Zheng Dong

According to our database1, Zheng Dong authored at least 29 papers between 2003 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Online terrain estimation for autonomous vehicles on deformable terrains.
CoRR, 2019

Four Ports Double Y-Shaped Ultra-Wideband Magneto-Photonic Crystals Circulator for 5G Communication System.
IEEE Access, 2019

2018
Reconfigurable Magneto-Electric Dipole Antennas for Base Stations in Modern Wireless Communication Systems.
Wireless Communications and Mobile Computing, 2018

Recognition of protein allosteric states and residues: Machine learning approaches.
Journal of Computational Chemistry, 2018

Maximising the degrees of freedom of the physical-layer secured relay networks with artificial jamming.
IET Communications, 2018

ExtTra: Short-Term Traffic Flow Prediction Based on Extremely Randomized Trees.
Proceedings of the Neural Information Processing - 25th International Conference, 2018

2016
Detection of Rogue Certificates from Trusted Certificate Authorities Using Deep Neural Networks.
ACM Trans. Priv. Secur., 2016

2015
Delay Minimization for Relay-Based Cooperative Data Exchange With Network Coding.
IEEE/ACM Trans. Netw., 2015

Beyond the lock icon: real-time detection of phishing websites using public key certificates.
Proceedings of the 2015 APWG Symposium on Electronic Crime Research, 2015

2014
Variable-On-Time-Controlled Critical-Conduction-Mode Flyback PFC Converter.
IEEE Trans. Industrial Electronics, 2014

Social Marketing Meets Targeted Customers: A Typical User Selection and Coverage Perspective.
Proceedings of the 2014 IEEE International Conference on Data Mining, 2014

2013
Delay Minimization in Varying-Bandwidth Direct Multicast with Side Information
CoRR, 2013

Balanced Sparsest Generator Matrices for MDS Codes
CoRR, 2013

Touch-enabled Programming for the Lab of Things.
CoRR, 2013

Multi-Hop Collaborative Relay Beamforming.
Proceedings of the 78th IEEE Vehicular Technology Conference, 2013

Delay Minimization for Relay-Based Cooperative Data Exchange with Network Coding.
Proceedings of the 78th IEEE Vehicular Technology Conference, 2013

Balanced Sparsest generator matrices for MDS codes.
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013

2012
Joint receiver-and-collaborative beamforming for the multi-user relay network in the uplink.
Proceedings of the International Conference on Wireless Communications and Signal Processing, 2012

PeerSec: Towards Peer Production and Crowdsourcing for Enhanced Security.
Proceedings of the 7th USENIX Workshop on Hot Topics in Security, 2012

Pools, clubs and security: designing for a party not a person.
Proceedings of the New Security Paradigms Workshop, 2012

Enabling Users to Self-manage Networks: Collaborative Anomaly Detection in Wireless Personal Area Networks.
Proceedings of the Financial Cryptography and Data Security, 2012

2011
The decreasing marginal value of evaluation network size.
SIGCAS Computers and Society, 2011

2010
Classifying EEG Using Incremental Support Vector Machine in BCIs.
Proceedings of the Life System Modeling and Intelligent Computing, 2010

Recognition of Fire Detection Based on Neural Network.
Proceedings of the Life System Modeling and Intelligent Computing, 2010

2009
Privacy-preserving genomic computation through program specialization.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2004
Viewing the Web as a Cube: The Vision and Approach.
Proceedings of the Advanced Web Technologies and Applications, 2004

2003
Cryptanalysis of B.Lee-S.Kim-K.Kim Proxy Signature.
IACR Cryptology ePrint Archive, 2003

an attack on a multisignature scheme.
IACR Cryptology ePrint Archive, 2003

Ontology-Based Intelligent Sensing Action in Golog for Web Service Composition.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003


  Loading...