Changyou Zhang

ORCID: 0000-0003-4025-0736
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Distributed and Parallel Computing Systems
  • Parallel Computing and Optimization Techniques
  • Service-Oriented Architecture and Web Services
  • Peer-to-Peer Network Technologies
  • Advanced Data Storage Technologies
  • Caching and Content Delivery
  • Cloud Computing and Resource Management
  • Embedded Systems Design Techniques
  • Software System Performance and Reliability
  • Artificial Immune Systems Applications
  • Advanced Malware Detection Techniques
  • Topic Modeling
  • Advanced Image and Video Retrieval Techniques
  • Geophysics and Gravity Measurements
  • Web Data Mining and Analysis
  • Image Processing and 3D Reconstruction
  • Image Retrieval and Classification Techniques
  • Network Security and Intrusion Detection
  • Customer churn and segmentation
  • Advanced Steganography and Watermarking Techniques
  • Algorithms and Data Compression
  • Privacy, Security, and Data Protection
  • Video Surveillance and Tracking Methods
  • Privacy-Preserving Technologies in Data
  • Constraint Satisfaction and Optimization

East China Jiaotong University
2020-2025

Institute of Software
2014-2023

Chinese Academy of Sciences
2014-2023

University of Chinese Academy of Sciences
2023

Chengdu University of Technology
2020

Institute of Computing Technology
2017

Peking University
2010-2012

Shijiazhuang Tiedao University
2006-2012

Chongqing University of Science and Technology
2005-2012

Beijing Institute of Technology
2005-2010

Tensor Euler deconvolution has been developed to help interpret gravity tensor gradient data in terms of 3-D subsurface geological structure. Two forms have used this study: conventional using three gradients the vertical component vector and all gradients. These methods tested on point, prism, cylindrical mass models line gridded forms. The were then applied measured for Eugene Island area Gulf Mexico ungridded results from model show significantly improved performance method, which...

10.1190/1.1444745 article EN Geophysics 2000-03-01

Due to the anisotropic structure and mechanical properties of composite laminates, internal damage cracks can easily occur. In this study, orthotropic glass-fiber-reinforced polymer composites were used as repair object. Firstly, material was analyzed using finite element method, self-healing structural compliance, water head loss, volume percentage microvascular network taken objective functions, topology optimization carried out non-dominated soring genetic algorithm II. Secondly, with a...

10.3390/polym17060749 article EN Polymers 2025-03-12

10.1016/j.elerap.2016.03.005 article EN Electronic Commerce Research and Applications 2016-03-28

With the increased snapshot operations (creation or deletion), performance of storage system will degrade severely whether in Copy on write (COW) Redirect (ROW). This paper presents a novel scheme which could use resources effectively and keep historical data accurately for SSDHDD-hybrid system. SSD (source volume) stores all active executes read/write without responding to operations. In contrast, HDDs (snapshot store writing sequentially form logs are responsible backup this way, hybrid...

10.1049/cje.2017.10.008 article EN Chinese Journal of Electronics 2018-01-01

In this paper we discuss about our experiences in improving the performance of GEMM (both single and double precision) on Fermi architecture using CUDA, how new features such as cache affect performance. It is found that addition GPU one hand helps processers take advantage data locality occurred runtime but other renders dependency algorithmic parameters less predictable. Auto tuning then becomes a useful technique to address issue. Our auto-tuned SGEMM DGEMM reach 563 GFlops 253...

10.1109/icpads.2010.64 article EN 2010-12-01

SpMV (Sparse Matrix-Vector multiplication), in its simplest form y = Ax, multiplies a sparse matrix with dense vector and is widely used computing primitive the domain of HPC. On newly SW26010 many-core platform, we propose highly efficient CSR (Compressed Storage Row) based implementation parallel SpMV, referred to as SWCSR-SpMV sequel. format can be trivially parallelized but performance majorly impeded by memory access efficiency, therefore leverage high-throughput mechanism while...

10.1145/3225058.3225074 article EN 2018-08-08

We present the twisted electromagnetic sinc-correlation Schell-model (EM TSSM) beam as an extension of cylindrical sinc and analyze necessary source parameter conditions to generate a physically viable beam. Furthermore, we thoroughly investigate propagation properties EM TSSM in atmospheric turbulence using extended Huygens–Fresnel integral, explicitly focusing on spectral intensity, degree polarization (DOP), coherence (DOC). It shows that phase has noticeable impact intensity profiles...

10.37190/oa240102 article EN Optica Applicata 2024-01-01

Mobile device forensics is an interdisciplinary field consisting of techniques applied to a wide range computing devices. Android devices are among the most disruptive technologies last years, gaining even more diffusion and success in daily life people categories. became important forensic due rich amount personal information they store. However, tools often used acquire privacy by attackers. This papar presents anti-forensics approach for which protects AES keys from being acquired tools....

10.1109/cse-euc.2017.45 article EN 2017-07-01

The greatest advantage of the P2P network is robustness which provides an opportunity to create a decentralized environment for web service publication and discovery. A new study shows that roaming fleeting communication between immune cells form information-sharing network. By analogy, we design discovery mechanism on unstructured Firstly, all services are clustered into communities through functional properties. Then, several query packets wander among these make rapid recognition exchange...

10.1109/iccit.2007.1 article EN 2007 International Conference on Convergence Information Technology (ICCIT 2007) 2007-11-01

An android mobile phone is one of the most anticipated smart operating systems on market. The open source Android platform not only allow developer to take full advantage system, but also raises significant issues related malicious applications (Apps). Although understanding malware using dynamic analysis can provide a compressive view and it still subjected high cost in environment development manual effort investigation. In this study our proposed approach provides static analyst paradigm...

10.12783/dtcse/cnsce2017/8883 article EN DEStech Transactions on Computer Science and Engineering 2017-05-05

The terminals in mobile cloud computing have themselves the special characteristics, such as flexibility, distributed different domains, resourceconstraint and easily to be captured et al. participated collaborative computing, information exchange sharing secrets may come from networks or clouds. For this complex network environment paper proposes a Multi-domain lightweight Asymmetric group key agreement (ML-AGKA). It adopts bilinear mapping blind technology achieve an asymmetric protocol...

10.1049/cje.2018.07.002 article EN Chinese Journal of Electronics 2018-09-01

O2O (Online-to-Offline) is a new rapidly growing e-commerce model. It combines offline physical business with online network marketing and electronic payment to provide convenient efficient localized services for consumers. However, user privacy concerns have become one of the challenging issues affecting further applications. Taking catering takeaway as an example, cost occurring in big data era are presented through analyzing service model current mainstream platforms. A hybrid-cloud-based...

10.1109/icebe.2016.044 article EN 2016-11-01

To enhance the energy efficiency and performance of algorithms with Graphics Processing Unit (GPU) accelerators in source-code development, we consider power based on data transfer bandwidth consumption key situations. First, a set primitives is abstracted from program statements. Then, different granularity sizes are considered mapped into proper primitives. With these mappings, programmer can intuitively determine running states thread. Finally, this intuition enables to tune algorithm...

10.1109/tst.2012.6216757 article EN Tsinghua Science & Technology 2012-06-01
Coming Soon ...