Yongzhao Zhan

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Known people with the same name:

Bibliography

2024
Robust edge-preserving image smoothing based on complementary weighting scheme.
Signal Image Video Process., September, 2024

SAM-guided contrast based self-training for source-free cross-domain semantic segmentation.
Multim. Syst., August, 2024

BPFormNet: a lightweight block pyramid network for form segmentation and classification.
Int. J. Document Anal. Recognit., March, 2024

Weakly supervised video anomaly detection based on spatial-temporal feature fusion enhancement.
Signal Image Video Process., 2024

Performance prediction of multivariable linear regression based on the optimal influencing factors for ranking aggregation in crowdsourcing task.
Data Technol. Appl., 2024

A dual-prototype network combining query-specific and class-specific attentive learning for few-shot action recognition.
Neurocomputing, 2024

2023
SPRA: Scalable policy-based regulatory architecture for blockchain transactions.
IET Blockchain, December, 2023

A boosted co-training method for class-imbalanced learning.
Expert Syst. J. Knowl. Eng., November, 2023

2022
SDSM: Secure Data Sharing for Multilevel Partnerships in IoT Based Supply Chain.
Symmetry, 2022

Robust low-rank representation via residual projection for image classification.
Knowl. Based Syst., 2022

A deep learning based bank card detection and recognition method in complex scenes.
Appl. Intell., 2022

2021
Overlapping Community Detection Based on Attribute Augmented Graph.
Entropy, 2021

Human-Object Interaction Detection Based on Multi-scale Attention Fusion.
Proceedings of the Image and Graphics - 11th International Conference, 2021

2019
A zero-watermarking scheme for three-dimensional mesh models based on multi-features.
Multim. Tools Appl., 2019

Locality and Sparsity Preserving Embedding Convolutional Neural Network for Image Classification.
Proceedings of the Intelligence Science and Big Data Engineering. Visual Data Engineering, 2019

A Novel Approach to Classify Video Scenes via Mining Weighted Association Rules of Actions in Temporal Sequence.
Proceedings of the 4th International Conference on Multimedia Systems and Signal Processing, 2019

TA-CFNet: A New CFNet with Target Aware for Object Tracking.
Proceedings of the Image and Graphics - 10th International Conference, 2019

Weighted Feature Pyramid Network for One-Stage Object Detection.
Proceedings of the Image and Graphics - 10th International Conference, 2019

2018
Evaluating a Cover Based Rough Set Classifier in a Content Based Image Retrieval System.
Proceedings of the 14th International Conference on Signal-Image Technology & Internet-Based Systems, 2018

A Review of Wrapper Feature Selection in Content Based Image Retrieval Systems.
Proceedings of the 10th International Conference on Machine Learning and Computing, 2018

2017
A cloud computing architecture for characterization and classification of moving object.
Multim. Tools Appl., 2017

Improved combined invariant moment for moving targets classification.
Multim. Tools Appl., 2017

基于混合式协同训练的人体动作识别算法研究 (Research on Action Recognition Algorithm Based on Hybrid Cooperative Training).
计算机科学, 2017

Multimodal spatial-based segmentation framework for white matter lesions in multi-sequence magnetic resonance images.
Biomed. Signal Process. Control., 2017

2016
An approach of security testing for third-party component based on state mutation.
Secur. Commun. Networks, 2016

Complex video event detection via pairwise fusion of trajectory and multi-label hypergraphs.
Multim. Tools Appl., 2016

2015
反一致可能性C均值聚类算法 (Anti-consistency Possibilistic C-means Clustering Algorithm).
计算机科学, 2015

A Novel Diversity-Based Semi-Supervised Learning Framework with Related Theoretical Analysis.
Int. J. Artif. Intell. Tools, 2015

Automatic method for white matter lesion segmentation based on T1-fluid-attenuated inversion recovery images.
IET Comput. Vis., 2015

Preference and Movement Pattern Similarity-Based Resource Discovery Enhancement Algorithm for Internet of People.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

Hyperspectral image classification using multilayer superpixel graph and loopy belief propagation.
Proceedings of the 2015 IEEE International Geoscience and Remote Sensing Symposium, 2015

2014
A Web services vulnerability testing approach based on combinatorial mutation and SOAP message mutation.
Serv. Oriented Comput. Appl., 2014

A blind watermarking algorithm for 3D mesh models based on vertex curvature.
J. Zhejiang Univ. Sci. C, 2014

2013
Load-Balanced Secure Routing Protocol for Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2013

Detecting and Defending against Replication Attacks in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2013

Design Considerations of Self-Adaptive Wireless M2M Network Communication Architecture.
Int. J. Distributed Sens. Networks, 2013

The retrieval of motion event by associations of temporal frequent pattern growth.
Future Gener. Comput. Syst., 2013

A Semi-supervised Incremental Learning Algorithm Based on Auto-adaptive Probabilistic Hypergraph and Its Application for Video Semantic Detection.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

2012
Combinatorial Mutation Approach to Web Service Vulnerability Testing Based on SOAP Message Mutations.
Proceedings of the Ninth IEEE International Conference on e-Business Engineering, 2012

2011
Shot retrieval based on fuzzy evolutionary aiNet and hybrid features.
Comput. Hum. Behav., 2011

Research of Access Control in Electronic Medical Record Based on UCON.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

2010
A New Classifier for Facial Expression Recognition: Fuzzy Buried Markov Model.
J. Comput. Sci. Technol., 2010

Facial expression recognition based on combined HMM.
Int. J. Comput. Appl. Technol., 2010

Security Topology Control Method for Wireless Sensor Networks with Node-Failure Tolerance Based on Self-Regeneration.
EURASIP J. Wirel. Commun. Netw., 2010

2009
Expression Recognition Based on VLBP and Optical Flow Mixed Features.
Proceedings of the Fifth International Conference on Image and Graphics, 2009

Pseudo Invariant Line Moment to Detect the Target Region of Moving Vessels.
Proceedings of the Emerging Intelligent Computing Technology and Applications, 2009

Hierarchical Face Recognition Based on SVDD and SVM.
Proceedings of the 2009 International Conference on Environmental Science and Information Application Technology, 2009

2008
Reasoning about Action for Behavioral Animation of Intelligent Virtual Agents.
Int. J. Virtual Real., 2008

Adaptive and Optimal Classification of Speech Emotion Recognition.
Proceedings of the Fourth International Conference on Natural Computation, 2008

2007
Modelling intrusion for intrusion tolerance system by correlating alerts from IDS sensor.
Int. J. Autom. Control., 2007

Facial Expression Recognition Based on Hybrid Features and Fusing Discrete HMMs.
Proceedings of the Virtual Reality, 2007

Upper Facial Action Units Recognition Based on KPCA and SVM.
Proceedings of the 4th International Conference on Computer Graphics, 2007

2006
Facial Expression Recognition Based on Selective Feature Extraction.
Proceedings of the Sixth International Conference on Intelligent Systems Design and Applications (ISDA 2006), 2006

3-D Personalized Face Reconstruction Based on Multi-layer and Multi-region with RBFs.
Proceedings of the Advances in Artificial Reality and Tele-Existence, 2006

2004
Facial expression features extraction based on Gabor wavelet transformation.
Proceedings of the IEEE International Conference on Systems, 2004

A fast color correction method based on image analysis.
Proceedings of the Third International Conference on Image and Graphics, 2004

Enhancing the Content of the Intrusion Alerts Using Logic Correlation.
Proceedings of the Content Computing, Advanced Workshop on Content Computing, 2004

1999
Demand Priority Protocol simulation and evaluation.
J. Comput. Sci. Technol., 1999


  Loading...