Name
Affiliation
Papers
ZHIMING ZHENG
Beihang University, Beijing, China
38
Collaborators
Citations 
PageRank 
98
128
16.80
Referers 
Referees 
References 
313
659
326
Search Limit
100659
Title
Citations
PageRank
Year
Local-Forest Method for Superspreaders Identification in Online Social Networks00.342022
Scattered Points Interpolation with Globally Smooth B-Spline Surface using Iterative Knot Insertion00.342022
Magnifying Side-Channel Leakage of Lattice-Based Cryptosystems With Chosen Ciphertexts: The Case Study of Kyber00.342022
A Physical Process Driven Digital Terrain Model Generating Method Based On D-Nurbs00.342020
A fast T-spline fitting method based on efficient region segmentation00.342020
Scalable Interpretable Learning for Multi-Response Error-in-Variables Regression00.342020
Identity-Based Proxy Signature Over Ntru Lattice00.342019
Core Influence Mechanism on Vertex-Cover Problem through Leaf-Removal-Core Breaking.00.342018
Infectivity Enhances Prediction Of Viral Cascades In Twitter00.342018
High symbol-rate polarization interference cancelation for satellite-to-ground remote sensing data transmission system00.342018
An Efficient Lattice-Based Proxy Signature with Message Recovery.00.342017
Bvdt: A Boosted Vector Decision Tree Algorithm For Multi-Class Classification Problems00.342017
An Efficient Chaotic Image Encryption Algorithm Based on Self-adaptive Model and Feedback Mechanism.10.372017
Research on Centralities Based on von Neumann Entropy for Nodes and Motifs.00.342017
TRIP: A Tussle-Resistant Internet Pricing Mechanism00.342017
Tumbler: Adaptable link access in the bots-infested Internet.20.402016
Collusion-resilient broadcast encryption based on dual-evolving one-way function trees.10.362016
DRDP: A DDoS-Resilient Data Pricing Mechanism.00.342016
Construction of Boolean functions with excellent cryptographic criteria using bivariate polynomial representation30.382016
A Secure Authentication and Key Agreement Protocol for Telecare Medicine Information System10.342015
Fast LMNN Algorithm through Random Sampling.00.342015
Identification of highly susceptible individuals in complex networks.00.342015
Exploring The Complex Pattern Of Information Spreading In Online Blog Communities60.502015
Research on Solution Space of Bipartite Graph Vertex-Cover by Maximum Matchings00.342015
Detecting The Influence Of Spreading In Social Networks With Excitable Sensor Networks20.382015
Contagion processes on the static and activity driven coupling networks10.362015
Searching For Superspreaders Of Information In Real-World Social Media591.942014
Statistics and algorithms on the organization and quantitative analysis of minimal vertex covers.00.342014
Discovering polynomial Lyapunov functions for continuous dynamical systems90.532013
Optimized statistical analysis of software trustworthiness attributes30.392012
Algebraic analysis on asymptotic stability of continuous dynamical systems60.842011
Threshold behaviors of a random constraint satisfaction problem with exact phase transitions30.382011
Condition number based complexity estimate for solving polynomial systems40.452011
Complexity of software trustworthiness and its dynamical statistical analysis methods.80.582009
Finite-time disturbance attenuation of nonlinear systems.60.622009
Dynamical characteristics of software trustworthiness and their evolutionary complexity.120.862009
Cross-Correlation Properties of Cyclotomic Sequences10.362009
On the Scaling Window of Model RB00.342008