Zhibo Wang

According to our database1, Zhibo Wang authored at least 157 papers between 2008 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2021
Nowhere to Hide: Efficiently Identifying Probabilistic Cloning Attacks in Large-Scale RFID Systems.
IEEE Trans. Inf. Forensics Secur., 2021

Second order difference schemes for time-fractional KdV-Burgers' equation with initial singularity.
Appl. Math. Lett., 2021

2020
Towards Demand-Driven Dynamic Incentive for Mobile Crowdsensing Systems.
IEEE Trans. Wirel. Commun., 2020

Cluster-Enabled Cooperative Scheduling Based on Reinforcement Learning for High-Mobility Vehicular Networks.
IEEE Trans. Veh. Technol., 2020

New Emoji Requests from Twitter Users: When, Where, Why, and What We Can Do About Them.
ACM Trans. Soc. Comput., 2020

Single image portrait relighting via explicit multiple reflectance channel modeling.
ACM Trans. Graph., 2020

SmartPI: Understanding Permission Implications of Android Apps from User Reviews.
IEEE Trans. Mob. Comput., 2020

Ranking Station Importance With Human Mobility Patterns Using Subway Network Datasets.
IEEE Trans. Intell. Transp. Syst., 2020

Analyzing User-Level Privacy Attack Against Federated Learning.
IEEE J. Sel. Areas Commun., 2020

Toward Efficient Compressed-Sensing-Based RFID Identification: A Sparsity-Controlled Approach.
IEEE Internet Things J., 2020

SCRA: Structured Compressive Random Access for Efficient Information Collection in IoT.
IEEE Internet Things J., 2020

Optimizing Privacy-Preserving Outsourced Convolutional Neural Network Predictions.
CoRR, 2020

Users' location analysis based on Chinese mobile social media.
Concurr. Comput. Pract. Exp., 2020

Foreword to the special issue of the Intelligent Systems for the Internet of Things (ISIT2017).
Concurr. Comput. Pract. Exp., 2020

Hybrid malware detection approach with feedback-directed machine learning.
Sci. China Inf. Sci., 2020

Towards fair and efficient task allocation in blockchain-based crowdsourcing.
CCF Trans. Netw., 2020

Network-based multi-task learning models for biomarker selection and cancer outcome prediction.
Bioinform., 2020

PWEND: Proactive wakeup based energy-efficient neighbor discovery for mobile sensor networks.
Ad Hoc Networks, 2020

Towards compression-resistant privacy-preserving photo sharing on social networks.
Proceedings of the Mobihoc '20: The Twenty-first ACM International Symposium on Theory, 2020

A Swarm Enhanced Light Gradient Boosting Machine for Crowdfunding Project Outcome Prediction.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020

Towards Pattern-aware Privacy-preserving Real-time Data Collection.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Towards Personalized Privacy-Preserving Incentive for Truth Discovery in Crowdsourced Binary-Choice Question Answering.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Joint Deep Recurrent Network Embedding and Edge Flow Estimation.
Proceedings of the Intelligent Computing Methodologies - 16th International Conference, 2020

Self-supervised Visual Feature Learning and Classification Framework: Based on Contrastive Learning.
Proceedings of the 16th International Conference on Control, 2020

Attention-over-Attention Field-Aware Factorization Machine.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
Privacy-Preserving Crowd-Sourced Statistical Data Publishing with An Untrusted Server.
IEEE Trans. Mob. Comput., 2019

Personalized Privacy-Preserving Task Allocation for Mobile Crowdsensing.
IEEE Trans. Mob. Comput., 2019

A 3.77TOPS/W Convolutional Neural Network Processor With Priority-Driven Kernel Optimization.
IEEE Trans. Circuits Syst. II Express Briefs, 2019

A 2.2-GHz Configurable Direct Digital Frequency Synthesizer Based on LUT and Rotation.
IEEE Trans. Circuits Syst. I Regul. Pap., 2019

A 130-nm Ferroelectric Nonvolatile System-on-Chip With Direct Peripheral Restore Architecture for Transient Computing System.
IEEE J. Solid State Circuits, 2019

RMTS: A robust clock synchronization scheme for wireless sensor networks.
J. Netw. Comput. Appl., 2019

AirMouse: Turning a Pair of Glasses Into a Mouse in the Air.
IEEE Internet Things J., 2019

PRSS: A Prejudiced Random Sensing Strategy for Energy-Efficient Information Collection in the Internet of Things.
IEEE Internet Things J., 2019

Simultaneous Sensor Placement and Scheduling for Fusion-Based Detection in RF-Powered Sensor Networks.
IEEE Internet Things J., 2019

EveDroid: Event-Aware Android Malware Detection Against Model Degrading for IoT Devices.
IEEE Internet Things J., 2019

Unsupervised Visual Representation Learning with Increasing Object Shape Bias.
CoRR, 2019

Augmenting Encrypted Search: A Decentralized Service Realization with Enforced Execution.
CoRR, 2019

When Mobile Crowdsensing Meets Privacy.
IEEE Commun. Mag., 2019

Task-Bundling-Based Incentive for Location-Dependent Mobile Crowdsourcing.
IEEE Commun. Mag., 2019

An ADI difference scheme based on fractional trapezoidal rule for fractional integro-differential equation with a weakly singular kernel.
Appl. Math. Comput., 2019

The World Wants Mangoes and Kangaroos: A Study of New Emoji Requests Based on Thirty Million Tweets.
Proceedings of the World Wide Web Conference, 2019

A 65nm 0.39-to-140.3TOPS/W 1-to-12b Unified Neural Network Processor Using Block-Circulant-Enabled Transpose-Domain Acceleration with 8.1 × Higher TOPS/mm<sup>2</sup>and 6T HBST-TRAM-Based 2D Data-Reuse Architecture.
Proceedings of the IEEE International Solid- State Circuits Conference, 2019

Beyond Inferring Class Representatives: User-Level Privacy Leakage From Federated Learning.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Towards Privacy-preserving Incentive for Mobile Crowdsensing Under An Untrusted Platform.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

advPattern: Physical-World Attacks on Deep Person Re-Identification via Adversarially Transformable Patterns.
Proceedings of the 2019 IEEE/CVF International Conference on Computer Vision, 2019

PrivStream: Enabling Privacy-Preserving Inferences on IoT Data Stream at the Edge.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

Unsupervised Fact-finding with Multi-modal Data in Social Sensing.
Proceedings of the 22th International Conference on Information Fusion, 2019

A Sparse-Adaptive CNN Processor with Area/Performance balanced N-Way Set-Associate PE Arrays Assisted by a Collision-Aware Scheduler.
Proceedings of the IEEE Asian Solid-State Circuits Conference, 2019

AERIS: area/energy-efficient 1T2R ReRAM based processing-in-memory neural network system-on-a-chip.
Proceedings of the 24th Asia and South Pacific Design Automation Conference, 2019

2018
Niffler: A Context-Aware and User-Independent Side-Channel Attack System for Password Inference.
Wirel. Commun. Mob. Comput., 2018

Enabling Online Robust Barcode-Based Visible Light Communication With Realtime Feedback.
IEEE Trans. Wirel. Commun., 2018

Approximate and Sublinear Spatial Queries for Large-Scale Vehicle Networks.
IEEE Trans. Veh. Technol., 2018

Charging While Moving: Deploying Wireless Chargers for Powering Wearable Devices.
IEEE Trans. Veh. Technol., 2018

MAC: Missing Tag Iceberg Queries for Multi-Category RFID Systems.
IEEE Trans. Veh. Technol., 2018

On Achieving Asynchronous Energy-Efficient Neighbor Discovery for Mobile Sensor Networks.
IEEE Trans. Emerg. Top. Comput., 2018

Real-Time and Spatio-Temporal Crowd-Sourced Social Network Data Publishing with Differential Privacy.
IEEE Trans. Dependable Secur. Comput., 2018

Projective synchronization in fixed time for complex dynamical networks with nonidentical nodes via second-order sliding mode control strategy.
J. Frankl. Inst., 2018

Personalized Recommendation Algorithm Based on Product Reviews.
J. Electron. Commer. Organ., 2018

Narrowband Internet of Things Systems With Opportunistic D2D Communication.
IEEE Internet Things J., 2018

Efficiently and Completely Identifying Missing Key Tags for Anonymous RFID Systems.
IEEE Internet Things J., 2018

Heterogeneous incentive mechanism for time-sensitive and location-dependent crowdsensing networks with random arrivals.
Comput. Networks, 2018

Exploring Human Mobility Patterns in Urban Scenarios: A Trajectory Data Perspective.
IEEE Commun. Mag., 2018

A Social Utility-Based Dissemination Scheme for Emergency Warning Messages in Vehicular Social Networks.
Comput. J., 2018

Be Stable and Fair: Robust Data Scheduling for Vehicular Networks.
IEEE Access, 2018

Sparsest Random Sampling for Cluster-Based Compressive Data Gathering in Wireless Sensor Networks.
IEEE Access, 2018

Sticker: A 0.41-62.1 TOPS/W 8Bit Neural Network Processor with Multi-Sparsity Compatible Convolution Arrays and Online Tuning Acceleration for Fully Connected Layers.
Proceedings of the 2018 IEEE Symposium on VLSI Circuits, 2018

A 2-GHz Direct Digital Frequency Synthesizer Based on LUT and Rotation.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2018

Deep User Modeling for Content-based Event Recommendation in Event-based Social Networks.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Pay On-Demand: Dynamic Incentive and Task Selection for Location-Dependent Mobile Crowdsensing Systems.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018

PatternListener: Cracking Android Pattern Lock Using Acoustic Signals.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

NEOFog: Nonvolatility-Exploiting Optimizations for Fog Computing.
Proceedings of the Twenty-Third International Conference on Architectural Support for Programming Languages and Operating Systems, 2018

Dante: Enabling FOV-Aware Adaptive FEC Coding for 360-Degree Video Streaming.
Proceedings of the 2nd Asia-Pacific Workshop on Networking, 2018

2017
Probabilistic Detection of Missing Tags for Anonymous Multicategory RFID Systems.
IEEE Trans. Veh. Technol., 2017

Efficient 3-dimensional localization for RFID systems using jumping probe.
Pervasive Mob. Comput., 2017

A 65-nm ReRAM-Enabled Nonvolatile Processor With Time-Space Domain Adaption and Self-Write-Termination Achieving > 4× Faster Clock Frequency and > 6× Higher Restore Speed.
IEEE J. Solid State Circuits, 2017

A ReRAM-Based Nonvolatile Flip-Flop With Self-Write-Termination Scheme for Frequent-OFF Fast-Wake-Up Nonvolatile Processors.
IEEE J. Solid State Circuits, 2017

Efficient and Reliable Missing Tag Identification for Large-Scale RFID Systems With Unknown Tags.
IEEE Internet Things J., 2017

Mitigating Link-flooding Attacks With Active Link Obfuscation.
CoRR, 2017

Achieving location error tolerant barrier coverage for wireless sensor networks.
Comput. Networks, 2017

Cost-effective barrier coverage formation in heterogeneous wireless sensor networks.
Ad Hoc Networks, 2017

Approximate Cardinality Estimation (ACE) in large-scale Internet of Things deployments.
Ad Hoc Networks, 2017

Extracting Depression Symptoms from Social Networks and Web Blogs via Text Mining.
Proceedings of the Bioinformatics Research and Applications - 13th International Symposium, 2017

A Hybrid Machine Learning Method for Finding Depression Related Publications by Eliminating Outlier Publications.
Proceedings of the 2017 IEEE International Conference on Information Reuse and Integration, 2017

Exploiting social influence for context-aware event recommendation in event-based social networks.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

2016
A Secure Credit-Based Incentive Mechanism for Message Forwarding in Noncooperative DTNs.
IEEE Trans. Veh. Technol., 2016

A Traffic Adaptive Multi-Channel MAC Protocol with Dynamic Slot Allocation for WSNs.
IEEE Trans. Mob. Comput., 2016

A Compact Difference Scheme for Fractional Sub-diffusion Equations with the Spatially Variable Coefficient Under Neumann Boundary Conditions.
J. Sci. Comput., 2016

Finite difference schemes for two-dimensional time-space fractional differential equations.
Int. J. Comput. Math., 2016

Fully discrete local discontinuous Galerkin methods for some time-fractional fourth-order problems.
Int. J. Comput. Math., 2016

A survey on barrier coverage with sensors.
Frontiers Comput. Sci., 2016

A hybrid model of sentimental entity recognition on mobile social media.
EURASIP J. Wirel. Commun. Netw., 2016

A compact difference scheme for a two dimensional nonlinear fractional Klein-Gordon equation in polar coordinates.
Comput. Math. Appl., 2016

Design of nonvolatile processors and applications.
Proceedings of the 2016 IFIP/IEEE International Conference on Very Large Scale Integration, 2016

SecWeb: Privacy-Preserving Web Browsing Monitoring with w-Event Differential Privacy.
Proceedings of the Security and Privacy in Communication Networks, 2016

A compare-and-select error tolerant scheme for nonvolatile processors.
Proceedings of the IEEE/ACM International Symposium on Nanoscale Architectures, 2016

4.7 A 65nm ReRAM-enabled nonvolatile processor with 6× reduction in restore time and 4× higher clock frequency using adaptive data retention and self-write-termination nonvolatile logic.
Proceedings of the 2016 IEEE International Solid-State Circuits Conference, 2016

RescueDP: Real-time spatio-temporal crowd-sourced data publishing with differential privacy.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Catch me in the dark: Effective privacy-preserving outsourcing of feature extractions over image data.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Outsourcing Large-Scale Systems of Linear Matrix Equations in Cloud Computing.
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016

A Hybrid Document Feature Extraction Method Using Latent Dirichlet Allocation and Word2Vec.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016

A Text Information Retrieval Method by Integrating Global and Local Textual Information.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

A novel method for document summarization using Word2Vec.
Proceedings of the 15th IEEE International Conference on Cognitive Informatics & Cognitive Computing , 2016

2015
Friendbook: A Semantic-Based Friend Recommendation System for Social Networks.
IEEE Trans. Mob. Comput., 2015

Chinese social media analysis for disease surveillance.
Pers. Ubiquitous Comput., 2015

Securing DV-Hop localization against wormhole attacks in wireless sensor networks.
Pervasive Mob. Comput., 2015

End-to-end delay analysis for networked systems.
Frontiers Inf. Technol. Electron. Eng., 2015

pQueue-MAC: An Energy Efficient Hybrid MAC Protocol for Event-Driven Sensor Networks.
Int. J. Distributed Sens. Networks, 2015

Fault Tolerant Line-Based Barrier Coverage Formation in Mobile Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2015

Spatiotemporal Correlation Based Fault-Tolerant Event Detection in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2015

Frequency resource allocation strategy with QoS support in hybrid cellular and Device-to-Device networks.
Int. J. Commun. Syst., 2015

A high-order ADI scheme for the two-dimensional time fractional diffusion-wave equation.
Int. J. Comput. Math., 2015

Multistage Function Speculation Adders.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

A high order compact finite difference scheme for time fractional Fokker-Planck equations.
Appl. Math. Lett., 2015

Design exploration of inrush current aware controller for nonvolatile processor.
Proceedings of the IEEE Non-Volatile Memory System and Applications Symposium, 2015

An energy-efficient heterogeneous dual-core processor for Internet of Things.
Proceedings of the 2015 IEEE International Symposium on Circuits and Systems, 2015

User's Interests-Based Movie Recommendation in Heterogeneous Network.
Proceedings of the International Conference on Identification, 2015

Exploiting Feature Selection Algorithm on Group Events Data Based on News Data.
Proceedings of the International Conference on Identification, 2015

Rain Bar: Robust Application-Driven Visual Communication Using Color Barcodes.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

Assessment of Spatio-Temporal Vegetation Productivity Pattern Based on MODIS-NDVI and Geo-Correlation Analysis.
Proceedings of the Geo-Informatics in Resource Management and Sustainable Ecosystem, 2015

The Design and Implementation of Geographic Information Storage System Based on the Cloud Platform.
Proceedings of the Geo-Informatics in Resource Management and Sustainable Ecosystem, 2015

Parallelization of the Kriging Algorithm in Stochastic Simulation with GPU Accelerators.
Proceedings of the Geo-Informatics in Resource Management and Sustainable Ecosystem, 2015

CloudBI: Practical Privacy-Preserving Outsourcing of Biometric Identification in the Cloud.
Proceedings of the Computer Security - ESORICS 2015, 2015

Walls Have Ears! Opportunistically Communicating Secret Messages Over the Wiretap Channel: from Theory to Practice.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Key Technology Research on User Identity Resolution across Multi-social Media.
Proceedings of the International Conference on Cloud Computing and Big Data, 2015

A Data Collection and Analysis System for Mobile Group Marketing.
Proceedings of the International Conference on Cloud Computing and Big Data, 2015

2014
Optimal Load Balancing and Energy Cost Management for Internet Data Centers in Deregulated Electricity Markets.
IEEE Trans. Parallel Distributed Syst., 2014

Achieving k-Barrier Coverage in Hybrid Directional Sensor Networks.
IEEE Trans. Mob. Comput., 2014

Applying biometrics to design three-factor remote user authentication scheme with key agreement.
Secur. Commun. Networks, 2014

Reliability Improvement Using Power Control in Device-to-Device Networks.
J. Networks, 2014

Compact difference schemes for the modified anomalous fractional sub-diffusion equation and the fractional diffusion-wave equation.
J. Comput. Phys., 2014

A compact difference scheme for a two dimensional fractional Klein-Gordon equation with Neumann boundary conditions.
J. Comput. Phys., 2014

Mobile Beacon Based Wormhole Attackers Detection and Positioning in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2014

A high-order exponential ADI scheme for two dimensional time fractional convection-diffusion equations.
Comput. Math. Appl., 2014

On some generalizations of an Ostrowski-Grüss type integral inequality.
Appl. Math. Comput., 2014

Intra-Cluster Device-to-Device Multicast Algorithm Based on Small World Model.
Proceedings of the IEEE 80th Vehicular Technology Conference, 2014

Resource Allocation for Intra-Cluster D2D Communications Based on Kuhn-Munkres Algorithm.
Proceedings of the IEEE 80th Vehicular Technology Conference, 2014

Fault tolerant barrier coverage for wireless sensor networks.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Towards approximate spatial queries for large-scale vehicle networks.
Proceedings of the 22nd ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, 2014

Device-to-device resource allocation for QoS support using a graphic theory.
Proceedings of the 11th IEEE Consumer Communications and Networking Conference, 2014

2013
HierTrack: an energy-efficient cluster-based target tracking system forwireless sensor networks.
J. Zhejiang Univ. Sci. C, 2013

A Hybrid Cluster-Based Target Tracking Protocol for Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2013

A Utility-Based Rate Allocation of M2M Service in Heterogeneous Wireless Environments.
Int. J. Distributed Sens. Networks, 2013

A Guass-Newton-like method for inverse eigenvalue problems.
Int. J. Comput. Math., 2013

On some Ostrowski-like type inequalities involving <i>n</i> knots.
Appl. Math. Lett., 2013

iQueue-MAC: A traffic adaptive duty-cycled MAC protocol with dynamic slot allocation.
Proceedings of the 10th Annual IEEE Communications Society Conference on Sensor, 2013

Barrier Coverage in Hybrid Directional Sensor Networks.
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013

A Method of Alteration Information Extracted of Uranium Mine Base on TM Remote Sensing Image.
Proceedings of the Intelligent Computing Theories - 9th International Conference, 2013

Clustering and power control for reliability improvement in Device-to-Device networks.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2013

2012
Queue-MAC: A queue-length aware hybrid CSMA/TDMA MAC protocol for providing dynamic adaptation to traffic and duty-cycle variation in wireless sensor networks.
Proceedings of the 9th IEEE International Workshop on Factory Communication Systems, 2012

A Novel Real-Time Traffic Information Collection System Based on Smartphone.
Proceedings of the Advances in Wireless Sensor Networks, 2012

2011
HierTrack: an energy efficient target tracking system for wireless sensor networks.
Proceedings of the 9th International Conference on Embedded Networked Sensor Systems, 2011

Friendbook: privacy preserving friend matching based on shared interests.
Proceedings of the 9th International Conference on Embedded Networked Sensor Systems, 2011

Feature referenced tip localization enhanced by probability motion model for AFM based nanomanipulations.
Proceedings of the 2011 IEEE International Conference on Robotics and Biomimetics, 2011

Energy-Efficient Task Scheduling Algorithms with Human Intelligence Based Task Shuffling and Task Relocation.
Proceedings of the 2011 IEEE/ACM International Conference on Green Computing and Communications (GreenCom), 2011

2010
Label-Based DV-Hop Localization Against Wormhole Attacks in Wireless Sensor Networks.
Proceedings of the Fifth International Conference on Networking, Architecture, and Storage, 2010

A Novel Mobility Management Scheme for Target Tracking in Cluster-Based Sensor Networks.
Proceedings of the Distributed Computing in Sensor Systems, 2010

2008
Tracking and Predicting Moving Targets in Hierarchical Sensor Networks.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008


  Loading...