Home > Research > Researchers > Dr Zheng Wang > Publications

Dr Zheng Wang

Formerly at Lancaster University

  1. Other report
  2. Published

    Parallel-Pattern Aware Compiler Optimisations: Challenges and Opportunities

    Wang, Z. & Leather, H., 10/09/2018, Lancaster: Lancaster University. 3 p.

    Research output: Book/Report/ProceedingsOther report

  3. Journal article
  4. Published

    Optimizing Deep Learning Inference on Embedded Systems Through Adaptive Model Selection

    Sanz Marco, V., Taylor, B., Wang, Z. & Elkhatib, Y., 1/02/2020, In: ACM Transactions on Embedded Computing. 19, 1, 28 p., 2.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  5. Published

    Sensing Our World Using Wireless Signals

    Chen, X., Chen, L., Feng, C., Fang, D., Xiong, J., Cui, Y. & Wang, Z., 19/07/2019, In: IEEE Internet Computing. 23, 3, p. 38-45 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  6. Published

    Exploiting Binary-level Code Virtualization to Protect Android Applications Against App Repackaging

    He, Z., Ye, G., Yuan, L., Tang, Z., Wang, X., Ren, J., Wang, W., Yang, J., Fang, D. & Wang, Z., 6/06/2019, In: IEEE Access. 7, p. 115062 - 115074 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. Published

    Optimizing Sparse Matrix-Vector Multiplications on an ARMv8-based Many-Core Architecture

    Chen, D., Fang, J., Chen, S., Xu, C. & Wang, Z., 1/06/2019, In: International Journal of Parallel Programming. 47, 3, p. 418-432 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  8. Published

    Find Me A Safe Zone: A Countermeasure for Channel State Information Based Attacks

    Zhang, J., Tang, Z., Li, M., Fang, D., Chen, X. & Wang, Z., 01/2019, In: Computers and Security. 80, p. 273-290 18 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  9. Published

    Machine Learning in Compiler Optimization

    Wang, Z. & O'Boyle, M., 11/2018, In: Proceedings of the IEEE . 106, 11, p. 1879-1901 23 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  10. E-pub ahead of print

    Adaptive Web Browsing on Mobile Heterogeneous Multi-cores

    Ren, J., Wang, X., Fang, J., Feng, Y. & Wang, Z., 24/09/2018, (E-pub ahead of print) In: IEEE Computer Architecture Letters. 4 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  11. Published

    SleepGuard: capturing rich sleep information using smartwatch sensing data

    Chang, L., Lu, J., Wang, J., Chen, X., Fang, D., Tang, Z., Nurmi, P. T. & Wang, Z., 09/2018, In: Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies. 2, 3, 34 p., 98.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  12. Published

    A Video-based Attack for Android Pattern Lock

    Ye, G., Tang, Z., Fang, D., Chen, X., Wolff, W., Aviv, A. & Wang, Z., 07/2018, In: ACM Transactions on Privacy and Security. 21, 4, 31 p., 19.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  13. Published

    VMGuards: A Novel Virtual Machine Based Code Protection System with VM Security as the First Class Design Concern

    Tang, Z., Li, M., Cao, S., Chen, M., Ye, G., Gong, X., Fang, D. & Wang, Z., 12/05/2018, In: Applied Sciences. 8, 5, 23 p., 771.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  14. Published

    Enhance virtual-machine-based code obfuscation security through dynamic bytecode scheduling

    Kuang, K., Tang, Z., Gong, X., Fang, D., Chen, X. & Wang, Z., 05/2018, In: Computers and Security. 74, p. 202-220 19 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  15. Published

    Defeat Your Enemy Hiding Behind Public WiFi: WiGuard Can Protect Your Sensitive information from CSI-based Attack

    Zhang, J., Tang, Z., Li, M., Chen, X., Fang, D. & Wang, Z., 28/03/2018, In: Applied Sciences. 8, 4, 24 p., 515.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  16. Published

    Enhancing Received Signal Strength-Based Localization through Coverage Hole Detection and Recovery

    Zhai, S., Tang, Z., Wang, D., Li, Q., Li, Z., Chen, X., Fang, D., Chen, F. & Wang, Z., 2018, In: Sensors. 18, 7, 23 p., 2075.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  17. Published

    ALEA: a fine-grained energy profiling tool

    Mukhanov, L., Petoumenos, P., Wang, Z., Parasyris, N., Nikolopoulos, D. S., R. de Supinski, B. & Leather, H., 1/03/2017, In: ACM Transactions on Architecture and Code Optimization. 14, 1, 25 p., 1.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  18. Published

    Exploiting wireless received signal strength indicators to detect evil-twin attacks in smart homes

    Tang, Z., Zhao, Y., Yang, L., Qi, S., Fang, D., Chen, X., Gong, X. & Wang, Z., 17/01/2017, In: Mobile Information Systems. 2017, 14 p., 1248578.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  19. Published

    Automatic and portable mapping of data parallel programs to OpenCL for GPU-based heterogeneous systems

    Wang, Z., Grewe, D. & O'Boyle, M., 01/2015, In: ACM Transactions on Architecture and Code Optimization. 11, 4, 26 p., 42.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  20. Published

    Integrating profile-driven parallelism detection and machine-learning based mapping

    Wang, Z., Tournavitis, G., Franke, B. & O'Boyle, M., 2014, In: ACM Transactions on Architecture and Code Optimization. 11, 1, 2.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  21. Published

    Using machine learning to partition streaming programs

    Wang, Z. & O'Boyle, M., 09/2013, In: ACM Transactions on Architecture and Code Optimization. 10, 3, 25 p., 20.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  22. Published

    Towards a holistic approach to auto-parallelization: integrating profile-driven parallelism detection and machine-learning based mapping

    Tournavitis, G., Wang, Z., Franke, B. & O'Boyle, M. F. P., 06/2009, In: ACM SIGPLAN Notices. 44, 6, p. 177-187 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  23. Patent
  24. Published

    Method of Managing Data Movement and Cell Broadband Engine Processor Using the Same SPE

    Wang, Z., Chen, L. & Wang, W., 2009, Patent No. US 2009/0049431 A1

    Research output: Patent

  25. Published

    Method and Compiler of Compiling a Program

    Wang, W., Wang, Z. & Zhong, X., 2009, Patent No. US 2009/0089559 A1

    Research output: Patent

  26. Published

    Overlay Instruction Accessing Unit and Overlay Instruction Accessing Method

    Chen, L., Feng, K. & Wang, Z., 2009, Patent No. US 2009/0089507 A1

    Research output: Patent

  27. Conference paper
  28. Published

    Optimizing Sparse Matrix-Vector Multiplications on An ARMv8-based Many-Core Architecture

    Chen, D., Fang, J., Chen, S., Xu, C. & Wang, Z., 29/11/2018.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  29. Published

    Marrying up Regular Expressions with Neural Networks: A Case Study for Spoken Language Understanding

    Luo, B., Feng, Y., Wang, Z., Huang, S., Yan, R. & Zhao, D., 15/07/2018, p. 2083–2093. 11 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  30. Published

    Evaluating Brush Movements for Chinese Calligraphy: A Computer Vision Based Approach

    Xu, P., Wang, L., Guan, Z., Zheng, X., Chen, X., Tang, Z., Fang, D., Gong, X. & Wang, Z., 1/07/2018, p. 1050-1056. 7 p.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  31. Published

    DRET: a system for detecting evil-twin attacks in smart homes

    Tang, Z., Zhao, Y., Yang, L., Qi, S., Fang, D., Chen, X., Gong, X. & Wang, Z., 29/07/2016.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  32. Conference contribution/Paper
  33. Published

    Auto-tuning MPI Collective Operations on Large-Scale Parallel Systems

    Zheng, W., Fang, J., Chen, J., Pan, X., Wang, H., Huang, C., Sun, X., Tang, T. & Wang, Z., 3/10/2019, The 21st IEEE International Conference on High Performance Computing and Communications. IEEE, p. 670-677 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  34. Published

    Relation-Aware Entity Alignment for Heterogeneous Knowledge Graphs

    Wu, Y., Liu, X., Feng, Y., Wang, Z., Yan, R. & Zhao, D., 31/07/2019, The 28th International Joint Conference on Artificial Intelligence (IJCAI). IJCAI, p. 5278-5284 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  35. Published

    Lattice CNNs for Matching Based Chinese Question Answering

    Lai, Y., Feng, Y., Yu, X., Wang, Z., Xu, K. & Zhao, D., 17/07/2019, Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence . AAAI, Vol. 33. p. 6634-6641 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  36. Published

    Function Merging by Sequence Alignment

    Rocha, R., Petoumenos, P., Wang, Z., Cole, M. & Leather, H., 16/02/2019, ACM/IEEE International Symposium on Code Generation and Optimization (CGO) 2019. ACM, p. 149-163 15 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  37. Published

    Exploiting Code Diversity to Enhance Code Virtualization Protection

    Xue, C., Tang, Z., Ye, G., Li, G., Gong, X., Wang, W., Fang, D. & Wang, Z., 11/12/2018, 2018 IEEE 24th International Conference on Parallel and Distributed Systems (ICPADS). IEEE, p. 620-627 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  38. Published

    To Compress, or Not to Compress: Characterizing Deep Learning Model Compression for Embedded Inference

    Qing, Q., Yu, J., Ren, J., Gao, L., Wang, H., Zheng, J., Feng, Y., Fang, J. & Wang, Z., 11/12/2018, The 16th IEEE International Symposium on Parallel and Distributed Processing with Applications (ISPA). IEEE, p. 729-736 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  39. Published

    Proteus: Network-aware Web Browsing on Heterogeneous Mobile Systems

    Ren, J., Wang, X., Fang, J., Feng, Y., Zhu, D., Luo, Z. & Wang, Z., 4/12/2018, CoNEXT '18 Proceedings of the 14th International Conference on emerging Networking EXperiments and Technologies. New York: ACM, p. 379-392 14 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  40. Published

    CrossSense: towards cross-site and large-scale WiFi sensing

    Zhang, J., Tang, Z., Li, M., Fang, D., Nurmi, P. T. & Wang, Z., 15/10/2018, The 24th ACM International Conference on Mobile Computing and Networking (MobiCom) . ACM, p. 305-320 16 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  41. Published

    Yet Another Text Captcha Solver: A Generative Adversarial Network Based Approach

    Ye, G., Tang, Z., Fang, D., Zhu, Z., Feng, Y., Xu, P., Chen, X. & Wang, Z., 15/10/2018, 25th ACM Conference on Computer and Communications Security (CCS). New York: ACM, p. 332-348 17 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  42. Published

    Adaptive Optimization of Sparse Matrix-Vector Multiplication on Emerging Many-Core Architectures

    Chen, S., Fang, J., Chen, D., Xu, C. & Wang, Z., 28/06/2018, The 20th IEEE International Conference on High Performance Computing and Communications (HPCC) . IEEE, p. 649-658 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  43. Published

    Adaptive Deep Learning Model Selection on Embedded Systems

    Taylor, B., Sanz Marco, V., Wolff, W., Elkhatib, Y. & Wang, Z., 19/06/2018, LCTES 2018 Proceedings of the 19th ACM SIGPLAN/SIGBED International Conference on Languages, Compilers, and Tools for Embedded Systems. New York: ACM, p. 31-43 13 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  44. Published

    Auto-tuning Streamed Applications on Intel Xeon Phi

    Zhang, P., Fang, J., Tang, T., Yang, C. & Wang, Z., 25/05/2018, 2018 IEEE International Parallel and Distributed Processing Symposium (IPDPS). IEEE, p. 515-525 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  45. Published

    MOCL: An Efficient OpenCL Implementation for the Matrix-2000 Architecture

    Zhang, P., Fang, J., Yang, C., Tang, T., Huang, C. & Wang, Z., 8/05/2018, CF '18 Proceedings of the 15th ACM International Conference on Computing Frontiers. New York: ACM, p. 26-35 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  46. Published

    Towards Large-Scale RFID Positioning: A Low-cost, High-precision Solution Based on Compressive Sensing

    Chang, L., Li, X., Wang, J., Meng, H., Chen, X., Fang, D., Tang, Z. & Wang, Z., 19/03/2018, 2018 IEEE International Conference on Pervasive Computing and Communications (PerCom). IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  47. Published

    Scale Up Event Extraction Learning via Automatic Training Data Generation

    Zeng, Y., Feng, Y., Ma, R., Wang, Z., Yan, R., Shi, C. & Zhao, D., 1/01/2018, The Thirty-Second AAAI Conference on Artificial Intelligence (AAAI-18). Palo Alto: AAAI, p. 6045-6052 8 p. (AAAI ; vol. 32).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  48. Published

    AppIS: Protect Android Apps Against Runtime Repackaging Attacks

    Song, L., Tang, Z., Li, Z., Gong, X., Chen, X., Fang, D. & Wang, Z., 17/12/2017, 2017 IEEE 23rd International Conference on Parallel and Distributed Systems (ICPADS). IEEE, p. 25-32 8 p. (2017 IEEE 23rd International Conference on Parallel and Distributed Systems (ICPADS)).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  49. Published

    Improving Spark Application Throughput Via Memory Aware Task Co-location: A Mixture of Experts Approach

    Sanz Marco, V., Taylor, B., Porter, B. F. & Wang, Z., 11/12/2017, Middleware '17 Proceedings of the 18th ACM/IFIP/USENIX Middleware Conference. New York: ACM, p. 95-108 14 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  50. Published

    DexPro: A Bytecode Level Code Protection System for Android Applications

    Zhao, B., Tang, Z., Li, Z., Song, L., Gong, X., Fang, D., Liu, F. & Wang, Z., 21/10/2017, Cyberspace Safety and Security. Wen, S., Wu, W. & Castiglione, A. (eds.). Cham: Springer, p. 367-382 16 p. (Lecture Notes in Computer Science; vol. 10581).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  51. Published

    Optimise web browsing on heterogeneous mobile platforms: a machine learning based approach

    Ren, J., Gao, L., Wang, H. & Wang, Z., 5/10/2017, IEEE International Conference on Computer Communications (INFOCOM), 2017. IEEE, 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  52. Published

    SEEAD: A Semantic-based Approach for Automatic Binary Code De-obfuscation

    Tang, Z., Wang, L., Kuang, K., Xue, C., Gong, X., Chen, X., Fang, D. & Wang, Z., 11/09/2017, 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-17). IEEE, p. 261-268 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  53. Published

    End-to-end Deep Learning of Optimization Heuristics

    Cummins, C., Petoumenos, P., Wang, Z. & Leather, H., 9/09/2017, The 26th International Conference on Parallel Architectures and Compilation Techniques (PACT) 2017. IEEE, p. 219-232 14 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  54. Published

    Protect sensitive information against channel state information based attacks

    Zhang, J., Tang, Z., Chen, X., Fang, D., Li, R. & Wang, Z., 18/08/2017, 2017 IEEE International Conference on Computational Science and Engineering (CSE) and Embedded and Ubiquitous Computing (EUC). IEEE, 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  55. Published

    Exploit Dynamic Data Flows to Protect Software Against Semantic Attacks

    Kuang, K., Tang, Z., Gong, X., Fang, D., Chen, X., Zhang, H. & Wang, Z., 8/08/2017, 2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI). IEEE, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Previous 1 2 Next

Back to top