Zhiwei Zhang

Orcid: 0000-0001-6455-6866

Affiliations:
  • Xidian University, School of Computer Science and Technology, State Key Laboratory of Integrated Service Networks, Xi'an, China


According to our database1, Zhiwei Zhang authored at least 36 papers between 2011 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
SLD-Spec: Enhancement LLM-assisted Specification Generation for Complex Loop Functions via Program Slicing and Logical Deletion.
CoRR, September, 2025

Enhancing Secrecy Energy Efficiency in THz MIMO Two-Way Relay Systems With SWIPT and Precoding.
IEEE Trans. Wirel. Commun., August, 2025

Joint RIS and Beamforming Design for Secure and Energy-Efficient Two-Way Relay Communications.
IEEE Trans. Mob. Comput., August, 2025

Effectively Detecting Software Vulnerabilities via Leveraging Features on Program Slices.
IEEE Internet Things J., April, 2025

2024
A Dynamic Task Offloading Scheme Based on Location Forecasting for Mobile Intelligent Vehicles.
IEEE Trans. Veh. Technol., June, 2024

LiTelFuzz : Swarms Fuzzing Based on Linear Temporal Logic Constraints.
CoRR, 2024

Detecting Vulnerabilities via Explicitly Leveraging Vulnerability Features on Program Slices.
Proceedings of the Theoretical Aspects of Software Engineering, 2024

Continuous Smartphone User Authentication Based on Gesture-Sensor Fusion.
Proceedings of the International Conference on Networking and Network Applications, 2024

A Real-time APT Attack Detection Scheme Based on Fusion Provenance Graph in Private Clouds.
Proceedings of the International Conference on Networking and Network Applications, 2024

Multidimensional Intrinsic Identity Construction and Dynamic Seamless Authentication Schemes in IoT Environments.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2024

2023
Private Inference for Deep Neural Networks: A Secure, Adaptive, and Efficient Realization.
IEEE Trans. Computers, December, 2023

Manto: A Practical and Secure Inference Service of Convolutional Neural Networks for IoT.
IEEE Internet Things J., August, 2023

FedProc: Prototypical contrastive federated learning on non-IID data.
Future Gener. Comput. Syst., June, 2023

Joint Controller Placement and Control-Service Connection in Hybrid-Band Control.
IEEE Trans. Cloud Comput., 2023

A Real-Time Attack Detection Scheme Based on Multi-Source Information with False Flag Data.
Proceedings of the International Conference on Networking and Network Applications, 2023

Failure-Aware Service Request Protection in LEO Satellite Constellation Networks.
Proceedings of the International Conference on Networking and Network Applications, 2023

On the Security of a Cloud Auditing Storage Protocol.
Proceedings of the Advances in Intelligent Networking and Collaborative Systems, 2023

Blockchain-Based Identity Authentication Oriented to Multi-Cluster UAV Networking.
Proceedings of the IEEE International Conference on Blockchain, 2023

2022
A blockchain-driven data exchange model in multi-domain IoT with controllability and parallelity.
Future Gener. Comput. Syst., 2022

Feature Matching for Indoor-Oriented Visual Odometry.
Proceedings of the International Conference on Networking and Network Applications, 2022

Class Continuous LOD Algorithm for Lightweight WebGL Rendering Optimization.
Proceedings of the International Conference on Networking and Network Applications, 2022

Visualizable Malware Detection based on Multi-dimension Dynamic Behaviors.
Proceedings of the International Conference on Networking and Network Applications, 2022

Hey! You Photographed My Screen without Approved: A Practical Screen Content Protection Scheme Based on Visual Cryptography.
Proceedings of the International Conference on Networking and Network Applications, 2022

Lightweight and Efficient Distributed Cooperative Intrusion Detection System for Intelligent Swarms.
Proceedings of the International Conference on Networking and Network Applications, 2022

2021
Wiretapping or Jamming: On Eavesdropper Attacking Strategy in mmWave Ad Hoc Networks.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021

You Can See, But You Cannot Photograph: An Intelligent Content Protection Scheme for Videos on Screens.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021

Blockchain Based Unified Authentication with Zero-knowledge Proof in Heterogeneous MEC.
Proceedings of the IEEE International Conference on Communications Workshops, 2021

2020
SLDS: Secure and location-sensitive data sharing scheme for cloud-assisted Cyber-Physical Systems.
Future Gener. Comput. Syst., 2020

2019
HVDB: a hierarchical verifiable database scheme with scalable updates.
J. Ambient Intell. Humaniz. Comput., 2019

New efficient constructions of verifiable data streaming with accountability.
Ann. des Télécommunications, 2019

2018
An Almost Non-interactive Order Preserving Encryption Scheme.
Proceedings of the Information Security Practice and Experience, 2018

An Associated Deletion Scheme for Multi-copy in Cloud Storage.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

2017
A Hierarchical VDB Scheme with Scalable Verification and Tampered Record Localization.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

2016
Location-Sensitive Data Sharing in Mobile Cloud Computing.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

2012
The multimedia service session handoff method in heterogeneous wireless networks.
Int. J. Grid Util. Comput., 2012

2011
MS2HM: A Multimedia Service Session Handoff Method between Heterogeneous Wireless Networks.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011


  Loading...