Xiaolu Zhang

According to our database1, Xiaolu Zhang authored at least 103 papers between 2007 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2021
Conditional generative adversarial network with densely-connected residual learning for single image super-resolution.
Multim. Tools Appl., 2021

A Synchronization Acquisition Method for the Dual-Sequence-Frequency-Hopping Communication System Based on Software Defined Radio at Low SNR.
J. Softw., 2021

Improving Transferability of Adversarial Patches on Face Recognition with Generative Models.
CoRR, 2021

A design science approach to developing an integrated mobile app forensic framework.
Comput. Secur., 2021

NLP-based digital forensic investigation platform for online communications.
Comput. Secur., 2021

Learning to Select Instance: Simultaneous Transfer Learning and Clustering.
Proceedings of the SIGIR '21: The 44th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2021

MSSM: A Multiple-level Sparse Sharing Model for Efficient Multi-Task Learning.
Proceedings of the SIGIR '21: The 44th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2021

Progressive-Scale Boundary Blackbox Attack via Projective Gradient Estimation.
Proceedings of the 38th International Conference on Machine Learning, 2021

Improving Transferability of Adversarial Patches on Face Recognition With Generative Models.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

Research on Data Asset Management of Electricity Industry Based on Blockchain.
Proceedings of the ASSE 2021: 2nd Asia Service Sciences and Software Engineering Conference, 2021

Nonlinear Projection Based Gradient Estimation for Query Efficient Blackbox Attacks.
Proceedings of the 24th International Conference on Artificial Intelligence and Statistics, 2021

2020
High-reliability optical process level network in smart substation.
Opt. Switch. Netw., 2020

Single image super-resolution with enhanced Laplacian pyramid network via conditional generative adversarial learning.
Neurocomputing, 2020

The Dominance Degree-Based Heterogeneous Linguistic Decision-Making Technique for Sustainable 3PRLP Selection.
Complex., 2020

A probabilistic linguistic-based deviation method for multi-expert qualitative decision making with aspirations.
Appl. Soft Comput., 2020

A Quadratic Polynomial Receiving Scheme for Sinusoidal Signals Enhanced by Stochastic Resonance Under Color Noise.
IEEE Access, 2020

Data-Free Adversarial Perturbations for Practical Black-Box Attack.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2020

QEBA: Query-Efficient Boundary-Based Blackbox Attack.
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020

aDMSCN: A Novel Perspective for User Intent Prediction in Customer Service Bots.
Proceedings of the CIKM '20: The 29th ACM International Conference on Information and Knowledge Management, 2020

Simulation of Operating System and Hardware Stripping Based on Sandbox Technology.
Proceedings of the 2020 International Conference on Applications and Techniques in Cyber Intelligence, 2020

Characterizing Membership Privacy in Stochastic Gradient Langevin Dynamics.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

Pruning from Scratch.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

Dynamic Network Pruning with Interpretable Layerwise Channel Selection.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

Experiential Learning in Digital Forensics.
Proceedings of the Digital Forensic Education, An Experiential Learning Approach., 2020

The Way Forward.
Proceedings of the Digital Forensic Education, An Experiential Learning Approach., 2020

2019
Eavesdropping and Jamming Selection Policy for Suspicious UAVs Based on Low Power Consumption over Fading Channels.
Sensors, 2019

How Do I Share My IoT Forensic Experience With the Broader Community? An Automated Knowledge Sharing IoT Forensic Platform.
IEEE Internet Things J., 2019

Image super-resolution using conditional generative adversarial network.
IET Image Process., 2019

Frameup: An incriminatory attack on Storj: A peer to peer blockchain enabled distributed storage system.
Digit. Investig., 2019

Energy-Efficient Multilevel Heterogeneous Routing Protocol for Wireless Sensor Networks.
IEEE Access, 2019

An Optimal Dynamic Admission Control Policy and Upper Bound Analysis in Wireless Sensor Networks.
IEEE Access, 2019

Reinforcement Learning for User Intent Prediction in Customer Service Bots.
Proceedings of the 42nd International ACM SIGIR Conference on Research and Development in Information Retrieval, 2019

Generalization in Generative Adversarial Networks: A Novel Perspective from Privacy Protection.
Proceedings of the Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, 2019

AntProphet: an Intention Mining System behind Alipay's Intelligent Customer Service Bot.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

Fuzzy Entropy Clustering Image Segmentation Algorithm Based on Potential Two-Dimensional Histogram.
Proceedings of the Advances in Natural Computation, Fuzzy Systems and Knowledge Discovery - Proceedings of the 15th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD 2019), Kunming, China, July 20-22, 2019, 2019

Infrared and Visible Image Fusion Based on Morphological Image Enhancement of Dual-Tree Complex Wavelet.
Proceedings of the Advances in Natural Computation, Fuzzy Systems and Knowledge Discovery - Proceedings of the 15th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD 2019), Kunming, China, July 20-22, 2019, 2019

Trade-off Between Energy Consumption and Makespan in the Mapreduce Resource Allocation Problem.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

P3SGD: Patient Privacy Preserving SGD for Regularizing Deep CNNs in Pathological Image Classification.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019

G2C: A Generator-to-Classifier Framework Integrating Multi-Stained Visual Cues for Pathological Glomerulus Classification.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

Map My Murder: A Digital Forensic Study of Mobile Health and Fitness Applications.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
Pythagorean Fuzzy Clustering Analysis: A Hierarchical Clustering Algorithm with the Ratio Index-Based Ranking Methods.
Int. J. Intell. Syst., 2018

Pythagorean Fuzzy LINMAP Method Based on the Entropy Theory for Railway Project Investment Decision Making.
Int. J. Intell. Syst., 2018

A Novel Probabilistic Linguistic Approach for Large-Scale Group Decision Making with Incomplete Weight Information.
Int. J. Fuzzy Syst., 2018

Infinite Curriculum Learning for Efficiently Detecting Gastric Ulcers in WCE Images.
CoRR, 2018

Heterogeneous Cloud Resources Management: Truthful Mechanism Design in Shared Multi-minded Users.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
Hesitant Fuzzy Methods for Multiple Criteria Decision Analysis
Studies in Fuzziness and Soft Computing 345, Springer, ISBN: 978-3-319-42001-1, 2017

A Closeness Index-Based TODIM Method for Hesitant Qualitative Group Decision Making.
Informatica, 2017

The Standardization and Harmonization of Land Cover Classification Systems towards Harmonized Datasets: A Review.
ISPRS Int. J. Geo Inf., 2017

A Mixed Geographically and Temporally Weighted Regression: Exploring Spatial-Temporal Variations from Global and Local Perspectives.
Entropy, 2017

Swarm optimization algorithms applied to multi-resource fair allocation in heterogeneous cloud computing systems.
Computing, 2017

Breaking into the vault: Privacy, security and forensic analysis of Android vault applications.
Comput. Secur., 2017

Multi-resource Fair Allocation with Bounded Number of Tasks in Cloud Computing Systems.
Proceedings of the Theoretical Computer Science - 35th National Conference, 2017

PELE: Power efficient legitimate eavesdropping via jamming in UAV communications.
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017

An Overview of the Usage of Default Passwords.
Proceedings of the Digital Forensics and Cyber Crime - 9th International Conference, 2017

A Profit-Maximum Resource Allocation Approach for Mapreduce in Data Centers.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

A Further Analysis of the Dynamic Dominant Resource Fairness Mechanism.
Proceedings of the Frontiers in Algorithmics - 11th International Workshop, 2017

Exploring transfer learning for gastrointestinal bleeding detection on small-size imbalanced endoscopy images.
Proceedings of the 2017 39th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), 2017

2016
Hesitant fuzzy programming technique for multidimensional analysis of hesitant fuzzy preferences.
OR Spectr., 2016

Exponential synchronization for stochastic neural networks driven by fractional Brownian motion.
J. Frankl. Inst., 2016

Multicriteria Pythagorean fuzzy decision analysis: A hierarchical QUALIFLEX approach with the closeness index-based ranking methods.
Inf. Sci., 2016

A Novel Approach Based on Similarity Measure for Pythagorean Fuzzy Multiple Criteria Group Decision Making.
Int. J. Intell. Syst., 2016

Rapid Android Parser for Investigating DEX files (RAPID).
Digit. Investig., 2016

Faster parking and less cruise for public parking spot discovery: Modeling and analysis based on Timed Petri Nets.
Proceedings of the 13th IEEE International Conference on Networking, Sensing, and Control, 2016

Discrete Interior Search Algorithm for Multi-resource Fair Allocation in Heterogeneous Cloud Computing Systems.
Proceedings of the Intelligent Computing Theories and Application, 2016

Behavior Analysis Based SMS Spammer Detection in Mobile Communication Networks.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016

2015
Dynamic fair allocation of multiple resources with bounded number of tasks in cloud computing systems.
Multiagent Grid Syst., 2015

Erratum to "Hesitant fuzzy multi-attribute decision making based on TOPSIS with incomplete weight information" [Knowl. Based Syst. 52(2013) 53-64]
Knowl. Based Syst., 2015

Novel distance and similarity measures on hesitant fuzzy sets with applications to clustering analysis.
J. Intell. Fuzzy Syst., 2015

An Integrated Maximizing Consistency and Multi-Choice Goal Programming Approach for Hybrid Multiple Criteria Group Decision Making Based on Interval-Valued Intuitionistic Fuzzy Number.
Informatica, 2015

Heterogeneous multiple criteria group decision making with incomplete weight information: A deviation modeling approach.
Inf. Fusion, 2015

Hesitant fuzzy agglomerative hierarchical clustering algorithms.
Int. J. Syst. Sci., 2015

Hesitant fuzzy QUALIFLEX approach with a signed distance-based comparison method for multiple criteria decision analysis.
Expert Syst. Appl., 2015

A note on dynamic fair division of multiple resources.
CoRR, 2015

A data transmission algorithm for distributed computing system based on maximum flow.
Clust. Comput., 2015

Soft computing based on maximizing consensus and fuzzy TOPSIS approach to interval-valued intuitionistic fuzzy group decision making.
Appl. Soft Comput., 2015

Auxiliary Antenna for Spatial Modulation with Space-Time Block Code.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

Dynamic Fair Division of Multiple Resources with Satiable Agents in Cloud Computing Systems.
Proceedings of the Fifth IEEE International Conference on Big Data and Cloud Computing, 2015

2014
The TODIM analysis approach based on novel measured functions under hesitant fuzzy environment.
Knowl. Based Syst., 2014

Windows Volatile Memory Forensics Based on Correlation Analysis.
J. Networks, 2014

Deriving experts' weights based on consistency maximization in intuitionistic fuzzy group decision making.
J. Intell. Fuzzy Syst., 2014

Extension of TOPSIS to Multiple Criteria Decision Making with Pythagorean Fuzzy Sets.
Int. J. Intell. Syst., 2014

Interval programming method for hesitant fuzzy multi-attribute group decision making with incomplete preference over alternatives.
Comput. Ind. Eng., 2014

2013
Hesitant fuzzy multi-attribute decision making based on TOPSIS with incomplete weight information.
Knowl. Based Syst., 2013

An Intelligent Analysis Model for Multisource Volatile Memory.
J. Networks, 2013

Analyzing Malware Based on Volatile Memory.
J. Networks, 2013

Prior information driven design of fuzzy logic controllers with application to the overhead crane control.
Proceedings of the 10th International Conference on Fuzzy Systems and Knowledge Discovery, 2013

Automatic Balancing Chord: A Dynamic Load Balancing Mechanism for High Efficient.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

Mapping Entity-Attribute Web Tables to Web-Scale Knowledge Bases.
Proceedings of the Database Systems for Advanced Applications, 2013

MetKB: enriching RDF knowledge bases with web entity-attribute tables.
Proceedings of the 22nd ACM International Conference on Information and Knowledge Management, 2013

2012
The Design and Implementation of Composite Collaborative Filtering Algorithm for Personalized Recommendation.
J. Softw., 2012

2011
Postscript - Brown v. EMA/ESA - U.S. Supreme Court decision 27 June 2011.
Comput. Law Secur. Rev., 2011

Setting the stage: Arnold Schwarzenegger and video games prepare for battle in the United States Supreme Court.
Comput. Law Secur. Rev., 2011

2010
Charging children with child pornography - Using the legal system to handle the problem of "sexting".
Comput. Law Secur. Rev., 2010

2009
End-to-end outage minimization in OFDM based linear relay networks.
IEEE Trans. Commun., 2009

An Efficient Super-Node-Based Regional Lookup Algorithm in Chord.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

2008
Utility-Based Wireless Resource Allocation for Variable Rate Transmission.
IEEE Trans. Wirel. Commun., 2008

End-to-End Resource Allocation in OFDM Based Linear Multi-Hop Networks.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

End-to-End Outage Probability Minimization in OFDM Based Linear Multi-Hop Networks.
Proceedings of IEEE International Conference on Communications, 2008

Scripted Artificially Intelligent Basic Online Tactical Simulation.
Proceedings of the ISCA 21st International Conference on Computer Applications in Industry and Engineering, 2008

2007
Time Sharing Policy in Wireless Networks for Variable Rate Transmission.
Proceedings of IEEE International Conference on Communications, 2007

Transmission Schemes for Lifetime Maximization in Wireless Sensor Networks: Uncorrelated Source Observations.
Proceedings of the Global Communications Conference, 2007

Non-Cooperative Power Control for Faded Wireless Ad Hoc Networks.
Proceedings of the Global Communications Conference, 2007

A Generalized Gradient Scheduling Algorithm in Wireless Networks for Variable Rate Transmission.
Proceedings of the Global Communications Conference, 2007


  Loading...