Kui Zhao

Orcid: 0000-0003-1609-979X

According to our database1, Kui Zhao authored at least 29 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Precision Agriculture: Crop Mapping using Machine Learning and Sentinel-2 Satellite Imagery.
CoRR, 2024

2023
MAXFormer: Enhanced transformer for medical image segmentation with multi-attention and multi-scale features fusion.
Knowl. Based Syst., November, 2023

Are you in a Masquerade? Exploring the Behavior and Impact of Large Language Model Driven Social Bots in Online Social Networks.
CoRR, 2023

A Hybrid Feature Extraction Framework for Android Malware Detection.
Proceedings of the IEEE International Conference on High Performance Computing & Communications, 2023

2022
SybilFlyover: Heterogeneous graph-based fake account detection model on social networks.
Knowl. Based Syst., 2022

2021
Performance analysis of bit error rate of data link system under pulse LFM interference in time-varying rayleigh channel.
Wirel. Networks, 2021

Strength Development Monitoring of Cemented Paste Backfill Using Guided Waves.
Sensors, 2021

The role of pre-treatment and mid-treatment 18F-FDG PET/CT imaging in evaluating prognosis of peripheral T-cell lymphoma-not otherwise specified (PTCL-NOS).
BMC Medical Imaging, 2021

2020
Intelligent Credit Limit Management in Consumer Loans Based on Causal Inference.
CoRR, 2020

Large-scale Uncertainty Estimation and Its Application in Revenue Forecast of SMEs.
CoRR, 2020

A novel supervised learning method to generate CT images for attenuation correction in delayed pet scans.
Comput. Methods Programs Biomed., 2020

2019
Strength prediction of similar materials to ionic rare earth ores based on orthogonal test and back propagation neural network.
Soft Comput., 2019

Detection and Recognition Method of Misfire for Chamber (Deep-Hole) Blasting Based on RFID.
IEEE Access, 2019

A Unified Framework for Marketing Budget Allocation.
Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2019

2018
PRNN: Recurrent Neural Network with Persistent Memory.
CoRR, 2018

Learning and Transferring IDs Representation in E-commerce.
Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2018

Optimization of Courses System for Mining Engineering Guided by Engineering Education Accreditation.
Proceedings of the e-Learning, e-Education, and Online Training, 2018

Optimization and Practice of Talent Cultivation Scheme of "Regression Project" in Mining Engineering Specialty.
Proceedings of the e-Learning, e-Education, and Online Training, 2018

2017
Joint IDs Embedding and its Applications in E-commerce.
CoRR, 2017

Sales Forecast in E-commerce using Convolutional Neural Network.
CoRR, 2017

Effective Blog Pages Extractor for Better UGC Accessing.
CoRR, 2017

An Algorithm of Parking Planning for Smart Parking System.
CoRR, 2017

Navigation objects extraction for better content structure understanding.
Proceedings of the International Conference on Web Intelligence, 2017

Deep Style Match for Complementary Recommendation.
Proceedings of the Workshops of the The Thirty-First AAAI Conference on Artificial Intelligence, 2017

2012
EOQ principle analysis of benefit consistency of supply and demand based on comprehensive cost of quality.
Int. J. Manuf. Technol. Manag., 2012

2011
Robust stability research of a single-phase inverters with full-bridge converter.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011

2008
An Immune Multi-agent System for Network Intrusion Detection.
Proceedings of the Advances in Computation and Intelligence, Third International Symposium, 2008

2006
Immune-Based Dynamic Intrusion Response Model.
Proceedings of the Simulated Evolution and Learning, 6th International Conference, 2006

Immune Multi-agent Active Defense Model for Network Intrusion.
Proceedings of the Simulated Evolution and Learning, 6th International Conference, 2006


  Loading...