Zhen Xu

According to our database1, Zhen Xu authored at least 156 papers between 2003 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
ConnSpoiler: Disrupting C&C Communication of IoT-Based Botnet Through Fast Detection of Anomalous Domain Queries.
IEEE Trans. Ind. Informatics, 2020

Comments on "Dropping Activation Outputs with Localized First-Layer Deep Network for Enhancing User Privacy and Data Security".
IEEE Trans. Inf. Forensics Secur., 2020

Towards automated computer vision: analysis of the AutoCV challenges 2019.
Pattern Recognit. Lett., 2020

Error Analysis of a Decoupled, Linear Stabilization Scheme for the Cahn-Hilliard Model of Two-Phase Incompressible Flows.
J. Sci. Comput., 2020

Distributed hunting problem of multi-quadrotor systems via bearing constraint method subject to time delays.
J. Frankl. Inst., 2020

Stabilisation of T-S fuzzy systems with mixed time delays.
Int. J. Syst. Sci., 2020

School Commuting Mode Shift: A Scenario Analysis for Active School Commuting Using GIS and Online Map API.
ISPRS Int. J. Geo Inf., 2020

Informal multimedia biodiversity awareness event as a digital ecology for promoting culture of science.
Educ. Inf. Technol., 2020

Fast Thompson Sampling Algorithm with Cumulative Oversampling: Application to Budgeted Influence Maximization.
CoRR, 2020

An enhanced saturation attack and its mitigation mechanism in software-defined networking.
Comput. Networks, 2020

Scenario simulation of indoor post-earthquake fire rescue based on building information model and virtual reality.
Adv. Eng. Softw., 2020

Photo-realistic visualization of seismic dynamic responses of urban building clusters based on oblique aerial photography.
Adv. Eng. Informatics, 2020

End-Edge Coordinated Inference for Real-Time BYOD Malware Detection using Deep Learning.
Proceedings of the 2020 IEEE Wireless Communications and Networking Conference, 2020

A novel network traffic classification approach via discriminative feature learning.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020

Deep State-Space Generative Model For Correlated Time-to-Event Predictions.
Proceedings of the KDD '20: The 26th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2020

Capsule Networks-based Traffic Prediction for Resources Deployment in B5G Fronthaul Network.
Proceedings of the 16th International Wireless Communications and Mobile Computing Conference, 2020

A Multivariate Time Series Prediction Schema based on Multi-attention in recurrent neural network.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

A Feedback Mechanism for Prediction-based Anomaly Detection In Content Delivery Networks.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

AutoSpeech 2020: The Second Automated Machine Learning Challenge for Speech Classification.
Proceedings of the Interspeech 2020, 2020

RegionSparse: Leveraging Sparse Coding and Object Localization to Counter Adversarial Attacks.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

Design of Underwater Humanoid Flexible Manipulator Motion Control System Based on Data Glove.
Proceedings of the 6th International Conference on Mechatronics and Robotics Engineering, 2020

Development and Control of a Humanoid Underwater Robot.
Proceedings of the 6th International Conference on Mechatronics and Robotics Engineering, 2020

Distributed Semi-supervised Multi-label Classification with Quantized Communication.
Proceedings of the ICMLC 2020: 2020 12th International Conference on Machine Learning and Computing, 2020

Flow Contrastive Estimation of Energy-Based Models.
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020

Learning the Graphical Structure of Electronic Health Records with Graph Convolutional Transformer.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
Stabilized semi-implicit numerical schemes for the Cahn-Hilliard-like equation with variable interfacial parameter.
J. Comput. Appl. Math., 2019

Local polynomial contrast binary patterns for face recognition.
Neurocomputing, 2019

Block-based versus text-based programming environments on novice student learning outcomes: a meta-analysis study.
Comput. Sci. Educ., 2019

Efficient and linear schemes for anisotropic Cahn-Hilliard model using the Stabilized-Invariant Energy Quadratization (S-IEQ) approach.
Comput. Phys. Commun., 2019

Deep Physiological State Space Model for Clinical Forecasting.
CoRR, 2019

Beyond Adaptive Submodularity: Adaptive Influence Maximization with Intermediary Constraints.
CoRR, 2019

Learning an Adaptive Learning Rate Schedule.
CoRR, 2019

Graph Convolutional Transformer: Learning the Graphical Structure of Electronic Health Records.
CoRR, 2019

Using memory propagation tree to improve performance of protocol fuzzer when testing ICS.
Comput. Secur., 2019

Seismic loss assessment for buildings with various-LOD BIM data.
Adv. Eng. Informatics, 2019

Piecewise Nonlinear Dynamic Modeling for Gear Transmissions With Rotary Inertia and Backlash.
IEEE Access, 2019

EFastLane: Toward Bandwidth-Efficient Flow Setup in Software-Defined Networking.
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019

Global Orchestration of Cooperative Defense against DDoS Attacks for MEC.
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019

AVX-512 Based Software Decoding for 5G LDPC Codes.
Proceedings of the 2019 IEEE International Workshop on Signal Processing Systems, 2019

An Effective Load Balanced Controller Placement Approach in Software-Defined WANs.
Proceedings of the 2019 IEEE Military Communications Conference, 2019

An Online System Dependency Graph Anomaly Detection based on Extended Weisfeiler-Lehman Kernel.
Proceedings of the 2019 IEEE Military Communications Conference, 2019

An Effective Table-Overflow Attack and Defense in Software-Defined Networking.
Proceedings of the 2019 IEEE 44th LCN Symposium on Emerging Topics in Networking (LCN Symposium), 2019

SwiftFabric: Optimizing Fabric Private Data Transaction Flow TPS.
Proceedings of the 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2019

Minimizing Multi-Controller Deployment Cost in Software-Defined Networking.
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019

Adaptive SDN Master Controller Assignment for Maximizing Network Throughput.
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019

Survey of Data Value Evaluation Methods Based on Open Source Scientific and Technological Information.
Proceedings of the Data Science, 2019

Prototype-Based Malware Traffic Classification with Novelty Detection.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

Towards Scalable and Flexible Path Control Schema in Software Defined Networking.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

A Secure Container Deployment Strategy by Genetic Algorithm to Defend against Co-Resident Attacks in Cloud Computing.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

2018
Cross-Browser Differences Detection Based on an Empirical Metric for Web Page Visual Similarity.
ACM Trans. Internet Techn., 2018

Binarized features with discriminant manifold filters for robust single-sample face recognition.
Signal Process. Image Commun., 2018

Distributed online semi-supervised support vector machine.
Inf. Sci., 2018

Online semi-supervised support vector machine.
Inf. Sci., 2018

Delay-aware data collecting protocol for low-duty-cycle wireless sensor networks.
IET Networks, 2018

Feature-based intelligent system for steam simulation using computational fluid dynamics.
Adv. Eng. Informatics, 2018

Image Reconstruction Performance of a 12-Electrode CCERT Sensor Under Five Different Excitation Patterns.
IEEE Access, 2018

A Clustering-Based Collision-Free Multichannel MAC Protocol for Vehicular Ad Hoc Networks.
Proceedings of the 88th IEEE Vehicular Technology Conference, 2018

A Dynamic Taint Analysis Tool for Android App Forensics.
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018

Panoramic Image Saliency Detection by Fusing Visual Frequency Feature and Viewing Behavior Pattern.
Proceedings of the Advances in Multimedia Information Processing - PCM 2018, 2018

Proactive Mitigation to Table-Overflow in Software-Defined Networking.
Proceedings of the 2018 IEEE Symposium on Computers and Communications, 2018

T-Tracker: Compressing System Audit Log by Taint Tracking.
Proceedings of the 24th IEEE International Conference on Parallel and Distributed Systems, 2018

A distributed cooperative MAC protocol with relay collision avoidance for wireless ad hoc networks.
Proceedings of the 2018 International Conference on Information Networking, 2018

Graph-Based Equivalence Concept Matching in Knowledge Organization System Integration: A Case Study on Thesaurus.
Proceedings of the 14th International Conference on Natural Computation, 2018

