default search action
Junyi Zhou
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Xiaodong Wu, Zhigang Jin, Junyi Zhou, Kai Liu, Zepei Liu:
Against network attacks in renewable power plants: Malicious behavior defense for federated learning. Comput. Networks 250: 110577 (2024) - [j15]Zhigang Jin, Junyi Zhou, Bing Li, Xiaodong Wu, Chenxu Duan:
FL-IIDS: A novel federated learning-based incremental intrusion detection system. Future Gener. Comput. Syst. 151: 57-70 (2024) - [j14]Zhou Min, He Yan, Xinrui Jiang, Xin Chen, Junyi Zhou, Daiyin Zhu:
Research on Digital Twin Method for Spaceborne Along-Track Interferometric Synthetic Aperture Radar Velocity Inversion of Ocean Surface Currents. Remote. Sens. 16(19): 3739 (2024) - [c7]Junjie Shang, Junyi Zhou:
How to Design Scientific, Happy and Effective Educational Games: Research on Educational Game Design from the Perspective of Learning Sciences. ICBL 2024: 21-38 - [c6]Junyi Zhou, Kaixuan Huang, Siyu Tang, Shunqing Zhang:
Heterogeneous Feature Fusion Approach for Multi-Modal Indoor Localization. WCNC 2024: 1-6 - 2023
- [j13]Xiaodong Wu, Zhigang Jin, Junyi Zhou, Chenxu Duan:
Quantum walks-based classification model with resistance for cloud computing attacks. Expert Syst. Appl. 232: 120894 (2023) - [j12]Ruinan Jin, Junyi Zhou, Jinghao Hu, Peng Guo, Chao Cai, Yilan Wu:
Toward Practical Lightweight Passive Human Tracking Using WiFi Sensing. IEEE Internet Things J. 10(15): 13769-13783 (2023) - [j11]Junyi Zhou, Ying Zhang, Wanzhu Tu:
clusterMLD: An Efficient Hierarchical Clustering Method for Multivariate Longitudinal Data. J. Comput. Graph. Stat. 32(3): 1131-1144 (2023) - [c5]Huili Dou, Jianhua Chen, Junyi Zhou:
Research on the application of data mining in the analysis of students' behavioral intelligence in the information age. ICIEAI 2023: 859-864 - 2022
- [j10]Junyi Zhou, Xiaoyu Lu, Wennan Chang, Changlin Wan, Xiongbin Lu, Chi Zhang, Sha Cao:
PLUS: Predicting cancer metastasis potential based on positive and unlabeled learning. PLoS Comput. Biol. 18(3) (2022) - [c4]Wang Peng, Yin Lei, Junyi Zhou:
Research on missing data filling method of wind power generation based on k-nearest neighbor algorithm. DSIT 2022: 1-7 - 2021
- [j9]Qian Fu, Zhanghao Gao, Junyi Zhou, Yafeng Zheng:
CLSA: A novel deep learning model for MOOC dropout prediction. Comput. Electr. Eng. 94: 107315 (2021) - [j8]Junyi Zhou, Roger Kahn, Shlomo Weiss:
A novel low power hybrid cache using GC-EDRAM cells. Integr. 81: 234-245 (2021) - 2020
- [c3]Xin Xin, Wei Liu, Yumei Yan, Xin Zhao, Nan Liu, Xinyue Huang, Junyi Zhou:
Exploring Interaction Qualities from Teenagers' Studying Behavior for Learning Feature in Museum Exhibit. IHIET (Paris) 2020: 91-96
2010 – 2019
- 2014
- [j7]Qiang Zhou, Junyi Zhou, Michael De Cicco, Shiyu Zhou, Xiaochun Li:
Detecting 3D Spatial Clustering of Particles in Nanocomposites Based on Cross-Sectional Images. Technometrics 56(2): 212-224 (2014) - 2012
- [c2]Junyi Zhou, Xibei Yang:
Study on characteristic consistent blocks based rough set approach to incomplete system. GrC 2012: 663-666 - [c1]Junyi Zhou, Xibei Yang:
Rough Set Model Based on Hybrid Tolerance Relation. RSKT 2012: 28-33 - 2011
- [j6]Junyi Zhou, Jing Shi:
A comprehensive multi-factor analysis on RFID localization capability. Adv. Eng. Informatics 25(1): 32-40 (2011) - 2010
- [j5]Junyi Zhou, Jing Shi:
Error analysis of non-collaborative wireless localization in circular-shaped regions. Comput. Networks 54(14): 2439-2452 (2010) - [j4]Junyi Zhou, Jing Shi, Xiuli Qu:
Landmark Placement for Wireless Localization in Rectangular-Shaped Industrial Facilities. IEEE Trans. Veh. Technol. 59(6): 3081-3090 (2010)
2000 – 2009
- 2009
- [j3]Junyi Zhou, Jing Shi:
Performance evaluation of object localization based on active radio frequency identification technology. Comput. Ind. 60(9): 669-676 (2009) - [j2]Junyi Zhou, Jing Shi:
Localisation of stationary objects using passive RFID technology. Int. J. Comput. Integr. Manuf. 22(7): 717-726 (2009) - [j1]Junyi Zhou, Jing Shi:
RFID localization algorithms and applications - a review. J. Intell. Manuf. 20(6): 695-707 (2009)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint