
Wei Zhao 0001
Person information
- affiliation: American University of Sharjah, United Arab Emirates
- affiliation: University of Macau, China
- affiliation: Texas A&M University, College Station, Texas, USA
Other persons with the same name
- Wei Zhao — disambiguation page
- Wei Zhao 0002 — University of Alabama at Birmingham, AL, USA
- Wei Zhao 0003 — IBM China Research Lab, Beijing, China
- Wei Zhao 0004 — University of Science and Technology of China, Hefei, China
- Wei Zhao 0005 — Cold Spring Harbor Laboratory, NY, USA
- Wei Zhao 0006 — Peking University, Institute of Software, Beijing, China
- Wei Zhao 0007 — Peking University, Intelligent Control Laboratory, Beijing, China
- Wei Zhao 0008
— Harbin Institute of Technology, Department of Computer Science, China
- Wei Zhao 0009 — Guilin University of Technology, China
- Wei Zhao 0010 — University of Connecticut, Storrs, CT, USA
- Wei Zhao 0011 — Nanjing University of Science and Technology, Jiangsu, China
- Wei Zhao 0012
— Chinese Academy of Sciences, Institute of Mountain Hazards and Environment, Chengdu, China
- Wei Zhao 0013
— Nanyang Technological University, School of Electrical and Electronic Engineering, Singapore
- Wei Zhao 0014
— Xidian University, School of Electronic Engineering, Key Laboratory of Intelligent Perception and Image Understanding, Xi'an, China
- Wei Zhao 0015
— Yamaguchi University, Graduate School of Medicine, Ube, Japan
- Wei Zhao 0016
— University of Pennsylvania, Perelman School of Medicine, Philadelphia, PA, USA
- Wei Zhao 0017
— Wuhan University of Technology, School of Transportation, China (and 2 more)
- Wei Zhao 0018
— Huazhong University of Science and Technology, Department of Aerospace Engineering, School of Mechanical Science and Engineering, Wuhan, China
- Wei Zhao 0019
— Xidian University, School of Computer Science and Technology, Xi'an, China
- Wei Zhao 0020
— Max Planck Institute for Dynamics of Complex Technical Systems, Numerical Linear Algebra for Dynamical Systems, Magdeburg, Germany
- Wei Zhao 0021
— North China Electric Power University, School of Electrical and Electronic Engineering, Hebei, China (and 1 more)
- Wei Zhao 0022
— Beihang University, School of Electronic and Information Engineering, Beijing, China (and 1 more)
- Wei Zhao 0023
— Anhui University of Technology, Ma'anshan, China (and 1 more)
- Wei Zhao 0024
— Air Force Engineering University, Air and Missile Defense College, Xi'an, China
- Wei Zhao 0025 — Xidian University, National Laboratory of Radar Signal Processing, Xi'an, China
- Wei Zhao 0026 — Xidian University, School of Electro-Mechanical Engineering, Xi'an, China (and 1 more)
- Wei Zhao 0027
— Chinese Academy of Sciences, Institute of Electrical Engineering, Beijing, China (and 1 more)
- Wei Zhao 0028
— Chinese Academy of Sciences, CAS Key Laboratory of Space Manufacturing Technology, Technology and Engineering Center for Space Utilization, Beijing, China
- Wei Zhao 0029
— Huazhong University of Science and Technology, Department of Biomedical Engineering, Wuhan, China
- Wei Zhao 0030
— National Institute of Metrology China, Beijing, China
- Wei Zhao 0031
— Tsinghua University, State Key Laboratory of Power System, Beijing, China
- Wei Zhao 0032 — Beijing Jiaotong University, Institute of Information Science, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2021
- [j96]Wei Yu, Wei Zhao, Anke Schmeink, Houbing Song, Guido Dartmann:
Guest Editorial: Special Issue on AI-Enabled Internet of Dependable and Controllable Things. IEEE Internet Things J. 8(5): 3053-3056 (2021) - 2020
- [j95]Dou An, Qingyu Yang, Wei Yu, Donghe Li, Wei Zhao:
LoPrO: Location Privacy-preserving Online auction scheme for electric vehicles joint bidding and charging. Future Gener. Comput. Syst. 107: 394-407 (2020) - [j94]Yicong Zhang, Jie Li
, Shigetomo Kimura
, Wei Zhao
, Sajal K. Das
:
Atomic Predicates-Based Data Plane Properties Verification in Software Defined Networking Using Spark. IEEE J. Sel. Areas Commun. 38(7): 1308-1321 (2020) - [j93]Weijia Jia
, Hongjian Peng
, Na Ruan, Zhiqing Tang
, Wei Zhao:
WiFind: Driver Fatigue Detection with Fine-Grained Wi-Fi Signal Features. IEEE Trans. Big Data 6(2): 269-282 (2020) - [j92]Donghe Li, Qingyu Yang
, Wei Yu
, Dou An
, Yang Zhang, Wei Zhao
:
Towards Differential Privacy-Based Online Double Auction for Smart Grid. IEEE Trans. Inf. Forensics Secur. 15: 971-986 (2020) - [j91]Jie Lin
, Wei Yu
, Xinyu Yang
, Peng Zhao
, Hanlin Zhang
, Wei Zhao
:
An Edge Computing Based Public Vehicle System for Smart Transportation. IEEE Trans. Veh. Technol. 69(11): 12635-12651 (2020) - [c137]Tianyi Liu, Xiangyu Lin, Weijia Jia, Mingliang Zhou, Wei Zhao:
Regularized Attentive Capsule Network for Overlapped Relation Extraction. COLING 2020: 6388-6398 - [c136]Pengshuai Li, Xinsong Zhang, Weijia Jia, Wei Zhao:
Active Testing: An Unbiased Evaluation Method for Distantly Supervised Relation Extraction. EMNLP (Findings) 2020: 204-211 - [i8]Kaizheng Liu, Ming Yang, Zhen Ling, Huaiyu Yan, Yue Zhang, Xinwen Fu, Wei Zhao:
On Manually Reverse Engineering Communication Protocols of Linux Based IoT Systems. CoRR abs/2007.11981 (2020) - [i7]Pengshuai Li, Xinsong Zhang, Weijia Jia, Wei Zhao:
Active Testing: An Unbiased Evaluation Method for Distantly Supervised Relation Extraction. CoRR abs/2010.08777 (2020) - [i6]Tianyi Liu, Xiangyu Lin, Weijia Jia, Mingliang Zhou, Wei Zhao:
Regularized Attentive Capsule Network for Overlapped Relation Extraction. CoRR abs/2012.10187 (2020)
2010 – 2019
- 2019
- [j90]Yang Zhang, Qingyu Yang
, Wei Yu
, Dou An
, Donghe Li, Wei Zhao:
An Online Continuous Progressive Second Price Auction for Electric Vehicle Charging. IEEE Internet Things J. 6(2): 2907-2921 (2019) - [j89]Wenmain Yang, Kun Wang, Na Ruan, Wenyuan Gao, Weijia Jia
, Wei Zhao, Nan Liu, Yunyong Zhang:
Time-Sync Video Tag Extraction Using Semantic Association Graph. ACM Trans. Knowl. Discov. Data 13(4): 37:1-37:24 (2019) - [j88]Lin Cui
, Fung Po Tso
, Song Guo
, Weijia Jia
, Kaimin Wei, Wei Zhao:
Enabling Heterogeneous Network Function Chaining. IEEE Trans. Parallel Distributed Syst. 30(4): 842-854 (2019) - [j87]Zhiqing Tang
, Xiaojie Zhou
, Fuming Zhang
, Weijia Jia
, Wei Zhao
:
Migration Modeling and Learning Algorithms for Containers in Fog Computing. IEEE Trans. Serv. Comput. 12(5): 712-725 (2019) - [c135]Yalong Wu, Yunwei Cui, Wei Yu, Chao Lu, Wei Zhao:
Modeling and Forecasting of Timescale Network Traffic Dynamics in M2M Communications. ICDCS 2019: 711-721 - [i5]Hou Ian, Biao Chen, Wei Zhao:
A practicable guide to the quantum computation architectures. CoRR abs/1903.10739 (2019) - [i4]Wenmian Yang, Kun Wang, Na Ruan, Wenyuan Gao, Weijia Jia, Wei Zhao, Nan Liu, Yunyong Zhang:
Time-sync Video Tag Extraction Using Semantic Association Graph. CoRR abs/1905.01053 (2019) - 2018
- [j86]Fan Liang, Wei Yu
, Dou An, Qingyu Yang, Xinwen Fu, Wei Zhao
:
A Survey on Big Data Market: Pricing, Trading and Protection. IEEE Access 6: 15132-15154 (2018) - [j85]Dou An, Qingyu Yang, Wei Yu, Xinyu Yang, Xinwen Fu, Wei Zhao
:
SODA: Strategy-Proof Online Double Auction Scheme for Multimicrogrids Bidding. IEEE Trans. Syst. Man Cybern. Syst. 48(7): 1177-1190 (2018) - [c134]Qinggang Yue, Zupei Li, Chao Gao, Wei Yu, Xinwen Fu
, Wei Zhao:
The Peeping Eye in the Sky. GLOBECOM 2018: 1-7 - [c133]Joshua Kraunelis, Xinwen Fu
, Wei Yu, Wei Zhao
:
A Framework for Detecting and Countering Android UI Attacks via Inspection of IPC Traffic. ICC 2018: 1-6 - [c132]Chao Gao, Zhen Ling, Biao Chen, Xinwen Fu, Wei Zhao:
SecT: A Lightweight Secure Thing-Centered IoT Communication System. MASS 2018: 46-54 - [i3]Zhen Ling, Kaizheng Liu, Yiling Xu, Chao Gao, Yier Jin, Cliff C. Zou, Xinwen Fu, Wei Zhao:
IoT Security: An End-to-End View and Case Study. CoRR abs/1805.05853 (2018) - 2017
- [j84]Jie Lin, Wei Yu
, Nan Zhang, Xinyu Yang, Hanlin Zhang, Wei Zhao
:
A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications. IEEE Internet Things J. 4(5): 1125-1142 (2017) - [j83]Wei Yu
, Xinwen Fu, Houbing Song
, Anastasios A. Economides
, Minho Jo
, Wei Zhao:
Guest Editorial Special Issue on Security and Privacy in Cyber-Physical Systems. IEEE Internet Things J. 4(6): 1798-1801 (2017) - [j82]Dou An, Qingyu Yang, Wei Yu, Xinyu Yang, Xinwen Fu, Wei Zhao
:
Sto2Auc: A Stochastic Optimal Bidding Strategy for Microgrids. IEEE Internet Things J. 4(6): 2260-2274 (2017) - [j81]Qingyu Yang, Dou An, Rui Min, Wei Yu
, Xinyu Yang, Wei Zhao
:
On Optimal PMU Placement-Based Defense Against Data Integrity Attacks in Smart Grid. IEEE Trans. Inf. Forensics Secur. 12(7): 1735-1750 (2017) - [j80]Lin Cui, Fung Po Tso
, Dimitrios P. Pezaros, Weijia Jia
, Wei Zhao
:
PLAN: Joint Policy- and Network-Aware VM Management for Cloud Data Centers. IEEE Trans. Parallel Distributed Syst. 28(4): 1163-1175 (2017) - [j79]Gang Li, Xinfeng Li, Fan Yang, Jin Teng, Sihao Ding, Yuan F. Zheng, Dong Xuan, Biao Chen, Wei Zhao
:
Traffic At-a-Glance: Time-Bounded Analytics on Large Visual Traffic Data. IEEE Trans. Parallel Distributed Syst. 28(9): 2703-2717 (2017) - [j78]Jie Lin, Wei Yu, Xinyu Yang, Qingyu Yang, Xinwen Fu, Wei Zhao
:
A Real-Time En-Route Route Guidance Decision Scheme for Transportation-Based Cyberphysical Systems. IEEE Trans. Veh. Technol. 66(3): 2551-2566 (2017) - [j77]Tianyi Song
, Nicholas Capurso, Xiuzhen Cheng, Jiguo Yu
, Biao Chen, Wei Zhao:
Enhancing GPS With Lane-Level Navigation to Facilitate Highway Driving. IEEE Trans. Veh. Technol. 66(6): 4579-4591 (2017) - [j76]Zhen Ling
, Melanie Borgeest, Chuta Sano
, Jazmyn Fuller, Anthony Cuomo, Sirong Lin, Wei Yu, Xinwen Fu
, Wei Zhao
:
Privacy Enhancing Keyboard: Design, Implementation, and Usability Testing. Wirel. Commun. Mob. Comput. 2017 (2017) - [c131]Gang Li, Fan Yang, Guoxing Chen, Qiang Zhai, Xinfeng Li, Jin Teng, Junda Zhu, Dong Xuan, Biao Chen, Wei Zhao
:
EV-Matching: Bridging Large Visual Data and Electronic Data for Efficient Surveillance. ICDCS 2017: 689-698 - [c130]Paul Y. Cao, Gang Li, Adam C. Champion, Dong Xuan, Steve Romig, Wei Zhao
:
On human mobility predictability via WLAN logs. INFOCOM 2017: 1-9 - [c129]Dou An, Qingyu Yang, Wei Yu, Donghe Li, Yang Zhang, Wei Zhao
:
Towards truthful auction for big data trading. IPCCC 2017: 1-7 - [c128]Donghe Li, Qingyu Yang, Wei Yu, Dou An, Xinyu Yang, Wei Zhao
:
A strategy-proof privacy-preserving double auction mechanism for electrical vehicles demand response in microgrids. IPCCC 2017: 1-8 - [c127]Qiang Zhai, Fan Yang, Adam C. Champion, Chunyi Peng, Jingchuan Wang, Dong Xuan, Wei Zhao
:
BridgeLoc: Bridging Vision-Based Localization for Robots. MASS 2017: 362-370 - [c126]Zhen Ling, Melanie Borgeest, Chuta Sano, Sirong Lin, Mogahid Fadl, Wei Yu, Xinwen Fu, Wei Zhao
:
A Case Study of Usable Security: Usability Testing of Android Privacy Enhancing Keyboard. WASA 2017: 716-728 - 2016
- [j75]Bo Cheng, Lin Cui, Weijia Jia
, Wei Zhao
, Gerhard P. Hancke:
Multiple Region of Interest Coverage in Camera Sensor Networks for Tele-Intensive Care Units. IEEE Trans. Ind. Informatics 12(6): 2331-2341 (2016) - [c125]Xinyu Yang, Xialei Zhang, Jie Lin, Wei Yu, Xinwen Fu, Wei Zhao
:
Data integrity attacks against the distributed real-time pricing in the smart grid. IPCCC 2016: 1-8 - [c124]Qiang Zhai, Fan Yang, Adam C. Champion, Chunyi Peng, Junda Zhu, Dong Xuan, Biao Chen, Yuan F. Zheng, Wei Zhao
:
S-Mirror: Mirroring Sensing Signals for Mobile Robots in Indoor Environments. MSN 2016: 301-305 - 2015
- [j74]Haitao Zou, Zhiguo Gong, Nan Zhang, Wei Zhao, Jingzhi Guo
:
TrustRank: a Cold-Start tolerant recommender system. Enterp. Inf. Syst. 9(2): 117-138 (2015) - [j73]Xinyu Yang, Jie Lin, Wei Yu, Paul-Marie Moulema, Xinwen Fu, Wei Zhao
:
A Novel En-Route Filtering Scheme Against False Data Injection Attacks in Cyber-Physical Networked Systems. IEEE Trans. Computers 64(1): 4-18 (2015) - [j72]Joshua Kraunelis, Yinjie Chen, Zhen Ling, Xinwen Fu, Wei Zhao:
On Malware Leveraging the Android Accessibility Framework. EAI Endorsed Trans. Ubiquitous Environ. 1(4): e1 (2015) - [c123]Ligang Hou, Jingyan Fu, Jinhui Wang, Na Gong, Wei Zhao, Shuqin Geng:
A thermal-aware distribution method of TSV in 3D IC. ASICON 2015: 1-3 - [c122]Zimu Yuan, Wei Li, Junda Zhu, Wei Zhao:
A cost-efficiency method on beacon nodes placement for wireless localization. ICNC 2015: 546-550 - [c121]Jie Lin, Wei Yu, Xinyu Yang, Qingyu Yang, Xinwen Fu, Wei Zhao
:
A Novel Dynamic En-Route Decision Real-Time Route Guidance Scheme in Intelligent Transportation Systems. ICDCS 2015: 61-72 - [c120]Lin Cui, Fung Po Tso
, Dimitrios P. Pezaros
, Weijia Jia
, Wei Zhao
:
Policy-Aware Virtual Machine Management in Data Center Networks. ICDCS 2015: 730-731 - [c119]Qiang Zhai, Sihao Ding, Xinfeng Li, Fan Yang, Jin Teng, Junda Zhu, Dong Xuan, Yuan F. Zheng, Wei Zhao
:
VM-tracking: Visual-motion sensing integration for real-time human tracking. INFOCOM 2015: 711-719 - [c118]Jingyan Fu, Ligang Hou, Jinhui Wang, Bo Lu, Wei Zhao, Yang Yang:
A novel thermal-aware structure of TSV cluster. SoCC 2015: 406-409 - [i2]Zimu Yuan, Wei Li, Zhiwei Xu, Wei Zhao:
Beacon Node Placement for Minimal Localization Error. CoRR abs/1503.08404 (2015) - 2014
- [j71]Qingyu Yang, Jie Yang, Wei Yu, Dou An, Nan Zhang, Wei Zhao
:
On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures. IEEE Trans. Parallel Distributed Syst. 25(3): 717-729 (2014) - [c117]Qinggang Yue, Zhen Ling, Xinwen Fu
, Benyuan Liu, Kui Ren
, Wei Zhao
:
Blind Recognition of Touched Keys on Mobile Devices. CCS 2014: 1403-1414 - [c116]Wei Zhao:
Keynote: WInternet: From Net of Things to Internet of Things. PerCom 2014: 1 - [i1]Qinggang Yue, Zhen Ling, Benyuan Liu, Xinwen Fu, Wei Zhao:
Blind Recognition of Touched Keys: Attack and Countermeasures. CoRR abs/1403.4829 (2014) - 2013
- [j70]Zhen Ling, Junzhou Luo, Wei Yu, Xinwen Fu, Weijia Jia
, Wei Zhao
:
Protocol-level attacks against Tor. Comput. Networks 57(4): 869-886 (2013) - [j69]Jin Zhou, C. L. Philip Chen
, Long Chen
, Wei Zhao
:
A User-Customizable Urban Traffic Information Collection Method Based on Wireless Sensor Networks. IEEE Trans. Intell. Transp. Syst. 14(3): 1119-1128 (2013) - [c115]Xinfeng Li, Jin Teng, Qiang Zhai, Junda Zhu, Dong Xuan, Yuan F. Zheng, Wei Zhao
:
EV-Human: Human localization via visual estimation of body electronic interference. INFOCOM 2013: 500-504 - [c114]Yinjie Chen, Zhongli Liu, Xinwen Fu, Benyuan Liu, Wei Zhao
:
Theory underlying measurement of AOA with a rotating directional antenna. INFOCOM 2013: 2490-2498 - [c113]Joshua Kraunelis, Yinjie Chen, Zhen Ling, Xinwen Fu, Wei Zhao
:
On Malware Leveraging the Android Accessibility Framework. MobiQuitous 2013: 512-523 - [c112]Yinjie Chen, Zhongli Liu, Xinwen Fu, Wei Zhao
:
Effective RSS Sampling for Forensic Wireless Localization. WASA 2013: 402-413 - 2012
- [j68]Ming Li
, Wei Zhao
:
Asymptotic Identity in Min-Plus Algebra: A Report on CPNS. Comput. Math. Methods Medicine 2012: 154038:1-154038:11 (2012) - [j67]Ming Li
, Wei Zhao
, Biao Chen:
Heavy-Tailed Prediction Error: A Difficulty in Predicting Biomedical Signals of Noise Type. Comput. Math. Methods Medicine 2012: 291510:1-291510:5 (2012) - [j66]Aniket Pingley, Wei Yu, Nan Zhang, Xinwen Fu, Wei Zhao
:
A context-aware scheme for privacy-preserving location-based services. Comput. Networks 56(11): 2551-2568 (2012) - [j65]C. L. Philip Chen
, Jin Zhou, Wei Zhao:
A Real-Time Vehicle Navigation Algorithm in Sensor Network Environments. IEEE Trans. Intell. Transp. Syst. 13(4): 1657-1666 (2012) - [j64]Xinwen Fu, Nan Zhang, Aniket Pingley, Wei Yu, Jie Wang, Wei Zhao
:
The Digital Marauder's Map: A WiFi Forensic Positioning Tool. IEEE Trans. Mob. Comput. 11(3): 377-389 (2012) - [j63]Ziqiu Yun, Xiaole Bai, Dong Xuan, Weijia Jia
, Wei Zhao
:
Pattern mutation in wireless sensor deployment. IEEE/ACM Trans. Netw. 20(6): 1964-1977 (2012) - [c111]Zimu Yuan, Wei Li, Adam C. Champion, Wei Zhao:
An efficient hybrid localization scheme for Heterogeneous Wireless Networks. GLOBECOM 2012: 372-378 - [c110]Jie Lin, Wei Yu, Xinyu Yang, Guobin Xu, Wei Zhao
:
On False Data Injection Attacks against Distributed Energy Routing in Smart Grid. ICCPS 2012: 183-192 - [c109]Xinyu Yang, Jie Lin, Paul Moulema, Wei Yu, Xinwen Fu, Wei Zhao
:
A Novel En-route Filtering Scheme against False Data Injection Attacks in Cyber-Physical Networked Systems. ICDCS 2012: 92-101 - [c108]Wei Li, Zimu Yuan, Biao Chen, Wei Zhao:
Performance Comparison of Positioning Algorithms for Complex GPS Systems. ICDCS Workshops 2012: 273-278 - [c107]C. L. Philip Chen
, Jin Zhou, Wei Zhao:
Real-time decision making for urban vehicle navigation. SMC 2012: 2533-2538 - 2011
- [j62]Wei Yu, Xun Wang, Prasad Calyam, Dong Xuan, Wei Zhao
:
Modeling and Detection of Camouflaging Worm. IEEE Trans. Dependable Secur. Comput. 8(3): 377-390 (2011) - [j61]Nan Zhang, Wei Zhao:
Privacy-Preserving OLAP: An Information-Theoretic Approach. IEEE Trans. Knowl. Data Eng. 23(1): 122-138 (2011) - [c106]Qinyu Yang, Jie Yang, Wei Yu, Nan Zhang, Wei Zhao
:
On a Hierarchical False Data Injection Attack on Power System State Estimation. GLOBECOM 2011: 1-5 - [c105]Dengyuan Wu, Xiuzhen Cheng, Dechang Chen, Wei Cheng, Biao Chen, Wei Zhao:
A Monte Carlo Method for Mobile Target Counting. ICDCS 2011: 750-759 - [c104]Aniket Pingley, Nan Zhang, Xinwen Fu, Hyeong-Ah Choi, Suresh Subramaniam
, Wei Zhao
:
Protection of query privacy for continuous location based services. INFOCOM 2011: 1710-1718 - [c103]Xiaole Bai, Ziqiu Yun, Dong Xuan, Biao Chen, Wei Zhao
:
Optimal multiple-coverage of sensor networks. INFOCOM 2011: 2498-2506 - [c102]Yinjie Chen, Zhongli Liu, Benyuan Liu, Xinwen Fu, Wei Zhao
:
Identifying mobiles hiding behind wireless routers. INFOCOM 2011: 2651-2659 - 2010
- [j60]Jianjia Wu, Jyh-Charn Liu, Wei Zhao
:
A General Framework for Parameterized Schedulability Bound Analysis of Real-Time Systems. IEEE Trans. Computers 59(6): 776-783 (2010) - [j59]Wei Yu, Nan Zhang, Xinwen Fu, Riccardo Bettati, Wei Zhao
:
Localization Attacks to Internet Threat Monitors: Modeling and Countermeasures. IEEE Trans. Computers 59(12): 1655-1668 (2010) - [j58]Chengzhi Li, Wei Zhao
:
Stochastic performance analysis of non-feedforward networks. Telecommun. Syst. 43(3-4): 237-252 (2010) - [j57]Shengquan Wang, Dong Xuan, Riccardo Bettati, Wei Zhao
:
Toward statistical QoS guarantees in a differentiated services network. Telecommun. Syst. 43(3-4): 253-263 (2010) - [j56]Ye Zhu, Xinwen Fu, Bryan Graham, Riccardo Bettati, Wei Zhao
:
Correlation-Based Traffic Analysis Attacks on Anonymity Networks. IEEE Trans. Parallel Distributed Syst. 21(7): 954-967 (2010) - [j55]Ming Li
, Wei Zhao
:
Representation of a Stochastic Traffic Bound. IEEE Trans. Parallel Distributed Syst. 21(9): 1368-1372 (2010) - [j54]Wei Yu, Nan Zhang, Xinwen Fu, Wei Zhao
:
Self-Disciplinary Worms and Countermeasures: Modeling and Analysis. IEEE Trans. Parallel Distributed Syst. 21(10): 1501-1514 (2010) - [c101]Xiaole Bai, Ziqiu Yun, Dong Xuan, Weijia Jia
, Wei Zhao
:
Pattern Mutation in Wireless Sensor Deployment. INFOCOM 2010: 2480-2488
2000 – 2009
- 2009
- [j53]Yang Yang, Samuel Cheng, Zixiang Xiong, Wei Zhao:
Wyner-Ziv coding based on TCQ and LDPC codes. IEEE Trans. Commun. 57(2): 376-387 (2009) - [j52]Yang Yang, Vladimir Stankovic
, Zixiang Xiong, Wei Zhao:
Two-Terminal Video Coding. IEEE Trans. Image Process. 18(3): 534-551 (2009) - [j51]Wei Yu, Xun Wang, Xinwen Fu, Dong Xuan, Wei Zhao
:
An Invisible Localization Attack to Internet Threat Monitors. IEEE Trans. Parallel Distributed Syst. 20(11): 1611-1625 (2009) - [c100]Aniket Pingley, Wei Yu, Nan Zhang, Xinwen Fu
, Wei Zhao:
CAP: A Context-Aware Privacy Protection System for Location-Based Services. ICDCS 2009: 49-57 - [c99]Xinwen Fu, Nan Zhang, Aniket Pingley, Wei Yu, Jie Wang, Wei Zhao
:
The Digital Marauder's Map: A New Threat to Location Privacy. ICDCS 2009: 589-596 - 2008
- [j50]Hanxing Wang, Guilin Lu, Weijia Jia, Wei Zhao:
Connectivity in finite ad-hoc networks. Sci. China Ser. F Inf. Sci. 51(4): 417-424 (2008) - [j49]Yang Yang, Vladimir Stankovic
, Zixiang Xiong, Wei Zhao:
On Multiterminal Source Code Design. IEEE Trans. Inf. Theory 54(5): 2278-2302 (2008) - [j48]Nan Zhang, Wei Zhao:
Privacy Protection Against Malicious Adversaries in Distributed Information Sharing Systems. IEEE Trans. Knowl. Data Eng. 20(8): 1028-1033 (2008) - [c98]Wei Yu, Nan Zhang, Xinwen Fu, Riccardo Bettati, Wei Zhao:
On localization attacks to Internet Threat Monitors: An information-theoretic framework. DSN 2008: 356-365 - [c97]Wei Wayne Li, Gaocai Wang, Wei Zhao:
Stochastic Analysis of Expected Schedulability for Real-Time Tasks on a Single Computing System. DS-RT 2008: 83-88 - [c96]Ryan Pries, Wei Yu, Xinwen Fu, Wei Zhao:
A New Replay Attack Against Anonymous Communication Networks. ICC 2008: 1578-1582 - [c95]Xun Wang, Wei Yu, Xinwen Fu, Dong Xuan, Wei Zhao:
iLOC: An invisible LOCalization Attack to Internet Threat Monitoring Systems. INFOCOM 2008: 1930-1938 - 2007
- [j47]Nan Zhang, Wei Zhao:
Privacy-Preserving Data Mining Systems. Computer 40(4): 52-58 (2007) - [j46]Ye Zhu, Xinwen Fu, Riccardo Bettati, Wei Zhao:
Analysis of flow-correlation attacks in anonymity network. Int. J. Secur. Networks 2(1/2): 137-153 (2007) - [j45]Chuan He, Guan Qin, Mi Lu, Wei Zhao:
Optimized high-order finite difference wave equations modeling on reconfigurable computing platform. Microprocess. Microsystems 31(2): 103-115 (2007) - [c94]Chuan He, Guan Qin, Richard E. Ewing, Wei Zhao:
High-Precision BLAS on FPGA-enhanced Computers. ERSA 2007: 107-116 - [c93]Yang Yang, Vladimir Stankovic
, Wei Zhao, Zixiang Xiong:
Multiterminal Video Coding. ICIP (3) 2007: 25-28 - [c92]Jianjia Wu, Jyh-Charn Liu, Wei Zhao:
Utilization-Bound Based Schedulability Analysis of Weighted Round Robin Schedulers. RTSS 2007: 435-446 - [c91]Wei Yu, Xinwen Fu
, Steve Graham, Dong Xuan, Wei Zhao:
DSSS-Based Flow Marking Technique for Invisible Traceback. IEEE Symposium on Security and Privacy 2007: 18-32 - 2006
- [j44]Wei Yu, Sriram Chellappan, Dong Xuan, Wei Zhao:
Distributed policy processing in active-service based infrastructures. Int. J. Commun. Syst. 19(7): 727-750 (2006) - [j43]Weijia Jia, Hanxing Wang, Wanqing Tu
, Wei Zhao
:
A New delay control method for real-time flows. J. Comb. Optim. 12(1-2): 127-149 (2006) - [j42]Shengquan Wang, Zhibin Mai, Dong Xuan, Wei Zhao:
Design and Implementation of QoS-Provisioning System for Voice over IP. IEEE Trans. Parallel Distributed Syst. 17(3): 276-288 (2006) - [c90]Wei Yu, Xun Wang, Prasad Calyam, Dong Xuan, Wei Zhao:
On Detecting Camouflaging Worm. ACSAC 2006: 235-244 - [c89]Chuan He, Guan Qin, Mi Lu, Wei Zhao:
An Efficient Implementation of High-Accuracy Finite Difference Computing Engine on FPGAs. ASAP 2006: 95-98 - [c88]Ming Li, Shengquan Wang, Wei Zhao:
A Real-Time and Reliable Approach to Detecting Traffic Variations at Abnormally High and Low Rates. ATC 2006: 541-550 - [c87]Chuan He, Guan Qin, Mi Lu, Wei Zhao:
Group-Alignment based Accurate Floating-Point Summation on FPGAs. ERSA 2006: 136-142 - [c86]Chuan He, Guan Qin, Mi Lu, Wei Zhao:
An Optimized Finite Difference Computing Engine on FPGAs. FCCM 2006: 283-284 - [c85]Wei Zhao:
Challenges and Opportunities of Computer and Communication Systems Research. ICCCN 2006: 1-2 - [c84]Dan Cheng, Zhibin Mai, Jianjia Wu, Guan Qin, Wei Zhao:
A Service-Oriented Integrating Practice for Data Modeling, Analysis and Visualization. ICEBE 2006: 631-638 - [c83]Wei Yu, Nan Zhang, Wei Zhao:
Self-adaptive Worms and Countermeasures. SSS 2006: 548-562 - 2005
- [j41]