


default search action
Yanzhen Qu
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2025
- [j6]Tongzhijun Zhu, Ying Lin, Yanzhen Qu, Zediao Liu, Yayu Luo, Tenglong Mao, Ziyi Chen:
Federated learning with empirical insights: Leveraging gradient historical experiences for performance fairness. Pervasive Mob. Comput. 110: 102061 (2025) - 2024
- [j5]Kina Tatchukova
, Yanzhen Qu
:
Restricting the Spurious Growth of Knowledge Graphs by Using Ontology Graphs. IEEE Access 12: 12797-12807 (2024) - 2023
- [j4]Mazen Alkhatib
, Yanzhen Qu
, Richard Cai, Ricardo Unglaub, Richard Ritter:
Real Time Virtual Laboratory Solution Prototype and Evaluation for Online Engineering Degree Programs. IEEE Access 11: 130508-130516 (2023) - 2020
- [j3]Cheng-Jun Zhang
, Denghui Xia, Chao Zheng, Jianyong Wei, Yu Cui, Yanzhen Qu, Fangzhou Liao:
Automatic Identification of Coronary Arteries in Coronary Computed Tomographic Angiography. IEEE Access 8: 65566-65572 (2020) - 2014
- [j2]Wei Xiong, Hanping Hu
, Naixue Xiong, Laurence T. Yang, Wen-Chih Peng, Xiaofei Wang, Yanzhen Qu:
Anomaly secure detection methods by analyzing dynamic characteristics of the network traffic in cloud communications. Inf. Sci. 258: 403-415 (2014) - 2013
- [j1]Neal N. Xiong, Hongju Cheng
, Sajid Hussain, Yanzhen Qu:
Fault-Tolerant and Ubiquitous Computing in Sensor Networks. Int. J. Distributed Sens. Networks 9 (2013)
Conference and Workshop Papers
- 2024
- [c24]Yanzhen Qu, Daniel Letort, Howard Evans, Noura Abbas, Richard Cai, Mazen Haj-Hussein, Anastasia Biggs, Janet Durgin:
Unlocking Learning Potential: Generative AI Chatbots as Study Partners in Online BS in Computer Science Degree Program. FIE 2024: 1-8 - 2022
- [c23]Ihsan Said, Yanzhen Qu:
A Study on the Performance Comparison of Five Popular Machine Learning Models Applied for Loan Risk Prediction. CSCI 2022: 670-676 - [c22]Edwin Arrey Agbor, Yanzhen Qu:
Creating a Dataset Used for Applying Machine Learning Techniques to Accurately Forecast the Energy Cost in Home-Based Small Businesses. CSCI 2022: 677-683 - [c21]James Merrill, Yanzhen Qu:
Qualitatively Evaluating a Four-Phase Process for Managing Solution of the United States' Biometric Identity Repository. CSCI 2022: 1004-1009 - [c20]Gregory Vsevolozhsky, Yanzhen Qu:
A Process Model for Ensuring Diffusion and Adhesion of Cybersecurity Innovations in Software Development Organizations. CSCI 2022: 1872-1878 - [c19]Yanzhen Qu, Richard Cai, Ricardo Unglaub:
An Effective Systematic Approach to Migrate a Bachelor of Science in Computer Engineering Degree Program to Online Modality. FIE 2022: 1-6 - 2021
- [c18]Toby Houchens, Yanzhen Qu:
Measuring the Effectiveness of Investment in Security Treatments through a Security ROI Model. CSCI 2021: 722-727 - [c17]Yanzhen Qu, Adam English, Brace Hannon:
Quantifying the Impact of Vulnerabilities of the Components of an Information System towards the Composite Rise Exposure. CSCI 2021: 788-793 - [c16]Yanzhen Qu, Olanrewaju Ogunkunle:
Enhancing the Intelligence of the Adaptive Learning Software through an AI assisted Data Analytics on Students Learning Attributes with Unequal Weight. FIE 2021: 1-6 - 2019
- [c15]Yanzhen Qu, Richard Cai, Mazen Haj-Hussein:
Research and Practice of Applying Adaptive Learning in Computer Science and IT Degree Programs. FIE 2019: 1-8 - 2018
- [c14]Yanzhen Qu, Anthony Kutscher:
Apply Data Analytics to Schedule Best-suited Classes for Students with Different Academic Histories. FIE 2018: 1-7 - 2017
- [c13]Kyle Morton, Yanzhen Qu, Marilyn Carroll:
An Affective Computing and Fuzzy Logic Framework to Recognize Affect for Cloud-based E-Learning Environment Using Emoticons. ICCCS (1) 2017: 288-299 - 2016
- [c12]Yanzhen Qu, Philip Chan:
Assessing Vulnerabilities in Bluetooth Low Energy (BLE) Wireless Network Based IoT Systems. BigDataSecurity/HPSC/IDS 2016: 42-48 - [c11]Mikayla Cohen, Yanzhen Qu:
An Efficient Hierarchical Comparison Mechanism for Cloud-Based Heterogeneous Product Lifecycle Management Systems. ICCCS (1) 2016: 217-228 - 2015
- [c10]Kyle Morton
, Yanzhen Qu:
A Feedback Effectiveness Oriented Math Word Problem E-Tutor for E-Learning Environment. ICALT 2015: 301-302 - 2014
- [c9]Kelly Hughes, Yanzhen Qu:
Performance Measures of Behavior-Based Signatures: An Anti-malware Solution for Platforms with Limited Computing Resource. ARES 2014: 303-309 - 2013
- [c8]Annie Shebanow, Bo Ingvar Sandén, Yanzhen Qu:
Let's Trade Futures! a Novel Approach for Cloud Computing Resource Planning and Management. SOSE 2013: 145-149 - [c7]Yanzhen Qu, Kelly Hughes:
Detecting metamorphic malware by using behavior-based aggregated signature. WorldCIS 2013: 13-18 - 2012
- [c6]Yanzhen Qu, Naixue Xiong:
RFH: A Resilient, Fault-Tolerant and High-Efficient Replication Algorithm for Distributed Cloud Storage. ICPP 2012: 520-529 - [c5]Kelly Hughes, Yanzhen Qu:
A generic cyber attack response resource risk assessment model. ISI 2012: 183 - [c4]Bjorn Johnson, Yanzhen Qu:
A Holistic Model for Making Cloud Migration Decision: A Consideration of Security, Architecture and Business Economics. ISPA 2012: 435-441 - 2011
- [c3]Yanzhen Qu:
How to Secure the Cloud Based Enterprise Information System - - A Case Study on Security Education as the Critical Foundation for a MS-EIS Program. World Conference on Information Security Education 2011: 131-139 - [c2]Weiwen Yang, Yanzhen Qu, Bo Ingvar Sandén:
Improving the performance of the enterprise information system via optimal scheduling. IRI 2011: 337-341 - [c1]Yanzhen Qu, Weiwen Yang:
Improving the security of the distributed enterprise data warehouse system. ISI 2011: 227
Informal and Other Publications
- 2025
- [i1]Prakash Suman, Yanzhen Qu:
A Lightweight Deep Learning Model for Automatic Modulation Classification using Dual Path Deep Residual Shrinkage Network. CoRR abs/2507.04586 (2025)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-08-16 20:30 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint