Junhua Chen

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2025
Visibility graph and graph convolution networks-based segmentation of carbon emission in China.
Ann. Oper. Res., May, 2025

A sequential simulation method for probability box uncertainty analysis of structural responses.
Reliab. Eng. Syst. Saf., 2025

A reliability-based design optimization strategy using quantile surrogates by improved PC-kriging.
Reliab. Eng. Syst. Saf., 2025

CELAN: An efficient layer aggregation network based on the attention mechanism and large-kernel architecture for small-object detection tasks.
Knowl. Based Syst., 2025

Sequential Controlled Langevin Diffusions.
Proceedings of the Thirteenth International Conference on Learning Representations, 2025

2024
Design and Development of an Integrated Virtual-Reality Training Simulation Sand Table for Rail Systems.
Inf., March, 2024

A novel second-order mixture importance sampling strategy for system reliability analysis.
Qual. Reliab. Eng. Int., February, 2024

Research on the joint event extraction method orientates food live e-commerce.
Electron. Commer. Res. Appl., 2024

Corrigendum to "A clustering-based automatic registration of UAV and terrestrial LiDAR forest point clouds" [Comput. Electron. Agric., 217 (2024) 108648].
Comput. Electron. Agric., 2024

A clustering-based automatic registration of UAV and terrestrial LiDAR forest point clouds.
Comput. Electron. Agric., 2024

Hi-ZNS: High Space Efficiency and Zero-Copy LSM-Tree Based Stores on ZNS SSDs.
Proceedings of the 53rd International Conference on Parallel Processing, 2024

2023
High-speed train timetable optimization based on space-time network model and quantum simulator.
Quantum Inf. Process., November, 2023

Dynamic reliability analysis of gear transmission system based on sparse grid numerical integration and saddle-point approximation method.
Qual. Reliab. Eng. Int., February, 2023

Mining Firm-level Uncertainty in Stock Market: A Text Mining Approach.
Proceedings of the 27th Pacific Asia Conference on Information Systems, 2023

K-DLM: A Domain-Adaptive Language Model Pre-Training Framework with Knowledge Graph.
Proceedings of the Artificial Neural Networks and Machine Learning, 2023

Multi-UAV Cooperative Reconnaissance Task Allocation Based on IEPPSO Algorithm.
Proceedings of the Computer Supported Cooperative Work and Social Computing, 2023

2022
Time-dependent kinematic reliability analysis of gear mechanism based on sequential decoupling strategy and saddle-point approximation.
Reliab. Eng. Syst. Saf., 2022

Class Change Prediction by Incorporating Community Smell: An Empirical Study.
Int. J. Softw. Eng. Knowl. Eng., 2022

A two stage risk assessment model based on interval-valued fuzzy numbers and risk attitudes.
Eng. Appl. Artif. Intell., 2022

Safety Helmet Wearing Detection Based on A Lightweight YOLOv4 Algorithm.
Proceedings of the 2022 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2022

2021
Study on Customized Shuttle Transit Mode Responding to Spatiotemporal Inhomogeneous Demand in Super-Peak.
Inf., 2021

Python Code Smell Refactoring Route Generation Based on Association Rule and Correlation.
Int. J. Softw. Eng. Knowl. Eng., 2021

Research on regional standardization cooperation in the Guangdong-Hong Kong-Macao Greater Bay Area.
Proceedings of the ICEME 2021: The 12th International Conference on E-business, Management and Economics, Beijing, China, July 17, 2021

2020
Learning Semantic Representations from Directed Social Links to Tag Microblog Users at Scale.
ACM Trans. Inf. Syst., 2020

A Survey on Chinese as Second Language Learners' Acquisition of the Structural Auxiliary Word "de" (的).
Proceedings of the Chinese Lexical Semantics - 21st Workshop, 2020

Revisiting Alternative Experimental Settings for Evaluating Top-N Item Recommendation Algorithms.
Proceedings of the CIKM '20: The 29th ACM International Conference on Information and Knowledge Management, 2020

2019
Preference modeling by exploiting latent components of ratings.
Knowl. Inf. Syst., 2019

Dynamics and Bifurcation Analysis of a Filippov Predator-Prey Ecosystem in a Seasonally Fluctuating Environment.
Int. J. Bifurc. Chaos, 2019

Futures price prediction modeling and decision-making based on DBN deep learning.
Intell. Data Anal., 2019

The Smell of Blood: Evaluating Anemia and Bloodshot Symptoms in Web Applications.
Proceedings of the 31st International Conference on Software Engineering and Knowledge Engineering, 2019

Single-Image Super-Resolution via Multiple Matrix-Valued Kernel Regression.
Proceedings of the 2019 International Conference on Machine Learning and Cybernetics, 2019

2018
A multi-experts and multi-criteria risk assessment model for safety risks in oil and gas industry integrating risk attitudes.
Knowl. Based Syst., 2018

大规模网络总体通讯性及其效率评价分析 (Total Communication and Efficiency Analysis of Large Scale Networks).
计算机科学, 2018

基于DBN深度学习的期货市场价格预测建模与决策 (Modeling and Decision-making of Futures Market Price Prediction with DBN).
计算机科学, 2018

基于相对熵的节点影响力测量方法 (Measuring Method of Node Influence Based on Relative Entropy).
计算机科学, 2018

Piece-Wise Kernel Regression for Example-Based Super-Resolution.
Proceedings of the 2018 International Conference on Machine Learning and Cybernetics, 2018

Research on Extraction Method of Credit Risk Analysis of Corporate Bonds Based on Convolutional Neural Network.
Proceedings of the Fuzzy Systems and Data Mining IV, 2018

2017
多智能体系构架下的属性图分布式聚类算法 (Distributed and Heterogeneous Multi-agent System for Attributed Graph Clustering).
计算机科学, 2017

An Online Approach for Kernel-level Keylogger Detection and Defense.
J. Inf. Sci. Eng., 2017

A Price Driven Hazard Approach to User Retention.
CoRR, 2017

Extracting sample data based on poisson distribution.
Proceedings of the 2017 International Conference on Machine Learning and Cybernetics, 2017

2016
A Secure and Efficient Kernel Log Transfer Mechanism for Virtualization Environments.
J. Inf. Sci. Eng., 2016

A Heuristic Method of Identifying Key Microbloggers.
Proceedings of the Inclusive Smart Cities and Digital Health, 2016

2015
Real-Time Monitoring of Privacy Abuses and Intrusion Detection in Android System.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015

2013
QoS Deployment Strategies Evaluation in PTN based Power Communication Networks.
J. Softw., 2013

2011
Research on Improving the Quality of the Normal Students by Asking the Effective Questions with Multimedia Technology in Chemistry Classroom.
Proceedings of the Advances in Computer Science, Environment, Ecoinformatics, and Education, 2011

2009
Research on Attack Intention Recognition Based on Graphical Model.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

Modeling and Analyzing the Spread of Worms with Bilinear Incidence Rate.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2004
Advanced mirrored-pyramid broadcasting for video-on-demand.
IEEE Trans. Consumer Electron., 2004


  Loading...