


default search action
Zhiwei Zhang 0004
Person information
- affiliation: Xidian University, School of Computer Science and Technology, State Key Laboratory of Integrated Service Networks, Xi'an, China
Other persons with the same name
- Zhiwei Zhang — disambiguation page
- Zhiwei Zhang 0001
— JPMorgan Chase, Global Technology Applied Research, New York, NY, USA (and 2 more)
- Zhiwei Zhang 0002
— Beijing Institute of Technology, School of Computer Science and Technology, Beijing, China (and 2 more)
- Zhiwei Zhang 0003
— Hangzhou Dianzi University, School of Electronics and Information, Key Laboratory of RF Circuit and System, Hangzhou, China
- Zhiwei Zhang 0005
— Shanghai Jiao Tong University, School of Electronics, Information and Electrical Engineering, Shanghai, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j13]Xiaodong Zhang
, Haoyu Guo, Zhiwei Zhang
, Guiyuan Tang, Jun Sun, Yulong Shen
, Jianfeng Ma
:
Effectively Detecting Software Vulnerabilities via Leveraging Features on Program Slices. IEEE Internet Things J. 12(7): 8033-8048 (2025) - [j12]Shuangrui Zhao
, Xinghui Zhu
, Yuanyu Zhang
, Zhiwei Zhang
, Yulong Shen
:
Joint RIS and Beamforming Design for Secure and Energy-Efficient Two-Way Relay Communications. IEEE Trans. Mob. Comput. 24(8): 7440-7457 (2025) - [j11]Shuangrui Zhao
, Zhiwei Zhang
, Ning Xi
, Xinghui Zhu
, Yulong Shen
:
Enhancing Secrecy Energy Efficiency in THz MIMO Two-Way Relay Systems With SWIPT and Precoding. IEEE Trans. Wirel. Commun. 24(8): 6947-6963 (2025) - [i4]Zehan Chen, Long Zhang, Zhiwei Zhang, JingJing Zhang, Ruoyu Zhou, Yulong Shen, Jianfeng Ma, Lin Yang:
SLD-Spec: Enhancement LLM-assisted Specification Generation for Complex Loop Functions via Program Slicing and Logical Deletion. CoRR abs/2509.09917 (2025) - 2024
- [j10]Zhiwei Zhang
, Zehan Chen
, Yulong Shen
, Xuewen Dong
, Ning Xi
:
A Dynamic Task Offloading Scheme Based on Location Forecasting for Mobile Intelligent Vehicles. IEEE Trans. Veh. Technol. 73(6): 7532-7546 (2024) - [c21]Zhijian Xu
, Zhiwei Zhang
, Guiyuan Tang, Ziwei Shi, Yulong Shen
, Ning Xi
:
Multidimensional Intrinsic Identity Construction and Dynamic Seamless Authentication Schemes in IoT Environments. ICA3PP (4) 2024: 134-153 - [c20]Han Li, Chuanwei Yang, Baitong Zha, Lifan Liu, Zhiwei Zhang, Shuo Zhong:
A Real-time APT Attack Detection Scheme Based on Fusion Provenance Graph in Private Clouds. NaNA 2024: 490-495 - [c19]Guiyuan Tang, Junqi Zhao, Zhijian Xu, Yuzi Wang, Hanzi Yang, Zhiwei Zhang:
Continuous Smartphone User Authentication Based on Gesture-Sensor Fusion. NaNA 2024: 516-522 - [c18]Haoyu Guo, Xiaodong Zhang, Zhiwei Zhang, Yulong Shen:
Detecting Vulnerabilities via Explicitly Leveraging Vulnerability Features on Program Slices. TASE 2024: 165-185 - [i3]Zhiwei Zhang, Ruoyu Zhou, Haocheng Han, Xiaodong Zhang, Yulong Shen:
LiTelFuzz : Swarms Fuzzing Based on Linear Temporal Logic Constraints. CoRR abs/2409.04736 (2024) - 2023
- [j9]Xutong Mu
, Yulong Shen, Ke Cheng, Xueli Geng
, Jiaxuan Fu, Tao Zhang, Zhiwei Zhang:
FedProc: Prototypical contrastive federated learning on non-IID data. Future Gener. Comput. Syst. 143: 93-104 (2023) - [j8]Ke Cheng
, Jiaxuan Fu, Yulong Shen
, Haichang Gao
, Ning Xi
, Zhiwei Zhang, Xinghui Zhu
:
Manto: A Practical and Secure Inference Service of Convolutional Neural Networks for IoT. IEEE Internet Things J. 10(16): 14856-14872 (2023) - [j7]Ke Cheng
, Ning Xi
, Ximeng Liu
, Xinghui Zhu
, Haichang Gao
, Zhiwei Zhang
, Yulong Shen
:
Private Inference for Deep Neural Networks: A Secure, Adaptive, and Efficient Realization. IEEE Trans. Computers 72(12): 3519-3531 (2023) - [j6]Xuewen Dong
, Lingtao Xue
, Zhiwei Zhang
, Yushu Zhang
, Teng Li
, Zhichao You
, Yulong Shen
:
Joint Controller Placement and Control-Service Connection in Hybrid-Band Control. IEEE Trans. Cloud Comput. 11(3): 3139-3152 (2023) - [c17]Zesong Dong, Wei Tong, Zhiwei Zhang, Jian Li, Weidong Yang, Yulong Shen:
Blockchain-Based Identity Authentication Oriented to Multi-Cluster UAV Networking. Blockchain 2023: 68-73 - [c16]Xu An Wang, Xindi Ma, Zhiwei Zhang, Jindan Zhang:
On the Security of a Cloud Auditing Storage Protocol. INCoS 2023: 234-243 - [c15]Han Li, Zhiwei Zhang, Hao Duan, Yi He, Ning Xi:
A Real-Time Attack Detection Scheme Based on Multi-Source Information with False Flag Data. NaNA 2023: 46-51 - [c14]Xin Guo, Jiandong Wang, Zhiwei Zhang, Lisheng Ma:
Failure-Aware Service Request Protection in LEO Satellite Constellation Networks. NaNA 2023: 221-225 - [i2]Zesong Dong, Wei Tong, Zhiwei Zhang, Jian Li, Weidong Yang, Yulong Shen:
Blockchain-Based Identity Authentication Oriented to Multi-Cluster UAV Networking. CoRR abs/2312.12381 (2023) - 2022
- [j5]Wei Tong
, Xuewen Dong, Yulong Shen, Xiaohong Jiang, Zhiwei Zhang
:
A blockchain-driven data exchange model in multi-domain IoT with controllability and parallelity. Future Gener. Comput. Syst. 135: 85-94 (2022) - [c13]Zhaoyang Li, Zhiwei Zhang, Zehan Chen
, Hao Duan, Hongjun Li, Baoquan Ren:
Lightweight and Efficient Distributed Cooperative Intrusion Detection System for Intelligent Swarms. NaNA 2022: 241-246 - [c12]Zhidong Ma, Zhiwei Zhang, Chengliang Liu, Tianzhu Hu, Hongjun Li, Baoquan Ren:
Visualizable Malware Detection based on Multi-dimension Dynamic Behaviors. NaNA 2022: 247-252 - [c11]Xinghui Zhu, Yongzhen Chen, Xiaodong Zhang, Zhiwei Zhang, Baoquan Ren:
Feature Matching for Indoor-Oriented Visual Odometry. NaNA 2022: 253-258 - [c10]Kui Liu, Bin Wang, Ziwei Shi, Jiadong Chen, Zhiwei Zhang:
Hey! You Photographed My Screen without Approved: A Practical Screen Content Protection Scheme Based on Visual Cryptography. NaNA 2022: 369-375 - [c9]Jiandong Wang, Xiang Xia, Zhiwei Zhang, Yuanyu Zhang, Yulong Shen, Baoquan Ren:
Class Continuous LOD Algorithm for Lightweight WebGL Rendering Optimization. NaNA 2022: 489-494 - 2021
- [c8]Wanxue Lin, Xuefei Zhang, Qimei Cui, Zhiwei Zhang:
Blockchain Based Unified Authentication with Zero-knowledge Proof in Heterogeneous MEC. ICC Workshops 2021: 1-6 - [c7]Yuanyu Zhang, Ji He
, Qianyue Qu, Zhiwei Zhang:
Wiretapping or Jamming: On Eavesdropper Attacking Strategy in mmWave Ad Hoc Networks. NaNA 2021: 8-14 - [c6]Zhihao Xu, Kezhang Lin, Zhiwei Zhang, Wangzhe Xu, Kui Liu, Bin Wang, Xinghui Zhu, Jiadong Chen:
You Can See, But You Cannot Photograph: An Intelligent Content Protection Scheme for Videos on Screens. NaNA 2021: 414-419 - [i1]Xutong Mu, Yulong Shen, Ke Cheng, Xueli Geng, Jiaxuan Fu, Tao Zhang, Zhiwei Zhang:
FedProc: Prototypical Contrastive Federated Learning on Non-IID data. CoRR abs/2109.12273 (2021) - 2020
- [j4]Zhiwei Zhang, Xiaofeng Chen, Jianfeng Ma, Jian Shen
:
SLDS: Secure and location-sensitive data sharing scheme for cloud-assisted Cyber-Physical Systems. Future Gener. Comput. Syst. 108: 1338-1349 (2020)
2010 – 2019
- 2019
- [j3]Zhiwei Zhang
, Xiaofeng Chen, Jianfeng Ma, Xiaoling Tao:
New efficient constructions of verifiable data streaming with accountability. Ann. des Télécommunications 74(7-8): 483-499 (2019) - [j2]Zhiwei Zhang, Xiaofeng Chen, Jin Li, Xiaoling Tao, Jianfeng Ma:
HVDB: a hierarchical verifiable database scheme with scalable updates. J. Ambient Intell. Humaniz. Comput. 10(8): 3045-3057 (2019) - 2018
- [c5]Dulin, Zhiwei Zhang, Shichong Tan, Jianfeng Wang
, Xiaoling Tao:
An Associated Deletion Scheme for Multi-copy in Cloud Storage. ICA3PP (4) 2018: 511-526 - [c4]Jingjing Guo, Jianfeng Wang
, Zhiwei Zhang, Xiaofeng Chen:
An Almost Non-interactive Order Preserving Encryption Scheme. ISPEC 2018: 87-100 - 2017
- [c3]Zhiwei Zhang, Xiaofeng Chen, Jin Li, Jianfeng Ma, Yang Xiang
:
A Hierarchical VDB Scheme with Scalable Verification and Tampered Record Localization. ISPA/IUCC 2017: 1212-1216 - 2016
- [c2]Zhiwei Zhang, Yunling Wang, Jianfeng Wang
, Xiaofeng Chen, Jianfeng Ma:
Location-Sensitive Data Sharing in Mobile Cloud Computing. BWCCA 2016: 799-805 - 2012
- [j1]Yulong Shen, Qingqi Pei, Qijian Xu, Zhiwei Zhang:
The multimedia service session handoff method in heterogeneous wireless networks. Int. J. Grid Util. Comput. 3(1): 68-77 (2012) - 2011
- [c1]Yulong Shen, Zhiwei Zhang, Jianfeng Ma, Qingqi Pei, Qijian Xu, Hao Yin:
MS2HM: A Multimedia Service Session Handoff Method between Heterogeneous Wireless Networks. INCoS 2011: 251-257
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-10-17 00:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint