default search action
Jia Zhai
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j26]Junxiu Liu, Shaodong Huang, Qiang Fu, Yuling Luo, Sheng Qin, Yi Cao, Jia Zhai, Su Yang:
The open banking era: An optimal model for the emergency fund. Expert Syst. Appl. 244: 122915 (2024) - [j25]Ziquan Wang, Hui Li, Zikai Zhang, Feng Chen, Jia Zhai:
Attribute- and attention-guided few-shot classification. Multim. Syst. 30(1): 60 (2024) - [j24]Jia Zhai, Hui Liu:
Cross-Domain Feature Disentanglement for Interpretable Modeling of Tumor Microenvironment Impact on Drug Response. IEEE J. Biomed. Health Informatics 28(7): 4382-4392 (2024) - 2023
- [i1]Jia Zhai, Hui Liu:
Cross-domain feature disentanglement for interpretable modeling of tumor microenvironment impact on drug response. CoRR abs/2311.09264 (2023) - 2021
- [j23]Yi Cao, Xiaoquan Liu, Jia Zhai:
Option valuation under no-arbitrage constraints with neural networks. Eur. J. Oper. Res. 293(1): 361-374 (2021) - [j22]Jia Zhai, Haitao Zheng, Manying Bai, Yunyun Jiang:
Multiperiod portfolio selection models under uncertain measure and with multiple criteria. J. Intell. Fuzzy Syst. 40(3): 5071-5086 (2021) - 2020
- [j21]Yuan Yao, Yi Cao, Jia Zhai, Junxiu Liu, Mengyuan Xiang, Lu Wang:
Latent state recognition by an enhanced hidden Markov model. Expert Syst. Appl. 161: 113722 (2020) - [j20]Junxiu Liu, Tiening Sun, Yuling Luo, Su Yang, Yi Cao, Jia Zhai:
An echo state network architecture based on quantum logic gate and its optimization. Neurocomputing 371: 100-107 (2020) - [j19]Junxiu Liu, Tiening Sun, Yuling Luo, Su Yang, Yi Cao, Jia Zhai:
Echo state network optimization using binary grey wolf algorithm. Neurocomputing 385: 310-318 (2020) - [j18]Jia Zhai, Wenbo Xia, Hui Yu:
Capital-constrained supply chain with altruism and reciprocity. J. Ambient Intell. Humaniz. Comput. 11(11): 5665-5676 (2020)
2010 – 2019
- 2019
- [j17]Jia Zhai, Hui Yu:
Robust coordination of supply chain with loss aversion. J. Ambient Intell. Humaniz. Comput. 10(9): 3693-3707 (2019) - [c8]Xianya Fu, Rui Wang, Peixuan Zuo, Jiaming Zhou, Jia Zhai, Xiaodan Xie, Zhongzhi Luan, Depei Qian:
FLONet: Fewer Labeling Cost Active Learning for Deep Neural Network. HPCC/SmartCity/DSS 2019: 289-296 - 2018
- [j16]Xianya Fu, Peixuan Zuo, Jia Zhai, Rui Wang, Hailong Yang, Depei Qian:
Sparsing Deep Neural Network Using Semi-Discrete Matrix Decomposition. IEEE Access 6: 58673-58681 (2018) - [j15]Shuo Liu, Jinshu Zeng, Huizhou Gong, Hongqin Yang, Jia Zhai, Yi Cao, Junxiu Liu, Yuling Luo, Yuhua Li, Liam P. Maguire, Xuemei Ding:
Quantitative analysis of breast cancer diagnosis using a probabilistic modelling approach. Comput. Biol. Medicine 92: 168-175 (2018) - [j14]Weishan Zhang, Yuanjie Zhang, Jia Zhai, Dehai Zhao, Liang Xu, Jiehan Zhou, Zhongwei Li, Su Yang:
Multi-source data fusion using deep learning for smart refrigerators. Comput. Ind. 95: 15-21 (2018) - [j13]Yuan Yao, Yi Cao, Xuemei Ding, Jia Zhai, Junxiu Liu, Yuling Luo, Shuai Ma, Kailin Zou:
A paired neural network model for tourist arrival forecasting. Expert Syst. Appl. 114: 588-614 (2018) - [j12]Jia Zhai, Manying Bai:
Mean-variance model for portfolio optimization with background risk based on uncertainty theory. Int. J. Gen. Syst. 47(3): 294-312 (2018) - [j11]Jia Zhai, Manying Bai:
Mean-risk model for uncertain portfolio selection with background risk. J. Comput. Appl. Math. 330: 59-69 (2018) - [j10]Yali Liu, Meiying Yang, Jia Zhai, Manying Bai:
Portfolio selection of the defined contribution pension fund with uncertain return and salary: A multi-period mean-variance model. J. Intell. Fuzzy Syst. 34(4): 2363-2371 (2018) - [j9]Jia Zhai, Haoguang Zhao, Qiang Ji, Xiaodan Xie:
Computational Resource Constrained Deep Learning Based Target Recognition from Visible Optical Images. J. Inf. Hiding Multim. Signal Process. 9(3): 558-566 (2018) - [j8]Weishan Zhang, Gaowa Wulan, Jia Zhai, Liang Xu, Dehai Zhao, Xin Liu, Su Yang, Jiehan Zhou:
An intelligent power distribution service architecture using cloud computing and deep learning techniques. J. Netw. Comput. Appl. 103: 239-248 (2018) - [c7]Weicheng Li, Dan Jia, Jia Zhai, Jihong Cai, Han Zhang, Lianyi Zhang, Hailong Yang, Depei Qian, Rui Wang:
EffectFace: A Fast and Efficient Deep Neural Network Model for Face Recognition. ACA 2018: 127-139 - [c6]Junxiu Liu, Tiening Sun, Yuling Luo, Qiang Fu, Yi Cao, Jia Zhai, Xuemei Ding:
Financial Data Forecasting Using Optimized Echo State Network. ICONIP (5) 2018: 138-149 - [c5]Jia Zhai, Guangchang Dong, Feng Chen, Xiaodan Xie, Chengming Qi, Lin Li:
A Deep Learning Fusion Recognition Method Based On SAR Image Data. IIKI 2018: 533-541 - 2017
- [j7]Jia Zhai, Yi Cao, Yuan Yao, Xuemei Ding, Yuhua Li:
Computational intelligent hybrid model for detecting disruptive trading activity. Decis. Support Syst. 93: 26-41 (2017) - [j6]Jia Zhai, Yi Cao, Yuan Yao, Xuemei Ding, Yuhua Li:
Coarse and fine identification of collusive clique in financial market. Expert Syst. Appl. 69: 225-238 (2017) - [j5]Yuan Yao, Jia Zhai, Yi Cao, Xuemei Ding, Junxiu Liu, Yuling Luo:
Data analytics enhanced component volatility model. Expert Syst. Appl. 84: 232-241 (2017) - 2016
- [j4]Hui Yu, Jia Zhai, Guang-Ya Chen:
Robust Optimization for the Loss-Averse Newsvendor Problem. J. Optim. Theory Appl. 171(3): 1008-1032 (2016) - [c4]Jia Zhai, Xiaodan Xie, Yusheng Jia:
The SAR Image Storage and Recognition System Based on Cloud Platform. IIKI 2016: 429-432 - 2014
- [j3]Jia Zhai, X. X. Huang:
Calmness and Exact Penalization in Vector Optimization under Nonlinear Perturbations. J. Optim. Theory Appl. 162(3): 856-872 (2014) - [c3]Jia Zhai, Yi Cao:
On the calibration of stochastic volatility models: A comparison study. CIFEr 2014: 303-309 - 2012
- [j2]Shengjie Li, Xiangkai Sun, Jia Zhai:
Second-order contingent derivatives of set-valued mappings with application to set-valued optimization. Appl. Math. Comput. 218(12): 6874-6886 (2012) - [j1]Shengjie Li, Jia Zhai:
Second-order asymptotic differential properties and optimality conditions for weak vector variational inequalities. Optim. Lett. 6(3): 503-523 (2012)
2000 – 2009
- 2006
- [c2]Jia Zhai, Chang Mok Park, Gi-Nam Wang:
Hash-Based RFID Security Protocol Using Randomly Key-Changed Identification Procedure. ICCSA (4) 2006: 296-305 - 2005
- [c1]Jia Zhai, Gi-Nam Wang:
An Anti-collision Algorithm Using Two-Functioned Estimation for RFID Tags. ICCSA (4) 2005: 702-711
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-08 20:36 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint