
Chunzhi Wang
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j32]Yawen Zeng, Yong Ouyang, Rong Gao, Ye Qiu, Yonghong Yu, Chunzhi Wang:
HHA: An Attentive Prediction Model for Academic Abnormality. IEEE Access 8: 124755-124766 (2020) - [j31]Yong Ouyang, Yawen Zeng
, Rong Gao, Yonghong Yu, Chunzhi Wang:
Elective future: The influence factor mining of students' graduation development based on hierarchical attention neural network model with graph. Appl. Intell. 50(10): 3023-3039 (2020) - [j30]Chunzhi Wang, Wenshuo Bian, Ruoxi Wang, Hongwei Chen, Zhiwei Ye, Lingyu Yan:
Association rules mining in parallel conditional tree based on grid computing inspired partition algorithm. Int. J. Web Grid Serv. 16(3): 321-339 (2020) - [j29]Chunzhi Wang, Nataliya Shakhovska, Anatoliy Sachenko, Myroslav Komar:
A New Approach for Missing Data Imputation in Big Data Interface. Inf. Technol. Control. 49(4): 541-555 (2020) - [j28]Yucheng Zhang
, Min Fu, Xinyun Wu
, Fang Wang, Qiang Wang
, Chunzhi Wang, Xinhua Dong, Hongmu Han:
Improving Restore Performance of Packed Datasets in Deduplication Systems via Reducing Persistent Fragmented Chunks. IEEE Trans. Parallel Distributed Syst. 31(7): 1651-1664 (2020) - [j27]Yucheng Zhang
, Ye Yuan, Dan Feng, Chunzhi Wang, Xinyun Wu
, Lingyu Yan, Deng Pan, Shuanghong Wang:
Improving Restore Performance for In-Line Backup System Combining Deduplication and Delta Compression. IEEE Trans. Parallel Distributed Syst. 31(10): 2302-2314 (2020) - [c28]Chunzhi Wang, Ruoxi Wang, Zhiqun Su:
Design of temporary vehicle parking management system of residential area based on credit system. ICCSE 2020: 341-344 - [c27]Chunzhi Wang, Ruoxi Wang, Siwei Wei, Yong Zeng:
Design of Video Cloud Networking Scheme in expressway. ICCSE 2020: 345-348 - [c26]Zitian Wang, Aibo Xu, Zipeng Zhang, Chunzhi Wang, Aijun Liu, Xiang Hu:
The Parallelization and Optimization of K-means Algorithm Based on Spark. ICCSE 2020: 457-462 - [c25]Menghan Sheng, Li Zhang, Lingyu Yan, Chunzhi Wang, Min Li, Huiling Xia, Yujin Zhang:
Facial Expression Recognition Based on Sparse Autoencoder and Shallow Convolutional Neural Network. ICCSE 2020: 669-674 - [c24]Shuyu Yao, Ming Wei, Lingyu Yan, Chunzhi Wang, Xinhua Dong, Fangrui Liu, Ying Xiong:
Prediction of Crime Hotspots based on Spatial Factors of Random Forest. ICCSE 2020: 811-815
2010 – 2019
- 2019
- [j26]Yangyang Xu, Xuefei Li
, Jing Li, Chunzhi Wang, Rong Gao, Yonghong Yu
:
SSSER: Spatiotemporal Sequential and Social Embedding Rank for Successive Point-of-Interest Recommendation. IEEE Access 7: 156804-156823 (2019) - [j25]Lingyu Yan
, Hanlin Lu, Chunzhi Wang, Zhiwei Ye, Hongwei Chen, Hefei Ling:
Deep linear discriminant analysis hashing for image retrieval. Multim. Tools Appl. 78(11): 15101-15119 (2019) - [c23]Na Deng, Xu Chen, Caiquan Xiong, Chunzhi Wang, Mingwu Zhang, Zhiwei Ye, Desheng Li, Xuehong Yang:
A Method of Collecting Four Character Medicine Effect Phrases in TCM Patents Based on Semi-supervised Learning. CISIS 2019: 462-473 - [c22]Min Li, Chunzhi Wang, Lingyu Yan, Siwei Wei:
Research on the Application of Medical Big Data. ICCSE 2019: 478-482 - [c21]Haoqiu Song, Zhiwei Ye, Chunzhi Wang, Lingyu Yan:
Image Classification Based on BP Neural Network and Sine Cosine Algorithm. IDAACS 2019: 562-566 - [c20]Huiling Xia, Chunzhi Wang, Lingyu Yan, Xinhua Dong, Yichao Wang:
Machine Learning Based Medicine Distribution System. IDAACS 2019: 912-915 - [c19]Chunzhi Wang, Yichao Wang, Lingyu Yan, Zhiwei Ye, Wencheng Cai, Pan Wu:
Financial Early Warning of Listed Companies Based on Fireworks Algorithm Optimized Back-Propagation Neural Network. IDAACS 2019: 927-932 - [c18]Wenshuo Bian, Chunzhi Wang, Zhiwei Ye, Lingyu Yan:
Emotional Text Analysis Based on Ensemble Learning of Three Different Classification Algorithms. IDAACS 2019: 938-941 - 2018
- [j24]Rong Gao, Jing Li, Xuefei Li, Chengfang Song, Jun Chang, Donghua Liu, Chunzhi Wang:
STSCR: Exploring spatial-temporal sequential influence and social information for location recommendation. Neurocomputing 319: 118-133 (2018) - [j23]Na Deng, Chunzhi Wang, Mingwu Zhang, Zhiwei Ye, Liang Xiao, Jingbai Tian, Desheng Li, Xu Chen:
A Semi-Automatic Annotation Method of Effect Clue Words for Chinese Patents Based on Co-Training. Int. J. Data Warehous. Min. 14(4): 1-19 (2018) - [c17]Jun Wu, Chunzhi Wang:
Privacy Preserving for Big Data Based on Fuzzy Set. ICCCS (3) 2018: 651-659 - 2017
- [j22]Jun Wu, Chunzhi Wang:
面向大数据的多维粒矩阵关联分析及应用 (Multiple Correlation Analysis and Application of Granular Matrix Based on Big Data). 计算机科学 44(Z11): 407-410 (2017) - [c16]Na Deng, Xu Chen, Ou Ruan, Chunzhi Wang, Zhiwei Ye, Jingbai Tian:
PaEffExtr: A Method to Extract Effect Statements Automatically from Patents. CISIS 2017: 667-676 - [c15]Na Deng, Xu Chen, Ou Ruan, Chunzhi Wang, Zhiwei Ye, Jingbai Tian:
The Construction Method of Clue Words Thesaurus in Chinese Patents Based on Iteration and Self-filtering. EIDWT 2017: 119-125 - [c14]Chuan Liu, Chunzhi Wang, Jixiong Hu, Zhiwei Ye:
Improved K-means algorithm based on hybrid rice optimization algorithm. IDAACS 2017: 788-791 - 2016
- [j21]Lingyu Yan, Fuhao Zou, Rui Guo, Lianli Gao, Ke Zhou, Chunzhi Wang:
Feature aggregating hashing for image copy detection. World Wide Web 19(2): 217-229 (2016) - [c13]Chunzhi Wang, Ming Hu, Hongwei Chen:
Energy Saving of Elevator Group under Up-Peak Flow Based on Geese-PSO. CCBD 2016: 209-213 - [c12]Chunzhi Wang, Gang Zhang, Hui Xu, Hongwei Chen:
An ACO-based Link Load-Balancing Algorithm in SDN. CCBD 2016: 214-218 - [c11]Xinlu Zong, Yingli Jiang, Chunzhi Wang:
Evacuation Behaviors and Link Selection Strategy Based on Artificial Fish Swarm Algorithm. CCBD 2016: 279-283 - [c10]Chunzhi Wang, Yuanli Du, Zhiwei Ye:
A P2P traffic identification approach based on the optimal support vector machine and genetic algorithm. ICCSE 2016: 262-265 - [c9]Chunzhi Wang, Chen Luo, Hongwei Chen:
Quantitative assessment model based on demands path allocation in SDN. ICCSE 2016: 419-425 - [c8]Hui Xu, Chunzhi Wang, Zhiwei Ye:
Applying extension Logic to E-learning on Internet of Things engineeringl major. ICCSE 2016: 928-932 - 2015
- [j20]Chunzhi Wang, Dongyang Yu, Hongwei Chen, Hui Xu:
Applying Bayesian Trust Sampling to P2P Traffic Inspection. Control. Intell. Syst. 43(2) (2015) - [j19]Mingwu Zhang, Chunzhi Wang, Tsuyoshi Takagi, Yi Mu:
Functional Encryption Resilient to Hard-to-Invert Leakage. Comput. J. 58(4): 735-749 (2015) - [j18]Lingyu Yan, Hefei Ling, Dengpan Ye, Chunzhi Wang, Zhiwei Ye, Hongwei Chen:
Feature Fusion based Hashing for Large Scale Image Copy Detection. Int. J. Comput. Intell. Syst. 8(4): 725-734 (2015) - [j17]Chunhua Pan, Shunpeng Li, Qihui Zhu, Chunzhi Wang, Mingwu Zhang:
Notes on Proxy Signcryption and Multi-proxy Signature Schemes. Int. J. Netw. Secur. 17(1): 29-33 (2015) - [j16]Chunzhi Wang, Huili Zhang, Zhiwei Ye:
A peer to peer traffic identification method based on wavelet and particle swarm optimization algorithm. Int. J. Wavelets Multiresolution Inf. Process. 13(6) (2015) - [j15]Chunzhi Wang, Yanmei Zhang:
New Authentication Scheme for Wireless Body Area Networks Using the Bilinear Pairing. J. Medical Syst. 39(11): 136:1-136:8 (2015) - [j14]Chunzhi Wang, Huili Zhang, Zhiwei Ye:
基于混沌粒子群算法和小波SVM的P2P流量识别方法 (Peer-to-Peer Traffic identification Method Based on Chaos Particle Swarm Algorithm and Wavelet SVM). 计算机科学 42(10): 117-121 (2015) - [c7]Chunzhi Wang, Huili Zhang, Zhiwei Ye, Yuanli Du:
A peer to peer traffic identification method based on support vector machine and artificial bee colony algorithm. IDAACS 2015: 982-986 - 2014
- [j13]Chunzhi Wang, Shuping Wang, Hongwei Chen:
A LRU-Based Query Algorithm for Gnutella Networks. Control. Intell. Syst. 42(1) (2014) - [j12]Mingwu Zhang, Chunzhi Wang, Bo Yang, Tsuyoshi Takagi:
Fully secure constructions of spatial encryption with vector privacy. Int. J. Commun. Syst. 27(12): 4307-4327 (2014) - [j11]Min Zhou, Mingwu Zhang, Chunzhi Wang, Bo Yang:
CCLAS: A Practical and Compact Certificateless Aggregate Signature with Share Extraction. Int. J. Netw. Secur. 16(2): 157-164 (2014) - [j10]Zhenhua Chen, Shundong Li, Chunzhi Wang, Mingwu Zhang:
Comments on FHH Anonymous Multireceiver Encryption. Int. J. Netw. Secur. 16(5): 397-400 (2014) - [j9]Chunzhi Wang, Shuping Wang, Hui Xu, Hongwei Chen:
A P2P Traffic Management Model Based on an ISP Game. J. Comput. 9(6): 1478-1483 (2014) - [j8]Mingwu Zhang, Bo Yang, Chunzhi Wang, Tsuyoshi Takagi:
Unbounded anonymous hierarchical IBE with continual-key-leakage tolerance. Secur. Commun. Networks 7(11): 1974-1987 (2014) - [j7]Mingwu Zhang, Chunzhi Wang, Kirill Morozov:
LR-FEAD: leakage-tolerating and attribute-hiding functional encryption mechanism with delegation in affine subspaces. J. Supercomput. 70(3): 1405-1432 (2014) - [c6]Zhiwei Ye, Mingwei Wang
, Chunzhi Wang, Hui Xu:
P2P Traffic Identification Using Support Vector Machine and Cuckoo Search Algorithm Combined with Particle Swarm Optimization Algorithm. ICoC 2014: 118-132 - [c5]Chunzhi Wang, Dongyang Yu, Hui Xu, Hongwei Chen:
A Bayesian trust sampling method for P2P traffic inspection. SPAC 2014: 454-457 - 2013
- [j6]Mingwu Zhang, Jintao Yao, Chunzhi Wang, Tsuyoshi Takagi:
Public Key Replacement and Universal Forgery of a SCLS Scheme. Int. J. Netw. Secur. 15(2): 133-138 (2013) - [j5]Hongwei Chen, Chunhua Zhang, Xinlu Zong, Chunzhi Wang:
LEACH-G: an Optimal Cluster-heads Selection Algorithm based on LEACH. J. Softw. 8(10): 2660-2667 (2013) - [j4]Hongwei Chen, Shuping Wang, Hui Xu, Zhiwei Ye, Chunzhi Wang:
Automated Trust Negotiation Model based on Dynamic Game of Incomplete Information. J. Softw. 8(10): 2668-2674 (2013) - [c4]Mingwu Zhang, Wei Shi, Chunzhi Wang, Zhenhua Chen, Yi Mu:
Leakage-Resilient Attribute-Based Encryption with Fast Decryption: Models, Analysis and Constructions. ISPEC 2013: 75-90 - [i1]Mingwu Zhang, Wei Shi, Chunzhi Wang, Zhenhua Chen, Yi Mu:
Leakage-resilient Attribute-based Encryptions with Fast Decryption: Model, Analysis and Construction. IACR Cryptol. ePrint Arch. 2013: 247 (2013) - 2012
- [j3]Zhenhua Chen, Shundong Li, Chunzhi Wang, Yanping Shen:
Two Constructions of Multireceiver Encryption Supporting Constant Keys, Short Ciphertexts, and Identity Privacy. Int. J. Netw. Secur. 14(5): 270-279 (2012) - 2010
- [j2]Chunzhi Wang, Hongwei Chen, Ke Zhou, Hui Xu, Zhiwei Ye:
A Peer-to-Peer Game Model using Punishment Strategies. J. Networks 5(11): 1357-1364 (2010) - [j1]Hongwei Chen, Xin Zhou, Fangping You, Hui Xu, Chunzhi Wang, Zhiwei Ye:
A SVM Method for P2P Traffic Identification based on Multiple Traffic Mode. J. Networks 5(11): 1381-1388 (2010) - [c3]Dan Zhang, Jianjia Pan, Yuan Yan Tang, Chunzhi Wang:
Illumination invariant face recognition based on the new phase features. SMC 2010: 3909-3914
2000 – 2009
- 2008
- [c2]Weixing Wang, Chunzhi Wang, Yanzhong Hu, Wei Liu:
A Delineation Algorithm for Particle Images Online. MCO 2008: 468-477 - 2003
- [c1]Chunzhi Wang, Miao Shao, Jing Xia, Huachao Chen:
Research and Design of Remote Education System Based on CSCW. GCC (2) 2003: 1038-1041
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2021-01-22 00:11 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint