Hai Zhu

According to our database1, Hai Zhu authored at least 41 papers between 2008 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Chance-Constrained Collision Avoidance for MAVs in Dynamic Environments.
IEEE Robotics and Automation Letters, 2019

A Robotic Microscope System to Examine T Cell Receptor Acuity Against Tumor Neoantigens: A New Tool for Cancer Immunotherapy Research.
IEEE Robotics and Automation Letters, 2019

Anomaly-Tolerant Network Traffic Estimation via Noise-Immune Temporal Matrix Completion Model.
IEEE Journal on Selected Areas in Communications, 2019

Iteratively Learning Embeddings and Rules for Knowledge Graph Reasoning.
CoRR, 2019

Joint Transmit Power and Bandwidth Allocation for Cognitive Satellite Network Based on Bargaining Game Theory.
IEEE Access, 2019

On the Girth of Tanner (3, 13) Quasi-Cyclic LDPC Codes.
IEEE Access, 2019

Iteratively Learning Embeddings and Rules for Knowledge Graph Reasoning.
Proceedings of the World Wide Web Conference, 2019

2018
Construction of Quasi-Cyclic LDPC Codes Based on Fundamental Theorem of Arithmetic.
Wireless Communications and Mobile Computing, 2018

DADTA: A novel adaptive strategy for energy and performance efficient virtual machine consolidation.
J. Parallel Distrib. Comput., 2018

CSI Frequency Domain Fingerprint-Based Passive Indoor Human Detection.
Information, 2018

A New Strategy for Virtual Machine Migration Based on Decision-Theoretic Rough Sets.
IEICE Transactions, 2018

A CSI Frequency Domain Fingerprint-Based Method for Passive Indoor Human Detection.
Proceedings of the 17th IEEE International Conference On Trust, 2018

DAliM: Machine Learning Based Intelligent Lucky Money Determination for Large-Scale E-Commerce Businesses.
Proceedings of the Service-Oriented Computing - 16th International Conference, 2018

Label-Free Distant Supervision for Relation Extraction via Knowledge Graph Embedding.
Proceedings of the 2018 Conference on Empirical Methods in Natural Language Processing, Brussels, Belgium, October 31, 2018

Girth Analysis of Tanner (5, 11) Quasi-Cyclic LDPC Codes.
Proceedings of the 14th International Conference on Computational Intelligence and Security, 2018

Joint Optimization of Packet Length and Transmission Energy in Amplify-and-Forward Relay Networks.
Proceedings of the 14th International Conference on Computational Intelligence and Security, 2018

2017
R-TTWD: Robust Device-Free Through-The-Wall Detection of Moving Human With WiFi.
IEEE Journal on Selected Areas in Communications, 2017

Spectral embedding-based multiview features fusion for content-based image retrieval.
J. Electronic Imaging, 2017

Robust passive static human detection with commodity WiFi devices.
Proceedings of the 36th IEEE International Performance Computing and Communications Conference, 2017

AmpN: Real-time LOS/NLOS identification with WiFi.
Proceedings of the IEEE International Conference on Communications, 2017

Study on Handover of High Speed Railway by Rate-Splitting and Interference Cancellation.
Proceedings of the Communications and Networking, 2017

2016
New Deadline-Aware Energy-Consumption Optimization Model and Genetic Algorithm Under Cloud Computing.
IJPRAI, 2016

P-Aware: a proportional multi-resource scheduling strategy in cloud data center.
Cluster Computing, 2016

Analysis of the competition between CRH sleeper and aviation in Beijing-guangzhou corridor based on SP survey.
Proceedings of the International Conference on Logistics, Informatics and Service Sciences, 2016

The market segmentation on passenger transportation of High-speed Railway with logistic regression model.
Proceedings of the International Conference on Logistics, Informatics and Service Sciences, 2016

Traffic mode share analysis under competition of CRH sleeper and aviation in Beijing-guangzhou transportation corridor.
Proceedings of the International Conference on Logistics, Informatics and Service Sciences, 2016

Predicting User Retweet Behaviors Based on Energy Optimization.
Proceedings of the 12th International Conference on Computational Intelligence and Security, 2016

Energy-Aware Scheduling of Workflow in Cloud Center with Deadline Constraint.
Proceedings of the 12th International Conference on Computational Intelligence and Security, 2016

2015
A Stationary North-Finding Scheme for an Azimuth Rotational IMU Utilizing a Linear State Equality Constraint.
Sensors, 2015

Invisible Cloak Fails: CSI-based Passive Human Detection.
Proceedings of the 1st Workshop on Context Sensing and Activity Recognition, 2015

R-PMD: robust passive motion detection using PHY information with MIMO.
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015

An Effective Energy-Based Multi-view Piecewise Planar Stereo Method.
Proceedings of the 11th International Conference on Computational Intelligence and Security, 2015

A Robust Quasi-Dense Wide Baseline Matching Method.
Proceedings of the 11th International Conference on Computational Intelligence and Security, 2015

2014
A New Model for Energy Consumption Optimization under Cloud Computing and its Genetic Algorithm.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

Failure-Aware Resource Scheduling Policy for Hybrid Cloud.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

2012
Energy-efficient Task Scheduling Model based on MapReduce for Cloud Computing using Genetic Algorithm.
JCP, 2012

2011
Grid Dependent Tasks Security Scheduling Model and DPSO Algorithm.
JNW, 2011

A Novel Two-stage Analysis Method for Customer's Requirement.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

A General Edge Detection Method Based on the Shear Transform.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

2010
Grid Independent Task Scheduling Multi-Objective Optimization Model and Genetic Algorithm.
JCP, 2010

2008
Security-Driven Task Scheduling Based on Evolutionary Algorithm.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008


  Loading...