default search action
Zhuo Wei
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c22]Zhuo Wei, Frits de Nijs, Jinhao Li, Hao Wang:
Model-Free Approach to Fair Solar PV Curtailment Using Reinforcement Learning. e-Energy 2023: 14-21 - 2022
- [i2]Zhuo Wei, Frits de Nijs, Jinhao Li, Hao Wang:
Model-Free Approach to Fair Solar PV Curtailment Using Reinforcement Learning. CoRR abs/2212.06542 (2022) - 2021
- [c21]Zhuo Wei, Hao Wang:
Characterizing Residential Load Patterns by Household Demographic and Socioeconomic Factors. e-Energy 2021: 244-248 - [i1]Zhuo Wei, Hao Wang:
Characterizing Residential Load Patterns by Household Demographic and Socioeconomic Factors. CoRR abs/2106.05858 (2021) - 2020
- [j17]Baodong Qin, Ximeng Liu, Zhuo Wei, Dong Zheng:
Space efficient revocable IBE for mobile devices in cloud computing. Sci. China Inf. Sci. 63(3) (2020) - [j16]Lili Cheng, Zhuo Wei, Mingchao Sun, Shiqing Xin, Andrei Sharf, Yangyan Li, Baoquan Chen, Changhe Tu:
DeepPipes: Learning 3D pipelines reconstruction from point clouds. Graph. Model. 111: 101079 (2020)
2010 – 2019
- 2019
- [j15]Yongdong Wu, Dengpan Ye, Zhuo Wei, Qian Wang, William Tan, Robert H. Deng:
Situation-Aware Authenticated Video Broadcasting Over Train-Trackside WiFi Networks. IEEE Internet Things J. 6(2): 1617-1627 (2019) - [j14]Yongdong Wu, Binbin Chen, Jian Weng, Zhuo Wei, Xin Li, Bo Qiu, Niekie Liu:
False Load Attack to Smart Meters by Synchronously Switching Power Circuits. IEEE Trans. Smart Grid 10(3): 2641-2649 (2019) - [c20]Yongdong Wu, Jian Weng, Bo Qiu, Zhuo Wei, Fan Qian, Robert H. Deng:
Random Delay Attack and Its Applications on Load Frequency Control of Power Systems. DSC 2019: 1-8 - 2018
- [j13]Zhuo Wei, Yongdong Wu, Yanjiang Yang, Zheng Yan, Qingqi Pei, Yajuan Xie, Jian Weng:
AutoPrivacy: Automatic privacy protection and tagging suggestion for mobile social photo. Comput. Secur. 76: 341-353 (2018) - [j12]Yongdong Wu, Zhuo Wei, Jian Weng, Xin Li, Robert H. Deng:
Resonance Attacks on Load Frequency Control of Smart Grids. IEEE Trans. Smart Grid 9(5): 4490-4502 (2018) - [j11]Yongdong Wu, Zhuo Wei, Jian Weng, Robert H. Deng:
Position Manipulation Attacks to Balise-Based Train Automatic Stop Control. IEEE Trans. Veh. Technol. 67(6): 5287-5301 (2018) - [c19]Hsiao-Ying Lin, Zhuo Wei, Yanjiang Yang, Yadong Wei, Kang Tang, Qingdi Sha:
AnchorCAN: Anchor-Based Secure CAN Communications System. DSC 2018: 1-7 - 2017
- [j10]Zhuo Wei, Yanjiang Yang, Yongdong Wu, Jian Weng, Robert H. Deng:
HIBS-KSharing: Hierarchical Identity-Based Signature Key Sharing for Automotive. IEEE Access 5: 16314-16323 (2017) - [j9]Yanjiang Yang, Zhuo Wei, Youcheng Zhang, Haibing Lu, Kim-Kwang Raymond Choo, Haibin Cai:
V2X security: A case study of anonymous authentication. Pervasive Mob. Comput. 41: 259-269 (2017) - [c18]Yanjiang Yang, Joseph K. Liu, Zhuo Wei, Xinyi Huang:
Towards Revocable Fine-Grained Encryption of Cloud Data: Reducing Trust upon Cloud. ACISP (1) 2017: 127-144 - [c17]Zhuo Wei, Yanjiang Yang, Rehana Yasmin, Yongdong Wu, Jian Weng, Robert H. Deng:
IoVShield: An Efficient Vehicular Intrusion Detection System for Self-driving (Short Paper). ISPEC 2017: 638-647 - 2016
- [j8]Zhuo Wei, Zheng Yan, Yongdong Wu, Robert Huijie Deng:
Trustworthy Authentication on Scalable Surveillance Video with Background Model Support. ACM Trans. Multim. Comput. Commun. Appl. 12(4s): 64:1-64:20 (2016) - [c16]Yanjiang Yang, Haibin Cai, Zhuo Wei, Haibing Lu, Kim-Kwang Raymond Choo:
Towards Lightweight Anonymous Entity Authentication for IoT Applications. ACISP (1) 2016: 265-280 - [c15]Baodong Qin, Shuai Han, Yu Chen, Shengli Liu, Zhuo Wei:
How to Make the Cramer-Shoup Cryptosystem Secure Against Linear Related-Key Attacks. Inscrypt 2016: 150-165 - [c14]Zhuo Wei, Yanjiang Yang, Tieyan Li:
Authenticated CAN Communications Using Standardized Cryptographic Techniques. ISPEC 2016: 330-343 - [c13]Yongdong Wu, Bo Qiu, Zhuo Wei, Jian Weng:
Secure Subway Train-to-Train Communications via GSM-R Communication Systems. VTC Spring 2016: 1-5 - 2015
- [c12]Swee-Won Lo, Zhuo Wei, Robert H. Deng, Xuhua Ding:
On Security of Content-Based Video Stream Authentication. ESORICS (1) 2015: 366-383 - [c11]Zhuo Wei, Swee-Won Lo, Yu Liang, Tieyan Li, Jialie Shen, Robert H. Deng:
Automatic Accident Detection and Alarm System. ACM Multimedia 2015: 781-784 - [c10]Zhuo Wei, Robert H. Deng, Jialie Shen, Jixiang Zhu, Kun Ouyang, Yongdong Wu:
Multidimensional Context Awareness in Mobile Devices. MMM (2) 2015: 38-49 - 2014
- [j7]Yueyun Shang, Dengpan Ye, Zhuo Wei, Yajuan Xie:
GPU-Based MPEG-2 to Secure Scalable Video Transcoding. Int. J. Digit. Crime Forensics 6(2): 52-69 (2014) - [j6]Robert Huijie Deng, Xuhua Ding, Yongdong Wu, Zhuo Wei:
Efficient block-based transparent encryption for H.264/SVC bitstreams. Multim. Syst. 20(2): 165-178 (2014) - [j5]Zhuo Wei, Yongdong Wu, Robert H. Deng, Xuhua Ding:
A Hybrid Scheme for Authenticating Scalable Video Codestreams. IEEE Trans. Inf. Forensics Secur. 9(4): 543-553 (2014) - [c9]Swee-Won Lo, Zhuo Wei, Xuhua Ding, Robert H. Deng:
Generic attacks on content-based video stream authentication. ICME Workshops 2014: 1-2 - [c8]Swee-Won Lo, Zhuo Wei, Xuhua Ding, Robert H. Deng:
Generic attacks on content-based video stream authentication. ICME Workshops 2014: 1-6 - 2013
- [j4]Yongdong Wu, Zhuo Wei, Robert H. Deng:
Attribute-Based Access to Scalable Media in Cloud-Assisted Content Sharing Networks. IEEE Trans. Multim. 15(4): 778-788 (2013) - [c7]Zhuo Wei, Robert H. Deng, Jialie Shen, Yongdong Wu, Xuhua Ding, Swee-Won Lo:
Technique for authenticating H.264/SVC streams in surveillance applications. ICME Workshops 2013: 1-4 - [c6]Han Wang, Zhuo Wei:
Stereovision based obstacle detection system for unmanned surface vehicle. ROBIO 2013: 917-921 - 2012
- [j3]Dengpan Ye, Zhuo Wei, Xuhua Ding, Robert H. Deng:
Scalable Content Authentication in H.264/SVC Videos Using Perceptual Hashing based on Dempster-Shafer theory. Int. J. Comput. Intell. Syst. 5(5): 953-963 (2012) - [j2]Zhuo Wei, Yongdong Wu, Xuhua Ding, Robert H. Deng:
A scalable and format-compliant encryption scheme for H.264/SVC bitstreams. Signal Process. Image Commun. 27(9): 1011-1024 (2012) - [c5]Zhou Zhou, Zhuo Wei, Shouyang Wang:
Price Discovery in Index Futures Market - Based on Common Factor Models. BIFE 2012: 257-261 - [c4]Zhuo Wei, Xuhua Ding, Robert Huijie Deng, Yongdong Wu:
No Tradeoff between Confidentiality and Performance: An Analysis on H.264/SVC Partial Encryption. Communications and Multimedia Security 2012: 72-86 - [c3]Han Wang, Zhuo Wei, Chek Seng Ow, Kah Tong Ho, Benjamin Feng, Junjie Huang:
Improvement in real-time obstacle detection system for USV. ICARCV 2012: 1317-1322 - 2011
- [c2]Han Wang, Zhuo Wei, Sisong Wang, Chek Seng Ow, Kah Tong Ho, Benjamin Feng:
A vision-based obstacle detection system for Unmanned Surface Vehicle. RAM 2011: 364-369 - 2010
- [j1]Wei Cui, Zhuo Wei, Quan Chen, Yuanhua Cheng, Lingling Geng, Jian Zhang, Jianhua Chen, Tingjun Hou, Mingjuan Ji:
Structure-Based Design of Peptides against G3BP with Cytotoxicity on Tumor Cells. J. Chem. Inf. Model. 50(3): 380-387 (2010) - [c1]Zhuo Wei, Zilong Sun, Yajuan Xie, Shengsheng Yu:
GPU Acceleration of Integer Wavelet Transform for TIFF Image. PAAP 2010: 138-143
Coauthor Index
aka: Robert Huijie Deng
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:05 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint