Damin Zhang
Orcid: 0009-0003-0924-9590
According to our database1,
Damin Zhang
authored at least 18 papers
between 2009 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Proceedings of the 31st International Conference on Computational Linguistics, 2025
2024
2023
Multi-Strategy Enhanced Dung Beetle Optimizer and Its Application in Three-Dimensional UAV Path Planning.
Symmetry, July, 2023
Axioms, July, 2023
A graph model-based multiscale feature fitting method for unsupervised anomaly detection.
Pattern Recognit., June, 2023
Dual graph convolutional networks integrating affective knowledge and position information for aspect sentiment triplet extraction.
Frontiers Neurorobotics, June, 2023
Multiscale spatial temporal attention graph convolution network for skeleton-based anomaly behavior detection.
J. Vis. Commun. Image Represent., February, 2023
CoRR, 2023
2022
Proceedings of the Thirty-Fifth International Florida Artificial Intelligence Research Society Conference, 2022
2020
Quantum Inf. Process., 2020
认知智能电网邻域网络的频谱分配策略 (Spectrum Allocation Strategy for Neighborhood Network Based Cognitive Smart Grid).
计算机科学, 2020
2019
异构网络中基于吞吐量优化的资源分配机制 (Throughput Optimization Based Resource Allocation Mechanism in Heterogeneous Networks).
计算机科学, 2019
Spectrum Allocation of Cognitive Radio Network Based on Improved Cuckoo Search Algorithm.
Proceedings of the 2nd International Conference on Computer Science and Software Engineering, 2019
2017
Integration of quantum key distribution and private classical communication through continuous variable.
Quantum Inf. Process., 2017
2016
Sample bound estimate based chance-constrained immune optimization and its applications.
Int. J. Autom. Comput., 2016
Proceedings of the Intelligent Visual Surveillance - 4th Chinese Conference, 2016
2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009