Huan Zhang

According to our database1, Huan Zhang
  • authored at least 103 papers between 2006 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Computational Prediction of Pathogenic Network Modules in Fusarium verticillioides.
IEEE/ACM Trans. Comput. Biology Bioinform., 2018

Seq2Sick: Evaluating the Robustness of Sequence-to-Sequence Models with Adversarial Examples.
CoRR, 2018

Evaluating the Robustness of Neural Networks: An Extreme Value Theory Approach.
CoRR, 2018

Phase Transition of Convex Programs for Linear Inverse Problems with Multiple Prior Constraints.
CoRR, 2018

2017
Common-Mode EMI Noise Modeling and Reduction With Balance Technique for Three-Level Neutral Point Clamped Topology.
IEEE Trans. Industrial Electronics, 2017

On Secrecy Outage of Relay Selection in Underlay Cognitive Radio Networks Over Nakagami-m Fading Channels.
IEEE Trans. Cogn. Comm. & Networking, 2017

LASSIM - A network inference toolbox for genome-wide mechanistic modeling.
PLoS Computational Biology, 2017

A max-plus primal space fundamental solution for a class of differential Riccati equations.
MCSS, 2017

Research on fuzzy evaluation of performance in green supply chain based on environmental economics.
Journal of Intelligent and Fuzzy Systems, 2017

Security Performance Analysis of DF Cooperative Relay Networks over Nakagami-m Fading Channels.
TIIS, 2017

Show-and-Fool: Crafting Adversarial Examples for Neural Image Captioning.
CoRR, 2017

Towards Robust Neural Networks via Random Self-ensemble.
CoRR, 2017

EAD: Elastic-Net Attacks to Deep Neural Networks via Adversarial Examples.
CoRR, 2017

ZOO: Zeroth Order Optimization based Black-box Attacks to Deep Neural Networks without Training Substitute Models.
CoRR, 2017

GPU-acceleration for Large-scale Tree Boosting.
CoRR, 2017

On the Phase Transition of Corrupted Sensing.
CoRR, 2017

Can Decentralized Algorithms Outperform Centralized Algorithms? A Case Study for Decentralized Parallel Stochastic Gradient Descent.
CoRR, 2017

Image Fusion of CT and MR with Sparse Representation in NSST Domain.
Comp. Math. Methods in Medicine, 2017

Environmental-friendly reliability allocation for product platform based on expert measurement and ICN.
Computers & Electrical Engineering, 2017

Anaconda: AN automated pipeline for somatic COpy Number variation Detection and Annotation from tumor exome sequencing data.
BMC Bioinformatics, 2017

CPSS 2.0: a computational platform update for the analysis of small RNA sequencing data.
Bioinformatics, 2017

Design and Analysis of Weighted Frequency-Domain Contention in Wireless LANs.
IEEE Access, 2017

Can Decentralized Algorithms Outperform Centralized Algorithms? A Case Study for Decentralized Parallel Stochastic Gradient Descent.
Proceedings of the Advances in Neural Information Processing Systems 30: Annual Conference on Neural Information Processing Systems 2017, 2017

On the phase transition of corrupted sensing.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

Building extraction from remote sensing images with deep learning in a supervised manner.
Proceedings of the 2017 IEEE International Geoscience and Remote Sensing Symposium, 2017

Gradient Boosted Decision Trees for High Dimensional Sparse Output.
Proceedings of the 34th International Conference on Machine Learning, 2017

Secrecy performance analysis with optimal DF relay selection of underlay CR networks over Nakagami-m fading channels.
Proceedings of the IEEE International Conference on Communications, 2017

ZOO: Zeroth Order Optimization Based Black-box Attacks to Deep Neural Networks without Training Substitute Models.
Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, 2017

Clinical Assessment of Brachial-Ankle Pulse Wave Velocity and Stiffness Index: Hypertriglyceridemia Effects on Arterial Stiffness.
Proceedings of the 17th IEEE International Conference on Bioinformatics and Bioengineering, 2017

2016
Secrecy Outage Performance for SIMO Underlay Cognitive Radio Systems With Generalized Selection Combining Over Nakagami-m Channels.
IEEE Trans. Vehicular Technology, 2016

Secrecy Outage Analysis for SIMO Underlay Cognitive Radio Networks over Generalized-K Fading Channels.
IEEE Signal Process. Lett., 2016

DeAnnIso: a tool for online detection and annotation of isomiRs from small RNA sequencing data.
Nucleic Acids Research, 2016

A multi-threshold secret image sharing scheme based on the generalized Chinese reminder theorem.
Multimedia Tools Appl., 2016

A Fuzzy Collusive Attack Detection Mechanism for Reputation Aggregation in Mobile Social Networks: A Trust Relationship Based Perspective.
Mobile Information Systems, 2016

Method for the analysis of the preferences of network users.
IET Networks, 2016

Performance Analysis of Physical Layer Security Over Generalized-K Fading Channels Using a Mixture Gamma Distribution.
IEEE Communications Letters, 2016

IsomiR Bank: a research resource for tracking IsomiRs.
Bioinformatics, 2016

Security Performance Analysis of SIMO Generalized-K Fading Channels Using a Mixture Gamma Distribution.
Proceedings of the IEEE 84th Vehicular Technology Conference, 2016

Sublinear Time Orthogonal Tensor Decomposition.
Proceedings of the Advances in Neural Information Processing Systems 29: Annual Conference on Neural Information Processing Systems 2016, 2016

A Comprehensive Linear Speedup Analysis for Asynchronous Stochastic Parallel Optimization from Zeroth-Order to First-Order.
Proceedings of the Advances in Neural Information Processing Systems 29: Annual Conference on Neural Information Processing Systems 2016, 2016

Analysis of LTE traffic offloading based on big data.
Proceedings of the 16th International Symposium on Communications and Information Technologies, 2016

An integration time optimization approach for Geo-SAR.
Proceedings of the 2016 IEEE International Geoscience and Remote Sensing Symposium, 2016

The capability and development of chinese ocean dynamical environment satellites.
Proceedings of the 2016 IEEE International Geoscience and Remote Sensing Symposium, 2016

An image registration method based on the combination of multiple image features.
Proceedings of the 2016 IEEE International Geoscience and Remote Sensing Symposium, 2016

Daily cloud free snow cover mapping over Central Asia and Xinjiang Province of China.
Proceedings of the 2016 IEEE International Geoscience and Remote Sensing Symposium, 2016

HogWild++: A New Mechanism for Decentralized Asynchronous Stochastic Gradient Descent.
Proceedings of the IEEE 16th International Conference on Data Mining, 2016

Fixing the Convergence Problems in Parallel Asynchronous Dual Coordinate Descent.
Proceedings of the IEEE 16th International Conference on Data Mining, 2016

Secrecy Outage Performance for Underlay MIMO CRNs with Energy Harvesting and Transmit Antenna Selection.
Proceedings of the 2016 IEEE Globecom Workshops, Washington, DC, USA, December 4-8, 2016, 2016

2015
Fault Analysis-Based Logic Encryption.
IEEE Trans. Computers, 2015

DeAnnCNV: a tool for online detection and annotation of copy number variations from whole-exome sequencing data.
Nucleic Acids Research, 2015

Multiple instance learning for computer aided detection and diagnosis of gastric cancer with dual-energy CT imaging.
Journal of Biomedical Informatics, 2015

Similarity-based visualization of large image collections.
Information Visualization, 2015

An adaptive subspace trust-region method for frequency-domain seismic full waveform inversion.
Computers & Geosciences, 2015

Max-plus fundamental solution semigroups for a class of difference Riccati equations.
Automatica, 2015

Max-plus fundamental solution semigroups for optimal control problems.
Proceedings of the 2015 Proceedings of the Conference on Control and its Applications, 2015

A novel fusion method of SAR and optical sensors to reconstruct 3-D buildings.
Proceedings of the 2015 IEEE International Geoscience and Remote Sensing Symposium, 2015

Target Tracking via Incorporating Multi-modal Features.
Proceedings of the Intelligent Computing Theories and Methodologies, 2015

Security information factor based low probability of identification in distributed multiple-radar system.
Proceedings of the 2015 IEEE International Conference on Acoustics, 2015

Computational identification of key functional genes associated with fusarium verticillioides pathogenicity.
Proceedings of the 6th ACM Conference on Bioinformatics, 2015

2014
A reservoir identification method based on rough set and support vector machine.
IJCAT, 2014

A novel stereo positioning method based on optical and SAR sensor.
Proceedings of the 2014 IEEE Geoscience and Remote Sensing Symposium, 2014

Minimizing network interference through mobility control in wireless robotic networks.
Proceedings of the 13th International Conference on Control Automation Robotics & Vision, 2014

A Theoretical Model of Mental Workload in Pilots Based on Multiple Experimental Measurements.
Proceedings of the Engineering Psychology and Cognitive Ergonomics, 2014

Computational identification of functional network modules associated with the pathogenicity of Fusarium verticillioides.
Proceedings of the 5th ACM Conference on Bioinformatics, 2014

Pruning error analysis for a class of curse-of-dimensionality free methods.
Proceedings of the 4th Australian Control Conference, AuCC 2014, Canberra, 2014

A new non-iterative solution for a class of difference Riccati equations.
Proceedings of the 4th Australian Control Conference, AuCC 2014, Canberra, 2014

2013
Uplink Power Control via Adaptive Hidden-Markov-Model-Based Pathloss Estimation.
IEEE Trans. Mob. Comput., 2013

Computation of tight integral input-to-state stability bounds for nonlinear systems.
Systems & Control Letters, 2013

New Iterative Algorithm for Two Infinite Families of Multivalued Quasi-Nonexpansive Mappings in Uniformly Convex Banach Spaces.
J. Applied Mathematics, 2013

Location estimation for wireless sensor networks with attack tolerance.
IJWMC, 2013

A Fast Palmprint Verification System Based on Fractal Coding.
I. J. Information Acquisition, 2013

iMap: a stable layout for navigating large image collections with embedded search.
Proceedings of the Visualization and Data Analysis 2013, 2013

A max-plus method for the approximate solution of discrete time linear regulator problems with non-quadratic terminal payoff.
Proceedings of the SIAM Conference on Control and its Applications, 2013

High-level synthesis for security and trust.
Proceedings of the 2013 IEEE 19th International On-Line Testing Symposium (IOLTS), 2013

Endocrine Intelligent Control of Thrust Hydraulic System for TBM.
Proceedings of the Intelligent Robotics and Applications - 6th International Conference, 2013

B/S implementation of internet-based electrical engineering lab with MVC architecture.
Proceedings of the 10th IEEE International Conference on Control and Automation, 2013

A pruning algorithm for managing complexity in the solution of a class of linear non-quadratic regulator problems.
Proceedings of the 2013 Australian Control Conference, Fremantle, WA, 2013

2012
Nonlinear L2-gain verification for nonlinear systems.
Systems & Control Letters, 2012

Performance bounds for nonlinear systems with a nonlinear ℒ2-gain property.
Int. J. Control, 2012

Using the K-Nearest Neighbor Algorithm for the Classification of Lymph Node Metastasis in Gastric Cancer.
Comp. Math. Methods in Medicine, 2012

CPSS: a computational platform for the analysis of small RNA deep sequencing data.
Bioinformatics, 2012

Approximation of nonlinear ℒ2-gain bounds via a max-plus method.
Proceedings of the 51th IEEE Conference on Decision and Control, 2012

A weak L2-gain property for nonlinear systems.
Proceedings of the 51th IEEE Conference on Decision and Control, 2012

2011
Optimization-based formation of autonomous mobile robots.
Robotica, 2011

Prediction of novel pre-microRNAs with high accuracy through boosting and SVM.
Bioinformatics, 2011

Formation control of weak autonomous robots.
Proceedings of the 50th IEEE Conference on Decision and Control and European Control Conference, 2011

2010
How do users evaluate individual documents? An analysis of dimensions of evaluation activities.
Inf. Res., 2010

A Scanner Based Palmprint Verification System for Civil Application.
I. J. Information Acquisition, 2010

Experiences with Hierarchical Storage Management Support in Blue Whale File System.
Proceedings of the 2010 International Conference on Parallel and Distributed Computing, 2010

Improvement in the evaluation model of water resources carrying capacity of urbanized area base on Fuzzy theory.
Proceedings of the Seventh International Conference on Fuzzy Systems and Knowledge Discovery, 2010

Hailstone detection based on time series association rules.
Proceedings of the Seventh International Conference on Fuzzy Systems and Knowledge Discovery, 2010

A Bounded Real Lemma for nonlinear ℒ2-gain.
Proceedings of the 49th IEEE Conference on Decision and Control, 2010

Nonlinear ℒ2-gain analysis via a cascade.
Proceedings of the 49th IEEE Conference on Decision and Control, 2010

2009
Palmprint verification system using moiré pattern.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2009

Uplink power control via adaptive HMM estimation.
Proceedings of the 48th IEEE Conference on Decision and Control, 2009

2008
An efficient approach of controlling traffic congestion in scale-free networks
CoRR, 2008

An adaptive routing strategy for packet delivery in complex networks
CoRR, 2008

Robust Power Controllers in Cellular Radio Systems.
Proceedings of the 67th IEEE Vehicular Technology Conference, 2008

A New Distributed Power Control Formula In CDMA Mobile Networks.
Proceedings of the 67th IEEE Vehicular Technology Conference, 2008

An Optimization Method to Develop AAA Architectures with MIPv6 Mobility Support.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

2006
Optimal Control of Hybrid Systems and a System of Quasi-Variational Inequalities.
SIAM J. Control and Optimization, 2006

VSVM-enhanced: a Volume Manager Based on the EVMS Framework.
Proceedings of the Grid and Cooperative Computing Workshops, 2006

Distance Guided Classification with Gene Expression Programming.
Proceedings of the Advanced Data Mining and Applications, Second International Conference, 2006


  Loading...