Gansen Zhao

Orcid: 0009-0007-1526-5326

According to our database1, Gansen Zhao authored at least 108 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
MVF-SleepNet: Multi-View Fusion Network for Sleep Stage Classification.
IEEE J. Biomed. Health Informatics, May, 2024

End-to-End Delay Modeling via Leveraging Competitive Interaction Among Network Flows.
IEEE Trans. Netw. Serv. Manag., April, 2024

Network traffic matrix prediction with incomplete data via masked matrix modeling.
Inf. Sci., February, 2024

EDSNet: A deep supervision-based classification framework for non-standard medical images of lung cancer.
Proceedings of the International Joint Conference on Neural Networks, 2024

Detection of High-Low Risk Lung Tumors Using Semi-Supervised and Selective Labeling Techniques.
Proceedings of the International Joint Conference on Neural Networks, 2024

DepthParkNet: A 3D Convolutional Neural Network with Depth-Aware Coordinate Attention for PET-Based Parkinson's Disease Diagnosis.
Proceedings of the Advanced Intelligent Computing in Bioinformatics, 2024

2023
KeepEdge: A Knowledge Distillation Empowered Edge Intelligence Framework for Visual Assisted Positioning in UAV Delivery.
IEEE Trans. Mob. Comput., August, 2023

A survey on the efficiency, reliability, and security of data query in blockchain systems.
Future Gener. Comput. Syst., August, 2023

Neural-FEBI: Accurate function identification in Ethereum Virtual Machine bytecode.
J. Syst. Softw., May, 2023

Blockchain for achieving accountable outsourcing computations in edge computing.
Comput. Commun., February, 2023

Subscription-Based State Access for Cross-Chain Smart Contracts.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

Improving Voice Style Conversion via Self-attention VAE with Feature Disentanglement.
Proceedings of the Computer Supported Cooperative Work and Social Computing, 2023

A Suitability Assessment Framework for Medical Cell Images in Chromosome Analysis.
Proceedings of the Web Information Systems and Applications, 2023

2022
bi-directional Bayesian probabilistic model based hybrid grained semantic matchmaking for Web service discovery.
World Wide Web, 2022

DS-ADMM++: A Novel Distributed Quantized ADMM to Speed up Differentially Private Matrix Factorization.
IEEE Trans. Parallel Distributed Syst., 2022

CIR-Net: Automatic Classification of Human Chromosome Based on Inception-ResNet Architecture.
IEEE ACM Trans. Comput. Biol. Bioinform., 2022

A Clinical Dataset and Various Baselines for Chromosome Instance Segmentation.
IEEE ACM Trans. Comput. Biol. Bioinform., 2022

Clustering by Errors: A Self-Organized Multitask Learning Method for Acoustic Scene Classification.
Sensors, 2022

A novel EEG-based major depressive disorder detection framework with two-stage feature selection.
BMC Medical Informatics Decis. Mak., 2022

A context-enhanced sentence representation learning method for close domains with topic modeling.
Inf. Sci., 2022

Flow-by-flow traffic matrix prediction methods: Achieving accurate, adaptable, low cost results.
Comput. Commun., 2022

MDD-TSVM: A novel semisupervised-based method for major depressive disorder detection using electroencephalogram signals.
Comput. Biol. Medicine, 2022

ChromosomeNet: A massive dataset enabling benchmarking and building basedlines of clinical chromosome classification.
Comput. Biol. Chem., 2022

MTT: an efficient model for encrypted network traffic classification using multi-task transformer.
Appl. Intell., 2022

A Scalable Blockchain-Based Trust Management Strategy for Vehicular Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

Game Theory based D2D Collaborative Offloading for Workflow Applications in Mobile Edge Computing.
Proceedings of the IEEE International Conference on Web Services, 2022

EtherGIS: A Vulnerability Detection Framework for Ethereum Smart Contracts Based on Graph Learning Features.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022

EOSIOAnalyzer: An Effective Static Analysis Vulnerability Detection Framework for EOSIO Smart Contracts.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022

ValidatorRep: Blockchain-based Trust Management for Ensuring Accountability in Crowdsourcing.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022

CoPatE: A Novel Contrastive Learning Framework for Patent Embeddings.
Proceedings of the 31st ACM International Conference on Information & Knowledge Management, 2022

2021
A novel chromosome cluster types identification method using ResNeXt WSL model.
Medical Image Anal., 2021

Adaptive cross-contextual word embedding for word polysemy with unsupervised topic modeling.
Knowl. Based Syst., 2021

Environmental sound analysis with mixup based multitask learning and cross-task fusion.
CoRR, 2021

A novel approach to diagnose sleep apnea using enhanced frequency extraction network.
Comput. Methods Programs Biomed., 2021

A novel chromosome instance segmentation method based on geometry and deep learning.
Proceedings of the International Joint Conference on Neural Networks, 2021

Identification of Incorrect Karyotypes Using Deep Learning.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2021, 2021

EEG-based Major Depressive Disorder Detection Using Data Mining Techniques.
Proceedings of the 43rd Annual International Conference of the IEEE Engineering in Medicine & Biology Society, 2021

A Novel Traversal Search-Based D2D Collaborative Offloading Approach for Workflow Application in Dynamic Edge Environment.
Proceedings of the Computer Supported Cooperative Work and Social Computing, 2021

2020
ContractGuard: Defend Ethereum Smart Contracts with Embedded Intrusion Detection.
IEEE Trans. Serv. Comput., 2020

Optimizing the confidence bound of count-min sketches to estimate the streaming big data query results more precisely.
Computing, 2020

Mr-ResNeXt: A Multi-resolution Network Architecture for Detection of Obstructive Sleep Apnea.
Proceedings of the Neural Computing for Advanced Applications, 2020

bi-HPTM: An Effective Semantic Matchmaking Model for Web Service Discovery.
Proceedings of the 2020 IEEE International Conference on Web Services, 2020

Translation Of DDL And DML For Constructing Flexible Schemas In Saas Applications.
Proceedings of the 5th International Conference on Computer and Communication Systems, 2020

Chromosome Cluster Identification Framework Based on Geometric Features and Machine Learning Algorithms.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2020

A Multi-Stages Chromosome Segmentation and Mixed Classification Method for Chromosome Automatic Karyotyping.
Proceedings of the Web Information Systems and Applications, 2020

2019
基于概率模型的云辅助的轻量级无证书认证协议的形式化验证 (Formal Verification of Cloud-aided Lightweight Certificateless Authentication Protocol Based on Probabilistic Model).
计算机科学, 2019

Research on Strategy Optimization of OpenFlow Switch Flow Table Based on "Bus Route" Idea.
Proceedings of the 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2019

Basis Path Coverage Criteria for Smart Contract Application Testing.
Proceedings of the 2019 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2019

MDP-Based Quantitative Analysis Framework for Proof of Authority.
Proceedings of the 2019 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2019

Research and Implementation of Flow Table Optimization Strategy for SDN Switches Based on the Idea of "Main Road".
Proceedings of the Computer Supported Cooperative Work and Social Computing, 2019

2018
CNNs-based Acoustic Scene Classification using Multi-Spectrogram Fusion and Label Expansions.
CoRR, 2018

A Research and Application Based on Gradient Boosting Decision Tree.
Proceedings of the Web Information Systems and Applications, 2018

2017
Triple-L: Improving CPS Disk I/O Performance in a Virtualized NAS Environment.
IEEE Syst. J., 2017

A Unified Model for Detecting Privacy Leakage on Android.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

2016
A Two-Phase Space Resection Model for Accurate Topographic Reconstruction from Lunar Imagery with PushbroomScanners.
Sensors, 2016

Constructing authentication web in cloud computing.
Secur. Commun. Networks, 2016

Fast algorithms to evaluate collaborative filtering recommender systems.
Knowl. Based Syst., 2016

Special Section on Advanced Technologies for Homeland and Cyber Defense.
Intell. Autom. Soft Comput., 2016

Secure Access Control of E-Health System with Attribute-Based Encryption.
Intell. Autom. Soft Comput., 2016

Writeback throttling in a virtualized system with SCM.
Frontiers Comput. Sci., 2016

Queries over Large-Scale Log Data of Hybrid Granularities.
Proceedings of the 15th International Symposium on Parallel and Distributed Computing, 2016

PARecommender: A Pattern-Based System for Route Recommendation.
Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, 2016

Queries over Large-Scale Incremental Data of Hybrid Granularities.
Proceedings of the 7th International Conference on Cloud Computing and Big Data, 2016

Online Prediction for Forex with an Optimized Experts Selection Model.
Proceedings of the Web Technologies and Applications - 18th Asia-Pacific Web Conference, 2016

2015
A Multilevel Security Model for Search Engine Over Integrated Data.
Trans. Comput. Collect. Intell., 2015

Designing cloud-based electronic health record system with attribute-based encryption.
Multim. Tools Appl., 2015

代理移动IPv6中的分布式NEMO网络实现方案 (Distributed Network Mobility Management over Proxy Mobile IPv6 Network).
计算机科学, 2015

Resource Constrained Data Stream Clustering with Concept Drifting for Processing Sensor Data.
Int. J. Data Warehous. Min., 2015

Image retrieval based on multi-concept detector and semantic correlation.
Sci. China Inf. Sci., 2015

Model and Comparison of Membership Testing Approach for Massive Data.
Proceedings of the International Conference on Cloud Computing and Big Data, 2015

Simple is Beautiful: An Online Collaborative Filtering Recommendation Solution with Higher Accuracy.
Proceedings of the Web Technologies and Applications - 17th Asia-PacificWeb Conference, 2015

2014
A Network-Friendly Disk I/O Optimization Framework in a Virtualized Cloud System.
Proceedings of the IEEE 8th International Symposium on Embedded Multicore/Manycore SoCs, 2014

A Novel Method in Extracranial Removal of Brain MR Images.
Proceedings of the Second International Conference on Information Technology and Quantitative Management, 2014

An Effective Clustering Algorithm for Auto-Detecting Well-Separated Clusters.
Proceedings of the 2014 IEEE International Conference on Data Mining Workshops, 2014

Schema Conversion Model of SQL Database to NoSQL.
Proceedings of the 2014 Ninth International Conference on P2P, 2014

Multiple Nested Schema of HBase for Migration from SQL.
Proceedings of the 2014 Ninth International Conference on P2P, 2014

2013
Semantic description of scholar-oriented social network cloud.
J. Supercomput., 2013

Isolated Word Speech Recognition System Based On FPGA.
J. Comput., 2013

Efficient integer span program for hierarchical threshold access structure.
Inf. Process. Lett., 2013

A Concept Drifting Based Clustering Framework for Data Streams.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

Modeling MongoDB with Relational Model.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

Trust Management for IaaS with Group Signature.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

On the Construction of Trusted Resource Pool in Clouds.
Proceedings of the 2013 10th Web Information System and Application Conference, 2013

Contructing Authentication Web in Cloud Computing.
Proceedings of the 2013 International Conference on Cloud and Service Computing, 2013

Resource Pool Oriented Trust Management for Cloud Infrastructure.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
Reference deployment models for eliminating user concerns on cloud security.
J. Supercomput., 2012

The design of a redundant array of independent net-storages for improved confidentiality in cloud computing.
J. Cloud Comput., 2012

Isolated Word Speech Rcogniton Based on HRSF and Improved DTW Algorithm.
Proceedings of the 2012 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology, 2012

Social Recommendation Based on Multi-relational Analysis.
Proceedings of the 2012 IEEE/WIC/ACM International Conferences on Intelligent Agent Technology, 2012

A fast estimation of shortest path distance for power-law network predominant cloud service.
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012

Privacy Enhancing Framework on PaaS.
Proceedings of the 2012 International Conference on Cloud and Service Computing, 2012

2011
A Cryptographic Protocol for Communication in a Redundant Array of Independent Net-storages.
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011

2010
Deployment models: Towards eliminating security concerns from cloud computing.
Proceedings of the 2010 International Conference on High Performance Computing & Simulation, 2010

Trusted Data Sharing over Untrusted Cloud Storage Providers.
Proceedings of the Cloud Computing, Second International Conference, 2010

Fine-Grained Data Access Control Systems with User Accountability in Cloud Computing.
Proceedings of the Cloud Computing, Second International Conference, 2010

2009
Cloud Computing: A Statistics Aspect of Users.
Proceedings of the Cloud Computing, First International Conference, CloudCom 2009, Beijing, 2009

Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography.
Proceedings of the Cloud Computing, First International Conference, CloudCom 2009, Beijing, 2009

Privacy-Preserving Distributed k-Nearest Neighbor Mining on Horizontally Partitioned Multi-Party Data.
Proceedings of the Advanced Data Mining and Applications, 5th International Conference, 2009

How to Securely Break into RBAC: The BTG-RBAC Model.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

2008
PERMIS: a modular authorization infrastructure.
Concurr. Comput. Pract. Exp., 2008

On the Modeling of Bell-LaPadula Security Policies Using RBAC.
Proceedings of the 17th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, 2008

A Role-Based Access Control Model for Complex Affairs.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

2007
Obligations for Role Based Access Control.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
Distributed Key Management for Secure Role based Messaging.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

2005
Trust Infrastructure for Policy based Messaging In Open Environments.
Proceedings of the 14th IEEE International Workshops on Enabling Technologies (WETICE 2005), 2005

Evolving Messaging Systems for Secure Role Based Messaging.
Proceedings of the 10th International Conference on Engineering of Complex Computer Systems (ICECCS 2005), 2005

An Agent-Based Model For Web Services Transaction Processing.
Proceedings of the 2005 IEEE International Conference on e-Technology, e-Commerce, and e-Services (EEE 2005), 29 March, 2005

2004
Secure Role Based Messaging.
Proceedings of the Communications and Multimedia Security, 2004


  Loading...