Chu Zhao

Orcid: 0000-0002-5649-1545

According to our database1, Chu Zhao authored at least 17 papers between 2017 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
MiniDBG: A Novel and Minimal De Bruijn Graph for Read Mapping.
IEEE ACM Trans. Comput. Biol. Bioinform., 2024

Symmetric Graph Contrastive Learning against Noisy Views for Recommendation.
CoRR, 2024

Graph Representation Learning via Causal Diffusion for Out-of-Distribution Recommendation.
CoRR, 2024

NeutronCache: An Efficient Cache-Enhanced Distributed Graph Neural Network Training System.
Proceedings of the 33rd ACM International Conference on Information and Knowledge Management, 2024

2023
Asymmetrical Attention Networks Fused Autoencoder for Debiased Recommendation.
ACM Trans. Intell. Syst. Technol., December, 2023

On the Design of Superimposed Pilots in MIMO-OFDM with Index Modulation.
Proceedings of the 97th IEEE Vehicular Technology Conference, 2023

2022
DiagAF: A More Accurate and Efficient Pre-Alignment Filter for Sequence Alignment.
IEEE ACM Trans. Comput. Biol. Bioinform., 2022

Integrating label propagation with graph convolutional networks for recommendation.
Neural Comput. Appl., 2022

Unifying attentive sparse autoencoder with neural collaborative filtering for recommendation.
Intell. Data Anal., 2022

Aggregating knowledge-aware graph neural network and adaptive relational attention for recommendation.
Appl. Intell., 2022

2021
Integrating Stacked Sparse Auto-Encoder Into Matrix Factorization for Rating Prediction.
IEEE Access, 2021

2020
Medical Image Encryption Based on Stream Cipher Algorithm and Krill Group.
Int. J. Netw. Secur., 2020

An Improved Image Encryption Algorithm Based on Chaotic Mapping and Discrete Wavelet Transform Domain.
Int. J. Netw. Secur., 2020

Research on Medical Image Encryption Method Based on Improved Krill Herb Algorithm and Chaotic Systems.
Int. J. Netw. Secur., 2020

2017
A Provable Private Data Aggregation Scheme Based on Digital Signatures and Homomorphic Encryption for Wireless Sensor Networks.
J. Inf. Hiding Multim. Signal Process., 2017

A Proxy Re-Encryption Scheme Based on Elliptic Curve Group.
J. Inf. Hiding Multim. Signal Process., 2017

A Multi-keyword Search Algorithm Based on Polynomial Function and Safety Inner-product Method in Secure Cloud Environment.
J. Inf. Hiding Multim. Signal Process., 2017


  Loading...