Lingjie Zhou

According to our database1, Lingjie Zhou authored at least 12 papers between 2017 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
A Multi-Task Learning Model for Better Representation of Clothing Images.
IEEE Access, 2019

Differentiated Fashion Recommendation Using Knowledge Graph and Data Augmentation.
IEEE Access, 2019

A Resource Allocation Scheme Based on Immune Algorithm for D2D-Based Vehicular Communication Networks.
IEEE Access, 2019

Resource Allocation Schemes Based on Improved Beetle Antennae Search Algorithm for Collaborative Communication of the Unmanned Aerial Vehicle Network.
Proceedings of the Wireless and Satellite Systems, 2019

A Resource Allocation Scheme Based on Predatory Search Algorithm for Ultra-dense D2D Communications.
Proceedings of the Wireless and Satellite Systems, 2019

Edge Weight Differential Privacy Based Spectral Query Algorithm.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

Deployment Optimization Based on Hybrid Intelligent Algorithms for UAV Communications.
Proceedings of the 2019 IEEE Globecom Workshops, Waikoloa, HI, USA, December 9-13, 2019, 2019

2018
Resource Allocation Schemes Based on Intelligent Optimization Algorithms for D2D Communications Underlaying Cellular Networks.
Mob. Inf. Syst., 2018

Jensen-Shannon Divergence Based Secure Authentication Method on Smart Phones.
J. Inf. Sci. Eng., 2018

A Resource Allocation Scheme Based on Improved Bat Algorithm for D2D Communication System.
Proceedings of the Communications, Signal Processing, and Systems, 2018

2017
A Secure Authentication Method of Intelligent Terminals Based on Jensen-Shannon Divergence.
Proceedings of the International Conference on Networking and Network Applications, 2017

Multi-hop Based Centrality of a Path in Complex Network.
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017


  Loading...