Zhenhua Liu
This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.
Known people with the same name:
- Zhenhua Liu 001 (Xidian University, School of Mathematics and Statistics, Xi'an, China)
- Zhenhua Liu 002 (Stony Brook University, Department of Applied Mathematics and Statistics, NY, USA)
- Zhenhua Liu 003 (Peking University, Beijing, China)
- Zhenhua Liu 004 (South China Agricultural University, Guangzhou, China)
- Zhenhua Liu 005 (Stevens Institute of Technology, Hoboken, NJ, USA)
- Zhenhua Liu 006 (NLP Group, Gridsum, Beijing, China)
- Zhenhua Liu 007 (Dongbei University of Finance and Economics, Dalian, China)
- Zhenhua Liu 008 (Huawei Technologies Co., Ltd, Beijing, China)
Bibliography
2024
IEEE Trans. Instrum. Meas., 2024
Controllable and Diverse Data Augmentation with Large Language Model for Low-Resource Open-Domain Dialogue Generation.
CoRR, 2024
Improving soil organic carbon estimation in paddy fields using data augmentation algorithm and deep neural network model based on optimal image date.
Comput. Electron. Agric., 2024
A novel machine learning-based framework to extract the urban flood susceptible regions.
Int. J. Appl. Earth Obs. Geoinformation, 2024
10-mode PM-QPSK Transmission over 2320 km Enabled by Optimized Mode Permutation Strategies.
Proceedings of the Optical Fiber Communications Conference and Exhibition, 2024
A Joint Mode Permutation Architecture for 10-modemultiplexed Long-haul Transmissions.
Proceedings of the Optical Fiber Communications Conference and Exhibition, 2024
Enhancing Data Utility in Personalized Differential Privacy: A Fine-Grained Processing Approach.
Proceedings of the Data Security and Privacy Protection - Second International Conference, 2024
Proceedings of the 2024 Joint International Conference on Computational Linguistics, 2024
Proceedings of the 62nd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2024
2023
Active Optimization Method for Power Loss Distribution in T-Type Three-Level Converter Under Half-Wave Symmetry SHEPWM.
IEEE Trans. Ind. Electron., October, 2023
Switching Constrained Online Convex Optimization with Predictions and Feedback Delays.
SIGMETRICS Perform. Evaluation Rev., September, 2023
Entropy, February, 2023
2022
Hybrid Modulation Strategy With Neutral Point Potential Balance of T-Type Three-Level Converter Under Switch Open-Circuit Fault.
IEEE Trans. Ind. Electron., 2022
SCANET: Improving multimodal representation and fusion with sparse- and cross-attention for multimodal sentiment analysis.
Comput. Animat. Virtual Worlds, 2022
Tencent-MVSE: A Large-Scale Benchmark Dataset for Multi-Modal Video Similarity Evaluation.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022
2021
Integration of Results From Convolutional Neural Network in a Support Vector Machine for the Detection of Atrial Fibrillation.
IEEE Trans. Instrum. Meas., 2021
Int. J. High Perform. Syst. Archit., 2021
Prioritizing failure risks of components based on information axiom for product redesign considering fuzzy and random uncertainties.
Concurr. Eng. Res. Appl., 2021
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021
Understanding Drug Abuse Social Network Using Weighted Graph Neural Networks Explainer.
Proceedings of the Computational Science and Its Applications - ICCSA 2021, 2021
Proceedings of the Findings of the Association for Computational Linguistics: ACL/IJCNLP 2021, 2021
2020
Research on the module configuration of complex products considering the evolution of the product family.
J. Intell. Fuzzy Syst., 2020
A portable, low-cost and sensor-based detector on sweetness and firmness grades of kiwifruit.
Comput. Electron. Agric., 2020
2019
Int. J. Netw. Secur., 2019
Proceedings of the 4th International Conference on Intelligent Transportation Engineering, 2019
2018
Int. J. High Perform. Comput. Netw., 2018
2017
A Fully Secure Verifiable and Outsourced Decryption Ranked Searchable Encryption Scheme Supporting Synonym Query.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017
2016
The opportunities and solutions to solve critical issues of Chinese logistics in internet plus era.
Proceedings of the International Conference on Logistics, Informatics and Service Sciences, 2016
2015
CoRR, 2015
Proceedings of the 17th IEEE International Workshop on Multimedia Signal Processing, 2015
2014
Secur. Commun. Networks, 2014
Chosen-Ciphertext Secure Multi-use Unidirectional Attribute-Based Proxy Re-Encryptions.
Proceedings of the Ninth Asia Joint Conference on Information Security, 2014
Proceedings of the 14th IEEE International Conference on Computer and Information Technology, 2014
2011
Proceedings of the 6th International ICST Conference on Communications and Networking in China, 2011
2010
A multistandard, multiband SoC with integrated BT, FM, WLAN radios and integrated power amplifier.
Proceedings of the IEEE International Solid-State Circuits Conference, 2010
2009
Proceedings of the 2009 International Conference on Information Networking, 2009
Proceedings of the 2009 International Conference on Information Networking, 2009
2008
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008
2007
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2007
Proceedings of The 2nd IEEE Asia-Pacific Services Computing Conference, 2007
2006
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006
2005
The study of the combining finite element with genetic algorithms method for soil moisture.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2005
2004
Proceedings of the 2004 IEEE International Geoscience and Remote Sensing Symposium, 2004
Proceedings of the 2004 IEEE International Geoscience and Remote Sensing Symposium, 2004
2003
Proceedings of the Information and Communications Security, 5th International Conference, 2003
2002
Proceedings of the Advanced Communications and Multimedia Security, 2002