default search action
Puhan Zhang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j1]Yinfang Shi, Puhan Zhang, Zhaoyang Wang:
Extraction of Lilium davidii var. unicolor Planting Information Based on Deep Learning and Multi-Source Data. Sensors 24(5): 1543 (2024) - 2022
- [i6]Puhan Zhang, Sheng Zhang, Gia-Wei Chern:
Descriptors for Machine Learning Model of Generalized Force Field in Condensed Matter Systems. CoRR abs/2201.00798 (2022) - [i5]Yi-Hsuan Liu, Sheng Zhang, Puhan Zhang, Ting-Kuo Lee, Gia-Wei Chern:
Machine learning predictions for local electronic properties of disordered correlated electron systems. CoRR abs/2204.05967 (2022) - 2021
- [i4]Puhan Zhang, Gia-Wei Chern:
Arrested phase separation in double-exchange models: machine-learning enabled large-scale simulation. CoRR abs/2105.08221 (2021) - [i3]Sheng Zhang, Puhan Zhang, Gia-Wei Chern:
Anomalous phase separation and hidden coarsening of super-clusters in the Falicov-Kimball model. CoRR abs/2105.13304 (2021) - [i2]Puhan Zhang, Gia-Wei Chern:
Machine learning nonequilibrium electron forces for adiabatic spin dynamics. CoRR abs/2112.12124 (2021) - 2020
- [i1]Puhan Zhang, Preetha Saha, Gia-Wei Chern:
Machine learning dynamics of phase separation in correlated electron magnets. CoRR abs/2006.04205 (2020)
2010 – 2019
- 2018
- [c7]Shengwei Yi, Hongwei Wang, Yangyang Ma, Feng Xie, Puhan Zhang, Liqing Di:
A Safety-Security Assessment Approach for Communication-Based Train Control (CBTC) Systems Based on the Extended Fault Tree. ICCCN 2018: 1-5 - 2015
- [c6]Jinxin Ma, Tao Zhang, Puhan Zhang:
Enhancing fuzzing with a minimum set solver. ICACI 2015: 23-26 - [c5]Jinxin Ma, Tao Zhang, Puhan Zhang:
Enhancing symbolic execution method with a taint layer. ICACI 2015: 27-31 - 2014
- [c4]Puhan Zhang, Jianxiong Wu, Wang Xin, Zehui Wu:
Program Crash Analysis Based on Taint Analysis. 3PGCIC 2014: 492-498 - [c3]Jinxin Ma, Puhan Zhang, Guowei Dong, Shuai Shao, Jiangxiao Zhang:
TWalker: An efficient taint analysis tool. IAS 2014: 18-22 - [c2]Jinxin Ma, Guowei Dong, Puhan Zhang, Tao Guo:
SymWalker: Symbolic Execution in Routines of Binary Code. CIS 2014: 694-698 - [c1]Puhan Zhang, Jianxiong Wu, Wang Xin, Zehui Wu:
Decrypted data detection algorithm based on dynamic dataflow analysis. CITS 2014: 1-4
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-22 20:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint