Shuzhen Wang

Orcid: 0009-0003-7004-3022

According to our database1, Shuzhen Wang authored at least 21 papers between 2004 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Hyperspectral Image Classification Based on Unsupervised Regularization.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2023

A Stock Price Prediction Method Based on BiLSTM and Improved Transformer.
IEEE Access, 2023

2022
IhybCNV: An intra-hybrid approach for CNV detection from next-generation sequencing data.
Digit. Signal Process., 2022

2021
STIC: Predicting Single Nucleotide Variants and Tumor Purity in Cancer Genome.
IEEE ACM Trans. Comput. Biol. Bioinform., 2021

2020
Underdetermined DOA Estimation Algorithm Based on an Improved Nested Array.
Wirel. Pers. Commun., 2020

Single Image Super-Resolution via a Holistic Attention Network.
Proceedings of the Computer Vision - ECCV 2020, 2020

2019
Accelerating near-field 3D imaging approach for joint high-resolution imaging and phase error correction.
Multidimens. Syst. Signal Process., 2019

2018
Joint Sparsity Constraint Interferometric ISAR Imaging for 3-D Geometry of Near-Field Targets with Sub-Apertures.
Sensors, 2018

A Deconvolution Methods Based on Retinex Prior.
Proceedings of the Big Data - 6th CCF Conference, 2018

2017
Multichannel and Wide-Angle SAR Imaging Based on Compressed Sensing.
Sensors, 2017

Nearest neighbor estimates of regression.
Comput. Stat. Data Anal., 2017

2015
DOA and Polarization Estimation Based on Sparse COLD Array.
Wirel. Pers. Commun., 2015

Towards cross-layer approaches to coping with misbehavior in mobile ad hoc networks: an anatomy of reputation systems.
Secur. Commun. Networks, 2015

Mining top-k influential nodes in social networks via community detection.
Int. J. Inf. Technol. Manag., 2015

2013
Exploring attack graph for cost-benefit security hardening: A probabilistic approach.
Comput. Secur., 2013

2012
Mobile Commerce Trust Model and its Application for Third Party Trust Service Platform.
Proceedings of the 14th IEEE International Conference on Commerce and Enterprise Computing, 2012

Research on Trust Evaluation Model for Mobile Commerce Based on Structural Equation Modeling.
Proceedings of the Ninth IEEE International Conference on e-Business Engineering, 2012

Boosting Logical Attack Graph for Efficient Security Control.
Proceedings of the Seventh International Conference on Availability, 2012

2011
Research on Web-of-Trust-Based Personalized Seller Recommendation Algorithm for E-Commerce.
Proceedings of the IEEE 8th International Conference on e-Business Engineering, 2011

2008
A Novel Evaluating Model of CPV Vocational Ability Based on SVM Multilayer Classifier.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

2004
The Design of an Inexpensive Very High Resolution Scan Camera System.
Comput. Graph. Forum, 2004


  Loading...