default search action
Jun Zheng 0003
Person information
- affiliation: New Mexico Institute of Mining and Technology, Socorro, NM, USA
Other persons with the same name
- Jun Zheng — disambiguation page
- Jun Zheng 0001 — University of California, San Diego, USA
- Jun Zheng 0002 — Southeast University, Nanjing, China (and 2 more)
- Jun Zheng 0004 — Southwest Jiaotong University, Chengdu, China
- Jun Zheng 0005 — Swiss Federal Institute of Aquatic Science and Technology, Duebendorf, Switzerland
- Jun Zheng 0006 — China University of Geosciences, Wuhan, China
- Jun Zheng 0007 — Beijing Institute of Technology, Beijing, China
- Jun Zheng 0008 — Baotou Teachers' College, Baotou, China
- Jun Zheng 0009 — Zhejiang University of Science and Technology, Hangzhou, China
- Jun Zheng 0010 — University of Texas, El Paso, TX, USA
- Jun Zheng 0011 — University of Michigan, Ann Arbor, MI, USA
- Jun Zheng 0012 — Delphi Delco Electronic Systems, Kokomo, IN, USA
- Jun Zheng 0013 — Applied Optoelectronics Inc, Sugar Land, TX, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j31]Qingqing Li, Zhirui Luo, Ruobin Qi, Jun Zheng:
Automatic Searching of Lightweight and High-Performing CNN Architectures for EEG-Based Driving Fatigue Detection. IEEE Trans. Instrum. Meas. 73: 1-11 (2024) - [c35]Tyler Nichols, Jack Zemlanicky, Zhirui Luo, Qingqing Li, Jun Zheng:
Image-based PDF Malware Detection Using Pre-trained Deep Neural Networks. ISDFS 2024: 1-5 - 2023
- [j30]Qingqing Li, Zhirui Luo, Ruobin Qi, Jun Zheng:
DeepTPA-Net: A Deep Triple Attention Network for sEMG-Based Hand Gesture Recognition. IEEE Access 11: 96797-96807 (2023) - [j29]Michelle Sherman, Sihua Shao, Xiang Sun, Jun Zheng:
Optimizing AoI in UAV-RIS-Assisted IoT Networks: Off Policy Versus On Policy. IEEE Internet Things J. 10(14): 12401-12415 (2023) - [j28]Mathew Salas, Sihua Shao, Adrian Salustri, Zachary Schroeck, Jun Zheng:
Securing Smart Grid Enabled Home Area Networks with Retro-Reflective Visible Light Communication. Sensors 23(3): 1245 (2023) - 2022
- [j27]Qingqing Li, Zhirui Luo, Jun Zheng:
A New Deep Anomaly Detection-Based Method for User Authentication Using Multichannel Surface EMG Signals of Hand Gestures. IEEE Trans. Instrum. Meas. 71: 1-11 (2022) - [j26]Ruobin Qi, Jun Zheng, Zhirui Luo, Qingqing Li:
A Novel Unsupervised Data-Driven Method for Electricity Theft Detection in AMI Using Observer Meters. IEEE Trans. Instrum. Meas. 71: 1-10 (2022) - [c34]Zhirui Luo, Ruobin Qi, Qingqing Li, Jun Zheng, Sihua Shao:
ABODE-Net: An Attention-based Deep Learning Model for Non-intrusive Building Occupancy Detection Using Smart Meter Data. SmartCom 2022: 152-164 - [i1]Zhirui Luo, Ruobin Qi, Qingqing Li, Jun Zheng, Sihua Shao:
ABODE-Net: An Attention-based Deep Learning Model for Non-intrusive Building Occupancy Detection Using Smart Meter Data. CoRR abs/2212.11396 (2022) - 2021
- [j25]Zhirui Luo, Qingqing Li, Jun Zheng:
Deep Feature Fusion for Rumor Detection on Twitter. IEEE Access 9: 126065-126074 (2021) - [j24]Geetika Kovelamudi, Bryan Watson, Jun Zheng, Srinivas Mukkamala:
On the adoption of scramble keypad for unlocking PIN-protected smartphones. Int. J. Inf. Comput. Secur. 15(1): 1-17 (2021) - [j23]Ruobin Qi, Craig Rasband, Jun Zheng, Raul Longoria:
Detecting Cyber Attacks in Smart Grids Using Semi-Supervised Anomaly Detection and Deep Representation Learning. Inf. 12(8): 328 (2021) - [c33]Qingqing Li, Zhirui Luo, Jun Zheng:
Deep Learning-based User Authentication with Surface EMG Images of Hand Gestures. EMBC 2021: 2038-2041 - [c32]Michelle Sherman, Sihua Shao, Xiang Sun, Jun Zheng:
UAV Assisted Cellular Networks With Renewable Energy Charging Infrastructure: A Reinforcement Learning Approach. MILCOM 2021: 495-502
2010 – 2019
- 2019
- [j22]Jun Zheng, Sai Krishna Chigurupati:
M-Pattern: A novel scheme for improving the security of Android Pattern unlock against smudge attacks. ICT Express 5(3): 192-195 (2019) - [j21]Bryan Watson, Thomas Watson, Jun Zheng:
A study of friend recommendations for gaming communities. Int. J. Web Based Communities 15(4): 292-314 (2019) - [c31]Andrew Corum, Donovan Jenkins, Jun Zheng:
Robust PDF Malware Detection with Image Visualization and Processing Techniques. ICDIS 2019: 108-114 - 2017
- [c30]Bryan Watson, Jun Zheng:
On the User Awareness of Mobile Security Recommendations. ACM Southeast Regional Conference 2017: 120-127 - 2016
- [c29]Geetika Kovelamudi, Jun Zheng, Srinivas Mukkamala:
Scramble or not, that is the question a study of the security and usability of scramble keypad for PIN unlock on smartphones. ICCC 2016: 1-6 - 2015
- [c28]Rachel Tucker, Carl Tucker, Jun Zheng:
Privacy Pal: Improving Permission Safety Awareness of Third Party Applications in Online Social Networks. HPCC/CSS/ICESS 2015: 1268-1273 - [c27]Yang Wang, Bryan Watson, Jun Zheng, Srinivas Mukkamala:
ARP-Miner: Mining Risk Patterns of Android Malware. MIWAI 2015: 363-375 - 2014
- [j20]Chen Sun, Yang Wang, Jun Zheng:
Dissecting pattern unlock: The effect of pattern strength meter on pattern selection. J. Inf. Secur. Appl. 19(4-5): 308-320 (2014) - 2013
- [c26]Chen Sun, Yang Wang, Jun Zheng, D. Frank Hsu:
Feature fusion for mobile usage prediction using rank-score characteristics. ICCI*CC 2013: 212-217 - [c25]Chen Sun, Jun Zheng, Huiping Yao, Yang Wang, D. Frank Hsu:
AppRush: Using Dynamic Shortcuts to Facilitate Application Launching on Mobile Devices. ANT/SEIT 2013: 445-452 - [c24]Yang Wang, Jun Zheng, Chen Sun, Srinivas Mukkamala:
Quantitative Security Risk Assessment of Android Permissions and Applications. DBSec 2013: 226-241 - [c23]Casey Mortensen, Ryan Winkelmaier, Jun Zheng:
Exploring attack vectors facilitated by miniaturized computers. SIN 2013: 203-209 - 2012
- [j19]Shijun Sun, Chenglin Peng, Wensheng Hou, Jun Zheng, Yingtao Jiang, Xiaolin Zheng:
Blind source separation with time series variational Bayes expectation maximization algorithm. Digit. Signal Process. 22(1): 17-33 (2012) - [j18]Jun Zheng, Asghar Dehghani:
Range-Free Localization in Wireless Sensor Networks with Neural Network Ensembles. J. Sens. Actuator Networks 1(3): 254-271 (2012) - [c22]Yang Wang, Kaitlyn Gurule, Jacqueline Wise, Jun Zheng:
Wavelet Based Region Duplication Forgery Detection. ITNG 2012: 30-35 - 2011
- [j17]Mohammad Al-Otaibi, Hamdy S. Soliman, Jun Zheng:
A multipath routeless routing protocol with an efficient location update mechanism. Int. J. Internet Protoc. Technol. 6(1/2): 75-82 (2011) - [j16]Qiaoqin Li, Haigang Gong, Ming Liu, Mei Yang, Jun Zheng:
On Prolonging Network Lifetime through Load-Similar Node Deployment in Wireless Sensor Networks. Sensors 11(4): 3527-3544 (2011) - [c21]D. D. Yang, Wensheng Hou, Xiaoying Wu, X. L. Zheng, Jun Zheng, Y. T. Jiang:
Changes in spatial distribution of flexor digitorum superficialis muscle activity is correlated to finger's action. EMBC 2011: 4108-4111 - [c20]Asghar Dehghani, Jun Zheng:
A New Method to Generate Virtual Samples for Solving Small Sample Set Problems. ICMLA (1) 2011: 420-423 - 2010
- [j15]Jun Zheng:
Cost-sensitive boosting neural networks for software defect prediction. Expert Syst. Appl. 37(6): 4537-4543 (2010)
2000 – 2009
- 2009
- [j14]Jun Zheng:
Predicting software reliability with neural network ensembles. Expert Syst. Appl. 36(2): 2116-2122 (2009) - [j13]Xiaolong Wu, Min He, Fei Wang, Jun Zheng, Emma E. Regentova, Guoshun Hao:
Performance Analysis of Sub-Rating for Handoff Calls in HCN. Int. J. Commun. Netw. Syst. Sci. 2(1): 21-29 (2009) - [j12]Yan Zhang, Laurence Tianruo Yang, Jianhua Ma, Jun Zheng:
Quantitative analysis of location management and QoS in wireless networks. J. Netw. Comput. Appl. 32(2): 483-489 (2009) - [c19]Qiaoqin Li, Mei Yang, Yan Jin, Jun Zheng, Yingtao Jiang, Jiazhi Zeng:
Load-Similar Node Distribution for Prolonging Network Lifetime in PMRC-Based Wireless Sensor Networks. FGIT-FGCN 2009: 384-393 - [c18]Jun Zheng, Mengyu Qiao, Emma E. Regentova:
Multi-slot Channel Allocation for Priority Packet Transmission in the GPRS Network. ITNG 2009: 1152-1157 - 2008
- [j11]Jun Zheng, Emma E. Regentova:
Independent Component Analysis for Microcalcifications Detection in Digital Mammograms. Afr. J. Inf. Commun. Technol. 4(2) (2008) - [j10]Hongmei Yan, Jun Zheng, Yingtao Jiang, Chenglin Peng, Shouzhong Xiao:
Selecting critical clinical features for heart diseases diagnosis with a real-coded genetic algorithm. Appl. Soft Comput. 8(2): 1105-1111 (2008) - 2007
- [j9]Jun Zheng, Yan Zhang, Ling Wang, Jinlin Chen:
Adaptive location update area design for wireless cellular networks under 2D Markov walk model. Comput. Commun. 30(9): 2060-2069 (2007) - [c17]Yan Zhang, Laurence Tianruo Yang, Jianhua Ma, Jun Zheng, Mingtuo Zhou, Shaoqiu Xiao:
Quantitative Analysis of Location Management and QoS in Wireless Mobile Networks. AINA 2007: 573-579 - [c16]Yoohwan Kim, Wei Ren, Ju-Yeon Jo, Yingtao Jiang, Jun Zheng:
SFRIC: A Secure Fast Roaming Scheme in Wireless LAN Using ID-Based Cryptography. ICC 2007: 1570-1575 - [c15]Xiaolong Wu, Jun Zheng, Emma E. Regentova, Yingtao Jiang:
Analysis of the Effect of Channel Sub-rating in Unidirectional Call Overflow Scheme for Call Admission in Hierarchical Cellular Networks. VTC Spring 2007: 1265-1269 - [c14]Yan Zhang, Jun Zheng, Wei Li:
A Simple and Effective QoS Differentiation Scheme in IEEE 802.16 WiMAX Mesh Networking. WCNC 2007: 3216-3220 - 2006
- [j8]Yan Zhang, Jun Zheng, Lili Zhang, Yifan Chen, Maode Ma:
Modeling location management in wireless networks with generally distributed parameters. Comput. Commun. 29(12): 2386-2395 (2006) - [j7]Hongmei Yan, Yingtao Jiang, Jun Zheng, Chenglin Peng, Qinghui Li:
A multilayer perceptron-based medical decision support system for heart disease diagnosis. Expert Syst. Appl. 30(2): 272-281 (2006) - [j6]Jun Zheng, Yan Zhang, Emma E. Regentova:
Virtual guard channel for handoff calls in integrated voice/data wireless networks. IEEE Commun. Lett. 10(4): 263-265 (2006) - [j5]Jun Zheng, Emma E. Regentova:
I-Poll: Improved Polling Scheme for Augmenting Voice Support in IEEE 802.11 PCF. IEICE Trans. Commun. 89-B(6): 1964-1967 (2006) - [j4]Emma E. Regentova, Dongsheng Yao, Shahram Latifi, Jun Zheng:
Image Segmentation Using Ncut in the Wavelet Domain. Int. J. Image Graph. 6(4): 569-582 (2006) - [c13]Wensheng Hou, Jun Zheng, Yingtao Jiang, Shan Shen, Annette Sterr, André J. Szameitat, Monique van Loon:
A Behavior Study of the Effects of Visual Feedback on Motor Output. EMBC 2006: 1273-1276 - [c12]Emma E. Regentova, Lei Zhang, Jun Zheng, Gopalkrishna Veni:
Detecting Microcalcifications in Digital Mammograms using Wavelet Domain Hidden Markov Tree Model. EMBC 2006: 1972-1975 - [c11]Yi Lu, Jun Zheng, Yingtao Jiang, Mei Yang, Bingmei Fu, Wensheng Hou:
Progressive Image Transmission for Medical Applications based on Wavelet Transform with a Non-uniform Scalar Quantization Scheme. EMBC 2006: 4795-4798 - [c10]Mei Yang, Mayauna McCullough, Yingtao Jiang, Jun Zheng:
K-Selector-Based Dispatching Algorithm for Clos-Network Switches. ITNG 2006: 222-226 - [c9]Jun Zheng, Yan Zhang, Ling Wang, Jinlin Chen:
Adaptive Location Update Area Design for PCS Networks under 2D Markov Walk Model. LCN 2006: 247-253 - [c8]Jun Zheng, Emma E. Regentova, Radhika Varadarajan:
Dynamic Planning of Personalized Location Areas for Future PCS Networks with a Simulated Annealing Algorithm. VTC Spring 2006: 608-612 - 2005
- [j3]Jun Zheng, Emma E. Regentova:
Hybrid Location Update Scheme for Future PCS Networks. IEICE Trans. Commun. 88-B(1): 388-391 (2005) - [j2]Jun Zheng, Shahram Latifi, Emma E. Regentova, Kai Luo, Xiaolong Wu:
Diagnosability of star graphs under the comparison diagnosis model. Inf. Process. Lett. 93(1): 29-36 (2005) - [c7]Jun Zheng, Emma E. Regentova:
An Improved Polling Scheme for Voice Support in IEEE 802.11 Wireless Network. ITCC (2) 2005: 603-608 - [c6]Jun Zheng, Emma E. Regentova:
QoS-Based Dynamic Channel Allocation for GSM/GPRS Networks. NPC 2005: 285-294 - 2004
- [j1]Hongmei Yan, Yingtao Jiang, Jun Zheng, Bingmei Fu, Shouzhong Xiao, Chenglin Peng:
The internet-based knowledge acquisition and management method to construct large-scale distributed medical expert systems. Comput. Methods Programs Biomed. 74(1): 1-10 (2004) - [c5]Jun Zheng, Emma E. Regentova:
Optimal Partitioning Algorithm for Minimizing Signaling Cost under the Delay Constraint. International Conference on Wireless Networks 2004: 624-627 - [c4]Jun Zheng, Emma E. Regentova, Pradip K. Srimani:
Dynamic Location Management with Personalized Location Area for Future PCS Networks. IWDC 2004: 495-501 - [c3]Jun Zheng, Emma E. Regentova:
Microcalcification Detection Using Independent Component Analysis. METMBS 2004: 64-68 - 2003
- [c2]Jun Zheng, Emma E. Regentova:
Wavelet Based Feature Reduction Method for Effective Classification of Hyperspectral Data. ITCC 2003: 483-487 - [c1]Jun Zheng, Shahram Latifi, Emma E. Regentova, Xiaolong Wu, Kai Luo:
Diagnosability of Star Graphs under the Comparison Diagnosis Model. PDPTA 2003: 731-736
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-15 19:35 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint