Chunhua Gu

According to our database1, Chunhua Gu authored at least 45 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Multiagent Meta-Based Task Offloading Strategy for Mobile-Edge Computing.
IEEE Trans. Cogn. Dev. Syst., February, 2024

Improving rare relation inferring for scene graph generation using bipartite graph network.
Comput. Vis. Image Underst., February, 2024

Boosting transferability of adversarial samples via saliency distribution and frequency domain enhancement.
Knowl. Based Syst., 2024

Communication-efficient federated learning via personalized filter pruning.
Inf. Sci., 2024

DCCL: Distance-coefficient guided Clustering with Contrastive Learning for Few-shot Text Classification.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

2023
Detection of Android Malware Based on Deep Forest and Feature Enhancement.
IEEE Access, 2023

Realistic Sketch Face Generation via Sketch-Guided Incomplete Restoration.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

2022
A Multi-hashing Index for hybrid DRAM-NVM memory systems.
J. Syst. Archit., 2022

A Soar-Based Space Exploration Algorithm for Mobile Robots.
Entropy, 2022

Source node detection in social networks based on Trust-GMLA algorithm.
Comput. Commun., 2022

2021
Online multi-object tracking with pedestrian re-identification and occlusion processing.
Vis. Comput., 2021

2020
3DACN: 3D Augmented convolutional network for time series data.
Inf. Sci., 2020

Optimization of lightweight task offloading strategy for mobile edge computing based on deep reinforcement learning.
Future Gener. Comput. Syst., 2020

Adaptive virtual machine consolidation framework based on performance-to-power ratio in cloud data centers.
Future Gener. Comput. Syst., 2020

Optimization of Task Offloading Strategy for Mobile Edge Computing Based on Multi-Agent Deep Reinforcement Learning.
IEEE Access, 2020

Performance-to-Power Ratio Aware Resource Consolidation Framework Based on Reinforcement Learning in Cloud Data Centers.
IEEE Access, 2020

2019
强化学习下能耗优化的虚拟机放置策略 (Virtual Machine Placement Strategy with Energy Consumption Optimization under Reinforcement Learning).
计算机科学, 2019

基于败者组与混合编码策略的NSGA-II改进算法 (Improved NSGA-II Algorithm Based on Loser Group and Hybrid Coding Strategy).
计算机科学, 2019

QARPF: A QoS-Aware Active Resource Provisioning Framework Based on OpenStack.
Proceedings of the 2019 IEEE SmartWorld, 2019

2018
DFA-VMP: An efficient and secure virtual machine placement strategy under cloud environment.
Peer-to-Peer Netw. Appl., 2018

Energy Efficient Resource Selection and Allocation Strategy for Virtual Machine Consolidation in Cloud Datacenters.
IEICE Trans. Inf. Syst., 2018

A Set-Associated Bin Packing Algorithm with Multiple Objectives in the Cloud.
Proceedings of the Cognitive Computing - ICCC 2018, 2018

2017
基于动态规划的虚拟机放置策略 (Virtual Machine Placement Strategy Based on Dynamic Programming).
计算机科学, 2017

Customization of virtual machine allocation policy using k-means clustering algorithm to minimize power consumption in data centers.
Proceedings of the Second International Conference on Internet of things and Cloud Computing, 2017

Energy efficient virtual machine consolidation in cloud datacenters.
Proceedings of the 4th International Conference on Systems and Informatics, 2017

Published Weighted Social Networks Privacy Preservation Based on Community Division.
Proceedings of the 7th International Conference on Communication and Network Security, 2017

Security Risk Estimation of Social Network Privacy Issue.
Proceedings of the 7th International Conference on Communication and Network Security, 2017

2016
Steganalysis Over Large-Scale Social Networks With High-Order Joint Features and Clustering Ensembles.
IEEE Trans. Inf. Forensics Secur., 2016

PIMRS: achieving privacy and integrity-preserving multi-owner ranked-keyword search over encrypted cloud data.
Secur. Commun. Networks, 2016

Secret Share Based Program Access Authorization Protocol for Smart Metering.
Int. J. Netw. Secur., 2016

Cloud-Based Clusters: Multivariate Optimization Techniques for Resource Performance Prediction.
Proceedings of the 15th International Symposium on Parallel and Distributed Computing, 2016

PSS: Achieving high-efficiency and privacy-preserving similarity search in multiple clouds.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

2015
Secure Data Deduplication With Reliable Key Management for Dynamic Updates in CPSS.
IEEE Trans. Comput. Soc. Syst., 2015

Secure and Verifiable Multi-owner Ranked-Keyword Search in Cloud Computing.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

Malicious data identification in smart grid based on residual error method.
Proceedings of the International Conference on Cyber Security of Smart Cities, 2015

A Container Bin Packing Algorithm for Multiple Objects.
Proceedings of the Intelligent Computing Theories and Methodologies, 2015

Simulation to ARM Processors Based on the Instruction's Eigenvalue.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

2014
GPU Implementation of Parallel Support Vector Machine Algorithm with Applications to Detection Intruder.
J. Comput., 2014

Design and realization of general matrix keyboard based on STM32.
Proceedings of the 2nd International Conference on Systems and Informatics, 2014

2013
A review of behavior mechanisms and crowd evacuation animation in emergency exercises.
J. Zhejiang Univ. Sci. C, 2013

Mining at most top-K% mixed-drove spatiotemporal co-occurrence patterns.
Proceedings of the 9th Asian Control Conference, 2013

2011
An Approach to Handling Failure Recovery in Service Composition and Its Analysis.
Proceedings of the 5th IEEE International Symposium on Theoretical Aspects of Software Engineering, 2011

Mining at Most Top-K% Spatio-temporal Outlier Based Context: A Summary of Results.
Proceedings of the Artificial Intelligence and Computational Intelligence, 2011

2010
An Aspect Oriented Approach to Analyzing Fault of Service Composition.
Proceedings of the 5th IEEE Asia-Pacific Services Computing Conference, 2010

2005
A Delegation Logic Based Authorization Mechanism for Virtual Organizations.
Proceedings of the Applied Public Key Infrastructure, 2005


  Loading...