default search action
Fangzhou Zhu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Rui Meng, Xiaodong Xu, Gangyi Li, Bingxuan Xu, Fangzhou Zhu, Bizhu Wang, Ping Zhang:
Multidimensional Fingerprints-Based Multiattacker Detection for 6G Systems. IEEE Internet Things J. 11(2): 2665-2683 (2024) - [j6]Jie Wang, Zhihai Wang, Xijun Li, Yufei Kuang, Zhihao Shi, Fangzhou Zhu, Mingxuan Yuan, Jia Zeng, Yongdong Zhang, Feng Wu:
Learning to Cut via Hierarchical Sequence/Set Model for Efficient Mixed-Integer Programming. IEEE Trans. Pattern Anal. Mach. Intell. 46(12): 9697-9713 (2024) - [j5]Xiaodong Xu, Fangzhou Zhu, Shujun Han, Zhongyao Yu, Hangyu Zhao, Bizhu Wang, Ping Zhang:
Swin-Loc: Transformer-Based CSI Fingerprinting Indoor Localization With MIMO ISAC System. IEEE Trans. Veh. Technol. 73(8): 11664-11679 (2024) - [c11]Yufei Kuang, Jie Wang, Haoyang Liu, Fangzhou Zhu, Xijun Li, Jia Zeng, Jianye Hao, Bin Li, Feng Wu:
Rethinking Branching on Exact Combinatorial Optimization Solver: The First Deep Symbolic Discovery Framework. ICLR 2024 - [c10]Yufei Kuang, Jie Wang, Yuyan Zhou, Xijun Li, Fangzhou Zhu, Jianye Hao, Feng Wu:
Towards General Algorithm Discovery for Combinatorial Optimization: Learning Symbolic Branching Policy from Bipartite Graph. ICML 2024 - [i4]Xijun Li, Fangzhou Zhu, Hui-Ling Zhen, Weilin Luo, Meng Lu, Yimin Huang, Zhenan Fan, Zirui Zhou, Yufei Kuang, Zhihai Wang, Zijie Geng, Yang Li, Haoyang Liu, Zhiwu An, Muming Yang, Jianshu Li, Jie Wang, Junchi Yan, Defeng Sun, Tao Zhong, Yong Zhang, Jia Zeng, Mingxuan Yuan, Jianye Hao, Jun Yao, Kun Mao:
Machine Learning Insides OptVerse AI Solver: Design Principles and Applications. CoRR abs/2401.05960 (2024) - [i3]Jie Wang, Zhihai Wang, Xijun Li, Yufei Kuang, Zhihao Shi, Fangzhou Zhu, Mingxuan Yuan, Jia Zeng, Yongdong Zhang, Feng Wu:
Learning to Cut via Hierarchical Sequence/Set Model for Efficient Mixed-Integer Programming. CoRR abs/2404.12638 (2024) - 2023
- [c9]Jiaqi Wei, Fangzhou Zhu, Jinkang Jia:
CDN-DF: A Learning-based CDN Domain Name Detection Method with DNS Deep Feature Extraction. ICISS 2023: 119-125 - [i2]Yufei Kuang, Xijun Li, Jie Wang, Fangzhou Zhu, Meng Lu, Zhihai Wang, Jia Zeng, Houqiang Li, Yongdong Zhang, Feng Wu:
Accelerate Presolve in Large-Scale Linear Programming via Reinforcement Learning. CoRR abs/2310.11845 (2023) - 2022
- [i1]Xijun Li, Qingyu Qu, Fangzhou Zhu, Jia Zeng, Mingxuan Yuan, Kun Mao, Jie Wang:
Learning to Reformulate for Linear Programming. CoRR abs/2201.06216 (2022) - 2021
- [j4]Yanxi Huang, Fangzhou Zhu, Liang Liu, Weizhi Meng, Simin Hu, Renjun Ye, Ting Lv:
WNV-Detector: automated and scalable detection of wireless network vulnerabilities. EURASIP J. Wirel. Commun. Netw. 2021(1): 85 (2021) - [j3]Fangzhou Zhu, Mingxuan Yuan, Xike Xie, Ting Wang, Shenglin Zhao, Weixiong Rao, Jia Zeng:
A Data-Driven Sequential Localization Framework for Big Telco Data. IEEE Trans. Knowl. Data Eng. 33(8): 3007-3019 (2021) - [c8]Ting Lyu, Liang Liu, Fangzhou Zhu, Jingxiu Yang, Simin Hu, Yanxi Huang:
NEEX: An Automated and Efficient Tool for Detecting Browser Extension Fingerprint. EISA 2021: 21-35 - [c7]Renjun Ye, Liang Liu, Simin Hu, Fangzhou Zhu, Jingxiu Yang, Feng Wang:
JSLIM: Reducing the Known Vulnerabilities of JavaScript Application by Debloating. EISA 2021: 128-143 - 2020
- [c6]Fangzhou Zhu, Liang Liu, Weizhi Meng, Ting Lv, Simin Hu, Renjun Ye:
SCAFFISD: A Scalable Framework for Fine-grained Identification and Security Detection of Wireless Routers. TrustCom 2020: 1194-1199
2010 – 2019
- 2017
- [c5]Peng Zhao, Chenxi Zhang, Yukun Huang, Weixiong Rao, Fangzhou Zhu, Ning Liu, Jie Geng, Mingxuan Yuan, Jia Zeng:
Demo abstract: Telco localization techniques. INFOCOM Workshops 2017: 970-971 - [c4]Yukun Huang, Weixiong Rao, Fangzhou Zhu, Ning Liu, Mingxuan Yuan, Jia Zeng, Hua Yang:
Experimental Study of Telco Localization Methods. MDM 2017: 299-306 - 2016
- [c3]Fangzhou Zhu, Chen Luo, Mingxuan Yuan, Yijian Zhu, Zhengqing Zhang, Tao Gu, Ke Deng, Weixiong Rao, Jia Zeng:
City-Scale Localization with Telco Big Data. CIKM 2016: 439-448 - 2015
- [c2]Yiqing Huang, Fangzhou Zhu, Mingxuan Yuan, Ke Deng, Yanhua Li, Bing Ni, Wenyuan Dai, Qiang Yang, Jia Zeng:
Telco Churn Prediction with Big Data. SIGMOD Conference 2015: 607-618 - 2013
- [j2]Fangzhou Zhu, Guohui Li, Li Li, Xiaosong Zhao, Cong Zhang:
Probabilistic nearest neighbor queries of uncertain data via wireless data broadcast. Peer-to-Peer Netw. Appl. 6(4): 363-379 (2013) - 2011
- [j1]Jun Long, Wentao Zhao, Fangzhou Zhu, Zhiping Cai:
Active Learning to Defend Poisoning Attack against Semi-Supervised Intrusion Detection Classifier. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 19(Supplement-1): 93-106 (2011) - 2010
- [c1]Fangzhou Zhu, Jun Long, Wentao Zhao, Zhiping Cai:
A Misleading Attack against Semi-supervised Learning for Intrusion Detection. MDAI 2010: 287-298
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-05 21:38 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint