Dan Zhu

According to our database1, Dan Zhu authored at least 61 papers between 1997 and 2019.

Collaborative distances:



In proceedings 
PhD thesis 


On csauthors.net:


Influencing factors analysis and modeling of hospital-acquired infection in elderly patients.
J. Comb. Optim., 2019

Trustworthy and profit: A new value-based neighbor selection method in recommender systems under shilling attacks.
Decision Support Systems, 2019

Multigrid Backprojection Super-Resolution and Deep Filter Visualization.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

Artsy-GAN: A style transfer system with improved quality, diversity and performance.
Proceedings of the 24th International Conference on Pattern Recognition, 2018

Achieve Efficient and Privacy-Preserving Medical Primary Diagnosis Based on kNN.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

Multi-scale Recursive and Perception-Distortion Controllable Image Super-Resolution.
Proceedings of the Computer Vision - ECCV 2018 Workshops, 2018

Deep Networks for Image-to-Image Translation with Mux and Demux Layers.
Proceedings of the Computer Vision - ECCV 2018 Workshops, 2018

Skull Optical Clearing Solution for Enhancing Ultrasonic and Photoacoustic Imaging.
IEEE Trans. Med. Imaging, 2016

Automatic Time Picking for Microseismic Data Based on a Fuzzy C-Means Clustering Algorithm.
IEEE Geosci. Remote Sensing Lett., 2016

An exact method for the sensitivity analysis of systems simulated by rejection techniques.
European Journal of Operational Research, 2016

Reputation in an open source software community: Antecedents and impacts.
Decision Support Systems, 2016

Linearized phase-modulated analog photonic link based on optical carrier band processing.
Proceedings of the 25th Wireless and Optical Communication Conference, 2016

3/4G multi-system of indoor coverage problems location analysis and application.
Proceedings of the 16th International Symposium on Communications and Information Technologies, 2016

Using LAU information in mobile communication for high-speed user selection.
Proceedings of the 16th International Symposium on Communications and Information Technologies, 2016

Airport Target Detection in Remote Sensing Images: A New Method Based on Two-Way Saliency.
IEEE Geosci. Remote Sensing Lett., 2015

Rating Fraud Detection - Towards Designing a Trustworthy Reputation Systems.
Proceedings of the International Conference on Information Systems, 2015

Do You Need to Pay For Online Community: A Comparison Study.
Proceedings of the 21st Americas Conference on Information Systems, 2015

An Evidence-Based Analysis for Liver Transplants: Insights for Organ Allocation Policy.
Proceedings of the 21st Americas Conference on Information Systems, 2015

A compact UHF bandpass filter with high stopband rejection based on multilayer LTCC technology.
Proceedings of the 2014 International Symposium on Wireless Personal Multimedia Communications, 2014

Measuring Similarity Based on Link Information: A Comparative Study.
IEEE Trans. Knowl. Data Eng., 2013

The Ornstein-Uhlenbeck-Type Model with a Hybrid Dividend Strategy.
J. Applied Mathematics, 2013

An integrated e-service model for electronic medical records.
Inf. Syst. E-Business Management, 2013

A new pruning method for resolving conflicts in actionable behavioral rules.
Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics, 2013

A Theoretical Exploration for Supply Chain Leagility Capability.
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013

Terrain simplification from grid DEMs based on spatial autocorrelation.
Proceedings of the 21st International Conference on Geoinformatics, 2013

Application specified soft error failure rate analysis using sequential equivalence checking techniques.
Proceedings of the 18th Asia and South Pacific Design Automation Conference, 2013

Understanding Factors Influencing Users' Retweeting Behavior - A Theoretical Perspective.
Proceedings of the 19th Americas Conference on Information Systems, 2013

Two New Prediction-Driven Approaches to Discrete Choice Prediction.
ACM Trans. Management Inf. Syst., 2012

A New Approach to Testing Nomological Validity and Its Application to a Second-Order Measurement Model of Trust.
J. AIS, 2012

Shilling Attack Detection - A New Approach for a Trustworthy Recommender System.
INFORMS Journal on Computing, 2012

Combining Spatial Cloaking and Dummy Generation for Location Privacy Preserving.
Proceedings of the Advanced Data Mining and Applications, 8th International Conference, 2012

When Costs Are Unequal and Unknown: A Subtree Grafting Approach for Unbalanced Data Classification.
Decision Sciences, 2011

Object technology software selection: a case study.
Annals OR, 2011

Mining Search Subtopics from Query Logs.
Proceedings of the 9th NTCIR Workshop Meeting on Evaluation of Information Access Technologies: Information Retrieval, 2011

NSCT based road extraction from remote sensing image using directional prior.
Proceedings of the 2011 IEEE International Geoscience and Remote Sensing Symposium, 2011

The effect of spinning missile on the position calculating of the reticle infrared detecting system.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011

A hybrid approach for efficient ensembles.
Decision Support Systems, 2010

An Approximate Soft Error Reliability Sorting Approach Based on State Analysis of Sequential Circuits.
Proceedings of the 25th IEEE International Symposium on Defect and Fault Tolerance in VLSI Systems, 2010

On Soft Error Immunity of Sequential Circuits.
Proceedings of the 19th IEEE Asian Test Symposium, 2010

Analytical Competition for Managing Customer Relations.
Proceedings of the Encyclopedia of Data Warehousing and Mining, Second Edition (4 Volumes), 2009

Identity disclosure protection: A data reconstruction approach for privacy-preserving data mining.
Decision Support Systems, 2009

Cell affinity of PHBV thin films evaluated by a parallel plate flow chamber.
Proceedings of the 4th IEEE International Conference on Nano/Micro Engineered and Molecular Systems, 2009

Time-line based model for software project scheduling with genetic algorithms.
Information & Software Technology, 2008

A Comparison and Scenario Analysis of Leading Data Mining Software.
IJKM, 2008

2D Decomposition Sequential Equivalence Checking of System Level and RTL Descriptions.
Proceedings of the 9th International Symposium on Quality of Electronic Design (ISQED 2008), 2008

Diminishing downsides of Data Mining.
IJBIDM, 2007

Identity Disclosure Protection: A Data Reconstruction Approach for Preserving Privacy in Data Mining.
Proceedings of the International Conference on Information Systems, 2007

Outsourcing Resource Selection: A Rough Set Approach.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

A foundational study on the applicability of genetic algorithm to software engineering problems.
Proceedings of the IEEE Congress on Evolutionary Computation, 2007

Knowledge integration using problem spaces: A study in resource-constrained project scheduling.
J. Scheduling, 2006

Organizational Memory Management: Technological and Research Issues.
J. Database Manag., 2006

Predicting Airline Choices: A Decision Support Perspective and Alternative Approaches.
Proceedings of the International Conference on Information Systems, 2006

Applying Constraint Logic Programming to Predicate Abstraction of RTL Verilog Descriptions.
Proceedings of the MICAI 2005: Advances in Artificial Intelligence, 2005

MA2TG: A Functional Test Program Generator for Microprocessor Verification.
Proceedings of the Eighth Euromicro Symposium on Digital Systems Design (DSD 2005), 30 August, 2005

Automatic functional test program generation for microprocessor verification.
Proceedings of the 2005 Conference on Asia South Pacific Design Automation, 2005

Edition Security Control in Inter-bank Fund Transfer.
J. Electron. Commerce Res., 2002

Intelligent Architectures for Knowledge Sharing: A Soar Example and General Issues.
Proceedings of the Fifteenth International Florida Artificial Intelligence Research Society Conference, 2002

Data Mining for Network Intrusion Detection: A Comparison of Alternative Methods.
Decision Sciences, 2001

When Processes Learn: Steps Toward Crafting an Intelligent Organization.
Information Systems Research, 1997

Connectionist approaches for solver selection in constrained project scheduling.
Annals OR, 1997