
Wentao Zhang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j29]Zujun Qin
, Jiangjiang Gao
, Wangchun Zhu
, Wentao Zhang:
Vibration Detection Based on Multipath Information Fusion in Dual-Channel ϕ-OTDR System. IEEE Access 9: 20318-20330 (2021) - [j28]Jianxiang Zhang, Wenzhu Huang, Wentao Zhang, Fang Li, Yanliang Du:
Train-Induced Vibration Monitoring of Track Slab under Long-Term Temperature Load Using Fiber-Optic Accelerometers. Sensors 21(3): 787 (2021) - [i16]Wentao Zhang, Zhiqiang Zuo, Yijing Wang:
A Two-Functional-Network Framework of Opinion Dynamics. CoRR abs/2101.11415 (2021) - 2020
- [j27]Hao Cheng, Wentao Zhang, Yi Zhang, Lei Zhang, Jun Wu, Chongjun Wang:
Fast core pricing algorithms for path auction. Auton. Agents Multi Agent Syst. 34(1): 18 (2020) - [j26]Guodong Zhai
, Wentao Zhang
, Wenyuan Hu
, Zhendong Ji
:
Coal Mine Rescue Robots Based on Binocular Vision: A Review of the State of the Art. IEEE Access 8: 130561-130575 (2020) - [j25]Wentao Zhang, Jiawei Jiang, Yingxia Shao, Bin Cui:
Snapshot boosting: a fast ensemble framework for deep neural networks. Sci. China Inf. Sci. 63(1): 112102 (2020) - [j24]Wentao Zhang, Zhiqiang Zuo
, Yijing Wang:
Coordination for second-order multi-agent systems with velocity and communication constraints. Neurocomputing 375: 51-61 (2020) - [j23]Mingwen Shao, Wentao Zhang, Wangmeng Zuo, Deyu Meng:
Multi-scale generative adversarial inpainting network based on cross-layer attention transfer mechanism. Knowl. Based Syst. 196: 105778 (2020) - [j22]Wentao Zhang, Zhiqiang Zuo, Yijing Wang, Zhicheng Zhang:
Double-Integrator Dynamics for Multiagent Systems With Antagonistic Reciprocity. IEEE Trans. Cybern. 50(9): 4110-4120 (2020) - [j21]Wenchao Li, Wentao Zhang, Qiping Zhang
, Yin Zhang, Yulin Huang, Jianyu Yang:
Simultaneous Super-Resolution and Target Detection of Forward-Looking Scanning Radar via Low-Rank and Sparsity Constrained Method. IEEE Trans. Geosci. Remote. Sens. 58(10): 7085-7095 (2020) - [c43]Wentao Zhang, Hua Huang, Meikang Qiu, Qiangfei Ma:
VR Design and Display System of Ceramic Products Based on Cloud Service Platform. CLOUD 2020: 80-85 - [c42]Gabrielle Dagasso, Yan Yan, Lipu Wang, Longhai Li, Randy Kutcher, Wentao Zhang, Lingling Jin:
Comprehensive-GWAS: a pipeline for genome-wide association studies utilizing cross-validation to assess the predictivity of genetic variations. BIBM 2020: 1361-1367 - [c41]Zemin Liu, Wentao Zhang, Yuan Fang
, Xinming Zhang, Steven C. H. Hoi:
Towards Locality-Aware Meta-Learning of Tail Node Embeddings on Networks. CIKM 2020: 975-984 - [c40]Wentao Zhang, Hua Huang, Meikang Qiu:
Design and Implementation of Virtual Pottery Space Based on Ceramic Cloud Service Platform. CSCloud/EdgeCom 2020: 145-150 - [c39]Qiangfei Ma, Hua Huang, Wentao Zhang, Meikang Qiu:
Design of Smart Home System Based on Collaborative Edge Computing and Cloud Computing. ICA3PP (3) 2020: 355-366 - [c38]Kai Shuang, Hao Hu, Wentao Zhang, Zhixuan Zhang, Peng Xu:
Gated Graph Convolutional Network for Aspect-Based Sentiment Analysis Emphasizing on Relational Reasoning. ICAART (2) 2020: 362-369 - [c37]Wentao Zhang, Mianxiong Dong, Kaoru Ota, Jianhua Li, Wu Yang, Jun Wu:
A Big Data Management Architecture for Standardized IoT Based on Smart Scalable SNMP. ICC 2020: 1-7 - [c36]Wentao Zhang, Jiawei Jiang, Yingxia Shao, Bin Cui:
Efficient Diversity-Driven Ensemble for Deep Neural Networks. ICDE 2020: 73-84 - [c35]Wenchao Li, Shirui Yang, Wentao Zhang, Yulin Huang, Jianyu Yang:
An Improved Target Extraction Scheme for Forward-Looking Scanning Radar. IGARSS 2020: 1793-1796 - [c34]Wentao Zhang, Hao Cheng, Jun Gan:
MUNet: A Multi-scale U-Net Framework for Medical Image Segmentation. IJCNN 2020: 1-7 - [c33]Wentao Zhang, Xupeng Miao, Yingxia Shao, Jiawei Jiang, Lei Chen, Olivier Ruas
, Bin Cui:
Reliable Data Distillation on Graph Convolutional Network. SIGMOD Conference 2020: 1399-1414 - [c32]Wentao Zhang, Li Chen, Weidong Wang:
Stochastic Encoding based Distributed Blind Estimation for Deterministic Vector Signal. VTC Spring 2020: 1-5 - [i15]Shiwen Wu, Wentao Zhang, Fei Sun, Bin Cui:
Graph Neural Networks in Recommender Systems: A Survey. CoRR abs/2011.02260 (2020) - [i14]Tianyou Ding, Wentao Zhang, Chunning Zhou, Fulei Ji:
An Automatic Search Tool for Iterative Trails and its Application to estimation of differentials and linear hulls. IACR Cryptol. ePrint Arch. 2020: 1152 (2020) - [i13]Fulei Ji, Wentao Zhang, Chunning Zhou, Tianyou Ding:
Improved (Related-key) Differential Cryptanalysis on GIFT. IACR Cryptol. ePrint Arch. 2020: 1242 (2020)
2010 – 2019
- 2019
- [j20]Wentao Zhang
, Li Chen
, Min Qin, Weidong Wang:
Statistical Inference-Based Distributed Blind Estimation in Wireless Sensor Networks. IEEE Access 7: 150355-150368 (2019) - [j19]Xiaoyuan Wang, Wentao Zhang:
屏幕防窃拍方法综述 (Overview of Preventing Candid Photos Methods for Electronic Screens). 计算机科学 46(6A): 41-44 (2019) - [j18]Chunning Zhou, Wentao Zhang, Tianyou Ding, Zejun Xiang:
Improving the MILP-based Security Evaluation Algorithm against Differential/Linear Cryptanalysis Using A Divide-and-Conquer Approach. IACR Trans. Symmetric Cryptol. 2019(4): 438-469 (2019) - [c31]Shuaijie Miao, Wentao Zhang, Wenzhu Huang, Fang Li, Ying Song:
Monitoring of buoyancy material curing based on FBG sensors. I2MTC 2019: 1-5 - [c30]Wentao Zhang, Wenzhu Huang, Yingbo Luo, Fang Li:
Simultaneous detection of deep-sea earthquake and magnetic field using three-axis fiber optic accelerometer-magnetometer. I2MTC 2019: 1-5 - [c29]Wenchao Li, Wentao Zhang, Qiping Zhang, Yin Zhang, Yulin Huang, Jianyu Yang:
Target Detection of Forward-Looking Scanning Radar Based On Low-Rank and Sparse Matrix Decomposition. IGARSS 2019: 1474-1477 - [c28]Wentao Zhang, Wenchao Li, Yongchao Zhang, Yin Zhang, Yulin Huang, Jianyu Yang:
Super-Resolution of Forward-Looking Scanning Radar Based on Low-Rank and Sparse Constraints. IGARSS 2019: 2758-2761 - [i12]Chunning Zhou, Wentao Zhang, Tianyou Ding, Zejun Xiang:
Improving the MILP-based Security Evaluation Algorithms against Differential Cryptanalysis Using Divide-and-Conquer Approach. IACR Cryptol. ePrint Arch. 2019: 19 (2019) - [i11]Fulei Ji, Wentao Zhang, Tianyou Ding:
Improving Matsui's Search Algorithm for the Best Differential/Linear Trails and its Applications for DES, DESL and GIFT. IACR Cryptol. ePrint Arch. 2019: 1190 (2019) - 2018
- [j17]Kai Shuang, Yaqiu Liu
, Wentao Zhang, Zhixuan Zhang
:
Summarization Filter: Consider More About the Whole Query in Machine Comprehension. IEEE Access 6: 58702-58709 (2018) - [c27]Rui Ma, Wentao Zhang, Fang Li, Yifei Ma:
Simulation Analysis of Fiber Optic Magnetic Sensor. ICAIT 2018: 5-9 - [c26]Wentao Zhang, Wenzhu Huang:
Applications of Fiber Optics Sensors in Seismology. ICAIT 2018: 16-20 - 2017
- [j16]Wentao Zhang, Li Chen, Xiaohui Chen, Zihao Yu, Zhiyuan Li, Weidong Wang:
Design and realization of indoor VLC-Wi-Fi hybrid network. J. Commun. Inf. Networks 2(4): 75-87 (2017) - [c25]Wentao Zhang, Zhiqiang Zuo, Yijing Wang:
Cooperative control in the presence of antagonistic reciprocity. ASCC 2017: 745-749 - [c24]Ritchie Zhao, Weinan Song, Wentao Zhang, Tianwei Xing, Jeng-Hau Lin, Mani B. Srivastava, Rajesh Gupta, Zhiru Zhang:
Accelerating Binarized Convolutional Neural Networks with Software-Programmable FPGAs. FPGA 2017: 15-24 - [c23]Wentao Zhang, Qianhong Wu, Bo Qin, Tianxu Han, Yanting Zhang, Xiaofeng Chen, Na Li:
TTP-free Fair Exchange of Digital Signatures with Bitcoin. ISPEC 2017: 62-81 - 2016
- [j15]Wentao Zhang, Yang Liu
:
Observer-based distributed consensus for general nonlinear multi-agent systems with interval control inputs. Int. J. Control 89(1): 84-98 (2016) - [j14]Wentao Zhang, Kit Ian Kou, Jungang Lou, Yang Liu
:
Observer based consensus for nonlinear multi-agent systems with communication failures. Neurocomputing 173: 1034-1043 (2016) - [j13]Liming Lee, Kit Ian Kou, Wentao Zhang, Jinling Liang, Yang Liu
:
Robust finite-time boundedness of multi-agent systems subject to parametric uncertainties and disturbances. Int. J. Syst. Sci. 47(10): 2466-2474 (2016) - [c22]Zejun Xiang, Wentao Zhang, Zhenzhen Bao, Dongdai Lin:
Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers. ASIACRYPT (1) 2016: 648-678 - [c21]Zejun Xiang, Wentao Zhang, Dongdai Lin:
On the Division Property of Simon48 and Simon64. IWSEC 2016: 147-163 - [i10]Zejun Xiang, Wentao Zhang, Dongdai Lin:
On the Division Property of SIMON48 and SIMON64. IACR Cryptol. ePrint Arch. 2016: 839 (2016) - [i9]Zejun Xiang, Wentao Zhang, Zhenzhen Bao, Dongdai Lin:
Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers. IACR Cryptol. ePrint Arch. 2016: 857 (2016) - 2015
- [j12]Wentao Zhang, Zhenzhen Bao, Dongdai Lin, Vincent Rijmen, Bohan Yang, Ingrid Verbauwhede
:
RECTANGLE: a bit-slice lightweight block cipher suitable for multiple platforms. Sci. China Inf. Sci. 58(12): 1-15 (2015) - [j11]Wenzhu Huang, Tengkun Zhen, Wentao Zhang, Fusheng Zhang, Fang Li:
A High-Resolution Demodulation Algorithm for FBG-FP Static-Strain Sensors Based on the Hilbert Transform and Cross Third-Order Cumulant. Sensors 15(5): 9928-9941 (2015) - [c20]Ling Cheng, Wentao Zhang, Zejun Xiang:
A New Cryptographic Analysis of 4-bit S-Boxes. Inscrypt 2015: 144-164 - [c19]Wentao Zhang, Zhenzhen Bao, Vincent Rijmen, Meicheng Liu:
A New Classification of 4-bit Optimal S-boxes and Its Application to PRESENT, RECTANGLE and SPONGENT. FSE 2015: 494-515 - [c18]Qingfeng Tan, Jinqiao Shi, Binxing Fang, Wentao Zhang, Xuebin Wang:
StegoP2P: Oblivious user-driven unobservable communications. ICC 2015: 7126-7131 - [i8]Wentao Zhang, Zhenzhen Bao, Vincent Rijmen, Meicheng Liu:
A New Classification of 4-bit Optimal S-boxes and its Application to PRESENT, RECTANGLE and SPONGENT. IACR Cryptol. ePrint Arch. 2015: 433 (2015) - 2014
- [j10]Wentao Zhang, Yang Liu
:
Distributed consensus for sampled-data control multi-agent systems with missing control inputs. Appl. Math. Comput. 240: 348-357 (2014) - [j9]Wentao Zhang, Wenhua Zhao, Xinhui Du:
Short-term Forecast Technology in Load of Electrified Railway based on Wavelet-extreme Learning Machine. J. Networks 9(6): 1502-1508 (2014) - [c17]Jianhao Tan, Xiaolong Li, Wentao Zhang, Yaoqin Xie, Yongjin Zhou:
Automatic Estimation of Muscle Thickness in Ultrasound Images Based on Revoting Hough Transform (RVHT). CCPR (2) 2014: 392-401 - [c16]Zhenzhen Bao, Wentao Zhang, Dongdai Lin:
Speeding Up the Search Algorithm for the Best Differential and Best Linear Trails. Inscrypt 2014: 259-285 - [i7]Wentao Zhang, Zhenzhen Bao, Dongdai Lin, Vincent Rijmen, Bohan Yang, Ingrid Verbauwhede:
RECTANGLE: A Bit-slice Ultra-Lightweight Block Cipher Suitable for Multiple Platforms. IACR Cryptol. ePrint Arch. 2014: 84 (2014) - 2013
- [j8]Wenzhu Huang, Wentao Zhang
, Fang Li:
Acoustic Emission Source Location Using a Distributed Feedback Fiber Laser Rosette. Sensors 13(10): 14041-14054 (2013) - 2012
- [c15]Wentao Zhang, Bozhan Su, Wenling Wu, Dengguo Feng, Chuankun Wu:
Extending Higher-Order Integral: An Efficient Unified Algorithm of Constructing Integral Distinguishers for Block Ciphers. ACNS 2012: 117-134 - 2011
- [j7]Wentao Ma, Chunwu Yu, Wentao Zhang, Ping Zhou, Jiming Hu:
Self-replication: spelling it out in a chemical background. Theory Biosci. 130(2): 119-125 (2011) - [c14]Zhanguo Xia, Wentao Zhang, Shiyu Cai, Shixiong Xia:
Multi-relational Data Semi-supervised K-Means Clustering Algorithm. AICI (1) 2011: 413-420 - [c13]Dengguo Feng, Xiutao Feng, Wentao Zhang, Xiubin Fan, Chuankun Wu:
Loiss: A Byte-Oriented Stream Cipher. IWCC 2011: 109-125 - 2010
- [j6]Wentao Ma, Chunwu Yu, Wentao Zhang, Ping Zhou, Jiming Hu:
The emergence of ribozymes synthesizing membrane components in RNA-based protocells. Biosyst. 99(3): 201-209 (2010) - [j5]Wentao Zhang, Bozhan Su, Wenling Wu, Dengguo Feng:
Some results on cryptanalysis of SMS4 block cipher. Int. J. Appl. Cryptogr. 2(1): 60-67 (2010) - [i6]Bozhan Su, Wenling Wu, Wentao Zhang:
Differential Cryptanalysis of SMS4 Block Cipher. IACR Cryptol. ePrint Arch. 2010: 62 (2010) - [i5]Dengguo Feng, Xiutao Feng, Wentao Zhang, Xiubin Fan, Chuankun Wu:
Loiss: A Byte-Oriented Stream Cipher. IACR Cryptol. ePrint Arch. 2010: 489 (2010)
2000 – 2009
- 2009
- [c12]Wenling Wu, Lei Zhang, Liting Zhang, Wentao Zhang:
Security Analysis of the GF-NLFSR Structure and Four-Cell Block Cipher. ICICS 2009: 17-31 - [c11]Wentao Zhang, Wenling Wu, Dengguo Feng, Bozhan Su:
Some New Observations on the SMS4 Block Cipher in the Chinese WAPI Standard. ISPEC 2009: 324-335 - [i4]Wenling Wu, Lei Zhang, Liting Zhang, Wentao Zhang:
Security Analysis of the GF-NLFSR Structure and Four-Cell Block Cipher. IACR Cryptol. ePrint Arch. 2009: 346 (2009) - 2008
- [c10]Lei Zhang, Wentao Zhang, Wenling Wu:
Cryptanalysis of Reduced-Round SMS4 Block Cipher. ACISP 2008: 216-229 - [c9]Wenling Wu, Lei Zhang, Wentao Zhang:
Improved Impossible Differential Cryptanalysis of Reduced-Round Camellia. Selected Areas in Cryptography 2008: 442-456 - 2007
- [j4]Wentao Ma, Chunwu Yu, Wentao Zhang:
Monte Carlo simulation of early molecular evolution in the RNA World. Biosyst. 90(1): 28-39 (2007) - [j3]Wenling Wu, Wentao Zhang, Dengguo Feng:
Impossible Differential Cryptanalysis of Reduced-Round ARIA and Camellia. J. Comput. Sci. Technol. 22(3): 449-456 (2007) - [c8]Wentao Zhang, Yan Yang, Shengqun Tang, Lina Fang:
QoS-driven Service Selection Optimization Model and Algorithms for Composite Web Services. COMPSAC (2) 2007: 425-431 - [c7]Wentao Zhang, Wenling Wu, Dengguo Feng:
New Results on Impossible Differential Cryptanalysis of Reduced AES. ICISC 2007: 239-250 - [c6]Yan Yang, Shengqun Tang, Youwei Xu, Wentao Zhang, Lina Fang:
An Approach to QoS-aware Service Selection in Dynamic Web Service Composition. ICNS 2007: 18 - [c5]Gang Liu, Qun Liu, Wentao Zhang:
Model-Based Testing and Validation on Artificial Intelligence Systems. IMSCCS 2007: 445-449 - [c4]Wentao Zhang, Lei Zhang, Wenling Wu, Dengguo Feng:
Related-Key Differential-Linear Attacks on Reduced AES-192. INDOCRYPT 2007: 73-85 - 2006
- [j2]Wenling Wu, Wentao Zhang, Dongdai Lin:
Security on Generalized Feistel Scheme with SP Round Function. Int. J. Netw. Secur. 3(3): 215-224 (2006) - [j1]Wentao Zhang, Xiaohua Jia
, Chuanhe Huang:
Distributed energy-efficient geographic multicast for Wireless Sensor Networks. Int. J. Wirel. Mob. Comput. 1(2): 141-147 (2006) - [c3]Wentao Zhang, Wenling Wu, Lei Zhang, Dengguo Feng:
Improved Related-Key Impossible Differential Attacks on Reduced-Round AES-192. Selected Areas in Cryptography 2006: 15-27 - [i3]Wenling Wu, Wentao Zhang, Dengguo Feng:
Impossible Differential Cryptanalysis of ARIA and Camellia. IACR Cryptol. ePrint Arch. 2006: 350 (2006) - 2005
- [c2]Wenling Wu, Wentao Zhang, Dengguo Feng:
Integral Cryptanalysis of Reduced FOX Block Cipher. ICISC 2005: 229-241 - [i2]Wenling Wu, Wentao Zhang, Dengguo Feng:
Improved Integral Cryptanalysis of FOX Block Cipher. IACR Cryptol. ePrint Arch. 2005: 292 (2005) - 2004
- [c1]Yan Yang, Shengqun Tang, Wentao Zhang, Lina Fang:
A Workflow Language for Grid Services in OGSI-Based Grids. GCC 2004: 65-72 - [i1]Wenling Wu, Wentao Zhang, Dongdai Lin:
Security on Generalized Feistel Scheme with SP Round Function. IACR Cryptol. ePrint Arch. 2004: 337 (2004)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2021-02-26 23:08 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint