default search action
Wei Zhao 0001
Person information
- affiliation: Chinese Academy of Sciences, Shenzhen Institutes of Advanced Technology, China
- affiliation (former): American University of Sharjah, United Arab Emirates
- affiliation (former): University of Macau, China
- affiliation (former): Texas A&M University, College Station, Texas, USA
Other persons with the same name
- Wei Zhao — disambiguation page
- Wei Zhao 0002 — University of Alabama at Birmingham, AL, USA
- Wei Zhao 0003 — IBM China Research Lab, Beijing, China
- Wei Zhao 0004 — University of Science and Technology of China, Hefei, China
- Wei Zhao 0005 — Cold Spring Harbor Laboratory, NY, USA
- Wei Zhao 0006 — Peking University, Institute of Software, Beijing, China
- Wei Zhao 0007 — Peking University, Intelligent Control Laboratory, Beijing, China
- Wei Zhao 0008 — Harbin Institute of Technology, Department of Computer Science, China
- Wei Zhao 0009 — Guilin University of Technology, China
- Wei Zhao 0010 — University of Connecticut, Storrs, CT, USA
- Wei Zhao 0011 — Nanjing University of Science and Technology, Jiangsu, China
- Wei Zhao 0012 — Chinese Academy of Sciences, Institute of Mountain Hazards and Environment, Chengdu, China
- Wei Zhao 0013 — Nanyang Technological University, School of Electrical and Electronic Engineering, Singapore
- Wei Zhao 0014 — Xidian University, School of Electronic Engineering, Key Laboratory of Intelligent Perception and Image Understanding, Xi'an, China
- Wei Zhao 0015 — Yamaguchi University, Graduate School of Medicine, Ube, Japan
- Wei Zhao 0016 — University of Pennsylvania, Perelman School of Medicine, Philadelphia, PA, USA
- Wei Zhao 0017 — Wuhan University of Technology, School of Transportation, China (and 2 more)
- Wei Zhao 0018 — Huazhong University of Science and Technology, Department of Aerospace Engineering, School of Mechanical Science and Engineering, Wuhan, China
- Wei Zhao 0019 — Xidian University, School of Computer Science and Technology, Xi'an, China
- Wei Zhao 0020 — Max Planck Institute for Dynamics of Complex Technical Systems, Numerical Linear Algebra for Dynamical Systems, Magdeburg, Germany
- Wei Zhao 0021 — North China Electric Power University, School of Electrical and Electronic Engineering, Hebei, China (and 1 more)
- Wei Zhao 0022 — Beihang University, School of Electronic and Information Engineering, Beijing, China (and 1 more)
- Wei Zhao 0023 — Anhui University of Technology, Ma'anshan, China (and 1 more)
- Wei Zhao 0024 — Air Force Engineering University, Air and Missile Defense College, Xi'an, China
- Wei Zhao 0025 — Xidian University, National Laboratory of Radar Signal Processing, Xi'an, China
- Wei Zhao 0026 — Xidian University, School of Electro-Mechanical Engineering, Xi'an, China (and 1 more)
- Wei Zhao 0027 — Chinese Academy of Sciences, Institute of Electrical Engineering, Beijing, China (and 1 more)
- Wei Zhao 0028 — Chinese Academy of Sciences, CAS Key Laboratory of Space Manufacturing Technology, Technology and Engineering Center for Space Utilization, Beijing, China
- Wei Zhao 0029 — Stanford University, Department of Radiation Oncology, CA, USA (and 1 more)
- Wei Zhao 0030 — National Institute of Metrology China, Beijing, China
- Wei Zhao 0031 — Tsinghua University, State Key Laboratory of Power System, Beijing, China
- Wei Zhao 0032 — Beijing Jiaotong University, Institute of Information Science, China
- Wei Zhao 0033 — University of Aberdeen, Aberdeen, UK (and 1 more)
- Wei Zhao 0034 — Huazhong University of Science and Technology, Wuhan National Laboratory for Optoelectronics, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j126]Wenqiang Chen, Shupei Lin, Zhencan Peng, Farshid Salemi Parizi, Seongkook Heo, Shwetak N. Patel, Wojciech Matusik, Wei Zhao, John A. Stankovic:
ViObject: Harness Passive Vibrations for Daily Object Recognition with Commodity Smartwatches. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 8(1): 5:1-5:26 (2024) - [j125]Honghong Zeng, Jie Li, Jiong Lou, Shijing Yuan, Chentao Wu, Wei Zhao, Sijin Wu, Zhiwen Wang:
BSR-FL: An Efficient Byzantine-Robust Privacy-Preserving Federated Learning Framework. IEEE Trans. Computers 73(8): 2096-2110 (2024) - [j124]Shuai Zhou, Tianqing Zhu, Dayong Ye, Wanlei Zhou, Wei Zhao:
Inversion-Guided Defense: Detecting Model Stealing Attacks by Output Inverting. IEEE Trans. Inf. Forensics Secur. 19: 4130-4145 (2024) - [j123]Jiong Lou, Zhiqing Tang, Weijia Jia, Wei Zhao, Jie Li:
Startup-Aware Dependent Task Scheduling With Bandwidth Constraints in Edge Computing. IEEE Trans. Mob. Comput. 23(2): 1586-1600 (2024) - [j122]Zhiqing Tang, Fangyi Mou, Jiong Lou, Weijia Jia, Yuan Wu, Wei Zhao:
Multi-User Layer-Aware Online Container Migration in Edge-Assisted Vehicular Networks. IEEE/ACM Trans. Netw. 32(2): 1807-1822 (2024) - [j121]Hanshuai Cui, Zhiqing Tang, Jiong Lou, Weijia Jia, Wei Zhao:
Latency-Aware Container Scheduling in Edge Cluster Upgrades: A Deep Reinforcement Learning Approach. IEEE Trans. Serv. Comput. 17(5): 2530-2543 (2024) - [i10]Heng Xu, Tianqing Zhu, Wanlei Zhou, Wei Zhao:
Don't Forget Too Much: Towards Machine Unlearning on Feature Level. CoRR abs/2406.10951 (2024) - [i9]Heng Xu, Tianqing Zhu, Lefeng Zhang, Wanlei Zhou, Wei Zhao:
Towards Efficient Target-Level Machine Unlearning Based on Essential Graph. CoRR abs/2406.10954 (2024) - 2023
- [j120]Zhiqing Tang, Fuming Zhang, Xiaojie Zhou, Weijia Jia, Wei Zhao:
Pricing Model for Dynamic Resource Overbooking in Edge Computing. IEEE Trans. Cloud Comput. 11(2): 1970-1984 (2023) - [j119]Xiangyu Hu, Tianqing Zhu, Xuemeng Zhai, Wanlei Zhou, Wei Zhao:
Privacy Data Propagation and Preservation in Social Media: A Real-World Case Study. IEEE Trans. Knowl. Data Eng. 35(4): 4137-4150 (2023) - [j118]Xiangyu Hu, Tianqing Zhu, Xuemeng Zhai, Hengming Wang, Wanlei Zhou, Wei Zhao:
Privacy Data Diffusion Modeling and Preserving in Online Social Network. IEEE Trans. Knowl. Data Eng. 35(6): 6224-6237 (2023) - [j117]Jiong Lou, Zhiqing Tang, Songli Zhang, Weijia Jia, Wei Zhao, Jie Li:
Cost-Effective Scheduling for Dependent Tasks With Tight Deadline Constraints in Mobile Edge Computing. IEEE Trans. Mob. Comput. 22(10): 5829-5845 (2023) - [j116]Yan-Jun Liu, Wei Zhao, Lei Liu, Dapeng Li, Shaocheng Tong, C. L. Philip Chen:
Adaptive Neural Network Control for a Class of Nonlinear Systems With Function Constraints on States. IEEE Trans. Neural Networks Learn. Syst. 34(6): 2732-2741 (2023) - [j115]Jiong Lou, Hao Luo, Zhiqing Tang, Weijia Jia, Wei Zhao:
Efficient Container Assignment and Layer Sequencing in Edge Computing. IEEE Trans. Serv. Comput. 16(2): 1118-1131 (2023) - [c143]Haochen Wang, Zhiwei Shi, Yafei Qiao, Fan Yang, Yuzhe He, Dong Xuan, Wei Zhao:
Autonomous and Cost-effective Defect Detection System for Molded Pulp Products. ICCPS 2023: 1-11 - 2022
- [j114]Songli Zhang, Weijia Jia, Zhiqing Tang, Jiong Lou, Wei Zhao:
Efficient instance reuse approach for service function chain placement in mobile edge computing. Comput. Networks 211: 109010 (2022) - [j113]Yuzhen Ma, Yan-Jun Liu, Wei Zhao, Jie Lan, Tongyu Xu, Lei Liu:
Distributed adaptive fuzzy control for multi-agent systems with full state constraints and unmeasured states. Inf. Sci. 613: 609-627 (2022) - [j112]Dou An, Qingyu Yang, Donghe Li, Wei Yu, Wei Zhao, Chao-Bo Yan:
Where Am I Parking: Incentive Online Parking-Space Sharing Mechanism With Privacy Protection. IEEE Trans Autom. Sci. Eng. 19(1): 143-162 (2022) - [j111]Jin Wang, Chunming Cao, Jianping Wang, Kejie Lu, Admela Jukan, Wei Zhao:
Optimal Task Allocation and Coding Design for Secure Edge Computing With Heterogeneous Edge Devices. IEEE Trans. Cloud Comput. 10(4): 2817-2833 (2022) - [j110]Qingyu Yang, Donghe Li, Dou An, Wei Yu, Xinwen Fu, Xinyu Yang, Wei Zhao:
Towards Incentive for Electrical Vehicles Demand Response With Location Privacy Guaranteeing in Microgrids. IEEE Trans. Dependable Secur. Comput. 19(1): 131-148 (2022) - [c142]Shan Wang, Ming Yang, Bryan Pearson, Tingjian Ge, Xinwen Fu, Wei Zhao:
On Security of Proof-of-Policy (PoP) in the Execute-Order-Validate Blockchain Paradigm. CNS 2022: 317-325 - 2021
- [j109]Wei Zhao, Yanjun Liu, Lei Liu:
Observer-Based Adaptive Fuzzy Tracking Control Using Integral Barrier Lyapunov Functionals for A Nonlinear System With Full State Constraints. IEEE CAA J. Autom. Sinica 8(3): 617-627 (2021) - [j108]Wei Yu, Wei Zhao, Anke Schmeink, Houbing Song, Guido Dartmann:
Guest Editorial: Special Issue on AI-Enabled Internet of Dependable and Controllable Things. IEEE Internet Things J. 8(5): 3053-3056 (2021) - [j107]Kaizheng Liu, Ming Yang, Zhen Ling, Huaiyu Yan, Yue Zhang, Xinwen Fu, Wei Zhao:
On Manually Reverse Engineering Communication Protocols of Linux-Based IoT Systems. IEEE Internet Things J. 8(8): 6815-6827 (2021) - [j106]Pengfei Wan, Xiaoming Wang, Xinyan Wang, Liang Wang, Yaguang Lin, Wei Zhao:
Intervening Coupling Diffusion of Competitive Information in Online Social Networks. IEEE Trans. Knowl. Data Eng. 33(6): 2548-2559 (2021) - [j105]Lei Liu, Wei Zhao, Yan-Jun Liu, Shaocheng Tong, Yueying Wang:
Adaptive Finite-Time Neural Network Control of Nonlinear Systems With Multiple Objective Constraints and Application to Electromechanical System. IEEE Trans. Neural Networks Learn. Syst. 32(12): 5416-5426 (2021) - [j104]Yaguang Lin, Xiaoming Wang, Fei Hao, Yichuan Jiang, Yulei Wu, Geyong Min, Daojing He, Sencun Zhu, Wei Zhao:
Dynamic Control of Fraud Information Spreading in Mobile Social Networks. IEEE Trans. Syst. Man Cybern. Syst. 51(6): 3725-3738 (2021) - [c141]Shan Wang, Ming Yang, Yue Zhang, Yan Luo, Tingjian Ge, Xinwen Fu, Wei Zhao:
On Private Data Collection of Hyperledger Fabric. ICDCS 2021: 819-829 - 2020
- [j103]Wei Zhao, Li Tang, Yan-Jun Liu:
Disturbance Observer-Based Adaptive Neural Network Control of Marine Vessel Systems with Time-Varying Output Constraints. Complex. 2020: 6641758:1-6641758:12 (2020) - [j102]Dou An, Qingyu Yang, Wei Yu, Donghe Li, Wei Zhao:
LoPrO: Location Privacy-preserving Online auction scheme for electric vehicles joint bidding and charging. Future Gener. Comput. Syst. 107: 394-407 (2020) - [j101]Yicong Zhang, Jie Li, Shigetomo Kimura, Wei Zhao, Sajal K. Das:
Atomic Predicates-Based Data Plane Properties Verification in Software Defined Networking Using Spark. IEEE J. Sel. Areas Commun. 38(7): 1308-1321 (2020) - [j100]Weijia Jia, Hongjian Peng, Na Ruan, Zhiqing Tang, Wei Zhao:
WiFind: Driver Fatigue Detection with Fine-Grained Wi-Fi Signal Features. IEEE Trans. Big Data 6(2): 269-282 (2020) - [j99]Donghe Li, Qingyu Yang, Wei Yu, Dou An, Yang Zhang, Wei Zhao:
Towards Differential Privacy-Based Online Double Auction for Smart Grid. IEEE Trans. Inf. Forensics Secur. 15: 971-986 (2020) - [j98]Jie Lin, Wei Yu, Xinyu Yang, Peng Zhao, Hanlin Zhang, Wei Zhao:
An Edge Computing Based Public Vehicle System for Smart Transportation. IEEE Trans. Veh. Technol. 69(11): 12635-12651 (2020) - [c140]Tianyi Liu, Xiangyu Lin, Weijia Jia, Mingliang Zhou, Wei Zhao:
Regularized Attentive Capsule Network for Overlapped Relation Extraction. COLING 2020: 6388-6398 - [c139]Pengshuai Li, Xinsong Zhang, Weijia Jia, Wei Zhao:
Active Testing: An Unbiased Evaluation Method for Distantly Supervised Relation Extraction. EMNLP (Findings) 2020: 204-211 - [i8]Kaizheng Liu, Ming Yang, Zhen Ling, Huaiyu Yan, Yue Zhang, Xinwen Fu, Wei Zhao:
On Manually Reverse Engineering Communication Protocols of Linux Based IoT Systems. CoRR abs/2007.11981 (2020) - [i7]Pengshuai Li, Xinsong Zhang, Weijia Jia, Wei Zhao:
Active Testing: An Unbiased Evaluation Method for Distantly Supervised Relation Extraction. CoRR abs/2010.08777 (2020) - [i6]Tianyi Liu, Xiangyu Lin, Weijia Jia, Mingliang Zhou, Wei Zhao:
Regularized Attentive Capsule Network for Overlapped Relation Extraction. CoRR abs/2012.10187 (2020)
2010 – 2019
- 2019
- [j97]Xiaolu Zhang, Demin Li, Wei Wayne Li, Wei Zhao:
An Optimal Dynamic Admission Control Policy and Upper Bound Analysis in Wireless Sensor Networks. IEEE Access 7: 53314-53329 (2019) - [j96]Yang Zhang, Qingyu Yang, Wei Yu, Dou An, Donghe Li, Wei Zhao:
An Online Continuous Progressive Second Price Auction for Electric Vehicle Charging. IEEE Internet Things J. 6(2): 2907-2921 (2019) - [j95]Wenmian Yang, Kun Wang, Na Ruan, Wenyuan Gao, Weijia Jia, Wei Zhao, Nan Liu, Yunyong Zhang:
Time-Sync Video Tag Extraction Using Semantic Association Graph. ACM Trans. Knowl. Discov. Data 13(4): 37:1-37:24 (2019) - [j94]Lin Cui, Fung Po Tso, Song Guo, Weijia Jia, Kaimin Wei, Wei Zhao:
Enabling Heterogeneous Network Function Chaining. IEEE Trans. Parallel Distributed Syst. 30(4): 842-854 (2019) - [j93]Zhiqing Tang, Xiaojie Zhou, Fuming Zhang, Weijia Jia, Wei Zhao:
Migration Modeling and Learning Algorithms for Containers in Fog Computing. IEEE Trans. Serv. Comput. 12(5): 712-725 (2019) - [c138]Yalong Wu, Yunwei Cui, Wei Yu, Chao Lu, Wei Zhao:
Modeling and Forecasting of Timescale Network Traffic Dynamics in M2M Communications. ICDCS 2019: 711-721 - [c137]Chunming Cao, Jin Wang, Jianping Wang, Kejie Lu, Jingya Zhou, Admela Jukan, Wei Zhao:
Optimal Task Allocation and Coding Design for Secure Coded Edge Computing. ICDCS 2019: 1083-1093 - [i5]Hou Ian, Biao Chen, Wei Zhao:
A practicable guide to the quantum computation architectures. CoRR abs/1903.10739 (2019) - [i4]Wenmian Yang, Kun Wang, Na Ruan, Wenyuan Gao, Weijia Jia, Wei Zhao, Nan Liu, Yunyong Zhang:
Time-sync Video Tag Extraction Using Semantic Association Graph. CoRR abs/1905.01053 (2019) - 2018
- [j92]Fan Liang, Wei Yu, Dou An, Qingyu Yang, Xinwen Fu, Wei Zhao:
A Survey on Big Data Market: Pricing, Trading and Protection. IEEE Access 6: 15132-15154 (2018) - [j91]Xichao Sun, Ming Li, Wei Zhao:
Moderate Deviations for Stochastic Fractional Heat Equation Driven by Fractional Noise. Complex. 2018: 7402764:1-7402764:17 (2018) - [j90]Wei Zhao, Tarek F. Abdelzaher:
Preface to the Special Issue: Toward an Efficient and Effective Internet of Things for Cyber-Physical Systems. ACM Trans. Cyber Phys. Syst. 2(2): 7:1-7:2 (2018) - [j89]Wei Zhao, Tarek F. Abdelzaher:
Preface to the Special Issue: Toward an Efficient and Effective Internet of Things for Cyber-Physical Systems (Part II). ACM Trans. Cyber Phys. Syst. 2(3): 15:1-15:2 (2018) - [j88]Dou An, Qingyu Yang, Wei Yu, Xinyu Yang, Xinwen Fu, Wei Zhao:
SODA: Strategy-Proof Online Double Auction Scheme for Multimicrogrids Bidding. IEEE Trans. Syst. Man Cybern. Syst. 48(7): 1177-1190 (2018) - [c136]Qinggang Yue, Zupei Li, Chao Gao, Wei Yu, Xinwen Fu, Wei Zhao:
The Peeping Eye in the Sky. GLOBECOM 2018: 1-7 - [c135]Joshua Kraunelis, Xinwen Fu, Wei Yu, Wei Zhao:
A Framework for Detecting and Countering Android UI Attacks via Inspection of IPC Traffic. ICC 2018: 1-6 - [c134]Chao Gao, Zhen Ling, Biao Chen, Xinwen Fu, Wei Zhao:
SecT: A Lightweight Secure Thing-Centered IoT Communication System. MASS 2018: 46-54 - [c133]Wei Li, Zimu Yuan, Shuhui Yang, Wei Zhao:
Error Analysis on RSS Range-Based Localization Based on General Log-Distance Path Loss Model. MASS 2018: 469-474 - [i3]Zhen Ling, Kaizheng Liu, Yiling Xu, Chao Gao, Yier Jin, Cliff C. Zou, Xinwen Fu, Wei Zhao:
IoT Security: An End-to-End View and Case Study. CoRR abs/1805.05853 (2018) - 2017
- [j87]Adriana Schulz, Cynthia R. Sung, Andrew Spielberg, Wei Zhao, Robin Cheng, Eitan Grinspun, Daniela Rus, Wojciech Matusik:
Interactive robogami: An end-to-end system for design of robots with ground locomotion. Int. J. Robotics Res. 36(10): 1131-1147 (2017) - [j86]Jie Lin, Wei Yu, Nan Zhang, Xinyu Yang, Hanlin Zhang, Wei Zhao:
A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications. IEEE Internet Things J. 4(5): 1125-1142 (2017) - [j85]Wei Yu, Xinwen Fu, Houbing Song, Anastasios A. Economides, Minho Jo, Wei Zhao:
Guest Editorial Special Issue on Security and Privacy in Cyber-Physical Systems. IEEE Internet Things J. 4(6): 1798-1801 (2017) - [j84]Dou An, Qingyu Yang, Wei Yu, Xinyu Yang, Xinwen Fu, Wei Zhao:
Sto2Auc: A Stochastic Optimal Bidding Strategy for Microgrids. IEEE Internet Things J. 4(6): 2260-2274 (2017) - [j83]Qingyu Yang, Dou An, Rui Min, Wei Yu, Xinyu Yang, Wei Zhao:
On Optimal PMU Placement-Based Defense Against Data Integrity Attacks in Smart Grid. IEEE Trans. Inf. Forensics Secur. 12(7): 1735-1750 (2017) - [j82]Lin Cui, Fung Po Tso, Dimitrios P. Pezaros, Weijia Jia, Wei Zhao:
PLAN: Joint Policy- and Network-Aware VM Management for Cloud Data Centers. IEEE Trans. Parallel Distributed Syst. 28(4): 1163-1175 (2017) - [j81]Gang Li, Xinfeng Li, Fan Yang, Jin Teng, Sihao Ding, Yuan F. Zheng, Dong Xuan, Biao Chen, Wei Zhao:
Traffic At-a-Glance: Time-Bounded Analytics on Large Visual Traffic Data. IEEE Trans. Parallel Distributed Syst. 28(9): 2703-2717 (2017) - [j80]Jie Lin, Wei Yu, Xinyu Yang, Qingyu Yang, Xinwen Fu, Wei Zhao:
A Real-Time En-Route Route Guidance Decision Scheme for Transportation-Based Cyberphysical Systems. IEEE Trans. Veh. Technol. 66(3): 2551-2566 (2017) - [j79]Tianyi Song, Nicholas Capurso, Xiuzhen Cheng, Jiguo Yu, Biao Chen, Wei Zhao:
Enhancing GPS With Lane-Level Navigation to Facilitate Highway Driving. IEEE Trans. Veh. Technol. 66(6): 4579-4591 (2017) - [j78]Zhen Ling, Melanie Borgeest, Chuta Sano, Jazmyn Fuller, Anthony Cuomo, Sirong Lin, Wei Yu, Xinwen Fu, Wei Zhao:
Privacy Enhancing Keyboard: Design, Implementation, and Usability Testing. Wirel. Commun. Mob. Comput. 2017 (2017) - [c132]Gang Li, Fan Yang, Guoxing Chen, Qiang Zhai, Xinfeng Li, Jin Teng, Junda Zhu, Dong Xuan, Biao Chen, Wei Zhao:
EV-Matching: Bridging Large Visual Data and Electronic Data for Efficient Surveillance. ICDCS 2017: 689-698 - [c131]Paul Y. Cao, Gang Li, Adam C. Champion, Dong Xuan, Steve Romig, Wei Zhao:
On human mobility predictability via WLAN logs. INFOCOM 2017: 1-9 - [c130]Dou An, Qingyu Yang, Wei Yu, Donghe Li, Yang Zhang, Wei Zhao:
Towards truthful auction for big data trading. IPCCC 2017: 1-7 - [c129]Donghe Li, Qingyu Yang, Wei Yu, Dou An, Xinyu Yang, Wei Zhao:
A strategy-proof privacy-preserving double auction mechanism for electrical vehicles demand response in microgrids. IPCCC 2017: 1-8 - [c128]Qiang Zhai, Fan Yang, Adam C. Champion, Chunyi Peng, Jingchuan Wang, Dong Xuan, Wei Zhao:
BridgeLoc: Bridging Vision-Based Localization for Robots. MASS 2017: 362-370 - [c127]Zhen Ling, Melanie Borgeest, Chuta Sano, Sirong Lin, Mogahid Fadl, Wei Yu, Xinwen Fu, Wei Zhao:
A Case Study of Usable Security: Usability Testing of Android Privacy Enhancing Keyboard. WASA 2017: 716-728 - 2016
- [j77]Jianjia Wu, Wei Zhao:
Design and Realization of WInternet: From Net of Things to Internet of Things. ACM Trans. Cyber Phys. Syst. 1(1): 2:1-2:12 (2016) - [j76]Bo Cheng, Lin Cui, Weijia Jia, Wei Zhao, Gerhard P. Hancke:
Multiple Region of Interest Coverage in Camera Sensor Networks for Tele-Intensive Care Units. IEEE Trans. Ind. Informatics 12(6): 2331-2341 (2016) - [c126]Xinyu Yang, Xialei Zhang, Jie Lin, Wei Yu, Xinwen Fu, Wei Zhao:
Data integrity attacks against the distributed real-time pricing in the smart grid. IPCCC 2016: 1-8 - [c125]Qiang Zhai, Fan Yang, Adam C. Champion, Chunyi Peng, Junda Zhu, Dong Xuan, Biao Chen, Yuan F. Zheng, Wei Zhao:
S-Mirror: Mirroring Sensing Signals for Mobile Robots in Indoor Environments. MSN 2016: 301-305 - 2015
- [j75]Haitao Zou, Zhiguo Gong, Nan Zhang, Wei Zhao, Jingzhi Guo:
TrustRank: a Cold-Start tolerant recommender system. Enterp. Inf. Syst. 9(2): 117-138 (2015) - [j74]Xinyu Yang, Jie Lin, Wei Yu, Paul-Marie Moulema, Xinwen Fu, Wei Zhao:
A Novel En-Route Filtering Scheme Against False Data Injection Attacks in Cyber-Physical Networked Systems. IEEE Trans. Computers 64(1): 4-18 (2015) - [j73]Joshua Kraunelis, Yinjie Chen, Zhen Ling, Xinwen Fu, Wei Zhao:
On Malware Leveraging the Android Accessibility Framework. EAI Endorsed Trans. Ubiquitous Environ. 1(4): e1 (2015) - [c124]Ligang Hou, Jingyan Fu, Jinhui Wang, Na Gong, Wei Zhao, Shuqin Geng:
A thermal-aware distribution method of TSV in 3D IC. ASICON 2015: 1-3 - [c123]Zimu Yuan, Wei Li, Junda Zhu, Wei Zhao:
A cost-efficiency method on beacon nodes placement for wireless localization. ICNC 2015: 546-550 - [c122]Jie Lin, Wei Yu, Xinyu Yang, Qingyu Yang, Xinwen Fu, Wei Zhao:
A Novel Dynamic En-Route Decision Real-Time Route Guidance Scheme in Intelligent Transportation Systems. ICDCS 2015: 61-72 - [c121]Lin Cui, Fung Po Tso, Dimitrios P. Pezaros, Weijia Jia, Wei Zhao:
Policy-Aware Virtual Machine Management in Data Center Networks. ICDCS 2015: 730-731 - [c120]Qiang Zhai, Sihao Ding, Xinfeng Li, Fan Yang, Jin Teng, Junda Zhu, Dong Xuan, Yuan F. Zheng, Wei Zhao:
VM-tracking: Visual-motion sensing integration for real-time human tracking. INFOCOM 2015: 711-719 - [c119]Adriana Schulz, Cynthia R. Sung, Andrew Spielberg, Wei Zhao, Yu Cheng, Ankur M. Mehta, Eitan Grinspun, Daniela Rus, Wojciech Matusik:
Interactive robogami: data-driven design for 3D print and fold robots with ground locomotion. SIGGRAPH Studio 2015: 1:1 - [c118]Jingyan Fu, Ligang Hou, Jinhui Wang, Bo Lu, Wei Zhao, Yang Yang:
A novel thermal-aware structure of TSV cluster. SoCC 2015: 406-409 - [i2]Zimu Yuan, Wei Li, Zhiwei Xu, Wei Zhao:
Beacon Node Placement for Minimal Localization Error. CoRR abs/1503.08404 (2015) - 2014
- [j72]Qingyu Yang, Jie Yang, Wei Yu, Dou An, Nan Zhang, Wei Zhao:
On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures. IEEE Trans. Parallel Distributed Syst. 25(3): 717-729 (2014) - [c117]Qinggang Yue, Zhen Ling, Xinwen Fu, Benyuan Liu, Kui Ren, Wei Zhao:
Blind Recognition of Touched Keys on Mobile Devices. CCS 2014: 1403-1414 - [c116]Wei Zhao:
Keynote: WInternet: From Net of Things to Internet of Things. PerCom 2014: 1 - [i1]Qinggang Yue, Zhen Ling, Benyuan Liu, Xinwen Fu, Wei Zhao:
Blind Recognition of Touched Keys: Attack and Countermeasures. CoRR abs/1403.4829 (2014) - 2013
- [j71]Zhen Ling, Junzhou Luo, Wei Yu, Xinwen Fu, Weijia Jia, Wei Zhao:
Protocol-level attacks against Tor. Comput. Networks 57(4): 869-886 (2013) - [j70]Jin Zhou, C. L. Philip Chen, Long Chen, Wei Zhao:
A User-Customizable Urban Traffic Information Collection Method Based on Wireless Sensor Networks. IEEE Trans. Intell. Transp. Syst. 14(3): 1119-1128 (2013) - [c115]Xinfeng Li, Jin Teng, Qiang Zhai, Junda Zhu, Dong Xuan, Yuan F. Zheng, Wei Zhao:
EV-Human: Human localization via visual estimation of body electronic interference. INFOCOM 2013: 500-504 - [c114]Yinjie Chen, Zhongli Liu, Xinwen Fu, Benyuan Liu, Wei Zhao:
Theory underlying measurement of AOA with a rotating directional antenna. INFOCOM 2013: 2490-2498 - [c113]Joshua Kraunelis, Yinjie Chen, Zhen Ling, Xinwen Fu, Wei Zhao:
On Malware Leveraging the Android Accessibility Framework. MobiQuitous 2013: 512-523 - [c112]Yinjie Chen, Zhongli Liu, Xinwen Fu, Wei Zhao:
Effective RSS Sampling for Forensic Wireless Localization. WASA 2013: 402-413 - 2012
- [j69]Ming Li, Wei Zhao:
Asymptotic Identity in Min-Plus Algebra: A Report on CPNS. Comput. Math. Methods Medicine 2012: 154038:1-154038:11 (2012) - [j68]Ming Li, Wei Zhao, Biao Chen:
Heavy-Tailed Prediction Error: A Difficulty in Predicting Biomedical Signals of Noise Type. Comput. Math. Methods Medicine 2012: 291510:1-291510:5 (2012) - [j67]Aniket Pingley, Wei Yu, Nan Zhang, Xinwen Fu, Wei Zhao:
A context-aware scheme for privacy-preserving location-based services. Comput. Networks 56(11): 2551-2568 (2012) - [j66]C. L. Philip Chen, Jin Zhou, Wei Zhao:
A Real-Time Vehicle Navigation Algorithm in Sensor Network Environments. IEEE Trans. Intell. Transp. Syst. 13(4): 1657-1666 (2012) - [j65]Xinwen Fu, Nan Zhang, Aniket Pingley, Wei Yu, Jie Wang, Wei Zhao:
The Digital Marauder's Map: A WiFi Forensic Positioning Tool. IEEE Trans. Mob. Comput. 11(3): 377-389 (2012) - [j64]Ziqiu Yun, Xiaole Bai, Dong Xuan, Weijia Jia, Wei Zhao:
Pattern mutation in wireless sensor deployment. IEEE/ACM Trans. Netw. 20(6): 1964-1977 (2012) - [c111]Zimu Yuan, Wei Li, Adam C. Champion, Wei Zhao:
An efficient hybrid localization scheme for Heterogeneous Wireless Networks. GLOBECOM 2012: 372-378 - [c110]Jie Lin, Wei Yu, Xinyu Yang, Guobin Xu, Wei Zhao:
On False Data Injection Attacks against Distributed Energy Routing in Smart Grid. ICCPS 2012: 183-192 - [c109]Xinyu Yang, Jie Lin, Paul Moulema, Wei Yu, Xinwen Fu, Wei Zhao:
A Novel En-route Filtering Scheme against False Data Injection Attacks in Cyber-Physical Networked Systems. ICDCS 2012: 92-101 - [c108]Wei Li, Zimu Yuan, Biao Chen, Wei Zhao:
Performance Comparison of Positioning Algorithms for Complex GPS Systems. ICDCS Workshops 2012: 273-278 - [c107]C. L. Philip Chen, Jin Zhou, Wei Zhao:
Real-time decision making for urban vehicle navigation. SMC 2012: 2533-2538 - 2011
- [j63]Wei Yu, Xun Wang, Prasad Calyam, Dong Xuan, Wei Zhao:
Modeling and Detection of Camouflaging Worm. IEEE Trans. Dependable Secur. Comput. 8(3): 377-390 (2011) - [j62]Nan Zhang, Wei Zhao:
Privacy-Preserving OLAP: An Information-Theoretic Approach. IEEE Trans. Knowl. Data Eng. 23(1): 122-138 (2011) - [c106]Qinyu Yang, Jie Yang, Wei Yu, Nan Zhang, Wei Zhao:
On a Hierarchical False Data Injection Attack on Power System State Estimation. GLOBECOM 2011: 1-5 - [c105]Dengyuan Wu, Xiuzhen Cheng, Dechang Chen, Wei Cheng, Biao Chen, Wei Zhao:
A Monte Carlo Method for Mobile Target Counting. ICDCS 2011: 750-759 - [c104]Aniket Pingley, Nan Zhang, Xinwen Fu, Hyeong-Ah Choi, Suresh Subramaniam, Wei Zhao:
Protection of query privacy for continuous location based services. INFOCOM 2011: 1710-1718 - [c103]Yinjie Chen, Zhongli Liu, Benyuan Liu, Xinwen Fu, Wei Zhao:
Identifying mobiles hiding behind wireless routers. INFOCOM 2011: 2651-2659 - 2010
- [j61]Jianjia Wu, Jyh-Charn Liu, Wei Zhao:
A General Framework for Parameterized Schedulability Bound Analysis of Real-Time Systems. IEEE Trans. Computers 59(6): 776-783 (2010) - [j60]Wei Yu, Nan Zhang, Xinwen Fu, Riccardo Bettati, Wei Zhao:
Localization Attacks to Internet Threat Monitors: Modeling and Countermeasures. IEEE Trans. Computers 59(12): 1655-1668 (2010) - [j59]Chengzhi Li, Wei Zhao:
Stochastic performance analysis of non-feedforward networks. Telecommun. Syst. 43(3-4): 237-252 (2010) - [j58]Shengquan Wang, Dong Xuan, Riccardo Bettati, Wei Zhao:
Toward statistical QoS guarantees in a differentiated services network. Telecommun. Syst. 43(3-4): 253-263 (2010) - [j57]Ye Zhu, Xinwen Fu, Bryan Graham, Riccardo Bettati, Wei Zhao:
Correlation-Based Traffic Analysis Attacks on Anonymity Networks. IEEE Trans. Parallel Distributed Syst. 21(7): 954-967 (2010) - [j56]Ming Li, Wei Zhao:
Representation of a Stochastic Traffic Bound. IEEE Trans. Parallel Distributed Syst. 21(9): 1368-1372 (2010) - [j55]Wei Yu, Nan Zhang, Xinwen Fu, Wei Zhao:
Self-Disciplinary Worms and Countermeasures: Modeling and Analysis. IEEE Trans. Parallel Distributed Syst. 21(10): 1501-1514 (2010) - [c102]Wei Li, Deng Li, Shuhui Yang, Zhiwei Xu, Wei Zhao:
Design and Analysis of a New GPS Algorithm. ICDCS 2010: 40-51 - [c101]Xiaole Bai, Ziqiu Yun, Dong Xuan, Weijia Jia, Wei Zhao:
Pattern Mutation in Wireless Sensor Deployment. INFOCOM 2010: 2480-2488
2000 – 2009
- 2009
- [j54]Yang Yang, Samuel Cheng, Zixiang Xiong, Wei Zhao:
Wyner-Ziv coding based on TCQ and LDPC codes. IEEE Trans. Commun. 57(2): 376-387 (2009) - [j53]Yang Yang, Vladimir Stankovic, Zixiang Xiong, Wei Zhao:
Two-Terminal Video Coding. IEEE Trans. Image Process. 18(3): 534-551 (2009) - [j52]Wei Yu, Xun Wang, Xinwen Fu, Dong Xuan, Wei Zhao:
An Invisible Localization Attack to Internet Threat Monitors. IEEE Trans. Parallel Distributed Syst. 20(11): 1611-1625 (2009) - [c100]Aniket Pingley, Wei Yu, Nan Zhang, Xinwen Fu, Wei Zhao:
CAP: A Context-Aware Privacy Protection System for Location-Based Services. ICDCS 2009: 49-57 - [c99]Xinwen Fu, Nan Zhang, Aniket Pingley, Wei Yu, Jie Wang, Wei Zhao:
The Digital Marauder's Map: A New Threat to Location Privacy. ICDCS 2009: 589-596 - 2008
- [j51]Hanxing Wang, Guilin Lu, Weijia Jia, Wei Zhao:
Connectivity in finite ad-hoc networks. Sci. China Ser. F Inf. Sci. 51(4): 417-424 (2008) - [j50]Yang Yang, Vladimir Stankovic, Zixiang Xiong, Wei Zhao:
On Multiterminal Source Code Design. IEEE Trans. Inf. Theory 54(5): 2278-2302 (2008) - [j49]Nan Zhang, Wei Zhao:
Privacy Protection Against Malicious Adversaries in Distributed Information Sharing Systems. IEEE Trans. Knowl. Data Eng. 20(8): 1028-1033 (2008) - [c98]Wei Yu, Nan Zhang, Xinwen Fu, Riccardo Bettati, Wei Zhao:
On localization attacks to Internet Threat Monitors: An information-theoretic framework. DSN 2008: 356-365 - [c97]Wei Wayne Li, Gaocai Wang, Wei Zhao:
Stochastic Analysis of Expected Schedulability for Real-Time Tasks on a Single Computing System. DS-RT 2008: 83-88 - [c96]Ryan Pries, Wei Yu, Xinwen Fu, Wei Zhao:
A New Replay Attack Against Anonymous Communication Networks. ICC 2008: 1578-1582 - [c95]Xun Wang, Wei Yu, Xinwen Fu, Dong Xuan, Wei Zhao:
iLOC: An invisible LOCalization Attack to Internet Threat Monitoring Systems. INFOCOM 2008: 1930-1938 - 2007
- [j48]Nan Zhang, Wei Zhao:
Privacy-Preserving Data Mining Systems. Computer 40(4): 52-58 (2007) - [j47]Ye Zhu, Xinwen Fu, Riccardo Bettati, Wei Zhao:
Analysis of flow-correlation attacks in anonymity network. Int. J. Secur. Networks 2(1/2): 137-153 (2007) - [j46]Chuan He, Guan Qin, Mi Lu, Wei Zhao:
Optimized high-order finite difference wave equations modeling on reconfigurable computing platform. Microprocess. Microsystems 31(2): 103-115 (2007) - [c94]Chuan He, Guan Qin, Richard E. Ewing, Wei Zhao:
High-Precision BLAS on FPGA-enhanced Computers. ERSA 2007: 107-116 - [c93]Yang Yang, Vladimir Stankovic, Wei Zhao, Zixiang Xiong:
Multiterminal Video Coding. ICIP (3) 2007: 25-28 - [c92]Jianjia Wu, Jyh-Charn Liu, Wei Zhao:
Utilization-Bound Based Schedulability Analysis of Weighted Round Robin Schedulers. RTSS 2007: 435-446 - [c91]Wei Yu, Xinwen Fu, Steve Graham, Dong Xuan, Wei Zhao:
DSSS-Based Flow Marking Technique for Invisible Traceback. S&P 2007: 18-32 - 2006
- [j45]Wei Yu, Sriram Chellappan, Dong Xuan, Wei Zhao:
Distributed policy processing in active-service based infrastructures. Int. J. Commun. Syst. 19(7): 727-750 (2006) - [j44]Weijia Jia, Hanxing Wang, Wanqing Tu, Wei Zhao:
A New delay control method for real-time flows. J. Comb. Optim. 12(1-2): 127-149 (2006) - [j43]Shengquan Wang, Zhibin Mai, Dong Xuan, Wei Zhao:
Design and Implementation of QoS-Provisioning System for Voice over IP. IEEE Trans. Parallel Distributed Syst. 17(3): 276-288 (2006) - [c90]Wei Yu, Xun Wang, Prasad Calyam, Dong Xuan, Wei Zhao:
On Detecting Camouflaging Worm. ACSAC 2006: 235-244 - [c89]Chuan He, Guan Qin, Mi Lu, Wei Zhao:
An Efficient Implementation of High-Accuracy Finite Difference Computing Engine on FPGAs. ASAP 2006: 95-98 - [c88]Ming Li, Shengquan Wang, Wei Zhao:
A Real-Time and Reliable Approach to Detecting Traffic Variations at Abnormally High and Low Rates. ATC 2006: 541-550 - [c87]Chuan He, Guan Qin, Mi Lu, Wei Zhao:
Group-Alignment based Accurate Floating-Point Summation on FPGAs. ERSA 2006: 136-142 - [c86]Chuan He, Guan Qin, Mi Lu, Wei Zhao:
An Optimized Finite Difference Computing Engine on FPGAs. FCCM 2006: 283-284 - [c85]Wei Zhao:
Challenges and Opportunities of Computer and Communication Systems Research. ICCCN 2006: 1-2 - [c84]Dan Cheng, Zhibin Mai, Jianjia Wu, Guan Qin, Wei Zhao:
A Service-Oriented Integrating Practice for Data Modeling, Analysis and Visualization. ICEBE 2006: 631-638 - [c83]Wei Yu, Nan Zhang, Wei Zhao:
Self-adaptive Worms and Countermeasures. SSS 2006: 548-562 - 2005
- [j42]Shengquan Wang, Dong Xuan, Wei Zhao:
Analyzing and enhancing the resilience of structured peer-to-peer systems. J. Parallel Distributed Comput. 65(2): 207-219 (2005) - [j41]Weijia Jia, Wanqing Tu, Wei Zhao, Gaochao Xu:
Multi-shared-trees based multicast routing control protocol using anycast selection. Parallel Algorithms Appl. 20(1): 69-84 (2005) - [j40]Rabi N. Mahapatra, Wei Zhao:
An Energy-Efficient Slack Distribution Technique for Multimode Distributed Real-Time Embedded Systems. IEEE Trans. Parallel Distributed Syst. 16(7): 650-662 (2005) - [c82]Ming Li, Wei Zhao:
A Statistical Model for Detecting Abnormality in Static-Priority Scheduling Networks with Differentiated Services. CIS (2) 2005: 267-272 - [c81]Yang Yang, Vladimir Stankovic, Zixiang Xiong, Wei Zhao:
On Multiterminal Source Code Design. DCC 2005: 43-52 - [c80]Chuan He, Wei Zhao, Mi Lu:
FPGA-Based High-Order Finite Difference Algorithm for 2D Acoustic Wave Propagation Problems. ERSA 2005: 267-273 - [c79]Chuan He, Wei Zhao, Mi Lu:
Time Domain Numerical Simulation for Transient Waves on Reconfigurable Coprocessor Platform. FCCM 2005: 127-136 - [c78]Ye Zhu, Xinwen Fu, Riccardo Bettati, Wei Zhao:
Anonymity analysis of mix networks against flow-correlation attacks. GLOBECOM 2005: 5 - [c77]Jan Mandel, Lynn S. Bennethum, Mingshi Chen, Janice L. Coen, Craig C. Douglas, Leopoldo P. Franca, Craig J. Johns, Minjeong Kim, Andrew V. Knyazev, Robert L. Kremens, Vaibhav Kulkarni, Guan Qin, Anthony Vodacek, Jianjia Wu, Wei Zhao, Adam Zornes:
Towards a Dynamic Data Driven Application System for Wildfire Simulation. International Conference on Computational Science (2) 2005: 632-639 - [c76]Hongyun Xu, Xinwen Fu, Ye Zhu, Riccardo Bettati, Jianer Chen, Wei Zhao:
SAS: A Scalar Anonymous Communication System. ICCNMC 2005: 452-461 - [c75]Xinwen Fu, Ye Zhu, Bryan Graham, Riccardo Bettati, Wei Zhao:
On Flow Marking Attacks in Wireless Anonymous Communication Networks. ICDCS 2005: 493-503 - [c74]Nan Zhang, Shengquan Wang, Wei Zhao:
A new scheme on privacy-preserving data classification. KDD 2005: 374-383 - [c73]Wei Zhao:
Effectiveness of Traffic Camouflaging over Computer Networks. NCA 2005: 7 - [c72]Nan Zhang, Wei Zhao, Jianer Chen:
Performance Measurements for Privacy Preserving Data Mining. PAKDD 2005: 43-49 - [c71]Shengquan Wang, Sangig Rho, Zhibin Mai, Riccardo Bettati, Wei Zhao:
Real-Time Component-Based Systems. IEEE Real-Time and Embedded Technology and Applications Symposium 2005: 428-437 - [c70]Jianjia Wu, Jyh-Charn Liu, Wei Zhao:
On Schedulability Bounds of Static Priority Schedulers. IEEE Real-Time and Embedded Technology and Applications Symposium 2005: 529-540 - [c69]Nan Zhang, Wei Zhao:
Distributed Privacy Preserving Information Sharing. VLDB 2005: 889-900 - [e2]Xicheng Lu, Wei Zhao:
Networking and Mobile Computing, Third International Conference, ICCNMC 2005, Zhangjiajie, China, August 2-4, 2005, Proceedings. Lecture Notes in Computer Science 3619, Springer 2005, ISBN 3-540-28102-9 [contents] - [e1]Laurence Tianruo Yang, Xingshe Zhou, Wei Zhao, Zhaohui Wu, Yian Zhu, Man Lin:
Embedded Software and Systems, Second International Conference, ICESS 2005, Xi'an, China, December 16-18, 2005, Proceedings. Lecture Notes in Computer Science 3820, Springer 2005, ISBN 3-540-30881-4 [contents] - 2004
- [j39]Shengquan Wang, Dong Xuan, Riccardo Bettati, Wei Zhao:
Providing absolute differentiated services for real-time applications in static-priority scheduling networks. IEEE/ACM Trans. Netw. 12(2): 326-339 (2004) - [j38]Weijia Jia, Dong Xuan, Wanqing Tu, Lidong Lin, Wei Zhao:
Distributed Admission Control for Anycast Flows. IEEE Trans. Parallel Distributed Syst. 15(8): 673-686 (2004) - [j37]Yong Guan, Xinwen Fu, Riccardo Bettati, Wei Zhao:
A quantitative analysis of anonymous communications. IEEE Trans. Reliab. 53(1): 103-115 (2004) - [c68]Jianjia Wu, Dan Cheng, Wei Zhao:
Detecting Grid-Abuse Attacks by Source-based Monitoring. PDCS 2004: 565-571 - [c67]Yang Yang, Vladimir Stankovic, Zixiang Xiong, Wei Zhao:
Asymmetric Code Design for Remote Multiterminal Source Coding. Data Compression Conference 2004: 572 - [c66]Nan Zhang, Wei Zhao, Jianer Chen:
Cardinality-based inference control in OLAP systems: an information theoretic approach. DOLAP 2004: 59-64 - [c65]Jan Mandel, Mingshi Chen, Leopoldo P. Franca, Craig J. Johns, Anatolii A. Puhalskii, Janice L. Coen, Craig C. Douglas, Robert L. Kremens, Anthony Vodacek, Wei Zhao:
A Note on Dynamic Data Driven Wildfire Modeling. International Conference on Computational Science 2004: 725-731 - [c64]Shengquan Wang, Ripal Nathuji, Riccardo Bettati, Wei Zhao:
Providing Statistical Delay Guarantees in Wireless Networks. ICDCS 2004: 48-55 - [c63]Yiping Shen, T. C. Lam, Jyh-Charn Liu, Wei Zhao:
On the Confidential Auditing of Distributed Computing Systems. ICDCS 2004: 600-607 - [c62]Xinwen Fu, Bryan Graham, Dong Xuan, Riccardo Bettati, Wei Zhao:
Empirical and Theoretical Evaluation of Active Probing Attacks and Their Countermeasures. Information Hiding 2004: 266-281 - [c61]Yong Xiong, Jyh-Charn Liu, Kang G. Shin, Wei Zhao:
On the Modeling and Optimization of Discontinuous Network Congestion Control Systems. INFOCOM 2004: 2812-2820 - [c60]Wei Yu, Thang Nam Le, Dong Xuan, Wei Zhao:
Query aggregation for providing efficient data services in sensor networks. MASS 2004: 31-40 - [c59]Ye Zhu, Xinwen Fu, Bryan Graham, Riccardo Bettati, Wei Zhao:
On Flow Correlation Attacks and Countermeasures in Mix Networks. Privacy Enhancing Technologies 2004: 207-225 - [c58]Nan Zhang, Shengquan Wang, Wei Zhao:
A New Scheme on Privacy Preserving Association Rule Mining. PKDD 2004: 484-495 - 2003
- [j36]Ming Li, Chi-Hung Chi, Weijia Jia, Wei Zhao, Wanlei Zhou, Jiannong Cao, Dongyang Long, Qiang Meng:
Decision Analysis of Statistically Detecting Distributed Denial-of-Service Flooding Attacks. Int. J. Inf. Technol. Decis. Mak. 2(3): 397-405 (2003) - [j35]Byung-Kyu Choi, Dong Xuan, Riccardo Bettati, Wei Zhao, Chengzhi Li:
Utilization-Based Admission Control for Scalable Real-Time Communication. Real Time Syst. 24(2): 171-202 (2003) - [j34]Joseph Kee-Yin Ng, Shibin Song, Wei Zhao:
Integrated End-to-End Delay Analysis for Regulated ATM Networks. Real Time Syst. 25(1): 93-124 (2003) - [j33]Wei Zhao:
Guest Editorial: Special Section on Security in Distributed Computing Systems. IEEE Trans. Parallel Distributed Syst. 14(9): 817 (2003) - [c57]Shengquan Wang, Dong Xuan, Wei Zhao:
On resilience of structured peer-to-peer systems. GLOBECOM 2003: 3851-3856 - [c56]Wei Yu, Dong Xuan, Sandeep K. Reddy, Riccardo Bettati, Wei Zhao:
Distributed Policy Processing in Virtual Private Operation Environment for Large Scale Networks. IAW 2003: 84-91 - [c55]Xinwen Fu, Bryan Graham, Riccardo Bettati, Wei Zhao:
On Countermeasures to Traffic Analysis Attacks. IAW 2003: 188-195 - [c54]Xinwen Fu, Bryan Graham, Riccardo Bettati, Wei Zhao:
On Effectiveness of Link Padding for Statistical Traffic Analysis Attacks. ICDCS 2003: 340- - [c53]Weijia Jia, Hanxing Wang, Maoning Tang, Wei Zhao:
Effective Delay Control for High Rate Heterogeneous Real-time Flows. ICDCS 2003: 367- - [c52]Xinwen Fu, Bryan Graham, Riccardo Bettati, Wei Zhao, Dong Xuan:
Analytical and Empirical Analysis of Countermeasures to Traffic Analysis Attacks. ICPP 2003: 483-492 - [c51]Zhibin Mai, Shengquan Wang, Dong Xuan, Wei Zhao:
Group aggregation for scalable anycast routing. IPCCC 2003: 33-40 - [c50]Shengquan Wang, Dong Xuan, Riccardo Bettati, Wei Zhao:
A Study of Providing Statistical QoS in a Differentiated Sevices Network. NCA 2003: 297-304 - 2002
- [j32]Weijia Jia, Gaochao Xu, Wei Zhao, Pui-on Au:
Efficient Internet Multicast Routing Using Anycast Path Selection. J. Netw. Syst. Manag. 10(4): 417-438 (2002) - [c49]Yong Guan, Xinwen Fu, Riccardo Bettati, Wei Zhao:
An Optimal Strategy for Anonymous Communication Protocols. ICDCS 2002: 257-266 - [c48]Weijia Jia, Pui-on Au, Gaochao Xu, Wei Zhao:
Scalable Multicast Routing Protocol Using Anycast and Hierarchical-Trees. LCN 2002: 572-581 - [c47]Shengquan Wang, Zhibin Mai, Walt Magnussen, Dong Xuan, Wei Zhao:
Implementation of QoS-Provisioning System for Voice over IP. IEEE Real Time Technology and Applications Symposium 2002: 266-275 - [c46]Seong-ryong Kang, Hoh Peter In, Wei Zhao:
SmartClick: An Enabler for Human-Centered Wireless Web Service. WECWIS 2002: 187-194 - 2001
- [j31]Ming Li, Weijia Jia, Wei Zhao:
Simulation of Long-Range Dependent Traffic and a Simulator of TCP Arrival Traffic. J. Interconnect. Networks 2(3): 305-315 (2001) - [j30]Wei Zhao:
Challenges in Design and Implementation of Middlewares for Real-Time Systems: Guest Editor's Introduction. Real Time Syst. 20(2): 115-116 (2001) - [j29]Shu Jiang, Nitin H. Vaidya, Wei Zhao:
Energy Consumption of Traffic Padding Schemes in Wireless Ad Hoc Networks. Parallel Distributed Comput. Pract. 4(2) (2001) - [j28]Xiaohua Jia, Wei Zhao, Jie Li:
An integrated routing and admission control mechanism for real-time multicast connections in ATM networks. IEEE Trans. Commun. 49(9): 1515-1519 (2001) - [j27]Yong Guan, Xinwen Fu, Dong Xuan, P. U. Shenoy, Riccardo Bettati, Wei Zhao:
NetCamo: camouflaging network traffic for QoS-guaranteed mission critical applications. IEEE Trans. Syst. Man Cybern. Part A 31(4): 253-265 (2001) - [c45]Weijia Jia, Gaochao Xu, Wei Zhao:
Integrated Routing for Multicast and Anycast Messages. ICPP 2001: 561-570 - [c44]Shengquan Wang, Dong Xuan, Riccardo Bettati, Wei Zhao:
Providing Absolute Differentiated Services for Real-Time Application in Static-Priority Scheduling Networks. INFOCOM 2001: 669-678 - [c43]Shengquan Wang, Dong Xuan, Riccardo Bettati, Wei Zhao:
Providing Absolute Differentiated Services with Statistical Guarantees in Static-Priority Scheduling Networks. IEEE Real Time Technology and Applications Symposium 2001: 127-129 - [c42]Shengquan Wang, Dong Xuan, Riccardo Bettati, Wei Zhao:
Differentiated Services with Statistical Real-Time Guarantees in Static-Priority Scheduling Networks. RTSS 2001: 289-298 - 2000
- [j26]Weijia Jia, Dong Xuan, Wei Zhao:
Integrated routing algorithms for anycast messages. IEEE Commun. Mag. 38(1): 48-53 (2000) - [j25]Joseph Kee-Yin Ng, Shibin Song, Wei Zhao:
Statistical delay analysis on an ATM switch with self-similar input traffic. Inf. Process. Lett. 74(3-4): 163-173 (2000) - [j24]Dong Xuan, Weijia Jia, Wei Zhao, Hongwen Zhu:
A Routing Protocol for Anycast Messages. IEEE Trans. Parallel Distributed Syst. 11(6): 571-588 (2000) - [c41]Byung-Kyu Choi, Dong Xuan, Chengzhi Li, Riccardo Bettati, Wei Zhao:
Scalable QoS Guaranteed Communication Services for Real-Time Applications. ICDCS 2000: 180-187 - [c40]Dong Xuan, Chengzhi Li, Riccardo Bettati, Jianer Chen, Wei Zhao:
Utilization-Based Admission Control for Real-Time Applications. ICPP 2000: 251-262 - [c39]Ming Li, Weijia Jia, Wei Zhao:
A Whole Correlation Structure of Asymptotically Self-Similar Traffic in Communication Networks. WISE 2000: 480-485
1990 – 1999
- 1999
- [j23]Weijia Jia, Wei Zhao:
Efficient Connection Admission Control Algorithms for Adaptive QoS Real-Time Connections over ATM Networks. Eur. Trans. Telecommun. 10(2): 135-151 (1999) - [j22]Weijia Jia, Wei Zhao:
Efficient Connection Admission Control Algorithms for Adaptive QoS Real-Time Connections over ATM Networks. Eur. Trans. Telecommun. 10(3): 325-341 (1999) - [j21]Joseph Kee-Yin Ng, Shibin Song, Chengzhi Li, Wei Zhao:
A new method for integrated end-to-end delay analysis in ATM networks. J. Commun. Networks 1(3): 189-200 (1999) - [j20]Amitava Raha, Sanjay Kamat, Xiaohua Jia, Wei Zhao:
Using Traffic Regulation to Meet End-to-End Deadlines in ATM Networks. IEEE Trans. Computers 48(9): 917-935 (1999) - [j19]Weijia Jia, Wei Zhao, Dong Xuan, Gaochao Xu:
An Efficient Fault-Tolerant Multicast Routing Protocol with Core-Based Tree Techniques. IEEE Trans. Parallel Distributed Syst. 10(10): 984-1000 (1999) - [c38]Chengzhi Li, Riccardo Bettati, Wei Zhao:
New Delay Analysis in High Speed Networks. ICPP 1999: 454-461 - [c37]Weijia Jia, Gaochao Xu, Dong Xuan, Wei Zhao:
An Efficient Fault-Tolerant Multicast Routing Protocol with Core-Based Tree Techniques. ICPP 1999: 508-515 - [c36]Riccardo Bettati, Wei Zhao, D. Teodor:
Real-time Intrusion Detection and Suppression in ATM Networks. Workshop on Intrusion Detection and Network Monitoring 1999: 111-118 - [c35]B. Devalla, Riccardo Bettati, Wei Zhao:
Fault Tolerant Real-Time Connection Admission Control for Mission Critical Applications over ATM-Based Networks . RTCSA 1999: 340-347 - 1998
- [c34]Dong Xuan, Weijia Jia, Wei Zhao:
Routing Algorithms for Anycast Messages. ICPP 1998: 122-131 - [c33]Chengzhi Li, Riccardo Bettati, Wei Zhao:
Response Time Analysis for Distributed Real-Time Systems with Bursty Job Arrivals. ICPP 1998: 432-440 - 1997
- [j18]Biao Chen, Sanjay Kamat, Wei Zhao:
Fault-Tolerant, Real-Time Communication in FDDI-Based Networks. Computer 30(4): 83-90 (1997) - [c32]Biao Chen, Anirudha Sahoo, Wei Zhao, Amitava Raha:
Connection-Oriented Communications for Real-Time Applications in FDDI-ATM-FDDI Heterogeneous Networks. ICDCS 1997: 225-234 - [c31]Chengzhi Li, Amitava Raha, Wei Zhao:
Stability in ATM Networks. INFOCOM 1997: 160-167 - [c30]Chengzhi Li, Riccardo Bettati, Wei Zhao:
Static priority scheduling for ATM networks. RTSS 1997: 264-273 - [c29]Joseph Kee-Yin Ng, Shibin Song, Wei Zhao:
Integrated delay analysis of regulated ATM switch. RTSS 1997: 285-296 - 1996
- [j17]Nicholas Malcolm, Sanjay Kamat, Wei Zhao:
Real-Time Communication in FDDI Networks. Real Time Syst. 10(1): 75-107 (1996) - [j16]Sanjay Kamat, Wei Zhao:
An Efficient Optimal Reconfiguration Algorithm for FDDI-Based Networks. IEEE Trans. Parallel Distributed Syst. 7(4): 411-424 (1996) - [c28]Biao Chen, H. Li, Wei Zhao:
Meeting Delay Requirements in Computer Networks with Wormhole Routing. ICDCS 1996: 125-132 - [c27]Amitava Raha, Sanjay Kamat, Wei Zhao:
Admission Control for Hard Real-Time Connections in ATM LANs. INFOCOM 1996: 180-188 - [c26]Fang Feng, Cen Li, Amitava Raha, Shiqian Yu, Wei Zhao:
Modeling and Regulation of Host Traffic in ATM Networks. LCN 1996: 458-467 - 1995
- [j15]Nicholas Malcolm, Wei Zhao:
Hard Real-Time Communication in Multiple-Access Networks. Real Time Syst. 8(1): 35-77 (1995) - [c25]Amitava Raha, Sanjay Kamat, Wei Zhao:
Guaranteeing End-to-End Deadlines in ATM Networks. ICDCS 1995: 60-68 - [c24]Amitava Raha, Nicholas Malcolm, Wei Zhao:
Hard real-time communications with weighted round robin service in ATM local area networks. ICECCS 1995: 96- - [c23]Amitava Raha, Sanjay Kamat, Wei Zhao:
Using traffic regulation to meet end-to-end deadlines in ATM LANs. ICNP 1995: 152- - [c22]Fang Feng, Sanjay Kamat, Wei Zhao:
Guaranteeing application-to-application deadlines in distributed real-time systems. LCN 1995: 296-305 - [c21]Biao Chen, Sanjay Kamat, Wei Zhao:
Fault-tolerant Real-Time Communication in FDDI-Based Networks. RTSS 1995: 141-150 - 1994
- [j14]Nicholas Malcolm, Wei Zhao:
The Timed-Token Protocol for Real-Time Communications. Computer 27(1): 35-41 (1994) - [j13]Gopal Agrawal, Biao Chen, Wei Zhao, Sadegh Davari:
Guaranteeing Synchronous Message Deadlines with the Timed Token Medium Access Control Protocol. IEEE Trans. Computers 43(3): 327-339 (1994) - [c20]Sanjay Kamat, Gopal Agrawal, Wei Zhao:
On Available Bandwidth in FDDI-Based Reconfigurable Networks. INFOCOM 1994: 1390-1397 - [c19]Amitava Raha, Nicholas Malcolm, Wei Zhao:
Performance Evaluation of Admission Policies in ATM Based Embedded Real-Time Systems. LCN 1994: 129-138 - 1993
- [c18]Wei Zhao:
Predictability and Scalability of Real-Time Scheduling. RTS 1993: 137 - [c17]Sanjay Kamat, Wei Zhao:
Real-Time Schedulability of Two Token Ring Protocols. ICDCS 1993: 347-354 - [c16]Gopal Agrawal, Biao Chen, Wei Zhao:
Local Synchronous Capacity Allocation Schemes for Guaranteeing Message Deadlines with the Timed Token Protocol. INFOCOM 1993: 186-193 - [c15]Nicholas Malcolm, Wei Zhao:
Guaranteeing synchronous messages with arbitrary deadline constraints in an FDDI network. LCN 1993: 186-195 - [c14]Sanjay Kamat, Nicholas Malcolm, Wei Zhao:
Performance Evaluation of a Bandwidth Allocation Scheme for Guaranteeing Synchronous Messages with Arbitrary Deadlines in an FDDI Network. RTSS 1993: 34-43 - 1992
- [j12]Edwin K. P. Chong, Wei Zhao:
User-controlled optimization of task scheduling for imprecise computer systems. Inf. Softw. Technol. 34(4): 263-275 (1992) - [j11]Swaminathan Natarajan, Wei Zhao:
Issues in Building Dynamic Real-Time Systems. IEEE Softw. 9(5): 16-21 (1992) - [c13]Gopal Agrawal, Biao Chen, Wei Zhao, Sadegh Davari:
Guaranteeing Synchronous Message Deadlines with the Timed Token Protocol. ICDCS 1992: 468-475 - [c12]Nicholas Malcolm, Wei Zhao:
Advances in hard real-time communication with local area networks. LCN 1992: 548-557 - [c11]Biao Chen, Gopal Agrawal, Wei Zhao:
Optimal synchronous capacity allocation for hard real-time communications with the timed token protocol. RTSS 1992: 198-207 - 1991
- [j10]Jane W.-S. Liu, Kwei-Jay Lin, Wei-Kuan Shih, Albert Chuang-shi Yu, Jen-Yao Chung, Wei Zhao:
Algorithms for Scheduling Imprecise Computations. Computer 24(5): 58-68 (1991) - [j9]Edwin K. P. Chong, Wei Zhao:
Performance evaluation of scheduling algorithms for imprecise computer systems. J. Syst. Softw. 15(3): 261-277 (1991) - [c10]Cheng-Chew Lim, Lijun Yao, Wei Zhao:
A comparative study of three token ring protocols for real-time communications. ICDCS 1991: 308-317 - [c9]Lijun Yao, Wei Zhao:
Performance of an Extended IEEE 802.5 Protocol in Hard Real-Time Systems. INFOCOM 1991: 469-478 - [c8]Nicholas Malcolm, Wei Zhao:
Version selection schemes for hard real-time communications. RTSS 1991: 12-21 - 1990
- [j8]Wei Zhao, John A. Stankovic, Krithi Ramamritham:
A Window Protocol for Transmission of Time-Constrained Messages. IEEE Trans. Computers 39(9): 1186-1203 (1990) - [c7]Chris D. Marlin, Wei Zhao, Graeme Doherty, Andrew Bohonis:
GARTL: A Real-time Programming Language Based on Multi-version Computation. ICCL 1990: 107-115 - [c6]Nicholas Malcolm, Wei Zhao, Chris J. Barter:
Guarantee Protocols for Communication in Distributed Hard Real-Time Systems. INFOCOM 1990: 1078-1086
1980 – 1989
- 1989
- [j7]Wei Zhao:
Guest Editor's Introduction - Special Issue on Real-Time Computing Systems. ACM SIGOPS Oper. Syst. Rev. 23(3): 12-13 (1989) - [j6]Krithi Ramamritham, John A. Stankovic, Wei Zhao:
Distributed Scheduling of Tasks with Deadlines and Resource Requirements. IEEE Trans. Computers 38(8): 1110-1123 (1989) - [c5]Wei Zhao, John A. Stankovic:
Performance Analysis of FCFS and Improved FCFS Scheduling Algorithms for Dynamic Real-Time Computer Systems. RTSS 1989: 156-165 - 1988
- [j5]John A. Stankovic, Wei Zhao:
On Real-Time Transactions. SIGMOD Rec. 17(1): 4-18 (1988) - [c4]Wei Zhao, John A. Stankovic, Krithi Ramamritham:
A Multi-Access Window Protocol for Transmission of Time Constrained Messages. ICDCS 1988: 384-392 - 1987
- [j4]Wei Zhao, Krithi Ramamritham:
Simple and integrated heuristic algorithms for scheduling tasks with time and resource constraints. J. Syst. Softw. 7(3): 195-205 (1987) - [j3]Wei Zhao, Krithi Ramamritham, John A. Stankovic:
Preemptive Scheduling Under Time and Resource Constraints. IEEE Trans. Computers 36(8): 949-960 (1987) - [j2]Wei Zhao, Krithi Ramamritham, John A. Stankovic:
Scheduling Tasks with Resource Requirements in Hard Real-Time Systems. IEEE Trans. Software Eng. 13(5): 564-577 (1987) - [j1]Wei Zhao, Krithi Ramamritham:
Virtual Time CSMA Protocols for Hard Real-Time Communication. IEEE Trans. Software Eng. 13(8): 938-952 (1987) - [c3]Krithi Ramamritham, John A. Stankovic, Wei Zhao:
Meta-Level Control in Distributed Real-Time Systems. ICDCS 1987: 10-17 - 1986
- [c2]Wei Zhao, Krithi Ramamritham:
A Virtual Time CSMA Protocol for Hard Real Time Communication. RTSS 1986: 120-127 - 1985
- [c1]Wei Zhao, Krithi Ramamritham:
Distributed Scheduling Using Bidding and Focused Addressing. RTSS 1985: 103-111
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-14 21:00 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint