default search action
Zhengxu Zhao
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j21]Yong Pan, Chengjun Chen, Zhengxu Zhao, Tianliang Hu, Jianhua Zhang:
Robot teaching system based on hand-robot contact state detection and motion intention recognition. Robotics Comput. Integr. Manuf. 81: 102492 (2023) - 2021
- [j20]Yong Pan, Chengjun Chen, Dongnian Li, Zhengxu Zhao, Jun Hong:
Augmented reality-based robot teleoperation system using RGB-D imaging and attitude teaching device. Robotics Comput. Integr. Manuf. 71: 102167 (2021) - [j19]Chengjun Chen, Changzhi Li, Dongnian Li, Zhengxu Zhao, Jun Hong:
Mechanical Assembly Monitoring Method Based on Depth Image Multiview Change Detection. IEEE Trans. Instrum. Meas. 70: 1-13 (2021) - 2020
- [j18]Dongnian Li, Yang Guo, Chengjun Chen, Zhengxu Zhao:
Collaborative Differential Evolution Filtering for Tracking Hand-Object Interactions. IEEE Access 8: 148289-148300 (2020) - [j17]Chengjun Chen, Yong Pan, Dongnian Li, Shilei Zhang, Zhengxu Zhao, Jun Hong:
A virtual-physical collision detection interface for AR-based interactive teaching of robot. Robotics Comput. Integr. Manuf. 64: 101948 (2020) - [j16]Chengjun Chen, Chunlin Zhang, Tiannuo Wang, Dongnian Li, Yang Guo, Zhengxu Zhao, Jun Hong:
Monitoring of Assembly Process Using Deep Learning Technology. Sensors 20(15): 4208 (2020) - [j15]Chengjun Chen, Kai Huang, Dongnian Li, Zhengxu Zhao, Jun Hong:
Multi-Segmentation Parallel CNN Model for Estimating Assembly Torque Using Surface Electromyography Signals. Sensors 20(15): 4213 (2020) - [j14]Dongnian Li, Changming Li, Chengjun Chen, Zhengxu Zhao:
Semantic Segmentation of a Printed Circuit Board for Component Recognition Based on Depth Images. Sensors 20(18): 5318 (2020)
2010 – 2019
- 2019
- [j13]Denghui Zhang, Zhengxu Zhao, Yiqi Zhou, Yang Guo:
A novel complex network-based modeling method for heterogeneous product design. Clust. Comput. 22(Supplement): 7861-7872 (2019) - [j12]Jinjie Wen, Zhengxu Zhao, Qian Zhong:
Study on Net Assessment of Trustworthy Evidence in Teleoperation System for Interplanetary Transportation. J. Inf. Process. Syst. 15(6): 1472-1488 (2019) - 2016
- [j11]Qian Xu, Zhengxu Zhao, Wei Wang:
Clustering-based volume segmentation design. Int. J. Adv. Media Commun. 6(2/3/4): 156-166 (2016) - [c9]Qian Xu, Zhengxu Zhao, Weihua Zhao:
From orientation movement to space navigation: Toward a novel explorative model. ICAC 2016: 493-497 - 2013
- [c8]Zhengxu Zhao, Yang Guo:
Scale-Free Model in Software Engineering: A New Design Method. GRMSE (2) 2013: 346-353 - 2012
- [j10]Wenbin Zhao, Zhengxu Zhao:
Research on Engineering Software Data Formats Conversion Network. J. Softw. 7(11): 2606-2613 (2012) - 2011
- [j9]David J. Day, Zhengxu Zhao:
Protecting against address space layout randomisation (ASLR) compromises and return-to-libc attacks using network intrusion detection systems. Int. J. Autom. Comput. 8(4): 472-483 (2011) - [c7]Jun Feng, Zhihua Zhang, Zhengxu Zhao, Zhiwei Gao, Lijia Liu:
A Novel Community Structure Detection Algorithm for Complex Networks Analysis Based on Coulomb's Law. AICI (3) 2011: 537-544 - 2010
- [c6]David J. Day, Zhengxu Zhao, Minhua Ma:
Detecting Return-to-libc Buffer Overflow Attacks Using Network Intrusion Detection Systems. ICDS 2010: 172-177
2000 – 2009
- 2009
- [j8]Jun Wang, Sijing Zhang, Carsten Maple, Zhengxu Zhao:
Guaranteeing hard real-time traffic with legitimately short deadlines with the timed token protocol. Comput. Stand. Interfaces 31(3): 557-565 (2009) - [j7]Xiaojing Zhou, Zhengxu Zhao:
The skin deformation of a 3D virtual human. Int. J. Autom. Comput. 6(4): 344 (2009) - 2008
- [c5]Ningning Zhou, Zhengxu Zhao, Long Hong, Yulong Deng:
A New Image Edge Detection Algorithm Based on Measuring of Medium Truth Scale. ICNSC 2008: 698-703 - [c4]Xiaojing Zhou, Zhengxu Zhao:
Construction of 3D Virtual Humans from 2D Images. ICNSC 2008: 719-724 - [c3]Ningning Zhou, Zhengxu Zhao, Yulong Deng:
A New Evaluation Method Based on Measuring of Medium Truth Scale. ICYCS 2008: 2464-2469 - 2007
- [c2]Long Yan, ZhengXu Zhao, YiQi Zhou:
Stereo Matching for Monotone Texture of Mechanical Parts. CAD/Graphics 2007: 213-218 - [c1]Wenhu Qin, Xiaomei Liu, Zhengxu Zhao:
Study on Action Control of Virtual Actors. ICNSC 2007: 907-912 - 2006
- [j6]Zhengxu Zhao, Kai-Ling Li:
A photo-modeling approach to restituting 3D model data from single 2D imagery for rapid prototyping of artifact products. Int. J. Autom. Comput. 3(1): 69-75 (2006) - 2005
- [j5]Wenyan Wu, Zhengxu Zhao:
Realization of reconfigurable virtual environments for virtual testing. Int. J. Autom. Comput. 2(1): 25-36 (2005) - [j4]Hai-Yan Zhang, Zhengxu Zhao:
A hierarchical framework for visualising and simulating supply chains in virtual environments. Int. J. Autom. Comput. 2(2): 144-154 (2005) - 2004
- [j3]Huiping Shang, Zhengxu Zhao:
Integration of manufacturing services into virtual environments over the internet. Int. J. Autom. Comput. 1(1): 89-106 (2004) - 2003
- [j2]Huiping Shang, Zhengxu Zhao, Richard Thorn:
Implementing Manufacturing Message Specifications (MMS) within collaborative virtual environments over the Internet. Int. J. Comput. Integr. Manuf. 16(2): 112-127 (2003)
1990 – 1999
- 1998
- [j1]Zhengxu Zhao:
A variant approach to constructing and managing virtual manufacturing environments. Int. J. Comput. Integr. Manuf. 11(6): 485-499 (1998)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-05 20:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint