Zhendong Wu

According to our database1, Zhendong Wu authored at least 62 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Suppression of Amplitude and Phase Errors in Optically Pumped Magnetometers Using Dual-PI Closed-Loop Control.
IEEE Trans. Instrum. Meas., 2024

2022
A Few-Shot Dental Object Detection Method Based on a Priori Knowledge Transfer.
Symmetry, 2022

Adversarial Malicious Encrypted Traffic Detection Based on Refined Session Analysis.
Symmetry, 2022

Fingerprint bio-key generation based on a deep neural network.
Int. J. Intell. Syst., 2022

Semantic key generation based on natural language.
Int. J. Intell. Syst., 2022

Short Speech Key Generation Technology Based on Deep Learning.
Proceedings of the Machine Learning for Cyber Security - 4th International Conference, 2022

Performance Improvement of Classification Model Based on Adversarial Sample Generation.
Proceedings of the Machine Learning for Cyber Security - 4th International Conference, 2022

Improving Transferability of Adversarial Examples with Virtual Step and Auxiliary Gradients.
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022

Detecting Vulnerabilities in Ethereum Smart Contracts with Deep Learning.
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022

2021
The effect of visual attention on stereoscopic lighting of museum ceramic exhibits: A virtual environment mixed with eye-tracking.
Informatica (Slovenia), 2021

The effect of luminance contrast between sign and surrounding object on gaze behavior: A study in virtual metro station environment with rendered static/dynamic panorama.
Informatica (Slovenia), 2021

2020
A network intrusion detection method based on semantic Re-encoding and deep learning.
J. Netw. Comput. Appl., 2020

Non-norm-bounded Attack for Generating Adversarial Examples.
Proceedings of the Neural Information Processing - 27th International Conference, 2020

2019
Neuron Selecting: Defending Against Adversarial Examples in Deep Neural Networks.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

A Biometric Key Generation Method for Fingerprint and Finger Vein Fusion.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

A Fingerprint and Voiceprint Fusion Identity Authentication Method.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

A Method of Malicious Bot Traffic Detection.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

Research on Intrusion Detection Based on Semantic Re-encoding and Multi-space Projection.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

DeepWAF: Detecting Web Attacks Based on CNN and LSTM Models.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

2018
GMM and CNN Hybrid Method for Short Utterance Speaker Recognition.
IEEE Trans. Ind. Informatics, 2018

Multibiometric Fusion Authentication in Wireless Multimedia Environment Using Dynamic Bayesian Method.
Secur. Commun. Networks, 2018

Joint graph regularized extreme learning machine for multi-label image classification.
J. Comput. Methods Sci. Eng., 2018

Generating stable biometric keys for flexible cloud computing authentication using finger vein.
Inf. Sci., 2018

Empirical Study on the Optimization Strategy of Subject Metro Design Based on Virtual Reality.
Informatica (Slovenia), 2018

Face recognition model based on privacy protection and random forest algorithm.
Proceedings of the 27th Wireless and Optical Communication Conference, 2018

A Robust Fingerprint Identification Method by Deep Learning with Gabor Filter Multidimensional Feature Expansion.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

A Face Privacy Protection Algorithm Based on Block Scrambling and Deep Learning.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

User Password Intelligence Enhancement by Dynamic Generation Based on Markov Model.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

2017
Prosodic features-based speaker verification using speaker-specific-text for short utterances.
Int. J. Embed. Syst., 2017

A finger vein recognition algorithm based on deep learning.
Int. J. Embed. Syst., 2017

Surveying concurrency bug detectors based on types of detected bugs.
Sci. China Inf. Sci., 2017

Efficient Privacy-Preservation Multi-factor Ranking with Approximate Search over Encrypted Big Cloud Data.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

2016
A twice face recognition algorithm.
Soft Comput., 2016

High-dimension space projection-based biometric encryption for fingerprint with fuzzy minutia.
Soft Comput., 2016

一种面向分布式异构网络的基于可信计算的信任模型 (Trust Model Based on Trusted Computing for Distributed Heterogeneous Networks).
计算机科学, 2016

A hierarchical face recognition algorithm based on humanoid nonlinear least-squares computation.
J. Ambient Intell. Humaniz. Comput., 2016

Analysis on Historical Periods of Architectural Visualization Under the Perspectival Consciousness.
Proceedings of the HCI International 2016 - Posters' Extended Abstracts, 2016

Damaged fingerprint classification by Deep Learning with fuzzy feature points.
Proceedings of the 9th International Congress on Image and Signal Processing, 2016

Pedestrian detection based on deep learning model.
Proceedings of the 9th International Congress on Image and Signal Processing, 2016

2015
Detecting harmful data races through parallel verification.
J. Supercomput., 2015

Collaborative Technique for Concurrency Bug Detection.
Int. J. Parallel Program., 2015

A Load-Balanced Deterministic Runtime for Pipeline Parallelism.
IEICE Trans. Inf. Syst., 2015

E-Diophantine estimating peak allocated capacity in wireless networks.
Comput. Commun., 2015

RaceChecker: Efficient Identification of Harmful Data Races.
Proceedings of the 23rd Euromicro International Conference on Parallel, 2015

Prosodic Features Based Text-dependent Speaker Recognition with Short Utterance.
Proceedings of the Computational Intelligence and Intelligent Systems, 2015

A Novel WDM-PON Based on Quantum Key Distribution FPGA Controller.
Proceedings of the Computational Intelligence and Intelligent Systems, 2015

A Finger Vein Recognition Algorithm Using Feature Block Fusion and Depth Neural Network.
Proceedings of the Computational Intelligence and Intelligent Systems, 2015

Identifying Repeated Interleavings to Improve the Efficiency of Concurrency Bug Detection.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Efficiently Trigger Data Races through Speculative Execution.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

2014
DRDet: Efficiently Making Data Races Deterministic.
IEICE Trans. Inf. Syst., 2014

Improved EAP-AKA Protocol Based on Redirection Defense.
Proceedings of the 2014 Ninth International Conference on P2P, 2014

A Novel Fingerprint-Based Biometric Encryption.
Proceedings of the 2014 Ninth International Conference on P2P, 2014

Research and Prevention of Rogue AP Based MitM in Wireless Network.
Proceedings of the 2014 Ninth International Conference on P2P, 2014

2013
ColFinder Collaborative Concurrency Bug Detection.
Proceedings of the 2013 13th International Conference on Quality Software, 2013

An Illumination Robust Algorithm for Face Recognition Via SRC and Gradientfaces.
Proceedings of the 2013 The Second International Conference on Innovative Computing and Cloud Computing, 2013

2012
Research of Context Situation Awareness Technology.
Proceedings of the 15th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing Workshops, 2012

2007
Ontology driven adaptive data processing in wireless sensor networks.
Proceedings of the 2nf International Conference on Scalable Information Systems, 2007

A Nodes-Cooperation Strategy for Reliable Transmission in Unreliable Wireless Sensor Networks.
Proceedings of the Third International Conference on Natural Computation, 2007

An Adaptive Multi-paths Algorithm for Wireless Sensor Networks.
Proceedings of the Embedded Software and Systems, [Third] International Conference, 2007

A Reliable Transmission Strategy in Unreliable Wireless Sensor Networks.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

A Parallel Multi-Path Routing Algorithm for Flexible Transmission in Wireless Sensor Networks.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2005
A Topology Control Method for Multi-path Wireless Sensor Networks.
Proceedings of the Embedded Software and Systems, Second International Conference, 2005


  Loading...