Haoran Zhu

Orcid: 0009-0000-4268-4760

According to our database1, Haoran Zhu authored at least 54 papers between 2011 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Practical solutions in fully homomorphic encryption: a survey analyzing existing acceleration methods.
Cybersecur., December, 2024

Towards Secure Runtime Customizable Trusted Execution Environment on FPGA-SoC.
IEEE Trans. Computers, April, 2024

A S-band switchless bi-directional transceiver with a 52% fractional bandwidth in CMOS technology.
Microelectron. J., January, 2024

Robust Tiny Object Detection in Aerial Images amidst Label Noise.
CoRR, 2024

2023
Pressure-Sensitive Capability of AgNPs Self-Sensing Cementitious Sensors.
Sensors, December, 2023

The k-aggregation closure for covering sets.
Discret. Optim., November, 2023

Louise or Ferdinand? Exploring the protagonists of <i>Love and Intrigue</i> using social network analysis.
Digit. Scholarsh. Humanit., August, 2023

Multi-domain authorization and decision-making method of access control in the edge environment.
Comput. Networks, June, 2023

Hyperspectral Image Denoising via Weighted Multidirectional Low-Rank Tensor Recovery.
IEEE Trans. Cybern., May, 2023

Linguistic positivity in soft and hard disciplines: temporal dynamics, disciplinary variation, and the relationship with research impact.
Scientometrics, May, 2023

A novel basement membrane-related gene signature for prognosis of lung adenocarcinomas.
Comput. Biol. Medicine, March, 2023

Taxi trajectories.
Dataset, March, 2023

Multi-cover inequalities for totally-ordered multiple knapsack sets: theory and computation.
Math. Program., February, 2023

Position-Wise Gated Res2Net-Based Convolutional Network with Selective Fusing for Sentiment Analysis.
Entropy, 2023

Towards Semi-Markov Model-based Dependability Evaluation of VM-based Multi-Domain Service Function Chain.
CoRR, 2023

Towards Runtime Customizable Trusted Execution Environment on FPGA-SoC.
CoRR, 2023

Delay Impact on Stubborn Mining Attack Severity in Imperfect Bitcoin Network.
CoRR, 2023

Understanding Why ViT Trains Badly on Small Datasets: An Intuitive Perspective.
CoRR, 2023

Is Stubborn Mining Severe in Imperfect GHOST Bitcoin-like Blockchains? Quantitative Analysis.
CoRR, 2023

Human-to-Robot Handovers via Real-time Video Segmentation.
Proceedings of the IEEE International Conference on Cybernetics and Intelligent Systems, 2023

ERASE-Net: Efficient Segmentation Networks for Automotive Radar Signals.
Proceedings of the IEEE International Conference on Robotics and Automation, 2023

Design and Implementation of a Multimodal Combination Framework for Robotic Grasping.
Proceedings of the Interactive Collaborative Robotics - 8th International Conference, 2023

Threat Capability of Stubborn Mining in Imperfect GHOST Bitcoin Blockchain.
Proceedings of the IEEE International Conference on Communications, 2023

AFL-RL: A Reinforcement Learning Based Mutation Scheduling Optimization Method for Fuzzing.
Proceedings of the 7th International Conference on High Performance Compilation, 2023

Research on Intelligent Recognition Technology of Cigarette Laser Code Based on Deep-Learning.
Proceedings of the 2023 International Conference on Advances in Artificial Intelligence and Applications, 2023

2022
Revisiting FAW attack in an imperfect PoW blockchain system.
Peer-to-Peer Netw. Appl., 2022

A dependency-based machine learning approach to the identification of research topics: a case in COVID-19 studies.
Libr. Hi Tech, 2022

UCAV Path Planning for Avoiding Obstacles using Cooperative Co-evolution Spider Monkey Optimization.
Knowl. Based Syst., 2022

Recognition of Facets for Knapsack Polytope is DP-complete.
CoRR, 2022

TAME: Task Agnostic Continual Learning using Multiple Experts.
CoRR, 2022

Evaluating Checkpointing Capability against Eclipse-based Stake-Bleeding Attack in PoS Blockchain.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2022

New Classes of Facets for Complementarity Knapsack Problems.
Proceedings of the Combinatorial Optimization - 7th International Symposium, 2022

On the Complexity of Separation from the Knapsack Polytope.
Proceedings of the Integer Programming and Combinatorial Optimization, 2022

Evaluating fork after withholding (FAW) attack in Bitcoin.
Proceedings of the CF '22: 19th ACM International Conference on Computing Frontiers, Turin, Italy, May 17, 2022

Research on Intelligent cigarette sales forecasting model based on big data technology.
Proceedings of the CAIBDA 2022, 2022

2021
Miniaturized, Ultra-Wideband and High Isolation Single Pole Double Throw Switch by Using π-Type Topology in GaAs pHEMT Technology.
IEEE Trans. Circuits Syst. II Express Briefs, 2021

Integer packing sets form a well-quasi-ordering.
Oper. Res. Lett., 2021

Home country bias in academic publishing: A case study of the New England Journal of Medicine.
Learn. Publ., 2021

Prose, Verse and Authorship in Dream of the Red Chamber: A Stylometric Analysis.
J. Quant. Linguistics, 2021

A robust single-pixel particle image velocimetry based on fully convolutional networks with cross-correlation embedded.
CoRR, 2021

An alternating direction method of multipliers for tensor complementarity problems.
Comput. Appl. Math., 2021

Multi-cover Inequalities for Totally-Ordered Multiple Knapsack Sets.
Proceedings of the Integer Programming and Combinatorial Optimization, 2021

Strategy of Hybrid Energy Storage System for Auxiliary frequency modulation Based on Energy Distribution Management.
Proceedings of the IEEE International Conference on e-Business Engineering, 2021

Adversarial Attacks on Object Detectors with Limited Perturbations.
Proceedings of the IEEE International Conference on Acoustics, 2021

2020
An Ultra-Compact On-Chip Reconfigurable Bandpass Filter With Semi-Lumped Topology by Using GaAs pHEMT Technology.
IEEE Access, 2020

An Improved Genetic Algorithm for Optimizing EBG Structure With Ultra-Wideband SSN Suppression Performance of Mixed Signal Systems.
IEEE Access, 2020

Weighted Network Analysis Using the Debye Model.
Proceedings of the Structural, Syntactic, and Statistical Pattern Recognition, 2020

A Scalable MIP-based Method for Learning Optimal Multivariate Decision Trees.
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020

Deep Learning Based Prediction Towards Designing A Smart Building Assistant System.
Proceedings of the 17th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2020

ApproxRefresh: Enabling Uncorrectable Data Reuse on Flash Memory with Approximate Read Awareness.
Proceedings of the 21st ACM SIGPLAN/SIGBED International Conference on Languages, 2020

Stochastic Model-Based Quantitative Analysis of Edge UPF Service Dependability.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020

2018
Motifs in Language and Text.
J. Quant. Linguistics, 2018

British Cultural Complexity: An Entropy-based Approach.
J. Quant. Linguistics, 2018

2011
Stock Market Forecasting based on Wavelet and Least Squares Support Vector Machine.
Proceedings of the ICEIS 2011, 2011


  Loading...