Zehao Sun

According to our database1, Zehao Sun authored at least 14 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Experimental research on vehicle active suspension based on time-delay control.
Int. J. Control, 2024

SDXS: Real-Time One-Step Latent Diffusion Models with Image Conditions.
CoRR, 2024

2023
The decomposition of an NFSR into the cascade connection of two smaller NFSRs revisited.
Des. Codes Cryptogr., May, 2023

2017
SOS: Real-time and accurate physical assault detection using smartphone.
Peer-to-Peer Netw. Appl., 2017

2016
iRun: A Smartphone-Based System to Alert Runners to Warm Up Before Running.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016

Tefnut: An Accurate Smartphone Based Rain Detection System in Vehicles.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016

2015
Spectrum combinatorial double auction for cognitive radio network with ubiquitous network resource providers.
IET Commun., 2015

iProtect: Detecting Physical Assault Using Smartphone.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

Optimal Channel Assignment Schemes in Underlay CRNs with Multi-PU and Multi-SU Transmission Pairs.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

Guardian Angel: A Smartphone Based Personal Security System for Emergency Alerting.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

Recognizing the Operating Hand from Touchscreen Traces on Smartphones.
Proceedings of the Knowledge Science, Engineering and Management, 2015

Primary Secrecy Is Achievable: Optimal Secrecy Rate in Overlay CRNs with an Energy Harvesting Secondary Transmitter.
Proceedings of the 24th International Conference on Computer Communication and Networks, 2015

STRUCTURE: A Strategyproof Double Auction for Heterogeneous Secondary Spectrum Markets.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

2014
A combinatorial double auction mechanism for cloud resource group-buying.
Proceedings of the IEEE 33rd International Performance Computing and Communications Conference, 2014


  Loading...