default search action
Dawei Zhao 0001
Person information
- affiliation: Qilu University of Technology, Shandong Academy of Sciences, National Supercomputer Center in Jinan, China
- affiliation (PhD 2014): Beijing University of Posts and Telecommunications, cryptology Department, China
Other persons with the same name
- Dawei Zhao — disambiguation page
- Dawei Zhao 0002 — Anhui University, School of Computer Science and Technology, Hefei, China
- Dawei Zhao 0003 — Unmanned Systems Technology Research Center, Defense Innovation Institute, Beijing, China (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j35]Lijuan Xu, Zicheng Zhao, Dawei Zhao, Xin Li, Xiyu Lu, Dingyu Yan:
AJSAGE: A intrusion detection scheme based on Jump-Knowledge Connection To GraphSAGE. Comput. Secur. 150: 104263 (2025) - [j34]Lijuan Xu, Bailing Wang, Dawei Zhao, Xiaoming Wu:
DAN: Neural network based on dual attention for anomaly detection in ICS. Expert Syst. Appl. 263: 125766 (2025) - [j33]Lijuan Xu, Baolong An, Xin Li, Dawei Zhao, Haipeng Peng, Weizhao Song, Fenghua Tong, Xiaohui Han:
TFHSVul: A Fine-Grained Hybrid Semantic Vulnerability Detection Method Based on Self-Attention Mechanism in IoT. IEEE Internet Things J. 12(1): 30-44 (2025) - 2024
- [j32]Fenghua Tong, Dawei Zhao, Xin Li, Lixiang Li:
Designing incoherent unit norm tight frames via block coordinate descent-based alternating projection. Appl. Math. Comput. 474: 128687 (2024) - [j31]Yaru Liu, Lijuan Xu, Shumian Yang, Dawei Zhao, Xin Li:
Adversarial sample attacks and defenses based on LSTM-ED in industrial control systems. Comput. Secur. 140: 103750 (2024) - [j30]Xinxin Xiang, Fenghua Tong, Dawei Zhao, Xin Li, Shumian Yang:
Dual-domain sampling and feature-domain optimization network for image compressive sensing. Eng. Appl. Artif. Intell. 137: 109099 (2024) - [j29]Yan Xu, Juan Wang, Jiaxing Chen, Dawei Zhao, Mahmut Özer, Chengyi Xia, Matjaz Perc:
Reinforcement learning and collective cooperation on higher-order networks. Knowl. Based Syst. 301: 112326 (2024) - [j28]Lijuan Xu, Ziyu Han, Zhen Wang, Dawei Zhao:
Finding Component Relationships: A Deep-Learning-Based Anomaly Detection Interpreter. IEEE Trans. Comput. Soc. Syst. 11(3): 4149-4162 (2024) - [j27]Lijuan Xu, Ziyu Han, Dawei Zhao, Xin Li, Fuqiang Yu, Chuan Chen:
Addressing Concept Drift in IoT Anomaly Detection: Drift Detection, Interpretation, and Adaptation. IEEE Trans. Sustain. Comput. 9(6): 913-924 (2024) - [c8]Lijuan Xu, Zhiang Yao, Dawei Zhao, Xin Li:
GNN-ASG: A Double Feature Selection-based Adversarial Sample Generation Method in Industrial Control System. CSCWD 2024: 359-364 - [c7]Dawei Zhao, Hui Yu, Chuan Chen, Lixiang Li, Ling Mi:
Speech Encryption Scheme Based on Chaotic Memristor Neural Network and S-Box. NLPCC (4) 2024: 483-495 - 2023
- [j26]Chaofan Tang, Lijuan Xu, Bo Yang, Yongwei Tang, Dawei Zhao:
GRU-Based Interpretable Multivariate Time Series Anomaly Detection in Industrial Control System. Comput. Secur. 127: 103094 (2023) - [j25]Lijuan Xu, Xiao Ding, Dawei Zhao, Alex X. Liu, Zhen Zhang:
A Three-Dimensional ResNet and Transformer-Based Approach to Anomaly Detection in Multivariate Temporal-Spatial Data. Entropy 25(2): 180 (2023) - [j24]Lijuan Xu, Xiao Ding, Haipeng Peng, Dawei Zhao, Xin Li:
ADTCD: An Adaptive Anomaly Detection Approach Toward Concept Drift in IoT. IEEE Internet Things J. 10(18): 15931-15942 (2023) - [j23]Fenghua Tong, Dawei Zhao, Chuan Chen, Lixiang Li:
Coherence-penalty minimization method for incoherent unit-norm tight frame design. Signal Process. 205: 108864 (2023) - [j22]Dawei Zhao, Shudong Li, Zhen Wang, Haipeng Peng:
Cooperation and Competition Coupled Diffusion of Multi-Feature on Multiplex Networks and Its Control. IEEE Trans. Netw. Sci. Eng. 10(4): 2307-2318 (2023) - [j21]Jiaxing Chen, Meiling Feng, Dawei Zhao, Chengyi Xia, Zhen Wang:
Composite Effective Degree Markov Chain for Epidemic Dynamics on Higher-Order Networks. IEEE Trans. Syst. Man Cybern. Syst. 53(12): 7415-7426 (2023) - [j20]Shudong Li, Chuanyu Zhao, Qing Li, Jiuming Huang, Dawei Zhao, Peican Zhu:
BotFinder: a novel framework for social bots detection in online social networks based on graph embedding and community detection. World Wide Web (WWW) 26(4): 1793-1809 (2023) - [c6]Shumian Yang, Xinxin Xiang, Fenghua Tong, Dawei Zhao, Xin Li:
Image Compressed Sensing Using Multi-Scale Characteristic Residual Learning. ICME 2023: 1595-1600 - [c5]Chenyu Sun, Dawei Zhao, Shumian Yang, Lijuan Xu, Xin Li:
A Malicious Code Family Classification Method Based on RGB Images and Lightweight Model. ICONIP (14) 2023: 149-165 - 2022
- [j19]Yanrong Lu, Dawei Zhao:
Providing impersonation resistance for biometric-based authentication scheme in mobile cloud computing service. Comput. Commun. 182: 22-30 (2022) - [j18]Xin Gao, Yang Zhou, Lijuan Xu, Dawei Zhao:
Optimal Security Protection Strategy Selection Model Based on Q-Learning Particle Swarm Optimization. Entropy 24(12): 1727 (2022) - [j17]Fumin Yi, Lei Zhang, Lijuan Xu, Shumian Yang, Yanrong Lu, Dawei Zhao:
WSNEAP: An Efficient Authentication Protocol for IIoT-Oriented Wireless Sensor Networks. Sensors 22(19): 7413 (2022) - [j16]Fenghua Tong, Lixiang Li, Haipeng Peng, Dawei Zhao:
Progressive coherence and spectral norm minimization scheme for measurement matrices in compressed sensing. Signal Process. 194: 108435 (2022) - [j15]Lijuan Xu, Bailing Wang, Xiaoming Wu, Dawei Zhao, Lei Zhang, Zhen Wang:
Detecting Semantic Attack in SCADA System: A Behavioral Model Based on Secondary Labeling of States-Duration Evolution Graph. IEEE Trans. Netw. Sci. Eng. 9(2): 703-715 (2022) - 2021
- [j14]Shudong Li, Laiyuan Jiang, Xiaobo Wu, Weihong Han, Dawei Zhao, Zhen Wang:
A weighted network community detection algorithm based on deep learning. Appl. Math. Comput. 401: 126012 (2021) - [j13]Dawei Zhao, Gaoxi Xiao, Zhen Wang, Lianhai Wang, Lijuan Xu:
Minimum Dominating Set of Multiplex Networks: Definition, Application, and Identification. IEEE Trans. Syst. Man Cybern. Syst. 51(12): 7823-7837 (2021) - [c4]Fumin Yi, Lei Zhang, Shumian Yang, Dawei Zhao:
A Security-Enhanced Modbus TCP Protocol and Authorized Access Mechanism. DSC 2021: 61-67 - 2020
- [j12]Shudong Li, Dawei Zhao, Xiaobo Wu, Zhihong Tian, Aiping Li, Zhen Wang:
Functional immunization of networks based on message passing. Appl. Math. Comput. 366 (2020) - [j11]Lijuan Xu, Bailing Wang, Lianhai Wang, Dawei Zhao, Xiaohui Han, Shumian Yang:
PLC-SEIFF: A programmable logic controller security incident forensics framework based on automatic construction of security constraints. Comput. Secur. 92: 101749 (2020) - [j10]Dawei Zhao, Shumian Yang, Xiaohui Han, Shuhui Zhang, Zhen Wang:
Dismantling and Vertex Cover of Network Through Message Passing. IEEE Trans. Circuits Syst. 67-II(11): 2732-2736 (2020) - [j9]Dawei Zhao, Lijuan Xu, Shao-Meng Qin, Guangqi Liu, Zhen Wang:
The Feedback Vertex Set Problem of Multiplex Networks. IEEE Trans. Circuits Syst. 67-II(12): 3492-3496 (2020)
2010 – 2019
- 2019
- [j8]Xiaohui Han, Lianhai Wang, Shujiang Xu, Dawei Zhao, Guangqi Liu:
Recognizing roles of online illegal gambling participants: An ensemble learning approach. Comput. Secur. 87 (2019) - [j7]Dawei Zhao, Lianhai Wang, Zhen Wang, Gaoxi Xiao:
Virus Propagation and Patch Distribution in Multiplex Networks: Modeling, Analysis, and Optimal Allocation. IEEE Trans. Inf. Forensics Secur. 14(7): 1755-1767 (2019) - 2018
- [j6]Dawei Zhao, Bo Gao, Yaofei Wang, Lianhai Wang, Zhen Wang:
Optimal Dismantling of Interdependent Networks Based on Inverse Explosive Percolation. IEEE Trans. Circuits Syst. II Express Briefs 65-II(7): 953-957 (2018) - [c3]Xiaohui Han, Lianhai Wang, Shujiang Xu, Dawei Zhao, Guangqi Liu:
Role Recognition of Illegal Online Gambling Participants Using Monetary Transaction Data. ICICS 2018: 584-597 - 2017
- [j5]Bo Gao, Zheng-hong Deng, Dawei Zhao, Qun Song:
State analysis of Boolean control networks with impulsive and uncertain disturbances. Appl. Math. Comput. 301: 187-192 (2017) - [c2]Shujiang Xu, Lianhai Wang, Guangqi Liu, Xiaohui Han, Dawei Zhao, Lijuan Xu:
The Categories of Quantum Information Hiding Protocol. ICCCS (1) 2017: 143-152 - [c1]Xiaohui Han, Lianhai Wang, Shujiang Xu, Guangqi Liu, Dawei Zhao:
Linking social network accounts by modeling user spatiotemporal habits. ISI 2017: 19-24 - 2016
- [i7]Dawei Zhao, Zhen Wang, Gaoxi Xiao, Bo Gao, Lianhai Wang:
The robustness of interdependent networks under the interplay between cascading failures and virus propagation. CoRR abs/1608.01037 (2016) - [i6]Zhen Wang, Chris T. Bauch, Samit Bhattacharyya, Alberto d'Onofrio, Piero Manfredi, Matjaz Perc, Nicola Perra, Marcel Salathé, Dawei Zhao:
Statistical physics of vaccination. CoRR abs/1608.09010 (2016) - 2015
- [j4]Dawei Zhao, Lianhai Wang, Lijuan Xu, Zhen Wang:
Finding another yourself in multiplex networks. Appl. Math. Comput. 266: 599-604 (2015) - [i5]Dawei Zhao, Lianhai Wang, Zhen Wang:
The robustness of multiplex networks under layer node-based attack. CoRR abs/1509.03002 (2015) - 2014
- [j3]Dawei Zhao, Haipeng Peng, Lixiang Li, SiLi Hui, Yixian Yang:
Novel way to research nonlinear feedback shift register. Sci. China Inf. Sci. 57(9): 1-14 (2014) - [j2]Dawei Zhao, Haipeng Peng, Lixiang Li, Yixian Yang:
A Secure and Effective Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks. Wirel. Pers. Commun. 78(1): 247-269 (2014) - 2013
- [i4]Dawei Zhao, Haipeng Peng, Shudong Li, Yixian Yang:
An efficient dynamic ID based remote user authentication scheme using self-certified public keys for multi-server environment. CoRR abs/1305.6350 (2013) - [i3]Dawei Zhao, Haipeng Peng, Lixiang Li, Yixian Yang:
A secure and effective anonymous authentication scheme for roaming service in global mobility networks. CoRR abs/1306.4726 (2013) - [i2]Dawei Zhao, Lixiang Li, Haipeng Peng, Qun Luo, Yixian Yang:
Multiple Vectors Propagation of Epidemics in Complex Networks. CoRR abs/1307.1834 (2013) - [i1]Dawei Zhao, Lixiang Li, Haipeng Peng, Qun Luo, Yixian Yang:
Multiple routes transmitted epidemics on multiplex networks. CoRR abs/1312.6931 (2013) - 2012
- [j1]Dawei Zhao, Haipeng Peng, Cong Wang, Yixian Yang:
A secret sharing scheme with a short share realizing the (t, n) threshold and the adversary structure. Comput. Math. Appl. 64(4): 611-615 (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-14 22:18 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint