Tianle Zhang

According to our database1, Tianle Zhang authored at least 41 papers between 2008 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2021
A method of chained recommendation for charging piles in internet of vehicles.
Computing, 2021

2020
Neural network algorithm based on Legendre improved extreme learning machine for solving elliptic partial differential equations.
Soft Comput., 2020

Rock slope stability analysis and charts based on hybrid online sequential extreme learning machine model.
Earth Sci. Informatics, 2020

Land-use classification via ensemble dropout information discriminative extreme learning machine based on deep convolution feature.
Comput. Sci. Inf. Syst., 2020

The method of Internet of Things access and network communication based on MQTT.
Comput. Commun., 2020

A Joint Deep Learning and Internet of Medical Things Driven Framework for Elderly Patients.
IEEE Access, 2020

An Invocation Chain Test and Evaluation Method Based on Knowledge Graph.
Proceedings of the International Conference on Networking and Network Applications, 2020

Multi-Robot Cooperative Target Encirclement through Learning Distributed Transferable Policy.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

2019
Solving Partial Differential Equation Based on Bernstein Neural Network and Extreme Learning Machine Algorithm.
Neural Process. Lett., 2019

Time series behavior modeling with digital twin for Internet of Vehicles.
EURASIP J. Wirel. Commun. Netw., 2019

Emergency Analysis Based on Affective Computing in Universities Forum.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

Short Text Topic Recognition and Optimization Method for University Online Community.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

An Improved Multi-classification Algorithm for Imbalanced Online Public Opinion Data.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

Review of the Electric Vehicle Charging Station Location Problem.
Proceedings of the Dependability in Sensor, Cloud, and Big Data Systems and Applications, 2019

Understanding Information Diffusion via Heterogeneous Information Network Embeddings.
Proceedings of the Database Systems for Advanced Applications, 2019

Data Storage Method for Fast Retrieval in IoT.
Proceedings of the Communications, Signal Processing, and Systems, 2019

2018
Realistic Traffic Data Based Mobility Modeling and Simulation of Smart EV.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

An Online Learning Algorithm for Voice Activation Detection Based on a Pretrained Online Extreme Learning Machine.
Proceedings of the 2nd International Conference on Computer Science and Application Engineering, 2018

2017
Robust Adaptive Beamforming with Sidelobe Controlled.
Proceedings of the 9th International Conference on Signal Processing Systems, 2017

2016
Looking for Information Source from Online Social Network with Incomplete Observation.
Proceedings of the 9th International Symposium on Computational Intelligence and Design, 2016

2015
Interpersonal Bundling.
Manag. Sci., 2015

2014
Human Mobility Simulation in Smart Energy Grid.
Proceedings of the Trustworthy Computing and Services - International Conference, 2014

Research on Modeling of Software Automatic Test.
Proceedings of the Trustworthy Computing and Services - International Conference, 2014

Enhanced AllJoyn Network with Centralized Management.
Proceedings of the Trustworthy Computing and Services - International Conference, 2014

2012
A New Manipulation Based Mobility Model for Vehicular Delay Tolerant Networks.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

A Pervasive Technology Approach to Social Trustworthiness.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

Vulnerability Evaluating Based on Attack Graph.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

2011
A content and user-oblivious video-recommendation algorithm.
Simul. Model. Pract. Theory, 2011

Typical Virtual Appliances: An optimized mechanism for virtual appliances provisioning and management.
J. Syst. Softw., 2011

RFID Enabled Vehicular Network for Ubiquitous Travel Query.
Int. J. Syst. Serv. Oriented Eng., 2011

Coordinated message delivery in partially connected local association networks for the 'Internet of Things'.
Int. J. Radio Freq. Identif. Technol. Appl., 2011

RFID enabled vehicular wireless query for Travel Information in Intelligent Transportation System.
Proceedings of the 2011 IEEE International Conference on RFID-Technologies and Applications, 2011

A Novel Comprehensive Network Security Assessment Approach.
Proceedings of IEEE International Conference on Communications, 2011

2010
Developing Local Association Network Based IoT Solutions for Body Parts Tagging and Tracking.
Int. J. Syst. Serv. Oriented Eng., 2010

A Mobile Service Platform for Trustworthy E-Learning Service Provisioning.
Int. J. Dependable Trust. Inf. Syst., 2010

An urban traffic speed fusion method based on principle component analysis and neural network.
Proceedings of the International Joint Conference on Neural Networks, 2010

A Coordinated P2P Message Delivery Mechanism in Local Association Networks for the Internet of Things.
Proceedings of the IEEE 7th International Conference on e-Business Engineering, 2010

A Model for Evaluating Connectivity Availability in Random Sleep Scheduled Delay-Tolerant Wireless Networks.
Proceedings of the Global Communications Conference, 2010

2008
Mobile Intelligence for Delay Tolerant Logistics and Supply Chain Management.
Proceedings of the IEEE International Conference on Sensor Networks, 2008

Developing a Trusted System for Tracking Asset on the Move.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

The Simulation of MSC EASY5 Model Based on the Grid.
Proceedings of the Seventh International Conference on Grid and Cooperative Computing, 2008


  Loading...