default search action
Dali Zhu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j12]Shunliang Zhang, Dali Zhu, Yinlong Liu:
Artificial intelligence empowered physical layer security for 6G: State-of-the-art, challenges, and opportunities. Comput. Networks 242: 110255 (2024) - [i2]Dali Zhu, Wenli Zhang, Hualin Zeng, Xiaohao Liu, Long Yang, Jiaqi Zheng:
rFaceNet: An End-to-End Network for Enhanced Physiological Signal Extraction through Identity-Specific Facial Contours. CoRR abs/2403.09034 (2024) - 2023
- [j11]Xueying Hao, Dali Zhu, Xianlan Wang, Long Yang, Hualin Zeng:
A Speech Enhancement Algorithm for Speech Reconstruction Based on Laser Speckle Images. Sensors 23(1): 330 (2023) - [j10]Ting Li, Jiyan Sun, Yinlong Liu, Xu Zhang, Dali Zhu, Zhaorui Guo, Liru Geng:
ESMO: Joint Frame Scheduling and Model Caching for Edge Video Analytics. IEEE Trans. Parallel Distributed Syst. 34(8): 2295-2310 (2023) - [c53]Jiguo Liu, Chao Liu, Nan Li, Shihao Gao, Mingqi Liu, Dali Zhu:
LADA-Trans-NER: Adaptive Efficient Transformer for Chinese Named Entity Recognition Using Lexicon-Attention and Data-Augmentation. AAAI 2023: 13236-13245 - [c52]Dali Zhu, Hongju Sun, Nan Li, Baoxin Mi, Xianjin Huang:
SPYRAPTOR: A Stream-based Smart Query System for Real-Time Threat Hunting within Enterprise. CSCWD 2023: 1055-1062 - [c51]Yulun Wu, Zhujun Zhang, Dali Zhu, Wei Fan:
Dynamic PBFT with Active Removal. ISCC 2023: 1235-1241 - [c50]Cheng Peng, Wei Fan, Weiqing Huang, Dali Zhu:
A Novel Approach based on Improved Naive Bayes for 5G Air Interface DDoS Detection. WCNC 2023: 1-6 - 2022
- [c49]Dali Zhu, Xianjin Huang, Nan Li, Hongju Sun, Meichen Liu, Jiguo Liu:
RAP-Net: A Resource Access Pattern Network for Insider Threat Detection. IJCNN 2022: 1-8 - [c48]Huajun Cui, Guozhu Meng, Yueqi Li, Yuejun Li, Yan Zhang, Jiyan Sun, Dali Zhu, Weiping Wang:
LibHunter: An Unsupervised Approach for Third-party Library Detection without Prior Knowledge. ISCC 2022: 1-7 - [c47]Tianyu Meng, Dali Zhu, Xiaodong Xie, Hualin Zeng:
Non-Contact Heart Rate Signal Extraction and Identification Based on Speckle Image. ISCC 2022: 1-6 - [c46]Huajun Cui, Guozhu Meng, Yan Zhang, Weiping Wang, Dali Zhu, Ting Su, Xiaodong Zhang, Yuejun Li:
TraceDroid: A Robust Network Traffic Analysis Framework for Privacy Leakage in Android Apps. SciSec 2022: 541-556 - [c45]Xueying Hao, Lianbo Guo, Dali Zhu, Xianlan Wang, Long Yang, Hualin Zeng:
Remote Speech Reconstruction Based on Convolutional Neural Network and Laser Speckle Images. SMC 2022: 1039-1044 - [c44]Ranran Sun, Hualin Zeng, Long Yang, Dali Zhu:
Speech Acquisition Using a Lightweight Convolutional Neural Network. SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta 2022: 242-249 - 2021
- [j9]Jie Liang, Dali Zhu, Haitao Liu, Heng Ping, Ting Li, Hangsheng Zhang, Liru Geng, Yinlong Liu:
Multi-Head Attention Based Popularity Prediction Caching in Social Content-Centric Networking With Mobile Edge Computing. IEEE Commun. Lett. 25(2): 508-512 (2021) - [j8]Dali Zhu, Ting Li, Hongfeng Tian, Yong Yang, Yinlong Liu, Haitao Liu, Liru Geng, Jiyan Sun:
Speed-Aware and Customized Task Offloading and Resource Allocation in Mobile Edge Computing. IEEE Commun. Lett. 25(8): 2683-2687 (2021) - [j7]Dali Zhu, Ting Li, Haitao Liu, Jiyan Sun, Liru Geng, Yinlong Liu:
Privacy-Aware Online Task Offloading for Mobile-Edge Computing. Wirel. Commun. Mob. Comput. 2021: 6622947:1-6622947:16 (2021) - [c43]Dali Zhu, Long Yang, Hualin Zeng:
Remote Recovery of Sound from Speckle Pattern Video Based on Convolutional LSTM. ICICS (2) 2021: 110-124 - [c42]Dali Zhu, Hongju Sun, Di Wu:
Fusion of Wireless Signal and Computer Vision for Identification and Tracking. ICT 2021: 1-7 - [c41]Dali Zhu, Hongju Sun, Nan Li, Baoxin Mi, Tong Xi:
BS-Net: A Behavior Sequence Network for Insider Threat Detection. ISCC 2021: 1-6 - [c40]Dali Zhu, Haitao Liu, Ting Li, Jiyan Sun, Jie Liang, Hangsheng Zhang, Liru Geng, Yinlong Liu:
Deep Reinforcement Learning-based Task Offloading in Satellite-Terrestrial Edge Computing Networks. WCNC 2021: 1-7 - [i1]Dali Zhu, Haitao Liu, Ting Li, Jiyan Sun, Jie Liang, Hangsheng Zhang, Liru Geng, Yinlong Liu:
Deep Reinforcement Learning-based Task Offloading in Satellite-Terrestrial Edge Computing Networks. CoRR abs/2102.01876 (2021) - 2020
- [j6]Shunliang Zhang, Dali Zhu, Yongming Wang:
A survey on space-aerial-terrestrial integrated 5G networks. Comput. Networks 174: 107212 (2020) - [j5]Shunliang Zhang, Dali Zhu:
Towards artificial intelligence enabled 6G: State of the art, challenges, and opportunities. Comput. Networks 183: 107556 (2020) - [c39]Dali Zhu, Yuchen Ma, Yinlong Liu:
DeepAD: A Joint Embedding Approach for Anomaly Detection on Attributed Networks. ICCS (2) 2020: 294-307 - [c38]Luping Ma, Dali Zhu, Shunliang Zhang, Xiaohui Zhang, Shumin Peng, Ya Li:
ExpectDroid: User Expectation Based Authorization Management in Android. ICT 2020: 1-6 - [c37]Dali Zhu, Jie Liang, Haitao Liu, Heng Ping, Ting Li, Hangsheng Zhang, Liru Geng, Yinlong Liu:
A Novel Caching Strategy in Social Content-Centric Networking with Mobile Edge Computing. ISCC 2020: 1-6 - [c36]Dali Zhu, Yuchen Ma, Yinlong Liu:
Anomaly Detection with Deep Graph Autoencoders on Attributed Networks. ISCC 2020: 1-6 - [c35]Dali Zhu, Long Yang, Zhanxun Li, Hualin Zeng:
Remote Speech Extraction from Speckle Image by Convolutional Neural Network. ISCC 2020: 1-6 - [c34]Dali Zhu, Yuchen Ma, Yinlong Liu:
A Flexible Attentive Temporal Graph Networks for Anomaly Detection in Dynamic Networks. TrustCom 2020: 870-875 - [c33]Zhujun Zhang, Dali Zhu, Wei Fan:
QPBFT: Practical Byzantine Fault Tolerance Consensus Algorithm Based on Quantified-role. TrustCom 2020: 991-997 - [c32]Luping Ma, Dali Zhu, Shunliang Zhang, Xiaohui Zhang, Shumin Peng, Ya Li:
UIDroid: User-driven Based Hierarchical Access Control for Sensitive Information. TrustCom 2020: 1733-1740 - [c31]Zhujun Zhang, Dali Zhu, Baoxin Mi:
C-DAG: Community-Assisted DAG Mechanism with High Throughput and Eventual Consistency. WASA (2) 2020: 113-121 - [c30]Dali Zhu, Tong Xi, Pengfei Jing, Qing Xia, Di Wu, Yiming Zhang:
Sadroid: A Deep Classification Model For Android Malware Detection Based On Semantic Analysis. WCNC 2020: 1-7
2010 – 2019
- 2019
- [j4]Bobai Zhao, Dali Zhu, Tong Xi, Chenggang Jia, Shang Jiang, Siye Wang:
Convolutional neural network and dual-factor enhanced variational Bayes adaptive Kalman filter based indoor localization with Wi-Fi. Comput. Networks 162 (2019) - [c29]Dali Zhu, Yuchen Ma, Tong Xi, Yiming Zhang:
FSNet: Android Malware Detection with Only One Feature. ISCC 2019: 1-6 - [c28]Dali Zhu, Tong Xi:
Permission-Based Feature Scaling Method for Lightweight Android Malware Detection. KSEM (1) 2019: 714-725 - [c27]Bobai Zhao, Dali Zhu, Tong Xi, Siye Wang, Di Wu:
Indoor localization based on subcarrier parameter estimation of LoS with wi-fi. MobiQuitous 2019: 80-89 - [c26]Dali Zhu, Tong Xi, Pengfei Jing, Di Wu, Qing Xia, Yiming Zhang:
A Transparent and Multimodal Malware Detection Method for Android Apps. MSWiM 2019: 51-60 - [c25]Di Wu, Dali Zhu, Yinlong Liu, Luping Ma:
Joint RSS and CSI Based Access Point Authentication Scheme in WiFi Networks via XGBoost. TrustCom/BigDataSE 2019: 821-826 - 2018
- [j3]Dali Zhu, Bobai Zhao, Siye Wang:
Mobile target indoor tracking based on Multi-Direction Weight Position Kalman Filter. Comput. Networks 141: 115-127 (2018) - [j2]Di Wu, Dali Zhu, Yinlong Liu, Dongmei Zhao:
Location Verification Assisted by a Moving Obstacle for Wireless Sensor Networks. IEEE Internet Things J. 5(1): 322-335 (2018) - [j1]Ying Yang, Jianfeng Xia, Dali Zhu:
基于Web操作系统的移动瘦终端多安全策略模型 (Multi-policy Security Model of Mobile Thin Client Based on Web Operating System). 计算机科学 45(11): 108-114 (2018) - [c24]Dali Zhu, Renjun Zhang, Shuang Hu, Gongliang Chen:
Public-Key Encryption with Selective Opening Security from General Assumptions. Inscrypt 2018: 510-530 - [c23]Dali Zhu, Bobai Zhao, Siye Wang, Di Wu:
Direct-path based fingerprint extraction algorithm for indoor localization. MobiQuitous 2018: 11-18 - 2017
- [c22]Dali Zhu, Wenjing Rong, Di Wu, Na Pang:
Lightweight Anonymous RFID Group Ownership Transfer Protocol in Multi-owner Environment. HPCC/SmartCity/DSS 2017: 404-411 - [c21]Dali Zhu, Wenjing Rong, Di Wu, Na Pang:
Multi-attribute Counterfeiting Tag Identification Protocol in Large-Scale RFID System. ICICS 2017: 352-362 - [c20]Dali Zhu, Na Pang, Gang Li, Shaowu Liu:
NotiFi: A ubiquitous WiFi-based abnormal activity detection system. IJCNN 2017: 1766-1773 - [c19]Dali Zhu, Hao Jin, Ying Yang, Di Wu, Weiyi Chen:
DeepFlow: Deep learning-based malware detection by mining Android application for abnormal usage of sensitive data. ISCC 2017: 438-443 - [c18]Na Pang, Dali Zhu, Kaiwen Xue, Wenjing Rong, Yinlong Liu, Changhai Ou:
Analyzing Customer's Product Preference Using Wireless Signals. KSEM 2017: 139-148 - [c17]Dali Zhu, Na Pang, Weimiao Feng, Muhmmad Al-Khiza'ay, Yuchen Ma:
Device-Free Intruder Sensing Leveraging Fine-Grained Physical Layer Signatures. KSEM 2017: 183-194 - [c16]Na Pang, Dali Zhu, Gang Li, Shaowu Liu:
WarnFi: Non-invasive wifi-based abnormal activity sensing using non-parametric model. MILCOM 2017: 800-805 - [c15]Dali Zhu, Renjun Zhang, Dingding Jia:
Public-Key Encryption with Simulation-Based Sender Selective-Opening Security. ProvSec 2017: 361-380 - 2016
- [c14]Dali Zhu, Ying Li, Na Pang, Weimiao Feng:
An Android System Vulnerability Risk Evaluation Method for Heap Overflow. ES 2016: 89-96 - [c13]Dali Zhu, Na Pang, Gang Li, Shaowu Liu:
WiseFi: Activity Localization and Recognition on Commodity Off-the-Shelf WiFi Devices. HPCC/SmartCity/DSS 2016: 562-569 - [c12]Dali Zhu, Renjun Zhang, Xiaozhuo Gu, Haitao Zhu:
A Practical Scheme for Data Secure Transport in VoIP Conferencing. ICICS 2016: 466-475 - [c11]Dali Zhu, Na Pang, Gang Li, Wenjing Rong:
Opportunistic Probe: An Efficient Adaptive Detection Model for Collaborative Intrusion Detection. ICPADS 2016: 430-437 - [c10]Yinlong Liu, Dali Zhu, Wei Ma:
A novel cooperative caching scheme for Content Centric Mobile Ad Hoc Networks. ISCC 2016: 824-829 - [c9]Dali Zhu, Na Pang, Gang Li, Wenjing Rong, Zheming Fan:
WiN: Non-invasive Abnormal Activity Detection Leveraging Fine-Grained WiFi Signals. Trustcom/BigDataSE/ISPA 2016: 744-751 - [c8]Dali Zhu, Junhuang Chen, Yanfang Zhang, Siye Wang, Huafeng Kong:
An Efficient Approach of Integrating RFID and Vision Techniques in Object Surveillance System. Trustcom/BigDataSE/ISPA 2016: 1023-1029 - [c7]Dali Zhu, Ying Yang, Hao Jin, Jing Shao, Weimiao Feng:
Application of Modified BLP Model on Mobile Web Operating System. Trustcom/BigDataSE/ISPA 2016: 1818-1824 - 2015
- [c6]Dali Zhu, Na Pang, Zheming Fan, Changhai Ou:
Trusted access in wireless network on mutual interactive authentication mechanism. ChinaCom 2015: 776-781 - [c5]Yinlong Liu, Dali Zhu, Wei Ma, Lei Qian:
A QoE-oriented scheduling scheme for HTTP streaming service in LTE system. ISCC 2015: 889-894 - [c4]Dali Zhu, Zheming Fan, Na Pang:
A Dynamic Credible Factory Reset Mechanism of Personal Data in Android Device. TrustCom/BigDataSE/ISPA (1) 2015: 990-998 - [c3]Di Wu, Jingfu Du, Dali Zhu, Siye Wang:
A Simple RFID-Based Architecture for Privacy Preservation. TrustCom/BigDataSE/ISPA (1) 2015: 1224-1229
2000 – 2009
- 2007
- [c2]Hong Du, Dali Zhu, Degang Sun:
New Solutions for Cell Phone Detection. ICDS 2007: 31 - [c1]Xiaosu Chen, Dali Zhu, Jian Liu:
A Practical Digital Watermarking Protocol Based On PKI-CA. SNPD (1) 2007: 483-488
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint