Peishun Liu

Orcid: 0000-0002-7746-8061

According to our database1, Peishun Liu authored at least 26 papers between 2003 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Ensemble deep random vector functional link for self-supervised direction-of-arrival estimation.
Eng. Appl. Artif. Intell., April, 2023

Sin Oc_sort: Multi-Object tracking by Re-Correct the equations of motion.
Proceedings of the 6th International Conference on Machine Learning and Machine Intelligence, 2023

Remaining useful life prediction of lithium-ion battery based on new health factor in long short-term memory network.
Proceedings of the 7th International Conference on Deep Learning Technologies, 2023

UATR-MSG-Transformer: A Deep Learning Network for Underwater Acoustic Target Recognition Based on Spectrogram Feature Fusion and Transformer with Messenger Tokens.
Proceedings of the 15th International Conference on Digital Image Processing, 2023

Semi-supervised 3D Medical Image Segmentation Using Transformer and CNN.
Proceedings of the 15th International Conference on Digital Image Processing, 2023

Synthesizing PET Scans Using Attention GAN Based on MRI Scans and Alzheimer's Disease Information.
Proceedings of the 15th International Conference on Digital Image Processing, 2023

Deep CNN- RNN with Self- Attention Model for Electric IoT Traffic Classification.
Proceedings of the 4th International Conference on Big Data & Artificial Intelligence & Software Engineering, 2023

Lazy Machine Unlearning Strategy for Random Forests.
Proceedings of the Web Information Systems and Applications, 2023

2022
Improved SEIR Model Based on Recovery Rate Optimization to Predict COVID-19.
Proceedings of the 3rd Asia Conference on Computers and Communications, 2022

Research on A Three-Dimensional Attention Module.
Proceedings of the 3rd Asia Conference on Computers and Communications, 2022

2021
Security Analysis of the First Certificateless Proxy Signature Scheme Against Malicious-But-Passive KGC Attacks.
Comput. J., 2021

StackPDB: Predicting DNA-binding proteins based on XGB-RFE feature optimization and stacked ensemble classifier.
Appl. Soft Comput., 2021

Super-Resolution Estimation of Signal Direction Based on Unsupervised Learning.
Proceedings of the 2nd Asia Conference on Computers and Communications, 2021

2020
A Two-Stream Network for Underwater Acoustic Target Classification.
Proceedings of the ICRAI 2020: 6th International Conference on Robotics and Artificial Intelligence, 2020

Underwater Acoustic Target Recognition Based on ReLU Gated Recurrent Unit.
Proceedings of the ICRAI 2020: 6th International Conference on Robotics and Artificial Intelligence, 2020

G-RNN-GAN for Singing Voice Separation.
Proceedings of the ICMSSP 2020: 5th International Conference on Multimedia Systems and Signal Processing, 2020

High Beam Detection Method Based on Deep Learning.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

Underwater Acoustic Target Classification Based on LOFAR Spectrum and Convolutional Neural Network.
Proceedings of the AIAM2020: 2nd International Conference on Artificial Intelligence and Advanced Manufacture, 2020

2018
基于公私属性的多授权中心加密方案 (Multi-authority Encryption Scheme Based on Public and Private Attributes).
计算机科学, 2018

2009
Identification of Malicious Web Pages by Inductive Learning.
Proceedings of the Web Information Systems and Mining, International Conference, 2009

2008
A Method for Constructing Lattice Implication Algebras on the Interval [0, 1].
Proceedings of the Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008

Models for Lattice-Valued First-Order Logic LF(X).
Proceedings of the Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008

2006
Hill Climbing-Based Decentralized Job Scheduling on Computational Grids.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

An Identification System Combined with Fingerprint and Cryptography.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

2004
Worm detection using CPN.
Proceedings of the IEEE International Conference on Systems, 2004

2003
Model theory and closure operators of lattice-valued propositional logic LP(X).
Proceedings of the IEEE International Conference on Systems, 2003


  Loading...