Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Penghui Zhang
@article{DBLP:journals/appml/ZhangH24, author = {Penghui Zhang and Zhiqing Han}, title = {Normalized ground states for Schr{\"{o}}dinger system with a coupled critical nonlinearity}, journal = {Appl. Math. Lett.}, volume = {150}, pages = {108947}, year = {2024}, url = {https://doi.org/10.1016/j.aml.2023.108947}, doi = {10.1016/J.AML.2023.108947}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/appml/ZhangH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/SiWWGZ24, author = {Lei Si and Zhongbin Wang and Dong Wei and Jinheng Gu and Penghui Zhang}, title = {Fusion Positioning of Mobile Equipment in Underground Coal Mine Based on Redundant IMUs and {UWB}}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {20}, number = {4}, pages = {5946--5958}, year = {2024}, url = {https://doi.org/10.1109/TII.2023.3342427}, doi = {10.1109/TII.2023.3342427}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tii/SiWWGZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/npl/YangZLJY23, author = {Peng Yang and Penghui Zhang and Bing Li and Shunhang Ji and Meng Yi}, title = {Aspect-Based Sentiment Analysis Using Adversarial {BERT} with Capsule Networks}, journal = {Neural Process. Lett.}, volume = {55}, number = {6}, pages = {8041--8058}, year = {2023}, url = {https://doi.org/10.1007/s11063-023-11296-z}, doi = {10.1007/S11063-023-11296-Z}, timestamp = {Fri, 10 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/npl/YangZLJY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tois/LiYZZL23, author = {Bing Li and Peng Yang and Hanlin Zhao and Penghui Zhang and Zijian Liu}, title = {Hierarchical Sliding Inference Generator for Question-driven Abstractive Answer Summarization}, journal = {{ACM} Trans. Inf. Syst.}, volume = {41}, number = {1}, pages = {7:1--7:27}, year = {2023}, url = {https://doi.org/10.1145/3511891}, doi = {10.1145/3511891}, timestamp = {Fri, 31 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tois/LiYZZL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/ZengWZCYWL23, author = {Cheng Zeng and Jun{-}Bo Wang and Penghui Zhang and Yijian Chen and Hongkang Yu and Gang Wang and Min Lin}, title = {Joint Beamforming and Rate Splitting Scheme Design for Overloaded Industrial Private Networks}, booktitle = {{IEEE} International Conference on Communications, {ICC} 2023 - Workshops, Rome, Italy, May 28 - June 1, 2023}, pages = {813--818}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICCWorkshops57953.2023.10283803}, doi = {10.1109/ICCWORKSHOPS57953.2023.10283803}, timestamp = {Thu, 02 Nov 2023 17:09:45 +0100}, biburl = {https://dblp.org/rec/conf/icc/ZengWZCYWL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-19331, author = {Penghui Zhang and Hua Zhang and Yibo Pi and Zijian Cao and Jingyu Wang and Jianxin Liao}, title = {AdapINT: {A} Flexible and Adaptive In-Band Network Telemetry System Based on Deep Reinforcement Learning}, journal = {CoRR}, volume = {abs/2310.19331}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.19331}, doi = {10.48550/ARXIV.2310.19331}, eprinttype = {arXiv}, eprint = {2310.19331}, timestamp = {Fri, 17 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-19331.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/ZhangOCSJWSKBWS22, author = {Penghui Zhang and Adam Oest and Haehyun Cho and Zhibo Sun and RC Johnson and Brad Wardman and Shaown Sarker and Alexandros Kapravelos and Tiffany Bao and Ruoyu Wang and Yan Shoshitaishvili and Adam Doup{\'{e}} and Gail{-}Joon Ahn}, title = {CrawlPhish: Large-Scale Analysis of Client-Side Cloaking Techniques in Phishing}, journal = {{IEEE} Secur. Priv.}, volume = {20}, number = {2}, pages = {10--21}, year = {2022}, url = {https://doi.org/10.1109/MSEC.2021.3129992}, doi = {10.1109/MSEC.2021.3129992}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/ZhangOCSJWSKBWS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/npl/YangLLZ22, author = {Peng Yang and Zijian Liu and Bing Li and Penghui Zhang}, title = {Implicit Relation Inference with Deep Path Extraction for Commonsense Question Answering}, journal = {Neural Process. Lett.}, volume = {54}, number = {6}, pages = {4751--4768}, year = {2022}, url = {https://doi.org/10.1007/s11063-022-10831-8}, doi = {10.1007/S11063-022-10831-8}, timestamp = {Thu, 10 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/npl/YangLLZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangSKBBCO0BSA22, author = {Penghui Zhang and Zhibo Sun and Sukwha Kyung and Hans Walter Behrens and Zion Leonahenahe Basque and Haehyun Cho and Adam Oest and Ruoyu Wang and Tiffany Bao and Yan Shoshitaishvili and Gail{-}Joon Ahn and Adam Doup{\'{e}}}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {I'm SPARTACUS, No, I'm {SPARTACUS:} Proactively Protecting Users from Phishing by Intentionally Triggering Cloaking Behavior}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {3165--3179}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3559334}, doi = {10.1145/3548606.3559334}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhangSKBBCO0BSA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/ZengWDZ0022, author = {Cheng Zeng and Jun{-}Bo Wang and Changfeng Ding and Penghui Zhang and Hua Zhang and Min Lin}, title = {Joint Optimization of Trajectory and Beamforming for USV-Assisted Maritime Wireless Network Coexisting With Satellite Network}, booktitle = {{IEEE} International Conference on Communications, {ICC} 2022, Seoul, Korea, May 16-20, 2022}, pages = {1865--1870}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICC45855.2022.9839239}, doi = {10.1109/ICC45855.2022.9839239}, timestamp = {Thu, 22 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/ZengWDZ0022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pricai/ZhangXZ22, author = {Penghui Zhang and Guanming Xiong and Wen Zhao}, editor = {Fenrong Liu and Arun Anand Sadanandan and Duc Nghia Pham and Petrus Mursanto and Dickson Lukose}, title = {{CSS:} Contrastive Span Selector for Multi-span Question Answering}, booktitle = {{PRICAI} 2023: Trends in Artificial Intelligence - 20th Pacific Rim International Conference on Artificial Intelligence, {PRICAI} 2023, Jakarta, Indonesia, November 15-19, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14325}, pages = {225--236}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-99-7019-3\_22}, doi = {10.1007/978-981-99-7019-3\_22}, timestamp = {Fri, 17 Nov 2023 16:25:43 +0100}, biburl = {https://dblp.org/rec/conf/pricai/ZhangXZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wasa/ZhangHWZLWYZJXW22, author = {Lingyu Zhang and Zhijie He and Xiao Wang and Ying Zhang and Jian Liang and Guobin Wu and Ziqiang Yu and Penghui Zhang and Minghao Ji and Pengfei Xu and Yunhai Wang}, editor = {Lei Wang and Michael Segal and Jenhui Chen and Tie Qiu}, title = {Pick-Up Point Recommendation Using Users' Historical Ride-Hailing Orders}, booktitle = {Wireless Algorithms, Systems, and Applications - 17th International Conference, {WASA} 2022, Dalian, China, November 24-26, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13472}, pages = {393--405}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-19214-2\_33}, doi = {10.1007/978-3-031-19214-2\_33}, timestamp = {Fri, 18 Nov 2022 20:51:16 +0100}, biburl = {https://dblp.org/rec/conf/wasa/ZhangHWZLWYZJXW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wasa/ZhangHWZLWYZJXW22a, author = {Lingyu Zhang and Zhijie He and Xiao Wang and Ying Zhang and Jian Liang and Guobin Wu and Ziqiang Yu and Penghui Zhang and Minghao Ji and Pengfei Xu and Yunhai Wang}, editor = {Lei Wang and Michael Segal and Jenhui Chen and Tie Qiu}, title = {Users' Departure Time Prediction Based on Light Gradient Boosting Decision Tree}, booktitle = {Wireless Algorithms, Systems, and Applications - 17th International Conference, {WASA} 2022, Dalian, China, November 24-26, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13472}, pages = {595--605}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-19214-2\_50}, doi = {10.1007/978-3-031-19214-2\_50}, timestamp = {Fri, 18 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wasa/ZhangHWZLWYZJXW22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ZhangOCSJWSKBWS21, author = {Penghui Zhang and Adam Oest and Haehyun Cho and Zhibo Sun and RC Johnson and Brad Wardman and Shaown Sarker and Alexandros Kapravelos and Tiffany Bao and Ruoyu Wang and Yan Shoshitaishvili and Adam Doup{\'{e}} and Gail{-}Joon Ahn}, title = {CrawlPhish: Large-scale Analysis of Client-side Cloaking Techniques in Phishing}, booktitle = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco, CA, USA, 24-27 May 2021}, pages = {1109--1124}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SP40001.2021.00021}, doi = {10.1109/SP40001.2021.00021}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/ZhangOCSJWSKBWS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/SunOZRB00SDA21, author = {Zhibo Sun and Adam Oest and Penghui Zhang and Carlos E. Rubio{-}Medrano and Tiffany Bao and Ruoyu Wang and Ziming Zhao and Yan Shoshitaishvili and Adam Doup{\'{e}} and Gail{-}Joon Ahn}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Having Your Cake and Eating It: An Analysis of Concession-Abuse-as-a-Service}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {4169--4186}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/sun-zhibo}, timestamp = {Mon, 20 Nov 2023 08:57:49 +0100}, biburl = {https://dblp.org/rec/conf/uss/SunOZRB00SDA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-12843, author = {Marzieh Bitaab and Haehyun Cho and Adam Oest and Penghui Zhang and Zhibo Sun and Rana Pourmohamad and Doowon Kim and Tiffany Bao and Ruoyu Wang and Yan Shoshitaishvili and Adam Doup{\'{e}} and Gail{-}Joon Ahn}, title = {Scam Pandemic: How Attackers Exploit Public Fear through Phishing}, journal = {CoRR}, volume = {abs/2103.12843}, year = {2021}, url = {https://arxiv.org/abs/2103.12843}, eprinttype = {arXiv}, eprint = {2103.12843}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-12843.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/BitaabCOZSPKBWS20, author = {Marzieh Bitaab and Haehyun Cho and Adam Oest and Penghui Zhang and Zhibo Sun and Rana Pourmohamad and Doowon Kim and Tiffany Bao and Ruoyu Wang and Yan Shoshitaishvili and Adam Doup{\'{e}} and Gail{-}Joon Ahn}, title = {Scam Pandemic: How Attackers Exploit Public Fear through Phishing}, booktitle = {{APWG} Symposium on Electronic Crime Research, eCrime 2020, Boston, MA, USA, November 16-19, 2020}, pages = {1--10}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/eCrime51433.2020.9493260}, doi = {10.1109/ECRIME51433.2020.9493260}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecrime/BitaabCOZSPKBWS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/OestZWNBZTDA20, author = {Adam Oest and Penghui Zhang and Brad Wardman and Eric Nunes and Jakub Burgis and Ali Zand and Kurt Thomas and Adam Doup{\'{e}} and Gail{-}Joon Ahn}, editor = {Srdjan Capkun and Franziska Roesner}, title = {Sunrise to Sunset: Analyzing the End-to-end Life Cycle and Effectiveness of Phishing Attacks at Scale}, booktitle = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14, 2020}, pages = {361--377}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/usenixsecurity20/presentation/oest-sunrise}, timestamp = {Fri, 29 Jan 2021 22:08:55 +0100}, biburl = {https://dblp.org/rec/conf/uss/OestZWNBZTDA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/OestSZWTSD20, author = {Adam Oest and Yeganeh Safaei and Penghui Zhang and Brad Wardman and Kevin Tyers and Yan Shoshitaishvili and Adam Doup{\'{e}}}, editor = {Srdjan Capkun and Franziska Roesner}, title = {PhishTime: Continuous Longitudinal Measurement of the Effectiveness of Anti-phishing Blacklists}, booktitle = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14, 2020}, pages = {379--396}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/usenixsecurity20/presentation/oest-phishtime}, timestamp = {Fri, 29 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/OestSZWTSD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccais/ZhangLY19, author = {Penghui Zhang and Wujun Li and Xiaobo Yang}, title = {Efficient Implementation of Recursive Multi-Frame Track-Before-Detect Algorithm Based on {FPGA}}, booktitle = {2019 International Conference on Control, Automation and Information Sciences (ICCAIS), Chengdu, China, October 23-26, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICCAIS46528.2019.9074544}, doi = {10.1109/ICCAIS46528.2019.9074544}, timestamp = {Tue, 05 May 2020 11:39:58 +0200}, biburl = {https://dblp.org/rec/conf/iccais/ZhangLY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/ZhangC0DA19, author = {Penghui Zhang and Haehyun Cho and Ziming Zhao and Adam Doup{\'{e}} and Gail{-}Joon Ahn}, editor = {Chih{-}Cheng Hung and George A. Papadopoulos}, title = {iCore: continuous and proactive extrospection on multi-core IoT devices}, booktitle = {Proceedings of the 34th {ACM/SIGAPP} Symposium on Applied Computing, {SAC} 2019, Limassol, Cyprus, April 8-12, 2019}, pages = {851--860}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3297280.3297364}, doi = {10.1145/3297280.3297364}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/ZhangC0DA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ChoZKPL0DA18, author = {Haehyun Cho and Penghui Zhang and Donguk Kim and Jinbum Park and Choong{-}Hoon Lee and Ziming Zhao and Adam Doup{\'{e}} and Gail{-}Joon Ahn}, title = {Prime+Count: Novel Cross-world Covert Channels on {ARM} TrustZone}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {441--452}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274704}, doi = {10.1145/3274694.3274704}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ChoZKPL0DA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/ZhangNCZDA18, author = {Penghui Zhang and Bernard Ngabonziza and Haehyun Cho and Ziming Zhao and Adam Doup{\'{e}} and Gail{-}Joon Ahn}, editor = {Ziming Zhao and Gail{-}Joon Ahn and Ram Krishnan and Gabriel Ghinita}, title = {SeCore: Continuous Extrospection with High Visibility on Multi-core {ARM} Platforms}, booktitle = {Proceedings of the Eighth {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2018, Tempe, AZ, USA, March 19-21, 2018}, pages = {161--163}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3176258.3176948}, doi = {10.1145/3176258.3176948}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/ZhangNCZDA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jifs/ZhangLZTLZL17, author = {Limei Zhang and Yongfu Liu and Penghui Zhang and Wei Tang and Jing Lv and Lu Zhang and Dongming Li}, title = {Parallel computing of power flow for complex distribution network with DGs}, journal = {J. Intell. Fuzzy Syst.}, volume = {33}, number = {5}, pages = {2987--2997}, year = {2017}, url = {https://doi.org/10.3233/JIFS-169350}, doi = {10.3233/JIFS-169350}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jifs/ZhangLZTLZL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppna/LiuZZCC14, author = {Anfeng Liu and Deyu Zhang and Penghui Zhang and Guohua Cui and Zhigang Chen}, title = {On mitigating hotspots to maximize network lifetime in multi-hop wireless sensor network with guaranteed transport delay and reliability}, journal = {Peer-to-Peer Netw. Appl.}, volume = {7}, number = {3}, pages = {255--273}, year = {2014}, url = {https://doi.org/10.1007/s12083-012-0130-1}, doi = {10.1007/S12083-012-0130-1}, timestamp = {Mon, 04 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ppna/LiuZZCC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpdc/LiuZC11, author = {Anfeng Liu and Peng{-}Hui Zhang and Zhi{-}Gang Chen}, title = {Theoretical analysis of the lifetime and energy hole in cluster based wireless sensor networks}, journal = {J. Parallel Distributed Comput.}, volume = {71}, number = {10}, pages = {1327--1355}, year = {2011}, url = {https://doi.org/10.1016/j.jpdc.2011.05.003}, doi = {10.1016/J.JPDC.2011.05.003}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpdc/LiuZC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.