Zijian Zhou

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Known people with the same name:

Bibliography

2025
Polarforming Design for Movable Antenna Systems.
CoRR, July, 2025

Coding Over Coupon Collector Channels for Combinatorial Motif-Based DNA Storage.
IEEE Trans. Commun., June, 2025

MEM1: Learning to Synergize Memory and Reasoning for Efficient Long-Horizon Agents.
CoRR, June, 2025

MarDini: Masked Auto-regressive Diffusion for Video Generation at Scale.
Trans. Mach. Learn. Res., 2025

Neighborhood of vertices in the isogeny graph of principally polarized superspecial abelian surfaces.
Finite Fields Their Appl., 2025

ESTK-JC: Encrypted malicious traffic detection fusing spatio-temporal features and JointCloud entity knowledge for JointCloud environment.
Comput. Networks, 2025

Multi-Level RTN with Certain Regularities in Oxide-RRAM: Experiments, Defect Dynamics and 3D Multi-Physics Modeling.
Proceedings of the IEEE International Reliability Physics Symposium, 2025

Learning Flow Fields in Attention for Controllable Person Image Generation.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2025

MPDrive: Improving Spatial Understanding with Marker-Based Prompt Learning for Autonomous Driving.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2025

TETRIS: Optimal Draft Token Selection for Batch Speculative Decoding.
Proceedings of the 63rd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2025

2024
Data value estimation on private gradients.
CoRR, 2024

Is the neural tangent kernel of PINNs deep learning general partial differential equations always convergent ?
CoRR, 2024

MarDini: Masked Autoregressive Diffusion for Video Generation at Scale.
CoRR, 2024

Data-Centric AI in the Age of Large Language Models.
CoRR, 2024

Haina Storage: A Decentralized Secure Storage Framework Based on Improved Blockchain Structure.
CoRR, 2024

DETAIL: Task DEmonsTration Attribution for Interpretable In-context Learning.
Proceedings of the Advances in Neural Information Processing Systems 38: Annual Conference on Neural Information Processing Systems 2024, 2024

MoCo-Diff: Adaptive Conditional Prior on Diffusion Network for MRI Motion Correction.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2024, 2024

A High-Frequency Re-Optimization Network for MRI Reconstruction with CT as the Prior.
Proceedings of the IEEE International Symposium on Biomedical Imaging, 2024

Accelerated 4D Flow MRI Using Deep Low-Rank Plus Sparse Neural Network and Complex Difference.
Proceedings of the IEEE International Symposium on Biomedical Imaging, 2024

Unified Deep Learning for Simultaneous Cardiac Cine MRI Reconstruction, Motion Estimation and Segmentation.
Proceedings of the IEEE International Symposium on Biomedical Imaging, 2024

Cardiac Cine MRI Motion Correction Using Diffusion Models.
Proceedings of the IEEE International Symposium on Biomedical Imaging, 2024

Joint Optimization of K-Space Sampling and Reconstruction for Multi-Contrast MRI.
Proceedings of the IEEE International Symposium on Biomedical Imaging, 2024

Position Paper: Data-Centric AI in the Age of Large Language Models.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2024, 2024

2023
Deep neural networks learning forward and inverse problems of two-dimensional nonlinear wave equations with rational solitons.
Comput. Math. Appl., December, 2023

Data-Driven Deep Learning for The Multi-Hump Solitons and Parameters Discovery in NLS Equations with Generalized <i>PT</i>-Scarf-II Potentials.
Neural Process. Lett., June, 2023

Data-driven vortex solitons and parameter discovery of 2D generalized nonlinear Schrödinger equations with a PT-symmetric optical lattice.
Comput. Math. Appl., June, 2023

An AI-empowered affect recognition model for healthcare and emotional well-being using physiological signals.
Clust. Comput., April, 2023

Data-driven localized waves and parameter discovery in the massive Thirring model via extended physics-informed neural networks with interface zones.
CoRR, 2023

A Personal Privacy Data Protection Scheme for Encryption and Revocation of High-Dimensional Attribute Domains.
IEEE Access, 2023

TKSP: Long-Term Stance Prediction for Social Media Users by Fusing Time Series Features and Event Dynamic Evolution Knowledge.
Proceedings of the Knowledge Science, Engineering and Management, 2023

DeepMetricEye: Metric Depth Estimation in Periocular VR Imagery.
Proceedings of the IEEE International Symposium on Mixed and Augmented Reality, 2023

Integrated Device for Controllable Droplet Generation and Detection on Open Array Chip.
Proceedings of the Intelligent Robotics and Applications - 16th International Conference, 2023

Two-Stage Joint BEM-OTFS Channel Estimation Algorithm Based Sparse Bayesian Learning Algorithm.
Proceedings of the 15th IEEE International Conference on Advanced Infocomm Technology, 2023

Predicting pathological complete response to neoadjuvant systemic therapy for triple-negative breast cancers using deep learning on multiparametric MRIs.
Proceedings of the 45th Annual International Conference of the IEEE Engineering in Medicine & Biology Society, 2023

Parallel Solution Method for Hamiltonian Equations Based on FPGA and Matlab Programming Verification.
Proceedings of the International Conference on Computers, 2023

Glass Wet Deep Etching for Fabricating Biomimetic Devices in Biosensing.
Proceedings of the 15th IEEE International Conference on ASIC, 2023

Probably Approximate Shapley Fairness with Applications in Machine Learning.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
Stable solitons and interactions of the logarithmic nonlinear Schrödinger equation with two PT-symmetric non-periodic potentials.
Appl. Math. Lett., 2022

Semi-rational vector rogon-soliton solutions of the five-component Manakov/NLS system with mixed backgrounds.
Appl. Math. Lett., 2022

A Trustworthy Ciphertext-Policy Attribute-Based Encryption Access Control Method Based on FAME and Blockchain.
Proceedings of the 4th Blockchain and Internet of Things Conference, 2022

Early-Bird GCNs: Graph-Network Co-optimization towards More Efficient GCN Training and Inference via Drawing Early-Bird Lottery Tickets.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
Deep neural networks for solving forward and inverse problems of (2+1)-dimensional nonlinear wave equations with rational solitons.
CoRR, 2021

Data-driven discovery of Bäcklund transforms and soliton evolution equations via deep neural network learning schemes.
CoRR, 2021

Aggressive Q-Learning with Ensembles: Achieving Both High Sample Efficiency and High Asymptotic Performance.
CoRR, 2021

Deep learning neural networks for the third-order nonlinear Schrodinger equation: Solitons, breathers, and rogue waves.
CoRR, 2021

GEBT: Drawing Early-Bird Tickets in Graph Convolutional Network Training.
CoRR, 2021

A Multi-level Elastic Encryption Protection Model.
Proceedings of the Science of Cyber Security - Third International Conference, 2021

Randomized Ensembled Double Q-Learning: Learning Fast Without a Model.
Proceedings of the 9th International Conference on Learning Representations, 2021

2020
MicroRNAs Are Involved in Maize Immunity Against <i>Fusarium verticillioides</i> Ear Rot.
Genom. Proteom. Bioinform., 2020

BAIL: Best-Action Imitation Learning for Batch Deep Reinforcement Learning.
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020

2019
Deep learning application engine (DLAE): Development and integration of deep learning algorithms in medical imaging.
SoftwareX, 2019

BAIL: Best-Action Imitation Learning for Batch Deep Reinforcement Learning.
CoRR, 2019

2012
An efficient algorithm for the submatrix constraint of the matrix equation <i>A</i> <sub>1</sub> <i>X</i> <sub>1</sub> <i>B</i> <sub>1</sub>+<i>A</i> <sub>2</sub> <i>X</i> <sub>2</sub> <i>B</i> <sub>2</sub>+···+<i>A</i> <sub> <i>l</i> </sub> <i>X</i> <sub> <i>l</i> </sub> <i>B</i> <sub> <i>l</i> </sub>=<i>C</i>.
Int. J. Comput. Math., 2012

2010
Passive IP traceback: capturing the origin of anonymous traffic through network telescopes.
Proceedings of the ACM SIGCOMM 2010 Conference on Applications, 2010


  Loading...