Zhiming Zheng

Orcid: 0000-0002-2727-4445

Affiliations:
  • Beihang University, Beijing, China


According to our database1, Zhiming Zheng authored at least 76 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A survey on federated learning: a perspective from multi-party computation.
Frontiers Comput. Sci., June, 2024

2023
Bidirectional supervision: An effective method to suppress corruption and defection under the third party punishment mechanism of donation games.
Appl. Math. Comput., August, 2023

A novel feed rate scheduling method with acc-jerk-continuity and round-off error elimination for non-uniform rational B-spline interpolation.
J. Comput. Des. Eng., January, 2023

Representation Learning of Enhanced Graphs Using Random Walk Graph Convolutional Network.
ACM Trans. Intell. Syst. Technol., 2023

Anonymous Pattern Molecular Fingerprint and its Applications on Property Identification.
IEEE ACM Trans. Comput. Biol. Bioinform., 2023

Noise improves the association between effects of local stimulation and structural degree of brain networks.
PLoS Comput. Biol., 2023

Nonlinear eco-evolutionary games with global environmental fluctuations and local environmental feedbacks.
PLoS Comput. Biol., 2023

Adaptive trajectory-constrained exploration strategy for deep reinforcement learning.
CoRR, 2023

An Evolution Kernel Method for Graph Classification through Heat Diffusion Dynamics.
CoRR, 2023

Approximate k-Nearest Neighbor Query over Spatial Data Federation.
Proceedings of the Database Systems for Advanced Applications, 2023

2022
Magnifying Side-Channel Leakage of Lattice-Based Cryptosystems With Chosen Ciphertexts: The Case Study of Kyber.
IEEE Trans. Computers, 2022

DAG-Σ: A DAG-based Sigma Protocol for Relations in CNF.
IACR Cryptol. ePrint Arch., 2022

Local-Forest Method for Superspreaders Identification in Online Social Networks.
Entropy, 2022

Parameter Convex Neural Networks.
CoRR, 2022

Scattered Points Interpolation with Globally Smooth B-Spline Surface using Iterative Knot Insertion.
Comput. Aided Des., 2022

Coupling group selection and network reciprocity in social dilemmas through multilayer networks.
Appl. Math. Comput., 2022

A Percolation-Based Secure Routing Protocol for Wireless Sensor Networks.
Proceedings of the IEEE International Conference on Agents, 2022

Reveal the Invisible Secret: Chosen-Ciphertext Side-Channel Attacks on NTRU.
Proceedings of the Smart Card Research and Advanced Applications, 2022

2021
Representation learning of graphs using graph convolutional multilayer networks based on motifs.
Neurocomputing, 2021

A novel feed rate scheduling method based on Sigmoid function with chord error and kinematics constraints.
CoRR, 2021

Research of Damped Newton Stochastic Gradient Descent Method for Neural Network Training.
CoRR, 2021

A novel S-shape based NURBS interpolation with acc-jerk- Continuity and round-off error elimination.
CoRR, 2021

KPI Method for Dynamic Surface Reconstruction With B-splines based on Sparse Data.
CoRR, 2021

Effects of Dynamic-Win-Stay-Lose-Learn model with voluntary participation in social dilemma.
CoRR, 2021

Representation Learning of Reconstructed Graphs Using Random Walk Graph Convolutional Network.
CoRR, 2021

Towards 6G wireless communication networks: vision, enabling technologies, and new paradigm shifts.
Sci. China Inf. Sci., 2021

Fine-Grained Intra-domain Bandwidth Allocation Against DDoS Attack.
Proceedings of the Security and Privacy in Communication Networks, 2021

2020
Dynamic aspiration based on Win-Stay-Lose-Learn rule in Spatial Prisoner's Dilemma Gam.
CoRR, 2020

Community detection based on first passage probabilities.
CoRR, 2020

Complex social contagion induces bistability on multiplex networks.
CoRR, 2020

Public discourse and social network echo chambers driven by socio-cognitive biases.
CoRR, 2020

A fast T-spline fitting method based on efficient region segmentation.
Comput. Appl. Math., 2020

LAMP: disease classification derived from layered assessment on modules and pathways in the human gene network.
BMC Bioinform., 2020

A Physical Process Driven Digital Terrain Model Generating Method Based on D-NURBS.
IEEE Access, 2020

2019
Lattice based signature with outsourced revocation for Multimedia Social Networks in cloud computing.
Multim. Tools Appl., 2019

Identity-based proxy signature over NTRU lattice.
Int. J. Commun. Syst., 2019

Hierarchical Decomposition Mechanism by König-Egérvary Layer-Subgraph with Application on Vertex-Cover.
CoRR, 2019

Homophily on social networks changes evolutionary advantage in competitive information diffusion.
CoRR, 2019

Discriminative Embedding Autoencoder with a Regressor Feedback for Zero-Shot Learning.
CoRR, 2019

2018
High symbol-rate polarization interference cancelation for satellite-to-ground remote sensing data transmission system.
EURASIP J. Wirel. Commun. Netw., 2018

Core Influence Mechanism on Vertex-Cover Problem through Leaf-Removal-Core Breaking.
CoRR, 2018

Infectivity Enhances Prediction of Viral Cascades in Twitter.
CoRR, 2018

Identity Based Privacy Information Sharing with Similarity Test in Cloud Environment.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
An improved biometrics based authentication scheme using extended chaotic maps for multimedia medicine information systems.
Multim. Tools Appl., 2017

An efficient image encryption algorithm based on a novel chaotic map.
Multim. Tools Appl., 2017

An Efficient Chaotic Image Encryption Algorithm Based on Self-adaptive Model and Feedback Mechanism.
KSII Trans. Internet Inf. Syst., 2017

BVDT: A Boosted Vector Decision Tree Algorithm for Multi-Class Classification Problems.
Int. J. Pattern Recognit. Artif. Intell., 2017

Efficient Bloom filter for network protocols using AES instruction set.
IET Commun., 2017

TRIP: A Tussle-Resistant Internet Pricing Mechanism.
IEEE Commun. Lett., 2017

Research on Centralities Based on von Neumann Entropy for Nodes and Motifs.
CoRR, 2017

An Efficient Lattice-Based Proxy Signature with Message Recovery.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

2016
Collusion-resilient broadcast encryption based on dual-evolving one-way function trees.
Secur. Commun. Networks, 2016

Construction of Boolean functions with excellent cryptographic criteria using bivariate polynomial representation.
Int. J. Comput. Math., 2016

DRDP: A DDoS-Resilient Data Pricing Mechanism.
IEEE Commun. Lett., 2016

Tumbler: Adaptable link access in the bots-infested Internet.
Comput. Networks, 2016

Effect analysis of polarization interference on satellite-to-ground remote sensing data transmission.
Proceedings of the 16th International Symposium on Communications and Information Technologies, 2016

2015
Research on Solution Space of Bipartite Graph Vertex-Cover by Maximum Matchings.
CoRR, 2015

Identification of highly susceptible individuals in complex networks.
CoRR, 2015

Detecting the Influence of Spreading in Social Networks with Excitable Sensor Networks.
CoRR, 2015

Exploring the complex pattern of information spreading in online blog communities.
CoRR, 2015

Contagion processes on the static and activity driven coupling networks.
CoRR, 2015

A Secure Authentication and Key Agreement Protocol for Telecare Medicine Information System.
Proceedings of the 9th International Conference on Next Generation Mobile Applications, 2015

Fast LMNN Algorithm through Random Sampling.
Proceedings of the IEEE International Conference on Data Mining Workshop, 2015

2014
Statistics and algorithms on the organization and quantitative analysis of minimal vertex covers.
CoRR, 2014

Searching for superspreaders of information in real-world social media.
CoRR, 2014

2013
Discovering polynomial Lyapunov functions for continuous dynamical systems.
J. Symb. Comput., 2013

2012
Optimized statistical analysis of software trustworthiness attributes.
Sci. China Inf. Sci., 2012

2011
Condition number based complexity estimate for solving polynomial systems.
J. Comput. Appl. Math., 2011

Threshold behaviors of a random constraint satisfaction problem with exact phase transitions.
Inf. Process. Lett., 2011

Algebraic analysis on asymptotic stability of continuous dynamical systems.
Proceedings of the Symbolic and Algebraic Computation, International Symposium, 2011

2009
Dynamical characteristics of software trustworthiness and their evolutionary complexity.
Sci. China Ser. F Inf. Sci., 2009

Complexity of software trustworthiness and its dynamical statistical analysis methods.
Sci. China Ser. F Inf. Sci., 2009

Finite-time disturbance attenuation of nonlinear systems.
Sci. China Ser. F Inf. Sci., 2009

2008
On the Scaling Window of Model RB
CoRR, 2008

Generalized criteria for uniqueness of Gibbs measures.
Proceedings of the 19th International Conference on Pattern Recognition (ICPR 2008), 2008

2007
Editorial.
Math. Comput. Sci., 2007


  Loading...