Zhongyuan Xu

Orcid: 0000-0003-1759-9665

According to our database1, Zhongyuan Xu authored at least 16 papers between 1992 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
scGCL: an imputation method for scRNA-seq data based on graph contrastive learning.
Bioinform., March, 2023

2022
scSemiGAN: a single-cell semi-supervised annotation and dimensionality reduction framework based on generative adversarial network.
Bioinform., November, 2022

scSAGAN: A scRNA-seq data imputation method based on Semi-Supervised Learning and Probabilistic Latent Semantic Analysis.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2022

2019
Variational Mode Decomposition-Based Event Recognition in Perimeter Security Monitoring With Fiber Optic Vibration Sensor.
IEEE Access, 2019

A Combined Events Recognition Scheme Using Hybrid Features in Distributed Optical Fiber Vibration Sensing System.
IEEE Access, 2019

2015
Mining Attribute-Based Access Control Policies.
IEEE Trans. Dependable Secur. Comput., 2015

Study on technological innovation efficiency based on DEA-Malmquist: Empirical analysis of 15 Chinese listed pharmaceutical manufacturing firms.
Proceedings of the 2015 IEEE International Conference on Industrial Engineering and Engineering Management, 2015

2014
Abductive Analysis of Administrative Policies in Rule-Based Access Control.
IEEE Trans. Dependable Secur. Comput., 2014

Mining Attribute-Based Access Control Policies from Logs.
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014

2013
Mining parameterized role-based policies.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

2012
Algorithms for mining meaningful roles.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012

2011
Abductive Analysis of Administrative Policies in Rule-Based Access Control.
Proceedings of the Information Systems Security - 7th International Conference, 2011

2010
A new model for model checking: cycle-weighted Kripke structure.
Frontiers Comput. Sci. China, 2010

2009
On Model Checking Boolean BI.
Proceedings of the Computer Science Logic, 23rd international Workshop, 2009

2008
A New Temporal Logic CTL[k-QDDC] and Its Verification.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008

1992
The application of fuzzy mathematics to adaptive speech recognition.
Proceedings of the 11th IAPR International Conference on Pattern Recognition, 1992


  Loading...