default search action
Lin Zhou 0006
Person information
- affiliation: Henan University, School of Artificial Intelligence, College of Computer and Information Engineering, Zhengzhou, China
- affiliation (PhD 2013): Northwestern Polytechnical University, Department of control theory and control engineering, China
Other persons with the same name
- Lin Zhou — disambiguation page
- Lin Zhou 0001 — Southeast University, School of Information Science and Engineering, Nanjing, China
- Lin Zhou 0002 — Beihang University, School of Cyber Science and Technology, China (and 2 more)
- Lin Zhou 0003 — University of Edinburgh, School of Engineering, Institute for Digital Communications, UK
- Lin Zhou 0004 — Chongqing University of Technology, College of Management, China
- Lin Zhou 0005 — Arizona State University, Tempe, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j23]Junwei Li, Baolin Xie, Yong Jin, Lin Zhou:
Generating method and application of basic probability assignment based on interval number distance and model reliability. Soft Comput. 28(3): 2353-2365 (2024) - [j22]Zhentao Hu, Lin Zhou, Lu Zhang, Yong Jin, Qian Wei:
A Range-Free Node Localization Method Based on MinMax Error Criterion for Sparse Anchors Wireless Sensor Networks. IEEE Trans. Veh. Technol. 73(6): 9182-9186 (2024) - 2023
- [j21]Zhentao Hu, Chaoyu Chen, Yong Jin, Lin Zhou, Qian Wei:
Hybrid-Field Channel Estimation for Extremely Large-Scale Massive MIMO System. IEEE Commun. Lett. 27(1): 303-307 (2023) - [c4]Congcong Cheng, Lin Zhou, Qian Wei, Yong Jin, Junfang Leng, Xinlong Ding:
An Improved DRL Algorithm for Reliable Path Planning. ICSPCC 2023: 1-6 - [c3]Lin Zhou, Junfang Leng, Meng Zhang, Zheng Zhao, Yongjing Huo, Jiawei Wu:
Air Target Threat Assessment Method Based on Variable Weight Cloud Bayesian Network. ICSPCC 2023: 1-6 - [c2]Lin Zhou, Meng Zhang, Weiwei Shuai, Zhentao Hu, Congcong Cheng, Jiawei Wu:
Air Target Threat Assessment and Prediction Based on Improved GM(1,1) Model. ICSPCC 2023: 1-6 - 2022
- [j20]Qiyang Xiao, Sen Li, Lin Zhou, Wentao Shi:
Improved Variational Mode Decomposition and CNN for Intelligent Rotating Machinery Fault Diagnosis. Entropy 24(7): 908 (2022) - [j19]Lin Zhou, Jiawei Wu, Qian Wei, Wentao Shi, Yong Jin:
Multi-Sensor Scheduling Method Based on Joint Risk Assessment with Variable Weight. Entropy 24(9): 1315 (2022) - [j18]Qian Wei, Peng Su, Lin Zhou, Wentao Shi:
Online Tracking of Maneuvering Target Trajectory Based on Chaotic Time Series Prediction. Entropy 24(11): 1668 (2022) - [j17]Yong Jin, Ruijie Guo, Lin Zhou, Zhentao Hu:
Secure Beamforming for IRS-Assisted Nonlinear SWIPT Systems With Full-Duplex User. IEEE Commun. Lett. 26(7): 1494-1498 (2022) - [j16]Wentao Shi, Dong Chen, Lin Zhou, Ke Bai, Yong Jin:
Sensor Selection Scheme considering Uncertainty Disturbance. J. Sensors 2022: 1-11 (2022) - [j15]Wei Yang, Zhentao Hu, Lin Zhou, Yong Jin:
Protein secondary structure prediction using a lightweight convolutional network and label distribution aware margin loss. Knowl. Based Syst. 237: 107771 (2022) - [j14]Ruijie Guo, Chunling Fu, Yong Jin, Zhentao Hu, Lin Zhou:
Robust Security Beamforming for SWIPT-Assisted Relay System with Channel Uncertainty. Sensors 22(1): 370 (2022) - [j13]Lin Zhou, Yong Jin, Han Wang, Zhentao Hu, Shuaipeng Zhao:
Robust DCF object tracking with adaptive spatial and temporal regularization based on target appearance variation. Signal Process. 195: 108463 (2022) - [j12]Yong Jin, Lin Zhou, Lu Zhang, Zhentao Hu, Jing Han:
A Novel Range-Free Node Localization Method for Wireless Sensor Networks. IEEE Wirel. Commun. Lett. 11(4): 688-692 (2022) - [c1]Yue Liu, Lin Zhou, Qian Wei, Benhui Zhao:
Sensor Management Based on Convex Optimization via PCRLB and Joint Interception Probability. IEEE SENSORS 2022: 1-4 - 2021
- [j11]Yong Jin, Zhentao Hu, Dongdong Xie, Guodong Wu, Lin Zhou:
Physical layer security transmission scheme based on artificial noise in cooperative SWIPT NOMA system. EURASIP J. Wirel. Commun. Netw. 2021(1): 144 (2021) - [j10]Yong Jin, Lin Zhou, Qian Wei, Ke Bai, Wang Chen, Jifang Li:
Tree-Based Multihop Routing Method for Energy Efficiency of Wireless Sensor Networks. J. Sensors 2021: 6671978:1-6671978:14 (2021) - [j9]Qian Wei, Ke Bai, Lin Zhou, Zhentao Hu, Yong Jin, Junwei Li:
A Cluster-Based Energy Optimization Algorithm in Wireless Sensor Networks with Mobile Sink. Sensors 21(7): 2523 (2021) - 2020
- [j8]Zhentao Hu, Dongdong Xie, Mingqi Jin, Lin Zhou, Jifang Li:
Relay Cooperative Beamforming Algorithm Based on Probabilistic Constraint in SWIPT Secrecy Networks. IEEE Access 8: 173999-174008 (2020) - [j7]Junwei Li, Baolin Xie, Yong Jin, Zhentao Hu, Lin Zhou:
Weighted Conflict Evidence Combination Method Based on Hellinger Distance and the Belief Entropy. IEEE Access 8: 225507-225521 (2020) - [j6]Zhentao Hu, Lin Zhou, Bing Jin, Hai-jiang Liu:
Applying Improved Convolutional Neural Network in Image Classification. Mob. Networks Appl. 25(1): 133-141 (2020) - [j5]Lin Zhou, Han Wang, Yong Jin, Zhentao Hu, Qian Wei, Junwei Li, Jifang Li:
Robust Visual Tracking Based on Adaptive Multi-Feature Fusion Using the Tracking Reliability Criterion. Sensors 20(24): 7165 (2020)
2010 – 2019
- 2019
- [j4]Lin Zhou, Yongjun Fang, Qian Wei, Yong Jin, Zhentao Hu:
LEACH-TLC: a strategy of reducing and uniform energy consumption based on target location constraint. IET Wirel. Sens. Syst. 9(6): 347-357 (2019) - 2018
- [j3]Zhentao Hu, Lin Zhou, Ya-nan Yang, Xianxing Liu, Yong Jin:
Anti-occlusion tracking algorithm of video target based on prediction and re-matching strategy. J. Vis. Commun. Image Represent. 57: 176-182 (2018) - [j2]Zhentao Hu, Chunling Fu, Lin Zhou, Zhen Guo:
Distributed Kalman filter based on Metropolis-Hastings sampling strategy. Mach. Vis. Appl. 29(6): 1033-1040 (2018) - 2017
- [j1]Lin Zhou, Xianxing Liu, Zhentao Hu, Yong Jin, Wentao Shi:
Joint estimation of state and system biases in non-linear system. IET Signal Process. 11(1): 10-16 (2017)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-12 22:56 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint