Zhihua Li

ORCID: 0000-0001-7915-9484
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cloud Computing and Resource Management
  • IoT and Edge/Fog Computing
  • Neural Networks and Applications
  • Fuzzy Logic and Control Systems
  • Quantum Computing Algorithms and Architecture
  • Network Security and Intrusion Detection
  • Neural Networks and Reservoir Computing
  • Quantum Information and Cryptography
  • Technology and Security Systems
  • Educational Technology and Assessment
  • Blockchain Technology Applications and Security
  • Higher Education and Teaching Methods
  • Magnetism in coordination complexes
  • Software-Defined Networks and 5G
  • Advanced Decision-Making Techniques
  • Fault Detection and Control Systems
  • Lanthanide and Transition Metal Complexes
  • Software Testing and Debugging Techniques
  • Advanced Malware Detection Techniques
  • Differential Equations and Numerical Methods
  • Information and Cyber Security
  • Service-Oriented Architecture and Web Services
  • Freezing and Crystallization Processes
  • Web Data Mining and Analysis
  • Modeling and Simulation Systems

Jiangnan University
2015-2025

Northeast Normal University
2024

Chinese Academy of Sciences
2022-2023

Institute of Microelectronics
2022-2023

Jiangsu University
2020-2021

Tsinghua University
2012-2020

Hangzhou Normal University
2016-2019

Jilin Agricultural University
2019

Wuxi Institute of Technology
2017

Hangzhou Dianzi University
2008-2016

Abstract Controlling and programming quantum devices to process information by the unit of dit, i.e., qudit, provides possibilities for noise-resilient communications, delicate molecular simulations, efficient computations, showing great potential enhance capabilities qubit-based technologies. Here, we report a programmable qudit-based processor in silicon-photonic integrated circuits demonstrate its enhancement computational parallelism. The monolithically integrates all key functionalities...

10.1038/s41467-022-28767-x article EN cc-by Nature Communications 2022-03-04

10.1016/j.future.2019.08.004 article EN Future Generation Computer Systems 2019-08-12

Data-driven machine learning, especially deep learning technology, is becoming an important tool for handling big data issues in bioinformatics. In DNA sequences are often converted to numerical values representation and feature various applications. Similar conversion occurs Genomic Signal Processing (GSP), where genome transformed into signal extraction recognition. This kind of also called encoding scheme. The diverse schemes can greatly affect the performance GSP applications models....

10.26599/bdma.2018.9020018 article EN cc-by Big Data Mining and Analytics 2018-05-24

10.1016/j.future.2016.12.008 article EN Future Generation Computer Systems 2016-12-13

Computations performed by using convolutional layers in deep learning require significant resources; thus, their scope of applicability is limited. When neural network models are employed an edge-computing system, the limited computational power and storage resources edge devices can degrade inference performance, a considerable amount computation time, result increased energy consumption. To address these issues, this study presents convolutional-layer partitioning model, based on fused...

10.3390/app15031097 article EN cc-by Applied Sciences 2025-01-22

In multi-UAV-assisted mobile edge computing (MEC), insufficient consideration of collaborative computation in inter-UAV communication can significantly reduce computational service capabilities. For this problem, we present a MEC offloading optimization model that jointly optimizes task decision, UAV resource allocation, trajectories and establish through communication. First, to solve the issue, define weighted utility function balances delay energy consumption. Then, tackle continuous...

10.4018/ijswis.368839 article EN International Journal on Semantic Web and Information Systems 2025-02-12

We designed, fabricated, and characterized a programmable qudit-based quantum processor on silicon. implemented several algorithms with qudits, showing the logarithmic speed-up, photon detection rate enhancement accuracy improvement in information processing.

10.1364/cleo_si.2023.sf1e.1 article EN 2023-01-01

Identity-recognition technologies require assistive equipment, whereas they are poor in recognition accuracy and expensive. To overcome this deficiency, paper proposes several gait feature identification algorithms. First, combination with the collected information of individuals from triaxial accelerometers on smartphones, is preprocessed, multimodal fusion used existing standard datasets to yield a synthetic dataset; then, characteristics biological information, Convolutional Neural...

10.26599/bdma.2021.9020006 article EN cc-by Big Data Mining and Analytics 2021-08-26

To efficiently mine threat intelligence from the vast array of open-source cybersecurity analysis reports on web, we have developed Parallel Deep Forest-based Multi-Label Classification (PDFMLC) algorithm. Initially, are collected and converted into a standardized text format. Subsequently, five tactics category labels annotated, creating multi-label dataset for classification. Addressing limitations low execution efficiency scalability in sequential deep forest algorithm, our PDFMLC...

10.26599/bdma.2023.9020032 article EN cc-by Big Data Mining and Analytics 2024-04-22

In order to overcome the challenges of inadequate classification accuracy in existing fake cybersecurity threat intelligence mining methods and lack high-quality public datasets for training models, we propose a novel approach that significantly advances field. We improved attention mechanism designed generative adversarial network based on generate intelligence. Additionally, refine text tokenization techniques design detection model detect threats Using our STIX-CTIs dataset, method...

10.4018/ijswis.350095 article EN International Journal on Semantic Web and Information Systems 2024-08-08

In cloud data center, without efficient virtual machine placement, the overload of any types resources on physical machines (PM) can easily cause waste other resources, and frequent costly (VM) migration, which further negatively affects quality service (QoS). To address this problem, in paper we propose an evidence-efficient affinity propagation scheme for VM placement (EEAP-VMP), is capable balancing workload across various running PMs. Our approach models problem searching desirable...

10.1109/access.2020.3020043 article EN cc-by IEEE Access 2020-01-01

Two solvent-free polymorphs of a chiral iron(ii) complex have been obtained, and their polymorphism dependent spin-crossover ferroelectric properties demonstrated. Polymorph I shows gradual behavior, whereas polymorph II remains in high-spin state but typical feature.

10.1039/c7dt01634d article EN Dalton Transactions 2017-01-01

AJAX (Asynchronous JavaScript and XML) is becoming more popular with the prosperity of web 2.0. However, traditional crawlers fail to retrieve information from applications because complex operations. Moreover, a single application one URL may have different page states, which violates rule that corresponds unique page. The can be modeled as state transition graph crawl traverse without prior knowledge its structure. In this paper, we distinguished events are not well defined in previous...

10.1109/iccsee.2012.38 article EN International Conference on Computer Science and Electronics Engineering 2012-03-01

Abstract VM consolidation has been proposed as an effective solution to improve resource utilization and energy efficiency through migration. Improper placement during may cause frequent migrations constant on–off switching of PMs, which can significantly hurt QoS increase consumption. Most existing algorithms on efficient suffer the problem easily falling into a sub-optimum prematurely since they are heuristic. Also, do not achieve good balance between multiple different goals, such...

10.1007/s10723-022-09631-0 article EN cc-by Journal of Grid Computing 2022-11-24

Two iron(ii) molecular isomers, namely face-Λ-[Fe(L1)3](ClO4)2 (1a) (L1 = R-1-phenyl-N-((1-hexyl-5-methyl-1H-imidazol-2-ylmethylene)ethanamine)) and face-Λ-[Fe(L2)3](ClO4)2 (1b) (L2 R-1-phenyl-N-(1-hexyl-4-methyl-1H-imidazol-2-ylmethylene)ethanamine), are obtained via a well-designed strategy based on the tautomerization of 4(5)-methylimidazole group. Structural investigations reveal that two isomers extremely similar with only differences in methyl group position ligands. The center is...

10.1039/c7dt00260b article EN Dalton Transactions 2017-01-01

Unprecedented 1D coaxial heterogeneous nanocomposites with spin-crossover and conductive properties were obtained by <italic>in situ</italic> growing classic magnetic bistable compounds on silver nanowires.

10.1039/c7nj02089a article EN New Journal of Chemistry 2017-01-01

In this work, pyrazine (A), aminopyrazine (B), quinoxaline (C), and 5,6,7,8-tetrahydroquinoxaline (D) have been screened out among a large number of derivatives to construct Hofmann-type metal-organic frameworks (MOFs) Fe(L)[M(CN)4 ] (M=Pt, Pd) with similar 3D pillared-layer structures. X-ray single-crystal diffraction reveals that the alternate linkage between M FeII ions through cyano bridges forms 2D extended metal cyanide sheets, ligands A-D acted as vertical columns connect sheets give...

10.1002/chem.202002544 article EN Chemistry - A European Journal 2020-06-24
Coming Soon ...