Fei Zuo

Orcid: 0000-0001-8902-1753

According to our database1, Fei Zuo authored at least 51 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Vulnerability discovery based on source code patch commit mining: a systematic literature review.
Int. J. Inf. Sec., April, 2024

Managing secondary risks with optimal risk response strategy and risk-related resource scheduling.
Reliab. Eng. Syst. Saf., 2024

SwarmBrain: Embodied agent for real-time strategy game StarCraft II via large language models.
CoRR, 2024

Seeing Is Believing: Extracting Semantic Information from Video for Verifying IoT Events.
Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2024

Revising the Problem of Partial Labels from the Perspective of CNNs' Robustness.
Proceedings of the 22nd IEEE/ACIS International Conference on Software Engineering Research, 2024

A Robust Attention-based Convolutional Neural Network for Monocular Depth Estimation.
Proceedings of the 22nd IEEE/ACIS International Conference on Software Engineering Research, 2024

Context Matters: Investigating Its Impact on ChatGPT's Bug Fixing Performance.
Proceedings of the 22nd IEEE/ACIS International Conference on Software Engineering Research, 2024

Utility-Based Routing in Payment Channel Networks: A Tradeoff Between Utility And Privacy.
Proceedings of the 22nd IEEE/ACIS International Conference on Software Engineering Research, 2024

2023
ProvSec: Open Cybersecurity System Provenance Analysis Benchmark Dataset with Labels.
Int. J. Networked Distributed Comput., December, 2023

Bi-objective optimization of the scheduling of risk-related resources for risk response.
Reliab. Eng. Syst. Saf., September, 2023

Designing a Security System Administration Course for Cybersecurity with a Companion Project.
CoRR, 2023

Towards Imbalanced Large Scale Multi-label Classification with Partially Annotated Labels.
CoRR, 2023

A Comprehensive Dataset Towards Hands-on Experience Enhancement in a Research-Involved Cybersecurity Program.
Proceedings of the 24th Annual Conference on Information Technology Education, 2023

Commit Message Can Help: Security Patch Detection in Open Source Software via Transformer.
Proceedings of the 21st IEEE/ACIS International Conference on Software Engineering Research, 2023

PowerGrader: Automating Code Assessment Based on PowerShell for Programming Courses.
Proceedings of the 21st IEEE/ACIS International Conference on Software Engineering Research, 2023

Towards Imbalanced Large Scale Multi-label Classification with Partially Annotated Labels.
Proceedings of the 21st IEEE/ACIS International Conference on Software Engineering Research, 2023

ProvSec: Cybersecurity System Provenance Analysis Benchmark Dataset.
Proceedings of the 21st IEEE/ACIS International Conference on Software Engineering Research, 2023

Balance-aware Cost-efficient Routing in the Payment Channel Network.
Proceedings of the 21st IEEE/ACIS International Conference on Software Engineering Research, 2023

D-Score: A White-Box Diagnosis Score for CNNs Based on Mutation Operators.
Proceedings of the Advanced Data Mining and Applications - 19th International Conference, 2023

2022
Use It-No Need to Shake It!: Accurate Implicit Authentication for Everyday Objects with Smart Sensing.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2022

TRScore: A Novel GPT-based Readability Scorer for ASR Segmentation and Punctuation model evaluation and selection.
CoRR, 2022

2021
Exploiting the Sensitivity of L2 Adversarial Examples to Erase-and-Restore.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

Westworld: Fuzzing-Assisted Remote Dynamic Symbolic Execution of Smart Apps on IoT Cloud Platforms.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
Erase and Restore: Simple, Accurate and Resilient Detection of L<sub>2</sub> Adversarial Examples.
CoRR, 2020

2019
Exploiting the Inherent Limitation of L0 Adversarial Examples.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

Neural Machine Translation Inspired Binary Code Similarity Comparison beyond Function Pairs.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Touch Well Before Use: Intuitive and Secure Authentication for IoT Devices.
Proceedings of the 25th Annual International Conference on Mobile Computing and Networking, 2019

2018
K-Regret Queries Using Multiplicative Utility Functions.
ACM Trans. Database Syst., 2018

Countermeasures Against L0 Adversarial Examples Using Image Processing and Siamese Networks.
CoRR, 2018

2017
Medical Instrument Detection in 3-Dimensional Ultrasound Data Volumes.
IEEE Trans. Medical Imaging, 2017

2016
Selection of risk response actions considering risk dependency.
Kybernetes, 2016

K-Regret Queries: From Additive to Multiplicative Utilities.
CoRR, 2016

2014
Guest Editorial: Special issue on advanced computing for image-guided intervention.
Neurocomputing, 2014

In-body ultrasound image processing for cardiovascular interventions: A review.
Neurocomputing, 2014

2013
Hermitian dual containing BCH codes and construction of new quantum codes.
Quantum Inf. Comput., 2013

2008
Facial feature extraction by a cascade of model-based algorithms.
Signal Process. Image Commun., 2008

Cascaded Face Detection Using Neural Network Ensembles.
EURASIP J. Adv. Signal Process., 2008

Partition-Based Parallel Constructing-Density-Tree Clustering.
Proceedings of the International Symposium on Information Processing, 2008

A New Image Encryption Algorithm Based on Multiple Chaos System.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008

An Extended Self-Adaptive Kalman Filtering Object Motion Prediction Model.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

2006
Face biometrics with renewable templates.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006

2005
Real-time embedded face recognition for smart home.
IEEE Trans. Consumer Electron., 2005

Facial feature extraction using a cascade of model-based algorithms.
Proceedings of the Advanced Video and Signal Based Surveillance, 2005

Face Recognition with Renewable and Privacy Preserving Binary Templates.
Proceedings of the Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID 2005), 2005

Multistage Face Recognition Using Adaptive Feature Selection and Classification.
Proceedings of the Advanced Concepts for Intelligent Vision Systems, 2005

Fast Face Detection Using a Cascade of Neural Network Ensembles.
Proceedings of the Advanced Concepts for Intelligent Vision Systems, 2005

2004
Multistage feature extraction for accurate face alignment.
Proceedings of the Visual Communications and Image Processing 2004, 2004

Real-time facial feature extraction using statistical shape model and Haar-wavelet based feature search.
Proceedings of the 2004 IEEE International Conference on Multimedia and Expo, 2004

Fast facial feature extraction using a deformable shape model with haar-wavelet based local texture attributes.
Proceedings of the 2004 International Conference on Image Processing, 2004

Real-Time Facial Feature Extraction by Cascaded Parameter Prediction and Image Optimization.
Proceedings of the Image Analysis and Recognition: International Conference, 2004

2003
Toward fast feature adaptation and localization for real-time face recognition systems.
Proceedings of the Visual Communications and Image Processing 2003, 2003


  Loading...