default search action
Fei Zuo
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j14]Fei Zuo, Junghwan Rhee:
Vulnerability discovery based on source code patch commit mining: a systematic literature review. Int. J. Inf. Sec. 23(2): 1513-1526 (2024) - [j13]Fei Zuo, Enrico Zio:
Managing secondary risks with optimal risk response strategy and risk-related resource scheduling. Reliab. Eng. Syst. Saf. 245: 110028 (2024) - [c30]Xianshan Qu, Fei Zuo, Xiaopeng Li, Junghwan Rhee:
Context Matters: Investigating Its Impact on ChatGPT's Bug Fixing Performance. SERA 2024: 17-23 - [c29]Suhan Jiang, Jie Wu, Fei Zuo:
Utility-Based Routing in Payment Channel Networks: A Tradeoff Between Utility And Privacy. SERA 2024: 59-65 - [c28]Xin Zhang, Yuqi Song, Wyatt McCurdy, Xiaofeng Wang, Fei Zuo:
Revising the Problem of Partial Labels from the Perspective of CNNs' Robustness. SERA 2024: 88-93 - [c27]Yuqi Song, Xin Zhang, Bokai Yang, Fei Zuo, Xianshan Qu:
A Robust Attention-based Convolutional Neural Network for Monocular Depth Estimation. SERA 2024: 94-99 - [c26]Chenglong Fu, Xiaojiang Du, Qiang Zeng, Zhenyu Zhao, Fei Zuo, Jia Di:
Seeing Is Believing: Extracting Semantic Information from Video for Verifying IoT Events. WISEC 2024: 101-112 - [i11]Xiao Shao, Weifu Jiang, Fei Zuo, Mengqing Liu:
SwarmBrain: Embodied agent for real-time strategy game StarCraft II via large language models. CoRR abs/2401.17749 (2024) - [i10]Xin Zhang, Yuqi Song, Wyatt McCurdy, Xiaofeng Wang, Fei Zuo:
Revising the Problem of Partial Labels from the Perspective of CNNs' Robustness. CoRR abs/2407.17630 (2024) - [i9]Fei Zuo, Cody Tompkins, Qiang Zeng, Lannan Luo, Yung Ryn Choe, Junghwan Rhee:
BinSimDB: Benchmark Dataset Construction for Fine-Grained Binary Code Similarity Analysis. CoRR abs/2410.10163 (2024) - 2023
- [j12]Madhukar Shrestha, Yonghyun Kim, Jeehyun Oh, Junghwan John Rhee, Yung Ryn Choe, Fei Zuo, Myungah Park, Gang Qian:
ProvSec: Open Cybersecurity System Provenance Analysis Benchmark Dataset with Labels. Int. J. Networked Distributed Comput. 11(2): 112-123 (2023) - [j11]Fei Zuo, Enrico Zio, Yue Xu:
Bi-objective optimization of the scheduling of risk-related resources for risk response. Reliab. Eng. Syst. Saf. 237: 109391 (2023) - [c25]Xin Zhang, Yuqi Song, Xiaofeng Wang, Fei Zuo:
D-Score: A White-Box Diagnosis Score for CNNs Based on Mutation Operators. ADMA (5) 2023: 343-358 - [c24]Fei Zuo, Junghwan Rhee, Myung-Ah Park, Gang Qian:
PowerGrader: Automating Code Assessment Based on PowerShell for Programming Courses. SERA 2023: 2-7 - [c23]Suhan Jiang, Jie Wu, Fei Zuo, Alessandro Mei:
Balance-aware Cost-efficient Routing in the Payment Channel Network. SERA 2023: 8-15 - [c22]Xin Zhang, Yuqi Song, Fei Zuo, Zheqing Zhou, Xiaofeng Wang:
Towards Imbalanced Large Scale Multi-label Classification with Partially Annotated Labels. SERA 2023: 195-200 - [c21]Fei Zuo, Xin Zhang, Yuqi Song, Junghwan Rhee, Jicheng Fu:
Commit Message Can Help: Security Patch Detection in Open Source Software via Transformer. SERA 2023: 345-351 - [c20]Madhukar Shrestha, Yonghyun Kim, Jeehyun Oh, Junghwan Rhee, Yung Ryn Choe, Fei Zuo, Myungah Park, Gang Qian:
ProvSec: Cybersecurity System Provenance Analysis Benchmark Dataset. SERA 2023: 352-357 - [c19]Fei Zuo, Junghwan Rhee, Yonghyun Kim, Jeehyun Oh, Gang Qian:
A Comprehensive Dataset Towards Hands-on Experience Enhancement in a Research-Involved Cybersecurity Program. SIGITE 2023: 118-124 - [i8]Xin Zhang, Yuqi Song, Xiaofeng Wang, Fei Zuo:
D-Score: A White-Box Diagnosis Score for CNNs Based on Mutation Operators. CoRR abs/2304.00697 (2023) - [i7]Xin Zhang, Yuqi Song, Fei Zuo, Xiaofeng Wang:
Towards Imbalanced Large Scale Multi-label Classification with Partially Annotated Labels. CoRR abs/2308.00166 (2023) - [i6]Fei Zuo, Junghwan Rhee, Myungah Park, Gang Qian:
Designing a Security System Administration Course for Cybersecurity with a Companion Project. CoRR abs/2309.01839 (2023) - 2022
- [j10]Chuxiong Wu, Xiaopeng Li, Fei Zuo, Lannan Luo, Xiaojiang Du, Jia Di, Qiang Zeng:
Use It-No Need to Shake It!: Accurate Implicit Authentication for Everyday Objects with Smart Sensing. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 6(3): 146:1-146:25 (2022) - [i5]Piyush Behre, Sharman Tan, Amy Shah, Harini Kesavamoorthy, Shuangyu Chang, Fei Zuo, Chris Basoglu, Sayan Pathak:
TRScore: A Novel GPT-based Readability Scorer for ASR Segmentation and Punctuation model evaluation and selection. CoRR abs/2210.15104 (2022) - 2021
- [c18]Lannan Luo, Qiang Zeng, Bokai Yang, Fei Zuo, Junzhe Wang:
Westworld: Fuzzing-Assisted Remote Dynamic Symbolic Execution of Smart Apps on IoT Cloud Platforms. ACSAC 2021: 982-995 - [c17]Fei Zuo, Qiang Zeng:
Exploiting the Sensitivity of L2 Adversarial Examples to Erase-and-Restore. AsiaCCS 2021: 40-51 - 2020
- [i4]Fei Zuo, Qiang Zeng:
Erase and Restore: Simple, Accurate and Resilient Detection of L2 Adversarial Examples. CoRR abs/2001.00116 (2020)
2010 – 2019
- 2019
- [c16]Xiaopeng Li, Fengyao Yan, Fei Zuo, Qiang Zeng, Lannan Luo:
Touch Well Before Use: Intuitive and Secure Authentication for IoT Devices. MobiCom 2019: 33:1-33:17 - [c15]Fei Zuo, Xiaopeng Li, Patrick Young, Lannan Luo, Qiang Zeng, Zhexin Zhang:
Neural Machine Translation Inspired Binary Code Similarity Comparison beyond Function Pairs. NDSS 2019 - [c14]Fei Zuo, Bokai Yang, Xiaopeng Li, Qiang Zeng:
Exploiting the Inherent Limitation of L0 Adversarial Examples. RAID 2019: 293-307 - 2018
- [j9]Jianzhong Qi, Fei Zuo, Hanan Samet, Jia Cheng Yao:
K-Regret Queries Using Multiplicative Utility Functions. ACM Trans. Database Syst. 43(2): 10:1-10:41 (2018) - [i3]Fei Zuo, Xiaopeng Li, Zhexin Zhang, Patrick Young, Lannan Luo, Qiang Zeng:
Neural Machine Translation Inspired Binary Code Similarity Comparison beyond Function Pairs. CoRR abs/1808.04706 (2018) - [i2]Fei Zuo, Lannan Luo, Qiang Zeng:
Countermeasures Against L0 Adversarial Examples Using Image Processing and Siamese Networks. CoRR abs/1812.09638 (2018) - 2017
- [j8]Arash Pourtaherian, Harm J. Scholten, Lieneke Kusters, Svitlana Zinger, Nenad Mihajlovic, Alexander F. Kolen, Fei Zuo, Gary C. Ng, Hendrikus H. M. Korsten, Peter H. N. de With:
Medical Instrument Detection in 3-Dimensional Ultrasound Data Volumes. IEEE Trans. Medical Imaging 36(8): 1664-1675 (2017) - 2016
- [j7]Yao Zhang, Fei Zuo:
Selection of risk response actions considering risk dependency. Kybernetes 45(10): 1652-1667 (2016) - [i1]Jianzhong Qi, Fei Zuo, Jia Cheng Yao:
K-Regret Queries: From Additive to Multiplicative Utilities. CoRR abs/1609.07964 (2016) - 2014
- [j6]Fei Zuo, Jungong Han, Pingkun Yan, Hans C. van Assen, Kenji Suzuki:
Guest Editorial: Special issue on advanced computing for image-guided intervention. Neurocomputing 144: 1-2 (2014) - [j5]Fei Zuo:
In-body ultrasound image processing for cardiovascular interventions: A review. Neurocomputing 144: 38-46 (2014) - 2013
- [j4]Ruihu Li, Fei Zuo, Yang Liu, Zongben Xu:
Hermitian dual containing BCH codes and construction of new quantum codes. Quantum Inf. Comput. 13(1-2): 21-35 (2013)
2000 – 2009
- 2008
- [j3]Fei Zuo, Peter H. N. de With:
Cascaded Face Detection Using Neural Network Ensembles. EURASIP J. Adv. Signal Process. 2008 (2008) - [j2]Fei Zuo, Peter H. N. de With:
Facial feature extraction by a cascade of model-based algorithms. Signal Process. Image Commun. 23(3): 194-211 (2008) - [c13]Yunpeng Zhang, Zhengjun Zhai, Xuan Nie, Chunyan Ma, Fei Zuo:
An Extended Self-Adaptive Kalman Filtering Object Motion Prediction Model. IIH-MSP 2008: 421-424 - [c12]Yunpeng Zhang, Fei Zuo, Zhengjun Zhai, Xiaobin Cai:
A New Image Encryption Algorithm Based on Multiple Chaos System. ISECS 2008: 347-350 - [c11]Yunpeng Zhang, Zhengjun Zhai, Lu Zhang, Yifei Bao, Weidi Dai, Fei Zuo:
Partition-Based Parallel Constructing-Density-Tree Clustering. ISIP 2008: 155-159 - 2006
- [c10]Michiel van der Veen, Tom A. M. Kevenaar, Geert Jan Schrijen, Ton H. Akkermans, Fei Zuo:
Face biometrics with renewable templates. Security, Steganography, and Watermarking of Multimedia Contents 2006: 60720J - 2005
- [j1]Fei Zuo, Peter H. N. de With:
Real-time embedded face recognition for smart home. IEEE Trans. Consumer Electron. 51(1): 183-190 (2005) - [c9]Fei Zuo, Peter H. N. de With, Michiel van der Veen:
Multistage Face Recognition Using Adaptive Feature Selection and Classification. ACIVS 2005: 17-25 - [c8]Fei Zuo, Peter H. N. de With:
Fast Face Detection Using a Cascade of Neural Network Ensembles. ACIVS 2005: 26-34 - [c7]Tom A. M. Kevenaar, Geert Jan Schrijen, Michiel van der Veen, Anton H. M. Akkermans, Fei Zuo:
Face Recognition with Renewable and Privacy Preserving Binary Templates. AutoID 2005: 21-26 - [c6]Fei Zuo, Peter H. N. de With:
Facial feature extraction using a cascade of model-based algorithms. AVSS 2005: 348-353 - 2004
- [c5]Fei Zuo, Peter H. N. de With:
Real-Time Facial Feature Extraction by Cascaded Parameter Prediction and Image Optimization. ICIAR (2) 2004: 651-659 - [c4]Fei Zuo, Peter H. N. de With:
Fast facial feature extraction using a deformable shape model with haar-wavelet based local texture attributes. ICIP 2004: 1425-1428 - [c3]Fei Zuo, Peter H. N. de With:
Real-time facial feature extraction using statistical shape model and Haar-wavelet based feature search. ICME 2004: 1443-1446 - [c2]Fei Zuo, Peter H. N. de With:
Multistage feature extraction for accurate face alignment. VCIP 2004 - 2003
- [c1]Fei Zuo, Peter H. N. de With:
Toward fast feature adaptation and localization for real-time face recognition systems. VCIP 2003: 1857-1865
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:05 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint