


Остановите войну!
for scientists:


default search action
Zheng Dong
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information

Other persons with the same name
- Dong Zheng 0003
(aka: Zheng Dong 0001) — Shandong University, School of School of Information Science and Engineering, Qingdao, China (and 4 more)
- Zheng Dong 0002
— Wayne State University, Department of Computer Science, Detroit, MI, USA (and 1 more)
- Zheng Dong 0003 — Fudan University, School of Computer Science, Shanghai Key Laboratory of Data Science, China
- Zheng Dong 0004 — Shandong University, Jinan, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j18]Fei Xu
, Junwei Liu
, Zheng Dong
:
Minimum Backflow Power and ZVS Design for Dual-Active-Bridge DC-DC Converters. IEEE Trans. Ind. Electron. 70(1): 474-484 (2023) - [j17]Zheng Dong
, Xiangwu Meng
, Yujie Zhang
:
Exploiting Category-Level Multiple Characteristics for POI Recommendation. IEEE Trans. Knowl. Data Eng. 35(2): 1488-1501 (2023) - [j16]Yuyang Ye
, Zheng Dong, Hengshu Zhu
, Tong Xu
, Xin Song
, Runlong Yu
, Hui Xiong
:
MANE: Organizational Network Embedding With Multiplex Attentive Neural Networks. IEEE Trans. Knowl. Data Eng. 35(4): 4047-4061 (2023) - [i9]Zheng Dong, Zekai Fan, Shixiang Zhu:
Conditional Generative Modeling is All You Need for Marked Temporal Point Processes. CoRR abs/2305.12569 (2023) - 2022
- [j15]Zheng Dong, Tao Meng, Yuqiao Guan, Feifei Zhao:
Research on the business model of sharing economy unicorn enterprises in emerging economies - based on FSQCA method. Int. J. Technol. Manag. 89(1/2): 9-25 (2022) - [j14]Tao Meng, Qi Li, Zheng Dong, Feifei Zhao:
Research on the Risk of Social Stability of Enterprise Credit Supervision Mechanism Based on Big Data. J. Organ. End User Comput. 34(3): 1-16 (2022) - [c24]Huanchen Wang, Quanjun Chen, Zheng Dong, Xuan Song, Hao Tian, Donglong Yang, Manxia Liu:
A Geomagnetic Sensor Dataset for Traffic Flow Prediction. Big Data 2022: 2419-2422 - [c23]Zheng Dong, Quanjun Chen, Renhe Jiang, Huanchen Wang, Xuan Song, Hao Tian:
Learning Latent Road Correlations from Trajectories. Big Data 2022: 5458-5467 - [c22]Shixiang Zhu, Haoyun Wang, Zheng Dong, Xiuyuan Cheng, Yao Xie:
Neural Spectral Marked Point Processes. ICLR 2022 - [c21]Zheng Dong, Ke Xu, Ziheng Duan, Hujun Bao, Weiwei Xu, Rynson W. H. Lau:
Geometry-aware Two-scale PIFu Representation for Human Reconstruction. NeurIPS 2022 - [c20]Jinquan Hang, Zheng Dong, Hongke Zhao, Xin Song, Peng Wang, Hengshu Zhu:
Outside In: Market-aware Heterogeneous Graph Neural Network for Employee Turnover Prediction. WSDM 2022: 353-362 - [i8]Zheng Dong, Xiuyuan Cheng, Yao Xie:
Spatio-temporal point processes with deep non-stationary kernels. CoRR abs/2211.11179 (2022) - 2021
- [j13]Zheng Dong, Xin Huang, Guorui Yuan, Hengshu Zhu, Hui Xiong:
Butterfly-Core Community Search over Labeled Graphs. Proc. VLDB Endow. 14(11): 2006-2018 (2021) - [j12]Jing Li
, Yuguang Xie, Congcong Li, Yanran Dai, Jiaxin Ma, Zheng Dong, Tao Yang
:
UAV-Assisted Wide Area Multi-Camera Space Alignment Based on Spatiotemporal Feature Map. Remote. Sens. 13(6): 1117 (2021) - [j11]Zheng Dong
, Yushui Geng:
Some Trapezoid Intuitionistic Fuzzy Linguistic Maclaurin Symmetric Mean Operators and Their Application to Multiple-Attribute Decision Making. Symmetry 13(10): 1778 (2021) - [c19]Jinyuan Jia, Zheng Dong, Jie Li, Jack W. Stokes:
Detection Of Malicious DNS and Web Servers using Graph-Based Approaches. ICASSP 2021: 2625-2629 - [c18]Zheng Dong, Ke Xu
, Yin Yang, Hujun Bao, Weiwei Xu, Rynson W. H. Lau:
Location-aware Single Image Reflection Removal. ICCV 2021: 4997-5006 - [c17]Dazhong Shen, Chuan Qin, Chao Wang, Zheng Dong, Hengshu Zhu, Hui Xiong:
Topic Modeling Revisited: A Document Graph-based Neural Network Perspective. NeurIPS 2021: 14681-14693 - [i7]Zheng Dong, Xin Huang, Guorui Yuan, Hengshu Zhu, Hui Xiong:
Butterfly-Core Community Search over Labeled Graphs. CoRR abs/2105.08628 (2021) - [i6]Zheng Dong, Ke Xu, Ziheng Duan, Hujun Bao, Weiwei Xu, Rynson W. H. Lau:
Total Scale: Face-to-Body Detail Reconstruction from Sparse RGBD Sensors. CoRR abs/2112.02082 (2021) - 2020
- [j10]Hua Wu, Ju Liu, Zheng Dong, Yang Liu:
A Distributed Range-free Localization Algorithm Based on Optimum Distance Derivation in Wireless Sensor Networks. Ad Hoc Sens. Wirel. Networks 47(1-4): 127-155 (2020) - [j9]Hua Wu, Ju Liu
, Zheng Dong, Yang Liu:
A Hybrid Mobile Node Localization Algorithm Based on Adaptive MCB-PSO Approach in Wireless Sensor Networks. Wirel. Commun. Mob. Comput. 2020: 3845407:1-3845407:17 (2020) - [c16]Zheng Dong, Yifei Yang, Yao Xie:
Sequential Vessel Trajectory Identification Using Truncated Viterbi Algorithm. ICASSP 2020: 3792-3796 - [c15]Shuang Zhu, Jinshui Zhang, Guanyuan Shuai, Hongli Liu, Feng Zhang, Zheng Dong:
Autumn Crop Mapping based on Deep Learning Method driven by Historical Labelled Dataset. IGARSS 2020: 4669-4672 - [i5]Zheng Dong, Ke Xu, Yin Yang, Hujun Bao, Weiwei Xu, Rynson W. H. Lau:
Location-aware Single Image Reflection Removal. CoRR abs/2012.07131 (2020)
2010 – 2019
- 2019
- [j8]Yong Wang
, Dengguo Zhang, Biaogang Xu, Zheng Dong, Xuanke Zeng, Jihong Pei, Shixiang Xu, Quan Xue:
Four Ports Double Y-Shaped Ultra-Wideband Magneto-Photonic Crystals Circulator for 5G Communication System. IEEE Access 7: 120463-120474 (2019) - [j7]Hongyu Zhou, Zheng Dong, Gennady Verkhivker
, Brian D. Zoltowski
, Peng Tao
:
Allosteric mechanism of the circadian protein Vivid resolved through Markov state model and machine learning analysis. PLoS Comput. Biol. 15(2) (2019) - [c14]Junwen Yang, Jinshui Zhang, Shuang Zhu, Qing Xu, Feng Zhang, Zhijiang Yang, Zheng Dong:
Cropland Mapping in Fragmented Agricultural Landscape Using Modified Pyramid Scene Parsing Network. IGARSS 2019: 9831-9834 - [i4]James Dallas
, Kshitij Jain, Zheng Dong, Michael P. Cole, Paramsothy Jayakumar, Tulga Ersal:
Online terrain estimation for autonomous vehicles on deformable terrains. CoRR abs/1908.00130 (2019) - 2018
- [j6]Lina Zheng, Liu Sang, Ju Liu, Bingbing Lu, Zheng Dong:
Maximising the degrees of freedom of the physical-layer secured relay networks with artificial jamming. IET Commun. 12(6): 665-671 (2018) - [j5]Hongyu Zhou, Zheng Dong, Peng Tao
:
Recognition of protein allosteric states and residues: Machine learning approaches. J. Comput. Chem. 39(20): 1481-1490 (2018) - [j4]Lei Ge
, Xujun Yang, Zheng Dong, Dengguo Zhang
, Xierong Zeng:
Reconfigurable Magneto-Electric Dipole Antennas for Base Stations in Modern Wireless Communication Systems. Wirel. Commun. Mob. Comput. 2018: 2408923:1-2408923:8 (2018) - [c13]Jiaxing Shang, Xiaofan Yan, Linhui Feng, Zheng Dong, Haojie Wang, Shangbo Zhou:
ExtTra: Short-Term Traffic Flow Prediction Based on Extremely Randomized Trees. ICONIP (4) 2018: 532-544 - 2016
- [j3]Zheng Dong, Kevin Kane, L. Jean Camp:
Detection of Rogue Certificates from Trusted Certificate Authorities Using Deep Neural Networks. ACM Trans. Priv. Secur. 19(2): 5:1-5:31 (2016) - 2015
- [c12]Zheng Dong, Apu Kapadia, Jim Blythe, L. Jean Camp:
Beyond the lock icon: real-time detection of phishing websites using public key certificates. eCrime 2015: 1-12 - 2014
- [j2]Tiesheng Yan, Jianping Xu, Fei Zhang, Jin Sha
, Zheng Dong:
Variable-On-Time-Controlled Critical-Conduction-Mode Flyback PFC Converter. IEEE Trans. Ind. Electron. 61(11): 6091-6099 (2014) - [c11]Qi Liu, Zheng Dong, Chuanren Liu, Xing Xie
, Enhong Chen, Hui Xiong:
Social Marketing Meets Targeted Customers: A Typical User Selection and Coverage Perspective. ICDM 2014: 350-359 - 2013
- [c10]Chao Wang, Ju Liu, Zheng Dong, Hongji Xu, Shuang Ma:
Multi-Hop Collaborative Relay Beamforming. VTC Fall 2013: 1-5 - [i3]Zheng Dong, Arjmand Samuel:
Touch-enabled Programming for the Lab of Things. CoRR abs/1310.0867 (2013) - 2012
- [c9]Zheng Dong:
Enabling Users to Self-manage Networks: Collaborative Anomaly Detection in Wireless Personal Area Networks. Financial Cryptography Workshops 2012: 53-67 - [c8]Zheng Dong, Vaibhav Garg, L. Jean Camp, Apu Kapadia:
Pools, clubs and security: designing for a party not a person. NSPW 2012: 77-86 - [c7]Zheng Dong, L. Jean Camp:
PeerSec: Towards Peer Production and Crowdsourcing for Enhanced Security. HotSec 2012 - [c6]Chao Wang, Ju Liu, Hongji Xu, Lina Zheng, Zheng Dong:
Joint receiver-and-collaborative beamforming for the multi-user relay network in the uplink. WCSP 2012: 1-5 - 2011
- [j1]Zheng Dong, L. Jean Camp:
The decreasing marginal value of evaluation network size. SIGCAS Comput. Soc. 41(1): 23-37 (2011) - 2010
- [c5]Banghua Yang, Zheng Dong, Yonghuai Zhang, Xiaoming Zheng:
Recognition of Fire Detection Based on Neural Network. LSMS/ICSEE (2) 2010: 250-258 - [c4]Xiaoming Zheng, Banghua Yang, Xiang Li, Peng Zan, Zheng Dong:
Classifying EEG Using Incremental Support Vector Machine in BCIs. LSMS/ICSEE 2010: 604-610
2000 – 2009
- 2009
- [c3]Rui Wang, XiaoFeng Wang, Zhou Li
, Haixu Tang, Michael K. Reiter, Zheng Dong:
Privacy-preserving genomic computation through program specialization. CCS 2009: 338-347 - 2004
- [c2]Zheng Dong, Xiaofei Xu, De-chen Zhan:
Viewing the Web as a Cube: The Vision and Approach. APWeb 2004: 903-906 - 2003
- [c1]Zheng Dong, Cong Qi, Xiaofei Xu:
Ontology-Based Intelligent Sensing Action in Golog for Web Service Composition. GCC (1) 2003: 964-971 - [i2]Zheng Dong, Shengli Liu, Kefei Chen:
Cryptanalysis of B.Lee-S.Kim-K.Kim Proxy Signature. IACR Cryptol. ePrint Arch. 2003: 200 (2003) - [i1]Zheng Dong, Kefei Chen:
an attack on a multisignature scheme. IACR Cryptol. ePrint Arch. 2003: 201 (2003)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2023-06-05 00:53 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint