Zheng Dong

According to our database1, Zheng Dong authored at least 29 papers between 2003 and 2019.

Collaborative distances:



In proceedings 
PhD thesis 


On csauthors.net:


Online terrain estimation for autonomous vehicles on deformable terrains.
CoRR, 2019

Four Ports Double Y-Shaped Ultra-Wideband Magneto-Photonic Crystals Circulator for 5G Communication System.
IEEE Access, 2019

Reconfigurable Magneto-Electric Dipole Antennas for Base Stations in Modern Wireless Communication Systems.
Wireless Communications and Mobile Computing, 2018

Recognition of protein allosteric states and residues: Machine learning approaches.
Journal of Computational Chemistry, 2018

Maximising the degrees of freedom of the physical-layer secured relay networks with artificial jamming.
IET Communications, 2018

ExtTra: Short-Term Traffic Flow Prediction Based on Extremely Randomized Trees.
Proceedings of the Neural Information Processing - 25th International Conference, 2018

Detection of Rogue Certificates from Trusted Certificate Authorities Using Deep Neural Networks.
ACM Trans. Priv. Secur., 2016

Delay Minimization for Relay-Based Cooperative Data Exchange With Network Coding.
IEEE/ACM Trans. Netw., 2015

Beyond the lock icon: real-time detection of phishing websites using public key certificates.
Proceedings of the 2015 APWG Symposium on Electronic Crime Research, 2015

Variable-On-Time-Controlled Critical-Conduction-Mode Flyback PFC Converter.
IEEE Trans. Industrial Electronics, 2014

Social Marketing Meets Targeted Customers: A Typical User Selection and Coverage Perspective.
Proceedings of the 2014 IEEE International Conference on Data Mining, 2014

Delay Minimization in Varying-Bandwidth Direct Multicast with Side Information
CoRR, 2013

Balanced Sparsest Generator Matrices for MDS Codes
CoRR, 2013

Touch-enabled Programming for the Lab of Things.
CoRR, 2013

Multi-Hop Collaborative Relay Beamforming.
Proceedings of the 78th IEEE Vehicular Technology Conference, 2013

Delay Minimization for Relay-Based Cooperative Data Exchange with Network Coding.
Proceedings of the 78th IEEE Vehicular Technology Conference, 2013

Balanced Sparsest generator matrices for MDS codes.
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013

Joint receiver-and-collaborative beamforming for the multi-user relay network in the uplink.
Proceedings of the International Conference on Wireless Communications and Signal Processing, 2012

PeerSec: Towards Peer Production and Crowdsourcing for Enhanced Security.
Proceedings of the 7th USENIX Workshop on Hot Topics in Security, 2012

Pools, clubs and security: designing for a party not a person.
Proceedings of the New Security Paradigms Workshop, 2012

Enabling Users to Self-manage Networks: Collaborative Anomaly Detection in Wireless Personal Area Networks.
Proceedings of the Financial Cryptography and Data Security, 2012

The decreasing marginal value of evaluation network size.
SIGCAS Computers and Society, 2011

Classifying EEG Using Incremental Support Vector Machine in BCIs.
Proceedings of the Life System Modeling and Intelligent Computing, 2010

Recognition of Fire Detection Based on Neural Network.
Proceedings of the Life System Modeling and Intelligent Computing, 2010

Privacy-preserving genomic computation through program specialization.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

Viewing the Web as a Cube: The Vision and Approach.
Proceedings of the Advanced Web Technologies and Applications, 2004

Cryptanalysis of B.Lee-S.Kim-K.Kim Proxy Signature.
IACR Cryptology ePrint Archive, 2003

an attack on a multisignature scheme.
IACR Cryptology ePrint Archive, 2003

Ontology-Based Intelligent Sensing Action in Golog for Web Service Composition.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003