Zixuan Zhao

Orcid: 0000-0001-6934-0765

According to our database1, Zixuan Zhao authored at least 29 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
SeqESR-GAN-Based Sparse Data Augmentation for Distribution Networks.
IEEE Trans. Ind. Informatics, November, 2024

Partial Discharge Fault Diagnosis in Power Transformers Based on SGMD Approximate Entropy and Optimized BILSTM.
Entropy, July, 2024

Using Transient Product Competitiveness to Elaborate Business Competition in Information-Based Economies: What We Can Learn From Construction.
IEEE Trans. Engineering Management, 2024

M3Net: Movement Enhancement with Multi-Relation toward Multi-Scale video representation for Temporal Action Detection.
Pattern Recognit., 2024

Enhancing artistic analysis through deep learning: a graphic art element recognition model based on SSD and FPT.
PeerJ Comput. Sci., 2024

Nonconvex fusion penalties for high-dimensional hierarchical categorical variables.
Inf. Sci., 2024

Continual Learning in the Presence of Repetition.
CoRR, 2024

Subtoxic Questions: Dive Into Attitude Change of LLM's Response in Jailbreak Attempts.
CoRR, 2024

2023
CholecTriplet2021: A benchmark challenge for surgical action triplet recognition.
Medical Image Anal., May, 2023

Surgical tool classification and localization: results and methods from the MICCAI 2022 SurgToolLoc challenge.
CoRR, 2023

Movement Enhancement toward Multi-Scale Video Feature Representation for Temporal Action Detection.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

Research on obstacle detection in autonomous driving based on YOLOv8.
Proceedings of the 6th International Conference on Data Science and Information Technology, 2023

2022
Leva: Boosting Machine Learning Performance with Relational Embedding Data Augmentation.
Proceedings of the SIGMOD '22: International Conference on Management of Data, Philadelphia, PA, USA, June 12, 2022

Structured Deep Learning Models for Accurate Prediction of Real-world Driving Speed for Short and Long-term Horizons.
Proceedings of the International Joint Conference on Neural Networks, 2022

BACNet: Boundary-Anchor Complementary Network for Temporal Action Detection.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2022

Mr.CAN: Class-Aware Network with Multi-Relations for Temporal Action Detection.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2022

Research on Evaluation Method of Virtual Machine Quantity in Cold and Hot Operation Mode Based on Reliability Guarantee.
Proceedings of the 24th International Conference on Advanced Communication Technology, 2022

Research on Multi-round Dialogue Tasks Based on Sequicity.
Proceedings of the 7th International Conference on Computer and Communication Systems, 2022

2021
MAZE: Towards Automated Heap Feng Shui.
Proceedings of the 30th USENIX Security Symposium, 2021

Pedestrian Re-identification using a Surround-view Fisheye Camera System.
Proceedings of the International Joint Conference on Neural Networks, 2021

Neko: a Library for Exploring Neuromorphic Learning Rules.
Proceedings of the ICONS 2021: International Conference on Neuromorphic Systems 2021, 2021

Flexible Routing Strategy for Low-latency Transmission in Software Defined Network.
Proceedings of the ICCBN 2021: 9th International Conference on Communications and Broadband Networking, Shanghai, China, 25 February, 2021, 2021

Research on a Virtual Machine Mode Transfer Method Supporting Energy Consumption Optimization.
Proceedings of the 23rd International Conference on Advanced Communication Technology, 2021

An Evaluation Model of Traffic Abnormal Probability of Adjacent Freeway Nodes Based on Space-time Constraints.
Proceedings of the 23rd International Conference on Advanced Communication Technology, 2021

2020
Recurrent and Spiking Modeling of Sparse Surgical Kinematics.
Proceedings of the International Conference on Neuromorphic Systems, 2020

HAEPG: An Automatic Multi-hop Exploitation Generation Framework.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2020

2018
Revery: From Proof-of-Concept to Exploitable.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

A Method to Accelerate K-Means and GMM Computation with GPU and Multi-Core CPU.
Proceedings of the Fourth IEEE International Conference on Multimedia Big Data, 2018

2012
Open Source Alternatives for Business Intelligence: Critical Success Factors for Adoption.
Proceedings of the 18th Americas Conference on Information Systems, 2012


  Loading...