Penghui Zhang
Orcid: 0000-0002-4770-7615
According to our database1,
Penghui Zhang
authored at least 26 papers
between 2011 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
AdapINT: A Flexible and Adaptive In-Band Network Telemetry System Based on Deep Reinforcement Learning.
IEEE Trans. Netw. Serv. Manag., October, 2024
Fusion Positioning of Mobile Equipment in Underground Coal Mine Based on Redundant IMUs and UWB.
IEEE Trans. Ind. Informatics, April, 2024
Normalized ground states for Schrödinger system with a coupled critical nonlinearity.
Appl. Math. Lett., April, 2024
INCS: Intent-driven network-wide configuration synthesis based on deep reinforcement learning.
Comput. Networks, 2024
From Victims to Defenders: An Exploration of the Phishing Attack Reporting Ecosystem.
Proceedings of the 27th International Symposium on Research in Attacks, 2024
2023
Neural Process. Lett., December, 2023
Hierarchical Sliding Inference Generator for Question-driven Abstractive Answer Summarization.
ACM Trans. Inf. Syst., January, 2023
Joint Beamforming and Rate Splitting Scheme Design for Overloaded Industrial Private Networks.
Proceedings of the IEEE International Conference on Communications, 2023
2022
Implicit Relation Inference with Deep Path Extraction for Commonsense Question Answering.
Neural Process. Lett., 2022
IEEE Secur. Priv., 2022
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022
Proceedings of the PRICAI 2023: Trends in Artificial Intelligence, 2022
Joint Optimization of Trajectory and Beamforming for USV-Assisted Maritime Wireless Network Coexisting With Satellite Network.
Proceedings of the IEEE International Conference on Communications, 2022
I'm SPARTACUS, No, I'm SPARTACUS: Proactively Protecting Users from Phishing by Intentionally Triggering Cloaking Behavior.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
Proceedings of the 30th USENIX Security Symposium, 2021
2020
Sunrise to Sunset: Analyzing the End-to-end Life Cycle and Effectiveness of Phishing Attacks at Scale.
Proceedings of the 29th USENIX Security Symposium, 2020
PhishTime: Continuous Longitudinal Measurement of the Effectiveness of Anti-phishing Blacklists.
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the APWG Symposium on Electronic Crime Research, 2020
2019
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019
Efficient Implementation of Recursive Multi-Frame Track-Before-Detect Algorithm Based on FPGA.
Proceedings of the 2019 International Conference on Control, 2019
2018
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
2017
J. Intell. Fuzzy Syst., 2017
2014
On mitigating hotspots to maximize network lifetime in multi-hop wireless sensor network with guaranteed transport delay and reliability.
Peer-to-Peer Netw. Appl., 2014
2011
Theoretical analysis of the lifetime and energy hole in cluster based wireless sensor networks.
J. Parallel Distributed Comput., 2011