Xu Zhuang

Orcid: 0000-0001-5261-8580

According to our database1, Xu Zhuang authored at least 16 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Blind Video Quality Assessment Method via Spatiotemporal Pyramid Attention.
IEEE Trans. Broadcast., March, 2024

A Full-Reference Image Quality Assessment Method via Deep Meta-Learning and Conformer.
IEEE Trans. Broadcast., March, 2024

Transformer with a Parallel Decoder for Image Captioning.
Int. J. Pattern Recognit. Artif. Intell., January, 2024

2023
ETNAS: An energy consumption task-driven neural architecture search.
Sustain. Comput. Informatics Syst., December, 2023

A Two-Stage Three-Dimensional Attention Network for Lightweight Image Super-Resolution.
Int. J. Pattern Recognit. Artif. Intell., October, 2023

2021
Deep-Learning-Based Multispectral Satellite Image Segmentation for Water Body Detection.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2021

Using deep belief network to demote web spam.
Future Gener. Comput. Syst., 2021

Research on Crowd Counting Based on Attention Mechanism and Dilation Convolution.
Proceedings of the 6th IEEE International Conference on Computer and Communication Systems, 2021

2019
Enactment of Ensemble Learning for Review Spam Detection on Selected Features.
Int. J. Comput. Intell. Syst., 2019

2018
Security Issues in Ultralightweight RFID Authentication Protocols.
Wirel. Pers. Commun., 2018

2017
A unified score propagation model for web spam demotion algorithm.
Inf. Retr. J., 2017

Feature bundling in decision tree algorithm.
Intell. Data Anal., 2017

2016
Reversible Data Hiding Based on Geometric Structure of Pixel Groups.
Int. J. Netw. Secur., 2016

2014
A New Ultralightweight RFID Protocol for Low-Cost Tags: R <sup>2</sup> AP.
Wirel. Pers. Commun., 2014

A Simple Password Authentication Scheme Based on Geometric Hashing Function.
Int. J. Netw. Secur., 2014

2013
Security Analysis of a new Ultra-lightweight RFID Protocol and Its Improvement.
J. Inf. Hiding Multim. Signal Process., 2013


  Loading...