Duo Zhang

ORCID: 0000-0001-8473-3655
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Blockchain Technology Applications and Security
  • Privacy-Preserving Technologies in Data
  • Expert finding and Q&A systems
  • Topic Modeling
  • Web Data Mining and Analysis
  • Educational Innovations and Challenges
  • Formal Methods in Verification
  • Information Retrieval and Search Behavior
  • Computability, Logic, AI Algorithms
  • Artificial Intelligence in Games
  • Quantum Computing Algorithms and Architecture
  • Advanced Authentication Protocols Security
  • AI and Big Data Applications
  • Machine Learning and Data Classification
  • Sustainability and Climate Change Governance
  • Software Testing and Debugging Techniques
  • Software Reliability and Analysis Research
  • Climate Change, Adaptation, Migration
  • Security in Wireless Sensor Networks
  • Game Theory and Voting Systems
  • Climate Change Policy and Economics

Guizhou University
2014-2022

Civil Aviation Flight University of China
2022

University of Illinois Urbana-Champaign
2008

Tsinghua University
2007

Fudan University
2004

This paper addresses the issue of extraction an academic researcher social network. By network extraction, we are aimed at finding, extracting, and fusing 'semantic '-based profiling information a from Web. Previously, was often undertaken separately in ad-hoc fashion. first gives formalization entire problem. Specifically, it identifies 'relevant documents' Web by classifier. It then proposes unified approach to perform using conditional random fields (CRF). integrates publications existing...

10.1109/icdm.2007.30 article EN 2007-10-01

Recent work on language models for information retrieval has shown that smoothing is crucial achieving good performance. Many different effective methods have been proposed, which mostly implement various heuristics to exploit corpus structures. In this paper, we propose a general and unified optimization framework graph This not only provides formulation of the existing heuristics, but also serves as road map systematically exploring models. We follow derive several instantiations...

10.1145/1390334.1390438 article EN 2008-07-20

The authentication problem is one of the most significant challenges in applications Internet Things (IoT), and relationship among smart devices an effective solution to tackle cross-domain issue. In this article, we first abstract a general undirected graph from IoT. Then, formulate into signature transitivity by incorporating accumulator knowledge standard digital scheme. As consequence, legality well-verified computing witness related edges without worrying about whether belong same...

10.1109/tii.2021.3116049 article EN IEEE Transactions on Industrial Informatics 2021-09-28

Delegating calculation is an important approach to solve the correctness and reliability of task subcontracting delegating results in cloud computing environment. However, dynamic, complexity openness bring unprecedented risks security tasks. To problem new presented. Firstly, game theory introduced into calculation, single-client multi-server rational model given. Secondly, Zero-determinant Strategy scheme based on constructed through implementing single-server protocol Strategy, conditions...

10.1109/access.2020.2971544 article EN cc-by IEEE Access 2020-01-01

Model checking is a fully automated inspection technology, which system satisfies group of required properties. Properties are used to define in linear time temporal logic (LTL), and translated into automata be checked explicit-state model checkers. In this paper, we give that an algorithm generates from LTL formula. We method consisting three stages: the negative formula, process translation, Simplified resulting automaton. put forward translation optimal within certain class procedures....

10.1109/icnc.2014.6975996 article EN 2014-08-01

This work presents a novel approach to image texture classification, which involves model of artificial organisms i.e. crawlers (ACrawlers) and series evolution curves representing the features texture. The distributed ACrawlers locally interact with their living environment, textured regions, each ACrawler acts according set homogenous rules for isotropic motion, energy absorption colony formation etc. evolve through natural selection, produces specific agent evolution, habitant settlement,...

10.1109/iat.2004.1342992 article EN Proceedings. IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2004. (IAT 2004). 2004-11-08

Delegating calculation is an important approach to solve the correctness and reliability of task subcontracting delegating results in cloud computing environment. However, dynamic, complexity openness bring unprecedented risks security tasks. To problem new presented. Firstly, game theory introduced into calculation, single-client multi-server rational model given. Secondly, Zero-determinant Strategy (ZD strategy) scheme based on constructed through implementing single-server protocol ZD...

10.1109/gcwkshps45667.2019.9024678 article EN 2022 IEEE Globecom Workshops (GC Wkshps) 2019-12-01

Aerobics sports injury diagnosis is a rapid of injuries caused by athletes in the process aerobics training or competition. The purpose this paper to use image processing technology study and analyze injury, so that results can be obtained more quickly effectively. This first introduces then analyzes colleges universities. Firstly, algorithm formula given, introduced into dynamic analysis diagnosis. two are compared through example analysis. experimental show joint strain, sprains, muscle...

10.1155/2022/2553048 article EN cc-by Emergency Medicine International 2022-08-06

With the rapid development and continuous popularization of quality education in China, diversification practicality forms have become a problem that China's management departments pay more attention to. The higher is foundation all work colleges universities, it also key means to promote construction socialist country all-round progress development. In traditional educational thinking, universities are mostly based on theoretical knowledge education, there still big gap between practical...

10.54097/jeer.v2i3.7303 article EN cc-by Journal of Education and Educational Research 2023-04-12

The current framework for climate change negotiation models presents several limitations that warrant further research and development. In this track, we discuss mainly two key areas improvement, focusing on the geographical impacts utility framework. aspects of impacts, We explore five critical aspects: (1) shift from local to global impact, (2) variability in effects across regions, (3) heterogeneity location political structures, (4) collaborations between adjacent nations, (5) importance...

10.48550/arxiv.2307.13886 preprint EN cc-by arXiv (Cornell University) 2023-01-01

Outsourcing computation enables a computationally weak client to outsource the of function f more powerful but untrusted server. The traditional outsourcing model forbids communication between players, it has little effect. Based on game theory, this paper establishes an which is in line with actual scene. Firstly, we construct structural mapping relationship security and optimization problem. Secondly, by designing individual potential global function, goal consistent ensure correctness...

10.1016/j.dcan.2022.05.028 article EN cc-by-nc-nd Digital Communications and Networks 2022-06-09
Coming Soon ...