default search action
Fengjun Zhang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j10]Jie Ben, Qiguo Sun, Keyu Liu, Xibei Yang, Fengjun Zhang:
Multi-head multi-order graph attention networks. Appl. Intell. 54(17-18): 8092-8107 (2024) - [j9]Qihang Guo, Xibei Yang, Fengjun Zhang, Taihua Xu:
Perturbation-augmented Graph Convolutional Networks: A Graph Contrastive Learning architecture for effective node classification tasks. Eng. Appl. Artif. Intell. 129: 107616 (2024) - 2023
- [j8]Linlin Li, Zhiyi Fang, Weiqin Jia, Fengjun Zhang:
Hierarchical Pointing on Distant Displays with Smart Devices. Int. J. Hum. Comput. Interact. 39(19): 3859-3874 (2023) - [c23]Qing Xia, Zhirong Huang, Wensheng Dou, Yafeng Zhang, Fengjun Zhang, Geng Liang, Chun Zuo:
Detecting Flash Loan Based Attacks in Ethereum. ICDCS 2023: 154-165 - [c22]Lu Li, Guanling Zhao, Kai Shi, Fengjun Zhang:
A Stochastic Game Model for Cloud Platform Security. ICISSP 2023: 152-162 - [c21]Hanwen Zhang, Wenyong Wang, Lisheng Huang, Junrui Wu, Fengjun Zhang, Kai Shi:
Correlating Intrusion Detection with Attack Graph on Virtual Computer Networkings. ICISSP 2023: 651-658 - [c20]Lei Yu, Fengjun Zhang, Jiajia Ma, Li Yang, Yuanzhe Yang, Wei Jia:
Who Are the Money Launderers? Money Laundering Detection on Blockchain via Mutual Learning-Based Graph Neural Network. IJCNN 2023: 1-8 - [c19]Lei Yu, Junyi Lu, Xianglong Liu, Li Yang, Fengjun Zhang, Jiajia Ma:
PSCVFinder: A Prompt-Tuning Based Framework for Smart Contract Vulnerability Detection. ISSRE 2023: 556-567 - 2022
- [j7]Junrui Wu, Wenyong Wang, Lisheng Huang, Fengjun Zhang:
Intrusion detection technique based on flow aggregation and latent semantic analysis. Appl. Soft Comput. 127: 109375 (2022) - [j6]Lisheng Huang, Guanling Zhao, Lu Li, Fengjun Zhang:
Host identification based on self-similarity of network activity. Comput. Commun. 191: 467-476 (2022) - 2021
- [c18]Qing Xia, Wensheng Dou, Tong Xi, Jing Zeng, Fengjun Zhang, Jun Wei, Geng Liang:
The Impact Analysis of Multiple Miners and Propagation Delay on Selfish Mining. COMPSAC 2021: 694-703 - [c17]Qing Xia, Wensheng Dou, Fengjun Zhang, Geng Liang:
The Performance of Selfish Mining in GHOST. TrustCom 2021: 26-33
2010 – 2019
- 2019
- [j5]Zhengning Wang, Yang Zhou, Xia Lv, Fanwei Zeng, Xiang Zhang, Fengjun Zhang:
一种基于2D和3D联合信息的改进MDP跟踪算法 (Improved MDP Tracking Method by Combining 2D and 3D Information). 计算机科学 46(3): 97-102 (2019) - [c16]Zhengning Wang, Longfei Feng, Fanwei Zeng, Guang Hu, Xiang Zhang, Xia Lv, Fengjun Zhang:
A Light-Weighted Network for Facial Landmark Detection via Combined Heatmap and Coordinate Regression. ICME 2019: 314-319 - [c15]Weiyi Kong, Li Yang, Jianlong Ren, Chun Zuo, Fengjun Zhang:
Model-Driven Dynamic Visualization of Spatiotemporal Data in GIS. IGTA 2019: 204-215 - [c14]Fengjun Zhang, Guanjun Liu, Zhenchuan Li, Chungang Yan, Changjun Jiang:
GMM-based Undersampling and Its Application for Credit Card Fraud Detection. IJCNN 2019: 1-8 - 2018
- [j4]Fengjun Zhang, Wei Lu, Hongmei Liu, Fei Xue:
Natural image deblurring based on L0-regularization and kernel shape optimization. Multim. Tools Appl. 77(20): 26239-26257 (2018) - [c13]Xiaohui Qiu, Fengjun Zhang, Hongning Zhou, Longfei Du, Xin Wang, Geng Liang:
Multimodal Visual Analysis of Vector-Borne Infectious Diseases. IGTA 2018: 135-145 - [c12]Jing Zeng, Chun Zuo, Fengjun Zhang, Chunxiao Li, Longshuai Zheng:
A Solution to Digital Image Copyright Registration Based on Consortium Blockchain. IGTA 2018: 228-237 - 2015
- [c11]Hui Chen, Jiangdong Li, Fengjun Zhang, Yang Li, Hongan Wang:
3D model-based continuous emotion recognition. CVPR 2015: 1836-1845 - [c10]Mengmeng Liu, Hui Chen, Yang Li, Fengjun Zhang:
Emotional Tone-Based Audio Continuous Emotion Recognition. MMM (2) 2015: 470-480 - [c9]Xiaowei He, Huamin Wang, Fengjun Zhang, Hongan Wang, Guoping Wang, Kun Zhou, Enhua Wu:
Simulation of fluid mixing with interface control. Symposium on Computer Animation 2015: 129-135 - 2014
- [j3]Xiaowei He, Huamin Wang, Fengjun Zhang, Hongan Wang, Guoping Wang, Kun Zhou:
Robust Simulation of Sparsely Sampled Thin Features in SPH-Based Free Surface Flows. ACM Trans. Graph. 34(1): 7:1-7:9 (2014) - [c8]Zhensong Zhang, Fengjun Zhang, Hui Chen, Jiasheng Liu, Hongan Wang, Guozhong Dai:
Left and right hand distinction for multi-touch tabletop interactions. IUI 2014: 47-56 - 2012
- [j2]Xiaowei He, Ning Liu, Guoping Wang, Fengjun Zhang, Sheng Li, Songdong Shao, Hongan Wang:
Staggered meshless solid-fluid coupling. ACM Trans. Graph. 31(6): 149:1-149:12 (2012) - [c7]Zhijun Dai, Fengjun Zhang, Hongan Wang:
Robust Maximum Likelihood estimation by sparse bundle adjustment using the L1 norm. CVPR 2012: 1672-1679 - [c6]Zhijun Dai, Yihong Wu, Fengjun Zhang, Hongan Wang:
A Novel Fast Method for L ∞ Problems in Multiview Geometry. ECCV (5) 2012: 116-129 - 2011
- [c5]Ling Zhao, Guocheng An, Fengjun Zhang, Hongan Wang, Guozhong Dai:
Scale Adaptation of Mean Shift Based on Graph Cuts Theory. CAD/Graphics 2011: 202-205 - 2010
- [c4]Guocheng An, Fengjun Zhang, Guozhong Dai:
Mean shift using novel weight computation and model update. ICASSP 2010: 706-709 - [c3]Guocheng An, Fengjun Zhang, Hongan Wang, Guozhong Dai:
Shape Filling Rate for Silhouette Representation and Recognition. ICPR 2010: 507-510
2000 – 2009
- 2007
- [c2]Chi Zhang, Lei Chen, Fengjun Zhang, Hao Zhang, Hailan Feng, Guozhong Dai:
A New Virtual Dynamic Dentomaxillofacial System for Analyzing Mandibular Movement, Occlusal Contact, and TMJ Condition. HCI (12) 2007: 747-756 - 2006
- [c1]Feng Tian, Hongan Wang, Fengjun Zhang, Guozhong Dai:
Co-CreativePen Toolkit: A Pen-based 3D Toolkit for Children Cooperatly Designing Virtual Environment. CSCWD 2006: 360-364 - 2005
- [j1]Hui Wang, Fengjun Zhang, Hong Jin, Danli Wang, Hongan Wang, Guozhongi Da:
Designing Human-Centred Ubiquitous Computing. Trans. SDPS 9(2): 33-46 (2005)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint