Juan Zhang

According to our database1, Juan Zhang authored at least 134 papers between 2004 and 2019.

Collaborative distances:



In proceedings 
PhD thesis 


On csauthors.net:


Active Battery Equalization Method Based on Redundant Battery for Electric Vehicles.
IEEE Trans. Vehicular Technology, 2019

Lie Symmetry Analysis and Exact Solutions of Generalized Fractional Zakharov-Kuznetsov Equations.
Symmetry, 2019

An integrated inverse space sparse representation framework for tumor classification.
Pattern Recognition, 2019

The matrix bounds and fixed-point iteration for the solution of the discrete algebraic Riccati equation.
IMA J. Math. Control & Information, 2019

The optimization of parallel convolutional RBM based on Spark.
IJWMIP, 2019

DD-CycleGAN: Unpaired image dehazing via Double-Discriminator Cycle-Consistent Generative Adversarial Network.
Eng. Appl. of AI, 2019

Polarimetric multiple-radar architectures with distributed antennas for discriminating between radar targets and deception jamming.
Digital Signal Processing, 2019

Multidimensional Phase Recovery and Interpolative Decomposition Butterfly Factorization.
CoRR, 2019

Dynamical Analysis of the SEIB Model for Brucellosis Transmission to the Dairy Cows with Immunological Threshold.
Complexity, 2019

Lower bounds of error estimates for singular perturbation problems with Jacobi-Spectral approximations.
Appl. Math. Lett., 2019

Discrimination of Active False Targets Based on Hermitian Distance for Distributed Multiple-Radar Architectures.
IEEE Access, 2019

Single Image Snow Removal via Composition Generative Adversarial Networks.
IEEE Access, 2019

A Pedestrian Detection Model Based on Binocular Information Fusion.
Proceedings of the 28th Wireless and Optical Communications Conference, 2019

An Anti-Occlusion Correlation Filter Algorithm for Visual Tracking.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

Depth Camera Based Fluid Reconstruction and its Solid-fluid Interaction.
Proceedings of the 32nd International Conference on Computer Animation and Social Agents, 2019

A healthy node selection method based on particle swarm optimization under network intrusion environment.
Proceedings of the ACM Turing Celebration Conference - China, 2019

SIM-RPM: Secure Incentive Mechanism for Crowdsourcing-Based Road Pavement Monitoring System.
Wireless Personal Communications, 2018

Damage Detection of Concrete-Filled Square Steel Tube (CFSST) Column Joints under Cyclic Loading Using Piezoceramic Transducers.
Sensors, 2018

Damage Detection of L-Shaped Concrete Filled Steel Tube (L-CFST) Columns under Cyclic Loading Using Embedded Piezoceramic Transducers.
Sensors, 2018

Retrieval of the Fine-Mode Aerosol Optical Depth over East China Using a Grouped Residual Error Sorting (GRES) Method from Multi-Angle and Polarized Satellite Data.
Remote Sensing, 2018

Multiperspective Target Tracking Approach for Doppler Through-Wall Radar.
IEEE Geosci. Remote Sensing Lett., 2018

Efficient identity-based data transmission for VANET.
J. Ambient Intelligence and Humanized Computing, 2018

Relay Translation Policies based on State Pruning for Ad Hoc Networks.
I. J. Robotics and Automation, 2018

ACMHS: Efficient access control for mobile health care system.
Int. J. Communication Systems, 2018

Stable and realistic crack pattern generation using a cracking node method.
Frontiers Comput. Sci., 2018

Low Rank Variation Dictionary and Inverse Projection Group Sparse Representation Model for Breast Tumor Classification.
CoRR, 2018

Breast Tumor Classification Based on Decision Information Genes and Inverse Projection Sparse Representation.
CoRR, 2018

Individualized analysis of differentially expressed miRNAs with application to the identification of miRNAs deregulated commonly in lung cancer tissues.
Briefings in Bioinformatics, 2018

Supply chain decisions with reference quality effect under the O2O environment.
Annals OR, 2018

An approximation scheme for the time fractional convection-diffusion equation.
Applied Mathematics and Computation, 2018

The Nekrasov diagonally dominant degree on the Schur complement of Nekrasov matrices and its applications.
Applied Mathematics and Computation, 2018

Data Fusion-Based Multi-Object Tracking for Unconstrained Visual Sensor Networks.
IEEE Access, 2018

Experimental Study on Stress Monitoring of Sand-Filled Steel Tube during Impact Using Piezoceramic Smart Aggregates.
Sensors, 2017

SCPR: Secure Crowdsourcing-Based Parking Reservation System.
Security and Communication Networks, 2017

