


default search action
Shangping Zhong
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c17]Tuo Yang
, Kaizhi Chen
, Shangping Zhong
:
Deepfake Detection Using Fusion Channel Information in a Multi-attentional Model. AIMLR 2023: 20:1-20:5 - 2022
- [j14]Kaizhi Chen, Chengpei Le, Shangping Zhong, Longkun Guo, Ge Xu:
NNNPE: non-neighbourhood and neighbourhood preserving embedding. Connect. Sci. 34(1): 2615-2629 (2022) - 2021
- [c16]Zehong Zheng, Shangping Zhong, Kaizhi Chen:
Decision-making Method of Futures Trading Using Dictionary-based Early Classification of Time Series. DSIT 2021: 328-333 - [c15]Jing Li, Shangping Zhong, Kaizhi Chen:
MLEC-QA: A Chinese Multi-Choice Biomedical Question Answering Dataset. EMNLP (1) 2021: 8862-8874 - [c14]Jing Li, Shangping Zhong, Kaizhi Chen, Taibiao Li:
SkeIn: Sketchy-Intensive Reading Comprehension Model for Multi-choice Biomedical Questions. ISBRA 2021: 561-571 - [c13]Huifang Hao, Shangping Zhong, Kaizhi Chen:
Image Deep Steganography Detection based on Knowledge Distillation in Teacher-Student Network. VSIP 2021: 58-64 - 2020
- [j13]Shangping Zhong, Wude Weng
, Kaizhi Chen
, Jianhua Lai:
Deep-Learning Steganalysis for Removing Document Images on the Basis of Geometric Median Pruning. Symmetry 12(9): 1426 (2020) - [c12]Wenzhuang Kang, Shangping Zhong, Kaizhi Chen, Jianhua Lai, Guangquan Xu:
RF-AdaCost: WebShell Detection Method that Combines Statistical Features and Opcode. FCS 2020: 667-682 - [c11]Kaizhi Chen, Wencheng Wei, Shangping Zhong, Longkun Guo:
Blood Leukocyte Object Detection According to Model Parameter-Transfer and Deformable Convolution. PDCAT 2020: 1-16
2010 – 2019
- 2019
- [j12]Qiang Xu, Shangping Zhong, Kaizhi Chen, Chunyang Zhang:
不同纹理复杂度图像生成中CycleGAN循环一致损失系数优化选择方法 (Optimized Selection Method of Cycle-consistent Loss Coefficient of CycleGAN in Image Generation with Different Texture Complexity). 计算机科学 46(1): 100-106 (2019) - [j11]Shangping Zhong
, Cunmin Jia, Kaizhi Chen, Peng Dai:
A novel steganalysis method with deep learning for different texture complexity images. Multim. Tools Appl. 78(7): 8017-8039 (2019) - [c10]Yuhan Chen, Shangping Zhong, Kaizhi Chen, Shoulong Chen, Song Zheng:
Automated Detection of Sewer Pipe Defects Based on Cost-Sensitive Convolutional Neural Network. SPML 2019: 8-17 - [c9]Dongyang Ye, Shangping Zhong, Jiahao Zhuang, Li Chen:
Method for Removing Motion Blur from Images of Harmful Biological Organisms in Power Places Based on Improved Cyclegan. SPML 2019: 92-97 - 2018
- [j10]Ximeng Liu
, Robert H. Deng
, Yang Yang, Ngoc Hieu Tran, Shangping Zhong:
Hybrid privacy-preserving clinical decision support system in fog-cloud computing. Future Gener. Comput. Syst. 78: 825-837 (2018) - [j9]Yang Yang, Xianghan Zheng, Ximeng Liu, Shangping Zhong, Victor Chang
:
Cross-domain dynamic anonymous authenticated group key management with symptom-matching for e-health social system. Future Gener. Comput. Syst. 84: 160-176 (2018) - 2017
- [j8]Lihui Lin, Kaizhi Chen, Shangping Zhong:
Enhancing the Session Security of Zen Cart based on HMAC-SHA256. KSII Trans. Internet Inf. Syst. 11(1): 466-483 (2017) - [j7]Hang Cheng, Jingyue Wang, Meiqing Wang, Shangping Zhong:
Toward privacy-preserving JPEG image retrieval. J. Electronic Imaging 26(4): 43022 (2017) - 2016
- [c8]Wentuan Pan, Shangping Zhong, Silan Huang, Danping Wu:
Online Power Grid Emergency Material Demand Forecasting Model in Typhoon Disaster Based on Relevance Vector Machine. ISCID (1) 2016: 402-405 - 2015
- [j6]Kaizhi Chen, Chenjun Lin, Shangping Zhong, Longkun Guo:
A parallel SRM feature extraction algorithm for steganalysis based on GPU architecture. Comput. Sci. Inf. Syst. 12(4): 1345-1359 (2015) - [j5]Fengying He, Tianshun Chen, Shangping Zhong:
A Classifier Ensemble Algorithm Based on Improved RSM for High Dimensional Steganalysis. J. Inf. Hiding Multim. Signal Process. 6(2): 198-210 (2015) - [c7]Ming Lin, Shangping Zhong, Lingli Lin:
Chicken Sound Recognition Using Anti-noise Mel Frequency Cepstral Coefficients. RVSP 2015: 224-227 - 2014
- [j4]Fengying He, Shangping Zhong, Kaizhi Chen:
An Effective Ensemble-based Classification Algorithm for High-Dimensional Steganalysis. J. Softw. 9(7): 1833-1840 (2014) - [j3]Shangping Zhong, Tianshun Chen, Fengying He, Yuzhen Niu:
Fast Gaussian kernel learning for classification tasks based on specially structured global optimization. Neural Networks 57: 51-62 (2014) - [c6]Zhaoshuo Zeng, Shangping Zhong, Kaizhi Chen:
An efficient fusion algorithm for large scale face verification based on KISSME and cosine similarity. ICAILP 2014: 216-221 - [c5]Chengpei Le, Shangping Zhong, Kaizhi Chen:
An efficient fusion method of distance metric learning and random forests distance for image verification. ICAILP 2014: 222-227 - [c4]Kaizhi Chen, Chenjun Lin, Shangping Zhong, Longkun Guo:
A Parallel SRM Feature Extraction Algorithm for Steganalysis Based on GPU Architecture. PAAP 2014: 178-182 - 2013
- [j2]Shangping Zhong, Daya Chen, Qiaofen Xu, Tianshun Chen:
Optimizing the Gaussian kernel function with the formulated kernel target alignment criterion for two-class pattern classification. Pattern Recognit. 46(7): 2045-2054 (2013) - 2012
- [c3]Xianghan Zheng, Wenzhong Guo, Shangping Zhong, Zhiyong Yu
:
A Secure and Hierarchical Architecture for P2PSIP Session Initiation. IPDPS Workshops 2012: 1183-1189
2000 – 2009
- 2009
- [c2]Shangping Zhong, Xiangwen Liao
, Xue Zhang, Jingqu Lin:
A Novel Distributed Single Sign-On Scheme with Dynamically Changed Threshold Value. IAS 2009: 563-566 - [c1]Xue Zhang, Shangping Zhong:
An Improved Path-Based Transductive Support Vector Machines Algorithm for Blind Steganalysis Classification. AICI 2009: 453-462 - 2007
- [j1]Shangping Zhong, Xueqi Cheng, Tierui Chen:
Data Hiding in a Kind of PDF Texts for Secret Communication. Int. J. Netw. Secur. 4(1): 17-26 (2007)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 22:52 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint