default search action
Penghui Zhang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Penghui Zhang, Zhiqing Han:
Normalized ground states for Schrödinger system with a coupled critical nonlinearity. Appl. Math. Lett. 150: 108947 (2024) - [j10]Yuqi Dai, Hua Zhang, Jingyu Wang, Jianxin Liao, Penghui Zhang:
INCS: Intent-driven network-wide configuration synthesis based on deep reinforcement learning. Comput. Networks 251: 110640 (2024) - [j9]Lei Si, Zhongbin Wang, Dong Wei, Jinheng Gu, Penghui Zhang:
Fusion Positioning of Mobile Equipment in Underground Coal Mine Based on Redundant IMUs and UWB. IEEE Trans. Ind. Informatics 20(4): 5946-5958 (2024) - [j8]Penghui Zhang, Hua Zhang, Yibo Pi, Zijian Cao, Jingyu Wang, Jianxin Liao:
AdapINT: A Flexible and Adaptive In-Band Network Telemetry System Based on Deep Reinforcement Learning. IEEE Trans. Netw. Serv. Manag. 21(5): 5505-5520 (2024) - [c16]Zhibo Sun, Faris Bugra Kokulu, Penghui Zhang, Adam Oest, Gianluca Stringhini, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn:
From Victims to Defenders: An Exploration of the Phishing Attack Reporting Ecosystem. RAID 2024: 49-64 - 2023
- [j7]Peng Yang, Penghui Zhang, Bing Li, Shunhang Ji, Meng Yi:
Aspect-Based Sentiment Analysis Using Adversarial BERT with Capsule Networks. Neural Process. Lett. 55(6): 8041-8058 (2023) - [j6]Bing Li, Peng Yang, Hanlin Zhao, Penghui Zhang, Zijian Liu:
Hierarchical Sliding Inference Generator for Question-driven Abstractive Answer Summarization. ACM Trans. Inf. Syst. 41(1): 7:1-7:27 (2023) - [c15]Cheng Zeng, Jun-Bo Wang, Penghui Zhang, Yijian Chen, Hongkang Yu, Gang Wang, Min Lin:
Joint Beamforming and Rate Splitting Scheme Design for Overloaded Industrial Private Networks. ICC Workshops 2023: 813-818 - [i2]Penghui Zhang, Hua Zhang, Yibo Pi, Zijian Cao, Jingyu Wang, Jianxin Liao:
AdapINT: A Flexible and Adaptive In-Band Network Telemetry System Based on Deep Reinforcement Learning. CoRR abs/2310.19331 (2023) - 2022
- [j5]Penghui Zhang, Adam Oest, Haehyun Cho, Zhibo Sun, RC Johnson, Brad Wardman, Shaown Sarker, Alexandros Kapravelos, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn:
CrawlPhish: Large-Scale Analysis of Client-Side Cloaking Techniques in Phishing. IEEE Secur. Priv. 20(2): 10-21 (2022) - [j4]Peng Yang, Zijian Liu, Bing Li, Penghui Zhang:
Implicit Relation Inference with Deep Path Extraction for Commonsense Question Answering. Neural Process. Lett. 54(6): 4751-4768 (2022) - [c14]Penghui Zhang, Zhibo Sun, Sukwha Kyung, Hans Walter Behrens, Zion Leonahenahe Basque, Haehyun Cho, Adam Oest, Ruoyu Wang, Tiffany Bao, Yan Shoshitaishvili, Gail-Joon Ahn, Adam Doupé:
I'm SPARTACUS, No, I'm SPARTACUS: Proactively Protecting Users from Phishing by Intentionally Triggering Cloaking Behavior. CCS 2022: 3165-3179 - [c13]Cheng Zeng, Jun-Bo Wang, Changfeng Ding, Penghui Zhang, Hua Zhang, Min Lin:
Joint Optimization of Trajectory and Beamforming for USV-Assisted Maritime Wireless Network Coexisting With Satellite Network. ICC 2022: 1865-1870 - [c12]Penghui Zhang, Guanming Xiong, Wen Zhao:
CSS: Contrastive Span Selector for Multi-span Question Answering. PRICAI (1) 2022: 225-236 - [c11]Lingyu Zhang, Zhijie He, Xiao Wang, Ying Zhang, Jian Liang, Guobin Wu, Ziqiang Yu, Penghui Zhang, Minghao Ji, Pengfei Xu, Yunhai Wang:
Pick-Up Point Recommendation Using Users' Historical Ride-Hailing Orders. WASA (2) 2022: 393-405 - [c10]Lingyu Zhang, Zhijie He, Xiao Wang, Ying Zhang, Jian Liang, Guobin Wu, Ziqiang Yu, Penghui Zhang, Minghao Ji, Pengfei Xu, Yunhai Wang:
Users' Departure Time Prediction Based on Light Gradient Boosting Decision Tree. WASA (2) 2022: 595-605 - 2021
- [c9]Penghui Zhang, Adam Oest, Haehyun Cho, Zhibo Sun, RC Johnson, Brad Wardman, Shaown Sarker, Alexandros Kapravelos, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn:
CrawlPhish: Large-scale Analysis of Client-side Cloaking Techniques in Phishing. SP 2021: 1109-1124 - [c8]Zhibo Sun, Adam Oest, Penghui Zhang, Carlos E. Rubio-Medrano, Tiffany Bao, Ruoyu Wang, Ziming Zhao, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn:
Having Your Cake and Eating It: An Analysis of Concession-Abuse-as-a-Service. USENIX Security Symposium 2021: 4169-4186 - [i1]Marzieh Bitaab, Haehyun Cho, Adam Oest, Penghui Zhang, Zhibo Sun, Rana Pourmohamad, Doowon Kim, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn:
Scam Pandemic: How Attackers Exploit Public Fear through Phishing. CoRR abs/2103.12843 (2021) - 2020
- [c7]Marzieh Bitaab, Haehyun Cho, Adam Oest, Penghui Zhang, Zhibo Sun, Rana Pourmohamad, Doowon Kim, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn:
Scam Pandemic: How Attackers Exploit Public Fear through Phishing. eCrime 2020: 1-10 - [c6]Adam Oest, Penghui Zhang, Brad Wardman, Eric Nunes, Jakub Burgis, Ali Zand, Kurt Thomas, Adam Doupé, Gail-Joon Ahn:
Sunrise to Sunset: Analyzing the End-to-end Life Cycle and Effectiveness of Phishing Attacks at Scale. USENIX Security Symposium 2020: 361-377 - [c5]Adam Oest, Yeganeh Safaei, Penghui Zhang, Brad Wardman, Kevin Tyers, Yan Shoshitaishvili, Adam Doupé:
PhishTime: Continuous Longitudinal Measurement of the Effectiveness of Anti-phishing Blacklists. USENIX Security Symposium 2020: 379-396
2010 – 2019
- 2019
- [c4]Penghui Zhang, Wujun Li, Xiaobo Yang:
Efficient Implementation of Recursive Multi-Frame Track-Before-Detect Algorithm Based on FPGA. ICCAIS 2019: 1-6 - [c3]Penghui Zhang, Haehyun Cho, Ziming Zhao, Adam Doupé, Gail-Joon Ahn:
iCore: continuous and proactive extrospection on multi-core IoT devices. SAC 2019: 851-860 - 2018
- [c2]Haehyun Cho, Penghui Zhang, Donguk Kim, Jinbum Park, Choong-Hoon Lee, Ziming Zhao, Adam Doupé, Gail-Joon Ahn:
Prime+Count: Novel Cross-world Covert Channels on ARM TrustZone. ACSAC 2018: 441-452 - [c1]Penghui Zhang, Bernard Ngabonziza, Haehyun Cho, Ziming Zhao, Adam Doupé, Gail-Joon Ahn:
SeCore: Continuous Extrospection with High Visibility on Multi-core ARM Platforms. CODASPY 2018: 161-163 - 2017
- [j3]Limei Zhang, Yongfu Liu, Penghui Zhang, Wei Tang, Jing Lv, Lu Zhang, Dongming Li:
Parallel computing of power flow for complex distribution network with DGs. J. Intell. Fuzzy Syst. 33(5): 2987-2997 (2017) - 2014
- [j2]Anfeng Liu, Deyu Zhang, Penghui Zhang, Guohua Cui, Zhigang Chen:
On mitigating hotspots to maximize network lifetime in multi-hop wireless sensor network with guaranteed transport delay and reliability. Peer-to-Peer Netw. Appl. 7(3): 255-273 (2014) - 2011
- [j1]Anfeng Liu, Peng-Hui Zhang, Zhi-Gang Chen:
Theoretical analysis of the lifetime and energy hole in cluster based wireless sensor networks. J. Parallel Distributed Comput. 71(10): 1327-1355 (2011)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-26 00:48 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint