Search Results - "Zhao, Ruoyan"
-
1
Face Detection and Segmentation Based on Improved Mask R-CNN
Published in Discrete dynamics in nature and society (2020)“…Deep convolutional neural networks have been successfully applied to face detection recently. Despite making remarkable progress, most of the existing…”
Get full text
Journal Article -
2
Tracing the evolution of AI in the past decade and forecasting the emerging trends
Published in Expert systems with applications (15-12-2022)“…The past decade has witnessed the rapid development of Artificial Intelligence (AI), especially the explosion of deep learning-related connectionist…”
Get full text
Journal Article -
3
A multi-channel multi-tower GNN model for job transfer prediction based on academic social network
Published in Applied soft computing (01-07-2023)“…The study of scholar job transfer is beneficial to both individual career success and talent recruitment of institutions. For such a complicated problem, the…”
Get full text
Journal Article -
4
RETRACTED ARTICLE: Synergy system modeling and simulation for identification of college precision teaching order parameters
Published in Annals of operations research (01-07-2023)Get full text
Journal Article -
5
FedRecAttack: Model Poisoning Attack to Federated Recommendation
Published in 2022 IEEE 38th International Conference on Data Engineering (ICDE) (01-05-2022)“…Federated Recommendation (FR) has received con-siderable popularity and attention in the past few years. In FR, for each user, its feature vector and…”
Get full text
Conference Proceeding -
6
Stability optimization of dynamic migration algorithm for Post-Copy of virtual machine based on KVM
Published in Dianxin Kexue (01-07-2021)“…The dynamic migration technology of virtual machine provides a strong support for the resource scheduling of virtualization system. As one of the two core…”
Get full text
Journal Article -
7
Modeling of the mimic defense based on heterogeneous redundancy
Published in Dianxin Kexue (01-05-2020)“…The unbalanced development status of network security was introduced. The main hazards and the mechanism model of penetration testing were described, and the…”
Get full text
Journal Article -
8
FedRecAttack: Model Poisoning Attack to Federated Recommendation
Published 01-04-2022“…Federated Recommendation (FR) has received considerable popularity and attention in the past few years. In FR, for each user, its feature vector and…”
Get full text
Journal Article -
9
An Analytical Discretization Approach to Continuous-time System for Kalman Filter
Published in 2020 IEEE 9th Data Driven Control and Learning Systems Conference (DDCLS) (20-11-2020)“…This paper presents an analytical discretization approach for continuous-time systems. By using the matrix multiplying expression of the state transition…”
Get full text
Conference Proceeding