default search action
Wei Zong
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Xin Feng, Yue Zhao, Wei Zong, Xiaona Xu:
Adaptive multi-task learning for speech to text translation. EURASIP J. Audio Speech Music. Process. 2024(1): 36 (2024) - [c17]Wei Zong, Yang-Wai Chow, Willy Susilo, Joonsang Baek, Jongkil Kim, Seyit Camtepe:
IPRemover: A Generative Model Inversion Attack against Deep Neural Network Fingerprinting and Watermarking. AAAI 2024: 7837-7845 - 2023
- [j15]Xiangning Xue, Wei Zong, Zhiguang Huo, Kyle D. Ketchesin, Madeline R. Scott, Kaitlyn A Petersen, Ryan W. Logan, Marianne L. Seney, Colleen A. Mcclung, George C. Tseng:
DiffCircaPipeline: a framework for multifaceted characterization of differential rhythmicity. Bioinform. 39(1) (2023) - [j14]Ying Zhang, Jiang Shao, Ke Liu, Hanyu Feng, Wei Zong, Fangyuan Tian, Xiaojiao Chen:
Biases on visual warnings during multiple target visual searches on mine monitoring interface. Displays 77: 102387 (2023) - [j13]Ning Li, Wen Ma, Fuxin Ren, Xiao Li, Fuyan Li, Wei Zong, Lili Wu, Zongrui Dai, Steve C. N. Hui, Richard A. E. Edden, Muwei Li, Fei Gao:
Neurochemical and functional reorganization of the cognitive-ear link underlies cognitive impairment in presbycusis. NeuroImage 268: 119861 (2023) - [c16]Wei Zong, Yang-Wai Chow, Willy Susilo, Kien Do, Svetha Venkatesh:
TrojanModel: A Practical Trojan Attack against Automatic Speech Recognition Systems. SP 2023: 1667-1683 - 2022
- [j12]Wei Zong, Songtao Lin, Yuxing Gao, Yanying Yan:
Process-driven quality improvement for scientific data based on information product map. Electron. Libr. 40(3): 177-195 (2022) - [j11]Wei Zong, Yang-Wai Chow, Willy Susilo, Jongkil Kim, Ngoc-Thuy Le:
Detecting Audio Adversarial Examples in Automatic Speech Recognition Systems Using Decision Boundary Patterns. J. Imaging 8(12): 324 (2022) - [c15]Wei Zong, Yang-Wai Chow, Willy Susilo:
High Quality Audio Adversarial Examples Without Using Psychoacoustics. CSS 2022: 163-177 - [i1]Haripriya Harikumar, Santu Rana, Kien Do, Sunil Gupta, Wei Zong, Willy Susilo, Svetha Venkatesh:
Defense Against Multi-target Trojan Attacks. CoRR abs/2207.03895 (2022) - 2021
- [j10]Yang-Wai Chow, Willy Susilo, Joonsang Baek, Jongkil Kim, Wei Zong:
Exploiting QR Code Error Correction for Digital Image Watermarking. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 12(2): 114-140 (2021) - [c14]Wei Zong, Yang-Wai Chow, Willy Susilo:
Towards Visualizing and Detecting Audio Adversarial Examples for Automatic Speech Recognition. ACISP 2021: 531-549 - [c13]Wei Zong, Yang-Wai Chow, Willy Susilo:
Black-Box Audio Adversarial Example Generation Using Variational Autoencoder. ICICS (2) 2021: 142-160 - [c12]Wei Zong, Yang-Wai Chow, Willy Susilo, Santu Rana, Svetha Venkatesh:
Targeted Universal Adversarial Perturbations for Automatic Speech Recognition. ISC 2021: 358-373 - [c11]Wei Zong, Yang-Wai Chow, Willy Susilo, Jongkil Kim:
Trojan Attacks and Defense for Speech Recognition. MobiSec 2021: 195-210 - 2020
- [j9]Wei Zong, Yang-Wai Chow, Willy Susilo:
Interactive three-dimensional visualization of network intrusion detection data for machine learning. Future Gener. Comput. Syst. 102: 292-306 (2020)
2010 – 2019
- 2019
- [j8]Pingping Feng, Feng Wu, Richard Y. K. Fung, Tao Jia, Wei Zong:
The order and transshipment decisions in a two-location inventory system with demand forecast updates. Comput. Ind. Eng. 135: 53-66 (2019) - [j7]Wei Zong, Feng Wu, Pingping Feng:
Improving data quality during ERP implementation based on information product map. Enterp. Inf. Syst. 13(9): 1275-1291 (2019) - [c10]Wei Zong, Yang-Wai Chow, Willy Susilo:
Dimensionality Reduction and Visualization of Network Intrusion Detection Data. ACISP 2019: 441-455 - 2018
- [c9]Wei Zong, Yang-Wai Chow, Willy Susilo:
A 3D Approach for the Visualization of Network Intrusion Detection Data. CW 2018: 308-315 - [c8]Wei Zong, Yang-Wai Chow, Willy Susilo:
A Two-Stage Classifier Approach for Network Intrusion Detection. ISPEC 2018: 329-340 - 2017
- [j6]Wei Zong, Feng Wu, Lap Keung Chu, Domenic Sculli:
Identification of approximately duplicate material records in ERP systems. Enterp. Inf. Syst. 11(3): 434-451 (2017) - [j5]Wei Zong, Feng Wu, Zhengrui Jiang:
A Markov-Based Update Policy for Constantly Changing Database Systems. IEEE Trans. Engineering Management 64(3): 287-300 (2017) - [c7]Yang-Wai Chow, Willy Susilo, Joseph Tonien, Wei Zong:
A QR Code Watermarking Approach Based on the DWT-DCT Technique. ACISP (2) 2017: 314-331 - 2015
- [c6]Wei Zong:
Reduction of False Critical ECG Alarms using Waveform Features of Arterial Blood Pressure and/or Photoplethysmogram Signals. CinC 2015: 289-292 - [c5]Wei Zong, Feng Wu, Zhengrui Jiang, Yi Qu:
A Study on Optimal Policy for Purchase Data Updating in ERP Systems. ICDS 2015: 16-24 - [c4]Yi Qu, Feng Wu, Wei Zong:
A Vehicle Routing Problem with Time Windows for Attended Home Distribution. ICDS 2015: 127-134 - 2014
- [j4]Zemin Liu, Wei Zong:
Complicated Graphics Model based on Neural Network of Particle Swarm. J. Multim. 9(3): 333-339 (2014) - [j3]Zemin Liu, Wei Zong:
Image Retrieval via Relevance Vector Machine with Multiple Features. J. Multim. 9(5): 676-681 (2014) - [j2]Wei Lu, Wei Zong, Weiwei Xing, Ergude Bao:
Gait recognition based on joint distribution of motion angles. J. Vis. Lang. Comput. 25(6): 754-763 (2014) - [c3]Wei Zong, Scott Kresge, Haisheng Lu, John Wang:
A Real-time ST-segment Monitoring Algorithm Based on a Multi-channel Waveform-Length-TransformMethod for Q-onset and J-point Detection. CinC 2014: 641-644 - [c2]Wei Lu, Wei Zong, Weiwei Xing:
Gait Recognition Based on Joint Distribution of Motion Angles. DMS 2014: 135-142 - 2013
- [j1]Zemin Liu, Wei Zong:
Image Classification Optimization Algorithm based on SVM. J. Multim. 8(5): 496-502 (2013)
2000 – 2009
- 2008
- [c1]Larry J. Eshelman, K. P. Lee, Joseph J. Frassica, Wei Zong, Larry Nielsen, Mohammed Saeed:
Development and Evaluation of Predictive Alerts for Hemodynamic Instability in ICU Patients. AMIA 2008
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint