Chunzhi Wang

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2024
Applying Delta Compression to Packed Datasets for Efficient Data Reduction.
IEEE Trans. Computers, January, 2024

Chunk2vec: A novel resemblance detection scheme based on Sentence-BERT for post-deduplication delta compression in network transmission.
IET Commun., January, 2024

LocMix: local saliency-based data augmentation for image classification.
Signal Image Video Process., 2024

2023
Hierarchical multiples self-attention mechanism for multi-modal analysis.
Multim. Syst., December, 2023

Dynamic activation and enhanced image contour features for object detection.
Connect. Sci., December, 2023

Deep Semantic Understanding and Sequence Relevance Learning for Question Routing in Community Question Answering.
Inf. Technol. Control., September, 2023

Disentangled Dynamic Deviation Transformer Networks for Multivariate Time Series Anomaly Detection.
Sensors, February, 2023

A Optimized BERT for Multimodal Sentiment Analysis.
ACM Trans. Multim. Comput. Commun. Appl., 2023

Lightweight object detection model fused with feature pyramid.
Multim. Tools Appl., 2023

Self-Adaptive Facial Expression Recognition Based on Local Feature Augmentation and Global Information Correlation.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2023

An Adaptive Detection and Recognition Method for Traffic Sign Based on Multi-Scale Attention.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2023

2022
Hybrid neural networks based facial expression recognition for smart city.
Multim. Tools Appl., 2022

A cost-efficient resemblance detection scheme for post-deduplication delta compression in backup systems.
Concurr. Comput. Pract. Exp., 2022

A modified hybrid rice optimization algorithm for solving 0-1 knapsack problem.
Appl. Intell., 2022

Ghost-YOLOX: A Lightweight and Efficient Implementation of Object Detection Model.
Proceedings of the 26th International Conference on Pattern Recognition, 2022

Facial Expression Image Classification Based on Multi-scale Feature Fusion Residual Network.
Proceedings of the Computer Science and Education - 17th International Conference, 2022

2021
Enhanced network optimized generative adversarial network for image enhancement.
Multim. Tools Appl., 2021

Image classification based on principal component analysis optimized generative adversarial networks.
Multim. Tools Appl., 2021

An image denoising method based on BP neural network optimized by improved whale optimization algorithm.
EURASIP J. Wirel. Commun. Netw., 2021

Bilevel Multi-Objective Gray Wolf Algorithm Based on Packet Transport Network Optimization.
IEEE Access, 2021

Research on Face Detection and Face Attribute Recognition based on Deep Learning.
Proceedings of the 2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2021

Improved Seagull Optimization Algorithm to Optimize Neural Networks with Gated Recurrent Units for Network Intrusion Detection.
Proceedings of the 2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2021

Multi-objective Optimization Algorithm based on PTN Network Index System.
Proceedings of the 2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2021

A Method to Optimize the PTN Ring Formation Rate by Calculating the Accounting Income of Network Elements.
Proceedings of the 2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2021

Facial Expression Recognition Based on Hybrid Attention Mechanism.
Proceedings of the 16th International Conference on Computer Science & Education, 2021

Fusion Shuffle Light Detector.
Proceedings of the 16th International Conference on Computer Science & Education, 2021

Study on Dynamic Equilibrium Factor based on Gauss-Cauchy Distribution in Artificial Bee Colony Algorithm.
Proceedings of the 16th International Conference on Computer Science & Education, 2021

Network Traffic Prediction based on Seq2seq Model.
Proceedings of the 16th International Conference on Computer Science & Education, 2021

An Indoor Localization Method Based on Cauchy Inverse Whale Optimization Algorithm.
Proceedings of the 16th International Conference on Computer Science & Education, 2021

Research of Network Traffic Classification Based on Ensemble Learning.
Proceedings of the 16th International Conference on Computer Science & Education, 2021

Research on a Service-oriented Dynamic Adaptive Software Architecture.
Proceedings of the 16th International Conference on Computer Science & Education, 2021

A High-performance Post-deduplication Delta Compression Scheme for Packed Datasets.
Proceedings of the 39th IEEE International Conference on Computer Design, 2021

Deep Learning Analysis Models for Speech and Emotional Recognition.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2021

2020
Improving Restore Performance for In-Line Backup System Combining Deduplication and Delta Compression.
IEEE Trans. Parallel Distributed Syst., 2020

Improving Restore Performance of Packed Datasets in Deduplication Systems via Reducing Persistent Fragmented Chunks.
IEEE Trans. Parallel Distributed Syst., 2020

A New Approach for Missing Data Imputation in Big Data Interface.
Inf. Technol. Control., 2020

Association rules mining in parallel conditional tree based on grid computing inspired partition algorithm.
Int. J. Web Grid Serv., 2020

Elective future: The influence factor mining of students' graduation development based on hierarchical attention neural network model with graph.
Appl. Intell., 2020

HHA: An Attentive Prediction Model for Academic Abnormality.
IEEE Access, 2020

An optimization Algorithm for the Same Primary and Backup Routing of Label Switching Path Based on KSP in PTN.
Proceedings of the 2020 IEEE 5th International Symposium on Smart and Wireless Systems within the Conferences on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS-SWS), 2020

Image Classification Based on Principal Component Analysis optimized Generative Adversarial Networks.
Proceedings of the 2020 IEEE 5th International Symposium on Smart and Wireless Systems within the Conferences on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS-SWS), 2020

Prediction of Crime Hotspots based on Spatial Factors of Random Forest.
Proceedings of the 15th International Conference on Computer Science & Education, 2020

The Parallelization and Optimization of K-means Algorithm Based on Spark.
Proceedings of the 15th International Conference on Computer Science & Education, 2020

Design of Video Cloud Networking Scheme in expressway.
Proceedings of the 15th International Conference on Computer Science & Education, 2020

Design of temporary vehicle parking management system of residential area based on credit system.
Proceedings of the 15th International Conference on Computer Science & Education, 2020

Facial Expression Recognition Based on Sparse Autoencoder and Shallow Convolutional Neural Network.
Proceedings of the 15th International Conference on Computer Science & Education, 2020

2019
Deep linear discriminant analysis hashing for image retrieval.
Multim. Tools Appl., 2019

SSSER: Spatiotemporal Sequential and Social Embedding Rank for Successive Point-of-Interest Recommendation.
IEEE Access, 2019

Machine Learning Based Medicine Distribution System.
Proceedings of the 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2019

Financial Early Warning of Listed Companies Based on Fireworks Algorithm Optimized Back-Propagation Neural Network.
Proceedings of the 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2019

Image Classification Based on BP Neural Network and Sine Cosine Algorithm.
Proceedings of the 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2019

Emotional Text Analysis Based on Ensemble Learning of Three Different Classification Algorithms.
Proceedings of the 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2019

Research on the Application of Medical Big Data.
Proceedings of the 14th International Conference on Computer Science & Education, 2019

A Method of Collecting Four Character Medicine Effect Phrases in TCM Patents Based on Semi-supervised Learning.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2019

2018
A Semi-Automatic Annotation Method of Effect Clue Words for Chinese Patents Based on Co-Training.
Int. J. Data Warehous. Min., 2018

STSCR: Exploring spatial-temporal sequential influence and social information for location recommendation.
Neurocomputing, 2018

Security Situation Prediction based on Hybrid Rice Optimization Algorithm and Back Propagation Neural Network.
Proceedings of the 2018 IEEE 4th International Symposium on Wireless Systems within the International Conferences on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS-SWS), 2018

Image retrieval based on fireworks algorithm optimizing convolutional neural network.
Proceedings of the 2018 IEEE 4th International Symposium on Wireless Systems within the International Conferences on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS-SWS), 2018

Research on Network Intrusion Detection Based on Support Vector Machine Optimized with Pigeon-inspired Optimization Algorithm.
Proceedings of the 2018 IEEE 4th International Symposium on Wireless Systems within the International Conferences on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS-SWS), 2018

A Network Intrusion Detection Method Based on Hybrid Rice Optimization Algorithm Improved Fuzzy C-Means.
Proceedings of the 2018 IEEE 4th International Symposium on Wireless Systems within the International Conferences on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS-SWS), 2018

A Feature Selection Approach for Network Intrusion Detection Based on Tree-Seed Algorithm and K-Nearest Neighbor.
Proceedings of the 2018 IEEE 4th International Symposium on Wireless Systems within the International Conferences on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS-SWS), 2018

Research on Pricing Model of Offline Crowdsourcing Based on Dynamic Quota.
Proceedings of the Data Science, 2018

High Precision Self-learning Hashing for Image Retrieval.
Proceedings of the Data Science, 2018

Privacy Preserving for Big Data Based on Fuzzy Set.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
面向大数据的多维粒矩阵关联分析及应用 (Multiple Correlation Analysis and Application of Granular Matrix Based on Big Data).
计算机科学, 2017

Improved K-means algorithm based on hybrid rice optimization algorithm.
Proceedings of the 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2017

The Construction Method of Clue Words Thesaurus in Chinese Patents Based on Iteration and Self-filtering.
Proceedings of the Advances in Internetworking, 2017

PaEffExtr: A Method to Extract Effect Statements Automatically from Patents.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2017

2016
Feature aggregating hashing for image copy detection.
World Wide Web, 2016

Applying extension Logic to E-learning on Internet of Things engineeringl major.
Proceedings of the 11th International Conference on Computer Science & Education, 2016

Quantitative assessment model based on demands path allocation in SDN.
Proceedings of the 11th International Conference on Computer Science & Education, 2016

A P2P traffic identification approach based on the optimal support vector machine and genetic algorithm.
Proceedings of the 11th International Conference on Computer Science & Education, 2016

Evacuation Behaviors and Link Selection Strategy Based on Artificial Fish Swarm Algorithm.
Proceedings of the 7th International Conference on Cloud Computing and Big Data, 2016

An ACO-based Link Load-Balancing Algorithm in SDN.
Proceedings of the 7th International Conference on Cloud Computing and Big Data, 2016

Energy Saving of Elevator Group under Up-Peak Flow Based on Geese-PSO.
Proceedings of the 7th International Conference on Cloud Computing and Big Data, 2016

2015
基于混沌粒子群算法和小波SVM的P2P流量识别方法 (Peer-to-Peer Traffic identification Method Based on Chaos Particle Swarm Algorithm and Wavelet SVM).
计算机科学, 2015

New Authentication Scheme for Wireless Body Area Networks Using the Bilinear Pairing.
J. Medical Syst., 2015

A peer to peer traffic identification method based on wavelet and particle swarm optimization algorithm.
Int. J. Wavelets Multiresolution Inf. Process., 2015

Notes on Proxy Signcryption and Multi-proxy Signature Schemes.
Int. J. Netw. Secur., 2015

Feature Fusion based Hashing for Large Scale Image Copy Detection.
Int. J. Comput. Intell. Syst., 2015

Functional Encryption Resilient to Hard-to-Invert Leakage.
Comput. J., 2015

Applying Bayesian Trust Sampling to P2P Traffic Inspection.
Control. Intell. Syst., 2015

A peer to peer traffic identification method based on support vector machine and artificial bee colony algorithm.
Proceedings of the IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2015

2014
LR-FEAD: leakage-tolerating and attribute-hiding functional encryption mechanism with delegation in affine subspaces.
J. Supercomput., 2014

Unbounded anonymous hierarchical IBE with continual-key-leakage tolerance.
Secur. Commun. Networks, 2014

A P2P Traffic Management Model Based on an ISP Game.
J. Comput., 2014

CCLAS: A Practical and Compact Certificateless Aggregate Signature with Share Extraction.
Int. J. Netw. Secur., 2014

Comments on FHH Anonymous Multireceiver Encryption.
Int. J. Netw. Secur., 2014

Fully secure constructions of spatial encryption with vector privacy.
Int. J. Commun. Syst., 2014

A LRU-Based Query Algorithm for Gnutella Networks.
Control. Intell. Syst., 2014

A Bayesian trust sampling method for P2P traffic inspection.
Proceedings of the Proceedings IEEE International Conference on Security, 2014

P2P Traffic Identification Using Support Vector Machine and Cuckoo Search Algorithm Combined with Particle Swarm Optimization Algorithm.
Proceedings of the Frontiers in Internet Technologies, 2014

2013
LEACH-G: an Optimal Cluster-heads Selection Algorithm based on LEACH.
J. Softw., 2013

Automated Trust Negotiation Model based on Dynamic Game of Incomplete Information.
J. Softw., 2013

Public Key Replacement and Universal Forgery of a SCLS Scheme.
Int. J. Netw. Secur., 2013

Leakage-resilient Attribute-based Encryptions with Fast Decryption: Model, Analysis and Construction.
IACR Cryptol. ePrint Arch., 2013

Leakage-Resilient Attribute-Based Encryption with Fast Decryption: Models, Analysis and Constructions.
Proceedings of the Information Security Practice and Experience, 2013

2012
Two Constructions of Multireceiver Encryption Supporting Constant Keys, Short Ciphertexts, and Identity Privacy.
Int. J. Netw. Secur., 2012

2010
A Peer-to-Peer Game Model using Punishment Strategies.
J. Networks, 2010

A SVM Method for P2P Traffic Identification based on Multiple Traffic Mode.
J. Networks, 2010

Illumination invariant face recognition based on the new phase features.
Proceedings of the IEEE International Conference on Systems, 2010

2008
A Delineation Algorithm for Particle Images Online.
Proceedings of the Modelling, 2008

2003
Research and Design of Remote Education System Based on CSCW.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003


  Loading...