![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Haiping Zhang 0001
Person information
- unicode name: 张海平
- affiliation: Hangzhou Dianzi University, School of Computer Science, China
- affiliation: Hangzhou Dianzi University, Engineering College, China
Other persons with the same name
- Haiping Zhang — disambiguation page
- Haiping Zhang 0002
— Chinese Academy of Sciences, Institute of Geographic Sciences and Natural Resources Research, Beijing, China (and 2 more)
Refine list
![note](https://dblp.uni-trier.de./img/note-mark.dark.12x12.png)
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j14]Haiping Zhang, Haixiang Lin, Dongjing Wang, Dongyang Xu, Fuxing Zhou, Liming Guan, Dongjing Yu, Xujian Fang:
TSCANet: a two-stream context aggregation network for weakly-supervised temporal action localization. J. Supercomput. 81(1): 311 (2025) - 2024
- [j13]Dongjin Yu
, Gangming Guo
, Dongjing Wang
, Haiping Zhang, Bao Li, Guandong Xu, Shuiguang Deng:
Modeling dynamic spatio-temporal correlations and transitions with time window partitioning for traffic flow prediction. Expert Syst. Appl. 252: 124187 (2024) - [j12]Haiping Zhang, Zepeng Hu
, Dongjin Yu, Liming Guan, Xu Liu, Conghao Ma:
Multipath Attention and Adaptive Gating Network for Video Action Recognition. Neural Process. Lett. 56(2): 124 (2024) - [j11]Haiping Zhang, Fuxing Zhou, Dongjing Wang, Xinhao Zhang, Dongjin Yu, Liming Guan:
LGAFormer: transformer with local and global attention for action detection. J. Supercomput. 80(12): 17952-17979 (2024) - [c9]Haojiang Yao
, Dongjin Yu
, Dongjing Wang
, Haiping Zhang
, Shiyu Song
, Jiaming Li
:
Tag-Aware Recommendation Based on Attention Mechanism and Disentangled Graph Neural Network. ICWE 2024: 67-81 - [c8]Shuqin Li
, Xueli Jia
, Yadong Zhou
, Dong Xu
, Haiping Zhang
, Miao Hu
:
Entropy-Guided Exploration in AlphaZero: Enhancing MCTS with Information Gain for Strategic Decision Making. MLMI 2024: 151-156 - 2023
- [j10]Haiping Zhang, Xu Liu
, Dongjin Yu, Liming Guan, Dongjing Wang, Conghao Ma, Zepeng Hu:
Skeleton-based action recognition with multi-stream, multi-scale dilated spatial-temporal graph convolution network. Appl. Intell. 53(14): 17629-17643 (2023) - [j9]Haiping Zhang, Conghao Ma
, Dongjin Yu, Liming Guan, Dongjing Wang, Zepeng Hu, Xu Liu:
MTSCANet: Multi temporal resolution temporal semantic context aggregation network. IET Comput. Vis. 17(3): 366-378 (2023) - [j8]Haiping Zhang, Xinhao Zhang
, Dongjin Yu, Liming Guan, Dongjing Wang
, Fuxing Zhou, Wanjun Zhang
:
Multi-Modality Adaptive Feature Fusion Graph Convolutional Network for Skeleton-Based Action Recognition. Sensors 23(12): 5414 (2023) - [j7]Haiping Zhang, Fuxing Zhou
, Conghao Ma, Dongjing Wang
, Wanjun Zhang
:
MCMNET: Multi-Scale Context Modeling Network for Temporal Action Detection. Sensors 23(17): 7563 (2023) - 2020
- [c7]Zhenhui Chen, Haiyang Hu, Zhongjin Li, Xingchen Qi, Haiping Zhang, Hua Hu, Victor Chang:
Skeleton-based Action Recognition for Industrial Packing Process. IoTBDS 2020: 36-45 - [c6]Xinwei Zhu, Haiping Zhang, Liming Guan, Dongjin Yu, Zhongjin Li:
Conditional Normalizing Flow-based Generative Model for Zero-Shot Recognition. SEKE 2020: 238-243
2010 – 2019
- 2016
- [c5]Haiping Zhang, Gang Wang, Hongjun Qiu, Weitong Hu, Lanping Yu:
Tolerance-Based Group Scoring Scheme Promotes Cooperation in Public Goods Game. DASC/PiCom/DataCom/CyberSciTech 2016: 432-436 - 2014
- [j6]Xia Wang, Ming Xu, Yizhi Ren, Jian Xu, Haiping Zhang, Ning Zheng:
A Location Inferring Model Based on Tweets and Bilateral Follow Friends. J. Comput. 9(2): 315-321 (2014) - [j5]Tantan Xu, Ming Xu, Yizhi Ren, Jian Xu, Haiping Zhang, Ning Zheng:
A File Fragment Classification Method Based on Grayscale Image. J. Comput. 9(8): 1863-1870 (2014) - [j4]Ming Xu, Jun Yao, Yizhi Ren, Jian Xu, Haiping Zhang, Ning Zheng, Shiyue Ling:
A Reconstructing Android User Behavior Approach based on YAFFS2 and SQLite. J. Comput. 9(10): 2294-2302 (2014) - [j3]Ming Xu, Xiaowei Xu, Jian Xu, Yizhi Ren, Haiping Zhang, Ning Zheng:
A Forensic Analysis Method for Redis Database based on RDB and AOF File. J. Comput. 9(11): 2538-2544 (2014) - 2013
- [j2]Ming Xu, Xue Yang, Beibei Wu, Jun Yao, Haiping Zhang, Jian Xu, Ning Zheng:
A metadata-based method for recovering files and file traces from YAFFS2. Digit. Investig. 10(1): 62-72 (2013) - [j1]Ming Xu, Lingfei Wu, Shuhui Qi, Jian Xu, Haiping Zhang, Yizhi Ren, Ning Zheng:
A similarity metric method of obfuscated malware using function-call graph. J. Comput. Virol. Hacking Tech. 9(1): 35-47 (2013) - [c4]Beibei Wu, Ming Xu, Haiping Zhang, Jian Xu, Yizhi Ren, Ning Zheng:
A Recovery Approach for SQLite History Recorders from YAFFS2. ICT-EurAsia 2013: 295-299 - [c3]Fei Kong, Ming Xu, Yizhi Ren, Jian Xu, Haiping Zhang, Ning Zheng:
A Webmail Reconstructing Method from Windows XP Memory Dumps. MUE 2013: 211-217 - 2012
- [c2]Haiping Zhang, Zhenzhi Yu, Ming Xu, Yueling Shi:
An Improved Method to Building a Score Lexicon for Chinese Sentiment Analysis. SKG 2012: 241-244 - 2010
- [c1]Shanhu Shang, Ning Zheng, Jian Xu, Ming Xu, Haiping Zhang:
Detecting malware variants via function-call graph similarity. MALWARE 2010: 113-120
Coauthor Index
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-15 01:15 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint