Zhongwen Zhang

According to our database1, Zhongwen Zhang authored at least 22 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Vehicle type classification in intelligent transportation systems using deep learning.
J. Intell. Fuzzy Syst., February, 2024

2023
Prediction using multi-objective slime mould algorithm optimized support vector regression model.
Appl. Soft Comput., September, 2023

Decision model of mine shaft development mode based on ISM-GAHP-FCA.
J. Intell. Fuzzy Syst., 2023

Collision Cross-entropy and EM Algorithm for Self-labeled Classification.
CoRR, 2023

Revisiting Discriminative Entropy Clustering and its relation to K-means.
CoRR, 2023

2021
Confluent Vessel Trees With Accurate Bifurcations.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

2019
Divergence Prior and Vessel-Tree Reconstruction.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019

2018
Divergence Prior and Vessel-tree Reconstruction.
CoRR, 2018

Improved Preamble-Based Symbol Timing Synchronization Schemes for GFDM Systems.
Proceedings of the Communications, Signal Processing, and Systems, 2018

2017
What factors drive open innovation in China's public sector? A case study of official document exchange via microblogging (ODEM) in Haining.
Gov. Inf. Q., 2017

2016
Inferring Disease-Related Domain Using Network-Based Method.
Proceedings of the Intelligent Computing Theories and Application, 2016

2015
How Your Phone Camera Can Be Used to Stealthily Spy on You: Transplantation Attacks against Android Camera Service.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

Hare Hunting in the Wild Android: A Study on the Threat of Hanging Attribute References.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Before Unrooting your Android Phone, Patching up Permission System First!
Proceedings of the Information Security Applications - 15th International Workshop, 2014

Transplantation Attack: Analysis and Prediction.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Once Root Always a Threat: Analyzing the Security Threats of Android Permission System.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014

2013
A Threat to Mobile Cyber-Physical Systems: Sensor-Based Privacy Theft Attacks on Android Smartphones.
Proceedings of the 12th IEEE International Conference on Trust, 2013

The Catalyzing Factors of Official Documents Exchange via Microblogging in Public Sectors: A Case Study based on the T-O-E Framework.
Proceedings of the 17th Pacific Asia Conference on Information Systems, 2013

2012
A Scalable Anonymity Scheme Based on DHT Distributed Inquiry.
Proceedings of the 11th IEEE International Conference on Trust, 2012

MeadDroid: Detecting Monetary Theft Attacks in Android by DVM Monitoring.
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012

2011
Research on numerical analysis for color matching in textile dyeing based on least square Fitting.
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011

Understanding the Impact of Internet Media on Patient-Clinician Trust: Model Development and Research Design.
Proceedings of the International Conference on Information Systems, 2011


  Loading...