LagProber: Detecting DGA-Based Malware by Using Query Time Lag of Non-existent Domains.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

Automatic Identification of Industrial Control Network Protocol Field Boundary Using Memory Propagation Tree.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

Novel Back Gate Doping Ultra Low Retention Power 22nm FDSOl SRAM for IOT Application.
Proceedings of the 48th European Solid-State Device Research Conference, 2018

Histotripsy for Non-Invasive Ablation of Hepatocellular Carcinoma (HCC) Tumor in a Subcutaneous Xenograft Murine Model.
Proceedings of the 40th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2018

A Large Scale Analysis of DNS Water Torture Attack.
Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence, 2018

Understanding User Behavior in Online Banking System.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

2017
Demonstration of Dual-Channel TOPS SAR Imaging With Airborne C-Band Data.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2017

基于科学计量的世界人工智能领域发展状况分析 (Analysis of Development Status of World Artificial Intelligence Based on Scientific Measurement).
计算机科学, 2017

Estimating similarity of rich internet pages using visual information.
Int. J. Web Eng. Technol., 2017

Weighted contourlet binary patterns and image-based fisher linear discriminant for face recognition.
Neurocomputing, 2017

Real-world traffic analysis and joint caching and scheduling for in-RAN caching networks.
Sci. China Inf. Sci., 2017

Sensitivity Distribution of CCERT Sensor Under Different Excitation Patterns.
IEEE Access, 2017

A localization algorithm of adaptively determining the ROI of the reference circle in image.
Proceedings of the MIPPR 2017: Remote Sensing Image Processing, 2017

Removing contaminated data for illumination-robust face recognition.
Proceedings of the International Conference on Systems, Signals and Image Processing, 2017

DC<sup>2</sup>-MTCP: Light-Weight Coding for Efficient Multi-Path Transmission in Data Center Network.
Proceedings of the 2017 IEEE International Parallel and Distributed Processing Symposium, 2017

Digital Harmonic Detection with Rapid Response and High Steady Precision.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2017

A new approach of anti-swing control system based on run-to-run control and fuzzy control for overhead crane.
Proceedings of the 13th International Conference on Natural Computation, 2017

A Novel Semantic-Aware Approach for Detecting Malicious Web Traffic.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

A game theoretical framework for improving the quality of service in cooperative RAN caching.
Proceedings of the IEEE International Conference on Communications, 2017

Illumination-robust face recognition with Block-based Local Contrast Patterns.
Proceedings of the 2017 IEEE International Conference on Acoustics, 2017

IM-Visor: A Pre-IME Guard to Prevent IME Apps from Stealing Sensitive Keystrokes Using TrustZone.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

What should we do? A structured review of SCADA system cyber security standards.
Proceedings of the 4th International Conference on Control, 2017

Quantitative Security Assessment Method based on Entropy for Moving Target Defense.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

A Multi-queue Aggregation Framework for M2M Traffic in LTE-A and Beyond Networks.
Proceedings of the 5G for Future Wireless Networks - First International Conference, 2017

2016
Identifying semantic blocks in Web pages using Gestalt laws of grouping.
World Wide Web, 2016

A Power-Optimized Cooperative MAC Protocol for Lifetime Extension in Wireless Sensor Networks.
Sensors, 2016

Cross-layer transmission and energy scheduling under full-duplex energy harvesting wireless OFDM joint transmission.
Sci. China Inf. Sci., 2016

A computational framework for regional seismic simulation of buildings with multiple fidelity models.
Adv. Eng. Softw., 2016

Using Social Dynamics to Make Individual Predictions: Variational Inference with a Stochastic Kinetic Model.
Proceedings of the Advances in Neural Information Processing Systems 29: Annual Conference on Neural Information Processing Systems 2016, 2016

Towards reliable virtual data center embedding in software defined networking.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

Improving revenue for reliability-aware VDC embedding in a software-defined data center.
Proceedings of the 24th IEEE/ACM International Symposium on Quality of Service, 2016

Choquet integral based QoS-to-QoE mapping for mobile VoD applications.
Proceedings of the 24th IEEE/ACM International Symposium on Quality of Service, 2016

Cross-network and cross-layer optimized video streaming over LTE and WCDMA downlink.
Proceedings of the IEEE Symposium on Computers and Communication, 2016

Thwart eavesdropping attacks on network communication based on moving target defense.
Proceedings of the 35th IEEE International Performance Computing and Communications Conference, 2016

A Self-adaptive Hopping Approach of Moving Target Defense to thwart Scanning Attacks.
Proceedings of the Information and Communications Security - 18th International Conference, 2016

An Energy-Aware Algorithm for Optimizing Resource Allocation in Software Defined Network.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

The Design of Augmented Reality-Based Learning System Applied in U-Learning Environment.
Proceedings of the E-Learning and Games - 10th International Conference, 2016

SMPA: An Energy-Aware Service Migration Strategy in Cloud Networks.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016

2015
Development of a Cost-Effective Airborne Remote Sensing System for Coastal Monitoring.
Sensors, 2015

VFA: A Variable-Factor Authentication Framework for Mobile Users.
J. Commun., 2015

A cost-effective scheme supporting adaptive service migration in cloud data center.
Frontiers Comput. Sci., 2015

Design and analysis of collaborative EPC and RAN caching for LTE mobile networks.
Comput. Networks, 2015

A New Webpage Classification Model Based on Visual Information Using Gestalt Laws of Grouping.
Proceedings of the Web Information Systems Engineering - WISE 2015, 2015

Balancing harvesting energy consumption with potential field in wireless sensor networks.
Proceedings of the 26th IEEE Annual International Symposium on Personal, 2015

A partial-decentralized coflow scheduling scheme in data center networks.
Proceedings of the 40th IEEE Conference on Local Computer Networks, 2015

Improving TCP performance in data center networks with Adaptive Complementary Coding.
Proceedings of the 40th IEEE Conference on Local Computer Networks, 2015

Behavior Recognition of Scale Adaptive Local Spatio-Temporal Characteristics Harris Algorithm.
Proceedings of the Information Technology and Intelligent Transportation Systems, 2015

Discriminative voting for activity prediction.
Proceedings of the 7th International Conference on Internet Multimedia Computing and Service, 2015

Activity Auto-Completion: Predicting Human Activities from Partial Videos.
Proceedings of the 2015 IEEE International Conference on Computer Vision, 2015

An Efficient Resource Embedding Algorithm in Software Defined Virtualized Data Center.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Collaborative EPC and RAN Caching Algorithms for LTE Mobile Networks.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Constructing energy expenditure regression model using heart rate with reduced training time.
Proceedings of the 37th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2015

Missing value imputation: with application to handwriting data.
Proceedings of the Document Recognition and Retrieval XXII, 2015

2014
Proof-Carrying Cloud Computation: The Case of Convex Optimization.
IEEE Trans. Inf. Forensics Secur., 2014

A 14 Bit 500 MS/s CMOS DAC Using Complementary Switched Current Sources and Time-Relaxed Interleaving DRRZ.
IEEE Trans. Circuits Syst. I Regul. Pap., 2014

A coarse-grained parallel approach for seismic damage simulations of urban areas based on refined models and GPU/CPU cooperative computing.
Adv. Eng. Softw., 2014

Smart nitrate-selective electrochemical sensors with electrospun nanofibers modified microelectrode.
Proceedings of the 2014 IEEE International Conference on Systems, Man, and Cybernetics, 2014

Defending Blind DDoS Attack on SDN Based on Moving Target Defense.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Studies in Individuality: Can Students, Teachers and Schools Be Determined from Children's Handwriting?
Proceedings of the Computational Forensics, 2014

A study on the spatial vulnerability of the civil aviation network system in China.
Proceedings of the 17th International IEEE Conference on Intelligent Transportation Systems, 2014

A privacy-aware cloud-assisted healthcare monitoring system via compressive sensing.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Performance analysis of rate compatible punctured turbo coded hybrid ARQ scheme over satellite channel.
Proceedings of the 2nd International Conference on Systems and Informatics, 2014

Bayesian Network Structure Learning Using Causality.
Proceedings of the 22nd International Conference on Pattern Recognition, 2014

Development of Handwriting Individuality: An Information-Theoretic Study.
Proceedings of the 14th International Conference on Frontiers in Handwriting Recognition, 2014

A Relay-Optimized Cooperative MAC Protocol for Mobile Ad Hoc Networks.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014

2013
A rapid cooperation-differentiated medium access control protocol with packet piggyback for multihop wireless networks.
EURASIP J. Wirel. Commun. Netw., 2013

Deficient documentation detection: a methodology to locate deficient project documentation using topic analysis.
Proceedings of the 10th Working Conference on Mining Software Repositories, 2013

Proof-carrying cloud computation: The case of convex optimization.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

The integrated routing algorithm for multi-satellites, multi-ground-stations and multi-processing-centers.
Proceedings of the Ninth International Conference on Natural Computation, 2013

Task scheduling of satellite ground station systems based on the neighbor-area search algorithm.
Proceedings of the Ninth International Conference on Natural Computation, 2013

2012
EasyPDP: An Efficient Parallel Dynamic Programming Runtime System for Computational Biology.
IEEE Trans. Parallel Distributed Syst., 2012

ICEberg: a web-based resource for integrative and conjugative elements found in Bacteria.
Nucleic Acids Res., 2012

Efficient Point Based Global Illumination on GPU.
Proceedings of the 33rd Annual Conference of the European Association for Computer Graphics, 2012

Real-time remote attestation of IaaS cloud.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012

A trusted information sharing skeleton for privacy preservation.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012

2011
Source localization by collaborating multiple measurements with inaccurate sensor positions.
Proceedings of the 8th International Conference on Information, 2011

2010
Semi-supervised Learning from Only Positive and Unlabeled Data Using Entropy.
Proceedings of the Web-Age Information Management, 11th International Conference, 2010

An Integrated Simulation Framework for Evacuation Dynamics with CAD, GIS and VR Views.
Proceedings of the 2010 International Conference on Modeling, 2010

Gripping Force Model and Influence Factors of Gripping Device for Heavy Forging Manipulators.
Proceedings of the Intelligent Robotics and Applications - Third International Conference, 2010

A Contact/Impact Analysis of Rigid Bodies Based on Newmark Direct Integration Method.
Proceedings of the Intelligent Robotics and Applications - Third International Conference, 2010

2009
Directly Identify Unexpected Instances in the Test Set by Entropy Maximization.
Proceedings of the Advances in Data and Web Management, Joint International Conferences, 2009

A Visual Model-Driven Rapid Development Toolsuite for Parallel Applications.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

An Anonymous Property-Based Attestation Protocol from Bilinear Maps.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2008
Interference-Aware QoS Routing in Wireless Mesh Networks.
Proceedings of the MSN 2008, 2008

Mediator-Free Secure Policy Interoperation of Exclusively-Trusted Multiple Domains.
Proceedings of the Information Security Practice and Experience, 2008

Vegetation Dynamics in Arid and Semi-Arid Ecotone - A Case Study in Yanchi County.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2008

Integrated Landscape Pattern and Classification Tree for Land Use Classification in Inland River Basin of China Arid Region.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2008

Remaining Delivery Time Estimation Based Routing for Intermittently Connected Mobile Networks.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 2008

2006
A Memory Efficient Algorithm for Packet Classification.
Proceedings of the Wireless Algorithms, 2006

A Machine Learning Application for Human Resource Data Mining Problem.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2006

2005
Fuzzy Logic Experience Model in Human Resource Management.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

2004
IP packet forwarding based on comb extraction scheme.
Proceedings of IEEE International Conference on Communications, 2004

2003
UC-RBAC: A Usage Constrained Role-Based Access Control Model.
Proceedings of the Information and Communications Security, 5th International Conference, 2003


  Loading...