Zhen Cao

According to our database1, Zhen Cao authored at least 81 papers between 2006 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2021
Efficient Route Invalidation.
RFC, April, 2021

Tunnel Reconstruction With Block Level Precision by Combining Data-Driven Segmentation and Model-Driven Assembly.
IEEE Trans. Geosci. Remote. Sens., 2021

An Integrative Framework for Combining Sequence and Epigenomic Data to Predict Transcription Factor Binding Sites Using Deep Learning.
IEEE ACM Trans. Comput. Biol. Bioinform., 2021

A Real-time Low-cost Artificial Intelligence System for Autonomous Spraying in Palm Plantations.
CoRR, 2021

Exploring the mechanism of <i>Cremastra Appendiculata</i> (SUANPANQI) against breast cancer by network pharmacology and molecular docking.
Comput. Biol. Chem., 2021

Effects of Carbon Impurity in Monocrystalline Silicon on Electrical Properties and the Mechanism Analysis of PIN Rectifier Diodes.
IEEE Access, 2021

Characterization of ITO-SiNx Nanopores for Single-Biomolecular Sensing.
Proceedings of the 16th IEEE International Conference on Nano/Micro Engineered and Molecular Systems, 2021

Detection of Single Protein Molecules Using MoS2 Nanopores of Various Sizes.
Proceedings of the 16th IEEE International Conference on Nano/Micro Engineered and Molecular Systems, 2021

Self-adaptive Hydroponics Care System for Human-hydroponics Coexistence.
Proceedings of the 3rd IEEE Global Conference on Life Sciences and Technologies, 2021

2020
Probe Efficient Feature Representation of Gapped K-mer Frequency Vectors from Sequences Using Deep Neural Networks.
IEEE ACM Trans. Comput. Biol. Bioinform., 2020

A Low-Latency and Energy-Efficient Neighbor Discovery Algorithm for Wireless Sensor Networks.
Sensors, 2020

Keyword-Attentive Deep Semantic Matching.
CoRR, 2020

Analyzing Indicators Affecting Commercial Property Value in Metro Station Accessible Area Using Walking Time Consumption: Case of Xi'an, China.
Complex., 2020

Continuous Similarity Learning with Shared Neural Semantic Representation for Joint Event Detection and Evolution.
Comput. Intell. Neurosci., 2020

The CASP13-CAPRI targets as case studies to illustrate a novel scoring pipeline integrating CONSRANK with clustering and interface analyses.
BMC Bioinform., 2020

Finding Persistent Elements of Anomalous Flows in Distributed Monitoring Systems.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

Controllable Question Generation via Sequence-to-Sequence Neural Model with Auxiliary Information.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

Carver: Finding Important Parameters for Storage System Tuning.
Proceedings of the 18th USENIX Conference on File and Storage Technologies, 2020

2019
A Flexible Architecture for Extracting Metro Tunnel Cross Sections from Terrestrial Laser Scanning Point Clouds.
Remote. Sens., 2019

Simple tricks of convolutional neural network architectures improve DNA-protein binding prediction.
Bioinform., 2019

Empirical Performance of Tree-Based Inference of Phylogenetic Networks.
Proceedings of the 19th International Workshop on Algorithms in Bioinformatics, 2019

ICE: An Interactive Configuration Explorer for High Dimensional Categorical Parameter Spaces.
Proceedings of the 14th IEEE Conference on Visual Analytics Science and Technology, 2019

CPDM: An Efficient Crowdsensing-Based Pothole Detection and Measurement System Design.
Proceedings of the 31st IEEE International Conference on Tools with Artificial Intelligence, 2019

Graphs Are Not Enough: Using Interactive Visual Analytics in Storage Research.
Proceedings of the 11th USENIX Workshop on Hot Topics in Storage and File Systems, 2019

2018
Energy-Efficient Features of Internet of Things Protocols.
RFC, April, 2018

Alternate Tunnel Encapsulation for Data Frames in Control and Provisioning of Wireless Access Points (CAPWAP).
RFC, April, 2018

Security and Communication Networks Behaviors of High-Frequency Subscribers in Cellular Data Networks.
Secur. Commun. Networks, 2018

EDM-JBW: A novel event detection model based on <i>JS</i>-<i>ID</i>′<i>F</i><sub><i>order</i></sub> and Bikmeans with word embedding for news streams.
J. Comput. Sci., 2018

The lncLocator: a subcellular localization predictor for long non-coding RNAs based on a stacked ensemble classifier.
Bioinform., 2018

Panacea: A low-latency, energy-efficient neighbor discovery protocol for wireless sensor networks.
Proceedings of the 2018 IEEE Wireless Communications and Networking Conference, 2018

Performance Evaluation of Constrained Application Protocol over TCP.
Proceedings of the 88th IEEE Vehicular Technology Conference, 2018

Towards Better Understanding of Black-box Auto-Tuning: A Comparative Analysis for Storage Systems.
Proceedings of the 2018 USENIX Annual Technical Conference, 2018

How Local Information Improves Rendezvous in Cognitive Radio Networks.
Proceedings of the 15th Annual IEEE International Conference on Sensing, 2018

Alano: An Efficient Neighbor Discovery Algorithm in an Energy-Restricted Large-Scale Network.
Proceedings of the 15th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2018

Combining Sequence and Epigenomic Data to Predict Transcription Factor Binding Sites Using Deep Learning.
Proceedings of the Bioinformatics Research and Applications - 14th International Symposium, 2018

Opportunistic Concurrency Transmission MAC Protocol Based on Geographic Location Information.
Proceedings of the Data Science, 2018

Social Networks Node Mining Algorithm of Based on Greedy Subgraph.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

FASOR Retransmission Timeout and Congestion Control Mechanism for CoAP.
Proceedings of the IEEE Global Communications Conference, 2018

Is CoAP Congestion Safe?
Proceedings of the Applied Networking Research Workshop, 2018

2017
Intelligent controlling of indoor air quality based on remote monitoring platform by considering building environment.
Proceedings of the 4th International Conference on Systems and Informatics, 2017

On the Performance Variation in Modern Storage Stacks.
Proceedings of the 15th USENIX Conference on File and Storage Technologies, 2017

An Image Steganalysis Algorithm Based on Rotation Forest Transformation and Multiple Classifiers Ensemble.
Proceedings of the Advances in Internetworking, 2017

EMMBTT: A Novel Event Evolution Model Based on TFxIEF and TDC in Tracking News Streams.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

2016
Distributed Data Deluge (D3): Efficient state management for virtualized Network Functions.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

FreeSurf: Application-centric wireless access.
Proceedings of the 17th IEEE International Conference on High Performance Switching and Routing, 2016

Reducing memory buffering overhead in software thread-level speculation.
Proceedings of the 25th International Conference on Compiler Construction, 2016

2015
FLIP: enforcing IP mobility to the cellular network edge.
Int. J. Auton. Adapt. Commun. Syst., 2015

FreeSurf: Application-Centric Wireless Access with SDN.
Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, 2015

Social Wi-Fi: Hotspot sharing with online friends.
Proceedings of the 26th IEEE Annual International Symposium on Personal, 2015

Parametric Optimization of Storage Systems.
Proceedings of the 7th USENIX Workshop on Hot Topics in Storage and File Systems, 2015

Collaborative content caching in wireless edge with SDN.
Proceedings of the 1st Workshop on Content Caching and Delivery in Wireless Networks, 2015

2014
NAT64 Deployment Options and Experience.
RFC, June, 2014

2013
Adaptive Fork-Heuristics for Software Thread-Level Speculation.
Proceedings of the Parallel Processing and Applied Mathematics, 2013

