Search Results - "Zhao, Ruoyan"

  • Showing 1 - 9 results of 9
Refine Results
  1. 1

    Face Detection and Segmentation Based on Improved Mask R-CNN by Zhao, Ruoyan, Fu, Hui, Li, Canyao, Lv, Jujian, Zhao, Huimin, Lin, Kaihan, Chen, Rongjun

    “…Deep convolutional neural networks have been successfully applied to face detection recently. Despite making remarkable progress, most of the existing…”
    Get full text
    Journal Article
  2. 2

    Tracing the evolution of AI in the past decade and forecasting the emerging trends by Shao, Zhou, Zhao, Ruoyan, Yuan, Sha, Ding, Ming, Wang, Yongli

    Published in Expert systems with applications (15-12-2022)
    “…The past decade has witnessed the rapid development of Artificial Intelligence (AI), especially the explosion of deep learning-related connectionist…”
    Get full text
    Journal Article
  3. 3

    A multi-channel multi-tower GNN model for job transfer prediction based on academic social network by Zhao, Ruoyan, Shao, Zhou, Zhang, Wenhu, Zhang, Jiachen, Wu, Chunming

    Published in Applied soft computing (01-07-2023)
    “…The study of scholar job transfer is beneficial to both individual career success and talent recruitment of institutions. For such a complicated problem, the…”
    Get full text
    Journal Article
  4. 4
  5. 5

    FedRecAttack: Model Poisoning Attack to Federated Recommendation by Rong, Dazhong, Ye, Shuai, Zhao, Ruoyan, Yuen, Hon Ning, Chen, Jianhai, He, Qinming

    “…Federated Recommendation (FR) has received con-siderable popularity and attention in the past few years. In FR, for each user, its feature vector and…”
    Get full text
    Conference Proceeding
  6. 6

    Stability optimization of dynamic migration algorithm for Post-Copy of virtual machine based on KVM by Chen, Shuangxi, Zhao, Ruoyan, Liu, Hui, Wu, Chunming, Ruan, Wei

    Published in Dianxin Kexue (01-07-2021)
    “…The dynamic migration technology of virtual machine provides a strong support for the resource scheduling of virtualization system. As one of the two core…”
    Get full text
    Journal Article
  7. 7

    Modeling of the mimic defense based on heterogeneous redundancy by Qin, Junning, Han, Jiajia, Zhou, Sheng, Wu, Chunming, Chen, Shuangxi, Zhao, Ruoyan, Zhang, Jiangyu

    Published in Dianxin Kexue (01-05-2020)
    “…The unbalanced development status of network security was introduced. The main hazards and the mechanism model of penetration testing were described, and the…”
    Get full text
    Journal Article
  8. 8

    FedRecAttack: Model Poisoning Attack to Federated Recommendation by Rong, Dazhong, Ye, Shuai, Zhao, Ruoyan, Yuen, Hon Ning, Chen, Jianhai, He, Qinming

    Published 01-04-2022
    “…Federated Recommendation (FR) has received considerable popularity and attention in the past few years. In FR, for each user, its feature vector and…”
    Get full text
    Journal Article
  9. 9

    An Analytical Discretization Approach to Continuous-time System for Kalman Filter by Zhang, Lijun, Xu, Jian, Li, Yonghua, Zhao, Ruoyan, Wu, Shenggang, Pan, Mengfan, Lei, Lei, Liu, Jianping, Lu, Yi

    “…This paper presents an analytical discretization approach for continuous-time systems. By using the matrix multiplying expression of the state transition…”
    Get full text
    Conference Proceeding