Guoqiang Zhou

Orcid: 0000-0001-5861-8565

According to our database1, Guoqiang Zhou authored at least 19 papers between 2005 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Code-line-level Bugginess Identification: How Far have We Come, and How Far have We Yet to Go?
ACM Trans. Softw. Eng. Methodol., July, 2023

Object-aware Policy Network in Deep Recommender Systems.
J. Signal Process. Syst., March, 2023

MultiselfGAN: A Self-Guiding Neural Architecture Search Method for Generative Adversarial Networks With Multicontrollers.
IEEE Trans. Cogn. Dev. Syst., 2023

AutoInfo GAN: Toward a better image synthesis GAN framework for high-fidelity few-shot datasets via NAS and contrastive learning.
Knowl. Based Syst., 2023

Study on Vibration Characteristics of Electro-Hydraulic Excitation System Controlled by Alternating Flow Distribution Rotary Valve.
IEEE Access, 2023

2022
EfficientAutoGAN: Predicting the Rewards in Reinforcement-Based Neural Architecture Search for Generative Adversarial Networks.
IEEE Trans. Cogn. Dev. Syst., 2022

Distributed GAN: Toward a Faster Reinforcement-Learning-Based Architecture Search.
IEEE Trans. Artif. Intell., 2022

2021
Toward gradient bandit-based selection of candidate architectures in AutoGAN.
Soft Comput., 2021

Determining learning direction via multi-controller model for stably searching generative adversarial networks.
Neurocomputing, 2021

2020
Grey Weighted QoS Evaluation based on Real-Time Scene.
Int. J. Perform. Eng., 2020

Parametric Analysis of the I-Stage Structure for a Dual-Stage Gas Pressure Reducing Regulator.
IEEE Access, 2020

2019
A differential privacy noise dynamic allocation algorithm for big multimedia data.
Multim. Tools Appl., 2019

Recommendations based on user effective point-of-interest path.
Int. J. Mach. Learn. Cybern., 2019

2017
The Utility Challenge of Privacy-Preserving Data-Sharing in Cross-Company Defect Prediction: An Empirical Study of the CLIFF&MORPH Algorithm.
Proceedings of the 2017 IEEE International Conference on Software Maintenance and Evolution, 2017

2016
A dynamic trust evaluation mechanism based on affective intensity computing.
Secur. Commun. Networks, 2016

去随意推荐的信任评估模型 (Trust Evaluation Model with Eliminating Random Recommendation).
计算机科学, 2016

2013
Detecting Image Spam Based on K-Labels Propagation Model.
Proceedings of the 2013 10th Web Information System and Application Conference, 2013

2011
Harmonic functions based semi-supervised learning for web spam detection.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

2005
User's Rough Set Based Fuzzy Interest Model in Mining WWW Cache.
Proceedings of the Parallel and Distributed Processing and Applications, 2005


  Loading...