Kejia Zhang
This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.
Bibliography
2025
Discov. Comput., December, 2025
TARS: MinMax Token-Adaptive Preference Strategy for Hallucination Reduction in MLLMs.
CoRR, July, 2025
When Tokens Talk Too Much: A Survey of Multimodal Long-Context Token Compression across Images, Videos, and Audios.
CoRR, July, 2025
An automatic Lithofacies sample labeling method by integrating deep learning and Gaussian mixture model.
Earth Sci. Informatics, March, 2025
Quantum claw-finding attacks on 5-round Feistel structure and generalized Feistel schemes.
Quantum Inf. Process., February, 2025
CoRR, January, 2025
Multi-label classification for image tamper detection based on Swin-T segmentation network in the spatial domain.
PeerJ Comput. Sci., 2025
Multiclassification Tampering Detection Algorithm Based on Spatial-Frequency Fusion and Swin-T.
IET Image Process., 2025
2024
Discov. Comput., December, 2024
A probabilistic fatigue life assessment method for wind turbine blade based on Bayesian GPR with the effects of pitch angle.
Qual. Reliab. Eng. Int., October, 2024
ZhoBLiMP: a Systematic Assessment of Language Models with Linguistic Minimal Pairs in Chinese.
CoRR, 2024
A Reference-free Metric for Language-Queried Audio Source Separation using Contrastive Language-Audio Pretraining.
CoRR, 2024
Proceedings of the HCI in Mobility, Transport, and Automotive Systems, 2024
2023
Construction of ecological security evaluation model of healing landscape based on deep learning.
J. Intell. Fuzzy Syst., December, 2023
A multiaxial probabilistic fatigue life prediction method for nickel-based single crystal turbine blade considering mean stress correction.
Qual. Reliab. Eng. Int., July, 2023
Future Gener. Comput. Syst., 2023
Diving with Penguins: Detecting Penguins and their Prey in Animal-borne Underwater Videos via Deep Learning.
CoRR, 2023
Decentralized Multi-Authority Ciphertext-Policy Attribute-Based Encryption with Hidden Policy for Cloud Data Sharing.
Proceedings of the 4th International Conference on Computer Engineering and Intelligent Control, 2023
2022
IEEE Trans. Circuits Syst. II Express Briefs, 2022
2021
A Lattice-Based Homomorphic Proxy Re-Encryption Scheme with Strong Anti-Collusion for Cloud Computing.
Sensors, 2021
Int. J. Comput. Appl. Technol., 2021
2020
A New Cloudlet Placement Method Based on Affinity Propagation for Cyber-Physical-Social Systems in Wireless Metropolitan Area Networks.
IEEE Access, 2020
2019
A Novel Lattice-Based Ciphertext-Policy Attribute-Based Proxy Re-encryption for Cloud Sharing.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2019
2013
Efficient distributed algorithm for correctly finding disjoint paths in wireless sensor networks.
Int. J. Sens. Networks, 2013
2005
日本學生學習華語的聲調偏誤分析: 以二字調為例 (Tonal errors of Japanese students learning Chinese: A study of disyllabic words) [In Chinese].
Proceedings of the 17th Conference on Computational Linguistics and Speech Processing, 2005