Shigeng Zhang

Orcid: 0000-0001-5351-7239

According to our database1, Shigeng Zhang authored at least 131 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Fall-Attention: An Attention-Based Fall Detection Method for Adjoint Activities.
IEEE Trans. Mob. Comput., July, 2024

RF-Siamese: Approaching Accurate RFID Gesture Recognition With One Sample.
IEEE Trans. Mob. Comput., January, 2024

Universal and Scalable Weakly-Supervised Domain Adaptation.
IEEE Trans. Image Process., 2024

Foolmix: Strengthen the Transferability of Adversarial Examples by Dual-Blending and Direction Update Strategy.
IEEE Trans. Inf. Forensics Secur., 2024

UCG: A Universal Cross-Domain Generator for Transferable Adversarial Examples.
IEEE Trans. Inf. Forensics Secur., 2024

Dynamic risk assessment and active response strategy of human-robot collaboration based on fuzzy comprehensive evaluation.
Robotics Comput. Integr. Manuf., 2024

RF-Boundary: RFID-Based Virtual Boundary.
Proceedings of the IEEE INFOCOM 2024, 2024

Selective Learning for Sample-Efficient Training in Multi-Agent Sparse Reward Tasks (Extended Abstract).
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024

Matching Gains with Pays: Effective and Fair Learning in Multi-Agent Public Goods Dilemmas.
Proceedings of the ECAI 2024 - 27th European Conference on Artificial Intelligence, 19-24 October 2024, Santiago de Compostela, Spain, 2024

Cautiously-Optimistic Knowledge Sharing for Cooperative Multi-Agent Reinforcement Learning.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Real-Time and Accurate Gesture Recognition With Commercial RFID Devices.
IEEE Trans. Mob. Comput., December, 2023

HearMe: Accurate and Real-Time Lip Reading Based on Commercial RFID Devices.
IEEE Trans. Mob. Comput., December, 2023

More Than Scheduling: Novel and Efficient Coordination Algorithms for Multiple Readers in RFID Systems.
IEEE Trans. Mob. Comput., September, 2023

Receive Only Necessary: Efficient Tag Category Identification in Large-Scale RFID Systems.
IEEE Trans. Mob. Comput., 2023

LSD: Adversarial Examples Detection Based on Label Sequences Discrepancy.
IEEE Trans. Inf. Forensics Secur., 2023

Backdoor Attacks to Deep Learning Models and Countermeasures: A Survey.
IEEE Open J. Comput. Soc., 2023

MPS: A Multiple Poisoned Samples Selection Strategy in Backdoor Attack.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

Accurate IoT Device Identification based on A Few Network Traffic.
Proceedings of the 31st IEEE/ACM International Symposium on Quality of Service, 2023

A Fast Adversarial Sample Detection Approach for Industrial Internet-of-Things Applications.
Proceedings of the 31st IEEE/ACM International Symposium on Quality of Service, 2023

A Few-shot-learning-based Method to Object Recognition in Multiple Scenarios.
Proceedings of the 31st IEEE/ACM International Symposium on Quality of Service, 2023

CMMR: A Composite Multidimensional Models Robustness Evaluation Framework for Deep Learning.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2023

Selective Learning for Sample-Efficient Training in Multi-Agent Sparse Reward Tasks.
Proceedings of the ECAI 2023 - 26th European Conference on Artificial Intelligence, September 30 - October 4, 2023, Kraków, Poland, 2023

TransAST: A Machine Translation-Based Approach for Obfuscated Malicious JavaScript Detection.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023

An Edge-oriented Deep Learning Model Security Assessment Framework.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2023

2022
Detecting Adversarial Samples for Deep Learning Models: A Comparative Study.
IEEE Trans. Netw. Sci. Eng., 2022

Time Efficient Tag Searching in Large-Scale RFID Systems: A Compact Exclusive Validation Method.
IEEE Trans. Mob. Comput., 2022

An optimal deployment scheme for extremely fast charging stations.
Peer-to-Peer Netw. Appl., 2022

Efficient and accurate identification of missing tags for large-scale dynamic RFID systems.
J. Syst. Archit., 2022

HashDroid:Extraction of malicious features of Android applications based on function call graph pruning.
Proceedings of the IEEE International Conference on Trust, 2022

WBA: A Warping-based Approach to Generating Imperceptible Adversarial Examples.
Proceedings of the IEEE International Conference on Trust, 2022

Multi-task Adversarial Learning for Semi-supervised Trajectory-User Linking.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2022

Encoding-based Range Detection in Commodity RFID Systems.
Proceedings of the IEEE INFOCOM 2022, 2022

Goal Consistency: An Effective Multi-Agent Cooperative Method for Multistage Tasks.
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022

2021
Time-Efficient Target Tags Information Collection in Large-Scale RFID Systems.
IEEE Trans. Mob. Comput., 2021

An Exploit Kits Detection Approach Based on HTTP Message Graph.
IEEE Trans. Inf. Forensics Secur., 2021

EMPC: Energy-Minimization Path Construction for data collection and wireless charging in WRSN.
Pervasive Mob. Comput., 2021

Accurate Respiration Monitoring for Mobile Users With Commercial RFID Devices.
IEEE J. Sel. Areas Commun., 2021

Fast and Reliable Dynamic Tag Estimation in Large-Scale RFID Systems.
IEEE Internet Things J., 2021

Securing middlebox policy enforcement in SDN.
Comput. Networks, 2021

RF-Ubia: User Biometric Information Authentication Based on RFID.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

Fast Application Activity Recognition with Encrypted Traffic.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

Expandable Fractional Repetition Codes for Distributed Storage Systems.
Proceedings of the IEEE Information Theory Workshop, 2021

Learning to Transfer Under Unknown Noisy Environments: An Universal Weakly-Supervised Domain Adaptation Method.
Proceedings of the 2021 IEEE International Conference on Multimedia and Expo, 2021

Square Fractional Repetition Codes for Distributed Storage Systems.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021

2020
LSCDroid: Malware Detection Based on Local Sensitive API Invocation Sequences.
IEEE Trans. Reliab., 2020

A Cloud-MEC Collaborative Task Offloading Scheme With Service Orchestration.
IEEE Internet Things J., 2020

Towards Real-time Cooperative Deep Inference over the Cloud and Edge End Devices.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2020

When Sharing Economy Meets IoT: Towards Fine-grained Urban Air Quality Monitoring through Mobile Crowdsensing on Bike-share System.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2020

Distributed clustering and operational state scheduling in wireless rechargeable sensor networks.
Int. J. Sens. Networks, 2020

Accurate human activity recognition with multi-task learning.
CCF Trans. Pervasive Comput. Interact., 2020

RPAD: An Unsupervised HTTP Request Parameter Anomaly Detection Method.
Proceedings of the 19th IEEE International Conference on Trust, 2020

WSAD: An Unsupervised Web Session Anomaly Detection Method.
Proceedings of the 16th International Conference on Mobility, Sensing and Networking, 2020

Accurate IoT Device Identification from Merely Packet Length.
Proceedings of the 16th International Conference on Mobility, Sensing and Networking, 2020

Real-time and Accurate RFID Tag Localization based on Multiple Feature Fusion.
Proceedings of the 16th International Conference on Mobility, Sensing and Networking, 2020

Why queue up?: fast parallel search of RFID tags for multiple users.
Proceedings of the Mobihoc '20: The Twenty-first ACM International Symposium on Theory, 2020

RLLL: Accurate Relative Localization of RFID Tags with Low Latency.
Proceedings of the 28th IEEE/ACM International Symposium on Quality of Service, 2020

2019
BridgeTaint: A Bi-Directional Dynamic Taint Tracking Method for JavaScript Bridges in Android Hybrid Applications.
IEEE Trans. Inf. Forensics Secur., 2019

PDRCNN: Precise Phishing Detection with Recurrent Convolutional Neural Networks.
Secur. Commun. Networks, 2019

Vital Signs Monitoring with RFID: Opportunities and Challenges.
IEEE Netw., 2019

Nothing Blocks Me: Precise and Real-Time LOS/NLOS Path Recognition in RFID Systems.
IEEE Internet Things J., 2019

Range-Based Localization for Sparse 3-D Sensor Networks.
IEEE Internet Things J., 2019

An Energy-Aware Offloading Framework for Edge-Augmented Mobile RFID Systems.
IEEE Internet Things J., 2019

Page-sharing-based virtual machine packing with multi-resource constraints to reduce network traffic in migration for clouds.
Future Gener. Comput. Syst., 2019

Enabling Adaptive Intelligence in Cloud-Augmented Multiple Robots Systems.
Proceedings of the 13th IEEE International Conference on Service-Oriented System Engineering, 2019

ReActor: Real-time and Accurate Contactless Gesture Recognition with RFID.
Proceedings of the 16th Annual IEEE International Conference on Sensing, 2019

Privacy-Protected Blockchain System.
Proceedings of the 20th IEEE International Conference on Mobile Data Management, 2019

ADS-SA: System for Automatically Detecting Sensitive Path of Android Applications Based on Static Analysis.
Proceedings of the Smart City and Informatization - 7th International Conference, 2019

2018
A Novel Indoor Localization Algorithm for Efficient Mobility Management in Wireless Networks.
Wirel. Commun. Mob. Comput., 2018

Energy-Aware Temporal Reachability Graphs for Time-Varying Mobile Opportunistic Networks.
IEEE Trans. Veh. Technol., 2018

Big program code dissemination scheme for emergency software-define wireless sensor networks.
Peer-to-Peer Netw. Appl., 2018

Characterizing the Capability of Vehicular Fog Computing in Large-scale Urban Environment.
Mob. Networks Appl., 2018

An optimal algorithm for small group multicast in wireless sensor networks.
Int. J. Ad Hoc Ubiquitous Comput., 2018

Leveraging content similarity among VMI files to allocate virtual machines in cloud.
Future Gener. Comput. Syst., 2018

RFID Localization Based on Multiple Feature Fusion.
Proceedings of the 15th Annual IEEE International Conference on Sensing, 2018

FlowCloak: Defeating Middlebox-Bypass Attacks in Software-Defined Networking.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

2017
Key parameters decision for cloud computing: Insights from a multiple game model.
Concurr. Comput. Pract. Exp., 2017

Exploiting distribution of channel state information for accurate wireless indoor localization.
Comput. Commun., 2017

Edge Mesh: A New Paradigm to Enable Distributed Intelligence in Internet of Things.
IEEE Access, 2017

Accurate Indoor Localization with Multiple Feature Fusion.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

A Weight-Bind-Based Safe Top-k Query Processing Scheme in Two-Tiered Sensor Networks.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

A High Throughput Reader Scheduling Algorithm for Large RFID Systems in Smart Environments.
Proceedings of the 2017 IEEE International Conference on Smart Computing, 2017

Tag size profiling in multiple reader RFID systems.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

2016
Flexible and Time-Efficient Tag Scanning with Handheld Readers.
IEEE Trans. Mob. Comput., 2016

A locality-based range-free localization algorithm for anisotropic wireless sensor networks.
Telecommun. Syst., 2016

Distance outlier detection with a mobile beacon in wireless sensor networks localisation.
Int. J. Secur. Networks, 2016

Who stole my cheese?: Verifying intactness of anonymous RFID systems.
Ad Hoc Networks, 2016

Let's work together: Fast tag identification by interference elimination for multiple RFID readers.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

One more hash is enough: Efficient tag stocktaking in highly dynamic RFID systems.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

2015
Unknown Tag Identification in Large RFID Systems: An Efficient and Complete Solution.
IEEE Trans. Parallel Distributed Syst., 2015

Minimizing Movement for Target Coverage and Network Connectivity in Mobile Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2015

Accurate Range-Free Localization for Anisotropic Wireless Sensor Networks.
ACM Trans. Sens. Networks, 2015

Deterministic Detection of Cloning Attacks for Anonymous RFID Systems.
IEEE Trans. Ind. Informatics, 2015

STEP: A Time-Efficient Tag Searching Protocol in Large RFID Systems.
IEEE Trans. Computers, 2015

A Component-Based Localization Algorithm for Sparse Sensor Networks Combining Angle and Distance Information.
KSII Trans. Internet Inf. Syst., 2015

Energy-efficient active tag searching in large scale RFID systems.
Inf. Sci., 2015

Algorithmic Methods in Wireless Sensor Network 2014.
Int. J. Distributed Sens. Networks, 2015

Energy Balanced Clustering Data Collection Based on Dominating Set in Wireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2015

2014
Defending collaborative false data injection attacks in wireless sensor networks.
Inf. Sci., 2014

ECN-Based Congestion Probability Prediction over Hybrid Wired-Wireless Networks.
Int. J. Distributed Sens. Networks, 2014

An energy-preserving spectrum access strategy in mobile cognitive radio networks.
Trans. Emerg. Telecommun. Technol., 2014

A Cluster-Based False Data Filtering Scheme in Wireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2014

Toward Fast and Deterministic Clone Detection for Large Anonymous RFID Systems.
Proceedings of the 11th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2014

LOCK: A fast and flexible tag scanning mechanism with handheld readers.
Proceedings of the IEEE 22nd International Symposium of Quality of Service, 2014

ArPat: Accurate RFID reader positioning with mere boundary tags.
Proceedings of the 20th IEEE International Conference on Parallel and Distributed Systems, 2014

Intactness verification in anonymous RFID systems.
Proceedings of the 20th IEEE International Conference on Parallel and Distributed Systems, 2014

2013
Secure localization and location verification in wireless sensor networks: a survey.
J. Supercomput., 2013

Adaptive explicit congestion control based on bandwidth estimation for high bandwidth-delay product networks.
Comput. Commun., 2013

A Semantic Medical Multimedia Retrieval Approach Using Ontology Information Hiding.
Comput. Math. Methods Medicine, 2013

A Deterministic Sensor Placement Scheme for Full Coverage and Connectivity without Boundary Effect inWireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2013

An energy-preserving spectrum access strategy in cognitive radio networks.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

A data gathering algorithm based on energy-balanced connected dominating sets in wireless sensor networks.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

A Bacterial Colony Chemotaxis Algorithm with Self-adaptive Mechanism.
Proceedings of the Intelligent Computing Theories and Technology, 2013

Component-Based Localization for Wireless Sensor Networks Combining Angle and Distance Information.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

Time Efficient Tag Searching in Multiple Reader RFID Systems.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

Design of Lightweight Web Page Tamper-Resistant Mechanism for Linux.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013

2012
Range-free selective multilateration for anisotropic wireless sensor networks.
Proceedings of the 9th Annual IEEE Communications Society Conference on Sensor, 2012

Complete and fast unknown tag identification in large RFID systems.
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012

Minimizing Movement for Target Coverage in Mobile Sensor Networks.
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012

An energy-balanced clustering protocol based on dominating set for data gathering in wireless sensor networks.
Proceedings of IEEE International Conference on Communications, 2012

Clique partition based relay placement in WiMAX mesh networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

2011
Anchor supervised distance estimation in anisotropic wireless sensor networks.
Proceedings of the 2011 IEEE Wireless Communications and Networking Conference, 2011

An Explicit Congestion Control Protocol Based on Bandwidth Estimation.
Proceedings of the Global Communications Conference, 2011

A Buffer Management Scheme Based on Message Transmission Status in Delay Tolerant Networks.
Proceedings of the Global Communications Conference, 2011

2010
Accurate and Energy-Efficient Range-Free Localization for Mobile Sensor Networks.
IEEE Trans. Mob. Comput., 2010

Random-walk based approach to detect clone attacks in wireless sensor networks.
IEEE J. Sel. Areas Commun., 2010

On accuracy of region based localization algorithms for wireless sensor networks.
Comput. Commun., 2010

2009
Pollution attack: a new attack against localization in wireless sensor networks.
Proceedings of the 2009 IEEE Wireless Communications and Networking Conference, 2009

On Accuracy of Region-based Localization Algorithms for Wireless Sensor Networks.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

SecMCL: A Secure Monte Carlo Localization Algorithm for Mobile Sensor Networks.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

2008
Locating Nodes in Mobile Sensor Networks More Accurately and Faster.
Proceedings of the Fifth Annual IEEE Communications Society Conference on Sensor, 2008

2007
Secure Hop-Count Based Localization in Wireless Sensor Networks.
Proceedings of the Computational Intelligence and Security, International Conference, 2007


  Loading...