Shunzhi Zhu

ORCID: 0000-0001-9715-4281
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Software Reliability and Analysis Research
  • Software Engineering Research
  • Advanced Neural Network Applications
  • Recommender Systems and Techniques
  • Handwritten Text Recognition Techniques
  • Advanced Malware Detection Techniques
  • Color Science and Applications
  • Advanced Graph Neural Networks
  • Blockchain Technology Applications and Security
  • Advanced Image and Video Retrieval Techniques
  • Software Testing and Debugging Techniques
  • Transportation Planning and Optimization
  • Traffic Prediction and Management Techniques
  • Imbalanced Data Classification Techniques
  • Remote-Sensing Image Classification
  • Image Enhancement Techniques
  • AI in cancer detection
  • Medical Image Segmentation Techniques
  • Topic Modeling
  • Advanced Image Fusion Techniques
  • Image Processing and 3D Reconstruction
  • Color perception and design
  • IoT and Edge/Fog Computing
  • Adversarial Robustness in Machine Learning
  • Spam and Phishing Detection

Xiamen University of Technology
2009-2024

Anhui University of Traditional Chinese Medicine
2023

University of Derby
2002-2010

Existing recommender algorithms mainly focused on recommending individual items by utilizing user-item interactions. However, little attention has been paid to recommend user generated lists (e.g., playlists and booklists). On one hand, contain rich signal about item co-occurrence, as within a list are usually gathered based specific theme. the other user's preference over also indicate her list. We believe that 1) if relevance can be properly leveraged, an enhanced recommendation for...

10.1145/3077136.3080779 article EN Proceedings of the 45th International ACM SIGIR Conference on Research and Development in Information Retrieval 2017-07-28

Metro systems play a key role in meeting urban transport demands large cities. The close relationship between historical weather conditions and the corresponding passenger flow has been widely analyzed by researchers. However, few studies have explored issue of how to use data make forecasting more accurate. To this end, an hourly metro model using deep long short-term memory neural network (LSTM_NN) was developed. optimized traditional input variables, including different temporal data,...

10.3390/app10082962 article EN cc-by Applied Sciences 2020-04-25

With the rapid development of social economy, our lives are flooded with all kinds counterfeit products. The public's attitude greedy for petty and cheap has encouraged unscrupulous manufacturers to take advantage opportunity provide low-cost products, suppress profits legitimate manufacturers, also make public lose confidence in quality At present, most widely used anti-counterfeiting system based on QR codes market. However, existing traceability systems still mostly built a centralized...

10.1109/access.2020.3036832 article EN cc-by IEEE Access 2020-01-01

With the popularity of internet 5G network, network constructions hospitals have also rapidly developed. Operations management in healthcare system is becoming paperless, for example, via a shared electronic medical record (EMR) system. A plays an important role reducing diagnosis costs and improving diagnostic accuracy. In traditional system, centralized database storage typically used. Once there problem with data storage, it could cause privacy disclosure security risks. Blockchain...

10.3390/s21227765 article EN cc-by Sensors 2021-11-22

This paper presents an improved semi-supervised learning approach for defect prediction involving class imbalanced and limited labeled data problem. employs random under-sampling technique to resample the original training set updat

10.3233/ifs-141220 article EN Journal of Intelligent & Fuzzy Systems 2014-01-01

An transfer learning method, called Kernel Canonical Correlation Analysis plus (KCCA+), is proposed for heterogeneous Cross-company defect prediction. Combining the kernel method and techniques, this improves performance of predictor with more adaptive ability in nonlinearly separable scenarios. Experiments validate its effectiveness.

10.1587/transinf.2016edl8238 article EN IEICE Transactions on Information and Systems 2017-01-01

Past efforts on the automated processing medical infrared images has typically focused specialized applications like detection of breast cancer. We propose application content-based image retrieval (CBIR) to thermal images. CBIR allows similar based features directly extracted from data. Hence, for a that shows symptoms certain disease will provide visually cases which usually also represent similarities in terms. The we this purpose are set moment invariants grayscale

10.1109/iembs.2004.1403379 article EN 2005-03-21

Software defect prediction studies usually build models without analyzing the data used in procedure. As a result, same approach has different performances on sets. In this paper, we introduce discrimination analysis for providing good method to give insight into inherent property of software data. Based analysis, find that sets field have nonlinearly separable and class-imbalanced problems. Unlike prior works, try exploit kernel map high-dimensional feature space. By combating these two...

10.1155/2014/675368 article EN cc-by Journal of Applied Mathematics 2014-01-01

Abstract This study investigated the differences between different large colour‐difference (LCD) data sets (with a mean Δ E value about 10). Six were studied. For each set, various CIELAB based colour difference models derived to fit data. These compared shed light on sets. It was found that all have very similar characteristics except for Munsell Detailed investigation showed discrepancy is mainly due balance lightness and chromatic used previously set. one unit of Value appears be three...

10.1002/col.20591 article EN Color Research & Application 2010-02-24

Abstract Accurately predicting traffic flow is crucial for intelligent transportation systems (ITS). In recent years, many deep learning‐based prediction models have been widely applied in prediction, and various spatio‐temporal networks proposed. However, most of the existing follow a general technical route to extract features, which lack capacity extracting important historical information with high spatial temporal correlations dynamically deeply. How develop well‐performance model...

10.1049/itr2.12462 article EN cc-by IET Intelligent Transport Systems 2023-11-28

An experiment was carried out using CRT colors. The stimuli were selected along 24 vectors in CIELAB color space. data used to test various difference formulae and uniform spaces. results show that there are some discrepencies between space experimental data. also suggest three types of models according the develop these models: small color-difference, large color-difference Munsell

10.1117/12.464669 article EN Proceedings of SPIE, the International Society for Optical Engineering/Proceedings of SPIE 2002-06-06

Semantic segmentation technology based on deep learning has played an important role for doctors in identifying brain tumor regions and formulating treatment plans. Popular automated methods tumors include 2D 3D convolution networks. The networks give better results but lead to a significant increase parameters computational cost. In this paper, we propose lightweight network composed of inverted residual modules, which can significantly reduce the complexity models. Based depthwise...

10.1145/3581807.3581829 article EN 2022-11-17

Binary Code Similarity Detection is a method that involves comparing two or more binary code segments to identify their similarities and differences. This technique plays crucial role in areas such as software security, vulnerability detection, composition analysis. With the extensive use of development system optimization, similarity detection has become an important area research. Traditional methods source face challenges when dealing with unreadable complex nature code, necessitating...

10.3390/electronics13091715 article EN Electronics 2024-04-29

The security issues brought by third-party components in software are becoming increasingly prominent. However, current component analysis tools only analyze the existence of vulnerabilities introduced components, resulting much false positives. In this paper, we present a vulnerability accessibility framework to whether these would be actually called project.

10.1109/isssr61934.2024.00076 article EN 2024-03-16

Current optimization methods of learned spatial indexes are often based on data distribution. However, when in coldstart scenarios whose query distributions unknown, these not suitable. In this paper, a sophisticated index, K-Index, is designed for such cold-start environments. It employs clustering-based partitioning strategy, utilizing the K-means algorithm to cluster dataset. Then, cube-shaped partitions formed with clusters. For sake that should be stored certain order speed up...

10.1117/12.3038055 article EN 2024-08-07
Coming Soon ...