Data-Driven Modeling for Chinese Ancient Architecture.
Presence, 2017

The improved eigenvalue bounds for the solution of the discrete algebraic Riccati equation.
IMA J. Math. Control & Information, 2017

Lower bounds on eigenvalue summation for the solution of the Lyapunov matrix differential equation.
IMA J. Math. Control & Information, 2017

The solution bounds and fixed point iterative algorithm for the discrete coupled algebraic Riccati equation applied to automatic control.
IMA J. Math. Control & Information, 2017

Nash Equilibria of Co-Operative Advertising Programs with Advertising Threshold Effects.
International Journal of Information Technology and Decision Making, 2017

New matrix bounds and iterative algorithms for the discrete coupled algebraic Riccati equation.
Int. J. Control, 2017

Adaptive detection with conic rejection to suppress deceptive jamming for frequency diverse MIMO radar.
Digital Signal Processing, 2017

Cooperative Advertising with Accrual Rate in a Dynamic Supply Chain.
Dynamic Games and Applications, 2017

Error estimates of spectral element methods with generalized Jacobi polynomials on an interval.
Appl. Math. Lett., 2017

Assessing reappearance factors of H7N9 avian influenza in China.
Applied Mathematics and Computation, 2017

A 6GS/S 8-Bit Current Steering DAC with Optimized Current Switch Drive.
Proceedings of the 7th International Joint Conference on Pervasive and Embedded Computing and Communication Systems (PECCS 2017), 2017

Identity-based key management for wireless sensor networks using lagrange interpolation.
Security and Communication Networks, 2016

Comparing keywords plus of WOS and author keywords: A case study of patient adherence research.
JASIST, 2016

Efficient privacy-preserving third-party auditing for ambient intelligence systems.
J. Ambient Intelligence and Humanized Computing, 2016

Push and Pull Contracts in a Local Supply Chain with an Outside Market.
Decision Sciences, 2016

Galerkin spectral approximations for optimal control problems governed by the fourth order equation with an integral constraint on state.
Computers & Mathematics with Applications, 2016

The a posteriori error estimates of Chebyshev-Petrov-Galerkin methods for second-order equations.
Appl. Math. Lett., 2016

Global dynamics of a predator-prey system modeling by metaphysiological approach.
Applied Mathematics and Computation, 2016

A mesh-insensitive elastic model for simulation of solid bodies.
Proceedings of the 15th ACM SIGGRAPH Conference on Virtual-Reality Continuum and Its Applications in Industry, 2016

An automatic positioning algorithm for archaeological fragments.
Proceedings of the 15th ACM SIGGRAPH Conference on Virtual-Reality Continuum and Its Applications in Industry, 2016

Comparative analysis of the supply situation of Chinese medicine service system in hubei province.
Proceedings of the International Conference on Logistics, Informatics and Service Sciences, 2016

Echo correlation analysis of targets with dominant scatterers in diversity MIMO radar.
Proceedings of the 2016 IEEE International Geoscience and Remote Sensing Symposium, 2016

Multi-scale Deep Residual Networks for Fine-Grained Image Classification.
Proceedings of the Digital TV and Wireless Multimedia Communication, 2016

Video-Quality-Driven Resource Allocation for Real-Time Surveillance Video Uplinking Over OFDMA-Based Wireless Networks.
IEEE Trans. Vehicular Technology, 2015

Study of Multi-Armed Bandits for Energy Conservation in Cognitive Radio Sensor Networks.
Sensors, 2015

Bibliometric analysis for the literature of traditional Chinese medicine in PubMed.
Scientometrics, 2015

Circuit simulation on control and synchronization of fractional order switching chaotic system.
Mathematics and Computers in Simulation, 2015

PKDIP: Efficient Public-Key-Based Data Integrity Protection for Wireless Image Sensors.
J. Sensors, 2015

Predication and control of chaotic characteristics by the maximum Lyapunov exponents in PIM filling process.
Proceedings of the 2015 International Conference on Machine Learning and Cybernetics, 2015

Research on the Application of Face Symbol in Thematic Map Making.
Proceedings of the 2015 IEEE International Conference on Multimedia Big Data, BigMM 2015, 2015

Computer-Aided Diagnosis of Breast DCE-MRI Images Using Bilateral Asymmetry of Contrast Enhancement Between Two Breasts.
J. Digital Imaging, 2014

Energy-Efficient Policy Based on Cross-Layer Cooperation in Wireless Communication.
IJDSN, 2014

Improving the prediction of chemotherapeutic sensitivity of tumors in breast cancer via optimizing the selection of candidate genes.
Computational Biology and Chemistry, 2014

Dynamical analysis and perturbation solution of an SEIR epidemic model.
Applied Mathematics and Computation, 2014

Transmission dynamics of a multi-group brucellosis model with mixed cross infection in public farm.
Applied Mathematics and Computation, 2014

Self-calibration method without joint iteration for distributed small satellite SAR systems.
EURASIP J. Adv. Sig. Proc., 2013

Intensity based image registration by minimizing exponential function weighted residual complexity.
Comp. in Bio. and Med., 2013

Investigating the concordance of Gene Ontology terms reveals the intra- and inter-platform reproducibility of enrichment analysis.
BMC Bioinformatics, 2013

Association between bilateral asymmetry of kinetic features computed from the DCE-MRI images and breast cancer.
Proceedings of the Medical Imaging 2013: Computer-Aided Diagnosis, 2013

Practical and Secure Outsourcing of Linear Algebra in the Cloud.
Proceedings of the International Conference on Advanced Cloud and Big Data, 2013

Hybridizing Differential Evolution and Particle Swarm Optimization to Design Powerful Optimizers: A Review and Taxonomy.
IEEE Trans. Systems, Man, and Cybernetics, Part C, 2012

Comparison of Power Transfer Characteristics between CPT and IPT System and Mutual Inductance Optimization for IPT System.
JCP, 2012

New matrix bounds, an existence uniqueness and a fixed-point iterative algorithm for the solution of the unified coupled algebraic Riccati equation.
Int. J. Comput. Math., 2012

Pattern formation of a spatial predator-prey system.
Applied Mathematics and Computation, 2012

Multi-instance learning for mass retrieval in digitized mammograms.
Proceedings of the Medical Imaging 2012: Computer-Aided Diagnosis, 2012

Perceptual mass segmentation using eye-tracking and seed-growing.
Proceedings of the Medical Imaging 2012: Computer-Aided Diagnosis, 2012

An Evaluation Model in Software Testing Based on AHP.
Proceedings of the 2012 IEEE/ACIS 11th International Conference on Computer and Information Science, Shanghai, China, May 30, 2012

An Efficient Rule-Based Constructive Heuristic to Solve Dynamic Weapon-Target Assignment Problem.
IEEE Trans. Systems, Man, and Cybernetics, Part A, 2011

A CPN-based Software Testing Approach.
JSW, 2011

Empirical likelihood confidence region for parameters in linear errors-in-variables models with missing data.
J. Systems Science & Complexity, 2011

New solution bounds for the continuous algebraic Riccati equation.
J. Franklin Institute, 2011

Bounds for the eigenvalues of the continuous algebraic Riccati equation.
Int. J. Systems Science, 2011

The existence uniqueness and the fixed iterative algorithm of the solution for the discrete coupled algebraic Riccati equation.
Int. J. Control, 2011

Upper solution bounds of the continuous coupled algebraic Riccati matrix equation.
Int. J. Control, 2011

A complex network model of polymer melts without growth.
Computers & Mathematics with Applications, 2011

Influence of removable devices on computer worms: Dynamic analysis and control strategies.
Computers & Mathematics with Applications, 2011

High positive correlation between soil temperature and NDVI from 1982 to 2006 in alpine meadow of the Three-River Source Region on the Qinghai-Tibetan Plateau.
Int. J. Applied Earth Observation and Geoinformation, 2011

Passive Data Storage Based Housewares Store Management System.
Proceedings of the Web Information Systems and Mining - International Conference, 2011

A Zone-Diffusion Based Routing Protocol for LEO Satellite Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2011

Cooperative Advertising with Reference Price Effect.
Proceedings of the LISS 2011 - Proceedings of the 1st International Conference on Logistics, Informatics and Service Science, Volume 1, Beijing, China, 8, 2011

An Efficient Ensemble Method for Classifying Skewed Data Streams.
Proceedings of the Bio-Inspired Computing and Applications, 2011

Using Ontology to Build Information Recommendation System in e-Commerce.
Proceedings of the Advances in Computer Science, 2011

The Research of Construction Ontology-Based Material Management System in e-Commerce.
Proceedings of the Advances in Computer Science, 2011

Clustering coefficients in a growing network model of polymer melts.
Proceedings of the 4th International Conference on Biomedical Engineering and Informatics, 2011

Professional tennis player ranking strategy based Monte Carlo feature selection.
Proceedings of the 2011 IEEE International Conference on Bioinformatics and Biomedicine Workshops, 2011

Identifying Ovarian Cancer Chemotherapy Response Relevant Gene Cliques.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2011

QP Based Framework for Development and Formal Verification of Flight Control Software of UAV.
Proceedings of the Artificial Intelligence and Computational Intelligence, 2011

Efficient Decision Makings for Dynamic Weapon-Target Assignment by Virtual Permutation and Tabu Search Heuristics.
IEEE Trans. Systems, Man, and Cybernetics, Part C, 2010

A Novel Authentication Protocol for Wireless Access Security.
JCIT, 2010

Formal modelling and analysis of HLA architectural style.
IJMIC, 2010

Hopf bifurcation of a bacteria-immunity system with delayed quorum sensing.
Applied Mathematics and Computation, 2010

The dominant degree and disc theorem for the Schur complement of matrix.
Applied Mathematics and Computation, 2010

Design and Implementation of Crop Recommendation Fertilization Decision System Based on WEBGIS at Village Scale.
Proceedings of the Computer and Computing Technologies in Agriculture IV, 2010

Ant Colony Optimization Algorithm Based on Immunity Vaccine and Dynamic Pheromone Updating.
Proceedings of the ICDMW 2010, 2010

A new multi-view identification scheme for breast masses in mammography using multi-agent algorithm.
Proceedings of the 8th IEEE International Conference on Control and Automation, 2010

Parallel algorithm design for remote sensing image processing in the PC cluster environment.
Proceedings of the 18th International Conference on Geoinformatics: GIScience in Change, 2010

Malaria Cell Counting Diagnosis within Large Field of View.
Proceedings of the International Conference on Digital Image Computing: Techniques and Applications, 2010

The combining prediction of the RMB exchange rate series based on diverse architectural artificial neural network ensemble methodology.
Proceedings of the Fifth International Conference on Bio-Inspired Computing: Theories and Applications, 2010

Improved mammographic mass retrieval performance using multi-view information.
Proceedings of the 2010 IEEE International Conference on Bioinformatics and Biomedicine, 2010

Evaluating Software Maintainability Using Fuzzy Entropy Theory.
Proceedings of the 9th IEEE/ACIS International Conference on Computer and Information Science, 2010

Optimal Contraction Theorem for Exploration-Exploitation Tradeoff in Search and Optimization.
IEEE Trans. Systems, Man, and Cybernetics, Part A, 2009

The Comparison and Application of Corner Detection Algorithms.
Journal of Multimedia, 2009

Managing Handover Authentication in Big-domain Wireless Environment.
JCIT, 2009

The numerical solution of fifth-order boundary value problems by the variational iteration method.
Computers & Mathematics with Applications, 2009

Evolutionary decision-makings for the dynamic weapon-target assignment problem.
Science in China Series F: Information Sciences, 2009

Classification tree modeling to identify severe and moderate vehicular injuries in young and middle-aged adults.
Artificial Intelligence in Medicine, 2009

Test Case Reuse Based on Ontology.
Proceedings of the 2009 15th IEEE Pacific Rim International Symposium on Dependable Computing, 2009

Modeling Software Testing Process Using HTCPN.
Proceedings of the Fourth International Conference on Frontier of Computer Science and Technology, 2009

Application of Fuzzy Mathematics Assessment to Groundwater Quality in Jining City.
Proceedings of the 2009 International Conference on Environmental Science and Information Application Technology, 2009

Scale-Free Networks with Different Types of Nodes.
Proceedings of the Complex Sciences, 2009

Web Document Classification Based on Fuzzy k-NN Algorithm.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

Retrieving articulated 3-D models using medial surfaces.
Mach. Vis. Appl., 2008

Analysis of a periodic bacteria-immunity model with delayed quorum sensing.
Computers & Mathematics with Applications, 2008

Using Genetic Algorithm to Improve Fuzzy k-NN.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

3D Model Retrieval Using Medial Surfaces.
Proceedings of the Medial Representations, 2008

Variational approach to solitary wave solution of the generalized Zakharov equation.
Computers & Mathematics with Applications, 2007

Robust Time-optimal Algorithm of Constrained Systems with Parametric Uncertainties.
Proceedings of the Ninth International Conference on Control, 2006

A compartmental model for the analysis of SARS transmission patterns and outbreak control measures in China.
Applied Mathematics and Computation, 2005

Retrieving Articulated 3-D Models Using Medial Surfaces and Their Graph Spectra.
Proceedings of the Energy Minimization Methods in Computer Vision and Pattern Recognition, 2005

The Application of Nonaffine Network Structural Model in Sine Pulsating Flow Field.
Proceedings of the Computational and Information Science, First International Symposium, 2004