Zhibo Wang

According to our database1, Zhibo Wang authored at least 123 papers between 2008 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Privacy-Preserving Crowd-Sourced Statistical Data Publishing with An Untrusted Server.
IEEE Trans. Mob. Comput., 2019

Personalized Privacy-Preserving Task Allocation for Mobile Crowdsensing.
IEEE Trans. Mob. Comput., 2019

A 3.77TOPS/W Convolutional Neural Network Processor With Priority-Driven Kernel Optimization.
IEEE Trans. on Circuits and Systems, 2019

A 2.2-GHz Configurable Direct Digital Frequency Synthesizer Based on LUT and Rotation.
IEEE Trans. on Circuits and Systems, 2019

A 130-nm Ferroelectric Nonvolatile System-on-Chip With Direct Peripheral Restore Architecture for Transient Computing System.
J. Solid-State Circuits, 2019

RMTS: A robust clock synchronization scheme for wireless sensor networks.
J. Network and Computer Applications, 2019

PRSS: A Prejudiced Random Sensing Strategy for Energy-Efficient Information Collection in the Internet of Things.
IEEE Internet of Things Journal, 2019

Simultaneous Sensor Placement and Scheduling for Fusion-Based Detection in RF-Powered Sensor Networks.
IEEE Internet of Things Journal, 2019

Task Bundling Based Incentive for Location-Dependent Mobile Crowdsourcing.
IEEE Communications Magazine, 2019

Task-Bundling-Based Incentive for Location-Dependent Mobile Crowdsourcing.
IEEE Communications Magazine, 2019

An ADI difference scheme based on fractional trapezoidal rule for fractional integro-differential equation with a weakly singular kernel.
Applied Mathematics and Computation, 2019

The World Wants Mangoes and Kangaroos: A Study of New Emoji Requests Based on Thirty Million Tweets.
Proceedings of the World Wide Web Conference, 2019

A 65nm 0.39-to-140.3TOPS/W 1-to-12b Unified Neural Network Processor Using Block-Circulant-Enabled Transpose-Domain Acceleration with 8.1 × Higher TOPS/mm2and 6T HBST-TRAM-Based 2D Data-Reuse Architecture.
Proceedings of the IEEE International Solid- State Circuits Conference, 2019

Beyond Inferring Class Representatives: User-Level Privacy Leakage From Federated Learning.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Towards Privacy-preserving Incentive for Mobile Crowdsensing Under An Untrusted Platform.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

AERIS: area/energy-efficient 1T2R ReRAM based processing-in-memory neural network system-on-a-chip.
Proceedings of the 24th Asia and South Pacific Design Automation Conference, 2019

2018
Niffler: A Context-Aware and User-Independent Side-Channel Attack System for Password Inference.
Wireless Communications and Mobile Computing, 2018

Enabling Online Robust Barcode-Based Visible Light Communication With Realtime Feedback.
IEEE Trans. Wireless Communications, 2018

Approximate and Sublinear Spatial Queries for Large-Scale Vehicle Networks.
IEEE Trans. Vehicular Technology, 2018

Charging While Moving: Deploying Wireless Chargers for Powering Wearable Devices.
IEEE Trans. Vehicular Technology, 2018

MAC: Missing Tag Iceberg Queries for Multi-Category RFID Systems.
IEEE Trans. Vehicular Technology, 2018

On Achieving Asynchronous Energy-Efficient Neighbor Discovery for Mobile Sensor Networks.
IEEE Trans. Emerging Topics Comput., 2018

Real-Time and Spatio-Temporal Crowd-Sourced Social Network Data Publishing with Differential Privacy.
IEEE Trans. Dependable Sec. Comput., 2018

Projective synchronization in fixed time for complex dynamical networks with nonidentical nodes via second-order sliding mode control strategy.
J. Franklin Institute, 2018

Personalized Recommendation Algorithm Based on Product Reviews.
JECO, 2018

Narrowband Internet of Things Systems With Opportunistic D2D Communication.
IEEE Internet of Things Journal, 2018

Efficiently and Completely Identifying Missing Key Tags for Anonymous RFID Systems.
IEEE Internet of Things Journal, 2018

Heterogeneous incentive mechanism for time-sensitive and location-dependent crowdsensing networks with random arrivals.
Computer Networks, 2018

Exploring Human Mobility Patterns in Urban Scenarios: A Trajectory Data Perspective.
IEEE Communications Magazine, 2018

A Social Utility-Based Dissemination Scheme for Emergency Warning Messages in Vehicular Social Networks.
Comput. J., 2018

Be Stable and Fair: Robust Data Scheduling for Vehicular Networks.
IEEE Access, 2018

Sparsest Random Sampling for Cluster-Based Compressive Data Gathering in Wireless Sensor Networks.
IEEE Access, 2018

Sticker: A 0.41-62.1 TOPS/W 8Bit Neural Network Processor with Multi-Sparsity Compatible Convolution Arrays and Online Tuning Acceleration for Fully Connected Layers.
Proceedings of the 2018 IEEE Symposium on VLSI Circuits, 2018

A 2-GHz Direct Digital Frequency Synthesizer Based on LUT and Rotation.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2018

Deep User Modeling for Content-based Event Recommendation in Event-based Social Networks.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Pay On-Demand: Dynamic Incentive and Task Selection for Location-Dependent Mobile Crowdsensing Systems.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018

PatternListener: Cracking Android Pattern Lock Using Acoustic Signals.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

NEOFog: Nonvolatility-Exploiting Optimizations for Fog Computing.
Proceedings of the Twenty-Third International Conference on Architectural Support for Programming Languages and Operating Systems, 2018

Dante: Enabling FOV-Aware Adaptive FEC Coding for 360-Degree Video Streaming.
Proceedings of the 2nd Asia-Pacific Workshop on Networking, 2018

2017
Probabilistic Detection of Missing Tags for Anonymous Multicategory RFID Systems.
IEEE Trans. Vehicular Technology, 2017

Efficient 3-dimensional localization for RFID systems using jumping probe.
Pervasive and Mobile Computing, 2017

A 65-nm ReRAM-Enabled Nonvolatile Processor With Time-Space Domain Adaption and Self-Write-Termination Achieving > 4× Faster Clock Frequency and > 6× Higher Restore Speed.
J. Solid-State Circuits, 2017

A ReRAM-Based Nonvolatile Flip-Flop With Self-Write-Termination Scheme for Frequent-OFF Fast-Wake-Up Nonvolatile Processors.
J. Solid-State Circuits, 2017

Efficient and Reliable Missing Tag Identification for Large-Scale RFID Systems With Unknown Tags.
IEEE Internet of Things Journal, 2017

Achieving location error tolerant barrier coverage for wireless sensor networks.
Computer Networks, 2017

Cost-effective barrier coverage formation in heterogeneous wireless sensor networks.
Ad Hoc Networks, 2017

Approximate Cardinality Estimation (ACE) in large-scale Internet of Things deployments.
Ad Hoc Networks, 2017

Extracting Depression Symptoms from Social Networks and Web Blogs via Text Mining.
Proceedings of the Bioinformatics Research and Applications - 13th International Symposium, 2017

A Hybrid Machine Learning Method for Finding Depression Related Publications by Eliminating Outlier Publications.
Proceedings of the 2017 IEEE International Conference on Information Reuse and Integration, 2017

Exploiting social influence for context-aware event recommendation in event-based social networks.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

2016
A Secure Credit-Based Incentive Mechanism for Message Forwarding in Noncooperative DTNs.
IEEE Trans. Vehicular Technology, 2016

A Traffic Adaptive Multi-Channel MAC Protocol with Dynamic Slot Allocation for WSNs.
IEEE Trans. Mob. Comput., 2016

A Compact Difference Scheme for Fractional Sub-diffusion Equations with the Spatially Variable Coefficient Under Neumann Boundary Conditions.
J. Sci. Comput., 2016

Finite difference schemes for two-dimensional time-space fractional differential equations.
Int. J. Comput. Math., 2016

Fully discrete local discontinuous Galerkin methods for some time-fractional fourth-order problems.
Int. J. Comput. Math., 2016

A survey on barrier coverage with sensors.
Frontiers Comput. Sci., 2016

A hybrid model of sentimental entity recognition on mobile social media.
EURASIP J. Wireless Comm. and Networking, 2016

A compact difference scheme for a two dimensional nonlinear fractional Klein-Gordon equation in polar coordinates.
Computers & Mathematics with Applications, 2016

Design of nonvolatile processors and applications.
Proceedings of the 2016 IFIP/IEEE International Conference on Very Large Scale Integration, 2016

SecWeb: Privacy-Preserving Web Browsing Monitoring with w-Event Differential Privacy.
Proceedings of the Security and Privacy in Communication Networks, 2016

A compare-and-select error tolerant scheme for nonvolatile processors.
Proceedings of the IEEE/ACM International Symposium on Nanoscale Architectures, 2016

4.7 A 65nm ReRAM-enabled nonvolatile processor with 6× reduction in restore time and 4× higher clock frequency using adaptive data retention and self-write-termination nonvolatile logic.
Proceedings of the 2016 IEEE International Solid-State Circuits Conference, 2016

RescueDP: Real-time spatio-temporal crowd-sourced data publishing with differential privacy.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Catch me in the dark: Effective privacy-preserving outsourcing of feature extractions over image data.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Outsourcing Large-Scale Systems of Linear Matrix Equations in Cloud Computing.
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016

A Hybrid Document Feature Extraction Method Using Latent Dirichlet Allocation and Word2Vec.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016

A Text Information Retrieval Method by Integrating Global and Local Textual Information.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

A novel method for document summarization using Word2Vec.
Proceedings of the 15th IEEE International Conference on Cognitive Informatics & Cognitive Computing , 2016

2015
Friendbook: A Semantic-Based Friend Recommendation System for Social Networks.
IEEE Trans. Mob. Comput., 2015

Chinese social media analysis for disease surveillance.
Personal and Ubiquitous Computing, 2015

Securing DV-Hop localization against wormhole attacks in wireless sensor networks.
Pervasive and Mobile Computing, 2015

End-to-end delay analysis for networked systems.
Frontiers of IT & EE, 2015

pQueue-MAC: An Energy Efficient Hybrid MAC Protocol for Event-Driven Sensor Networks.
IJDSN, 2015

Fault Tolerant Line-Based Barrier Coverage Formation in Mobile Wireless Sensor Networks.
IJDSN, 2015

Spatiotemporal Correlation Based Fault-Tolerant Event Detection in Wireless Sensor Networks.
IJDSN, 2015

Frequency resource allocation strategy with QoS support in hybrid cellular and Device-to-Device networks.
Int. J. Communication Systems, 2015

A high-order ADI scheme for the two-dimensional time fractional diffusion-wave equation.
Int. J. Comput. Math., 2015

Multistage Function Speculation Adders.
IEICE Transactions, 2015

A high order compact finite difference scheme for time fractional Fokker-Planck equations.
Appl. Math. Lett., 2015

Design exploration of inrush current aware controller for nonvolatile processor.
Proceedings of the IEEE Non-Volatile Memory System and Applications Symposium, 2015

An energy-efficient heterogeneous dual-core processor for Internet of Things.
Proceedings of the 2015 IEEE International Symposium on Circuits and Systems, 2015

User's Interests-Based Movie Recommendation in Heterogeneous Network.
Proceedings of the International Conference on Identification, 2015

Exploiting Feature Selection Algorithm on Group Events Data Based on News Data.
Proceedings of the International Conference on Identification, 2015

Rain Bar: Robust Application-Driven Visual Communication Using Color Barcodes.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

Assessment of Spatio-Temporal Vegetation Productivity Pattern Based on MODIS-NDVI and Geo-Correlation Analysis.
Proceedings of the Geo-Informatics in Resource Management and Sustainable Ecosystem, 2015

The Design and Implementation of Geographic Information Storage System Based on the Cloud Platform.
Proceedings of the Geo-Informatics in Resource Management and Sustainable Ecosystem, 2015

Parallelization of the Kriging Algorithm in Stochastic Simulation with GPU Accelerators.
Proceedings of the Geo-Informatics in Resource Management and Sustainable Ecosystem, 2015

CloudBI: Practical Privacy-Preserving Outsourcing of Biometric Identification in the Cloud.
Proceedings of the Computer Security - ESORICS 2015, 2015

Walls Have Ears! Opportunistically Communicating Secret Messages Over the Wiretap Channel: from Theory to Practice.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Key Technology Research on User Identity Resolution across Multi-social Media.
Proceedings of the International Conference on Cloud Computing and Big Data, 2015

A Data Collection and Analysis System for Mobile Group Marketing.
Proceedings of the International Conference on Cloud Computing and Big Data, 2015

2014
Optimal Load Balancing and Energy Cost Management for Internet Data Centers in Deregulated Electricity Markets.
IEEE Trans. Parallel Distrib. Syst., 2014

Achieving k-Barrier Coverage in Hybrid Directional Sensor Networks.
IEEE Trans. Mob. Comput., 2014

Applying biometrics to design three-factor remote user authentication scheme with key agreement.
Security and Communication Networks, 2014

Reliability Improvement Using Power Control in Device-to-Device Networks.
JNW, 2014

Compact difference schemes for the modified anomalous fractional sub-diffusion equation and the fractional diffusion-wave equation.
J. Comput. Physics, 2014

A compact difference scheme for a two dimensional fractional Klein-Gordon equation with Neumann boundary conditions.
J. Comput. Physics, 2014

Mobile Beacon Based Wormhole Attackers Detection and Positioning in Wireless Sensor Networks.
IJDSN, 2014

A high-order exponential ADI scheme for two dimensional time fractional convection-diffusion equations.
Computers & Mathematics with Applications, 2014

On some generalizations of an Ostrowski-Grüss type integral inequality.
Applied Mathematics and Computation, 2014

Intra-Cluster Device-to-Device Multicast Algorithm Based on Small World Model.
Proceedings of the IEEE 80th Vehicular Technology Conference, 2014

Resource Allocation for Intra-Cluster D2D Communications Based on Kuhn-Munkres Algorithm.
Proceedings of the IEEE 80th Vehicular Technology Conference, 2014

Fault tolerant barrier coverage for wireless sensor networks.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Towards approximate spatial queries for large-scale vehicle networks.
Proceedings of the 22nd ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, 2014

Device-to-device resource allocation for QoS support using a graphic theory.
Proceedings of the 11th IEEE Consumer Communications and Networking Conference, 2014

2013
HierTrack: an energy-efficient cluster-based target tracking system forwireless sensor networks.
Journal of Zhejiang University - Science C, 2013

A Hybrid Cluster-Based Target Tracking Protocol for Wireless Sensor Networks.
IJDSN, 2013

A Utility-Based Rate Allocation of M2M Service in Heterogeneous Wireless Environments.
IJDSN, 2013

A Guass-Newton-like method for inverse eigenvalue problems.
Int. J. Comput. Math., 2013

On some Ostrowski-like type inequalities involving n knots.
Appl. Math. Lett., 2013

iQueue-MAC: A traffic adaptive duty-cycled MAC protocol with dynamic slot allocation.
Proceedings of the 10th Annual IEEE Communications Society Conference on Sensor, 2013

Barrier Coverage in Hybrid Directional Sensor Networks.
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013

A Method of Alteration Information Extracted of Uranium Mine Base on TM Remote Sensing Image.
Proceedings of the Intelligent Computing Theories - 9th International Conference, 2013

Clustering and power control for reliability improvement in Device-to-Device networks.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2013

2012
Queue-MAC: A queue-length aware hybrid CSMA/TDMA MAC protocol for providing dynamic adaptation to traffic and duty-cycle variation in wireless sensor networks.
Proceedings of the 9th IEEE International Workshop on Factory Communication Systems, 2012

A Novel Real-Time Traffic Information Collection System Based on Smartphone.
Proceedings of the Advances in Wireless Sensor Networks, 2012

2011
HierTrack: an energy efficient target tracking system for wireless sensor networks.
Proceedings of the 9th International Conference on Embedded Networked Sensor Systems, 2011

Friendbook: privacy preserving friend matching based on shared interests.
Proceedings of the 9th International Conference on Embedded Networked Sensor Systems, 2011

Feature referenced tip localization enhanced by probability motion model for AFM based nanomanipulations.
Proceedings of the 2011 IEEE International Conference on Robotics and Biomimetics, 2011

Energy-Efficient Task Scheduling Algorithms with Human Intelligence Based Task Shuffling and Task Relocation.
Proceedings of the 2011 IEEE/ACM International Conference on Green Computing and Communications (GreenCom), 2011

2010
Label-Based DV-Hop Localization Against Wormhole Attacks in Wireless Sensor Networks.
Proceedings of the Fifth International Conference on Networking, Architecture, and Storage, 2010

A Novel Mobility Management Scheme for Target Tracking in Cluster-Based Sensor Networks.
Proceedings of the Distributed Computing in Sensor Systems, 2010

2008
Tracking and Predicting Moving Targets in Hierarchical Sensor Networks.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008


  Loading...