


default search action
Hongchao Zhou
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Fengqian Ding
, Chen Xu, Han Liu, Bin Zhou, Hongchao Zhou:
Bridging pre-trained models to continual learning: A hypernetwork based framework with parameter-efficient fine-tuning techniques. Inf. Sci. 674: 120710 (2024) - [j16]Tianhuan Huang
, Xianye Ben
, Chen Gong
, Wenzheng Xu, Qiang Wu
, Hongchao Zhou
:
GaitDAN: Cross-View Gait Recognition via Adversarial Domain Adaptation. IEEE Trans. Circuits Syst. Video Technol. 34(9): 8026-8040 (2024) - [j15]Dongdong Zhao
, Hongchao Zhou
, Peng Chen
, Yingtian Hu
, Weihao Ge
, Yuanjie Dang
, Ronghua Liang
:
Design of Forward-Looking Sonar System for Real-Time Image Segmentation With Light Multiscale Attention Net. IEEE Trans. Instrum. Meas. 73: 1-17 (2024) - [j14]Yudan Xu
, Hailiang Xiong
, Gangqiang Yang
, Hongchao Zhou
:
Carrier Frequency Synchronization of LDPC Coded Transmissions in High Dynamic Environments. IEEE Trans. Veh. Technol. 73(7): 10451-10463 (2024) - [i14]Hongchao Zhou, Shunbo Hu:
Deformable Image Registration with Multi-scale Feature Fusion from Shared Encoder, Auxiliary and Pyramid Decoders. CoRR abs/2408.05717 (2024) - [i13]Hongchao Zhou, Shunbo Hu:
Dual-Attention Frequency Fusion at Multi-Scale for Joint Segmentation and Deformable Medical Image Registration. CoRR abs/2409.19658 (2024) - 2023
- [j13]Yulin Wu
, Chang Liu, Lei Chen, Dong Zhao, Qinghe Zheng, Hongchao Zhou:
Perturbation consistency and mutual information regularization for semi-supervised semantic segmentation. Multim. Syst. 29(2): 511-523 (2023) - [j12]Yulin Wu
, Lei Chen, Dong Zhao, Hongchao Zhou, Qinghe Zheng:
Multi-match: mutual information maximization and CutEdge for semi-supervised learning. Multim. Tools Appl. 82(1): 479-496 (2023) - [c26]Yaping Qi
, Rui Su
, Lei Chen
, Xianye Ben
, Zheng Dong
, Hongchao Zhou
:
SPSTT: Second-Order Propagation Spatial Temporal Transformer Network for Space-Time Video Super-Resolution. ICIGP 2023: 204-209 - 2022
- [j11]Bing Li, Ying Zhou, Ruixue Xiao, Jianchao Wang, Xianye Ben
, Kidiyo Kpalma, Hongchao Zhou:
Unsupervised cross-database micro-expression recognition based on distribution adaptation. Multim. Syst. 28(3): 1099-1116 (2022) - [i12]Hongchao Zhou:
Activation Learning by Local Competitions. CoRR abs/2209.13400 (2022) - 2021
- [j10]Dong Zhao
, Jiande Sun, Lei Chen, Yulin Wu, Hongchao Zhou:
Variable-length image compression based on controllable learning network. Multim. Tools Appl. 80(13): 20065-20087 (2021) - [j9]Dong Zhao
, Baoqing Ding, Yulin Wu, Lei Chen, Hongchao Zhou:
Unsupervised Learning from Videos for Object Discovery in Single Images. Symmetry 13(1): 38 (2021) - [j8]Hongchao Zhou
, Abbas El Gamal
:
Network Information Theoretic Security With Omnipresent Eavesdropping. IEEE Trans. Inf. Theory 67(12): 8280-8299 (2021) - [c25]Gaiqin Liu, Yulin Wu, Dong Zhao, Hongchao Zhou:
Time-adaptive graph convolutional network for traffic prediction. ICDLT 2021: 81-86 - [c24]Hongchao Zhou, Yongjun Liu, Zhenjiang Qian:
A Fast Region Segmentation Algorithm for Water Meter Image Based on Adaptive Seed Point Selection. INTETAIN 2021: 23-35 - 2020
- [j7]Hailiang Xiong
, Changwu Hu, Yujun Li, Guangyuan Wang, Hongchao Zhou:
Secure Secret Sharing With Adaptive Bandwidth in Distributed Cloud Storage Systems. IEEE Access 8: 108148-108157 (2020) - [c23]Yulin Wu, Anqi Liu, Lei Chen, Dong Zhao, Hongchao Zhou, Qinghe Zheng:
Multi-scale Attention Net for Retina Blood Vessel Segmentation. CSAI 2020: 86-90 - [c22]Hongchao Zhou, Abbas El Gamal:
Network Information Theoretic Security. ISIT 2020: 978-983 - [i11]Hongchao Zhou, Abbas El Gamal:
Network Information Theoretic Security. CoRR abs/2001.05169 (2020)
2010 – 2019
- 2017
- [c21]Anxiao Andrew Jiang, Pulakesh Upadhyaya, Ying Wang, Krishna R. Narayanan, Hongchao Zhou, Jin Sima, Jehoshua Bruck
:
Stopping set elimination for LDPC codes. Allerton 2017: 700-707 - 2015
- [j6]Hongchao Zhou, Yuval Kochman, Gregory W. Wornell:
On-Off Keying Communication Over Optical Channels With Crosstalk. IEEE J. Sel. Areas Commun. 33(9): 1855-1868 (2015) - [j5]Hongchao Zhou, Moshe Schwartz
, Anxiao Andrew Jiang, Jehoshua Bruck
:
Systematic Error-Correcting Codes for Rank Modulation. IEEE Trans. Inf. Theory 61(1): 17-32 (2015) - 2014
- [j4]Hongchao Zhou, Ho-Lin Chen
, Jehoshua Bruck
:
Synthesis of Stochastic Flow Networks. IEEE Trans. Computers 63(5): 1234-1247 (2014) - [c20]Hongchao Zhou, Da Wang, Gregory W. Wornell:
A simple class of efficient compression schemes supporting local access and editing. ISIT 2014: 2489-2493 - [c19]Hongchao Zhou, Gregory W. Wornell:
On the limits of communication over optical on-off keying channels with crosstalk. ISIT 2014: 2809-2813 - [c18]Hongchao Zhou, Gregory W. Wornell:
Efficient homomorphic encryption on integer vectors and its applications. ITA 2014: 1-9 - 2013
- [j3]Hongchao Zhou, Anxiao Jiang, Jehoshua Bruck
:
Nonuniform Codes for Correcting Asymmetric Errors in Data Storage. IEEE Trans. Inf. Theory 59(5): 2988-3002 (2013) - [c17]Hongchao Zhou, Gregory W. Wornell:
Adaptive pulse-position modulation for high-dimensional quantum key distribution. ISIT 2013: 359-363 - [c16]Hongchao Zhou, Venkat Chandar, Gregory W. Wornell:
Low-density random matrices for secret key extraction. ISIT 2013: 2607-2611 - [c15]Hongchao Zhou, Ligong Wang, Gregory W. Wornell:
Layered schemes for large-alphabet secret key distribution. ITA 2013: 1-10 - [i10]Hongchao Zhou, Moshe Schwartz, Anxiao Jiang, Jehoshua Bruck:
Systematic Error-Correcting Codes for Rank Modulation. CoRR abs/1310.6817 (2013) - 2012
- [j2]Hongchao Zhou, Jehoshua Bruck
:
Efficient Generation of Random Bits From Finite State Markov Chains. IEEE Trans. Inf. Theory 58(4): 2490-2506 (2012) - [c14]Hongchao Zhou, Jehoshua Bruck
:
Variable-length extractors. ISIT 2012: 1107-1111 - [c13]Hongchao Zhou, Anxiao Jiang, Jehoshua Bruck
:
Systematic error-correcting codes for rank modulation. ISIT 2012: 2978-2982 - [i9]Hongchao Zhou, Po-Ling Loh, Jehoshua Bruck:
The Synthesis and Analysis of Stochastic Switching Circuits. CoRR abs/1209.0715 (2012) - [i8]Hongchao Zhou, Ho-Lin Chen, Jehoshua Bruck:
Synthesis of Stochastic Flow Networks. CoRR abs/1209.0724 (2012) - [i7]Hongchao Zhou, Jehoshua Bruck:
A Universal Scheme for Transforming Binary Algorithms to Generate Random Bits from Loaded Dice. CoRR abs/1209.0726 (2012) - [i6]Hongchao Zhou, Jehoshua Bruck:
Streaming Algorithms for Optimal Generation of Random Bits. CoRR abs/1209.0730 (2012) - [i5]Hongchao Zhou, Jehoshua Bruck:
Linear Transformations for Randomness Extraction. CoRR abs/1209.0732 (2012) - [i4]Hongchao Zhou, Jehoshua Bruck:
Efficiently Extracting Randomness from Imperfect Stochastic Processes. CoRR abs/1209.0734 (2012) - [i3]Hongchao Zhou, Anxiao Jiang, Jehoshua Bruck:
Nonuniform Codes for Correcting Asymmetric Errors in Data Storage. CoRR abs/1209.0740 (2012) - [i2]Hongchao Zhou, Anxiao Jiang, Jehoshua Bruck:
Balanced Modulation for Nonvolatile Memories. CoRR abs/1209.0744 (2012) - 2011
- [j1]Weikang Qian, Marc D. Riedel
, Hongchao Zhou, Jehoshua Bruck
:
Transforming Probabilities With Combinational Logic. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 30(9): 1279-1292 (2011) - [c12]Hongchao Zhou, Anxiao Jiang, Jehoshua Bruck
:
Nonuniform codes for correcting asymmetric errors. ISIT 2011: 1046-1050 - [c11]Hongchao Zhou, Jehoshua Bruck
:
Linear extractors for extracting randomness from noisy sources. ISIT 2011: 1738-1742 - [c10]Hongchao Zhou, Anxiao Jiang, Jehoshua Bruck
:
Error-correcting schemes with dynamic thresholds in nonvolatile memories. ISIT 2011: 2143-2147 - [c9]Anxiao Jiang, Hongchao Zhou, Zhiying Wang
, Jehoshua Bruck
:
Patterned cells for phase change memories. ISIT 2011: 2333-2337 - [c8]Anxiao Jiang, Hongchao Zhou, Jehoshua Bruck
:
Variable-level cells for nonvolatile memories. ISIT 2011: 2522-2526 - [c7]Anxiao Jiang, Hongchao Zhou, Jehoshua Bruck
:
Maximizing the storage capacity of nonvolatile memories. ITA 2011: 208-216 - 2010
- [c6]Hongchao Zhou, Jehoshua Bruck
:
Generalizing the Blum-Elias method for generating random bits from Markov chains. ISIT 2010: 1248-1252 - [c5]Hongchao Zhou, Ho-Lin Chen
, Jehoshua Bruck
:
On the synthesis of stochastic flow networks. ISIT 2010: 1330-1334 - [i1]Hongchao Zhou, Jehoshua Bruck:
Efficient Generation of Random Bits from Finite State Markov Chains. CoRR abs/1012.5339 (2010)
2000 – 2009
- 2009
- [c4]Hongchao Zhou, Jehoshua Bruck
:
On the expressibility of stochastic switching circuits. ISIT 2009: 2061-2065 - [c3]Po-Ling Loh, Hongchao Zhou, Jehoshua Bruck
:
The robustness of stochastic switching networks. ISIT 2009: 2066-2070 - 2008
- [c2]Hongchao Zhou, Xiaohong Guan, Chengjie Wu:
Reliable Transport with Memory Consideration in Wireless Sensor Networks. ICC 2008: 2819-2824 - [c1]Chengjie Wu, Ruixi Yuan, Hongchao Zhou:
A Novel Load Balanced and Lifetime Maximization Routing Protocol in Wireless Sensor Networks. VTC Spring 2008: 113-117
Coauthor Index
aka: Anxiao Andrew Jiang

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint