Остановите войну!
for scientists:
default search action
Qing Zhao 0001
- > Home > Persons > Qing Zhao 0001
Publications
- 2024
- [j60]Sudeep Salgia, Tamir Gabay, Qing Zhao, Kobi Cohen:
A Communication-Efficient Adaptive Algorithm for Federated Learning Under Cumulative Regret. IEEE Trans. Signal Process. 72: 735-743 (2024) - 2023
- [c77]Dan Ben Ami, Kobi Cohen, Qing Zhao:
Client Selection for Generalization in Accelerated Federated Learning: A Bandit Approach. ICASSP 2023: 1-5 - [i55]Sudeep Salgia, Karthik Murthy, Qing Zhao, Tamir Gabay, Kobi Cohen:
A Communication-Efficient Adaptive Algorithm for Federated Learning under Cumulative Regret. CoRR abs/2301.08869 (2023) - [i54]Dan Ben Ami, Kobi Cohen, Qing Zhao:
Client Selection for Generalization in Accelerated Federated Learning: A Multi-Armed Bandit Approach. CoRR abs/2303.10373 (2023) - 2021
- [j57]Tomer Gafni, Kobi Cohen, Qing Zhao:
Searching for Unknown Anomalies in Hierarchical Data Streams. IEEE Signal Process. Lett. 28: 1774-1778 (2021) - [j56]Chao Wang, Kobi Cohen, Qing Zhao:
Information-Directed Random Walk for Rare Event Detection in Hierarchical Processes. IEEE Trans. Inf. Theory 67(2): 1099-1116 (2021) - 2020
- [j51]Bar Hemo, Tomer Gafni, Kobi Cohen, Qing Zhao:
Searching for Anomalies Over Composite Hypotheses. IEEE Trans. Signal Process. 68: 1181-1196 (2020) - 2019
- [j50]Boshuang Huang, Kobi Cohen, Qing Zhao:
Active Anomaly Detection in Heterogeneous Processes. IEEE Trans. Inf. Theory 65(4): 2284-2301 (2019) - [j49]Andrey Gurevich, Kobi Cohen, Qing Zhao:
Sequential Anomaly Detection Under a Nonlinear System Cost. IEEE Trans. Signal Process. 67(14): 3689-3703 (2019) - [i37]Bar Hemo, Tomer Gafni, Kobi Cohen, Qing Zhao:
Searching for Anomalies over Composite Hypotheses. CoRR abs/1911.05381 (2019) - 2018
- [c68]Boshuang Huang, Kobi Cohen, Qing Zhao:
Active Anomaly Detection in Heterogeneous Processes. ICASSP 2018: 3924-3928 - [c65]Chao Wang, Qing Zhao, Kobi Cohen:
Dynamic Search on a Tree with Information-Directed Random Walk. SPAWC 2018: 1-5 - 2017
- [c64]Andrey Gurevich, Kobi Cohen, Qing Zhao:
Anomaly detection under a nonlinear system cost objective function. Allerton 2017: 634-638 - [c63]Chao Wang, Kobi Cohen, Qing Zhao:
Active hypothesis testing on a tree: Anomaly detection under hierarchical observations. ISIT 2017: 993-997 - [i32]Boshuang Huang, Kobi Cohen, Qing Zhao:
Sequential Active Detection of Anomalies in Heterogeneous Processes. CoRR abs/1704.00766 (2017) - 2016
- [c58]Bar Hemo, Kobi Cohen, Qing Zhao:
Asymptotically optimal search of unknown anomalies. ISSPIT 2016: 75-80 - [i27]Chao Wang, Qing Zhao, Kobi Cohen:
Active Hypothesis Testing on A Tree: Anomaly Detection under Hierarchical Observations. CoRR abs/1612.09067 (2016) - 2015
- [j44]Kobi Cohen, Qing Zhao:
Active Hypothesis Testing for Anomaly Detection. IEEE Trans. Inf. Theory 61(3): 1432-1450 (2015) - [j41]Kobi Cohen, Qing Zhao:
Asymptotically Optimal Anomaly Detection via Sequential Testing. IEEE Trans. Signal Process. 63(11): 2929-2941 (2015) - 2014
- [j39]Kobi Cohen, Qing Zhao, Ananthram Swami:
Optimal Index Policies for Anomaly Localization in Resource-Constrained Cyber Systems. IEEE Trans. Signal Process. 62(16): 4224-4236 (2014) - [c50]Kobi Cohen, Qing Zhao, Anna Scaglione:
Restless multi-armed bandits under time-varying activation constraints for dynamic spectrum access. ACSSC 2014: 1575-1578 - [c48]Kobi Cohen, Qing Zhao:
Anomaly detection over independent processes: Switching with memory. Allerton 2014: 33-37 - [c47]Kobi Cohen, Qing Zhao:
Quickest anomaly detection: A case of active hypothesis testing. ITA 2014: 1-5 - [i26]Kobi Cohen, Qing Zhao:
Active Hypothesis Testing for Quickest Anomaly Detection. CoRR abs/1403.1023 (2014) - [i25]Kobi Cohen, Qing Zhao, Ananthram Swami:
Optimal Index Policies for Anomaly Localization in Resource-Constrained Cyber Systems. CoRR abs/1405.4098 (2014) - [i24]Kobi Cohen, Qing Zhao:
Asymptotically Optimal Sequential Tests for Anomaly Detection: Switching with Memory. CoRR abs/1405.4659 (2014) - 2013
- [c42]Kobi Cohen, Qing Zhao, Ananthram Swami:
Optimal index policies for quickest localization of anomaly in cyber networks. GlobalSIP 2013: 221-224
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-13 23:04 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint