Home > Research > Researchers > Dr Zheng Wang > Publications

Dr Zheng Wang

Formerly at Lancaster University

  1. Published

    Yet Another Text Captcha Solver: A Generative Adversarial Network Based Approach

    Ye, G., Tang, Z., Fang, D., Zhu, Z., Feng, Y., Xu, P., Chen, X. & Wang, Z., 15/10/2018, 25th ACM Conference on Computer and Communications Security (CCS). New York: ACM, p. 332-348 17 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  2. Published

    A convolution BiLSTM neural network model for Chinese event extraction

    Zeng, Y., Yang, H., Feng, Y., Wang, Z. & Zhao, D., 2/12/2016, Natural Language Understanding and Intelligent Applications: 5th CCF Conference on Natural Language Processing and Chinese Computing, NLPCC 2016, and 24th International Conference on Computer Processing of Oriental Languages, ICCPOL 2016, Kunming, China, December 2–6, 2016, Proceedings. Lin, C-Y., Xue, N., Zhao, D., Huang, X. & Feng, Y. (eds.). Cham: Springer, p. 275-287 13 p. ( Lecture Notes in Computer Science; vol. 10102).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Published

    Scale Up Event Extraction Learning via Automatic Training Data Generation

    Zeng, Y., Feng, Y., Ma, R., Wang, Z., Yan, R., Shi, C. & Zhao, D., 1/01/2018, The Thirty-Second AAAI Conference on Artificial Intelligence (AAAI-18). Palo Alto: AAAI, p. 6045-6052 8 p. (AAAI ; vol. 32).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Published

    Enhancing Received Signal Strength-Based Localization through Coverage Hole Detection and Recovery

    Zhai, S., Tang, Z., Wang, D., Li, Q., Li, Z., Chen, X., Fang, D., Chen, F. & Wang, Z., 2018, In: Sensors. 18, 7, 23 p., 2075.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  5. Published

    Protect sensitive information against channel state information based attacks

    Zhang, J., Tang, Z., Chen, X., Fang, D., Li, R. & Wang, Z., 18/08/2017, 2017 IEEE International Conference on Computational Science and Engineering (CSE) and Embedded and Ubiquitous Computing (EUC). IEEE, 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. Published

    Auto-tuning Streamed Applications on Intel Xeon Phi

    Zhang, P., Fang, J., Tang, T., Yang, C. & Wang, Z., 25/05/2018, 2018 IEEE International Parallel and Distributed Processing Symposium (IPDPS). IEEE, p. 515-525 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. Published

    MOCL: An Efficient OpenCL Implementation for the Matrix-2000 Architecture

    Zhang, P., Fang, J., Yang, C., Tang, T., Huang, C. & Wang, Z., 8/05/2018, CF '18 Proceedings of the 15th ACM International Conference on Computing Frontiers. New York: ACM, p. 26-35 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Published

    Defeat Your Enemy Hiding Behind Public WiFi: WiGuard Can Protect Your Sensitive information from CSI-based Attack

    Zhang, J., Tang, Z., Li, M., Chen, X., Fang, D. & Wang, Z., 28/03/2018, In: Applied Sciences. 8, 4, 24 p., 515.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  9. Published

    CrossSense: towards cross-site and large-scale WiFi sensing

    Zhang, J., Tang, Z., Li, M., Fang, D., Nurmi, P. T. & Wang, Z., 15/10/2018, The 24th ACM International Conference on Mobile Computing and Networking (MobiCom) . ACM, p. 305-320 16 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    Find Me A Safe Zone: A Countermeasure for Channel State Information Based Attacks

    Zhang, J., Tang, Z., Li, M., Fang, D., Chen, X. & Wang, Z., 01/2019, In: Computers and Security. 80, p. 273-290 18 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

Previous 1...3 4 5 6 7 8 Next

Back to top