Zhuo Wei

Orcid: 0000-0001-7595-5379

According to our database1, Zhuo Wei authored at least 38 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Model-Free Approach to Fair Solar PV Curtailment Using Reinforcement Learning.
Proceedings of the 14th ACM International Conference on Future Energy Systems, 2023

2021
Characterizing Residential Load Patterns by Household Demographic and Socioeconomic Factors.
Proceedings of the e-Energy '21: The Twelfth ACM International Conference on Future Energy Systems, Virtual Event, Torino, Italy, 28 June, 2021

2020
DeepPipes: Learning 3D pipelines reconstruction from point clouds.
Graph. Model., 2020

Space efficient revocable IBE for mobile devices in cloud computing.
Sci. China Inf. Sci., 2020

2019
False Load Attack to Smart Meters by Synchronously Switching Power Circuits.
IEEE Trans. Smart Grid, 2019

Situation-Aware Authenticated Video Broadcasting Over Train-Trackside WiFi Networks.
IEEE Internet Things J., 2019

Random Delay Attack and Its Applications on Load Frequency Control of Power Systems.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019

2018
Position Manipulation Attacks to Balise-Based Train Automatic Stop Control.
IEEE Trans. Veh. Technol., 2018

Resonance Attacks on Load Frequency Control of Smart Grids.
IEEE Trans. Smart Grid, 2018

AutoPrivacy: Automatic privacy protection and tagging suggestion for mobile social photo.
Comput. Secur., 2018

AnchorCAN: Anchor-Based Secure CAN Communications System.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

2017
V2X security: A case study of anonymous authentication.
Pervasive Mob. Comput., 2017

HIBS-KSharing: Hierarchical Identity-Based Signature Key Sharing for Automotive.
IEEE Access, 2017

IoVShield: An Efficient Vehicular Intrusion Detection System for Self-driving (Short Paper).
Proceedings of the Information Security Practice and Experience, 2017

Towards Revocable Fine-Grained Encryption of Cloud Data: Reducing Trust upon Cloud.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
Trustworthy Authentication on Scalable Surveillance Video with Background Model Support.
ACM Trans. Multim. Comput. Commun. Appl., 2016

Secure Subway Train-to-Train Communications via GSM-R Communication Systems.
Proceedings of the IEEE 83rd Vehicular Technology Conference, 2016

Authenticated CAN Communications Using Standardized Cryptographic Techniques.
Proceedings of the Information Security Practice and Experience, 2016

How to Make the Cramer-Shoup Cryptosystem Secure Against Linear Related-Key Attacks.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016

Towards Lightweight Anonymous Entity Authentication for IoT Applications.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Multidimensional Context Awareness in Mobile Devices.
Proceedings of the MultiMedia Modeling - 21st International Conference, 2015

Automatic Accident Detection and Alarm System.
Proceedings of the 23rd Annual ACM Conference on Multimedia Conference, MM '15, Brisbane, Australia, October 26, 2015

On Security of Content-Based Video Stream Authentication.
Proceedings of the Computer Security - ESORICS 2015, 2015

2014
A Hybrid Scheme for Authenticating Scalable Video Codestreams.
IEEE Trans. Inf. Forensics Secur., 2014

Efficient block-based transparent encryption for H.264/SVC bitstreams.
Multim. Syst., 2014

GPU-Based MPEG-2 to Secure Scalable Video Transcoding.
Int. J. Digit. Crime Forensics, 2014

Generic attacks on content-based video stream authentication.
Proceedings of the 2013 IEEE International Conference on Multimedia and Expo Workshops, 2014

2013
Attribute-Based Access to Scalable Media in Cloud-Assisted Content Sharing Networks.
IEEE Trans. Multim., 2013

Stereovision based obstacle detection system for unmanned surface vehicle.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2013

Technique for authenticating H.264/SVC streams in surveillance applications.
Proceedings of the 2013 IEEE International Conference on Multimedia and Expo Workshops, 2013

2012
A scalable and format-compliant encryption scheme for H.264/SVC bitstreams.
Signal Process. Image Commun., 2012

Scalable Content Authentication in H.264/SVC Videos Using Perceptual Hashing based on Dempster-Shafer theory.
Int. J. Comput. Intell. Syst., 2012

Improvement in real-time obstacle detection system for USV.
Proceedings of the 12th International Conference on Control Automation Robotics & Vision, 2012

No Tradeoff between Confidentiality and Performance: An Analysis on H.264/SVC Partial Encryption.
Proceedings of the Communications and Multimedia Security, 2012

Price Discovery in Index Futures Market - Based on Common Factor Models.
Proceedings of the Fifth International Conference on Business Intelligence and Financial Engineering, 2012

2011
A vision-based obstacle detection system for Unmanned Surface Vehicle.
Proceedings of the IEEE 5th International Conference on Robotics, 2011

2010
Structure-Based Design of Peptides against G3BP with Cytotoxicity on Tumor Cells.
J. Chem. Inf. Model., 2010

GPU Acceleration of Integer Wavelet Transform for TIFF Image.
Proceedings of the Third International Symposium on Parallel Architectures, 2010


  Loading...