nano/Micro Engineered and Molecular Systems, 2022

DNM-SNN: Spiking Neural Network Based on Dual Network Model.
Proceedings of the Intelligence Science IV, 2022

Relay-UNet: Reduce Semantic Gap for Glomerular Image Segmentation.
Proceedings of the Intelligence Science IV, 2022

Disk Failure Prediction Based on SW-Disk Feature Engineering.
Proceedings of the 8th IEEE Intl Conference on Big Data Security on Cloud, 2022

Cloud Storage I/O Load Prediction Based on XB-IOPS Feature Engineering.
Proceedings of the 8th IEEE Intl Conference on Big Data Security on Cloud, 2022

Efficient Route Invalidation.
RFC, April, 2021

Tunnel Reconstruction With Block Level Precision by Combining Data-Driven Segmentation and Model-Driven Assembly.
IEEE Trans. Geosci. Remote. Sens., 2021

An Integrative Framework for Combining Sequence and Epigenomic Data to Predict Transcription Factor Binding Sites Using Deep Learning.
IEEE ACM Trans. Comput. Biol. Bioinform., 2021

MFM-Net: Unpaired Shape Completion Network with Multi-stage Feature Matching.
CoRR, 2021

A Real-time Low-cost Artificial Intelligence System for Autonomous Spraying in Palm Plantations.
CoRR, 2021

Exploring the mechanism of <i>Cremastra Appendiculata</i> (SUANPANQI) against breast cancer by network pharmacology and molecular docking.
Comput. Biol. Chem., 2021

Effects of Carbon Impurity in Monocrystalline Silicon on Electrical Properties and the Mechanism Analysis of PIN Rectifier Diodes.
IEEE Access, 2021

Characterization of ITO-SiNx Nanopores for Single-Biomolecular Sensing.
Proceedings of the 16th IEEE International Conference on Nano/Micro Engineered and Molecular Systems, 2021

Detection of Single Protein Molecules Using MoS2 Nanopores of Various Sizes.
Proceedings of the 16th IEEE International Conference on Nano/Micro Engineered and Molecular Systems, 2021

Self-adaptive Hydroponics Care System for Human-hydroponics Coexistence.
Proceedings of the 3rd IEEE Global Conference on Life Sciences and Technologies, 2021

Design of Die System for Powder Repressing Based on TRIZ Theory.
Proceedings of the ICAIIS 2021: 2021 2nd International Conference on Artificial Intelligence and Information Systems, Chongqing, China, May 28, 2021

Probe Efficient Feature Representation of Gapped K-mer Frequency Vectors from Sequences Using Deep Neural Networks.
IEEE ACM Trans. Comput. Biol. Bioinform., 2020

A Low-Latency and Energy-Efficient Neighbor Discovery Algorithm for Wireless Sensor Networks.
Sensors, 2020

Keyword-Attentive Deep Semantic Matching.
CoRR, 2020

Analyzing Indicators Affecting Commercial Property Value in Metro Station Accessible Area Using Walking Time Consumption: Case of Xi'an, China.
Complex., 2020

Continuous Similarity Learning with Shared Neural Semantic Representation for Joint Event Detection and Evolution.
Comput. Intell. Neurosci., 2020

The CASP13-CAPRI targets as case studies to illustrate a novel scoring pipeline integrating CONSRANK with clustering and interface analyses.
BMC Bioinform., 2020

Finding Persistent Elements of Anomalous Flows in Distributed Monitoring Systems.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

Controllable Question Generation via Sequence-to-Sequence Neural Model with Auxiliary Information.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

Carver: Finding Important Parameters for Storage System Tuning.
Proceedings of the 18th USENIX Conference on File and Storage Technologies, 2020

A Flexible Architecture for Extracting Metro Tunnel Cross Sections from Terrestrial Laser Scanning Point Clouds.
Remote. Sens., 2019

Simple tricks of convolutional neural network architectures improve DNA-protein binding prediction.
Bioinform., 2019

Empirical Performance of Tree-Based Inference of Phylogenetic Networks.
Proceedings of the 19th International Workshop on Algorithms in Bioinformatics, 2019

ICE: An Interactive Configuration Explorer for High Dimensional Categorical Parameter Spaces.
Proceedings of the 14th IEEE Conference on Visual Analytics Science and Technology, 2019

CPDM: An Efficient Crowdsensing-Based Pothole Detection and Measurement System Design.
Proceedings of the 31st IEEE International Conference on Tools with Artificial Intelligence, 2019

Graphs Are Not Enough: Using Interactive Visual Analytics in Storage Research.
Proceedings of the 11th USENIX Workshop on Hot Topics in Storage and File Systems, 2019

Energy-Efficient Features of Internet of Things Protocols.
RFC, April, 2018

Alternate Tunnel Encapsulation for Data Frames in Control and Provisioning of Wireless Access Points (CAPWAP).
RFC, April, 2018

Security and Communication Networks Behaviors of High-Frequency Subscribers in Cellular Data Networks.
Secur. Commun. Networks, 2018

EDM-JBW: A novel event detection model based on <i>JS</i>-<i>ID</i>′<i>F</i><sub><i>order</i></sub> and Bikmeans with word embedding for news streams.
J. Comput. Sci., 2018

The lncLocator: a subcellular localization predictor for long non-coding RNAs based on a stacked ensemble classifier.
Bioinform., 2018

Panacea: A low-latency, energy-efficient neighbor discovery protocol for wireless sensor networks.
Proceedings of the 2018 IEEE Wireless Communications and Networking Conference, 2018

Performance Evaluation of Constrained Application Protocol over TCP.
Proceedings of the 88th IEEE Vehicular Technology Conference, 2018

Towards Better Understanding of Black-box Auto-Tuning: A Comparative Analysis for Storage Systems.
Proceedings of the 2018 USENIX Annual Technical Conference, 2018

How Local Information Improves Rendezvous in Cognitive Radio Networks.
Proceedings of the 15th Annual IEEE International Conference on Sensing, 2018

Alano: An Efficient Neighbor Discovery Algorithm in an Energy-Restricted Large-Scale Network.
Proceedings of the 15th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2018

Combining Sequence and Epigenomic Data to Predict Transcription Factor Binding Sites Using Deep Learning.
Proceedings of the Bioinformatics Research and Applications - 14th International Symposium, 2018

Opportunistic Concurrency Transmission MAC Protocol Based on Geographic Location Information.
Proceedings of the Data Science, 2018

Social Networks Node Mining Algorithm of Based on Greedy Subgraph.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

FASOR Retransmission Timeout and Congestion Control Mechanism for CoAP.
Proceedings of the IEEE Global Communications Conference, 2018

Is CoAP Congestion Safe?
Proceedings of the Applied Networking Research Workshop, 2018

Intelligent controlling of indoor air quality based on remote monitoring platform by considering building environment.
Proceedings of the 4th International Conference on Systems and Informatics, 2017

On the Performance Variation in Modern Storage Stacks.
Proceedings of the 15th USENIX Conference on File and Storage Technologies, 2017

An Image Steganalysis Algorithm Based on Rotation Forest Transformation and Multiple Classifiers Ensemble.
Proceedings of the Advances in Internetworking, 2017

EMMBTT: A Novel Event Evolution Model Based on TFxIEF and TDC in Tracking News Streams.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

Distributed Data Deluge (D3): Efficient state management for virtualized Network Functions.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

FreeSurf: Application-centric wireless access.
Proceedings of the 17th IEEE International Conference on High Performance Switching and Routing, 2016

Reducing memory buffering overhead in software thread-level speculation.
Proceedings of the 25th International Conference on Compiler Construction, 2016

FLIP: enforcing IP mobility to the cellular network edge.
Int. J. Auton. Adapt. Commun. Syst., 2015

FreeSurf: Application-Centric Wireless Access with SDN.
Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, 2015

Social Wi-Fi: Hotspot sharing with online friends.
Proceedings of the 26th IEEE Annual International Symposium on Personal, 2015

Parametric Optimization of Storage Systems.
Proceedings of the 7th USENIX Workshop on Hot Topics in Storage and File Systems, 2015

Collaborative content caching in wireless edge with SDN.
Proceedings of the 1st Workshop on Content Caching and Delivery in Wireless Networks, 2015

NAT64 Deployment Options and Experience.
RFC, June, 2014

Adaptive Fork-Heuristics for Software Thread-Level Speculation.
Proceedings of the Parallel Processing and Applied Mathematics, 2013

Characterizing high-frequency subscriber sessions in cellular data networks.
Proceedings of the IFIP Networking Conference, 2013, Brooklyn, 2013

Mixed Model Universal Software Thread-Level Speculation.
Proceedings of the 42nd International Conference on Parallel Processing, 2013

Examining Privacy Concern in Social-Driven Location Sharing: An Empirical Study on Chinese Popular SNSs.
Proceedings of the 37th Annual IEEE Computer Software and Applications Conference, 2013

GenRe: A General Replication Scheme over an Abstraction of DHTs.
Proceedings of the 37th Annual IEEE Computer Software and Applications Conference, 2013

EAP Extensions for the EAP Re-authentication Protocol (ERP).
RFC, July, 2012

EAP Re-authentication Protocol Extensions for Authenticated Anticipatory Keying (ERP/AAK).
RFC, June, 2012

Information-theoretic modeling of false data filtering schemes in wireless sensor networks.
ACM Trans. Sens. Networks, 2012

Language and Architecture Independent Software Thread-Level Speculation.
Proceedings of the Languages and Compilers for Parallel Computing, 2012

Autonomicity in distributed mobility management.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2011

Compiler Backend Generation for Application Specific Instruction Set Processors.
Proceedings of the Programming Languages and Systems - 9th Asian Symposium, 2011

Optimality and Improvement of Dynamic Voltage Scaling Algorithms for Multimedia Applications.
IEEE Trans. Circuits Syst. I Regul. Pap., 2010

Towards Risk Evaluation of Denial-of-Service Vulnerabilities in Security Protocols.
J. Comput. Sci. Technol., 2010

Filtering false data via authentic consensus in vehicle ad hoc networks.
Int. J. Auton. Adapt. Commun. Syst., 2010

Intel LVS logic as a combinational logic paradigm in CNT technology.
Proceedings of the 2010 IEEE/ACM International Symposium on Nanoscale Architectures, 2010

Domain-specific Pattern Matching Based Automatic Parallelization: Demonstrated by 2-D Prestack Migration.
Proceedings of the 15th IEEE International Conference on Parallel and Distributed Systems, 2009

Fashion: A Fast and Accurate Solution to Global Routing Problem.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2008

FBSR: feedback-based secure routing protocol for wireless sensor networks.
Int. J. Pervasive Comput. Commun., 2008

Weak data secrecy via obfuscation in network coding based content distribution.
Proceedings of the 1st IFIP Wireless Days, 2008

An efficient weak secrecy scheme for network coding data dissemination in VANET.
Proceedings of the IEEE 19th International Symposium on Personal, 2008

A Randomized Complexity-theoretic Model of Bio-inspired Mobile Epidemics via Close Contact.
Proceedings of the 2008 International Conference on Information Theory and Statistical Learning, 2008

WebIBC: Identity Based Cryptography for Client Side Security in Web Applications.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 2008

An Economical Model for the Risk Evaluation of DoS Vulnerabilities in Cryptography Protocols.
Proceedings of the Information Security Practice and Experience, 2007

Granular Ranking Algorithm Based on Rough Sets.
Proceedings of the Fuzzy Information and Engineering, 2007

Integrating Identity Based Cryptography with Cryptographically Generated Addresses in Mobile IPv6.
Proceedings of the Computational Science and Its Applications, 2007

A Granular Ranking Algorithm for Mining Market Values.
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007

DpRouter: A Fast and Accurate Dynamic-Pattern-Based Global Routing Algorithm.
Proceedings of the 12th Conference on Asia South Pacific Design Automation, 2007

DraXRouter: global routing in X-Architecture with dynamic resource assignment.
Proceedings of the 2006 Conference on Asia South Pacific Design Automation: ASP-DAC 2006, 2006

Feedback: Towards Dynamic Behavior and Secure Routing forWireless Sensor Networks.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006