Jian Zou

According to our database1, Jian Zou authored at least 72 papers between 2007 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Bell inequality, steering, incompatibility and Leggett-Garg inequality under coarsening measurement.
Quantum Information Processing, 2018

Entanglement generation of two quantum dots with Majorana fermions via optimal control.
Quantum Information Processing, 2018

Protecting nonlocality of multipartite states by feed-forward control.
Quantum Information Processing, 2018

Matrix exponential based discriminant locality preserving projections for feature extraction.
Neural Networks, 2018

Sparse L1-norm-based linear discriminant analysis.
Multimedia Tools Appl., 2018

Cryptanalysis of the Round-Reduced Kupyna.
J. Inf. Sci. Eng., 2018

Improving the bound on the restricted isometry property constant in multiple orthogonal least squares.
IET Signal Processing, 2018

Level set evolution with sparsity constraint for object extraction.
IET Image Processing, 2018

Split Bregman Algorithm for Structured Sparse Reconstruction.
IEEE Access, 2018

MindCamera: Interactive Sketch-Based Image Retrieval and Synthesis.
IEEE Access, 2018

EVN: An Elastic Virtual Network Supporting NFV Customized and Rapid Migration.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

A Boundless Resource Orchestrator Based on Container Technology in Edge Computing.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

CASSIA: An assistant for identifying clinically and statistically significant decreases in antimicrobial susceptibility.
Proceedings of the 2018 IEEE EMBS International Conference on Biomedical & Health Informatics, 2018

2017
Analysis of various factors affecting the non-Markovian dynamics associated with a hierarchical environment based on collision model.
Quantum Information Processing, 2017

L1-norm based null space discriminant analysis.
Multimedia Tools Appl., 2017

An automatic active contour method for sea cucumber segmentation in natural underwater environments.
Computers and Electronics in Agriculture, 2017

Causal Forest vs. Naive Causal Forest in Detecting Personalization: An Empirical Study in ASSISTments.
Proceedings of the 10th International Conference on Educational Data Mining, 2017

Using a Single Model Trained across Multiple Experiments to Improve the Detection of Treatment Effects.
Proceedings of the 10th International Conference on Educational Data Mining, 2017

An Offline Evaluation Method for Individual Treatment Rules and How to Find Heterogeneous Treatment Effect.
Proceedings of the 10th International Conference on Educational Data Mining, 2017

An online spatio-temporal model for inference and predictions of taxi demand.
Proceedings of the 2017 IEEE International Conference on Big Data, BigData 2017, 2017

Leveraging Electronic Health Record Data for Community Health Assessment and Surveillance.
Proceedings of the AMIA 2017, 2017

2016
Low-Rank Matrix Factorization With Adaptive Graph Regularizer.
IEEE Trans. Image Processing, 2016

L1-norm-based principal component analysis with adaptive regularization.
Pattern Recognition, 2016

L1-norm and maximum margin criterion based discriminant locality preserving projections via trace Lasso.
Pattern Recognition, 2016

Histogram-based embedding for learning on statistical manifolds.
Pattern Anal. Appl., 2016

A New and Fast Implementation of Orthogonal LDA Algorithm and Its Incremental Extension.
Neural Processing Letters, 2016

Graph Maximum Margin Criterion for Face Recognition.
Neural Processing Letters, 2016

Generalizing intersection kernel support vector machines for color texture based recognition.
J. Visual Communication and Image Representation, 2016

Spare L1-norm-based maximum margin criterion.
J. Visual Communication and Image Representation, 2016

Efficient portfolio allocation with sparse volatility estimation for high-frequency financial data.
Proceedings of the 2016 IEEE International Conference on Big Data, 2016

2015
Quantum controlled-not gate in the bad cavity regime.
Quantum Information Processing, 2015

Incremental maximum margin criterion based on eigenvalue decomposition updating algorithm.
Mach. Vis. Appl., 2015

Incremental learning from chunk data for IDR/QR.
Image Vision Comput., 2015

Known-key distinguishers on 15-round 4-branch type-2 generalised Feistel networks with single substitution-permutation functions and near-collision attacks on its hashing modes.
IET Information Security, 2015

Cryptanalysis of the Round-Reduced Kupyna Hash Function.
IACR Cryptology ePrint Archive, 2015

Volatility matrix inference in high-frequency finance with regularization and efficient computations.
Proceedings of the 2015 IEEE International Conference on Big Data, 2015

Leveraging Health Information Exchange to Create Neighborhood Health Records for Public Health Agencies.
Proceedings of the AMIA 2015, 2015

2014
Block-sparse recovery via redundant block OMP.
Signal Processing, 2014

A Bayesian spatio-temporal approach for real-time detection of disease outbreaks: a case study.
BMC Med. Inf. & Decision Making, 2014

Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Grostl Hash Function.
J. Inf. Sci. Eng., 2014

Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes.
Frontiers Comput. Sci., 2014

A perturbation algorithm for embedding virtual data centers in multipath networks.
Proceedings of the IEEE Global Communications Conference, 2014

High-frequency financial statistics with parallel R and Intel Xeon Phi coprocessor.
Proceedings of the 2014 IEEE International Conference on Big Data, 2014

2013
Construction of general quantum channel for quantum teleportation.
Quantum Information Processing, 2013

Object recognition using Gabor co-occurrence similarity.
Pattern Recognition, 2013

Improved complete neighbourhood preserving embedding for face recognition.
IET Computer Vision, 2013

LHash: A Lightweight Hash Function (Full Version).
IACR Cryptology ePrint Archive, 2013

A Universal Storage Architecture for Big Data in Cloud Environment.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

Digital Greenhouse System via WSN.
Proceedings of the Advances in Wireless Sensor Networks, 2013

Cryptanalysis of the Round-Reduced GOST Hash Function.
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013

LHash: A Lightweight Hash Function.
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013

2012
A Block Fixed Point Continuation Algorithm for Block-Sparse Reconstruction.
IEEE Signal Process. Lett., 2012

Bayesian methodology for the analysis of spatial-temporal surveillance data.
Statistical Analysis and Data Mining, 2012

Incremental complete LDA for face recognition.
Pattern Recognition, 2012

Feature Extraction Using a Complete Kernel Extension of Supervised Graph Embedding.
Neural Processing Letters, 2012

Incremental learning of complete linear discriminant analysis for face recognition.
Knowl.-Based Syst., 2012

Face recognition using discriminant sparsity neighborhood preserving embedding.
Knowl.-Based Syst., 2012

Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Grøstl.
IACR Cryptology ePrint Archive, 2012

(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others (Extended Version).
IACR Cryptology ePrint Archive, 2012

Incremental learning of discriminant common vectors for feature extraction.
Applied Mathematics and Computation, 2012

CO2 Laser Writing of Long-Period Fiber Gratings in Polarization-Maintaining Fiber under Tension.
Proceedings of the Advanced Infocomm Technology - 5th IEEE International Conference, 2012

(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others.
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012

2011
Face recognition using multi-scale differential invariants in statistical manifold framework.
IJDMMM, 2011

Known-Key Distinguisher on Round-Reduced 3D Block Cipher.
Proceedings of the Information Security Applications - 12th International Workshop, 2011

Preimage Attacks on Step-Reduced SM3 Hash Function.
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011

Indexing conceptual graph for abstracts of books.
Proceedings of the Eighth International Conference on Fuzzy Systems and Knowledge Discovery, 2011

2010
Texture Classification by Matching Co-occurrence Matrices on Statistical Manifolds.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
A novel method of the Flexible Interval S-Implication.
Proceedings of the 8th IEEE International Conference on Cognitive Informatics, 2009

2008
Face Recognition Based on Sub-image Feature Extraction and LS-SVM.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

2007
Generic orthogonal moments: Jacobi-Fourier moments for invariant image description.
Pattern Recognition, 2007

Failure Analysis of Open Source J2EE Application Servers.
Proceedings of the Seventh International Conference on Quality Software (QSIC 2007), 2007

Character Reconstruction with Radial-Harmonic-Fourier Moments.
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007


  Loading...