default search action
Feng Zhu 0015
Person information
- affiliation: Nanjing University of Posts and Telecommunications, School of Computer Science, Nanjing, China
- affiliation (PhD 2014): Florida International University, School of Computing and Information Science, Miami, FL, USA
Other persons with the same name
- Feng Zhu — disambiguation page
- Feng Zhu 0001 — Arizona State University, Department of Computer Science and Engineering, Tempe, AZ, USA (and 2 more)
- Feng Zhu 0002 — Radboud University Nijmegen, the Netherlands
- Feng Zhu 0003 — Central South University, School of Metallurgy and Environmental Employment, Changsha, China (and 1 more)
- Feng Zhu 0004 — Zhejiang University, College of Pharmaceutical Sciences, Hangzhou, China (and 2 more)
- Feng Zhu 0005 — University of Technology Sydney, Australia (and 1 more)
- Feng Zhu 0006 — SenseTime Group Ltd. (and 1 more)
- Feng Zhu 0007 — Foshan University, Department of Chemical Engineering, China
- Feng Zhu 0008 — Nanyang Technological University, School of Civil and Environmental Engineering, Singapore (and 1 more)
- Feng Zhu 0009 — National University of Defense Technology, College of Systems Engineering, Changsha, China
- Feng Zhu 0010 — University of Alabama in Huntsville, Department of Computer Science, AL, USA (and 1 more)
- Feng Zhu 0011 — Ant Group (and 1 more)
- Feng Zhu 0012 — Wuhan University, School of Geodesy and Geomatics, Hubei Luojia Laboratory, Wuhan, China
- Feng Zhu 0013 — Southwest Jiaotong University, School of Electrical Engineering, Chengdu, China
- Feng Zhu 0014 — Chinese Academy of Sciences, Key Laboratory of Opto-Electronic Information Processing, Shenyang, China (and 2 more)
- Feng Zhu 0016 — City University of Hong Kong, Department of Systems Engineering, Hong Kong (and 1 more)
- Feng Zhu 0017 — King's College London, UK
- Feng Zhu 0018 — Sun Yat-Sen University, School of Physics and Astronomy, Zhuhai, China (and 1 more)
- Feng Zhu 0019 — Chinese Academy of Sciences, National Time Service Center, Xi'an, China (and 2 more)
- Feng Zhu 0020 — Southeast University, National Mobile Communications Research Laboratory, Nanjing, China
- Feng Zhu 0021 — Microsoft, Redmond, WA, USA (and 1 more)
- Feng Zhu 0022 — Nanjing University of Posts and Telecommunications, School of Communications and Information Engineering, Nanjing, China
- Feng Zhu 0023 — Harvard University, Harvard Business School, Boston, MA, USA (and 2 more)
- Feng Zhu 0024 — Alibaba Group, Hangzhou, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j10]Feng Zhu, Zidong Cheng, Peng Li, He Xu:
ITIRel: Joint Entity and Relation Extraction for Internet of Things Threat Intelligence. IEEE Internet Things J. 11(11): 20867-20878 (2024) - 2023
- [j9]He Xu, Xianzhen Yin, Feng Zhu, Peng Li:
RF-Ray: Sensing Objects in the Package via RFID Systems. IEEE Syst. J. 17(1): 558-568 (2023) - 2021
- [j8]He Xu, Xin Chen, Feng Zhu, Peng Li:
A Novel Security Authentication Protocol Based on Physical Unclonable Function for RFID Healthcare Systems. Wirel. Commun. Mob. Comput. 2021: 8844178:1-8844178:14 (2021) - 2020
- [j7]Feng Zhu:
SecMAP: A Secure RFID Mutual Authentication Protocol for Healthcare Systems. IEEE Access 8: 192192-192205 (2020) - [j6]Liang Xiao, He Xu, Feng Zhu, Ruchuan Wang, Peng Li:
SKINNY-Based RFID Lightweight Authentication Protocol. Sensors 20(5): 1366 (2020) - [j5]Feng Zhu, Peng Li, He Xu, Ruchuan Wang:
A Novel Lightweight Authentication Scheme for RFID-Based Healthcare Systems. Sensors 20(17): 4846 (2020)
2010 – 2019
- 2019
- [j4]Feng Zhu, Peng Li, He Xu, Ruchuan Wang:
A Lightweight RFID Mutual Authentication Protocol with PUF. Sensors 19(13): 2957 (2019) - [j3]Jinpeng Wei, Feng Zhu:
Binary-centric defense of production operating systems against kernel queue injection attacks. J. Comput. Virol. Hacking Tech. 15(4): 259-275 (2019) - [c8]Ke Zang, He Xu, Feng Zhu, Peng Li:
Analysis and Design of Group RFID Tag Security Authentication Protocol. CISIS 2019: 637-645 - 2018
- [j2]He Xu, Jie Ding, Peng Li, Feng Zhu, Ruchuan Wang:
A Lightweight RFID Mutual Authentication Protocol Based on Physical Unclonable Function. Sensors 18(3): 760 (2018) - [j1]He Xu, Manxing Wu, Peng Li, Feng Zhu, Ruchuan Wang:
An RFID Indoor Positioning Algorithm Based on Support Vector Regression. Sensors 18(5): 1504 (2018) - [c7]Hanxiao Zhi, Peng Li, He Xu, Feng Zhu:
Node Fault Detection Algorithm Based on Spatial and Temporal Correlation in Wireless Sensor Networks. CISIS 2018: 196-205 - [c6]Feng Zhu, Youngtae Yun, Jinpeng Wei, Brent ByungHoon Kang, Yongzhi Wang, Daehyeok Kim, Peng Li, He Xu, Ruchuan Wang:
A Reflective Covert Channel Attack Anchored on Trusted Web Services. ICWS 2018: 84-99 - [c5]Haowen Sun, Peng Li, He Xu, Feng Zhu:
An Improvement RFID Security Authentication Protocol Based on Hash Function. IMIS 2018: 375-384 - [c4]Jie Ding, He Xu, Peng Li, Feng Zhu:
Research on Food Safety Traceability Technology Based on RFID Security Authentication and 2-Dimensional Code. IMIS 2018: 517-526 - 2013
- [c3]Jinpeng Wei, Feng Zhu, Calton Pu:
KQguard: Binary-Centric Defense against Kernel Queue Injection Attacks. ESORICS 2013: 755-774 - 2011
- [c2]Jinpeng Wei, Feng Zhu, Yasushi Shinjo:
Static analysis based invariant detection for commodity operating systems. CollaborateCom 2011: 287-296 - 2010
- [c1]Jinpeng Wei, Calton Pu, Carlos V. Rozas, Anand Rajan, Feng Zhu:
Modeling the Runtime Integrity of Cloud Servers: A Scoped Invariant Perspective. CloudCom 2010: 651-658
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-16 23:22 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint