Zhendong Wu

According to our database1, Zhendong Wu authored at least 42 papers between 2005 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
GMM and CNN Hybrid Method for Short Utterance Speaker Recognition.
IEEE Trans. Industrial Informatics, 2018

Multibiometric Fusion Authentication in Wireless Multimedia Environment Using Dynamic Bayesian Method.
Security and Communication Networks, 2018

Joint graph regularized extreme learning machine for multi-label image classification.
J. Comput. Meth. in Science and Engineering, 2018

Generating stable biometric keys for flexible cloud computing authentication using finger vein.
Inf. Sci., 2018

Empirical Study on the Optimization Strategy of Subject Metro Design Based on Virtual Reality.
Informatica (Slovenia), 2018

Face recognition model based on privacy protection and random forest algorithm.
Proceedings of the 27th Wireless and Optical Communication Conference, 2018

A Robust Fingerprint Identification Method by Deep Learning with Gabor Filter Multidimensional Feature Expansion.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

A Face Privacy Protection Algorithm Based on Block Scrambling and Deep Learning.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

User Password Intelligence Enhancement by Dynamic Generation Based on Markov Model.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

2017
Prosodic features-based speaker verification using speaker-specific-text for short utterances.
IJES, 2017

A finger vein recognition algorithm based on deep learning.
IJES, 2017

Surveying concurrency bug detectors based on types of detected bugs.
SCIENCE CHINA Information Sciences, 2017

Efficient Privacy-Preservation Multi-factor Ranking with Approximate Search over Encrypted Big Cloud Data.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

2016
A twice face recognition algorithm.
Soft Comput., 2016

High-dimension space projection-based biometric encryption for fingerprint with fuzzy minutia.
Soft Comput., 2016

A hierarchical face recognition algorithm based on humanoid nonlinear least-squares computation.
J. Ambient Intelligence and Humanized Computing, 2016

Analysis on Historical Periods of Architectural Visualization Under the Perspectival Consciousness.
Proceedings of the HCI International 2016 - Posters' Extended Abstracts, 2016

Damaged fingerprint classification by Deep Learning with fuzzy feature points.
Proceedings of the 9th International Congress on Image and Signal Processing, 2016

Pedestrian detection based on deep learning model.
Proceedings of the 9th International Congress on Image and Signal Processing, 2016

2015
Detecting harmful data races through parallel verification.
The Journal of Supercomputing, 2015

Collaborative Technique for Concurrency Bug Detection.
International Journal of Parallel Programming, 2015

A Load-Balanced Deterministic Runtime for Pipeline Parallelism.
IEICE Transactions, 2015

E-Diophantine estimating peak allocated capacity in wireless networks.
Computer Communications, 2015

RaceChecker: Efficient Identification of Harmful Data Races.
Proceedings of the 23rd Euromicro International Conference on Parallel, 2015

Prosodic Features Based Text-dependent Speaker Recognition with Short Utterance.
Proceedings of the Computational Intelligence and Intelligent Systems, 2015

A Novel WDM-PON Based on Quantum Key Distribution FPGA Controller.
Proceedings of the Computational Intelligence and Intelligent Systems, 2015

A Finger Vein Recognition Algorithm Using Feature Block Fusion and Depth Neural Network.
Proceedings of the Computational Intelligence and Intelligent Systems, 2015

Identifying Repeated Interleavings to Improve the Efficiency of Concurrency Bug Detection.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Efficiently Trigger Data Races through Speculative Execution.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

2014
DRDet: Efficiently Making Data Races Deterministic.
IEICE Transactions, 2014

Improved EAP-AKA Protocol Based on Redirection Defense.
Proceedings of the 2014 Ninth International Conference on P2P, 2014

A Novel Fingerprint-Based Biometric Encryption.
Proceedings of the 2014 Ninth International Conference on P2P, 2014

Research and Prevention of Rogue AP Based MitM in Wireless Network.
Proceedings of the 2014 Ninth International Conference on P2P, 2014

2013
ColFinder Collaborative Concurrency Bug Detection.
Proceedings of the 2013 13th International Conference on Quality Software, 2013

An Illumination Robust Algorithm for Face Recognition Via SRC and Gradientfaces.
Proceedings of the 2013 The Second International Conference on Innovative Computing and Cloud Computing, 2013

2012
Research of Context Situation Awareness Technology.
Proceedings of the 15th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing Workshops, 2012

2007
Ontology driven adaptive data processing in wireless sensor networks.
Proceedings of the 2nf International Conference on Scalable Information Systems, 2007

A Nodes-Cooperation Strategy for Reliable Transmission in Unreliable Wireless Sensor Networks.
Proceedings of the Third International Conference on Natural Computation, 2007

An Adaptive Multi-paths Algorithm for Wireless Sensor Networks.
Proceedings of the Embedded Software and Systems, [Third] International Conference, 2007

A Reliable Transmission Strategy in Unreliable Wireless Sensor Networks.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

A Parallel Multi-Path Routing Algorithm for Flexible Transmission in Wireless Sensor Networks.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2005
A Topology Control Method for Multi-path Wireless Sensor Networks.
Proceedings of the Embedded Software and Systems, Second International Conference, 2005


  Loading...