Jian Zou
According to our database1,
Jian Zou
authored at least 78 papers
between 2007 and 2019.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis OtherLinks
On csauthors.net:
Bibliography
2019
Modeling financial durations using penalized estimating functions.
Computational Statistics & Data Analysis, 2019
Total Variation Denoising With Non-Convex Regularizers.
IEEE Access, 2019
2018
Dynamic Space-Time Model for Syndromic Surveillance with Particle Filters and Dirichlet Process.
Proceedings of the Handbook of Dynamic Data Driven Applications Systems., 2018
Bell inequality, steering, incompatibility and Leggett-Garg inequality under coarsening measurement.
Quantum Information Processing, 2018
Entanglement generation of two quantum dots with Majorana fermions via optimal control.
Quantum Information Processing, 2018
Protecting nonlocality of multipartite states by feed-forward control.
Quantum Information Processing, 2018
Matrix exponential based discriminant locality preserving projections for feature extraction.
Neural Networks, 2018
Sparse L1-norm-based linear discriminant analysis.
Multimedia Tools Appl., 2018
Cryptanalysis of the Round-Reduced Kupyna.
J. Inf. Sci. Eng., 2018
Improving the bound on the restricted isometry property constant in multiple orthogonal least squares.
IET Signal Processing, 2018
Level set evolution with sparsity constraint for object extraction.
IET Image Processing, 2018
New algorithms for the unbalanced generalised birthday problem.
IET Information Security, 2018
Split Bregman Algorithm for Structured Sparse Reconstruction.
IEEE Access, 2018
MindCamera: Interactive Sketch-Based Image Retrieval and Synthesis.
IEEE Access, 2018
EVN: An Elastic Virtual Network Supporting NFV Customized and Rapid Migration.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018
A Boundless Resource Orchestrator Based on Container Technology in Edge Computing.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018
CASSIA: An assistant for identifying clinically and statistically significant decreases in antimicrobial susceptibility.
Proceedings of the 2018 IEEE EMBS International Conference on Biomedical & Health Informatics, 2018
2017
Analysis of various factors affecting the non-Markovian dynamics associated with a hierarchical environment based on collision model.
Quantum Information Processing, 2017
L1-norm based null space discriminant analysis.
Multimedia Tools Appl., 2017
An automatic active contour method for sea cucumber segmentation in natural underwater environments.
Computers and Electronics in Agriculture, 2017
Causal Forest vs. Naive Causal Forest in Detecting Personalization: An Empirical Study in ASSISTments.
Proceedings of the 10th International Conference on Educational Data Mining, 2017
Using a Single Model Trained across Multiple Experiments to Improve the Detection of Treatment Effects.
Proceedings of the 10th International Conference on Educational Data Mining, 2017
An Offline Evaluation Method for Individual Treatment Rules and How to Find Heterogeneous Treatment Effect.
Proceedings of the 10th International Conference on Educational Data Mining, 2017
An online spatio-temporal model for inference and predictions of taxi demand.
Proceedings of the 2017 IEEE International Conference on Big Data, BigData 2017, 2017
Leveraging Electronic Health Record Data for Community Health Assessment and Surveillance.
Proceedings of the AMIA 2017, 2017
2016
Low-Rank Matrix Factorization With Adaptive Graph Regularizer.
IEEE Trans. Image Processing, 2016
L1-norm-based principal component analysis with adaptive regularization.
Pattern Recognition, 2016
L1-norm and maximum margin criterion based discriminant locality preserving projections via trace Lasso.
Pattern Recognition, 2016
Histogram-based embedding for learning on statistical manifolds.
Pattern Anal. Appl., 2016
A New and Fast Implementation of Orthogonal LDA Algorithm and Its Incremental Extension.
Neural Processing Letters, 2016
Graph Maximum Margin Criterion for Face Recognition.
Neural Processing Letters, 2016
Generalizing intersection kernel support vector machines for color texture based recognition.
J. Visual Communication and Image Representation, 2016
Spare L1-norm-based maximum margin criterion.
J. Visual Communication and Image Representation, 2016
Efficient portfolio allocation with sparse volatility estimation for high-frequency financial data.
Proceedings of the 2016 IEEE International Conference on Big Data, 2016
2015
Quantum controlled-not gate in the bad cavity regime.
Quantum Information Processing, 2015
Incremental maximum margin criterion based on eigenvalue decomposition updating algorithm.
Mach. Vis. Appl., 2015
Split Bregman algorithms for multiple measurement vector problem.
Multidim. Syst. Sign. Process., 2015
Split Bregman algorithms for sparse group Lasso with application to MRI reconstruction.
Multidim. Syst. Sign. Process., 2015
Incremental learning from chunk data for IDR/QR.
Image Vision Comput., 2015
Known-key distinguishers on 15-round 4-branch type-2 generalised Feistel networks with single substitution-permutation functions and near-collision attacks on its hashing modes.
IET Information Security, 2015
Cryptanalysis of the Round-Reduced Kupyna Hash Function.
IACR Cryptology ePrint Archive, 2015
Volatility matrix inference in high-frequency finance with regularization and efficient computations.
Proceedings of the 2015 IEEE International Conference on Big Data, 2015
Leveraging Health Information Exchange to Create Neighborhood Health Records for Public Health Agencies.
Proceedings of the AMIA 2015, 2015
2014
Block-sparse recovery via redundant block OMP.
Signal Processing, 2014
A Bayesian spatio-temporal approach for real-time detection of disease outbreaks: a case study.
BMC Med. Inf. & Decision Making, 2014
Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Grostl Hash Function.
J. Inf. Sci. Eng., 2014
Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes.
Frontiers Comput. Sci., 2014
A perturbation algorithm for embedding virtual data centers in multipath networks.
Proceedings of the IEEE Global Communications Conference, 2014
High-frequency financial statistics with parallel R and Intel Xeon Phi coprocessor.
Proceedings of the 2014 IEEE International Conference on Big Data, 2014
2013
Construction of general quantum channel for quantum teleportation.
Quantum Information Processing, 2013
Object recognition using Gabor co-occurrence similarity.
Pattern Recognition, 2013
Improved complete neighbourhood preserving embedding for face recognition.
IET Computer Vision, 2013
LHash: A Lightweight Hash Function (Full Version).
IACR Cryptology ePrint Archive, 2013
A Universal Storage Architecture for Big Data in Cloud Environment.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013
Digital Greenhouse System via WSN.
Proceedings of the Advances in Wireless Sensor Networks, 2013
Cryptanalysis of the Round-Reduced GOST Hash Function.
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013
LHash: A Lightweight Hash Function.
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013
2012
A Block Fixed Point Continuation Algorithm for Block-Sparse Reconstruction.
IEEE Signal Process. Lett., 2012
Bayesian methodology for the analysis of spatial-temporal surveillance data.
Statistical Analysis and Data Mining, 2012
Incremental complete LDA for face recognition.
Pattern Recognition, 2012
Feature Extraction Using a Complete Kernel Extension of Supervised Graph Embedding.
Neural Processing Letters, 2012
Incremental learning of complete linear discriminant analysis for face recognition.
Knowl.-Based Syst., 2012
Face recognition using discriminant sparsity neighborhood preserving embedding.
Knowl.-Based Syst., 2012
Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Grøstl.
IACR Cryptology ePrint Archive, 2012
(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others (Extended Version).
IACR Cryptology ePrint Archive, 2012
Incremental learning of discriminant common vectors for feature extraction.
Applied Mathematics and Computation, 2012
CO2 Laser Writing of Long-Period Fiber Gratings in Polarization-Maintaining Fiber under Tension.
Proceedings of the Advanced Infocomm Technology - 5th IEEE International Conference, 2012
(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others.
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012
2011
Face recognition using multi-scale differential invariants in statistical manifold framework.
IJDMMM, 2011
Known-Key Distinguisher on Round-Reduced 3D Block Cipher.
Proceedings of the Information Security Applications - 12th International Workshop, 2011
Preimage Attacks on Step-Reduced SM3 Hash Function.
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011
Indexing conceptual graph for abstracts of books.
Proceedings of the Eighth International Conference on Fuzzy Systems and Knowledge Discovery, 2011
2010
Texture Classification by Matching Co-occurrence Matrices on Statistical Manifolds.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010
2009
A novel method of the Flexible Interval S-Implication.
Proceedings of the 8th IEEE International Conference on Cognitive Informatics, 2009
2008
Face Recognition Based on Sub-image Feature Extraction and LS-SVM.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008
2007
Generic orthogonal moments: Jacobi-Fourier moments for invariant image description.
Pattern Recognition, 2007
Failure Analysis of Open Source J2EE Application Servers.
Proceedings of the Seventh International Conference on Quality Software (QSIC 2007), 2007
Character Reconstruction with Radial-Harmonic-Fourier Moments.
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007