default search action
Jinhong Zhang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j14]Mei Chen, Jinhong Zhang, Chi Zhang, Xueyan Ma, Luoxiong Qian:
Density change consistency clustering from density extreme. Pattern Recognit. 158: 110932 (2025) - 2024
- [j13]Tao Huang, Jing Geng, Huali Yang, Shengze Hu, Yuxia Chen, Jinhong Zhang:
Long short-term attentional neuro-cognitive diagnostic model for skill growth assessment in intelligent tutoring systems. Expert Syst. Appl. 238(Part E): 122048 (2024) - [j12]Jinhong Zhang, Xingwei Wang, Ruixia Li, Bo Yi, Min Huang, Dongxing Shui:
TEPG: a traffic engineering based power-aware greedy routing algorithm in backbone networks with bundled links. Frontiers Comput. Sci. 18(1): 181502 (2024) - [j11]Jinhong Zhang, Bin Li, Qianhui Qiu, Hongqiang Mo, Lianfang Tian:
SICNet: Learning selective inter-slice context via Mask-Guided Self-knowledge distillation for NPC segmentation. J. Vis. Commun. Image Represent. 98: 104053 (2024) - [j10]Xiaoxi Zhao, Jinhong Zhang, Xin Li, Feng Zha, Fei Qi, Kui Li:
A Distributed Static Error Identification Method Based on Measurement Reconstruction for Dual-Axis Hybrid Inertial Navigation System. IEEE Trans. Instrum. Meas. 73: 1-15 (2024) - [c10]Renyang Liu, Wei Zhou, Jinhong Zhang, Haoran Li, Ruxin Wang:
CNFA: Conditional Normalizing Flow for Query-Limited Attack. ICASSP 2024: 4620-4624 - [c9]Jinhong Zhang, Jiefan Qiu, Ke Wang, Kai Fang, Ali Kashif Bashir, Wei Wang:
Millimeter-Wave Radar-Based Unsteady Vital Signs Monitoring for Smart Home. ICC 2024: 3358-3364 - 2023
- [j9]Keji Mao, Yuxiang Wang, Ligang Ren, Jinhong Zhang, Jiefan Qiu, Guanglin Dai:
Multi-branch feature learning based speech emotion recognition using SCAR-NET. Connect. Sci. 35(1) (2023) - [j8]Renyang Liu, Xin Jin, Dongting Hu, Jinhong Zhang, Yuanyu Wang, Jin Zhang, Wei Zhou:
DualFlow: Generating imperceptible adversarial examples by flow field and normalize flow-based model. Frontiers Neurorobotics 17 (2023) - [j7]Cuicui Cai, Chaochuan Jia, Yao Nie, Jinhong Zhang, Ling Li:
A path planning method using modified harris hawks optimization algorithm for mobile robots. PeerJ Comput. Sci. 9: e1473 (2023) - [j6]Yuming Yin, Jinhong Zhang, Mengqi Guo, Xiaobin Ning, Yuan Wang, Jianshan Lu:
Sensor Fusion of GNSS and IMU Data for Robust Localization via Smoothed Error State Kalman Filter. Sensors 23(7): 3676 (2023) - [j5]Jinhong Zhang, Asfand Fahad, Muzammil Mukhtar, Ali Raza:
Characterizing Interconnection Networks in Terms of Complexity via Entropy Measures. Symmetry 15(10): 1868 (2023) - [c8]Tingchao Fu, Fanxiao Li, Jinhong Zhang, Liang Zhu, Yuanyu Wang, Wei Zhou:
TIA: Token Importance Transferable Attack on Vision Transformers. Inscrypt (2) 2023: 91-107 - [c7]Renyang Liu, Qiwei Dou, Haoran Li, Jinhong Zhang, Junhui Liu:
DeepLSH: A Deep Learning-based Locality Sensitive Hash Method. ICDIP 2023: 58:1-58:9 - [c6]Huangxinyue Wu, Haoran Li, Jinhong Zhang, Wei Zhou, Lei Guo, Yunyun Dong:
Multi-scale Features Destructive Universal Adversarial Perturbations. ICICS 2023: 418-434 - [c5]Renyang Liu, Jinhong Zhang, Haoran Li, Jin Zhang, Yuanyu Wang, Wei Zhou:
AFLOW: Developing Adversarial Examples Under Extremely Noise-Limited Settings. ICICS 2023: 502-518 - [c4]Renyang Liu, Jinhong Zhang, Kwok-Yan Lam, Jun Zhao, Wei Zhou:
SCME: A Self-contrastive Method for Data-Free and Query-Limited Model Extraction Attack. ICONIP (5) 2023: 370-382 - [i5]Renyang Liu, Jinhong Zhang, Kwok-Yan Lam, Jun Zhao, Wei Zhou:
SCME: A Self-Contrastive Method for Data-free and Query-Limited Model Extraction Attack. CoRR abs/2310.09792 (2023) - [i4]Renyang Liu, Jinhong Zhang, Haoran Li, Jin Zhang, Yuanyu Wang, Wei Zhou:
AFLOW: Developing Adversarial Examples under Extremely Noise-limited Settings. CoRR abs/2310.09795 (2023) - [i3]Renyang Liu, Wei Zhou, Jinhong Zhang, Xiaoyuan Liu, Peiyuan Si, Haoran Li:
Model Inversion Attacks on Homogeneous and Heterogeneous Graph Neural Networks. CoRR abs/2310.09800 (2023) - 2022
- [j4]Jinhong Zhang, Xingwei Wang, Xiancun Zhou, Min Huang, Ruixia Li, Zhonghua Wu:
Multi-Stage Power-Aware Intelligent Adaptive Routing Algorithms in Bundled Links Based Backbone Networks. IEEE Access 10: 109863-109893 (2022) - [c3]Haoran Li, Jinhong Zhang, Song Gao, Liwen Wu, Wei Zhou, Ruxin Wang:
Towards Query-limited Adversarial Attacks on Graph Neural Networks. ICTAI 2022: 516-521 - 2021
- [j3]Jinhong Zhang, Xingwei Wang, Qiang He, Min Huang:
TEAP: Traffic Engineering and ALR policy based Power-aware solutions for green routing and planning problems in backbone networks. Comput. Commun. 173: 27-44 (2021) - [i2]Jinhong Zhang:
Combining GCN and Transformer for Chinese Grammatical Error Detection. CoRR abs/2105.09085 (2021)
2010 – 2019
- 2017
- [j2]Xingwei Wang, Jinhong Zhang, Min Huang, Shengxiang Yang:
A green intelligent routing algorithm supporting flexible QoS for many-to-many multicast. Comput. Networks 126: 229-245 (2017) - 2015
- [j1]Xingwei Wang, Dapeng Qu, Min Huang, Keqin Li, Sajal K. Das, Jinhong Zhang, Ruiyun Yu:
Multiple many-to-many multicast routing scheme in green multi-granularity transport networks. Comput. Networks 93: 225-242 (2015) - [c2]Jinhong Zhang, Rasmus Taarnby, Antonios Liapis, Sebastian Risi:
DrawCompileEvolve: Sparking Interactive Evolutionary Art with Human Creations. EvoMUSART 2015: 261-273 - 2014
- [i1]Sebastian Risi, Jinhong Zhang, Rasmus Taarnby, Peter Greve, Jan Piskur, Antonios Liapis, Julian Togelius:
The Case for a Mixed-Initiative Collaborative Neuroevolution Approach. CoRR abs/1408.0998 (2014) - 2011
- [c1]Jianan Wu, Wei Wang, Jinhong Zhang, Bodong Wang:
Research of a kind of new UAV training simulator based on equipment simulation. EMEIT 2011: 4812-4815
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-28 01:27 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint