default search action
Ruiqi Luo
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c16]Zhaojing Wang, Li Li, Bangchao Wang, Ruiqi Luo, Luyao Ye:
The Application of the Teaching Model of "Promoting Learning Through Competition, Promoting Teaching Through Competition" in the Course of Data Analysis and Mining. QRS Companion 2024: 1106-1112 - 2023
- [j7]Xinrong Hu, Qing Chang, Junjie Huang, Ruiqi Luo, Bangchao Wang, Chang Hu:
HSSAN: hair synthesis with style-guided spatially adaptive normalization on generative adversarial network. Vis. Comput. 39(8): 3311-3318 (2023) - [j6]Xinrong Hu, Cheng Zheng, Junjie Huang, Ruiqi Luo, Junping Liu, Tao Peng:
Cloth texture preserving image-based 3D virtual try-on. Vis. Comput. 39(8): 3347-3357 (2023) - [c15]Ruiqi Luo, Zhenglong Li, Yinhua Xiang, Zhaojing Wang, Luyao Ye:
Outfit Compatibility Model with Multi-Modal Semantic Interaction Learning. QRS Companion 2023: 733-741 - [c14]Ruiqi Luo, Wenjie Zhang, Xiaoxiao Li, Zhaojing Wang, Luyao Ye:
Research on Active Detection Methods for Video Anomaly Events Based on Concept Semantics. QRS Companion 2023: 742-751 - 2022
- [j5]Ruiqi Luo, Bangchao Wang, Yu Feng, Zaihui Deng, Xian Zhong:
Conceptual semantic enhanced representation learning for event recognition in still images. Connect. Sci. 34(1): 1342-1366 (2022) - [c13]Ruiqi Luo, Xiaodong Zhu, Dongxu Hao, Weiwei Meng:
Data collection and analysis of urban rail transit information based on web crawler technology. CAIBDA 2022: 1-4 - [c12]Guandong Liu, Changhai Wang, Ruiqi Luo, Zhili Jia, Maojing Hou, Wei Ma:
A Fully 3D Printed Accelerometer for Movement Monitoring Applications. NEMS 2022: 74-77 - [c11]Bangchao Wang, Yang Deng, Ruiqi Luo, Huan Jin:
An Empirical Study on Source Code Feature Extraction in Preprocessing of IR-Based Requirements Traceability. QRS 2022: 1069-1078 - [c10]Bangchao Wang, Heng Wang, Ruiqi Luo, Sen Zhang, Qiang Zhu:
A Systematic Mapping Study of Information Retrieval Approaches Applied to Requirements Trace Recovery. SEKE 2022: 1-6 - [c9]Xinrong Hu, Ziyi Zhang, Ruiqi Luo, Junjie Huang, Jinxing Liang, Jin Huang, Tao Peng, Hao Cai:
MMTrans: MultiModal Transformer for realistic video virtual try-on. VRCAI 2022: 17:1-17:8 - 2021
- [c8]Ruiqi Luo, Bangchao Wang, Xian Zhong:
MDD4CER: Efficient Complex Event Recognition with Multiple-value Decision Diagram. QRS Companion 2021: 1165-1166 - 2020
- [j4]Xian Zhong, Wenxin Huang, Ruiqi Luo, Can Wang:
Video Human Behavior Recognition Based on ISA Deep Network Model. Int. J. Pattern Recognit. Artif. Intell. 34(14): 2056012:1-2056012:17 (2020) - [j3]Ruiqi Luo, Xian Zhong, Enxiao Chen:
Image classification with a MSF dropout. Multim. Tools Appl. 79(7-8): 4365-4375 (2020) - [c7]Ruiqi Luo, Yuanzhouhan Cao, Yi Jin, Yidong Li:
A Lightweight Network for Fast Semantic Segmentation. BESC 2020: 1-6 - [c6]Ruiqi Luo, Xiaolei Chen, Yajun Ha:
Optimization of FPGA Routing Networks with Time-Multiplexed Interconnects. LASCAS 2020: 1-4
2010 – 2019
- 2019
- [j2]Yao Xiang, Jingling Yuan, Ruiqi Luo, Xian Zhong, Tao Li:
An Energy Dynamic Control Algorithm Based on Reinforcement Learning for Data Centers. Int. J. Pattern Recognit. Artif. Intell. 33(13): 1951009:1-1951009:24 (2019) - 2014
- [j1]Mikhail I. Gofman, Ruiqi Luo, Chad Wyszynski, Yaohui Hu, Ping Yang, Kartik Gopalan:
Privacy-preserving virtual machine checkpointing mechanism. Int. J. Cloud Comput. 3(3): 245-266 (2014) - 2012
- [c5]Ruiqi Luo, Ping Yang, Shiyong Lu, Mikhail I. Gofman:
Analysis of Scientific Workflow Provenance Access Control Policies. IEEE SCC 2012: 266-273 - 2011
- [c4]Mikhail I. Gofman, Ruiqi Luo, Ping Yang, Kartik Gopalan:
SPARC: a security and privacy aware virtual machinecheckpointing mechanism. WPES 2011: 115-124 - 2010
- [c3]Mikhail I. Gofman, Ruiqi Luo, Ping Yang:
User-Role Reachability Analysis of Evolving Administrative Role Based Access Control. ESORICS 2010: 455-471
2000 – 2009
- 2009
- [c2]Mikhail I. Gofman, Ruiqi Luo, Jian He, Yingbin Zhang, Ping Yang:
Incremental Information Flow Analysis of Role Based Access Control. Security and Management 2009: 397-403 - [c1]Mikhail I. Gofman, Ruiqi Luo, Ayla C. Solomon, Yingbin Zhang, Ping Yang, Scott D. Stoller:
RBAC-PAT: A Policy Analysis Tool for Role Based Access Control. TACAS 2009: 46-49
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-03 20:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint