default search action
Zhiguo Chen
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Zhenyu Lang, Xiuling Yin, Yanqin Liu, Zhiguo Chen, Shuxia Kong:
Combined Compact Symplectic Schemes for the Solution of Good Boussinesq Equations. Axioms 13(9): 574 (2024) - [j14]Jiaren Xiao, Bing Luo, Li Xu, Bo Li, Zhiguo Chen:
A survey on application in RF signal. Multim. Tools Appl. 83(4): 11885-11908 (2024) - 2023
- [j13]Yadang Chen, Duolin Wang, Zhiguo Chen, Zhi-Xin Yang, Enhua Wu:
Global video object segmentation with spatial constraint module. Comput. Vis. Media 9(2): 385-400 (2023) - [j12]Nan Feng, Yuguang Wang, Zhiguo Chen, Tingting Song:
The Status Quo and Development Countermeasures of Venture Capital in the New Energy Economy Based on Big Data Analysis. J. Database Manag. 34(1): 1-23 (2023) - [j11]Senbin Zhu, Qian-Hu Jiang, Zhi-Guo Chen, Xiang Zhou, Yan-Ting Jin, Zixin Deng, Feng-Biao Guo:
Mslar: Microbial synthetic lethal and rescue database. PLoS Comput. Biol. 19(6) (2023) - [c25]Xiaoxue Wu, Wenjing Shan, Wei Zheng, Zhiguo Chen, Tao Ren, Xiaobing Sun:
An Intelligent Duplicate Bug Report Detection Method Based on Technical Term Extraction. AST 2023: 1-12 - [c24]Xun Jiang, Zhiguo Chen, Xing Xu, Fumin Shen, Zuo Cao, Xunliang Cai:
Progressive Event Alignment Network for Partial Relevant Video Retrieval. ICME 2023: 1973-1978 - [c23]Zhiguo Chen, Xun Jiang, Xing Xu, Zuo Cao, Yijun Mo, Heng Tao Shen:
Joint Searching and Grounding: Multi-Granularity Video Content Retrieval. ACM Multimedia 2023: 975-983 - 2022
- [j10]Zhiguo Chen, Myoungjin Kim, Yun Cui:
SaaS application mashup based on High Speed Message Processing. KSII Trans. Internet Inf. Syst. 16(5): 1446-1465 (2022) - [j9]Le Sun, Qihao Cheng, Zhiguo Chen:
Hyperspectral Image Super-Resolution Method Based on Spectral Smoothing Prior and Tensor Tubal Row-Sparse Representation. Remote. Sens. 14(9): 2142 (2022) - [c22]Xun Jiang, Xing Xu, Zhiguo Chen, Jingran Zhang, Jingkuan Song, Fumin Shen, Huimin Lu, Heng Tao Shen:
DHHN: Dual Hierarchical Hybrid Network for Weakly-Supervised Audio-Visual Video Parsing. ACM Multimedia 2022: 719-727 - 2021
- [j8]Boyu Gao, Zhiguo Chen, Xian Chen, Huawei Tu, Feiran Huang:
The effects of audiovisual landmarks on spatial learning and recalling for image browsing interface in virtual environments. J. Syst. Archit. 117: 102096 (2021)
2010 – 2019
- 2019
- [j7]Xiangzhi Bai, Yuxuan Zhang, Haonan Liu, Zhiguo Chen:
Similarity Measure-Based Possibilistic FCM With Label Information for Brain MRI Segmentation. IEEE Trans. Cybern. 49(7): 2618-2630 (2019) - 2018
- [j6]Yi Fu, Ji Zhao, Zhiguo Chen:
Insights into the Molecular Mechanisms of Protein-Ligand Interactions by Molecular Docking and Molecular Dynamics Simulation: A Case of Oligopeptide Binding Protein. Comput. Math. Methods Medicine 2018: 3502514:1-3502514:12 (2018) - [c21]Shang-Nan Yin, Ho-Seok Kang, Zhi-Guo Chen, Sung-Ryul Kim:
A malware detection system based on heterogeneous information network. RACS 2018: 154-159 - 2017
- [c20]Matin Kheirkhahan, Zhiguo Chen, Duane B. Corbett, Amal A. Wanigatunga, Todd M. Manini, Sanjay Ranka:
Adaptive walk detection algorithm using activity counts. BHI 2017: 161-164 - [c19]Zhi-Guo Chen, Ho-Seok Kang, Shang-nan Yin, Sung-Ryul Kim:
Automatic Ransomware Detection and Analysis Based on Dynamic API Calls Flow Graph. RACS 2017: 196-201 - 2016
- [j5]Xiangzhi Bai, Miaoming Liu, Zhiguo Chen, Peng Wang, Yu Zhang:
Multi-Focus Image Fusion Through Gradient- Based Decision Map Construction and Mathematical Morphology. IEEE Access 4: 4749-4760 (2016) - [j4]Xiangzhi Bai, Miaoming Liu, Tao Wang, Zhiguo Chen, Peng Wang, Yu Zhang:
Feature based fuzzy inference system for segmentation of low-contrast infrared ship images. Appl. Soft Comput. 46: 128-142 (2016) - [j3]Zhi-Guo Chen, Ho-Seok Kang, Shang-nan Yin, Sung-Ryul Kim:
An efficient privacy protection in mobility social network services with novel clustering-based anonymization. EURASIP J. Wirel. Commun. Netw. 2016: 275 (2016) - [j2]Xiangzhi Bai, Zhiguo Chen, Yu Zhang, Zhaoying Liu, Yi Lu:
Infrared Ship Target Segmentation Based on Spatial Information Improved FCM. IEEE Trans. Cybern. 46(12): 3259-3271 (2016) - [c18]Zhiguo Chen, Tao Li, Xiaozhi Zhang, Sha Li, Ailing Hou, Yan Liu:
Long metal cable scattering features in space borne high resolution SAR images. IGARSS 2016: 5982-5985 - [c17]Shang-nan Yin, Ho-Seok Kang, Zhi-Guo Chen, Sung-Ryul Kim:
Intrusion Detection System based on Complex Event Processing in RFID middleware. RACS 2016: 125-129 - 2015
- [c16]Xiangzhi Bai, Miaoming Liu, Zhiguo Chen, Peng Wang, Yu Zhang:
Morphology and Active Contour Model for Multi-Focus Image Fusion. DICTA 2015: 1-6 - [c15]Xiangzhi Bai, Zhiguo Chen, Miaoming Liu, Yu Zhang:
Center-free PFCM for MRI brain image segmentation. ICIP 2015: 656-660 - 2014
- [j1]Danmin Chen, Zhiguo Chen:
Applying the B Method for the Rigorous Development of Task Management. Control. Intell. Syst. 42(1) (2014) - [c14]Xiangzhi Bai, Zhiguo Chen, Yu Zhang, Zhaoying Liu, Yi Lu:
Spatial information based FCM for infrared ship target segmentation. ICIP 2014: 5127-5131 - [c13]Zhi-Guo Chen, Sung-Ryul Kim:
A Hybrid System for Reducing Memory and Time Overhead of Intrusion Detection System. ICT-EurAsia 2014: 386-395 - [c12]Shang-nan Yin, Zhi-Guo Chen, Sung-Ryul Kim:
LDFGB Algorithm for Anomaly Intrusion Detection. ICT-EurAsia 2014: 396-404 - 2013
- [c11]Zhi-Guo Chen, Sung-Ryul Kim:
Combining principal component analysis, decision tree and naïve Bayesian algorithm for adaptive intrusion detection. RACS 2013: 312-316
2000 – 2009
- 2009
- [c10]Yandong Hou, Zhiguo Chen, Chenglin Wen:
Assessment of Surface Contamination of High Voltage Insulator Based on Evidence Theory. IFITA (3) 2009: 185-188 - [c9]Zhiguo Chen, Wenbo Xu:
Nondestructive Flaw Detection System of Intelligent Robot with Machine Vision. KES IIMSS 2009: 157-165 - 2008
- [c8]Zhi-Guo Chen, Ya-Feng Xu, Yong-Gang Wang, Hang Li:
Construction of a Safe Web Service Based on WSE. CW 2008: 481-486 - 2007
- [c7]Chenglin Wen, Guowei Gao, Zhiguo Chen:
Multiresolution Model for Image Denoising Based on Total Least Squares. FSKD (3) 2007: 622-626 - [c6]Chenglin Wen, Guang-Jiang Wang, Chuan-Bo Wen, Zhiguo Chen:
Multiscale Estimation to the Parameter of Multidimension Time Series. ISNN (3) 2007: 774-782 - [c5]Cheng-Lin Wen, Shao-hui Fan, Zhi-Guo Chen:
The Hybrid Principal Component Analysis Based on Wavelets and Moving Median Filter. ISNN (2) 2007: 994-1001 - 2005
- [c4]Fan Zhang, Xinhong Zhang, Zhiguo Chen:
Digital Image Authentication Based on Error-Correction Codes. CIS (2) 2005: 433-438 - 2003
- [c3]Yongjun Xu, Zuying Luo, Zhiguo Chen, Xiaowei Li:
Average Leakage Current Macromodeling for Dual-Threshold Voltage Circuits. Asian Test Symposium 2003: 196-201 - 2002
- [c2]Hao Lin, Zhibiao Zhao, Hongchen Li, Zhiguo Chen:
A Novel Graph Reduction Algorithm to Identify Structural Conflicts. HICSS 2002: 289
1990 – 1999
- 1998
- [c1]Zhi-Guo Chen, Stafford E. Tavares:
Toward Provable Security of Substitution-Permutation Encryption Networks. Selected Areas in Cryptography 1998: 43-56
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:03 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint