|
Search the dblp DataBase
Wei Zou:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Wei Zou, Wu-Tung Cheng, Sudhakar M. Reddy
Bridge Defect Diagnosis with Physical Information. [Citation Graph (0, 0)][DBLP] Asian Test Symposium, 2005, pp:248-253 [Conf]
- Yan Zhu, Wei Zou, Xinshan Zhu
Collusion secure convolutional fingerprinting information codes. [Citation Graph (0, 0)][DBLP] ASIACCS, 2006, pp:266-274 [Conf]
- Jianhong Zhang, Wei Zou
A Robust Verifiably Encrypted Signature Scheme. [Citation Graph (0, 0)][DBLP] EUC Workshops, 2006, pp:731-740 [Conf]
- Jianhong Zhang, Tao Wei, Jianyu Zhang, Wei Zou
Linkability of a Blind Signature Scheme and Its Improved Scheme. [Citation Graph (0, 0)][DBLP] ICCSA (4), 2006, pp:262-270 [Conf]
- Jian Pei, Guozhu Dong, Wei Zou, Jiawei Han
On Computing Condensed Frequent Pattern Bases. [Citation Graph (0, 0)][DBLP] ICDM, 2002, pp:378-385 [Conf]
- Yan Zhu, Dengguo Feng, Wei Zou
Collusion Secure Convolutional Spread Spectrum Fingerprinting. [Citation Graph (0, 0)][DBLP] IWDW, 2005, pp:67-83 [Conf]
- Wei Zou, C. N. Chu, Sudhakar M. Reddy, Irith Pomeranz
Optimizing SOC Test Resources using Dual Sequences. [Citation Graph (0, 0)][DBLP] VLSI-SOC, 2003, pp:180-185 [Conf]
- Wei Zou, Wu-Tung Cheng, Sudhakar M. Reddy, Huaxing Tang
On Methods to Improve Location Based Logic Diagnosis. [Citation Graph (0, 0)][DBLP] VLSI Design, 2006, pp:181-187 [Conf]
- Wei Zou, Sudhakar M. Reddy, Irith Pomeranz, Yu Huang
SOC Test Scheduling Using Simulated Annealing. [Citation Graph (0, 0)][DBLP] VTS, 2003, pp:325-330 [Conf]
- Wei Zou, Wu-Tung Cheng, Sudhakar M. Reddy, Huaxing Tang
Speeding Up Effect-Cause Defect Diagnosis Using a Small Dictionary. [Citation Graph (0, 0)][DBLP] VTS, 2007, pp:225-230 [Conf]
- Jianhong Zhang, Wei Zou
Linkability of Two Blind Signature Schemes. [Citation Graph (0, 0)][DBLP] ICICIC (1), 2006, pp:468-471 [Conf]
- Jianhong Zhang, Wei Zou, Dan Chen, Yumin Wang
On the Security of a Digital Signature with Message Recovery Using Self-certified Public Key. [Citation Graph (0, 0)][DBLP] Informatica (Slovenia), 2005, v:29, n:3, pp:243-346 [Journal]
- Jian Pei, Guozhu Dong, Wei Zou, Jiawei Han
Mining Condensed Frequent-Pattern Bases. [Citation Graph (0, 0)][DBLP] Knowl. Inf. Syst., 2004, v:6, n:5, pp:570-594 [Journal]
- Guozhu Dong, Jiawei Han, Joyce M. W. Lam, Jian Pei, Ke Wang, Wei Zou
Mining Constrained Gradients in Large Databases. [Citation Graph (0, 0)][DBLP] IEEE Trans. Knowl. Data Eng., 2004, v:16, n:8, pp:922-938 [Journal]
- Tao Wei, Jian Mao, Wei Zou, Yu Chen
Structuring 2-way Branches in Binary Executables. [Citation Graph (0, 0)][DBLP] COMPSAC (1), 2007, pp:115-118 [Conf]
- Jianwei Zhuge, Thorsten Holz, Xinhui Han, Chengyu Song, Wei Zou
Collecting Autonomous Spreading Malware Using High-Interaction Honeypots. [Citation Graph (0, 0)][DBLP] ICICS, 2007, pp:438-451 [Conf]
- Tao Wei, Jian Mao, Wei Zou, Yu Chen
A New Algorithm for Identifying Loops in Decompilation. [Citation Graph (0, 0)][DBLP] SAS, 2007, pp:170-183 [Conf]
IntPatch: Automatically Fix Integer-Overflow-to-Buffer-Overflow Vulnerability at Compile-Time. [Citation Graph (, )][DBLP]
Modeling of Spatially Cross-Correlated Shadow Fading in Distributed Radio Access Networks. [Citation Graph (, )][DBLP]
IntScope: Automatically Detecting Integer Overflow Vulnerability in X86 Binary Using Symbolic Execution. [Citation Graph (, )][DBLP]
TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection. [Citation Graph (, )][DBLP]
Selective Random Cyclic Delay Diversity for HARQ in Cooperative Relay. [Citation Graph (, )][DBLP]
Multi-User MIMO Detection for Enhanced High Speed Uplink Packet Access (HSUPA). [Citation Graph (, )][DBLP]
eQTL Viewer: visualizing how sequence variation affects genome-wide transcription. [Citation Graph (, )][DBLP]
Search in 0.005secs, Finished in 0.006secs
|