


default search action
Lei Zhu 0011
Person information
- affiliation: Xi'an University of Technology, College of Computer Science and Engineering, China
Other persons with the same name
- Lei Zhu — disambiguation page
- Lei Zhu 0001 — Georgia Institute of Technology, School of Mechanical Engineering, Atlanta, GA, USA
- Lei Zhu 0002
— Shandong Normal University, School of Information Science and Engineering, Jinan, China (and 3 more)
- Lei Zhu 0003
— Hong Kong Polytechnic University, School of Nursing, China (and 1 more)
- Lei Zhu 0004
— Qiqihar University, Communication and Electronics Engineering Institute, China (and 1 more)
- Lei Zhu 0005
— Central South University, School of Information Science and Engineering, Changsha, China
- Lei Zhu 0006 — University of Arizona, Tucson, USA
- Lei Zhu 0007
— Army Engineering University of PLA, College of Communication Engineering, Nanjing, China
- Lei Zhu 0008
— National Renewable Energy Laboratory, Golden, CO, USA
- Lei Zhu 0009
— University of Macau, Department of Electrical and Computer Engineering, China
- Lei Zhu 0010
— Wuhan University of Science and Technology, School of Information Science and Engineering, China (and 1 more)
- Lei Zhu 0012
— Peking University, Health Science Center, Institute of Medical Technology, Beijing, China (and 1 more)
- Lei Zhu 0013 — State University of New York at Buffalo, Department of Computer Science and Engineering, NY, USA
- Lei Zhu 0014
— Beihang University, Lab for Low-carbon Intelligent Governance, LLIG, School of Economics and Management, China
- Lei Zhu 0015
— A*STAR, Institute of High Performance Computing, IHPC, Agency for Science, Technology and Research, Singapore (and 1 more)
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j27]Kun Jiang
, Ting Cao, Lei Zhu, Qindong Sun:
Adaptive and flexible ℓ 1-norm graph embedding for unsupervised feature selection. Appl. Intell. 54(22): 11732-11751 (2024) - [j26]Kun Jiang
, Lei Zhu, Zheng Liu, Qindong Sun:
Subspace clustering via adaptive-loss regularized representation learning with latent affinities. Pattern Anal. Appl. 27(1): 15 (2024) - [c29]Kun Jiang, Lei Zhu, Qindong Sun:
Unsupervised Feature Selection via Fuzzy K-Means and Sparse Projection. APWeb/WAIM (5) 2024: 224-239 - [c28]Jie Zhang
, Wenxin Zhang, Mengfei Kang
, Xin Zhang, Lei Zhu, Xinhong Hei
:
astPSL: Similarity Learning System Based on Structured and Unstructured Records. DASFAA (7) 2024: 513-517 - [c27]Xinhong Hei, Jianfeng Chen, Yichuan Wang, Xin Song, Lei Zhu:
A Novel Multipath Data Transmission Method with Traffic Obfuscation. NaNA 2024: 293-298 - 2023
- [j25]Kun Jiang
, Lei Zhu, Qindong Sun:
Joint Dual-Structural Constrained and Non-negative Analysis Representation Learning for Pattern Classification. Appl. Artif. Intell. 37(1) (2023) - [j24]Mingsong Yang
, Qin Zhao, Lei Zhu, Haining Meng, Kehai Chen, Zongjian Li, Xinhong Hei:
Semi-automatic representation of design code based on knowledge graph for automated compliance checking. Comput. Ind. 150: 103945 (2023) - [j23]Kun Jiang
, Congyao Zhao, Lei Zhu, Qindong Sun:
Class-oriented and label embedding analysis dictionary learning for pattern classification. Multim. Tools Appl. 82(16): 24919-24942 (2023) - [c26]Yichuan Wang
, Jingjing Zhao
, Yaling Zhang
, Xinhong Hei
, Lei Zhu
:
Smart Contract Symbol Execution Vulnerability Detection Method Based on CFG Path Pruning. BSCI 2023: 132-139 - [c25]Tong Zhang, Wei Wei, Yichuan Wang, Xi Deng, Lei Zhu, Wenjiang Ji:
Formal Modeling and Defense Methods for 5G Network Endpoint Access Denial of Service Attacks. NaNA 2023: 72-77 - [c24]Lei Zhu, Miaoqing Wen, Tong Zhang, Yichuan Wang, Jing Wang, Mingsong Yang, Bing Ma:
A Text Classification Method of Network Public Opinion Based on Information Fusion. NaNA 2023: 484-489 - 2022
- [j22]Kun Jiang
, Congyao Zhao, Zheng Liu, Lei Zhu:
Adaptive graph regularized and label embedded dictionary learning for pattern classification. J. Electronic Imaging 31(3) (2022) - [j21]Mengyang Li, Xinhong Hei
, Wenjiang Ji
, Lei Zhu
, Yichuan Wang
, Yuan Qiu:
A Fault-Diagnosis Method for Railway Turnout Systems Based on Improved Autoencoder and Data Augmentation. Sensors 22(23): 9438 (2022) - [j20]Xiaoyan Zhu
, Chenyu Yan
, E. James Whitehead Jr., Binbin Niu, Lei Zhu, Long Pan:
Just-in-time defect prediction for software hunks. Softw. Pract. Exp. 52(1): 130-153 (2022) - [c23]Kun Jiang, Lei Zhu, Zheng Liu:
Discriminative and Robust Analysis Dictionary Learning for Pattern Classification. ICANN (4) 2022: 370-382 - [c22]Yeqiu Xiao, Yichuan Wang, Wenjiang Ji, Lei Zhu, Xinhong Hei:
Effective Secrecy Throughput Analysis for Communication Systems with a DF Satellite Relay. NaNA 2022: 1-5 - 2021
- [j19]Yichuan Wang, Binbin Bai
, Xinhong Hei, Lei Zhu, Wenjiang Ji:
An unknown protocol syntax analysis method based on convolutional neural network. Trans. Emerg. Telecommun. Technol. 32(5) (2021) - [j18]Wenjiang Ji, Chen Cheng, Guo Xie, Lei Zhu, Yichuan Wang, Long Pan, Xinhong Hei:
An intelligent fault diagnosis method based on curve segmentation and SVM for rail transit turnout. J. Intell. Fuzzy Syst. 41(3): 4275-4285 (2021) - [j17]Yichuan Wang
, Xiaolong Liang
, Xinhong Hei
, Wenjiang Ji, Lei Zhu:
Deep Learning Data Privacy Protection Based on Homomorphic Encryption in AIoT. Mob. Inf. Syst. 2021: 5510857:1-5510857:11 (2021) - [j16]Yichuan Wang
, Yuying Tian
, Xinhong Hei
, Lei Zhu, Wenjiang Ji:
A Novel IoV Block-Streaming Service Awareness and Trusted Verification Scheme in 6G. IEEE Trans. Veh. Technol. 70(6): 5197-5210 (2021) - [c21]Yichuan Wang, He Wang, Xinhong Hei, Wenjiang Ji, Lei Zhu:
Petri net modeling and vulnerability analysis of the Heartbleed. NaNA 2021: 155-160 - [c20]Guiling Zhang, Yaling Zhang, Yichuan Wang, Lei Zhu, Wenjiang Ji:
A fine-grained petri model for SQL time-blind injection. NaNA 2021: 161-167 - [c19]Xin Song, Yichuan Wang, Lei Zhu, Wenjiang Ji, Yanning Du, Feixiong Hu:
A Method for Fast Outlier Detection in High Dimensional Database Log. NaNA 2021: 236-241 - [c18]Xiaoyan Zhu, Yu Zhang, Lei Zhu, Xinhong Hei, Yichuan Wang, Feixiong Hu, Yanni Yao:
Chinese named entity recognition method for the field of network security based on RoBERTa. NaNA 2021: 420-425 - [c17]Yaling Zhang, Hongyun Wang, Yichuan Wang, Wenjiang Ji, Lei Zhu:
Signature Scheme Based on The SM2 Algorithm in Fabric. NaNA 2021: 443-448 - [c16]Lei Zhu, Ziheng Zhang, Xinhong Hei, Yichuan Wang, Ziliang Yang, Feixiong Hu, Ping He:
A permission generation and configuration method based on Rules and FP-Growth algorithm. NaNA 2021: 495-500 - [c15]Xinhong Hei, Hao Zhang, Wenjiang Ji, Yichuan Wang, Lei Zhu, Yuan Qiu:
ConvCatb: An Attention-based CNN-CATBOOST Risk Prediction Model for Driving Safety. NaNA 2021: 513-519 - [c14]Wenjiang Ji, Jiangcheng Yang, Yichuan Wang, Lei Zhu, Yuan Qiu, Xinhong Hei:
A Driving Risk Prediction Approach Based on Generative Adversarial Networks and VANET for Autonomous Trams. NaNA 2021: 520-526 - [c13]Yichuan Wang, Xiaolong Liang, Xinhong Hei, Lei Zhu, Wenjiang Ji:
A Heuristic SAT Problems Solving Method based on LSTM Network. PAAP 2021: 141-145 - 2020
- [j15]Xinhong Hei, Xinyue Yin, Yichuan Wang, Ju Ren, Lei Zhu:
A trusted feature aggregator federated learning for distributed malicious attack detection. Comput. Secur. 99: 102033 (2020) - [j14]Lei Zhu, Ping He, Xinhong Hei, Yanni Yao, Yichuan Wang, Wenjiang Ji, Qin Zhao, Long Pan:
Combined access control model embedding configurable policy for fine-grained data security. Microprocess. Microsystems 75: 103060 (2020) - [j13]Zhihai Yang
, Qindong Sun, Yaling Zhang, Lei Zhu, Wenjiang Ji:
Inference of Suspicious Co-Visitation and Co-Rating Behaviors and Abnormality Forensics for Recommender Systems. IEEE Trans. Inf. Forensics Secur. 15: 2766-2781 (2020) - [j12]Xinhong Hei, Wen Gao
, Yichuan Wang
, Lei Zhu, Wenjiang Ji:
From Hardware to Operating System: A Static Measurement Method of Android System Based on TrustZone. Wirel. Commun. Mob. Comput. 2020: 8816023:1-8816023:13 (2020) - [c12]Kun Jiang
, Lei Zhu, Qindong Sun:
Optimizing Scoring and Sorting Operations for Faster WAND Processing. ADMA 2020: 499-514 - [c11]Xinhong Hei, Xiaolong Liang, Yichuan Wang, Wenjiang Ji, Lei Zhu:
Deep Learning as a Service Based on Encrypted Data. NaNA 2020: 53-58 - [c10]Yanning Du, Yichuan Wang, Lei Zhu, Wenjiang Ji, Xin Song, Yida Yang, Long Pan:
A Framework for Audit Analysis of Heterogeneous Logs from PaaS. NaNA 2020: 292-297 - [c9]Lei Zhu, Yaolin Liu, Xinhong Hei, Yichuan Wang, Haining Meng, Jiuyuan Jiao, Long Pan:
A study on exercise recommendation method using Knowledge Graph for computer network course. NaNA 2020: 436-442
2010 – 2019
- 2019
- [j11]Lei Du, Kefei Liu, Lei Zhu, Xiaohui Yao, Shannon L. Risacher
, Lei Guo, Andrew J. Saykin, Li Shen:
Identifying progressive imaging genetic patterns via multi-task sparse canonical correlation analysis: a longitudinal study of the ADNI cohort. Bioinform. 35(14): i474-i483 (2019) - [j10]Yanxiao Liu
, Qindong Sun, Yichuan Wang, Lei Zhu, Wenjiang Ji:
Efficient group authentication in RFID using secret sharing scheme. Clust. Comput. 22(Supplement): 8605-8611 (2019) - [j9]Yichuan Wang
, He Zhu, Xinhong Hei, Yue Kong, Wenjiang Ji, Lei Zhu:
An energy saving based on task migration for mobile edge computing. EURASIP J. Wirel. Commun. Netw. 2019: 133 (2019) - [j8]Wenjiang Ji, Lei Zhu, Yichuan Wang, Zheng Liu, Xinhong Hei:
RSU authentication in vehicular ad hoc networks base on verifiable secret sharing. J. Intell. Fuzzy Syst. 37(4): 4531-4536 (2019) - [j7]Lei Zhu
, Yanni Yao, Yichuan Wang, Xinhong Hei, Qin Zhao, Wenjiang Ji, Quanzhu Yao:
A novel subgraph querying method based on paths and spectra. Neural Comput. Appl. 31(9): 5671-5678 (2019) - [c8]Xinhong Hei, Yi Chen, Lei Zhu, Qin Zhao, Long Pan:
A Novel Chinese Word Segmentation Method for Rail Transit Codes. AIAM (IEEE) 2019: 293-299 - [c7]Xinhong Hei, Binbin Bai, Yichuan Wang, Li Zhang, Lei Zhu, Wenjiang Ji:
Feature Extraction Optimization for Bitstream Communication Protocol Format Reverse Analysis. TrustCom/BigDataSE 2019: 662-669 - 2018
- [j6]Yichuan Wang
, Yefei Zhang, Lei Zhu, Wenjiang Ji, Yanxiao Liu, Xinhong Hei:
A novel energy-aware trustworthy multi-hop routing model for Internet of things. Int. J. Distributed Sens. Networks 14(12) (2018) - [j5]Yanxiao Liu, Ching-Nung Yang, Yichuan Wang, Lei Zhu, Wenjiang Ji:
Cheating identifiable secret sharing scheme using symmetric bivariate polynomial. Inf. Sci. 453: 21-29 (2018) - [j4]Xiaoyan Zhu
, Yueyang He
, Long Cheng, Xiaolin Jia, Lei Zhu:
Software change-proneness prediction through combination of bagging and resampling methods. J. Softw. Evol. Process. 30(12) (2018) - [j3]Yichuan Wang
, Yefei Zhang, Wenjiang Ji, Lei Zhu, Yanxiao Liu
:
Gleer: A Novel Gini-Based Energy Balancing Scheme for Mobile Botnet Retopology. Wirel. Commun. Mob. Comput. 2018: 7805408:1-7805408:10 (2018) - [c6]Wei Wang, Yanni Yao, Lei Zhu, Xinhong Hei, Yichuan Wang:
A Novel Subgraph Querying Method on Directed Weighted Graphs. CIS 2018: 150-154 - [c5]Jie Zhang, Yi Chen, Xinhong Hei, Lei Zhu, Qin Zhao, Yichuan Wang:
A RMM Based Word Segmentation Method for Chinese Design Specifications of Building Stairs. CIS 2018: 277-280 - [c4]Zhongdi Liang, Xinhong Hei, Yichuan Wang, Wenjiang Ji, Lei Zhu, Yefei Zhang:
Analysis and Protection of DDOS Attack Based on RSSP-II Protocol. NaNA 2018: 117-120 - 2017
- [c3]Lei Zhu, Yanxiao Liu, Yichuan Wang, Wenjiang Ji, Xinhong Hei, Quanzhu Yao, Xiaoyan Zhu:
Efficient (k, n) Secret Sharing Scheme Secure against k - 2 Cheaters. NaNA 2017: 1-4 - 2016
- [j2]Liumei Zhang, Yichuan Wang, Lei Zhu, Wenjiang Ji:
Towards energy efcient cloud: an optimized ant colony model for virtual machine placement. J. Commun. Inf. Networks 1(4): 116-132 (2016) - [c2]Wen Jiang Ji, Yichuan Wang, Yanxiao Liu, Lei Zhu, Weigang Ma, Li Yan:
A New Interference Aware Routing Metric for Multi-radio Multi-channel Wireless Mesh Networks. NaNA 2016: 135-140 - [c1]Yanxiao Liu, Yichuan Wang, Lei Zhu, Jiwen Jiang, Xinhong Hei:
(k, n) Secret Sharing Scheme against Two Types of Cheaters. NaNA 2016: 284-287 - 2015
- [j1]Lei Du
, Qinbao Song, Lei Zhu
, Xiaoyan Zhu:
A Selective Detector Ensemble for Concept Drift Detection. Comput. J. 58(3): 457-471 (2015)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-08 00:53 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint