
Dawei Zhao
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j30]Gang Chen
, Jun Wang
, Luo Zuo
, Dawei Zhao
:
Long-Time Coherent Integration for Frequency Hopping Pulse Signal via Phase Compensation. IEEE Access 8: 30458-30466 (2020) - [j29]Dawei Zhao
, Jun Wang
, Gang Chen
, Jipeng Wang, Shuai Guo:
Clutter Cancellation Based on Frequency Domain Analysis in Passive Bistatic Radar. IEEE Access 8: 43956-43964 (2020) - [j28]Shudong Li, Dawei Zhao, Xiaobo Wu, Zhihong Tian
, Aiping Li, Zhen Wang:
Functional immunization of networks based on message passing. Appl. Math. Comput. 366 (2020) - [j27]Yusheng Cheng
, Kun Qian, Yibin Wang, Dawei Zhao:
Missing multi-label learning with non-equilibrium based on classification margin. Appl. Soft Comput. 86 (2020) - [j26]Zhenxia Mu, Xiaoyu Qiu, Dawei Zhao, Xiaoshuai Li, Minrui Fu, Youjun Liu, Bin Gao, Pengfei Zhao, Zhenchang Wang:
Hemodynamic study on the different therapeutic effects of SSWD resurfacing surgery on patients with pulsatile tinnitus. Comput. Methods Programs Biomed. 190: 105373 (2020) - [j25]Lijuan Xu, Bailing Wang, Lianhai Wang, Dawei Zhao, Xiaohui Han, Shumian Yang:
PLC-SEIFF: A programmable logic controller security incident forensics framework based on automatic construction of security constraints. Comput. Secur. 92: 101749 (2020) - [j24]Gang Chen, Jun Wang, Luo Zuo, Dawei Zhao, Wen Yuanyuan:
Two-stage clutter and interference cancellation method in passive bistatic radar. IET Signal Process. 14(6): 342-351 (2020) - [j23]Li Wang, Dawei Zhao, Tao Wu, Hao Fu, Zhiyu Wang
, Liang Xiao, Xin Xu
, Bin Dai:
Drosophila-inspired 3D moving object detection based on point clouds. Inf. Sci. 534: 154-171 (2020) - [j22]Yibin Wang, Weijie Zheng, Yusheng Cheng
, Dawei Zhao:
Joint label completion and label-specific features for multi-label learning algorithm. Soft Comput. 24(9): 6553-6569 (2020) - [j21]Dawei Zhao
, Shumian Yang, Xiaohui Han, Shuhui Zhang
, Zhen Wang
:
Dismantling and Vertex Cover of Network Through Message Passing. IEEE Trans. Circuits Syst. 67-II(11): 2732-2736 (2020) - [j20]Dawei Zhao
, Lijuan Xu, Shao-Meng Qin, Guangqi Liu, Zhen Wang
:
The Feedback Vertex Set Problem of Multiplex Networks. IEEE Trans. Circuits Syst. 67-II(12): 3492-3496 (2020) - [c21]Er-Ke Shang, Bin Dai, Yiming Nie, Qi Zhu, Liang Xiao, Dawei Zhao:
A Guide-line and Key-point based A-star Path Planning Algorithm For Autonomous Land Vehicles. ITSC 2020: 1-7 - [i10]Li Wang, Dawei Zhao, Tao Wu, Hao Fu, Zhiyu Wang, Liang Xiao, Xin Xu, Bin Dai:
Drosophila-Inspired 3D Moving Object Detection Based on Point Clouds. CoRR abs/2005.02696 (2020)
2010 – 2019
- 2019
- [j19]Xiaohui Han
, Lianhai Wang, Shujiang Xu, Dawei Zhao, Guangqi Liu:
Recognizing roles of online illegal gambling participants: An ensemble learning approach. Comput. Secur. 87 (2019) - [j18]Dawei Zhao
, Liang Xiao
, Hao Fu, Tao Wu, Xin Xu, Bin Dai:
Augmenting cascaded correlation filters with spatial-temporal saliency for visual tracking. Inf. Sci. 470: 78-93 (2019) - [j17]Yusheng Cheng, Dawei Zhao, Yibin Wang, Gensheng Pei:
Multi-label learning with kernel extreme learning machine autoencoder. Knowl. Based Syst. 178: 1-10 (2019) - [j16]Dawei Zhao
, Lianhai Wang, Zhen Wang
, Gaoxi Xiao
:
Virus Propagation and Patch Distribution in Multiplex Networks: Modeling, Analysis, and Optimal Allocation. IEEE Trans. Inf. Forensics Secur. 14(7): 1755-1767 (2019) - [c20]Han Wang
, Yuning Yang, Jiawen Yu, Xi Wang, Dawei Zhao, Dong Xu, Pingping Sun:
DMCTOP: Topology Prediction of Alpha-Helical Transmembrane Protein Based on Deep Multi-Scale Convolutional Neural Network. BIBM 2019: 36-43 - [c19]Minzhen Zheng, Shudong Li
, Danna Lu, Wei Wang, Xiaobo Wu, Dawei Zhao:
Structural Vulnerability of Power Grid Under Malicious Node-Based Attacks. DependSys 2019: 446-453 - 2018
- [j15]Xiaogong Lin, Yuzhao Jiao
, Dawei Zhao:
An Improved Gaussian Filter for Dynamic Positioning Ships With Colored Noises and Random Measurements Loss. IEEE Access 6: 6620-6629 (2018) - [j14]Jianjun Chen, Zhoufang Xiao, Yao Zheng
, Jianfeng Zou, Dawei Zhao, Yufeng Yao:
Scalable generation of large-scale unstructured meshes by a novel domain decomposition approach. Adv. Eng. Softw. 121: 131-146 (2018) - [j13]Dawei Zhao, Hao Fu, Liang Xiao
, Tao Wu, Bin Dai:
Multi-Object Tracking with Correlation Filter for Autonomous Vehicle. Sensors 18(7): 2004 (2018) - [j12]Dawei Zhao
, Bo Gao, Yaofei Wang, Lianhai Wang, Zhen Wang:
Optimal Dismantling of Interdependent Networks Based on Inverse Explosive Percolation. IEEE Trans. Circuits Syst. II Express Briefs 65-II(7): 953-957 (2018) - [j11]Xin Meng
, Dawei Zhao, Shexiang Ma
, Jianfu Teng:
Time Delay Estimation of AIS Signal Based on Three-Order Cumulant. Wirel. Commun. Mob. Comput. 2018: 1349702:1-1349702:7 (2018) - [c18]Shudong Li, Xiaobo Wu, Aiping Li, Bin Zhou, Zhihong Tian, Dawei Zhao:
Structural Vulnerability of Complex Networks Under Multiple Edge-Based Attacks. DSC 2018: 405-409 - [c17]Xiaohui Han, Lianhai Wang, Shujiang Xu, Dawei Zhao, Guangqi Liu:
Role Recognition of Illegal Online Gambling Participants Using Monetary Transaction Data. ICICS 2018: 584-597 - [c16]Li Wang, Zhipeng Xiao, Dawei Zhao, Tao Wu, Bin Dai:
Automatic Extrinsic Calibration of Monocular Camera and LIDAR in Natural Scenes. ICIA 2018: 997-1002 - [c15]Shumian Yang, Lianhai Wang, Dawei Zhao, Guangqi Liu, Shuhui Zhang:
The Design of a Cloud Forensics Middleware System Base on Memory Analysis. SoCPaR 2018: 258-267 - 2017
- [j10]Bo Gao, Zheng-hong Deng, Dawei Zhao
, Qun Song:
State analysis of Boolean control networks with impulsive and uncertain disturbances. Appl. Math. Comput. 301: 187-192 (2017) - [j9]Jianjun Chen, Dawei Zhao, Yao Zheng, Yan Xu, Chen-Feng Li
, Jianjing Zheng:
Domain decomposition approach for parallel improvement of tetrahedral meshes. J. Parallel Distributed Comput. 107: 101-113 (2017) - [c14]Shujiang Xu, Lianhai Wang, Guangqi Liu, Xiaohui Han, Dawei Zhao, Lijuan Xu:
The Categories of Quantum Information Hiding Protocol. ICCCS (1) 2017: 143-152 - [c13]Xiaohui Han, Lianhai Wang, Shujiang Xu, Guangqi Liu, Dawei Zhao:
Linking social network accounts by modeling user spatiotemporal habits. ISI 2017: 19-24 - 2016
- [c12]Guangqi Liu, Lianhai Wang, Shujiang Xu, Dawei Zhao, Shumian Yang:
Video forensics research based on authenticity and integrity. ICIA 2016: 1223-1226 - [c11]Li Wang, Tao Wu, Zhipeng Xiao, Liang Xiao
, Dawei Zhao, Jiarong Han:
Multi-cue road boundary detection using stereo vision. ICVES 2016: 1-6 - [i9]Dawei Zhao, Zhen Wang, Gaoxi Xiao, Bo Gao, Lianhai Wang:
The robustness of interdependent networks under the interplay between cascading failures and virus propagation. CoRR abs/1608.01037 (2016) - [i8]Bo Gao, Dawei Zhao:
Competing spreading processes and immunization in multiplex networks. CoRR abs/1608.01038 (2016) - [i7]Zhen Wang, Chris T. Bauch, Samit Bhattacharyya, Alberto d'Onofrio, Piero Manfredi, Matjaz Perc, Nicola Perra, Marcel Salathé, Dawei Zhao:
Statistical physics of vaccination. CoRR abs/1608.09010 (2016) - 2015
- [j8]Dawei Zhao
, Lianhai Wang, Lijuan Xu, Zhen Wang:
Finding another yourself in multiplex networks. Appl. Math. Comput. 266: 599-604 (2015) - [i6]Dawei Zhao, Lianhai Wang, Zhen Wang:
The robustness of multiplex networks under layer node-based attack. CoRR abs/1509.03002 (2015) - 2014
- [j7]Dawei Zhao
, Haipeng Peng, Lixiang Li
, SiLi Hui, Yixian Yang:
Novel way to research nonlinear feedback shift register. Sci. China Inf. Sci. 57(9): 1-14 (2014) - [j6]Dawei Zhao, Honglin Zhao, Min Jia, Wei Xiang:
Smart Relaying for Selection Combining Based Decode-and-Forward Cooperative Networks. IEEE Commun. Lett. 18(1): 74-77 (2014) - [j5]Dawei Zhao, Honglin Zhao, Min Jia:
Scaled Selection Combining for Adaptive Decode-and-Forward Relaying in Dissimilar Rayleigh Fading Channels. Int. J. Wirel. Inf. Networks 21(3): 238-247 (2014) - [j4]Dawei Zhao, Yuanxun Wang, Suning Sheng, Zongguo Lin:
Multi-objective optimal design of small scale resistance spot welding process with principal component analysis and response surface methodology. J. Intell. Manuf. 25(6): 1335-1348 (2014) - [j3]Dawei Zhao
, Haipeng Peng, Lixiang Li
, Yixian Yang:
A Secure and Effective Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks. Wirel. Pers. Commun. 78(1): 247-269 (2014) - [c10]Jing Dai, Yuqiang Fang, Tao Wu, Dawei Zhao, Hangen He:
Night-Time Road Boundary Detection with Infrared Channel Features Classifier. CIT 2014: 751-755 - [c9]Dawei Zhao, Tao Wu, Yuqiang Fang, Ruili Wang, Jing Dai, Bin Dai:
Efficient Vehicle Localization Based on Road-Boundary Maps. PRICAI 2014: 536-547 - 2013
- [j2]Gang Chen, Dawei Zhao:
Model of Information Security Risk Assessment based on Improved Wavelet Neural Network. J. Networks 8(9): 2093-2100 (2013) - [c8]Jianjun Chen, Dawei Zhao, Yao Zheng, Zhengge Huang, Jianjing Zheng:
Fine-Grained Parallel Algorithm for Unstructured Surface Mesh Generation. IMR 2013: 559-578 - [i5]Shangdi Chen, Dawei Zhao:
New Construction of Authentication Codes with Arbitration from Pseudo-Symplectic Geometry over Finite Fields. CoRR abs/1305.6175 (2013) - [i4]Dawei Zhao, Haipeng Peng, Shudong Li, Yixian Yang:
An efficient dynamic ID based remote user authentication scheme using self-certified public keys for multi-server environment. CoRR abs/1305.6350 (2013) - [i3]Dawei Zhao, Haipeng Peng, Lixiang Li, Yixian Yang:
A secure and effective anonymous authentication scheme for roaming service in global mobility networks. CoRR abs/1306.4726 (2013) - [i2]Dawei Zhao, Lixiang Li, Haipeng Peng, Qun Luo, Yixian Yang:
Multiple Vectors Propagation of Epidemics in Complex Networks. CoRR abs/1307.1834 (2013) - [i1]Dawei Zhao, Lixiang Li, Haipeng Peng, Qun Luo, Yixian Yang:
Multiple routes transmitted epidemics on multiplex networks. CoRR abs/1312.6931 (2013) - 2012
- [j1]Dawei Zhao
, Haipeng Peng, Cong Wang, Yixian Yang:
A secret sharing scheme with a short share realizing the (t, n) threshold and the adversary structure. Comput. Math. Appl. 64(4): 611-615 (2012) - [c7]Xiaogong Lin, Yehai Xie, Dawei Zhao, Shusheng Xu:
Acceleration feedback adaptive backstepping controller for DP using PSO. FSKD 2012: 2334-2338 - [c6]Dawei Zhao, Honglin Zhao:
Constellation design for decode-and-forward relay networks with adaptive modulation. PIMRC 2012: 851-856 - 2011
- [c5]Xiaocheng Shi, Yushi Wei, Jipeng Ning, Mingyu Fu, Dawei Zhao:
Optimizing adaptive thrust allocation based on group biasing method for ship dynamic positioning. ICAL 2011: 394-398 - [c4]Xiaocheng Shi, Xingyan Sun, Mingyu Fu, Wenbo Xie, Dawei Zhao:
An Unscented Kalman Filter based wave filtering algorithm for dynamic ship positioning. ICAL 2011: 399-404
2000 – 2009
- 2007
- [c3]Dawei Zhao, Xiao Zhi Gao, Rongfang Bie:
Computing with Words in Data Mining and Pattern Recognition. ICIC (3) 2007: 285-293 - 2006
- [c2]Hai Huang, Li Jiang, Dawei Zhao, Jingdong Zhao
, Hegao Cai, Hong Liu, Peter Meusel, Bertram Willberg, Gerd Hirzinger:
The Development on a New Biomechatronic Prosthetic Hand Based on Under-actuated Mechanism. IROS 2006: 3791-3796 - [c1]Dawei Zhao, Li Jiang, Hai Huang, M. H. Jin, Hegao Cai, Hong Liu:
Development of a Multi-DOF Anthropomorphic Prosthetic Hand. ROBIO 2006: 878-883
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2021-01-19 23:51 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint