default search action
Hongrong Cheng
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j3]Wangdong Mu, Qihe Liu, Hongrong Cheng, Ming Zhuo:
Long-short interest network with graph-based method for sequential recommendation. Int. J. Mach. Learn. Cybern. 15(8): 3143-3155 (2024) - [i3]Hongrong Cheng, Miao Zhang, Javen Qinfeng Shi:
MINI-LLM: Memory-Efficient Structured Pruning for Large Language Models. CoRR abs/2407.11681 (2024) - 2023
- [i2]Hongrong Cheng, Miao Zhang, Javen Qinfeng Shi:
Influence Function Based Second-Order Channel Pruning-Evaluating True Loss Changes For Pruning Is Possible Without Retraining. CoRR abs/2308.06755 (2023) - [i1]Hongrong Cheng, Miao Zhang, Javen Qinfeng Shi:
A Survey on Deep Neural Network Pruning-Taxonomy, Comparison, Analysis, and Recommendations. CoRR abs/2308.06767 (2023)
2010 – 2019
- 2018
- [j2]Zhen Qin, Yilei Wang, Hongrong Cheng, Yingjie Zhou, Zhengguo Sheng, Victor C. M. Leung:
Demographic Information Prediction: A Portrait of Smartphone Application Users. IEEE Trans. Emerg. Top. Comput. 6(3): 432-444 (2018) - 2017
- [c7]Qihe Liu, Shijie Zhou, Xianqiong Cheng, Hongrong Cheng, Huabo Zhang:
Gas Sensor Drift Compensation by an Optimal Linear Transformation. BigCom 2017: 193-199 - 2016
- [c6]Tengyuan Cai, Hongrong Cheng, Jiaqing Luo, Shijie Zhou:
An Efficient and Simple Graph Model for Scientific Article Cold Start Recommendation. ER 2016: 248-259 - 2015
- [j1]Chao-sheng Feng, Jun Yang, Zhiguang Qin, Ding Yuan, Hongrong Cheng:
Modeling and analysis of passive worm propagation in the P2P file-sharing network. Simul. Model. Pract. Theory 51: 87-99 (2015) - [c5]Wenqing Zhang, Shijie Zhou, Jiaqing Luo, Hongrong Cheng, Yongjian Liao:
A Lightweight Detection of the RFID Unauthorized Reading Using RF Scanners. CSCloud 2015: 317-322 - [c4]Jiaqing Luo, Shijie Zhou, Hongrong Cheng, Yongjian Liao, Kai Bu:
A Range-Free Localization of Passive RFID Tags Using Mobile Readers. MASS 2015: 445-446 - [c3]Jiaqing Luo, Shijie Zhou, Hongrong Cheng, Yongjian Liao, Bin Guo:
The Design and Implementation of A Cost-effective RFID Indoor Localization System. CSAR@SenSys 2015: 1-6 - 2014
- [c2]Zhen Qin, Yilei Wang, Yong Xia, Hongrong Cheng, Yingjie Zhou, Zhengguo Sheng, Victor C. M. Leung:
Demographic information prediction based on smartphone application usage. SMARTCOMP 2014: 183-190 - 2010
- [c1]Qiao Liu, Zhiguang Qin, Hongrong Cheng, Mingcheng Wan:
Efficient Modeling of Spam Images. IITSI 2010: 663-666
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-15 19:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint