


Остановите войну!
for scientists:


default search action
Rong Zheng
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information

Other persons with the same name
- Rong Zheng 0001
— McMaster University, Department of Computing and Software, Hamilton, ON, Canada (and 2 more)
- Rong Zheng 0002
— Edith Cowan University, Centre of Excellence for MicroPhotonics Systems, Joondalup, WA, Australia
- Rong Zheng 0003
— Hong Kong University of Science and Technology, School of Business and Management, Clear Water Bay, Hong Kong
- Rong Zheng 0004
— Western Illinois University, Macomb, IL, USA
- Rong Zheng 0005 — Chinese Academy of Sciences, Institute of Automation, Interactive Digital Media Technology Research Center, Beijing, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j18]Rong Zheng, Jerome R. Busemeyer, Robert M. Nosofsky:
Integrating Categorization and Decision-Making. Cogn. Sci. 47(1) (2023) - [j17]Ran Wang, Cheng Xu
, Runshi Dong, Zhenghui Luo, Rong Zheng, Xiaotong Zhang
:
A secured big-data sharing platform for materials genome engineering: State-of-the-art, challenges and architecture. Future Gener. Comput. Syst. 142: 59-74 (2023) - [j16]Rong Zheng, Abdelazim G. Hussien
, Raneem Qaddoura, Heming Jia, Laith Abualigah, Shuang Wang
, Abeer Saber:
A multi-strategy enhanced African vultures optimization algorithm for global optimization problems. J. Comput. Des. Eng. 10(1): 329-356 (2023) - [i3]Bo Zhang, Boyu Jiang, Rong Zheng, Xiaoping Zhang, Jun Li, Qiang Xu:
Pi-ViMo: Physiology-inspired Robust Vital Sign Monitoring using mmWave Radars. CoRR abs/2303.13816 (2023) - 2022
- [j15]Heming Jia
, Wanying Zhang
, Rong Zheng
, Shuang Wang
, Xin Leng
, Ning Cao
:
Ensemble mutation slime mould algorithm with restart mechanism for feature selection. Int. J. Intell. Syst. 37(3): 2335-2370 (2022) - [j14]Rong Zheng, Heming Jia, Shuang Wang, Qingxin Liu:
Enhanced slime mould algorithm with multiple mutation strategy and restart mechanism for global optimization. J. Intell. Fuzzy Syst. 42(6): 5069-5083 (2022) - 2021
- [j13]Shuang Wang, Qingxin Liu
, Yuxiang Liu, Heming Jia
, Laith Mohammad Abualigah, Rong Zheng, Di Wu:
A Hybrid SSA and SMA with Mutation Opposition-Based Learning for Constrained Engineering Problems. Comput. Intell. Neurosci. 2021: 6379469:1-6379469:21 (2021)
2010 – 2019
- 2019
- [c27]Xiaojian Zhang, Hongtai Yang
, Rong Zheng
, Zhicheng Jin, Bowen Zhou:
A Dynamic Shared Bikes Rebalancing Method Based on Demand Prediction. ITSC 2019: 238-244 - [i2]Pooya Khandel, Amir Hossein Rassafi, Vahid Pourahmadi, Saeed Sharifian, Rong Zheng:
SensorDrop: A Reinforcement Learning Framework for Communication Overhead Reduction on the Edge. CoRR abs/1910.01601 (2019) - 2018
- [j12]Song Zheng, Zhicheng Lin
, Qijun Zeng, Rong Zheng, Chaoru Liu, Huafeng Xiong:
IAPcloud: A Cloud Control Platform for Heterogeneous Robots. IEEE Access 6: 30577-30591 (2018) - [j11]Allen H. Huang
, Reuven Lehavy
, Amy Y. Zang, Rong Zheng:
Analyst Information Discovery and Interpretation Roles: A Topic Modeling Approach. Manag. Sci. 64(6): 2833-2855 (2018) - [c26]Arooj Ahmed Qureshi, Canxiu Zhang, Rong Zheng, Ahmed Elmeligi:
Ischemic stroke detection using EEG signals. CASCON 2018: 301-308 - [c25]Houquan Lyu, Rong Zheng, Jingqian Guo, Aobo Wei:
AUV Docking Experiment and Improvement on Tracking Control Algorithm. ICIA 2018: 220-224 - 2017
- [j10]Song Zheng, Qi Zhang, Rong Zheng, Bi-Qin Huang, Yi-Lin Song, Xin-Chu Chen:
Combining a Multi-Agent System and Communication Middleware for Smart Home Control: A Universal Control Platform Architecture. Sensors 17(9): 2135 (2017) - [c24]Rong Zheng, Joey K. Legere, Martin v. Mohrenschildt
:
Finger Movement Recognition During Ballistic Movements Using Electromyography. CHASE 2017: 302-311 - 2016
- [c23]Hao Gui, Rong Zheng, Chao Ma
, Hao Fan, Liya Xu:
An Architecture for Healthcare Big Data Management and Analysis. HIS 2016: 154-160 - [c22]Chaokun Zhang, Yong Cui, Rong Zheng, Jinlong E, Jianping Wu:
Multi-Resource Partial-Ordered Task Scheduling in cloud computing. IWQoS 2016: 1-6 - [c21]Qinggang Sun, Rong Zheng:
The resistance analysis of AUV based on Variable Buoyancy System. ROBIO 2016: 819-822 - 2014
- [j9]Yufei Wang, Rong Zheng, Qixin Wang
:
Self-tuned distributed monitoring of multi-channel wireless networks using Gibbs sampler. Comput. Networks 64: 261-272 (2014) - [c20]Guanbo Zheng, Rong Zheng:
Joint Neighbor Discovery and Contention Relationship Inference in Wireless Networks. WASA 2014: 138-149 - [e2]Emmanuel Baccelli, Roozbeh Jafari, Rahul Mangharam, Rong Zheng:
Proceedings of the 4th ACM MobiHoc workshop on Pervasive wireless healthcare, MobileHealth@MobiHoc 2014, Philadelphia, Pennsylvania, USA, August 11, 2014. ACM 2014, ISBN 978-1-4503-2983-5 [contents] - 2013
- [c19]Feng Tan, Yufei Wang, Qixin Wang
, Lei Bu, Rong Zheng, Neeraj Suri
:
Guaranteeing Proper-Temporal-Embedding safety rules in wireless CPS: A hybrid formal modeling approach. DSN 2013: 1-12 - 2012
- [j8]Kyung-Joon Park
, Rong Zheng, Xue Liu:
Cyber-physical systems: Milestones and research challenges. Comput. Commun. 36(1): 1-7 (2012) - [c18]Qixin Wang
, Yufei Wang, Rong Zheng, Xue Liu:
Curbing Aggregate Member Flow Burstiness to Bound End-to-End Delay in Networks of TDMA Crossbar Real-Time Switches. RTSS 2012: 14-25 - [e1]Xinbing Wang, Rong Zheng, Tao Jing, Kai Xing:
Wireless Algorithms, Systems, and Applications - 7th International Conference, WASA 2012, Yellow Mountains, China, August 8-10, 2012. Proceedings. Lecture Notes in Computer Science 7405, Springer 2012, ISBN 978-3-642-31868-9 [contents] - 2011
- [c17]Guanbo Zheng, Dong Han, Rong Zheng, Christopher Schmitz, Xiaojing Yuan:
A Link Quality Inference Model for IEEE 802.15.4 Low-Rate WPANs. GLOBECOM 2011: 1-6 - [c16]Biao Zhang, Jianlin Zhu, Meisheng He, Rong Zheng, Weiming Chen:
A Novel Dual-Boost DC-AC Circuit for PV Inverter. ICDMA 2011: 85-88 - [c15]Pallavi Arora, Csaba Szepesvári, Rong Zheng:
Sequential learning for optimal monitoring of multi-channel wireless networks. INFOCOM 2011: 1152-1160 - [c14]Yufei Wang, Qixin Wang
, Zheng Zeng, Guanbo Zheng, Rong Zheng:
WiCop: Engineering WiFi Temporal White-Spaces for Safe Operations of Wireless Body Area Networks in Medical Applications. RTSS 2011: 170-179 - 2010
- [j7]Rong Zheng, Chengzhi Li:
How Good is Opportunistic Routing? - A Reality Check under Rayleigh Fading Channels. Ad Hoc Sens. Wirel. Networks 10(1): 5-26 (2010) - [c13]Arun Chhetri, Huy Anh Nguyen, Gabriel Scalosub, Rong Zheng:
On quality of monitoring for multi-channel wireless infrastructure networks. MobiHoc 2010: 111-120 - [i1]Huy Anh Nguyen, Rong Zheng:
Binary Independent Component Analysis with OR Mixtures. CoRR abs/1007.0528 (2010)
2000 – 2009
- 2009
- [c12]Vivek Aseeja, Rong Zheng:
MeshMan: A management framework for wireless mesh networks. Integrated Network Management 2009: 226-233 - [c11]Rong Zheng, Amit Pendharkar:
Obstacle Discovery in Distributed Active Sensor Networks. INFOCOM 2009: 909-917 - [c10]Arun Chhetri, Rong Zheng:
WiserAnalyzer: A Passive Monitoring Framework for WLANs. MSN 2009: 495-502 - 2008
- [j6]Cris Koutsougeras, Yi Liu, Rong Zheng:
Event-driven sensor deployment using self-organizing maps. Int. J. Sens. Networks 3(3): 142-151 (2008) - [j5]Jatindera Singh Walia, Rong Zheng:
Work in progress: wiser distributed file system for heterogeneous sensor platforms. SIGBED Rev. 5(1): 21 (2008) - [j4]Rong Zheng:
Asymptotic Bounds of Information Dissemination in Power-Constrained Wireless Networks. IEEE Trans. Wirel. Commun. 7(1): 251-259 (2008) - [c9]Rong Zheng:
Commentary Paper on "An Object- and Task-Oriented Architecture for Automated Video Surveillance in Distributed Sensor Networks". AVSS 2008: 347 - [c8]Rong Zheng:
On routing in lossy wireless networks with realistic channel models. FOWANC 2008: 33-38 - [c7]Rong Zheng, Chengzhi Li:
How good is opportunistic routing?: a reality check under Rayleigh fading channels. MSWiM 2008: 260-267 - 2007
- [c6]Sumit Gupta, Rong Zheng, Albert M. K. Cheng
:
ANDES: an Anomaly Detection System for Wireless Sensor Networks. MASS 2007: 1-9 - 2006
- [j3]Jiexun Li, Rong Zheng, Hsinchun Chen:
From fingerprint to writeprint. Commun. ACM 49(4): 76-82 (2006) - [j2]Rong Zheng, Jiexun Li, Hsinchun Chen, Zan Huang:
A framework for authorship identification of online messages: Writing-style features and classification techniques. J. Assoc. Inf. Sci. Technol. 57(3): 378-393 (2006) - [c5]Rong Zheng:
Information Dissemination in Power-Constrained Wireless Networks. INFOCOM 2006 - 2005
- [j1]Rong Zheng, Robin Kravets:
On-demand power management for ad hoc networks. Ad Hoc Networks 3(1): 51-68 (2005) - 2003
- [c4]Hsinchun Chen, Wingyan Chung, Yi Qin, Michael Chau, Jennifer Jie Xu, Gang Wang, Rong Zheng, Homa Atabakhsh:
Crime Data Mining: An Overview and Case Studies. DG.O 2003 - [c3]Rong Zheng, Robin Kravets:
On-demand Power Management for Ad Hoc Networks. INFOCOM 2003: 481-491 - [c2]Rong Zheng, Yi Qin, Zan Huang, Hsinchun Chen:
Authorship Analysis in Cybercrime Investigation. ISI 2003: 59-73
1990 – 1999
- 1998
- [c1]Rong Zheng, Zuoying Wang:
Toward on-line learning of Chinese continuous speech recognition system. ICSLP 1998
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2023-05-28 23:43 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint