Zhiwei Zhang

ORCID: 0000-0001-6455-6866
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Privacy-Preserving Technologies in Data
  • Internet Traffic Analysis and Secure E-voting
  • Network Security and Intrusion Detection
  • IoT and Edge/Fog Computing
  • Cloud Data Security Solutions
  • Advanced Malware Detection Techniques
  • Blockchain Technology Applications and Security
  • Mobile Agent-Based Network Management
  • Adversarial Robustness in Machine Learning
  • Network Traffic and Congestion Control
  • Security and Verification in Computing
  • Energy Efficient Wireless Sensor Networks
  • Software-Defined Networks and 5G
  • Security in Wireless Sensor Networks
  • Cloud Computing and Resource Management
  • UAV Applications and Optimization
  • Cryptographic Implementations and Security
  • User Authentication and Security Systems
  • Digital Media Forensic Detection
  • Wireless Networks and Protocols
  • IL-33, ST2, and ILC Pathways
  • Distributed and Parallel Computing Systems
  • Nuclear Receptors and Signaling
  • Video Surveillance and Tracking Methods

Xinjiang University
2024-2025

Xidian University
2012-2025

Tianjin University
2024

Chongqing Medical University
2024

Jiangsu Normal University
2024

Tibet University
2024

The Affiliated Yongchuan Hospital of Chongqing Medical University
2024

Southeast University
2024

Tongji University
2023

Ministry of Ecology and Environment
2023

10.1016/0306-4573(95)80026-p article TL Information Processing & Management 1995-01-01

Spoofing identities using photographs is one of the most common techniques to attack 2-D face recognition systems. There seems exist no comparative studies different same protocols and data. The motivation behind this competition compare performance state-of-the-art algorithms on database a unique evaluation method. Six teams from universities around world have participated in contest. Use or multiple motion, texture analysis liveness detection appears be trend competition. Most are able...

10.1109/ijcb.2011.6117509 article EN 2011-10-01

Vehicle detection and tracking technology plays an important role in intelligent transportation management control systems. This paper proposes a novel vehicle method for small target vehicles to achieve high accuracy based on the attention mechanism. We first develop new model (YOLOv5-NAM) by adding normalization-based module (NAM) classical YOLOv5s model. By exploiting YOLOv5-NAM as detector, we then propose real-time (JDE-YN), where feature extraction process is embedded prediction head...

10.3390/s23020724 article EN cc-by Sensors 2023-01-08

Porous carbon-based hydrogel evaporators show extensive application potential in the field of solar-driven water evaporation due to their wide availability, excellent hydrophilicity, and abundant porous structure. However, closed pore structure single-molecule cross-linked high production cost nanoporous carbon materials not only affect salt resistance but also restrict its large-scale application. Herein, we developed a uniform APRC-PVA/PEG evaporator by integrating poly(vinyl alcohol)...

10.1021/acs.langmuir.4c05279 article EN Langmuir 2025-03-17

Circadian genes control most of the physiological functions in cancer cells, including cell proliferation, migration, and invasion. The CLOCK BMAL1 complex plays a central role circadian rhythms. Previous studies have shown that may act as oncogenes or tumor-suppressor genes. In addition, F-actin, regulated by RHOA, has been to participate tumor progression. However, roles regulation progression via RHOA-ROCK-CFL pathway remain largely unclear. Here we first indicate rearrangement F-actin is...

10.1038/s12276-018-0156-4 article EN cc-by Experimental & Molecular Medicine 2018-10-01

In this study, oxygen-doped carbon nitride (O–C 3 N 4 ) was prepared by thermal polymerization and applied to activate peroxymonosulfate (PMS) for tetracycline (TC) degradation.

10.1039/d3ra00345k article EN cc-by-nc RSC Advances 2023-01-01

This paper proposes a trust ant colony routing algorithm by introducing node evaluation model based on the D-S evidence theory into protocol to improve security of wireless sensor networks. To reduce influence conflict evidences caused malicious nods, consistent intensity is introduced preprocess before using combination rule reliability evaluation. The nodes with high values will be selected as insure security, and are used heuristic functions algorithm. simulation tests conducted network...

10.1109/cc.2018.8331989 article EN China Communications 2018-03-01

At present, the access control schemes in power grid are centralized. In centralized system, data of network sensor nodes is transmitted by nodes, and itself may be illegally tamped with or lost, which can lead to reduced system reliability. For this feature, we apply blockchain technology design schemes. paper, propose a blockchain-based scheme that suitable for multiple scenarios smart grid. Our based on an identity-based combined encryption, signature signcryption scheme. addition,...

10.1109/nana.2019.00070 article EN 2022 International Conference on Networking and Network Applications (NaNA) 2019-10-01

The Southwest Alpine Canyon Area of China was one the regions in world that suffered from severe soil erosion. focus this research to understand response land use change on loss by water erosion alpine canyon Southeast Tibet, we analyzed characteristics temporal and spatial dynamics Niyang River Basin 1990 2020 using GIS statistical methods, assessed RUSLE model. For purpose, meteorological, soil, topographic, remote sensing data were collected. results showed area cropland construction...

10.20944/preprints202401.0140.v1 preprint EN 2024-01-03

For the first time, a tungsten coil (TC) was employed to trap Zn and Cd at room temperature release them by heating simultaneously.

10.1039/c6ra03524h article EN RSC Advances 2016-01-01

10.1007/s12652-018-0757-8 article EN Journal of Ambient Intelligence and Humanized Computing 2018-03-17

The advances in deep neural networks (DNNs) have driven many companies to offer their carefully-trained DNNs as inference services for clients’ private data. privacy concerns increasingly motivated the need (PI), where DNN inferences are performed directly on encrypted data without revealing client’s inputs server or server’s proprietary weights client. However, existing cryptographic protocols PI suffer from impractically high latency, stemming mostly non-linear operators like ReLU...

10.1109/tc.2023.3305754 article EN IEEE Transactions on Computers 2023-08-18

Intelligent vehicles integrate offloading into traditional transportation systems and migrate tasks from resourceconstrained to other or infrastructures for collaborative through this technology, effectively improving the overall utility reducing task computing time. However, few of existing schemes have considered mobility characteristics vehicles, which leads frequent failures. In paper, we take future motion trajectory, resource load, delay account propose a dynamic scheme based on...

10.1109/tvt.2024.3351224 article EN IEEE Transactions on Vehicular Technology 2024-01-09

Abstract Bilinguals may choose to speak a language either at their own will or in response an external demand, but the underlying neural mechanisms two contexts is poorly understood. In present study, Chinese–English bilinguals named pairs of pictures three conditions: during forced-switch, naming altered between 1 and 2. During non-switch, used was same. free-naming, same different languages were participants' will. While behavioural switching costs observed free-naming forced-switching,...

10.1017/s1366728924000324 article EN cc-by Bilingualism Language and Cognition 2024-04-24

As convolutional neural networks (CNNs) exhibit remarkable performance in various inference tasks, it is increasingly important to enable Internet of Things (IoT) devices perform CNN-based applications. Many companies provide their carefully trained as services for resource-constrained clients (e.g., IoT devices). However, the use CNN many applications raises privacy concerns. Cryptographic a way efficiently and, at same time, preserve both client's input data and server's proprietary model....

10.1109/jiot.2023.3251982 article EN IEEE Internet of Things Journal 2023-03-03
Coming Soon ...