Ti Zhou
Orcid: 0000-0003-2871-3785
According to our database1,
Ti Zhou
authored at least 21 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Energy-Efficient Computation with DVFS using Deep Reinforcement Learning for Multi-Task Systems in Edge Computing.
CoRR, 2024
2023
CPU frequency scheduling of real-time applications on embedded devices with temporal encoding-based deep reinforcement learning.
J. Syst. Archit., September, 2023
A Novel Pipeline Corrosion Monitoring Method Based on Piezoelectric Active Sensing and CNN.
Sensors, January, 2023
Energy-Efficient Computation Offloading With DVFS Using Deep Reinforcement Learning for Time-Critical IoT Applications in Edge Computing.
IEEE Internet Things J., 2023
2022
IEEE Trans. Netw. Sci. Eng., 2022
2021
Multi-scale visualization based on sketch interaction for massive surveillance video data.
Pers. Ubiquitous Comput., 2021
2020
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020
2019
Manag. Sci., 2019
2018
Proceedings of the 15th International Symposium on Pervasive Systems, 2018
2017
Efficient Anonymous Authenticated Key Agreement Scheme for Wireless Body Area Networks.
Secur. Commun. Networks, 2017
2016
Proceedings of the Challenges and Opportunity with Big Data, 2016
2014
Estimation of evapotranspiration over heterogeneous surface based on HJ-1B satellite.
Proceedings of the 2014 IEEE Geoscience and Remote Sensing Symposium, 2014
2008
Proceedings of the First International Conference on Foundations of Informatics, 2008
Proceedings of the First International Conference on Foundations of Informatics, 2008
Supremum of Agent Number Needed in Analyzing Security Protocols Based on Horn Logic.
Proceedings of the Twentieth International Conference on Software Engineering & Knowledge Engineering (SEKE'2008), 2008
Proceedings of the Frontiers in Algorithmics, Second Annual International Workshop, 2008
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008
Proceedings of the 6th ACM Workshop on Formal Methods in Security Engineering, 2008
2007
Proceedings of the Frontiers in Algorithmics, First Annual International Workshop, 2007
An Abstraction and Refinement Framework for Verifying Security Protocols Based on Logic Programming.
Proceedings of the Advances in Computer Science, 2007