2009 |
39 | EE | Agnes Hui Chan,
Rajmohan Rajaraman,
Zhifeng Sun,
Feng Zhu:
Approximation Algorithms for Key Management in Secure Multicast
CoRR abs/0904.4061: (2009) |
2008 |
38 | EE | Feng Zhu,
Guangying Chen,
Xin Chen,
Yihua Yuan,
Meizhen Huang,
Wenzhou Xiang,
Huili Sun:
Structural Elucidation of Three Anthraquinones from a Marine-Derived Mangrove Endophytic Fungus (Isolate 1850).
BMEI (1) 2008: 664-667 |
37 | EE | Ai-Guo Wu,
Feng Zhu,
Guang-Ren Duan,
Ying Zhang:
Solving the generalized Sylvester matrix equation AV + BW = EVF via a Kronecker map.
Appl. Math. Lett. 21(10): 1069-1073 (2008) |
2007 |
36 | EE | Agustinus Borgy Waluyo,
Feng Zhu,
David Taniar,
Bala Srinivasan,
J. Wenny Rahayu:
Multiple Entity Types Wireless Broadcast Database System.
AINA 2007: 179-186 |
35 | EE | Lei He,
Chuanjiang Luo,
Feng Zhu,
Yingming Hao,
Jinjun Ou,
Jing Zhou:
Depth Map Regeneration via Improved Graph Cuts Using a Novel Omnidirectional Stereo Sensor.
ICCV 2007: 1-8 |
34 | EE | Yang Du,
Tian Xia,
Yufei Tao,
Donghui Zhang,
Feng Zhu:
On Multidimensional k-Anonymity with Local Recoding Generalization.
ICDE 2007: 1422-1424 |
33 | | Lei He,
Feng Zhu,
Yingming Hao:
A Comparative Study on Pose Estimation for Monocular Vision and Binocular Vision Without Modeling.
IPCV 2007: 627-631 |
32 | EE | Lei He,
Chuanjiang Luo,
Yanfeng Geng,
Feng Zhu,
Yingming Hao:
Reliable Depth Map Regeneration Via a Novel Omnidirectional Stereo Sensor.
ISVC (1) 2007: 278-287 |
31 | EE | Feng Zhu,
Wei Zhu,
Matt W. Mutka,
Lionel M. Ni:
Private and Secure Service Discovery via Progressive and Probabilistic Exposure.
IEEE Trans. Parallel Distrib. Syst. 18(11): 1565-1577 (2007) |
30 | EE | Feng Zhu,
Xianda Zhang,
Yafeng Hu,
Deguang Xie:
Nonstationary Hidden Markov Models for Multiaspect Discriminative Feature Extraction From Radar Targets.
IEEE Transactions on Signal Processing 55(5-2): 2203-2214 (2007) |
2006 |
29 | EE | Chuanjiang Luo,
Feng Zhu,
Zelin Shi:
Reliable Omnidirectional Depth Map Generation for Indoor Mobile Robot Navigation Via a Single Perspective Camera.
ICAT 2006: 1283-1292 |
28 | EE | Tingbo Hou,
Junwen Wang,
Feng Zhu,
Zelin Shi:
3D Reconstruction Based on Pseudo-Linearization and Errors-in-Variables Model.
ICAT Workshops 2006: 104-109 |
27 | EE | Tingbo Hou,
Feng Zhu,
Zelin Shi:
Estimation of the Fundamental Matrix Based on EV Mode.
ICPR (1) 2006: 679-682 |
26 | EE | Feng Zhu,
Yafeng Hu,
Xianda Zhang,
Deguang Xie:
Hidden Markov Model Networks for Multiaspect Discriminative Features Extraction from Radar Targets.
ISNN (1) 2006: 1406-1411 |
25 | EE | Feng Zhu,
Yafeng Hu,
Saiyi Wang,
Peng Wei:
The BP Network for Carrier Frequency Offset Estimation in OFDM-Based WLANs.
ISNN (2) 2006: 144-149 |
24 | EE | Yafeng Hu,
Feng Zhu,
Hairong Lv,
Xianda Zhang:
Handwritten Digit Recognition Using Low Rank Approximation Based Competitive Neural Network.
ISNN (2) 2006: 287-292 |
23 | EE | Chuanjiang Luo,
Liancheng Su,
Feng Zhu,
Zelin Shi:
A Versatile Method for Omnidirectional Stereo Camera Calibration Based on BP Algorithm.
ISNN (2) 2006: 383-389 |
22 | EE | Feng Zhu,
Matt W. Mutka,
Lionel M. Ni:
The Master Key: A Private Authentication Approach for Pervasive Computing Environments.
PerCom 2006: 212-221 |
21 | EE | Feng Zhu,
Ke-Zhang Chen,
Xin-An Feng:
Visualized CAD models of objects made of a multiphase perfect material.
Advances in Engineering Software 37(1): 20-31 (2006) |
20 | EE | Feng Zhu,
Matt W. Mutka,
Lionel M. Ni:
A Private, Secure, and User-Centric Information Exposure Model for Service Discovery Protocols.
IEEE Trans. Mob. Comput. 5(4): 418-429 (2006) |
2005 |
19 | EE | Duncan S. Wong,
Agnes Hui Chan,
Feng Zhu:
Password Authenticated Key Exchange for Resource-Constrained Wireless Communications (Extended Abstract).
ICN (2) 2005: 827-834 |
18 | EE | Feng Zhu,
Xiaowei Sun,
Betty Salzberg,
Svein-Olaf Hvasshovd:
Supporting Load Balancing and Efficient Reorganization During System Scaling.
IPDPS 2005 |
17 | EE | Feng Zhu,
Shouli Yan,
Jingyu Hu,
Edgar Sánchez-Sinencio:
Feedforward reversed nested Miller compensation techniques for three-stage amplifiers.
ISCAS (3) 2005: 2575-2578 |
16 | EE | Yafeng Hu,
Feng Zhu,
Xianda Zhang:
A Novel Approach for License Plate Recognition Using Subspace Projection and Probabilistic Neural Network.
ISNN (2) 2005: 216-221 |
15 | EE | Feng Zhu,
Wei Zhu,
Matt W. Mutka,
Lionel M. Ni:
Expose or Not? A Progressive Exposure Approach for Service Discovery in Pervasive Computing Environments.
PerCom 2005: 225-234 |
14 | EE | Wei-Tek Tsai,
Lian Yu,
Feng Zhu,
Raymond A. Paul:
Rapid Embedded System Testing Using Verification Patterns.
IEEE Software 22(4): 68-75 (2005) |
13 | EE | Feng Zhu,
Matt W. Mutka,
Lionel M. Ni:
Facilitating secure ad hoc service discovery in public environments.
Journal of Systems and Software 76(1): 45-54 (2005) |
2004 |
12 | EE | Chuan Zhou,
Dalong Tan,
Feng Zhu:
A high-precision binocular method for model-based pose estimation.
ICARCV 2004: 1067-1071 |
11 | EE | Feili Hou,
Feng Zhu:
Filter Algorithm for 3D Pose Estimation of Maneuvering Target.
ICPR (2) 2004: 140-144 |
10 | EE | Feng Zhu,
Matt W. Mutka,
Lionel M. Ni:
PrudentExposure: A Private and User-centric Service Discovery Protocol.
PerCom 2004: 329-340 |
2003 |
9 | EE | Feng Zhu,
Matt W. Mutka,
Lionel M. Ni:
Facilitating Secure Ad hoc Service Discovery in Public Environments.
COMPSAC 2003: 433- |
8 | EE | Wei-Tek Tsai,
Lian Yu,
Feng Zhu,
Raymond A. Paul:
Rapid Verification of Embedded Systems Using Patterns.
COMPSAC 2003: 466-471 |
7 | | Wei-Tek Tsai,
Feng Zhu,
Lian Yu,
Raymond A. Paul,
Chun Fan:
Verification Patterns for Rapid Embedded System Verification.
Embedded Systems and Applications 2003: 310-316 |
6 | EE | Duncan S. Wong,
Agnes Hui Chan,
Feng Zhu:
More Efficient Password Authenticated Key Exchange Based on RSA.
INDOCRYPT 2003: 375-387 |
5 | EE | Feng Zhu,
Matt W. Mutka,
Lionel M. Ni:
Splendor: A Secure, Private, and Location-Aware Service Discovery Protocol Supporting Mobile Services.
PerCom 2003: 235-242 |
2002 |
4 | EE | Feng Zhu,
Duncan S. Wong,
Agnes Hui Chan,
Robbie Ye:
Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks.
ISC 2002: 150-161 |
1998 |
3 | EE | Feng Zhu,
Wei-Tek Tsai:
Framework-Oriented Analysis.
COMPSAC 1998: 324-329 |
2 | EE | Feng Zhu,
Sanjai Rayadurgam,
Wei-Tek Tsai:
Automating Regression Testing for Real-Time Software in a Distributed Environment.
ISORC 1998: 373-382 |
1997 |
1 | | Feng Zhu,
Bao-An Guo:
A multiplication-addition structure against differential attack.
ICICS 1997: 247-257 |