
Kui Zhao
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j4]Fan Rao, Bao Yang, Yen-Wei Chen, Jingsong Li, Hongkai Wang, Hongwei Ye, Yaofa Wang, Kui Zhao, Wentao Zhu:
A novel supervised learning method to generate CT images for attenuation correction in delayed pet scans. Comput. Methods Programs Biomed. 197: 105764 (2020) - [i10]Zebang Zhang, Kui Zhao, Kai Huang, Quanhui Jia, Yanming Fang, Quan Yu:
Large-scale Uncertainty Estimation and Its Application in Revenue Forecast of SMEs. CoRR abs/2005.00718 (2020) - [i9]Hang Miao, Kui Zhao, Zhun Wang, Linbo Jiang, Quanhui Jia, Yanming Fang, Quan Yu:
Intelligent Credit Limit Management in Consumer Loans Based on Causal Inference. CoRR abs/2007.05188 (2020)
2010 – 2019
- 2019
- [j3]Liansheng Liu
, Lei Yan
, Binbin Dong
, Wei Liu
, Wenhua Yi
, Kui Zhao
:
Detection and Recognition Method of Misfire for Chamber (Deep-Hole) Blasting Based on RFID. IEEE Access 7: 170144-170156 (2019) - [j2]Wen Zhong, Yunchuan Deng, J. A. Tenreiro Machado, Chao Zhang, Kui Zhao, Xiaojun Wang:
Strength prediction of similar materials to ionic rare earth ores based on orthogonal test and back propagation neural network. Soft Comput. 23(19): 9429-9437 (2019) - [c10]Kui Zhao, Junhao Hua, Ling Yan, Qi Zhang, Huan Xu, Cheng Yang:
A Unified Framework for Marketing Budget Allocation. KDD 2019: 1820-1830 - [i8]Kui Zhao, Junhao Hua, Ling Yan, Qi Zhang, Huan Xu, Cheng Yang:
A Unified Framework for Marketing Budget Allocation. CoRR abs/1902.01128 (2019) - 2018
- [c9]Wen Zhong, Kui Zhao, Xiaojun Wang, Peng Zeng:
Optimization of Courses System for Mining Engineering Guided by Engineering Education Accreditation. eLEOT 2018: 194-204 - [c8]Wen Zhong, Kui Zhao, Xiaojun Wang, Guangzhe Xiao:
Optimization and Practice of Talent Cultivation Scheme of "Regression Project" in Mining Engineering Specialty. eLEOT 2018: 205-213 - [c7]Kui Zhao, Yuechuan Li, Zhaoqian Shuai, Cheng Yang:
Learning and Transferring IDs Representation in E-commerce. KDD 2018: 1031-1039 - [i7]Kui Zhao, Yuechuan Li, Chi Zhang, Cheng Yang, Shenghuo Zhu:
PRNN: Recurrent Neural Network with Persistent Memory. CoRR abs/1801.08094 (2018) - 2017
- [c6]Kui Zhao, Xia Hu, Jiajun Bu, Can Wang:
Deep Style Match for Complementary Recommendation. AAAI Workshops 2017 - [c5]Kui Zhao, Bangpeng Li, Zilun Peng, Jiajun Bu, Can Wang:
Navigation objects extraction for better content structure understanding. WI 2017: 629-636 - [i6]Xuejian Zhao, Kui Zhao, Feng Ha:
An Algorithm of Parking Planning for Smart Parking System. CoRR abs/1708.07932 (2017) - [i5]Kui Zhao, Yi Wang, Xia Hu, Can Wang:
Effective Blog Pages Extractor for Better UGC Accessing. CoRR abs/1708.07935 (2017) - [i4]Kui Zhao, Xia Hu, Jiajun Bu, Can Wang:
Deep Style Match for Complementary Recommendation. CoRR abs/1708.07938 (2017) - [i3]Kui Zhao, Bangpeng Li, Zilun Peng, Jiajun Bu, Can Wang:
Navigation Objects Extraction for Better Content Structure Understanding. CoRR abs/1708.07940 (2017) - [i2]Kui Zhao, Can Wang:
Sales Forecast in E-commerce using Convolutional Neural Network. CoRR abs/1708.07946 (2017) - [i1]Kui Zhao, Yuechuan Li, Zhaoqian Shuai, Cheng Yang:
Joint IDs Embedding and its Applications in E-commerce. CoRR abs/1712.08289 (2017) - 2012
- [j1]Yanlong Cao, Kui Zhao, Jiangxin Yang, Jiayan Guan, Bo Li:
EOQ principle analysis of benefit consistency of supply and demand based on comprehensive cost of quality. Int. J. Manuf. Technol. Manag. 25(4): 213-223 (2012) - 2011
- [c4]Guoyi Song, Jinxia Huang, Hua Han, Kui Zhao, Yufeng Zhang, He Sun:
Robust stability research of a single-phase inverters with full-bridge converter. EMEIT 2011: 3658-3661
2000 – 2009
- 2008
- [c3]Diangang Wang, Tao Li, SunJun Liu, Gang Liang, Kui Zhao:
An Immune Multi-agent System for Network Intrusion Detection. ISICA 2008: 436-445 - 2006
- [c2]SunJun Liu, Tao Li, Kui Zhao, Jin Yang, Xun Gong, Jianhua Zhang:
Immune-Based Dynamic Intrusion Response Model. SEAL 2006: 96-103 - [c1]SunJun Liu, Tao Li, Diangang Wang, Kui Zhao, Xun Gong, Xiaoqin Hu, Chun Xu, Gang Liang:
Immune Multi-agent Active Defense Model for Network Intrusion. SEAL 2006: 104-111
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2020-12-26 22:12 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint