Fei Zhu

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2024
Revisiting Confidence Estimation: Towards Reliable Failure Prediction.
IEEE Trans. Pattern Anal. Mach. Intell., May, 2024

Draw on advantages and avoid disadvantages by making a multi-step prediction.
Expert Syst. Appl., March, 2024

Personalized federated reinforcement learning: Balancing personalization and experience sharing via distance constraint.
Expert Syst. Appl., March, 2024

RLUC: Strengthening robustness by attaching constraint considerations to policy network.
Expert Syst. Appl., March, 2024

Taking complementary advantages: Improving exploration via double self-imitation learning in procedurally-generated environments.
Expert Syst. Appl., March, 2024

Hierarchical reinforcement learning with unlimited option scheduling for sparse rewards in continuous spaces.
Expert Syst. Appl., March, 2024

Multi-scale Unified Network for Image Classification.
CoRR, 2024

Towards Non-Exemplar Semi-Supervised Class-Incremental Learning.
CoRR, 2024

Branch-Tuning: Balancing Stability and Plasticity for Continual Self-Supervised Learning.
CoRR, 2024

Continual Forgetting for Pre-trained Vision Models.
CoRR, 2024

Active Generalized Category Discovery.
CoRR, 2024

Open-world Machine Learning: A Review and New Outlooks.
CoRR, 2024

Federated Class-Incremental Learning with Prototype Guided Transformer.
CoRR, 2024

2023
A Comprehensive Survey on Authentication and Attack Detection Schemes That Threaten It in Vehicular Ad-Hoc Networks.
IEEE Trans. Intell. Transp. Syst., December, 2023

Dynamics-aware loss for learning with label noise.
Pattern Recognit., December, 2023

Hierarchical reinforcement learning with adaptive scheduling for robot control.
Eng. Appl. Artif. Intell., November, 2023

A Security-Enhanced Certificateless Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks.
IEEE Trans. Intell. Transp. Syst., October, 2023

Addressing implicit bias in adversarial imitation learning with mutual information.
Neural Networks, October, 2023

SAPocket: Finding pockets on protein surfaces with a focus towards position and voxel channels.
Expert Syst. Appl., October, 2023

A stable actor-critic algorithm for solving robotic tasks with multiple constraints.
Frontiers Comput. Sci., August, 2023

Seek for commonalities: Shared features extraction for multi-task reinforcement learning via adversarial training.
Expert Syst. Appl., August, 2023

Imitating the oracle: Towards calibrated model for class incremental learning.
Neural Networks, July, 2023

Learning by Seeing More Classes.
IEEE Trans. Pattern Anal. Mach. Intell., June, 2023

Adversarial training with distribution normalization and margin balance.
Pattern Recognit., April, 2023

Learning fair representations for accuracy parity.
Eng. Appl. Artif. Intell., March, 2023

Similarity attention-based CNN for robust 3D medical image registration.
Biomed. Signal Process. Control., March, 2023

PPICT: an integrated deep neural network for predicting inter-protein PTM cross-talk.
Briefings Bioinform., March, 2023

Authenticated Data Sharing With Privacy Protection and Batch Verification for Healthcare IoT.
IEEE Trans. Sustain. Comput., 2023

Integrating safety constraints into adversarial training for robust deep reinforcement learning.
Inf. Sci., 2023

Training with scaled logits to alleviate class-level over-fitting in few-shot learning.
Neurocomputing, 2023

Prediction of post-translational modification cross-talk and mutation within proteins via imbalanced learning.
Expert Syst. Appl., 2023

Class Incremental Learning with Self-Supervised Pre-Training and Prototype Learning.
CoRR, 2023

Towards Trustworthy Dataset Distillation.
CoRR, 2023

Nonlinear Hyperspectral Unmixing based on Multilinear Mixing Model using Convolutional Autoencoders.
CoRR, 2023

Average of Pruning: Improving Performance and Stability of Out-of-Distribution Detection.
CoRR, 2023

FluidPlaying: Efficient Adaptive Simulation for Highly Dynamic Fluid.
Proceedings of the IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops, 2023

PTLVD:Program Slicing and Transformer-based Line-level Vulnerability Detection System.
Proceedings of the 23rd IEEE International Working Conference on Source Code Analysis and Manipulation, 2023

Targeted Transferable Attack against Deep Hashing Retrieval.
Proceedings of the ACM Multimedia Asia 2023, 2023

Cooperative Target-Surrounding Control of Unmanned Surface Vessels Based on MADDPG.
Proceedings of the 49th Annual Conference of the IEEE Industrial Electronics Society, 2023

OpenMix: Exploring Outlier Samples for Misclassification Detection.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

Dual Alignment Unsupervised Domain Adaptation for Video-Text Retrieval.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

2022
Explore the weakness: Instructive exploration adversarial robust reinforcement learning.
J. King Saud Univ. Comput. Inf. Sci., 2022

HLifeRL: A hierarchical lifelong reinforcement learning framework.
J. King Saud Univ. Comput. Inf. Sci., 2022

Leveraging Protein Dynamics to Identify Functional Phosphorylation Sites using Deep Learning Models.
J. Chem. Inf. Model., 2022

Protein Interaction Network Reconstruction with a Structural Gated Attention Deep Model by Incorporating Network Structure Information.
J. Chem. Inf. Model., 2022

Best-in-class imitation: Non-negative positive-unlabeled imitation learning from imperfect demonstrations.
Inf. Sci., 2022

Learning fair representations by separating the relevance of potential information.
Inf. Process. Manag., 2022

Cryptanalysis and improvements of an efficient certificate-based proxy signature scheme for IIoT environments.
Inf. Process. Lett., 2022

Certificate-Based Anonymous Authentication With Efficient Aggregation for Wireless Medical Sensor Networks.
IEEE Internet Things J., 2022

Global regulation by output feedback for feedforward systems with time delays.
Int. J. Control, 2022

Improving deep reinforcement learning by safety guarding model via hazardous experience planning.
Frontiers Comput. Sci., 2022

Within the scope of prediction: Shaping intrinsic rewards via evaluating uncertainty.
Expert Syst. Appl., 2022

Robust Multi-Read Reconstruction from Contaminated Clusters Using Deep Neural Network for DNA Storage.
CoRR, 2022

Predicting before acting: improving policy quality by taking a vision of consequence.
Connect. Sci., 2022

Vital node searcher: find out critical node measure with deep reinforcement learning.
Connect. Sci., 2022

Forward-Secure Edge Authentication for Graphs.
Comput. J., 2022

Patch-Based Backdoors Detection and Mitigation with Feature Masking.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2022

Efficient and Fine-Grained Sharing of Signed Healthcare Data in Smart Healthcare.
Proceedings of the Network and System Security - 16th International Conference, 2022

Attack is the Best Defense: Towards Preemptive-Protection Person Re-Identification.
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022

Listen and Look: Multi-Modal Aggregation and Co-Attention Network for Video-Audio Retrieval.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2022

Efficient Hash-Based Redactable Signature for Smart Grid Applications.
Proceedings of the Computer Security - ESORICS 2022, 2022

Rethinking Confidence Calibration for Failure Prediction.
Proceedings of the Computer Vision - ECCV 2022, 2022

2021
A homogenization method for nonlinear inhomogeneous elastic materials.
Virtual Real. Intell. Hardw., 2021

Deep learning based data-adaptive descriptor for non-rigid multi-modal medical image registration.
Signal Process., 2021

ARAIL: Learning to rank from incomplete demonstrations.
Inf. Sci., 2021

Gradient temporal-difference learning for off-policy evaluation using emphatic weightings.
Inf. Sci., 2021

Cost-Effective Authenticated Data Redaction With Privacy Protection in IoT.
IEEE Internet Things J., 2021

Event-triggered decentralised control for large-scale systems with actuator failures.
Int. J. Syst. Sci., 2021

PCLiON: An Ontology for Data Standardization and Sharing of Prostate Cancer Associated Lifestyles.
Int. J. Medical Informatics, 2021

Hierarchical Reinforcement Learning With Automatic Sub-Goal Identification.
IEEE CAA J. Autom. Sinica, 2021

Improving exploration efficiency of deep reinforcement learning through samples produced by generative model.
Expert Syst. Appl., 2021

Class-Incremental Learning via Dual Augmentation.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021

Semi-supervised Learning via Improved Teacher-Student Network for Robust 3D Reconstruction of Stereo Endoscopic Image.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021

Calibration for Non-Exemplar Based Class-Incremental Learning.
Proceedings of the 2021 IEEE International Conference on Multimedia and Expo, 2021

Incentive-aware Task Location in Spatial Crowdsourcing.
Proceedings of the Database Systems for Advanced Applications, 2021

Prototype Augmentation and Self-Supervision for Incremental Learning.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

2020
Extrinsic Calibration of Multiple Two-Dimensional Laser Rangefinders Based on a Trihedron.
Sensors, 2020

A resource retrieval method of multimedia recommendation system based on deep learning.
Int. J. Auton. Adapt. Commun. Syst., 2020

Multi-agent cooperation Q-learning algorithm based on constrained Markov Game.
Comput. Sci. Inf. Syst., 2020

The Extrinsic Calibration of Area-Scan Camera and 2D Laser Rangefinder (LRF) Using Checkerboard Trihedron.
IEEE Access, 2020

Privacy-Preserving Authentication for Tree-Structured Data with Designated Verification in Outsourced Environments.
Proceedings of the Provable and Practical Security - 14th International Conference, ProvSec 2020, Singapore, November 29, 2020

2019
Extrinsic Calibration between a Camera and a 2D Laser Rangefinder using a Photogrammetric Control Field.
Sensors, 2019

基于统计形状模型的颅骨自动性别识别 (Automatic Sex Determination of Skulls Based on Statistical Shape Model).
计算机科学, 2019

Privacy-preserving authentication for general directed graphs in industrial IoT.
Inf. Sci., 2019

An information network security policy learning algorithm based on Sarsa with optimistic initial values.
Int. J. Comput. Sci. Eng., 2019

SARSA based access control with approximation by TileCoding.
Comput. Sci. Inf. Syst., 2019

ECG Generation With Sequence Generative Adversarial Nets Optimized by Policy Gradient.
IEEE Access, 2019

Enhancing User Experience of Task Assignment in Spatial Crowdsourcing: A Self-Adaptive Batching Approach.
IEEE Access, 2019

Safe Q-Learning Method Based on Constrained Markov Decision Processes.
IEEE Access, 2019

Efficient Privacy-Preserving Skyline Queries over Outsourced Cloud.
Proceedings of the Web Information Systems Engineering, 2019

Research of the Factory Sewage Wireless Monitoring System Based on Data Fusion.
Proceedings of the 3rd International Conference on Computer Science and Application Engineering, 2019

2018
NGS-FC: A Next-Generation Sequencing Data Format Converter.
IEEE ACM Trans. Comput. Biol. Bioinform., 2018

Peridynamics-Based Fracture Animation for Elastoplastic Solids.
Comput. Graph. Forum, 2018

Deep Deterministic Policy Gradient with Clustered Prioritized Sampling.
Proceedings of the Neural Information Processing - 25th International Conference, 2018

Three-dimensional Model Segmentation Based on Improved Random Walk Segmentation Algorithm.
Proceedings of the 2nd International Conference on Computer Science and Application Engineering, 2018

Determination of Sex Discriminant Function Analysis in Chinese Human Skulls.
Proceedings of the Biometric Recognition - 13th Chinese Conference, 2018

2017
A kernel based true online Sarsa(λ) for continuous space control problems.
Comput. Sci. Inf. Syst., 2017

Dynamically Enriched MPM for Invertible Elasticity.
Comput. Graph. Forum, 2017

A Universal Designated Multi-Verifier Transitive Signature Scheme.
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017

2016
Spiking Cortical Model Based Multimodal Medical Image Fusion by Combining Entropy Information with Weber Local Descriptor.
Sensors, 2016

Self-similarity inspired local descriptor for non-rigid multi-modal image registration.
Inf. Sci., 2016

Learn to human-level control in dynamic environment using incremental batch interrupting temporal abstraction.
Comput. Sci. Inf. Syst., 2016

Adaptive noise whitening filter and its use with maximum likelihood sequence estimation.
Proceedings of the Optical Fiber Communications Conference and Exhibition, 2016

A New Transitive Signature Scheme.
Proceedings of the Network and System Security - 10th International Conference, 2016

A Kernel-Based Sarsa( \lambda ) Algorithm with Clustering-Based Sample Sparsification.
Proceedings of the Neural Information Processing - 23rd International Conference, 2016

2015
Human-level moving object recognition from traffic video.
Comput. Sci. Inf. Syst., 2015

Example-Based Materials in Laplace-Beltrami Shape Space.
Comput. Graph. Forum, 2015

Protein-Protein Interaction Network Constructing Based on Text Mining and Reinforcement Learning with Application to Prostate Cancer.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Comparative digital mitigations of DAC clock tone leakage in a single-carrier 400G system.
Proceedings of the Optical Fiber Communications Conference and Exhibition, 2015

Training-based determination of perturbation coefficients for fiber nonlinearity mitigation.
Proceedings of the Optical Fiber Communications Conference and Exhibition, 2015

Selecting Training Samples from Large-Scale Remote-Sensing Samples Using an Active Learning Algorithm.
Proceedings of the Computational Intelligence and Intelligent Systems, 2015

A Bayesian Sarsa Learning Algorithm with Bandit-Based Method.
Proceedings of the Neural Information Processing - 22nd International Conference, 2015

2014
Extending perturbative nonlinearity mitigation to PDM-16QAM.
Proceedings of the European Conference on Optical Communication, 2014

Optimum quantization of perturbation coefficients for perturbative fiber nonlinearity mitigation.
Proceedings of the European Conference on Optical Communication, 2014

2013
Background Modeling and Fuzzy Clustering for Motion Detection from Video.
J. Multim., 2013

Biomedical text mining and its applications in cancer research.
J. Biomed. Informatics, 2013

Experimental comparison of terabit nyquist superchannel transmissions based on high and low baud rates.
Proceedings of the 2013 Optical Fiber Communication Conference and Exposition and the National Fiber Optic Engineers Conference (OFC/NFOEC), 2013

2011
Enriched Format Text Categorization Using A Component Similarity Approach.
J. Softw., 2011

Developing Software Using A Novel Event-Condition-State Pattern Framework: Taking Mobile Input Method System As A Case Study.
J. Softw., 2011

Anisotropic Kernels for Meshless Elastic Solids.
Proceedings of the 12th International Conference on Computer-Aided Design and Computer Graphics, 2011

2010
An Optimized Video-Based Traffic Congestion Monitoring System.
Proceedings of the Third International Conference on Knowledge Discovery and Data Mining, 2010

Single Sign-On Assistant: An Authentication Broker for Web Applications.
Proceedings of the Third International Conference on Knowledge Discovery and Data Mining, 2010

Genetic Algorithm for Mixed Chinese Postman Problem.
Proceedings of the Advances in Computation and Intelligence - 5th International Symposium, 2010

2009
ZFlow: Workflow for Cooperative Editing System.
J. Softw., 2009

Note on the nullity of bicyclic graphs.
Ars Comb., 2009

2008
<i>iMapper</i>: a web application for the automated analysis and mapping of insertional mutagenesis sequence data against Ensembl genomes.
Bioinform., 2008

ACEAC: A Novel Access Control Model for Cooperative Editing with Workflow.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008

Signal Recovery Using Neural Networks for DSP Based Infrared Gas Sensor.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008

A Flexible Classifier for Hibernal Trees.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

2007
Corridor-Scene Classifying Methods for Mobile Robot Based on Multi-Sonar-Sensor Information Fusion.
Int. J. Inf. Acquis., 2007

1996
An extension to the single bottleneck transportation problem.
Int. J. Syst. Sci., 1996


  Loading...