Liu, L. ., Lin, X. ., Zhang, P. ., Zhang, L. ., & Wang, B. . (2022). Learning Common Dependency Structure for Unsupervised Cross-Domain Ner. In (pp. 8347–8351). http://doi.org/10.1109/ICASSP43922.2022.9747433 (Original work published 2024)
First name
Lei
Last name
Zhang
Wang, J. ., Xu, H. ., Xiao, C. ., Zhang, L. ., & Zheng, Y. . (2022). Research and Implementation of Rowhammer Attack Method based on Domestic NeoKylin Operating System. In (pp. 663–668). Qingdao, China: IEEE. http://doi.org/10.1109/ICFTIC57696.2022.10075104 (Original work published 2024)
Chen, G. ., Chen, G. ., Wu, D. ., Liu, Q. ., & Zhang, L. . (2022). A Crawler-based Digital Forensics Method Oriented to Illegal Website. In (Vol. 5, p. 1883—1887). http://doi.org/10.1109/IMCEC55388.2022.10020069 (Original work published 2024)
Han, W. ., Zhang, R. ., Zhang, L. ., & Wang, L. . (2022). A Secure and Receiver-Unrestricted Group Key Management Scheme for Mobile Ad-hoc Networks. In 2022 IEEE Wireless Communications and Networking Conference (WCNC) (p. 986—991).
Zhang, J. ., Li, B. ., Xu, J. ., Wu, S. ., Ding, S. ., Zhang, L. ., & Wu, C. . (2022). Towards Efficient Data Free Blackbox Adversarial Attack. In 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (pp. 15094–15104).
Zhang, L. ., Zhou, J. ., Ma, Y. ., & Shen, L. . (2022). Sequential Topology Attack of Supply Chain Networks Based on Reinforcement Learning. In 2022 International Conference on Cyber-Physical Social Intelligence (ICCSI) (pp. 744–749).
Wang, B. ., Wu, Y. ., Guo, N. ., Zhang, L. ., & Liu, C. . (2022). A cross-layer attack path detection method for smart grid dynamics. In 2022 5th International Conference on Advanced Electronic Materials, Computers and Software Engineering (AEMCSE) (p. 142—146).
Liu, L. ., Lin, X. ., Zhang, P. ., Zhang, L. ., & Wang, B. . (2022). Learning Common Dependency Structure for Unsupervised Cross-Domain Ner. In ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) (p. 8347—8351).