Penghui Zhang

Orcid: 0000-0002-4770-7615

According to our database1, Penghui Zhang authored at least 26 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
AdapINT: A Flexible and Adaptive In-Band Network Telemetry System Based on Deep Reinforcement Learning.
IEEE Trans. Netw. Serv. Manag., October, 2024

Fusion Positioning of Mobile Equipment in Underground Coal Mine Based on Redundant IMUs and UWB.
IEEE Trans. Ind. Informatics, April, 2024

Normalized ground states for Schrödinger system with a coupled critical nonlinearity.
Appl. Math. Lett., April, 2024

INCS: Intent-driven network-wide configuration synthesis based on deep reinforcement learning.
Comput. Networks, 2024

From Victims to Defenders: An Exploration of the Phishing Attack Reporting Ecosystem.
Proceedings of the 27th International Symposium on Research in Attacks, 2024

2023
Aspect-Based Sentiment Analysis Using Adversarial BERT with Capsule Networks.
Neural Process. Lett., December, 2023

Hierarchical Sliding Inference Generator for Question-driven Abstractive Answer Summarization.
ACM Trans. Inf. Syst., January, 2023

Joint Beamforming and Rate Splitting Scheme Design for Overloaded Industrial Private Networks.
Proceedings of the IEEE International Conference on Communications, 2023

2022
Implicit Relation Inference with Deep Path Extraction for Commonsense Question Answering.
Neural Process. Lett., 2022

CrawlPhish: Large-Scale Analysis of Client-Side Cloaking Techniques in Phishing.
IEEE Secur. Priv., 2022

Users' Departure Time Prediction Based on Light Gradient Boosting Decision Tree.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

Pick-Up Point Recommendation Using Users' Historical Ride-Hailing Orders.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

CSS: Contrastive Span Selector for Multi-span Question Answering.
Proceedings of the PRICAI 2023: Trends in Artificial Intelligence, 2022

Joint Optimization of Trajectory and Beamforming for USV-Assisted Maritime Wireless Network Coexisting With Satellite Network.
Proceedings of the IEEE International Conference on Communications, 2022

I'm SPARTACUS, No, I'm SPARTACUS: Proactively Protecting Users from Phishing by Intentionally Triggering Cloaking Behavior.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Having Your Cake and Eating It: An Analysis of Concession-Abuse-as-a-Service.
Proceedings of the 30th USENIX Security Symposium, 2021

2020
Sunrise to Sunset: Analyzing the End-to-end Life Cycle and Effectiveness of Phishing Attacks at Scale.
Proceedings of the 29th USENIX Security Symposium, 2020

PhishTime: Continuous Longitudinal Measurement of the Effectiveness of Anti-phishing Blacklists.
Proceedings of the 29th USENIX Security Symposium, 2020

Scam Pandemic: How Attackers Exploit Public Fear through Phishing.
Proceedings of the APWG Symposium on Electronic Crime Research, 2020

2019
iCore: continuous and proactive extrospection on multi-core IoT devices.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

Efficient Implementation of Recursive Multi-Frame Track-Before-Detect Algorithm Based on FPGA.
Proceedings of the 2019 International Conference on Control, 2019

2018
SeCore: Continuous Extrospection with High Visibility on Multi-core ARM Platforms.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

Prime+Count: Novel Cross-world Covert Channels on ARM TrustZone.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
Parallel computing of power flow for complex distribution network with DGs.
J. Intell. Fuzzy Syst., 2017

2014
On mitigating hotspots to maximize network lifetime in multi-hop wireless sensor network with guaranteed transport delay and reliability.
Peer-to-Peer Netw. Appl., 2014

2011
Theoretical analysis of the lifetime and energy hole in cluster based wireless sensor networks.
J. Parallel Distributed Comput., 2011


  Loading...