Kejia Zhang

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2024
UoloNet: based on multi-tasking enhanced small target medical segmentation model.
Artif. Intell. Rev., February, 2024

2023
Construction of ecological security evaluation model of healing landscape based on deep learning.
J. Intell. Fuzzy Syst., December, 2023

Adversarial attack for object detectors under complex conditions.
Comput. Secur., November, 2023

A multiaxial probabilistic fatigue life prediction method for nickel-based single crystal turbine blade considering mean stress correction.
Qual. Reliab. Eng. Int., July, 2023

Robust Semisupervised Federated Learning for Images Automatic Recognition in Internet of Drones.
IEEE Internet Things J., April, 2023

A new quantum-inspired solution to blind millionaires' problem.
Quantum Inf. Process., January, 2023

Multiscale and Multisubgraph-Based Segmentation Method for Ocean Remote Sensing Images.
IEEE Trans. Geosci. Remote. Sens., 2023

Malignant melanoma dermoscopy image classification method based on multi-modal medical features.
IET Image Process., 2023

Affordable federated edge learning framework via efficient Shapley value estimation.
Future Gener. Comput. Syst., 2023

A Spatio-Temporal Heterogeneity Data Accuracy Detection Method Fused by GCN and TCN.
Comput. Syst. Sci. Eng., 2023

Tight Sandstone Image Augmentation for Image Identification Using Deep Learning.
Comput. Syst. Sci. Eng., 2023

Synth-AC: Enhancing Audio Captioning with Synthetic Supervision.
CoRR, 2023

Diving with Penguins: Detecting Penguins and their Prey in Animal-borne Underwater Videos via Deep Learning.
CoRR, 2023

Enriching Semantic Features for Medical Report Generation.
Proceedings of the Natural Language Processing and Chinese Computing, 2023

Design and Implementation of Key-Value Database for Ship Virtual Test Platform Based on Distributed System.
Proceedings of the Data Science, 2023

Decentralized Multi-Authority Ciphertext-Policy Attribute-Based Encryption with Hidden Policy for Cloud Data Sharing.
Proceedings of the 4th International Conference on Computer Engineering and Intelligent Control, 2023

Energy Efficient Federated Learning Joint Communication and Computation Framework Over Wireless Networks.
Proceedings of the 4th International Conference on Computer Engineering and Intelligent Control, 2023

Multi-level Relational Reasoning and Attention Network for Medical Visual Question Answering.
Proceedings of the IEEE International Conference on High Performance Computing & Communications, 2023

Dual-Path Side Information Fusion for Sequential Recommendation.
Proceedings of the IEEE International Conference on Big Data, 2023

A Weak Supervision-based Robust Pretraining Method for Medical Visual Question Answering.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2023

2022
VETAM-M: A General Model for Voltage-Controlled Memcapacitive-Coupled Memristors.
IEEE Trans. Circuits Syst. II Express Briefs, 2022

Multiple-Layer Security Threats on the Ethereum Blockchain and Their Countermeasures.
Secur. Commun. Networks, 2022

Practical anonymous entanglement with noisy measurement.
Quantum Inf. Process., 2022

Skin lesion image classification method based on extension theory and deep learning.
Multim. Tools Appl., 2022

AMAM: An Attention-based Multimodal Alignment Model for Medical Visual Question Answering.
Knowl. Based Syst., 2022

CMSuG: Competitive mechanism-based superpixel generation method for image segmentation.
J. Intell. Fuzzy Syst., 2022

A Novel Deterministic Threshold Proxy Re-Encryption Scheme From Lattices.
Int. J. Inf. Secur. Priv., 2022

A New Quantum Multiparty Simultaneous Identity Authentication Protocol with the Classical Third-Party.
Entropy, 2022

NeDSeM: Neutrosophy Domain-Based Segmentation Method for Malignant Melanoma Images.
Entropy, 2022

Robust Semi-supervised Federated Learning for Images Automatic Recognition in Internet of Drones.
CoRR, 2022

M2FNet: Multi-granularity Feature Fusion Network for Medical Visual Question Answering.
Proceedings of the PRICAI 2022: Trends in Artificial Intelligence, 2022

VMEKNet: Visual Memory and External Knowledge Based Network for Medical Report Generation.
Proceedings of the PRICAI 2022: Trends in Artificial Intelligence, 2022

Identity-Based Deterministic Proxy Re-Encryption Scheme on Lattice.
Proceedings of the 6th International Conference on Computer Science and Application Engineering, 2022

Interspaces Between Nature and the City.
Proceedings of the Tenth International Symposium of Chinese CHI, 2022

MACNet: Multi-Attention and Context Network for Polyp Segmentation.
Proceedings of the Web and Big Data - 6th International Joint Conference, 2022

Automatic Report Generation Method based on Multiscale Feature Extraction and Word Attention Network.
Proceedings of the Web and Big Data - 6th International Joint Conference, 2022

2021
Air Quality Prediction Model Based on Spatiotemporal Data Analysis and Metalearning.
Wirel. Commun. Mob. Comput., 2021

Privacy Threats of Acoustic Covert Communication among Smart Mobile Devices.
Wirel. Commun. Mob. Comput., 2021

A Lattice-Based Homomorphic Proxy Re-Encryption Scheme with Strong Anti-Collusion for Cloud Computing.
Sensors, 2021

Life-threatening arrhythmias recognition by pulse-to-pulse intervals analysis.
Int. J. Comput. Appl. Technol., 2021

A Quantum Dual-Signature Protocol Based on SNOP States without Trusted Participant.
Entropy, 2021

MuVAM: A Multi-View Attention-based Model for Medical Visual Question Answering.
CoRR, 2021

A Novel Quantum Sequential Signature Protocol With Y-SNOP States.
IEEE Access, 2021

Channel Context and Dual-Domain Attention Based U-Net for Skin Lesion Attributes Segmentation.
Proceedings of the Data Science, 2021

2020
Quantum anonymous ranking and selection with verifiability.
Quantum Inf. Process., 2020

A coalition-structure's generation method for solving cooperative computing problems in edge computing environments.
Inf. Sci., 2020

A New Cloudlet Placement Method Based on Affinity Propagation for Cyber-Physical-Social Systems in Wireless Metropolitan Area Networks.
IEEE Access, 2020

Research on the Feature Selection Approach Based on IFDS and DPSO With Variable Thresholds in Complex Data Environments.
IEEE Access, 2020

WISE: Word-Level Interaction-Based Multimodal Fusion for Speech Emotion Recognition.
Proceedings of the Interspeech 2020, 2020

2019
DOAMI: A distributed on-line algorithm to minimize interference for routing in wireless sensor networks.
Theor. Comput. Sci., 2019

A Novel Lattice-Based CP-ABPRE Scheme for Cloud Sharing.
Symmetry, 2019

A Novel Method for Location Privacy Protection in LBS Applications.
Secur. Commun. Networks, 2019

A new <i>n</i>-party quantum secret sharing model based on multiparty entangled states.
Quantum Inf. Process., 2019

A multi-focus image fusion algorithm in 5G communications.
Multim. Tools Appl., 2019

Task allocation based on modified contract net protocol under generalized cluster.
J. Comput. Methods Sci. Eng., 2019

Scheduling strategy for computational-intensive data flow in generalized cluster environments.
Appl. Soft Comput., 2019

Secure Mining of Association Rules in Distributed Datasets.
IEEE Access, 2019

A Prediction Method for Destination Based on the Semantic Transfer Model.
IEEE Access, 2019

A Novel Lattice-Based Ciphertext-Policy Attribute-Based Proxy Re-encryption for Cloud Sharing.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2019

2018
Research on Trajectory Data Releasing Method via Differential Privacy Based on Spatial Partition.
Secur. Commun. Networks, 2018

Security analysis with improved design of post-confirmation mechanism for quantum sealed-bid auction with single photons.
Quantum Inf. Process., 2018

HRR: a data cleaning approach preserving local differential privacy.
Int. J. Distributed Sens. Networks, 2018

Spatio-temporal Trajectory Dataset Privacy Based on Network Traffic Control.
CoRR, 2018

Lclean: A Plausible Approach to Individual Trajectory Data Sanitization.
IEEE Access, 2018

2017
RiPPAS: A Ring-Based Privacy-Preserving Aggregation Scheme in Wireless Sensor Networks.
Sensors, 2017

An improved arbitrated quantum signature protocol based on the key-controlled chained CNOT encryption.
Quantum Inf. Process., 2017

Optimal Task Recommendation for Spatial Crowdsourcing with Privacy Control.
Proceedings of the Data Science, 2017

2016
OFDP: a distributed algorithm for finding disjoint paths with minimum total length in wireless sensor networks.
J. Comb. Optim., 2016

2015
A novel quantum group signature scheme without using entangled states.
Quantum Inf. Process., 2015

Metric and Distributed On-Line Algorithm for Minimizing Routing Interference in Wireless Sensor Networks.
Proceedings of the Combinatorial Optimization and Applications, 2015

2014
DFDP: A Distributed Algorithm for Finding Disjoint Paths in Wireless Sensor Networks with Correctness Guarantee.
Int. J. Distributed Sens. Networks, 2014

OFDP: A Distributed Algorithm for Finding Disjoint Paths with Minimum Total Energy Cost in Wireless Sensor Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2014

Protecting Location Privacy Based on Historical Users over Road Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2014

2013
Security analysis of quantum multi-signature protocol based on teleportation.
Quantum Inf. Process., 2013

Improving the security of arbitrated quantum signature against the forgery attack.
Quantum Inf. Process., 2013

Cryptanalysis and improvement of the quantum private comparison protocol with semi-honest third party.
Quantum Inf. Process., 2013

Reexamination of arbitrated quantum signature: the impossible and the possible.
Quantum Inf. Process., 2013

A quantum protocol for millionaire problem with Bell states.
Quantum Inf. Process., 2013

Efficient distributed algorithm for correctly finding disjoint paths in wireless sensor networks.
Int. J. Sens. Networks, 2013

2011
Finding multiple induced disjoint paths in general graphs.
Inf. Process. Lett., 2011

2007
Unsupervised Outlier Detection in Sensor Networks Using Aggregation Tree.
Proceedings of the Advanced Data Mining and Applications, Third International Conference, 2007

2005
日本學生學習華語的聲調偏誤分析: 以二字調為例 (Tonal errors of Japanese students learning Chinese: A study of disyllabic words) [In Chinese].
Proceedings of the 17th Conference on Computational Linguistics and Speech Processing, 2005


  Loading...