Zuo Chen

According to our database1, Zuo Chen authored at least 17 papers between 2006 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
DHUnet: Dual-branch hierarchical global-local fusion network for whole slide image segmentation.
Biomed. Signal Process. Control., August, 2023

2021
A combination classification method based on Ripper and Adaboost.
Int. J. Embed. Syst., 2021

2020
Domain sentiment dictionary construction and optimization based on multi-source information fusion.
Intell. Data Anal., 2020

2018
A Security Situation Prediction Algorithm Based on HMM in Mobile Network.
Wirel. Commun. Mob. Comput., 2018

2017
Multiscale Entropy-Based Weighted Hidden Markov Network Security Situation Prediction Model.
Proceedings of the 2017 IEEE International Congress on Internet of Things, 2017

2016
An Alert Fusion Method Based on Grey Relation and Attribute Similarity Correlation.
Int. J. Online Eng., 2016

2015
A Self-Adaptive Wireless Sensor Network Coverage Method for Intrusion Tolerance Based on Trust Value.
J. Sensors, 2015

Trust-Aware and Low Energy Consumption Security Topology Protocol of Wireless Sensor Network.
J. Sensors, 2015

Detecting overlapping community in complex network based on node similarity.
Comput. Sci. Inf. Syst., 2015

A Self-Adaptive Wireless Sensor Network Coverage Method for Intrusion Tolerance Based on Particle Swarm Optimization and Cuckoo Search.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

A Security Topology Protocol of Wireless Sensor Networks Based on Community Detection and Energy Aware.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Automatic Chinese Personality Recognition Based on Prosodic Features.
Proceedings of the MultiMedia Modeling - 21st International Conference, 2015

2013
An improved Multi-hop Routing Protocol for Large-Scale Wireless Sensor Network Based on Merging Adjacent Clusters.
J. Softw., 2013

2012
Asynchronous Parallel Computing Model of Global Motion Estimation with CUDA.
J. Comput., 2012

2011
Privacy Preservation in Role-based Access Control Model.
J. Networks, 2011

Automated Trust Negotiation with Time Behavior.
J. Networks, 2011

2006
Sequence Outlier Detection Based on Chaos Theory and Its Application on Stock Market.
Proceedings of the Fuzzy Systems and Knowledge Discovery, Third International Conference, 2006


  Loading...