The SCEAS System
Navigation Menu

Search the dblp DataBase


Dan Zhang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Xinhua You, Bin Fang, Xinge You, Zhenyu He, Dan Zhang, Yuan Yan Tang
    Skeleton Representation of Character Based on Multiscale Approach. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:1060-1067 [Conf]
  2. Ying Wang, Zhiyi Fang, Chao Zhang, Dan Zhang, Yingrui Zhang, Benshang Tong
    CSCW-based JIT Purchasing Management. [Citation Graph (0, 0)][DBLP]
    CSCWD, 2006, pp:165-170 [Conf]
  3. Xinge You, Bin Fang, Yuan Yan Tang, Luoqing Li, Dan Zhang
    Axial Representation of Character by Using Wavelet Transform. [Citation Graph (0, 0)][DBLP]
    FSKD (2), 2005, pp:130-139 [Conf]
  4. Hong Song, Dan Zhang, Ji Liu
    An Adaptive Hybrid Immune Genetic Algorithm for Maximum Cut Problem. [Citation Graph (0, 0)][DBLP]
    ICNC (2), 2005, pp:863-866 [Conf]
  5. Dan Zhang, Zeng-zhi Li, Hong Song, Tao Zhan
    Particle Swarm Optimization for Bipartite Subgraph Problem: A Case Study. [Citation Graph (0, 0)][DBLP]
    ICNC (3), 2005, pp:602-611 [Conf]
  6. Dan Zhang, Zeng-zhi Li, Hai Wang, Tao Zhan
    A Novel Genetic Algorithm for Variable Partition of Dual Memory Bank DSPs. [Citation Graph (0, 0)][DBLP]
    ICNC (3), 2005, pp:883-892 [Conf]
  7. Xinge You, Dan Zhang, Qiuhui Chen, Patrick Wang, Yuan Yan Tang
    Face Representation By Using Non-tensor Product Wavelets. [Citation Graph (0, 0)][DBLP]
    ICPR (1), 2006, pp:503-506 [Conf]
  8. Chengqing Li, Shujun Li, Dan Zhang, Guanrong Chen
    Chosen-Plaintext Cryptanalysis of a Clipped-Neural-Network-Based Chaotic Cipher. [Citation Graph (0, 0)][DBLP]
    ISNN (2), 2005, pp:630-636 [Conf]
  9. Chengqing Li, Shujun Li, Dan Zhang, Guanrong Chen
    Cryptanalysis of a Chaotic Neural Network Based Multimedia Encryption Scheme. [Citation Graph (0, 0)][DBLP]
    PCM (3), 2004, pp:418-425 [Conf]
  10. Dan Zhang, Zeng-zhi Li, Hong Song, Long Liu
    A Programming Model for an Embedded Media Processing Architecture. [Citation Graph (0, 0)][DBLP]
    SAMOS, 2005, pp:251-261 [Conf]
  11. Dan Zhang, Tadashi Sakata, Yuichi Ueda
    Speech Rate Control for The Compound HearingAid Processing. [Citation Graph (0, 0)][DBLP]
    ICICIC (3), 2006, pp:568-571 [Conf]
  12. Chengqing Li, Shujun Li, Der-Chyuan Lou, Dan Zhang
    On the security of the Yen-Guo's domino signal encryption algorithm (DSEA). [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2006, v:79, n:2, pp:253-258 [Journal]
  13. Chengqing Li, Shujun Li, Der-Chyuan Lou, Dan Zhang
    Erratum to "On the security of the Yen-Guo's domino signal encryption algorithm (DSEA)" [The Journal of Systems and Software 79 (2006) 253-258]. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2006, v:79, n:12, pp:1789- [Journal]
  14. Dan Zhang, Zhenwei Shi, Yangqiu Song, Changshui Zhang
    Localized Content-Based Image Retrieval Using Semi-Supervised Multiple Instance Learning. [Citation Graph (0, 0)][DBLP]
    ACCV (1), 2007, pp:180-188 [Conf]
  15. Waibin Huang, Dan Zhang, Guangchang Dong
    Edge Detection Based on Asymptote Model. [Citation Graph (0, 0)][DBLP]
    ICIC (1), 2007, pp:913-921 [Conf]
  16. Dan Zhang, Yiu-ming Cheung
    A Batch Rival Penalized EM Algorithm for Gaussian Mixture Clustering with Automatic Model Selection. [Citation Graph (0, 0)][DBLP]
    RSKT, 2007, pp:252-259 [Conf]
  17. Chengqing Li, Shujun Li, Der-Chyuan Lou, Dan Zhang
    On the security of the Yen-Guo's domino signal encryption algorithm (DSEA) [Citation Graph (0, 0)][DBLP]
    CoRR, 2005, v:0, n:, pp:- [Journal]
  18. Shiliang Sun, Changshui Zhang, Dan Zhang
    An experimental evaluation of ensemble methods for EEG signal classification. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition Letters, 2007, v:28, n:15, pp:2157-2163 [Journal]

  19. Multi-View Local Learning. [Citation Graph (, )][DBLP]

  20. TidFP: Mining Frequent Patterns in Different Databases with Transaction ID. [Citation Graph (, )][DBLP]

  21. A Study on Prediction of Customer Churn in Fixed Communication Network Based on Data Mining. [Citation Graph (, )][DBLP]

  22. Extraction of Illumination-Invariant Features in Face Recognition by Empirical Mode Decomposition. [Citation Graph (, )][DBLP]

  23. CrashTest: A fast high-fidelity FPGA-based resiliency analysis framework. [Citation Graph (, )][DBLP]

  24. Multiple Instance Transfer Learning. [Citation Graph (, )][DBLP]

  25. Design of a Novel Six-Dimensional Force/Torque Sensor and Its Calibration Based on NN. [Citation Graph (, )][DBLP]

  26. Localized content based image retrieval by multiple instance active learning. [Citation Graph (, )][DBLP]

  27. A Fixed-Point Algorithm for Blind Separation of Temporally Correlated Sources. [Citation Graph (, )][DBLP]

  28. Multi-Pitch Estimation Based on Partial Event and Support Transfer. [Citation Graph (, )][DBLP]

  29. Application of data warehouse technique in intelligent vehicle monitoring system. [Citation Graph (, )][DBLP]

  30. Mining very long sequences in large databases with PLWAPLong. [Citation Graph (, )][DBLP]

  31. M3IC: Maximum Margin Multiple Instance Clustering. [Citation Graph (, )][DBLP]

  32. Exposure Time Change Attack on Image Watermarking Systems. [Citation Graph (, )][DBLP]

  33. Pillar: A Parallel Implementation Language. [Citation Graph (, )][DBLP]

  34. Semi-Supervised Classification with Universum. [Citation Graph (, )][DBLP]

  35. Modeling search response time. [Citation Graph (, )][DBLP]

  36. Bandwidth exchange as an incentive for relaying. [Citation Graph (, )][DBLP]

  37. Searching in the Delta Lattice: An Efficient MIMO Detection for Iterative Receivers. [Citation Graph (, )][DBLP]

  38. Wasp Algorithm for Dynamic Scheduling Based on Manufacturing Grid. [Citation Graph (, )][DBLP]

  39. An Application of SVM on Stakeholders’ Influence of Capital Allocation in Commercial Banks. [Citation Graph (, )][DBLP]

  40. Molecular Evolution and Functional Divergence of Sulfate Transporter Gene Family in Plants. [Citation Graph (, )][DBLP]

  41. Bearings Fault Diagnosis Based on the Optimal Impulse Response Wavelet. [Citation Graph (, )][DBLP]

  42. Study on the Efficiency of Knowledge Transfer Based on Knowledge Transfer Scenario. [Citation Graph (, )][DBLP]

  43. Bearing Fault Diagnosis Based on Feature Weighted FCM Cluster Analysis. [Citation Graph (, )][DBLP]

  44. Parade: A versatile parallel architecture for accelerating pulse train clustering. [Citation Graph (, )][DBLP]

  45. Configuration design and performance analysis of a multidimensional acceleration sensor based on 3RRPRR decoupling parallel mechanism. [Citation Graph (, )][DBLP]

  46. The haplotype assembly model with genotype information and iterative local-exhaustive search algorithm. [Citation Graph (, )][DBLP]

  47. Cryptanalysis of an image encryption scheme based on the Hill cipher [Citation Graph (, )][DBLP]

  48. Complexity-Efficient Enumeration Techniques for Soft-Input, Soft-Output Sphere Decoding [Citation Graph (, )][DBLP]

  49. Analyzing Random Network Coding with Differential Equations and Differential Inclusions [Citation Graph (, )][DBLP]

Search in 0.003secs, Finished in 0.004secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002