Dan Zhu

According to our database1, Dan Zhu authored at least 79 papers between 1997 and 2020.

Collaborative distances:



In proceedings 
PhD thesis 


On csauthors.net:


CREDO: Efficient and privacy-preserving multi-level medical pre-diagnosis based on ML-<i>kNN</i>.
Inf. Sci., 2020

Cost-sensitive multiple-instance learning method with dynamic transactional data for personal credit scoring.
Expert Syst. Appl., 2020

Who Can We Trust: A New Approach for Fraudulent Rater Detection in Reputation Systems.
Decis. Sci., 2020

Influencing factors analysis and modeling of hospital-acquired infection in elderly patients.
J. Comb. Optim., 2019

Trustworthy and profit: A new value-based neighbor selection method in recommender systems under shilling attacks.
Decis. Support Syst., 2019

Fast non-convex low-rank matrix decomposition for separation of potential field data using minimal memory.
CoRR, 2019

Microwave Photonic Channelizer Based on Polarization Multiplexing and Photonic Dual Output Image Reject Mixer.
IEEE Access, 2019

High-Precision Optical Time Delay Measurement Based on Carrier-Suppressed Optical Double-Sideband Modulation.
Proceedings of the 2019 24th OptoElectronics and Communications Conference (OECC) and 2019 International Conference on Photonics in Switching and Computing (PSC), 2019

Fast Image Enhancement Based on Maximum and Guided Filters.
Proceedings of the 2019 IEEE International Conference on Image Processing, 2019

MGBPv2: Scaling Up Multi-Grid Back-Projection Networks.
Proceedings of the 2019 IEEE/CVF International Conference on Computer Vision Workshops, 2019

Multigrid Backprojection Super-Resolution and Deep Filter Visualization.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

Provably Secure and Password-Authenticated Hybrid Key Agreement Protocol in Two-realm with Privacy-Protection.
J. Inf. Hiding Multim. Signal Process., 2018

A Novel Two-party Password-Authenticated Key Retrieval Scheme.
J. Inf. Hiding Multim. Signal Process., 2018

Artsy-GAN: A style transfer system with improved quality, diversity and performance.
Proceedings of the 24th International Conference on Pattern Recognition, 2018

Achieve Efficient and Privacy-Preserving Medical Primary Diagnosis Based on kNN.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

Multi-scale Recursive and Perception-Distortion Controllable Image Super-Resolution.
Proceedings of the Computer Vision - ECCV 2018 Workshops, 2018

Deep Networks for Image-to-Image Translation with Mux and Demux Layers.
Proceedings of the Computer Vision - ECCV 2018 Workshops, 2018

Skull Optical Clearing Solution for Enhancing Ultrasonic and Photoacoustic Imaging.
IEEE Trans. Medical Imaging, 2016

Automatic Time Picking for Microseismic Data Based on a Fuzzy C-Means Clustering Algorithm.
IEEE Geosci. Remote. Sens. Lett., 2016

云环境下基于代数签名持有性审计的大数据安全存储方案 (Big Data Storage Security Scheme Based on Algebraic Signature Possession Audit in Cloud Environment).
计算机科学, 2016

A Novel On-Demand Password Scheme Based on BAN Logic.
J. Inf. Hiding Multim. Signal Process., 2016

A Multi-server Authenticated Key Agreement Protocol with Privacy preserving Based on Chaotic Maps in Random Oracle Model.
J. Inf. Hiding Multim. Signal Process., 2016

An exact method for the sensitivity analysis of systems simulated by rejection techniques.
Eur. J. Oper. Res., 2016

Reputation in an open source software community: Antecedents and impacts.
Decis. Support Syst., 2016

Linearized phase-modulated analog photonic link based on optical carrier band processing.
Proceedings of the 25th Wireless and Optical Communication Conference, 2016

3/4G multi-system of indoor coverage problems location analysis and application.
Proceedings of the 16th International Symposium on Communications and Information Technologies, 2016

Using LAU information in mobile communication for high-speed user selection.
Proceedings of the 16th International Symposium on Communications and Information Technologies, 2016

Airport Target Detection in Remote Sensing Images: A New Method Based on Two-Way Saliency.
IEEE Geosci. Remote. Sens. Lett., 2015

Rating Fraud Detection - Towards Designing a Trustworthy Reputation Systems.
Proceedings of the International Conference on Information Systems, 2015

Do You Need to Pay For Online Community: A Comparison Study.
Proceedings of the 21st Americas Conference on Information Systems, 2015

An Evidence-Based Analysis for Liver Transplants: Insights for Organ Allocation Policy.
Proceedings of the 21st Americas Conference on Information Systems, 2015

A compact UHF bandpass filter with high stopband rejection based on multilayer LTCC technology.
Proceedings of the 2014 International Symposium on Wireless Personal Multimedia Communications, 2014

Measuring Similarity Based on Link Information: A Comparative Study.
IEEE Trans. Knowl. Data Eng., 2013

Robust and Simple N-Party Entangled Authentication Cloud Storage Protocol Based on Secret Sharing Scheme.
J. Inf. Hiding Multim. Signal Process., 2013

The Ornstein-Uhlenbeck-Type Model with a Hybrid Dividend Strategy.
J. Appl. Math., 2013

An integrated e-service model for electronic medical records.
Inf. Syst. E-Business Management, 2013

A new pruning method for resolving conflicts in actionable behavioral rules.
Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics, 2013

A Theoretical Exploration for Supply Chain Leagility Capability.
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013

Terrain simplification from grid DEMs based on spatial autocorrelation.
Proceedings of the 21st International Conference on Geoinformatics, 2013

Application specified soft error failure rate analysis using sequential equivalence checking techniques.
Proceedings of the 18th Asia and South Pacific Design Automation Conference, 2013

Understanding Factors Influencing Users' Retweeting Behavior - A Theoretical Perspective.
Proceedings of the 19th Americas Conference on Information Systems, 2013

Two New Prediction-Driven Approaches to Discrete Choice Prediction.
ACM Trans. Management Inf. Syst., 2012

A New Approach to Testing Nomological Validity and Its Application to a Second-Order Measurement Model of Trust.
J. Assoc. Inf. Syst., 2012

Shilling Attack Detection - A New Approach for a Trustworthy Recommender System.
INFORMS J. Comput., 2012

Combining Spatial Cloaking and Dummy Generation for Location Privacy Preserving.
Proceedings of the Advanced Data Mining and Applications, 8th International Conference, 2012

When Costs Are Unequal and Unknown: A Subtree Grafting Approach for Unbalanced Data Classification.
Decis. Sci., 2011

Object technology software selection: a case study.
Annals OR, 2011

Mining Search Subtopics from Query Logs.
Proceedings of the 9th NTCIR Workshop Meeting on Evaluation of Information Access Technologies: Information Retrieval, 2011

NSCT based road extraction from remote sensing image using directional prior.
Proceedings of the 2011 IEEE International Geoscience and Remote Sensing Symposium, 2011

The effect of spinning missile on the position calculating of the reticle infrared detecting system.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011

A hybrid approach for efficient ensembles.
Decis. Support Syst., 2010

An Approximate Soft Error Reliability Sorting Approach Based on State Analysis of Sequential Circuits.
Proceedings of the 25th IEEE International Symposium on Defect and Fault Tolerance in VLSI Systems, 2010

On Soft Error Immunity of Sequential Circuits.
Proceedings of the 19th IEEE Asian Test Symposium, 2010

Analytical Competition for Managing Customer Relations.
Proceedings of the Encyclopedia of Data Warehousing and Mining, Second Edition (4 Volumes), 2009

Identity disclosure protection: A data reconstruction approach for privacy-preserving data mining.
Decis. Support Syst., 2009

Cell affinity of PHBV thin films evaluated by a parallel plate flow chamber.
Proceedings of the 4th IEEE International Conference on Nano/Micro Engineered and Molecular Systems, 2009

Time-line based model for software project scheduling with genetic algorithms.
Inf. Softw. Technol., 2008

A Comparison and Scenario Analysis of Leading Data Mining Software.
Int. J. Knowl. Manag., 2008

2D Decomposition Sequential Equivalence Checking of System Level and RTL Descriptions.
Proceedings of the 9th International Symposium on Quality of Electronic Design (ISQED 2008), 2008

Diminishing downsides of Data Mining.
Int. J. Bus. Intell. Data Min., 2007

Identity Disclosure Protection: A Data Reconstruction Approach for Preserving Privacy in Data Mining.
Proceedings of the International Conference on Information Systems, 2007

Outsourcing Resource Selection: A Rough Set Approach.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

A foundational study on the applicability of genetic algorithm to software engineering problems.
Proceedings of the IEEE Congress on Evolutionary Computation, 2007

Knowledge integration using problem spaces: A study in resource-constrained project scheduling.
J. Sched., 2006

Organizational Memory Management: Technological and Research Issues.
J. Database Manag., 2006

Predicting Airline Choices: A Decision Support Perspective and Alternative Approaches.
Proceedings of the International Conference on Information Systems, 2006

Applying Constraint Logic Programming to Predicate Abstraction of RTL Verilog Descriptions.
Proceedings of the MICAI 2005: Advances in Artificial Intelligence, 2005

MA2TG: A Functional Test Program Generator for Microprocessor Verification.
Proceedings of the Eighth Euromicro Symposium on Digital Systems Design (DSD 2005), 30 August, 2005

Automatic functional test program generation for microprocessor verification.
Proceedings of the 2005 Conference on Asia South Pacific Design Automation, 2005

Edition Security Control in Inter-bank Fund Transfer.
J. Electron. Commer. Res., 2002

Intelligent Architectures for Knowledge Sharing: A Soar Example and General Issues.
Proceedings of the Fifteenth International Florida Artificial Intelligence Research Society Conference, 2002

Data Mining for Network Intrusion Detection: A Comparison of Alternative Methods.
Decis. Sci., 2001

When Processes Learn: Steps Toward Crafting an Intelligent Organization.
Inf. Syst. Res., 1997

Connectionist approaches for solver selection in constrained project scheduling.
Annals OR, 1997