Zhang Zhen

Results: 27



#Item
1Computing / Internet / Computer network security / Internet privacy / Information and communications technology / Transport Layer Security / Cryptographic protocols / Secure communication / HTTP cookie / HTTPS / Deep packet inspection / Man-in-the-middle attack

Poster: Understanding Free-riding Attacks in Internet Zero-rating Services Zhiheng Liu, Zhen Zhang, Shihao Jing, Zhaohan Xi and Yinzhi Cao Lehigh University 27 Memorial Dr W, Bethlehem, PA, USA [zhl416][zhza16][shj316][z

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-13 04:51:38
2

VERIFICATION METHODOLOGIES FOR FAULT-TOLERANT NETWORK-ON-CHIP SYSTEMS by Zhen Zhang

Add to Reading List

Source URL: www.async.ece.utah.edu

Language: English - Date: 2016-08-29 19:05:35
    3Artificial intelligence / Feature detection / Machine learning / Face recognition / Local binary patterns / Ensemble learning / Learning / Local ternary patterns

    Learning Multi-scale Block Local Binary Patterns for Face Recognition Shengcai Liao, Xiangxin Zhu, Zhen Lei, Lun Zhang, and Stan Z. Li Center for Biometrics and Security Research & National Laboratory of Pattern Recognit

    Add to Reading List

    Source URL: www.cbsr.ia.ac.cn

    Language: English - Date: 2007-09-09 11:28:31
    4Data management / Data integration / Computing / Ontology / Database / Information science / Semantic matching / Information technology / Schema matching

    Toward Large Scale Integration: Building a MetaQuerier over Databases on the Web Kevin Chen-Chuan Chang, Bin He, and Zhen Zhang∗ Computer Science Department University of Illinois at Urbana-Champaign {kcchang, binhe, z

    Add to Reading List

    Source URL: www-db.cs.wisc.edu

    Language: English - Date: 2011-09-16 15:44:46
    5

    Deficient Documentation Detection A Methodology to Locate Deficient Project Documentation using Topic Analysis Joshua Charles Campbell∗ , Chenlei Zhang∗ , Zhen Xu† , Abram Hindle∗ , James Miller† ∗ Department

    Add to Reading List

    Source URL: webdocs.cs.ualberta.ca

    Language: English - Date: 2013-04-16 12:55:27
      6

      Field and long-term demonstration of a wide area quantum key distribution network Shuang Wang, Wei Chen, Zhen-Qiang Yin, Li-Jun Zhang, Guang-Can Guo, and Zheng-Fu Han 1

      Add to Reading List

      Source URL: 2015.qcrypt.net

      Language: English - Date: 2015-09-22 01:46:07
        7

        On Brewing Fresh Espresso: LinkedIn’s Distributed Data Serving Platform Lin Qiao, Kapil Surlaker, Shirshanka Das, Tom Quiggle, Bob Schulman, Bhaskar Ghosh, Antony Curtis, Oliver Seeliger, Zhen Zhang, Aditya Auradkar, C

        Add to Reading List

        Source URL: www.cs.cmu.edu

        Language: English - Date: 2013-12-17 10:27:35
          8

          An Improved Outer Bound for Multisource Multisink Network Coding Xijin Yan, Jun Yang and Zhen Zhang Communication Sciences Institute Department of Electrical Engineering-Systems University of Southern California

          Add to Reading List

          Source URL: www.netcod.org

          Language: English - Date: 2005-04-01 20:58:01
            9

            By BIN HE, MITESH PATEL, ZHEN ZHANG, and KEVIN CHEN-CHUAN CHANG ACCESSING THE DEEP WEB

            Add to Reading List

            Source URL: www-forward.cs.uiuc.edu

            Language: English - Date: 2011-09-07 11:19:47
              10

              The Leadership Quarterly – 20 The determinants of leadership role occupancy: Genetic and personality factors Richard D. Arvey a,*, Maria Rotundo b, Wendy Johnson a, Zhen Zhang a, Matt McGue a a

              Add to Reading List

              Source URL: bschool.nus.edu

              - Date: 2009-02-09 01:29:15
                UPDATE