Dan Zhu

Orcid: 0000-0002-4341-9886

According to our database1, Dan Zhu authored at least 135 papers between 1997 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Enabling Efficient and Distributed Access Control for Pervasive Edge Computing Services.
IEEE Trans. Mob. Comput., December, 2024

LAFSSD: lightweight and advanced FSSD for multi-scale detection of platelets and white blood cells in human peripheral blood smear images.
Multim. Tools Appl., August, 2024

Discordance minimization-based imputation algorithms for missing values in rating data.
Mach. Learn., January, 2024

Privacy-Preserving Techniques with e-Healthcare Applications
Wireless Networks, Springer, ISBN: 978-3-031-76921-4, 2024

A data-driven distributed process monitoring method for industry manufacturing systems.
Trans. Inst. Meas. Control, 2024

Efficient and Accurate Cloud-Assisted Medical Pre-Diagnosis With Privacy Preservation.
IEEE Trans. Dependable Secur. Comput., 2024

Screening chronic kidney disease through deep learning utilizing ultra-wide-field fundus images.
npj Digit. Medicine, 2024

A deep learning system for myopia onset prediction and intervention effectiveness evaluation in children.
npj Digit. Medicine, 2024

A Nonoverlapping Sampling Approach With Peak Data Utilization for Hyperspectral Classification.
IEEE Geosci. Remote. Sens. Lett., 2024

Mean-variance reinsurance and asset liability management with common shock via non-Markovian stochastic factors.
Int. J. Control, 2024

Dual-Channel in Spatial-Frequency Domain CycleGAN for perceptual enhancement of transcranial cortical vascular structure and function.
Comput. Biol. Medicine, 2024

Towards a Pattern Language for Creative Affordances.
Proceedings of the 29th European Conference on Pattern Languages of Programs, 2024

2023
Predicting Changes in User-Driven Requirements Using Conditional Random Fields in Agile Software Development.
IEEE Trans. Engineering Management, November, 2023

A two-stage approach for identifying and interpreting self-admitted technical debt.
Appl. Intell., November, 2023

Resilience of long chain under disruption.
Eur. J. Oper. Res., September, 2023

Test-retest reliability of 3D velocity-selective arterial spin labeling for detecting normal variations of cerebral blood flow.
NeuroImage, May, 2023

A hybrid imbalanced classification model based on data density.
Inf. Sci., May, 2023

An Accurate and Privacy-Preserving Retrieval Scheme Over Outsourced Medical Images.
IEEE Trans. Serv. Comput., 2023

Efficient and Privacy-Preserving Similar Patients Query Scheme Over Outsourced Genomic Data.
IEEE Trans. Cloud Comput., 2023

SCGRU: A general approach for identifying multiple classes of self-admitted technical debt with text generation oversampling.
J. Syst. Softw., 2023

Hierarchical Method for Mining a Prevailing Flight Pattern in Airport Terminal Airspace.
J. Aerosp. Inf. Syst., 2023

ECDX: Energy consumption prediction model based on distance correlation and XGBoost for edge data center.
Inf. Sci., 2023

Valid Information Guidance Network for Compressed Video Quality Enhancement.
CoRR, 2023

Smart PV Inverter Cyberattack Detection Using Hardware-in-the-Loop Test Facility.
IEEE Access, 2023

An Analytical Framework for Designing Future Hybrid Creative Learning Spaces: A Pattern Approach.
Proceedings of the Learning and Collaboration Technologies, 2023

Hybrid Creative Spaces Pattern Workshop: A Report on Investigation of TACIT Themes and Design Requirements.
Proceedings of the 28th European Conference on Pattern Languages of Programs, 2023

Long-distance Information Filtering Network for Compressed Video Quality Enhancement.
Proceedings of the Data Compression Conference, 2023

2022
Identifying the Lineament Structure Cooperatively Using the Airborne Gravimetric, Magnetic, and Remote Sensing Data: A Case Study From the Pobei Area, NW China.
IEEE Trans. Geosci. Remote. Sens., 2022

A Software and Hardware Cooperation Method for Full Nyquist Rate Transmission Symbol Synchronization at E-Band Wireless Communication.
Sensors, 2022

A Study of Health Insurance Fraud in China and Recommendations for Fraud Detection and Prevention.
J. Organ. End User Comput., 2022

Deep neural network ensembles for detecting self-admitted technical debt.
J. Intell. Fuzzy Syst., 2022

A systematic review of academic dishonesty in online learning environments.
J. Comput. Assist. Learn., 2022

Generic improvements to least squares monte carlo methods with applications to optimal stopping problems.
Eur. J. Oper. Res., 2022

Should firms pay for online brand communities: Using lead user theory in analyzing two contrasting cases.
Decis. Support Syst., 2022

Efficient and Accurate Quantized Image Super-Resolution on Mobile NPUs, Mobile AI & AIM 2022 challenge: Report.
CoRR, 2022

Efficient Server-Aided Personalized Treatment Recommendation with Privacy Preservation.
Proceedings of the IEEE Global Communications Conference, 2022

Secure and Distributed Access Control for Dynamic Pervasive Edge Computing Services.
Proceedings of the IEEE Global Communications Conference, 2022




2021
Backpropagation Neural Network Algorithm-Based Color Doppler Ultrasound Detection of Gestational Diabetes Mellitus and Perinatal Outcomes.
Sci. Program., 2021

Genes associated with gray matter volume alterations in schizophrenia.
NeuroImage, 2021

Multi-Grid Back-Projection Networks.
IEEE J. Sel. Top. Signal Process., 2021

Fast and Secure Location-Based Services in Smart Cities on Outsourced Data.
IEEE Internet Things J., 2021

A lighting control system of art museum based on image recognition and STM32.
Int. J. Sens. Networks, 2021

Three-level quantum satellite communication framework and its applications.
Int. J. Satell. Commun. Netw., 2021

Security assessment and impact analysis of cyberattacks in integrated T&D power systems.
Proceedings of the MSCPES@CPSIoTWeek '21: Proceedings of the 9th Workshop on Modeling and Simulation of Cyber-Physical Energy Systems, Virtual Event, May 19, 2021

2020
Power Allocation With Energy Efficiency Optimization in Cellular D2D-Based V2X Communication Network.
IEEE Trans. Intell. Transp. Syst., 2020

Semi-quantum-honest key agreement scheme with three-particle entangled states in cross-realm setting.
Quantum Inf. Process., 2020

Neural mechanisms of <i>AVPR1A</i> RS3-RS1 haplotypes that impact verbal learning and memory.
NeuroImage, 2020

CREDO: Efficient and privacy-preserving multi-level medical pre-diagnosis based on ML-<i>kNN</i>.
Inf. Sci., 2020

Studying Online Support for Caregivers of Patients With Alzheimer's Disease in China: A Text-Mining Approach to Online Forum in China.
Int. J. Heal. Inf. Syst. Informatics, 2020

Cost-sensitive multiple-instance learning method with dynamic transactional data for personal credit scoring.
Expert Syst. Appl., 2020

Who Can We Trust: A New Approach for Fraudulent Rater Detection in Reputation Systems.
Decis. Sci., 2020

Search Me in the Dark: Privacy-preserving Boolean Range Query over Encrypted Spatial Data.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Research on Multi-disciplinary Museum Lighting Design's Emotional Response to Visitors: A Case Study of Dalian Modern Museum.
Proceedings of the Green Energy and Networking - 7th EAI International Conference, 2020

Spatial Dynamic Searchable Encryption with Forward Security.
Proceedings of the Database Systems for Advanced Applications, 2020

2019
Influencing factors analysis and modeling of hospital-acquired infection in elderly patients.
J. Comb. Optim., 2019

Trustworthy and profit: A new value-based neighbor selection method in recommender systems under shilling attacks.
Decis. Support Syst., 2019

Fast non-convex low-rank matrix decomposition for separation of potential field data using minimal memory.
CoRR, 2019

Microwave Photonic Channelizer Based on Polarization Multiplexing and Photonic Dual Output Image Reject Mixer.
IEEE Access, 2019

High-Precision Optical Time Delay Measurement Based on Carrier-Suppressed Optical Double-Sideband Modulation.
Proceedings of the 2019 24th OptoElectronics and Communications Conference (OECC) and 2019 International Conference on Photonics in Switching and Computing (PSC), 2019

Fast Image Enhancement Based on Maximum and Guided Filters.
Proceedings of the 2019 IEEE International Conference on Image Processing, 2019

MGBPv2: Scaling Up Multi-Grid Back-Projection Networks.
Proceedings of the 2019 IEEE/CVF International Conference on Computer Vision Workshops, 2019





DeepVCM: A Deep Learning Based Intrusion Detection Method in VANET.
Proceedings of the 5th IEEE International Conference on Big Data Security on Cloud, 2019

Multigrid Backprojection Super-Resolution and Deep Filter Visualization.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

2018
Provably Secure and Password-Authenticated Hybrid Key Agreement Protocol in Two-realm with Privacy-Protection.
J. Inf. Hiding Multim. Signal Process., 2018

A Novel Two-party Password-Authenticated Key Retrieval Scheme.
J. Inf. Hiding Multim. Signal Process., 2018

Artsy-GAN: A style transfer system with improved quality, diversity and performance.
Proceedings of the 24th International Conference on Pattern Recognition, 2018

Achieve Efficient and Privacy-Preserving Medical Primary Diagnosis Based on kNN.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

Multi-scale Recursive and Perception-Distortion Controllable Image Super-Resolution.
Proceedings of the Computer Vision - ECCV 2018 Workshops, 2018

Deep Networks for Image-to-Image Translation with Mux and Demux Layers.
Proceedings of the Computer Vision - ECCV 2018 Workshops, 2018


2016
Skull Optical Clearing Solution for Enhancing Ultrasonic and Photoacoustic Imaging.
IEEE Trans. Medical Imaging, 2016

Automatic Time Picking for Microseismic Data Based on a Fuzzy C-Means Clustering Algorithm.
IEEE Geosci. Remote. Sens. Lett., 2016

云环境下基于代数签名持有性审计的大数据安全存储方案 (Big Data Storage Security Scheme Based on Algebraic Signature Possession Audit in Cloud Environment).
计算机科学, 2016

A Novel On-Demand Password Scheme Based on BAN Logic.
J. Inf. Hiding Multim. Signal Process., 2016

A Multi-server Authenticated Key Agreement Protocol with Privacy preserving Based on Chaotic Maps in Random Oracle Model.
J. Inf. Hiding Multim. Signal Process., 2016

An exact method for the sensitivity analysis of systems simulated by rejection techniques.
Eur. J. Oper. Res., 2016

Reputation in an open source software community: Antecedents and impacts.
Decis. Support Syst., 2016

Linearized phase-modulated analog photonic link based on optical carrier band processing.
Proceedings of the 25th Wireless and Optical Communication Conference, 2016

3/4G multi-system of indoor coverage problems location analysis and application.
Proceedings of the 16th International Symposium on Communications and Information Technologies, 2016

Using LAU information in mobile communication for high-speed user selection.
Proceedings of the 16th International Symposium on Communications and Information Technologies, 2016

2015
Airport Target Detection in Remote Sensing Images: A New Method Based on Two-Way Saliency.
IEEE Geosci. Remote. Sens. Lett., 2015

Rating Fraud Detection - Towards Designing a Trustworthy Reputation Systems.
Proceedings of the International Conference on Information Systems, 2015

Do You Need to Pay For Online Community: A Comparison Study.
Proceedings of the 21st Americas Conference on Information Systems, 2015

An Evidence-Based Analysis for Liver Transplants: Insights for Organ Allocation Policy.
Proceedings of the 21st Americas Conference on Information Systems, 2015

2014
A compact UHF bandpass filter with high stopband rejection based on multilayer LTCC technology.
Proceedings of the 2014 International Symposium on Wireless Personal Multimedia Communications, 2014

Two-way saliency for airport detection in remote sensing images.
Proceedings of the International Conference on Audio, 2014

2013
Measuring Similarity Based on Link Information: A Comparative Study.
IEEE Trans. Knowl. Data Eng., 2013

Robust and Simple N-Party Entangled Authentication Cloud Storage Protocol Based on Secret Sharing Scheme.
J. Inf. Hiding Multim. Signal Process., 2013

The Ornstein-Uhlenbeck-Type Model with a Hybrid Dividend Strategy.
J. Appl. Math., 2013

An integrated e-service model for electronic medical records.
Inf. Syst. E Bus. Manag., 2013

A new pruning method for resolving conflicts in actionable behavioral rules.
Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics, 2013

A Theoretical Exploration for Supply Chain Leagility Capability.
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013

Terrain simplification from grid DEMs based on spatial autocorrelation.
Proceedings of the 21st International Conference on Geoinformatics, 2013

Application specified soft error failure rate analysis using sequential equivalence checking techniques.
Proceedings of the 18th Asia and South Pacific Design Automation Conference, 2013

Understanding Factors Influencing Users' Retweeting Behavior - A Theoretical Perspective.
Proceedings of the 19th Americas Conference on Information Systems, 2013

2012
Two New Prediction-Driven Approaches to Discrete Choice Prediction.
ACM Trans. Manag. Inf. Syst., 2012

A New Approach to Testing Nomological Validity and Its Application to a Second-Order Measurement Model of Trust.
J. Assoc. Inf. Syst., 2012

Shilling Attack Detection - A New Approach for a Trustworthy Recommender System.
INFORMS J. Comput., 2012

Combining Spatial Cloaking and Dummy Generation for Location Privacy Preserving.
Proceedings of the Advanced Data Mining and Applications, 8th International Conference, 2012

2011
When Costs Are Unequal and Unknown: A Subtree Grafting Approach for Unbalanced Data Classification.
Decis. Sci., 2011

Object technology software selection: a case study.
Ann. Oper. Res., 2011

Mining Search Subtopics from Query Logs.
Proceedings of the 9th NTCIR Workshop Meeting on Evaluation of Information Access Technologies: Information Retrieval, 2011

NSCT based road extraction from remote sensing image using directional prior.
Proceedings of the 2011 IEEE International Geoscience and Remote Sensing Symposium, 2011

The effect of spinning missile on the position calculating of the reticle infrared detecting system.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011

2010
A hybrid approach for efficient ensembles.
Decis. Support Syst., 2010

An Approximate Soft Error Reliability Sorting Approach Based on State Analysis of Sequential Circuits.
Proceedings of the 25th IEEE International Symposium on Defect and Fault Tolerance in VLSI Systems, 2010

On Soft Error Immunity of Sequential Circuits.
Proceedings of the 19th IEEE Asian Test Symposium, 2010

2009
Analytical Competition for Managing Customer Relations.
Proceedings of the Encyclopedia of Data Warehousing and Mining, Second Edition (4 Volumes), 2009

Identity disclosure protection: A data reconstruction approach for privacy-preserving data mining.
Decis. Support Syst., 2009

Cell affinity of PHBV thin films evaluated by a parallel plate flow chamber.
Proceedings of the 4th IEEE International Conference on Nano/Micro Engineered and Molecular Systems, 2009

2008
Time-line based model for software project scheduling with genetic algorithms.
Inf. Softw. Technol., 2008

A Comparison and Scenario Analysis of Leading Data Mining Software.
Int. J. Knowl. Manag., 2008

2D Decomposition Sequential Equivalence Checking of System Level and RTL Descriptions.
Proceedings of the 9th International Symposium on Quality of Electronic Design (ISQED 2008), 2008

2007
Diminishing downsides of Data Mining.
Int. J. Bus. Intell. Data Min., 2007

Identity Disclosure Protection: A Data Reconstruction Approach for Preserving Privacy in Data Mining.
Proceedings of the International Conference on Information Systems, 2007

Outsourcing Resource Selection: A Rough Set Approach.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

A foundational study on the applicability of genetic algorithm to software engineering problems.
Proceedings of the IEEE Congress on Evolutionary Computation, 2007

2006
Knowledge integration using problem spaces: A study in resource-constrained project scheduling.
J. Sched., 2006

Organizational Memory Management: Technological and Research Issues.
J. Database Manag., 2006

Predicting Airline Choices: A Decision Support Perspective and Alternative Approaches.
Proceedings of the International Conference on Information Systems, 2006

2005
Applying Constraint Logic Programming to Predicate Abstraction of RTL Verilog Descriptions.
Proceedings of the MICAI 2005: Advances in Artificial Intelligence, 2005

MA2TG: A Functional Test Program Generator for Microprocessor Verification.
Proceedings of the Eighth Euromicro Symposium on Digital Systems Design (DSD 2005), 30 August, 2005

Automatic functional test program generation for microprocessor verification.
Proceedings of the 2005 Conference on Asia South Pacific Design Automation, 2005

2002
Edition Security Control in Inter-bank Fund Transfer.
J. Electron. Commer. Res., 2002

Intelligent Architectures for Knowledge Sharing: A Soar Example and General Issues.
Proceedings of the Fifteenth International Florida Artificial Intelligence Research Society Conference, 2002

2001
Data Mining for Network Intrusion Detection: A Comparison of Alternative Methods.
Decis. Sci., 2001

1997
When Processes Learn: Steps Toward Crafting an Intelligent Organization.
Inf. Syst. Res., 1997

Connectionist approaches for solver selection in constrained project scheduling.
Ann. Oper. Res., 1997


  Loading...