Chunzhi Wang

According to our database1, Chunzhi Wang authored at least 54 papers between 2003 and 2020.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Improving Restore Performance for In-Line Backup System Combining Deduplication and Delta Compression.
IEEE Trans. Parallel Distrib. Syst., 2020

Improving Restore Performance of Packed Datasets in Deduplication Systems via Reducing Persistent Fragmented Chunks.
IEEE Trans. Parallel Distrib. Syst., 2020

Elective future: The influence factor mining of students' graduation development based on hierarchical attention neural network model with graph.
Appl. Intell., 2020

HHA: An Attentive Prediction Model for Academic Abnormality.
IEEE Access, 2020

2019
Deep linear discriminant analysis hashing for image retrieval.
Multim. Tools Appl., 2019

SSSER: Spatiotemporal Sequential and Social Embedding Rank for Successive Point-of-Interest Recommendation.
IEEE Access, 2019

Machine Learning Based Medicine Distribution System.
Proceedings of the 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2019

Financial Early Warning of Listed Companies Based on Fireworks Algorithm Optimized Back-Propagation Neural Network.
Proceedings of the 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2019

Image Classification Based on BP Neural Network and Sine Cosine Algorithm.
Proceedings of the 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2019

Emotional Text Analysis Based on Ensemble Learning of Three Different Classification Algorithms.
Proceedings of the 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2019

Research on the Application of Medical Big Data.
Proceedings of the 14th International Conference on Computer Science & Education, 2019

A Method of Collecting Four Character Medicine Effect Phrases in TCM Patents Based on Semi-supervised Learning.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2019

2018
A Semi-Automatic Annotation Method of Effect Clue Words for Chinese Patents Based on Co-Training.
Int. J. Data Warehous. Min., 2018

STSCR: Exploring spatial-temporal sequential influence and social information for location recommendation.
Neurocomputing, 2018

Privacy Preserving for Big Data Based on Fuzzy Set.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
面向大数据的多维粒矩阵关联分析及应用 (Multiple Correlation Analysis and Application of Granular Matrix Based on Big Data).
计算机科学, 2017

Improved K-means algorithm based on hybrid rice optimization algorithm.
Proceedings of the 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2017

The Construction Method of Clue Words Thesaurus in Chinese Patents Based on Iteration and Self-filtering.
Proceedings of the Advances in Internetworking, 2017

PaEffExtr: A Method to Extract Effect Statements Automatically from Patents.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2017

2016
Feature aggregating hashing for image copy detection.
World Wide Web, 2016

Applying extension Logic to E-learning on Internet of Things engineeringl major.
Proceedings of the 11th International Conference on Computer Science & Education, 2016

Quantitative assessment model based on demands path allocation in SDN.
Proceedings of the 11th International Conference on Computer Science & Education, 2016

A P2P traffic identification approach based on the optimal support vector machine and genetic algorithm.
Proceedings of the 11th International Conference on Computer Science & Education, 2016

Evacuation Behaviors and Link Selection Strategy Based on Artificial Fish Swarm Algorithm.
Proceedings of the 7th International Conference on Cloud Computing and Big Data, 2016

An ACO-based Link Load-Balancing Algorithm in SDN.
Proceedings of the 7th International Conference on Cloud Computing and Big Data, 2016

Energy Saving of Elevator Group under Up-Peak Flow Based on Geese-PSO.
Proceedings of the 7th International Conference on Cloud Computing and Big Data, 2016

2015
基于混沌粒子群算法和小波SVM的P2P流量识别方法 (Peer-to-Peer Traffic identification Method Based on Chaos Particle Swarm Algorithm and Wavelet SVM).
计算机科学, 2015

New Authentication Scheme for Wireless Body Area Networks Using the Bilinear Pairing.
J. Medical Syst., 2015

A peer to peer traffic identification method based on wavelet and particle swarm optimization algorithm.
Int. J. Wavelets Multiresolution Inf. Process., 2015

Notes on Proxy Signcryption and Multi-proxy Signature Schemes.
Int. J. Netw. Secur., 2015

Feature Fusion based Hashing for Large Scale Image Copy Detection.
Int. J. Comput. Intell. Syst., 2015

Functional Encryption Resilient to Hard-to-Invert Leakage.
Comput. J., 2015

Applying Bayesian Trust Sampling to P2P Traffic Inspection.
Control. Intell. Syst., 2015

A peer to peer traffic identification method based on support vector machine and artificial bee colony algorithm.
Proceedings of the IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2015

2014
LR-FEAD: leakage-tolerating and attribute-hiding functional encryption mechanism with delegation in affine subspaces.
J. Supercomput., 2014

Unbounded anonymous hierarchical IBE with continual-key-leakage tolerance.
Secur. Commun. Networks, 2014

A P2P Traffic Management Model Based on an ISP Game.
J. Comput., 2014

CCLAS: A Practical and Compact Certificateless Aggregate Signature with Share Extraction.
Int. J. Netw. Secur., 2014

Comments on FHH Anonymous Multireceiver Encryption.
Int. J. Netw. Secur., 2014

Fully secure constructions of spatial encryption with vector privacy.
Int. J. Commun. Syst., 2014

A LRU-Based Query Algorithm for Gnutella Networks.
Control. Intell. Syst., 2014

A Bayesian trust sampling method for P2P traffic inspection.
Proceedings of the Proceedings IEEE International Conference on Security, 2014

P2P Traffic Identification Using Support Vector Machine and Cuckoo Search Algorithm Combined with Particle Swarm Optimization Algorithm.
Proceedings of the Frontiers in Internet Technologies, 2014

2013
LEACH-G: an Optimal Cluster-heads Selection Algorithm based on LEACH.
J. Softw., 2013

Automated Trust Negotiation Model based on Dynamic Game of Incomplete Information.
J. Softw., 2013

Public Key Replacement and Universal Forgery of a SCLS Scheme.
Int. J. Netw. Secur., 2013

Leakage-resilient Attribute-based Encryptions with Fast Decryption: Model, Analysis and Construction.
IACR Cryptol. ePrint Arch., 2013

Leakage-Resilient Attribute-Based Encryption with Fast Decryption: Models, Analysis and Constructions.
Proceedings of the Information Security Practice and Experience, 2013

2012
Two Constructions of Multireceiver Encryption Supporting Constant Keys, Short Ciphertexts, and Identity Privacy.
Int. J. Netw. Secur., 2012

2010
A Peer-to-Peer Game Model using Punishment Strategies.
J. Networks, 2010

A SVM Method for P2P Traffic Identification based on Multiple Traffic Mode.
J. Networks, 2010

Illumination invariant face recognition based on the new phase features.
Proceedings of the IEEE International Conference on Systems, 2010

2008
A Delineation Algorithm for Particle Images Online.
Proceedings of the Modelling, 2008

2003
Research and Design of Remote Education System Based on CSCW.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003


  Loading...