Feng Zhu Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo

41EEAgnes Hui Chan, Rajmohan Rajaraman, Zhifeng Sun, Feng Zhu: Approximation Algorithms for Key Management in Secure Multicast. COCOON 2009: 148-157
40EEFeng Zhu, Wei Zhu: RationalExposure: a Game Theoretic Approach to Optimize Identity Exposure in Pervasive Computing Environments. PerCom 2009: 1-8
39EEAgnes Hui Chan, Rajmohan Rajaraman, Zhifeng Sun, Feng Zhu: Approximation Algorithms for Key Management in Secure Multicast CoRR abs/0904.4061: (2009)
38EEFeng Zhu, Guangying Chen, Xin Chen, Yihua Yuan, Meizhen Huang, Wenzhou Xiang, Huili Sun: Structural Elucidation of Three Anthraquinones from a Marine-Derived Mangrove Endophytic Fungus (Isolate 1850). BMEI (1) 2008: 664-667
37EEAi-Guo Wu, Feng Zhu, Guang-Ren Duan, Ying Zhang: Solving the generalized Sylvester matrix equation AV + BW = EVF via a Kronecker map. Appl. Math. Lett. 21(10): 1069-1073 (2008)
36EEAgustinus Borgy Waluyo, Feng Zhu, David Taniar, Bala Srinivasan, J. Wenny Rahayu: Multiple Entity Types Wireless Broadcast Database System. AINA 2007: 179-186
35EELei He, Chuanjiang Luo, Feng Zhu, Yingming Hao, Jinjun Ou, Jing Zhou: Depth Map Regeneration via Improved Graph Cuts Using a Novel Omnidirectional Stereo Sensor. ICCV 2007: 1-8
34EEYang Du, Tian Xia, Yufei Tao, Donghui Zhang, Feng Zhu: On Multidimensional k-Anonymity with Local Recoding Generalization. ICDE 2007: 1422-1424
33 Lei He, Feng Zhu, Yingming Hao: A Comparative Study on Pose Estimation for Monocular Vision and Binocular Vision Without Modeling. IPCV 2007: 627-631
32EELei He, Chuanjiang Luo, Yanfeng Geng, Feng Zhu, Yingming Hao: Reliable Depth Map Regeneration Via a Novel Omnidirectional Stereo Sensor. ISVC (1) 2007: 278-287
31EEFeng Zhu, Wei Zhu, Matt W. Mutka, Lionel M. Ni: Private and Secure Service Discovery via Progressive and Probabilistic Exposure. IEEE Trans. Parallel Distrib. Syst. 18(11): 1565-1577 (2007)
30EEFeng Zhu, Xianda Zhang, Yafeng Hu, Deguang Xie: Nonstationary Hidden Markov Models for Multiaspect Discriminative Feature Extraction From Radar Targets. IEEE Transactions on Signal Processing 55(5-2): 2203-2214 (2007)
29EEChuanjiang Luo, Feng Zhu, Zelin Shi: Reliable Omnidirectional Depth Map Generation for Indoor Mobile Robot Navigation Via a Single Perspective Camera. ICAT 2006: 1283-1292
28EETingbo Hou, Junwen Wang, Feng Zhu, Zelin Shi: 3D Reconstruction Based on Pseudo-Linearization and Errors-in-Variables Model. ICAT Workshops 2006: 104-109
27EETingbo Hou, Feng Zhu, Zelin Shi: Estimation of the Fundamental Matrix Based on EV Mode. ICPR (1) 2006: 679-682
26EEFeng Zhu, Yafeng Hu, Xianda Zhang, Deguang Xie: Hidden Markov Model Networks for Multiaspect Discriminative Features Extraction from Radar Targets. ISNN (1) 2006: 1406-1411
25EEFeng Zhu, Yafeng Hu, Saiyi Wang, Peng Wei: The BP Network for Carrier Frequency Offset Estimation in OFDM-Based WLANs. ISNN (2) 2006: 144-149
24EEYafeng Hu, Feng Zhu, Hairong Lv, Xianda Zhang: Handwritten Digit Recognition Using Low Rank Approximation Based Competitive Neural Network. ISNN (2) 2006: 287-292
23EEChuanjiang Luo, Liancheng Su, Feng Zhu, Zelin Shi: A Versatile Method for Omnidirectional Stereo Camera Calibration Based on BP Algorithm. ISNN (2) 2006: 383-389
22EEFeng Zhu, Matt W. Mutka, Lionel M. Ni: The Master Key: A Private Authentication Approach for Pervasive Computing Environments. PerCom 2006: 212-221
21EEFeng Zhu, Ke-Zhang Chen, Xin-An Feng: Visualized CAD models of objects made of a multiphase perfect material. Advances in Engineering Software 37(1): 20-31 (2006)
20EEFeng Zhu, Matt W. Mutka, Lionel M. Ni: A Private, Secure, and User-Centric Information Exposure Model for Service Discovery Protocols. IEEE Trans. Mob. Comput. 5(4): 418-429 (2006)
19EEDuncan S. Wong, Agnes Hui Chan, Feng Zhu: Password Authenticated Key Exchange for Resource-Constrained Wireless Communications (Extended Abstract). ICN (2) 2005: 827-834
18EEFeng Zhu, Xiaowei Sun, Betty Salzberg, Svein-Olaf Hvasshovd: Supporting Load Balancing and Efficient Reorganization During System Scaling. IPDPS 2005
17EEFeng Zhu, Shouli Yan, Jingyu Hu, Edgar Sánchez-Sinencio: Feedforward reversed nested Miller compensation techniques for three-stage amplifiers. ISCAS (3) 2005: 2575-2578
16EEYafeng Hu, Feng Zhu, Xianda Zhang: A Novel Approach for License Plate Recognition Using Subspace Projection and Probabilistic Neural Network. ISNN (2) 2005: 216-221
15EEFeng Zhu, Wei Zhu, Matt W. Mutka, Lionel M. Ni: Expose or Not? A Progressive Exposure Approach for Service Discovery in Pervasive Computing Environments. PerCom 2005: 225-234
14EEWei-Tek Tsai, Lian Yu, Feng Zhu, Raymond A. Paul: Rapid Embedded System Testing Using Verification Patterns. IEEE Software 22(4): 68-75 (2005)
13EEFeng Zhu, Matt W. Mutka, Lionel M. Ni: Facilitating secure ad hoc service discovery in public environments. Journal of Systems and Software 76(1): 45-54 (2005)
12EEChuan Zhou, Dalong Tan, Feng Zhu: A high-precision binocular method for model-based pose estimation. ICARCV 2004: 1067-1071
11EEFeili Hou, Feng Zhu: Filter Algorithm for 3D Pose Estimation of Maneuvering Target. ICPR (2) 2004: 140-144
10EEFeng Zhu, Matt W. Mutka, Lionel M. Ni: PrudentExposure: A Private and User-centric Service Discovery Protocol. PerCom 2004: 329-340
9EEFeng Zhu, Matt W. Mutka, Lionel M. Ni: Facilitating Secure Ad hoc Service Discovery in Public Environments. COMPSAC 2003: 433-
8EEWei-Tek Tsai, Lian Yu, Feng Zhu, Raymond A. Paul: Rapid Verification of Embedded Systems Using Patterns. COMPSAC 2003: 466-471
7 Wei-Tek Tsai, Feng Zhu, Lian Yu, Raymond A. Paul, Chun Fan: Verification Patterns for Rapid Embedded System Verification. Embedded Systems and Applications 2003: 310-316
6EEDuncan S. Wong, Agnes Hui Chan, Feng Zhu: More Efficient Password Authenticated Key Exchange Based on RSA. INDOCRYPT 2003: 375-387
5EEFeng Zhu, Matt W. Mutka, Lionel M. Ni: Splendor: A Secure, Private, and Location-Aware Service Discovery Protocol Supporting Mobile Services. PerCom 2003: 235-242
4EEFeng Zhu, Duncan S. Wong, Agnes Hui Chan, Robbie Ye: Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks. ISC 2002: 150-161
3EEFeng Zhu, Wei-Tek Tsai: Framework-Oriented Analysis. COMPSAC 1998: 324-329
2EEFeng Zhu, Sanjai Rayadurgam, Wei-Tek Tsai: Automating Regression Testing for Real-Time Software in a Distributed Environment. ISORC 1998: 373-382
1 Feng Zhu, Bao-An Guo: A multiplication-addition structure against differential attack. ICICS 1997: 247-257

Coauthor Index

1Agnes Hui Chan [4] [6] [19] [39] [41]
2Guangying Chen [38]
3Ke-Zhang Chen [21]
4Xin Chen [38]
5Yang Du [34]
6Guang-Ren Duan [37]
7Chun Fan [7]
8Xin-An Feng [21]
9Yanfeng Geng [32]
10Bao-An Guo [1]
11Yingming Hao [32] [33] [35]
12Lei He [32] [33] [35]
13Feili Hou [11]
14Tingbo Hou [27] [28]
15Jingyu Hu [17]
16Yafeng Hu [16] [24] [25] [26] [30]
17Meizhen Huang [38]
18Svein-Olaf Hvasshovd [18]
19Chuanjiang Luo [23] [29] [32] [35]
20Hairong Lv [24]
21Matt W. Mutka [5] [9] [10] [13] [15] [20] [22] [31]
22Lionel M. Ni [5] [9] [10] [13] [15] [20] [22] [31]
23Jinjun Ou [35]
24Raymond A. Paul [7] [8] [14]
25J. Wenny Rahayu [36]
26Rajmohan Rajaraman [39] [41]
27Sanjai Rayadurgam [2]
28Betty Salzberg [18]
29Edgar Sánchez-Sinencio [17]
30Zelin Shi [23] [27] [28] [29]
31Bala Srinivasan [36]
32Liancheng Su [23]
33Huili Sun [38]
34Xiaowei Sun [18]
35Zhifeng Sun [39] [41]
36Dalong Tan [12]
37David Taniar [36]
38Yufei Tao [34]
39Wei-Tek Tsai [2] [3] [7] [8] [14]
40Agustinus Borgy Waluyo [36]
41Junwen Wang [28]
42Saiyi Wang [25]
43Peng Wei [25]
44Duncan S. Wong [4] [6] [19]
45Ai-Guo Wu [37]
46Tian Xia [34]
47Wenzhou Xiang [38]
48Deguang Xie [26] [30]
49Shouli Yan [17]
50Robbie Ye [4]
51Lian Yu [7] [8] [14]
52Yihua Yuan [38]
53Donghui Zhang [34]
54Xianda Zhang [16] [24] [26] [30]
55Ying Zhang [37]
56Chuan Zhou [12]
57Jing Zhou [35]
58Wei Zhu [15] [31] [40]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)