default search action
Dehai Zhao
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j8]Leiming Chen, Weishan Zhang, Cihao Dong, Dehai Zhao, Xingjie Zeng, Sibo Qiao, Yichang Zhu, Chee-Wei Tan:
FedTKD: A Trustworthy Heterogeneous Federated Learning Based on Adaptive Knowledge Distillation. Entropy 26(1): 96 (2024) - [c13]Zejun Zhang, Zhenchang Xing, Dehai Zhao, Qinghua Lu, Xiwei Xu, Liming Zhu:
Hard to Read and Understand Pythonic Idioms? DeIdiom and Explain Them in Non-Idiomatic Equivalent Code. ICSE 2024: 227:1-227:12 - [i7]Yue Liu, Sin Kit Lo, Qinghua Lu, Liming Zhu, Dehai Zhao, Xiwei Xu, Stefan Harrer, Jon Whittle:
Agent Design Pattern Catalogue: A Collection of Architectural Patterns for Foundation Model based Agents. CoRR abs/2405.10467 (2024) - [i6]Chao Ni, Xiaoya Wang, Liushan Chen, Dehai Zhao, Zhengong Cai, Shaohua Wang, Xiaohu Yang:
CasModaTest: A Cascaded and Model-agnostic Self-directed Framework for Unit Test Generation. CoRR abs/2406.15743 (2024) - [i5]Md. Shamsujjoha, Qinghua Lu, Dehai Zhao, Liming Zhu:
Towards AI-Safety-by-Design: A Taxonomy of Runtime Guardrails in Foundation Model based Systems. CoRR abs/2408.02205 (2024) - 2023
- [c12]Jiamou Sun, Zhenchang Xing, Qinghua Lu, Xiwei Xu, Liming Zhu, Thong Hoang, Dehai Zhao:
Silent Vulnerable Dependency Alert Prediction with Vulnerability Key Aspect Explanation. ICSE 2023: 970-982 - [c11]Dehai Zhao, Zhenchang Xing, Xin Xia, Deheng Ye, Xiwei Xu, Liming Zhu:
SeeHow: Workflow Extraction from Programming Screencasts through Action-Aware Video Analytics. ICSE 2023: 1946-1957 - [c10]Xiaoxue Ren, Xinyuan Ye, Dehai Zhao, Zhenchang Xing, Xiaohu Yang:
From Misuse to Mastery: Enhancing Code Generation with Knowledge-Driven AI Chaining. ASE 2023: 976-987 - [c9]Chao Ni, Xin Yin, Kaiwen Yang, Dehai Zhao, Zhenchang Xing, Xin Xia:
Distinguishing Look-Alike Innocent and Vulnerable Code by Subtle Semantic Representation Learning and Explanation. ESEC/SIGSOFT FSE 2023: 1611-1622 - [i4]Jiamou Sun, Zhenchang Xing, Qinghua Lu, Xiwei Xu, Liming Zhu, Thong Hoang, Dehai Zhao:
Silent Vulnerable Dependency Alert Prediction with Vulnerability Key Aspect Explanation. CoRR abs/2302.07445 (2023) - [i3]Dehai Zhao, Zhenchang Xing, Xin Xia, Deheng Ye, Xiwei Xu, Liming Zhu:
SeeHow: Workflow Extraction from Programming Screencasts through Action-Aware Video Analytics. CoRR abs/2304.14042 (2023) - [i2]Chao Ni, Xin Yin, Kaiwen Yang, Dehai Zhao, Zhenchang Xing, Xin Xia:
Distinguishing Look-Alike Innocent and Vulnerable Code by Subtle Semantic Representation Learning and Explanation. CoRR abs/2308.11237 (2023) - [i1]Xiaoxue Ren, Xinyuan Ye, Dehai Zhao, Zhenchang Xing, Xiaohu Yang:
From Misuse to Mastery: Enhancing Code Generation with Knowledge-Driven AI Chaining. CoRR abs/2309.15606 (2023) - 2021
- [j7]Weishan Zhang, Haoyun Sun, Dehai Zhao, Liang Xu, Xin Liu, Huansheng Ning, Jiehan Zhou, Yi Guo, Su Yang:
A Streaming Cloud Platform for Real-Time Video Processing on Embedded Devices. IEEE Trans. Cloud Comput. 9(3): 868-880 (2021) - [c8]Shidong Pan, Dehai Zhao, Weishan Zhang:
CNN-based Multi-model Birdcall Identification on Embedded Devices. SmartIoT 2021: 245-251 - 2020
- [c7]Dehai Zhao, Zhenchang Xing, Chunyang Chen, Xiwei Xu, Liming Zhu, Guoqiang Li, Jinshui Wang:
Seenomaly: vision-based linting of GUI animation effects against design-don't guidelines. ICSE 2020: 1286-1297
2010 – 2019
- 2019
- [c6]Dehai Zhao, Zhenchang Xing, Chunyang Chen, Xin Xia, Guoqiang Li:
ActionNet: vision-based workflow action recognition from programming screencasts. ICSE 2019: 350-361 - 2018
- [j6]Weishan Zhang, Yuanjie Zhang, Jia Zhai, Dehai Zhao, Liang Xu, Jiehan Zhou, Zhongwei Li, Su Yang:
Multi-source data fusion using deep learning for smart refrigerators. Comput. Ind. 95: 15-21 (2018) - [j5]Weishan Zhang, Gaowa Wulan, Jia Zhai, Liang Xu, Dehai Zhao, Xin Liu, Su Yang, Jiehan Zhou:
An intelligent power distribution service architecture using cloud computing and deep learning techniques. J. Netw. Comput. Appl. 103: 239-248 (2018) - 2017
- [j4]Lianzhang Zhu, Leiming Chen, Dehai Zhao, Jiehan Zhou, Weishan Zhang:
Emotion Recognition from Chinese Speech for Smart Affective Services Using a Combination of SVM and DBN. Sensors 17(7): 1694 (2017) - [j3]Weishan Zhang, Dehai Zhao, Zhi Chai, Laurence T. Yang, Xin Liu, Faming Gong, Su Yang:
Deep learning and SVM-based emotion recognition from Chinese speech for smart affective services. Softw. Pract. Exp. 47(8): 1127-1138 (2017) - 2016
- [j2]Xin Liu, Yao Wang, Dehai Zhao, Weishan Zhang, Leyi Shi:
Patching by automatically tending to hub nodes based on social trust. Comput. Stand. Interfaces 44: 94-101 (2016) - [c5]Weishan Zhang, Dehai Zhao, Xiufeng Chen, Yuanjie Zhang:
Deep Learning Based Emotion Recognition from Chinese Speech. ICOST 2016: 49-58 - [c4]Weishan Zhang, Bo Li, Dehai Zhao, Faming Gong, Qinghua Lu:
Workload Prediction for Cloud Cluster Using a Recurrent Neural Network. IIKI 2016: 104-109 - [c3]Weishan Zhang, Zhichao Wang, Liang Xu, Dehai Zhao, Faming Gong, Qinghua Lu:
An Empirical Study on Big Video Data Processing: Architectural Styles, Issues, and Challenges. IIKI 2016: 110-115 - [c2]Weishan Zhang, Dehai Zhao, Liang Xu, Zhongwei Li, Wenjuan Gong, Jiehan Zhou:
Distributed embedded deep learning based real-time video processing. SMC 2016: 1945-1950 - 2015
- [j1]Xin Liu, Dehai Zhao, Liang Xu, Weishan Zhang, Jijun Yin, Xiufeng Chen:
A Distributed Video Management Cloud Platform Using Hadoop. IEEE Access 3: 2637-2643 (2015) - [c1]Weishan Zhang, Dehai Zhao, Wenjuan Gong, Zhongwei Li, Qinghua Lu, Su Yang:
Food Image Recognition with Convolutional Neural Networks. UIC/ATC/ScalCom 2015: 690-693
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-13 01:40 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint