default search action
Feng Zhai
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j14]Shiyuan Fu, Xin Gao, Baofeng Li, Feng Zhai, Jiansheng Lu, Bing Xue, Jiahao Yu, Chun Xiao:
Multivariate time series anomaly detection via separation, decomposition, and dual transformer-based autoencoder. Appl. Soft Comput. 159: 111671 (2024) - [j13]Jiahao Yu, Xin Gao, Feng Zhai, Baofeng Li, Bing Xue, Shiyuan Fu, Lingli Chen, Zhihang Meng:
An adversarial contrastive autoencoder for robust multivariate time series anomaly detection. Expert Syst. Appl. 245: 123010 (2024) - [j12]Shiyuan Fu, Xin Gao, Feng Zhai, Baofeng Li, Bing Xue, Jiahao Yu, Zhihang Meng, Guangyao Zhang:
A time series anomaly detection method based on series-parallel transformers with spatial and temporal association discrepancies. Inf. Sci. 657: 119978 (2024) - [j11]Zhihang Meng, Xin Gao, Feng Zhai, Baofeng Li, Chun Xiao, Qiangwei Li, Bing Xue, Jiansheng Lu:
An imbalanced contrastive classification method via similarity comparison within sample-neighbors with adaptive generation coefficient. Inf. Sci. 662: 120273 (2024) - [j10]Jiahao Yu, Xin Gao, Baofeng Li, Feng Zhai, Jiansheng Lu, Bing Xue, Shiyuan Fu, Chun Xiao:
A filter-augmented auto-encoder with learnable normalization for robust multivariate time series anomaly detection. Neural Networks 170: 478-493 (2024) - [j9]Bing Xue, Xin Gao, Baofeng Li, Feng Zhai, Jiansheng Lu, Jiahao Yu, Shiyuan Fu, Chun Xiao:
A robust multi-scale feature extraction framework with dual memory module for multivariate time series anomaly detection. Neural Networks 177: 106395 (2024) - 2023
- [j8]Zhihu Li, Bing Zhao, Hongxia Guo, Feng Zhai, Lin Li:
Multi-Party Audit and Regulatory Mechanism for P2P Electricity Transaction Based on Distributed Traceable Linkable Group Signature. IEEE Access 11: 128410-128420 (2023) - [j7]Bing Xue, Xin Gao, Feng Zhai, Baofeng Li, Jiahao Yu, Shiyuan Fu, Lingli Chen, Zhihang Meng:
A contrastive autoencoder with multi-resolution segment-consistency discrimination for multivariate time series anomaly detection. Appl. Intell. 53(23): 28655-28674 (2023) - [j6]Zhihu Li, Bing Zhao, Hongxia Guo, Feng Zhai, Lin Li:
A Privacy-Preserving Consensus Mechanism for ADMM-Based Peer-to-Peer Energy Trading. Symmetry 15(8): 1561 (2023) - [c13]Zhihu Li, Bing Zhao, Hongxia Guo, Feng Zhai, Lin Li:
UAV-assisted Blockchain-based Electric Power Grid Inspection System. CyberC 2023: 375-382 - [c12]Bin Xu, Feng Zhai, Xiaobing Liang, Baofeng Li, Qi Zhou:
Research on Data Security of New Energy Business Based on Hadoop. PCCNT 2023: 66:1-66:5 - [i1]Xiao Fang, Xin Gao, Baofeng Li, Feng Zhai, Yu Qin, Zhihang Meng, Jiansheng Lu, Chun Xiao:
A Non-Uniform Low-Light Image Enhancement Method with Multi-Scale Attention Transformer and Luminance Consistency Loss. CoRR abs/2312.16498 (2023) - 2022
- [j5]Feng Zhai, Ting Yang, Bing Zhao, Hao Chen:
Privacy-Preserving Outsourcing Algorithms for Multidimensional Data Encryption in Smart Grids. Sensors 22(12): 4365 (2022) - [j4]Zhihu Li, Haiqing Xu, Feng Zhai, Bing Zhao, Meng Xu, Zhenwei Guo:
A Privacy-Preserving, Two-Party, Secure Computation Mechanism for Consensus-Based Peer-to-Peer Energy Trading in the Smart Grid. Sensors 22(22): 9020 (2022) - [c11]Zhihu Li, Bing Zhao, Hongxia Guo, Feng Zhai, Lin Li:
A Privacy-Preserving Blockchain-based Energy Supply Chain System Supporting Supervision. CyberC 2022: 66-75 - [c10]Yun Feng, Feng Zhai, Xiaobing Liang, Liang Zhang:
Design of L-IDAKA Protocol for Lightweight Access Authentication and Encrypted Transmission of New Power System-Aware Terminals Based on Hash Pre-authentication. EITCE 2022: 766-771 - [c9]Baofeng Li, Feng Zhai, Yilun Fu, Wei Cen:
The Research about RFID Electronic Seal On-Site Sealing Technology Based on Cryptographic Algorithms. ICISCAE 2022: 879-883 - 2021
- [c8]Feng Zhai:
Research on the Interdisciplinary Cooperative Teaching Mode of Computer Major in Liberal Arts Major under the Background of Discipline Integration. ICISCAE (ACM) 2021: 1157-1160 - [c7]Feng Zhai, Lingda Kong, Yongjin Yu, Xin Ye:
Power Meter Software Quality Analysis Based on Dynamic Binary Instrumentation. IMIS 2021: 242-252 - 2020
- [j3]Congsheng Lu, Feng Zhai:
Weakly-supervised large-scale image modeling for sport scenes and its applications. J. Vis. Commun. Image Represent. 71: 102718 (2020) - [c6]Ling-Wei Zhu, Feng Zhai:
Research on Dynamic Integration of Multi-objective Data in UI Color Interface. ADHIP (2) 2020: 245-254 - [c5]Feng Zhai, Ling-Wei Zhu:
The Application of Visualization of Internet of Things in Online Teaching of Mobile Interactive Interface Optimization. ADHIP (2) 2020: 255-265 - [c4]Feng Zhai, Xiaobing Liang, Wei Cen, Yilun Fu, Yong-Feng Cao, Jin-Kai Sun, Jia-Yi Liu:
Design of a Miniature Communication Conversion Module Applied in the Power Internet of Things. ICCT 2020: 800-806
2010 – 2019
- 2019
- [j2]Zhejing Bao, Wanrong Qiu, Lei Wu, Feng Zhai, Wenjing Xu, Baofeng Li, Zhijie Li:
Optimal Multi-Timescale Demand Side Scheduling Considering Dynamic Scenarios of Electricity Demand. IEEE Trans. Smart Grid 10(3): 2428-2439 (2019) - [c3]Yun Feng, Xiaobing Liang, Feng Zhai, Meng Xu:
Design and Research of Trusted Acquisition Terminals Based on Domestic Password. AINA Workshops 2019: 633-640 - [c2]Qian Ma, Bin Xu, Bang Sun, Feng Zhai, Baojiang Cui:
Terminal Access Data Anomaly Detection Based on GBDT for Power User Electric Energy Data Acquisition System. EIDWT 2019: 137-147 - 2018
- [j1]Ting Yang, Feng Zhai, Jialin Liu, Meng Wang, Haibo Pen:
Self-organized cyber physical power system blockchain architecture and protocol. Int. J. Distributed Sens. Networks 14(10) (2018) - 2016
- [c1]Feng Zhai, Wei Cen, Jia Zhao, Peng Xu, Yi Sun:
A user peak load staggering potential assessment method based on three-demarcation analytic hierarchy process. SKIMA 2016: 262-266
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-01 21:39 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint