Jiahua Zhang

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Known people with the same name:

Bibliography

2025
Retrieval augmentation for text-to-table generation.
Inf. Process. Manag., 2025

High-Gain Boost Converter Based Energy Harvesting Method for the Ultra-Low Voltage Difference of HVDC Transmission Line.
Int. J. Circuit Theory Appl., 2025

DiffiT-HSFDA: Diffusion Based Source-Free Domain Adaptation for Histopathology.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2025

2024
ResVG: Enhancing Relation and Semantic Understanding in Multiple Instances for Visual Grounding.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

Exploring Spire GNSS Reflections for Global Soil Moisture Monitoring.
Proceedings of the IGARSS 2024, 2024

2023
VESC: a new variational autoencoder based model for anomaly detection.
Int. J. Mach. Learn. Cybern., March, 2023

YUAN 2.0: A Large Language Model with Localized Filtering-based Attention.
CoRR, 2023

LayerLog: Log sequence anomaly detection based on hierarchical semantics.
Appl. Soft Comput., 2023

Confidence-aware Pseudo-label Learning for Weakly Supervised Visual Grounding.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

Deep Counterfactual Regret Minimization Algorithm with Regret Discount in Radar Anti-Jamming Game.
Proceedings of the 23rd IEEE International Conference on Communication Technology, 2023

2022
Improving generality and accuracy of existing public development project selection methods: a study on GitHub ecosystem.
Autom. Softw. Eng., 2022

2021
Morning commute in congested urban rail transit system: A macroscopic model for equilibrium distribution of passenger arrivals.
CoRR, 2021

2020
Social learning with coordination motives.
Games Econ. Behav., 2020

2018
Inventory centralization with risk-averse newsvendors.
Ann. Oper. Res., 2018

2017
Phishing Detection Method Based on Borderline-Smote Deep Belief Network.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

A Study on the Application of Flipped Classroom in College Course Teaching.
Proceedings of the International Conference on Digital Technology in Education, 2017

2016
The Power Flow Simulation and Calculation Method for Metro Power Supply System Based on the Train-Network Coupling.
Proceedings of the Theory, Methodology, Tools and Applications for Modeling and Simulation of Complex Systems, 2016

Research on Coupling Simulation Model of Metro Train Operation and Traction Power System.
Proceedings of the Theory, Methodology, Tools and Applications for Modeling and Simulation of Complex Systems, 2016

2015
Using SeaWiFS Measurements to Evaluate Radiometric Stability of Pseudo-Invariant Calibration Sites at Top of Atmosphere.
IEEE Geosci. Remote. Sens. Lett., 2015

2013
IDSS: A Novel Representation for Woven Fabrics.
IEEE Trans. Vis. Comput. Graph., 2013

2011
Approximation of Loop Subdivision Surfaces for Fast Rendering.
IEEE Trans. Vis. Comput. Graph., 2011

A further try: composing knitted patterns by playing on a multi-input device.
Proceedings of the 10th International Conference on Virtual Reality Continuum and its Applications in Industry, 2011

2010
A creative try: composing weaving patterns by playing on a multi-input device.
Proceedings of the ACM Symposium on Virtual Reality Software and Technology, 2010

Footprint-profile sweep surface: a flexible method for realtime generation and rendering of massive urban buildings.
Proceedings of the ACM Symposium on Virtual Reality Software and Technology, 2010


  Loading...