Characterizing high-frequency subscriber sessions in cellular data networks.
Proceedings of the IFIP Networking Conference, 2013, Brooklyn, 2013

Mixed Model Universal Software Thread-Level Speculation.
Proceedings of the 42nd International Conference on Parallel Processing, 2013

Examining Privacy Concern in Social-Driven Location Sharing: An Empirical Study on Chinese Popular SNSs.
Proceedings of the 37th Annual IEEE Computer Software and Applications Conference, 2013

GenRe: A General Replication Scheme over an Abstraction of DHTs.
Proceedings of the 37th Annual IEEE Computer Software and Applications Conference, 2013

2012
EAP Extensions for the EAP Re-authentication Protocol (ERP).
RFC, July, 2012

EAP Re-authentication Protocol Extensions for Authenticated Anticipatory Keying (ERP/AAK).
RFC, June, 2012

Information-theoretic modeling of false data filtering schemes in wireless sensor networks.
ACM Trans. Sens. Networks, 2012

Language and Architecture Independent Software Thread-Level Speculation.
Proceedings of the Languages and Compilers for Parallel Computing, 2012

2011
Autonomicity in distributed mobility management.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2011

Compiler Backend Generation for Application Specific Instruction Set Processors.
Proceedings of the Programming Languages and Systems - 9th Asian Symposium, 2011

2010
Optimality and Improvement of Dynamic Voltage Scaling Algorithms for Multimedia Applications.
IEEE Trans. Circuits Syst. I Regul. Pap., 2010

Towards Risk Evaluation of Denial-of-Service Vulnerabilities in Security Protocols.
J. Comput. Sci. Technol., 2010

Filtering false data via authentic consensus in vehicle ad hoc networks.
Int. J. Auton. Adapt. Commun. Syst., 2010

Intel LVS logic as a combinational logic paradigm in CNT technology.
Proceedings of the 2010 IEEE/ACM International Symposium on Nanoscale Architectures, 2010

2009
Domain-specific Pattern Matching Based Automatic Parallelization: Demonstrated by 2-D Prestack Migration.
Proceedings of the 15th IEEE International Conference on Parallel and Distributed Systems, 2009

2008
Fashion: A Fast and Accurate Solution to Global Routing Problem.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2008

FBSR: feedback-based secure routing protocol for wireless sensor networks.
Int. J. Pervasive Comput. Commun., 2008

Weak data secrecy via obfuscation in network coding based content distribution.
Proceedings of the 1st IFIP Wireless Days, 2008

An efficient weak secrecy scheme for network coding data dissemination in VANET.
Proceedings of the IEEE 19th International Symposium on Personal, 2008

A Randomized Complexity-theoretic Model of Bio-inspired Mobile Epidemics via Close Contact.
Proceedings of the 2008 International Conference on Information Theory and Statistical Learning, 2008

WebIBC: Identity Based Cryptography for Client Side Security in Web Applications.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 2008

2007
An Economical Model for the Risk Evaluation of DoS Vulnerabilities in Cryptography Protocols.
Proceedings of the Information Security Practice and Experience, 2007

Granular Ranking Algorithm Based on Rough Sets.
Proceedings of the Fuzzy Information and Engineering, 2007

Integrating Identity Based Cryptography with Cryptographically Generated Addresses in Mobile IPv6.
Proceedings of the Computational Science and Its Applications, 2007

A Granular Ranking Algorithm for Mining Market Values.
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007

DpRouter: A Fast and Accurate Dynamic-Pattern-Based Global Routing Algorithm.
Proceedings of the 12th Conference on Asia South Pacific Design Automation, 2007

2006
DraXRouter: global routing in X-Architecture with dynamic resource assignment.
Proceedings of the 2006 Conference on Asia South Pacific Design Automation: ASP-DAC 2006, 2006

Feedback: Towards Dynamic Behavior and Secure Routing forWireless Sensor Networks.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006


  Loading...