76 results on '"Zhi Lu"'
Search Results
2. Contactless Radar Heart Rate Variability Monitoring Via Deep Spatio-Temporal Modeling.
3. Diffradar: High-Quality Mmwave Radar Perception With Diffusion Probabilistic Model.
4. Split Aggregation: Lightweight Privacy-Preserving Federated Learning Resistant to Byzantine Attacks.
5. Real-time continuous detection and recognition of dynamic hand gestures in untrimmed sequences based on end-to-end architecture with 3D DenseNet and LSTM.
6. MobiRFPose: Portable RF-Based 3D Human Pose Camera.
7. Robust and Verifiable Privacy Federated Learning.
8. Application Research of Vertical Federated Learning Technology in Banking Risk Control Model Strategy.
9. Fast 3D Human Pose Estimation Using RF Signals.
10. A PUF Based Audio Fingerprint Based for Device Authentication and Tamper Location.
11. Personalized Fashion Recommendation With Discrete Content-Based Tensor Factorization.
12. Learning Fashion Compatibility With Context Conditioning Embedding.
13. RFGAN: RF-Based Human Synthesis.
14. RFPose-OT: RF-based 3D human pose estimation via optimal transport theory.
15. How to acquire customer loyalty in online retailing industry? An empirical study from service recovery perspective.
16. Dual-Structure Elements Morphological Filtering and Local Z-Score Normalization for Infrared Small Target Detection against Heavy Clouds.
17. Learning driven three-phase search for the maximum independent union of cliques problem.
18. Secure and Privacy-preserving Data-sharing Framework based on Blockchain Technology for Al-Najaf/Iraq Oil Refinery.
19. PhilaeX: Explaining the Failure and Success of AI Models in Malware Detection.
20. 'How Does It Detect A Malicious App?' Explaining the Predictions of AI-based Malware Detector.
21. A Hybrid Deep Learning Anomaly Detection Framework for Intrusion Detection.
22. Outlier Item Detection in Fashion Outfit.
23. WiFi-Based Human Pose Image Generation.
24. RFPose-OT: RF-Based 3D Human Pose Estimation via Optimal Transport Theory.
25. A Hybrid Evolutionary Algorithm for the Clique Partitioning Problem.
26. A novel method for road network mining from floating car data.
27. Passive Non-Line-of-Sight Imaging Using Optimal Transport.
28. Intrusion Detection in Internet of Things using Convolutional Neural Networks.
29. Personalized Outfit Recommendation With Learnable Anchors.
30. Iterated multilevel simulated annealing for large-scale graph conductance minimization.
31. A Collaborative Spline Adaptive Filter for Nonlinear Echo Cancellation.
32. Strategies of Knowledge Pricing and the Impact on Firms' New Product Development Performance.
33. Real-time one-shot learning gesture recognition based on lightweight 3D Inception-ResNet with separable convolutions.
34. Solution-based tabu search for the capacitated dispersion problem.
35. Intrusion Detection in Internet of Things using Convolutional Neural Networks.
36. A Hybrid Deep Learning Anomaly Detection Framework for Intrusion Detection.
37. PhilaeX: Explaining the Failure and Success of AI Models in Malware Detection.
38. Learning Binary Code for Personalized Fashion Recommendation.
39. One-shot learning gesture recognition based on joint training of 3D ResNet and memory module.
40. A hybrid evolutionary algorithm for finding low conductance of large graphs.
41. An Architecture of System of Systems (SoS) for Commercial Flight Security in 5G OGCE.
42. One-Shot Learning Hand Gesture Recognition Based on Lightweight 3D Convolutional Neural Networks for Portable Applications on Mobile Systems.
43. One-shot learning hand gesture recognition based on modified 3d convolutional neural networks.
44. Stagnation-aware breakout tabu search for the minimum conductance graph partitioning problem.
45. RFGAN: RF-Based Human Synthesis.
46. 'How Does It Detect A Malicious App?' Explaining the Predictions of AI-based Android Malware Detector.
47. Sampling for Approximate Maximum Search in Factorized Tensor.
48. A heterogeneous large-scale parallel SCADA/DCS architecture in 5G OGCE.
49. An unequal cluster-based routing scheme for multi-level heterogeneous wireless sensor networks.
50. Evaluation of Three Algorithms for the Segmentation of Overlapping Cervical Cells.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.