Ziyao Xu

Orcid: 0000-0002-7298-004X

According to our database1, Ziyao Xu authored at least 31 papers between 2006 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
MacFormer: Map-Agent Coupled Transformer for Real-Time and Robust Trajectory Prediction.
IEEE Robotics Autom. Lett., October, 2023

On the conservation property of positivity-preserving discontinuous Galerkin methods for stationary hyperbolic equations.
J. Comput. Phys., 2023

The hybrid-dimensional Darcy's law: a non-conforming reinterpreted discrete fracture model (RDFM) for single-phase flow in fractured media.
J. Comput. Phys., 2023

GaitFormer: Revisiting Intrinsic Periodicity for Gait Recognition.
CoRR, 2023

2022
Third order maximum-principle-satisfying and positivity-preserving Lax-Wendroff discontinuous Galerkin methods for hyperbolic conservation laws.
J. Comput. Phys., 2022

High order conservative positivity-preserving discontinuous Galerkin method for stationary hyperbolic equations.
J. Comput. Phys., 2022

TENET: Transformer Encoding Network for Effective Temporal Flow on Motion Prediction.
CoRR, 2022


Multi-Layer Pseudo-Siamese Biaffine Model for Dependency Parsing.
Proceedings of the 29th International Conference on Computational Linguistics, 2022

2021
The Hybrid-dimensional Darcy's Law: A Reinterpreted Discrete Fracture Model for Fracture and Barrier Networks on Non-conforming Meshes.
CoRR, 2021

An Efficient Video Coding System With an Adaptive Overfitted Multi-Scale Attention Network.
IEEE Access, 2021

2020
High-Definition Video Compression System Based on Perception Guidance of Salient Information of a Convolutional Neural Network and HEVC Compression Domain.
IEEE Trans. Circuits Syst. Video Technol., 2020

The hybrid dimensional representation of permeability tensor: A reinterpretation of the discrete fracture model and its extension on nonconforming meshes.
J. Comput. Phys., 2020

Research on AI Composition Recognition Based on Music Rules.
CoRR, 2020

Iterative Distance-Aware Similarity Matrix Convolution with Mutual-Supervised Point Elimination for Efficient Point Cloud Registration.
Proceedings of the Computer Vision - ECCV 2020, 2020

2019
High-order bound-preserving discontinuous Galerkin methods for wormhole propagation on triangular meshes.
J. Comput. Phys., 2019

High-order bound-preserving discontinuous Galerkin methods for compressible miscible displacements in porous media on triangular meshes.
J. Comput. Phys., 2019

High-order local discontinuous Galerkin method for simulating wormhole propagation.
J. Comput. Appl. Math., 2019

Automatic Sleep Staging based on Curriculum Learning Approach.
Proceedings of the 4th International Conference on Biomedical Signal and Image Processing, 2019

2018
Spatiotemporal visual saliency guided perceptual high efficiency video coding with neural network.
Neurocomputing, 2018

2014
Efficient Integrity Protection for P2P Streaming.
Proceedings of the Intelligent Information Processing VII, 2014

2010
Replication-aware and Snowcrash-resistant VM Deployment for P2P Applications.
Proceedings of the GCC 2010, 2010

2009
Trust-Based Constraint-Secure Interoperation for Dynamic Mediator-Free Collaboration.
J. Comput., 2009

Combating Index Poisoning in P2P File Sharing.
Proceedings of the Advances in Information Security and Assurance, 2009

2008
Trusted Reputation Management Service for Peer-to-Peer Collaboration.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2008, 2008

Service Authenticity in P2P File-Sharing.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Enforcing Separation of Duty in Ad Hoc Collaboration.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

An Integrity Assurance Mechanism for Run-Time Programs.
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008

Separation of Duty in Trust-Based Collaboration.
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008

2007
A Multilevel Reputation System for Peer-to-Peer Networks.
Proceedings of the Grid and Cooperative Computing, 2007

2006
An Enhanced N-Way Exchange-Based Incentive Scheme for P2P File Sharing (Short Paper).
Proceedings of the Information and Communications Security, 8th International Conference, 2006


  Loading...