Search

Your search keyword '"Li, Zhoujun"' showing total 53 results

Search Constraints

Start Over You searched for: Author "Li, Zhoujun" Remove constraint Author: "Li, Zhoujun"
53 results on '"Li, Zhoujun"'

Search Results

1. A unified framework of identity-based sequential aggregate signatures from 2-level HIBE schemes.

2. Response selection with topic clues for retrieval-based chatbots.

3. Scanning, attention, and reasoning multimodal content for sentiment analysis.

4. Rational design of the nanocomposite by in-situ sub-10 nm La(OH)3 formation for selective phosphorus removal in waters.

5. AAHEG: Automatic Advanced Heap Exploit Generation Based on Abstract Syntax Tree.

6. Effect of test configurations and loading protocols on performance of timber-concrete connectors.

7. Improving the Robustness of Complex Networks with Preserving Community Structure.

8. A novel fuzzy identity based signature scheme based on the short integer solution problem.

9. Affiliation-Hiding Authenticated Asymmetric Group Key Agreement.

10. Aye: A Trusted Forensic Method for Firmware Tampering Attacks.

11. ID Repetition in Structured P2P Networks.

12. An efficient dynamic authenticated key exchange protocol with selectable identities

13. Predicting gene function using few positive examples and unlabeled ones.

14. Provably secure identity-based authenticated key agreement protocols with malicious private key generators

15. PPMGS: An efficient and effective solution for distributed privacy-preserving semi-supervised learning.

16. From content to links: Social image embedding with deep multimodal model.

17. Improved-ELM method for detecting false data attack in smart grid.

18. Named entity disambiguation for questions in community question answering.

19. Image captioning with residual swin transformer and Actor-Critic.

20. Transfer Learning for Collaborative Filtering Using a Psychometrics Model.

21. Infusing internalized knowledge of language models into hybrid prompts for knowledgeable dialogue generation.

22. Align vision-language semantics by multi-task learning for multi-modal summarization.

23. Cross-Attentional Spatio-Temporal Semantic Graph Networks for Video Question Answering.

24. Search engine reinforced semi-supervised classification and graph-based summarization of microblogs.

25. Affiliation-Hiding Authenticated Asymmetric Group Key Agreement Based on Short Signature.

26. A novel variable precision -fuzzy rough set model based on fuzzy granules.

27. Social image tagging using graph-based reinforcement on multi-type interrelated objects.

28. The Construction of Fuzzy Concept Lattices Based on (θ, σ)-Fuzzy Rough Approximation Operators.

29. Efficient and dynamic key management for multiple identities in identity-based systems

30. Adversarial Learning With Multi-Modal Attention for Visual Question Answering.

31. Adversarial learning for multi-view network embedding on incomplete graphs.

32. Visual-textual sentiment classification with bi-directional multi-level attention networks.

33. Network embedding by fusing multimodal contents and links.

34. A Sequential Matching Framework for Multi-Turn Response Selection in Retrieval-Based Chatbots.

35. Image–text sentiment analysis via deep multimodal attentive fusion.

36. Unsupervised geographically discriminative feature learning for landmark tagging.

37. Response selection from unstructured documents for human-computer conversation systems.

38. Unsupervised abstractive summarization via sentence rewriting.

39. Dynamic self-attention with vision synchronization networks for video question answering.

40. A new methodology for anomaly detection of attacks in IEC 61850-based substation system.

41. Multisignature Scheme Based on the Generalized Conic Curve.

42. Neighbor enhanced graph convolutional networks for node classification and recommendation.

43. Exploiting social circle broadness for influential spreaders identification in social networks.

44. Event detection and popularity prediction in microblogging.

45. Video recommendation over multiple information sources.

46. Relationship strength estimation for online social networks with the study on Facebook

47. A provably secure authenticated key agreement protocol for wireless communications

48. Automatic tagging by exploring tag information capability and correlation.

49. Dual self-attention with co-attention networks for visual question answering.

50. Dissimilar joining mechanism, microstructure and properties of Ni to 316 stainless steel via Ni-Al thermal explosion reaction.

Catalog

Books, media, physical & digital resources