Jia Zhai

Orcid: 0000-0002-0549-1406

According to our database1, Jia Zhai authored at least 33 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Attribute- and attention-guided few-shot classification.
Multim. Syst., February, 2024

2023
Cross-domain feature disentanglement for interpretable modeling of tumor microenvironment impact on drug response.
CoRR, 2023

2021
Multiperiod portfolio selection models under uncertain measure and with multiple criteria.
J. Intell. Fuzzy Syst., 2021

Option valuation under no-arbitrage constraints with neural networks.
Eur. J. Oper. Res., 2021

2020
Capital-constrained supply chain with altruism and reciprocity.
J. Ambient Intell. Humaniz. Comput., 2020

Echo state network optimization using binary grey wolf algorithm.
Neurocomputing, 2020

An echo state network architecture based on quantum logic gate and its optimization.
Neurocomputing, 2020

Latent state recognition by an enhanced hidden Markov model.
Expert Syst. Appl., 2020

2019
Robust coordination of supply chain with loss aversion.
J. Ambient Intell. Humaniz. Comput., 2019

FLONet: Fewer Labeling Cost Active Learning for Deep Neural Network.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

2018
An intelligent power distribution service architecture using cloud computing and deep learning techniques.
J. Netw. Comput. Appl., 2018

Computational Resource Constrained Deep Learning Based Target Recognition from Visible Optical Images.
J. Inf. Hiding Multim. Signal Process., 2018

Portfolio selection of the defined contribution pension fund with uncertain return and salary: A multi-period mean-variance model.
J. Intell. Fuzzy Syst., 2018

Mean-risk model for uncertain portfolio selection with background risk.
J. Comput. Appl. Math., 2018

Mean-variance model for portfolio optimization with background risk based on uncertainty theory.
Int. J. Gen. Syst., 2018

A paired neural network model for tourist arrival forecasting.
Expert Syst. Appl., 2018

Multi-source data fusion using deep learning for smart refrigerators.
Comput. Ind., 2018

Quantitative analysis of breast cancer diagnosis using a probabilistic modelling approach.
Comput. Biol. Medicine, 2018

Sparsing Deep Neural Network Using Semi-Discrete Matrix Decomposition.
IEEE Access, 2018

A Deep Learning Fusion Recognition Method Based On SAR Image Data.
Proceedings of the 2018 International Conference on Identification, 2018

Financial Data Forecasting Using Optimized Echo State Network.
Proceedings of the Neural Information Processing - 25th International Conference, 2018

EffectFace: A Fast and Efficient Deep Neural Network Model for Face Recognition.
Proceedings of the Advanced Computer Architecture - 12th Conference, 2018

2017
Coarse and fine identification of collusive clique in financial market.
Expert Syst. Appl., 2017

Data analytics enhanced component volatility model.
Expert Syst. Appl., 2017

Computational intelligent hybrid model for detecting disruptive trading activity.
Decis. Support Syst., 2017

2016
Robust Optimization for the Loss-Averse Newsvendor Problem.
J. Optim. Theory Appl., 2016

The SAR Image Storage and Recognition System Based on Cloud Platform.
Proceedings of the International Conference on Identification, 2016

2014
Calmness and Exact Penalization in Vector Optimization under Nonlinear Perturbations.
J. Optim. Theory Appl., 2014

On the calibration of stochastic volatility models: A comparison study.
Proceedings of the IEEE Conference on Computational Intelligence for Financial Engineering & Economics, 2014

2012
Second-order asymptotic differential properties and optimality conditions for weak vector variational inequalities.
Optim. Lett., 2012

Second-order contingent derivatives of set-valued mappings with application to set-valued optimization.
Appl. Math. Comput., 2012

2006
Hash-Based RFID Security Protocol Using Randomly Key-Changed Identification Procedure.
Proceedings of the Computational Science and Its Applications, 2006

2005
An Anti-collision Algorithm Using Two-Functioned Estimation for RFID Tags.
Proceedings of the Computational Science and Its Applications, 2005


  Loading...