


default search action
Zhaohui Zhang 0001
Person information
Other persons with the same name
- Zhaohui Zhang — disambiguation page
- Zhaohui Zhang 0002
![0000-0003-0827-4797 [0000-0003-0827-4797]](https://dblp.dagstuhl.de/img/orcid-mark.12x12.png)
- Zhaohui Zhang 0003
![0000-0003-3041-7600 [0000-0003-3041-7600]](https://dblp.dagstuhl.de/img/orcid-mark.12x12.png)
- Zhaohui Zhang 0004
![0009-0001-7737-7274 [0009-0001-7737-7274]](https://dblp.dagstuhl.de/img/orcid-mark.12x12.png)
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
[j21]Zhaohui Zhang
, Ziming Wei, Lina Ma:
UBRMTC: User Behavior Recognition Model With Transaction Character. IEEE Trans. Comput. Soc. Syst. 11(2): 1589-1601 (2024)
[c19]Sen Zhang, Lili Xiao
, Xin Luo
, Zhaohui Zhang
, Pengwei Wang
:
A Cost-Effective Data Placement Strategy Based on Battle Royale Optimization in Multi-cloud Edge Environments. ICA3PP (2) 2024: 296-306
[c18]Zhaohui Zhang
, Pei Zhang, Fujuan Xu, Yifei Tang, Dongxue Zhang, Pengwei Wang:
A Big Data Drilling Method for Value Assessment of Leakage Data. WISE (1) 2024: 148-158- 2023
[j20]Zhaohui Zhang, Siting Huang, Chaochao Hu, Pengwei Wang:
HGCAN: Heterogeneous Graph Completion Method Based on Attribute Neighborhood. Comput. Informatics 42(6): 1281-1304 (2023)
[j19]Zhaohui Zhang
, Pei Zhang, Peng Zhang, Fujuan Xu, Chaochao Hu, Pengwei Wang:
A Dynamic Drilling Sampling Method and Evaluation Model for Big Streaming Data. Int. J. Softw. Eng. Knowl. Eng. 33(11&12): 1725-1748 (2023)
[j18]Pengwei Wang
, Zhen Chen, MengChu Zhou
, Zhaohui Zhang
, Abdullah Abusorrah
, Ahmed Chiheb Ammari
:
Cost-Effective and Latency-Minimized Data Placement Strategy for Spatial Crowdsourcing in Multi-Cloud Environment. IEEE Trans. Cloud Comput. 11(1): 868-878 (2023)
[c17]Hengdi Huang, Pengwei Wang, Zhaohui Zhang, Qin Zhao:
A Spatio-Temporal Attention-Based GCN for Anti-money Laundering Transaction Detection. ADMA (5) 2023: 634-648
[c16]Zekun Hu, Pengwei Wang, Peihai Zhao, Zhaohui Zhang:
A Dichotomous Repair-Based Load-Balanced Task Allocation Strategy in Cloud-Edge Environment. CollaborateCom (1) 2023: 128-148
[c15]Zhilian Zhang, Pengwei Wang, Zhaohui Zhang:
A Budget-constrained Service Deployment Strategy based on Cost Allocation in Cloud-Edge Environment. ICPADS 2023: 2604-2611
[c14]Peng Zhang, Zhaohui Zhang, Chaochao Hu, Pengwei Wang:
A Dynamic Drilling Sampling Method and Evaluation Model for Large-Scale Streaming Data. SEKE 2023: 437-442
[c13]Zhaohui Zhang
, Yifei Tang, Peng Zhang, Pei Zhang, Dongxue Zhang, Pengwei Wang:
An Adaptive Drilling Sampling Method and Evaluation Model for Large-Scale Streaming Data. WISE 2023: 813-825- 2022
[j17]Zhaohui Zhang, Jiawei Hu, Lina Ma, Ruoxuan Pei, Pengwei Wang:
BVFB: Training Behavior Verification Mechanism for Secure Blockchain-Based Federated Learning. Comput. Informatics 41(6): 1401-1424 (2022)
[j16]Pengwei Wang, Yuying Zhao, Hengdi Huang, Zhaohui Zhang:
Temperature Matrix-Based Data Placement Optimization in Edge Computing Environment. Comput. Informatics 41(6): 1465-1490 (2022)- 2021
[j15]Lizhi Wang, Zhaohui Zhang, Xiaobo Zhang, Xinxin Zhou, Pengwei Wang, Yongjun Zheng
:
Chapter One - A Deep-forest based approach for detecting fraudulent online transaction. Adv. Comput. 120: 1-38 (2021)
[j14]Xiao Liu, Zhaohui Zhang, Ziming Wei, Pengwei Wang:
Smooth Intervention Model of Individual Interactive Behavior. Int. J. Softw. Informatics 11(4): 453-472 (2021)
[c12]Pengwei Wang, Yi Wei, Zhaohui Zhang:
Optimizing Data Placement in Multi-cloud Environments Considering Data Temperature. ICAIS (2) 2021: 167-179
[c11]Pengwei Wang, Yajun Zhao, Zhaohui Zhang:
Joint Optimization of Data Caching and Task Scheduling based on Information Entropy for Mobile Edge Computing. ISPA/BDCloud/SocialCom/SustainCom 2021: 460-467
[c10]Yuying Zhao, Pengwei Wang, Hengdi Huang, Zhaohui Zhang:
Temperature Matrix-Based Data Placement Using Improved Hungarian Algorithm in Edge Computing Environments. PDCAT 2021: 237-248- 2020
[j13]Zhaohui Zhang
, Ligong Chen
, Qiuwen Liu
, Pengwei Wang
:
A Fraud Detection Method for Low-Frequency Transaction. IEEE Access 8: 25210-25220 (2020)
[j12]Pengwei Wang
, Yinghui Lei
, Promise Ricardo Agbedanu
, Zhaohui Zhang
:
Makespan-Driven Workflow Scheduling in Clouds Using Immune-Based PSO Algorithm. IEEE Access 8: 29281-29290 (2020)
[j11]Pengwei Wang, Caihui Zhao, Wenqiang Liu, Zhen Chen, Zhaohui Zhang:
Optimizing Data Placement for Cost Effective and High Available Multi-Cloud Storage. Comput. Informatics 39(1): 51-82 (2020)
[j10]Mian Huang, Lizhi Wang, Zhaohui Zhang:
Improved Deep Forest Mode for Detection of Fraudulent Online Transaction. Comput. Informatics 39(5): 1082-1098 (2020)
[j9]Wenqiang Liu, Pengwei Wang
, Ying Meng, Caihui Zhao, Zhaohui Zhang:
Cloud spot instance price prediction using k NN regression. Hum. centric Comput. Inf. Sci. 10: 34 (2020)
[j8]Zhaohui Zhang
, Lijun Yang, Ligong Chen, Qiuwen Liu, Ying Meng, Pengwei Wang, Maozhen Li:
A generative adversarial network-based method for generating negative financial samples. Int. J. Distributed Sens. Networks 16(2) (2020)
[j7]Pengwei Wang, Wanjun Zhou, Caihui Zhao, Yinghui Lei, Zhaohui Zhang:
A dynamic programming-based approach for cloud instance type selection and optimisation. Int. J. Inf. Technol. Manag. 19(4): 358-375 (2020)
[j6]Pengwei Wang
, Caihui Zhao, Yi Wei, Dong Wang
, Zhaohui Zhang
:
An Adaptive Data Placement Architecture in Multicloud Environments. Sci. Program. 2020: 1704258:1-1704258:12 (2020)
[j5]Zhaohui Zhang
, Qiuwen Liu
, Ligong Chen, Pengwei Wang
:
A Peak Prediction Method for Subflow in Hybrid Data Flow. Sci. Program. 2020: 2548351:1-2548351:13 (2020)
[c9]Pengwei Wang, Zhen Chen, Zhaohui Zhang:
Suitability-based Task Assignment in Crowdsourcing Markets. SCC 2020: 361-369
2010 – 2019
- 2019
[j4]Wenqiang Liu
, Pengwei Wang
, Ying Meng, Qin Zhao
, Caihui Zhao, Zhaohui Zhang:
A Novel Model for Optimizing Selection of Cloud Instance Types. IEEE Access 7: 120508-120521 (2019)
[j3]Pengwei Wang
, Yujun Luo, Zhen Chen, Lianghua He, Zhaohui Zhang:
Orientation Analysis for Chinese News Based on Word Embedding and Syntax Rules. IEEE Access 7: 159888-159898 (2019)
[j2]Zhaohui Zhang
, Lina Ge, Pengwei Wang
, Xinxin Zhou:
Behavior Reconstruction Models for Large-scale Network Service Systems. Peer-to-Peer Netw. Appl. 12(2): 502-513 (2019)
[c8]Ligong Chen, Zhaohui Zhang, Qiuwen Liu, Lijun Yang, Ying Meng, Pengwei Wang:
A method for online transaction fraud detection based on individual behavior. ACM TUR-C 2019: 119:1-119:8
[c7]Ying Meng, Zhaohui Zhang, Wenqiang Liu, Ligong Chen, Qiuwen Liu, Lijun Yang, Pengwei Wang:
A novel method based on entity relationship for online transaction fraud detection. ACM TUR-C 2019: 121:1-121:10
[c6]Xiaobo Zhang, Xinxin Zhou, Zhaohui Zhang, Lizhi Wang, Pengwei Wang:
A Novel Method to Improve Hit Rate for Big Data Quick Reading. AIAM (IEEE) 2019: 39-43
[c5]Wenqiang Liu, Pengwei Wang, Ying Meng, Guobing Zou, Zhaohui Zhang:
A Novel Algorithm for Optimizing Selection of Cloud Instance Types in Multi-Cloud Environment. ICPADS 2019: 167-170
[c4]Xinxin Zhou, Zhaohui Zhang, Lizhi Wang, Pengwei Wang:
A Model Based on Siamese Neural Network for Online Transaction Fraud Detection. IJCNN 2019: 1-7- 2018
[j1]Zhaohui Zhang
, Xinxin Zhou, Xiaobo Zhang, Lizhi Wang, Pengwei Wang
:
A Model Based on Convolutional Neural Network for Online Transaction Fraud Detection. Secur. Commun. Networks 2018: 5680264:1-5680264:9 (2018)
[c3]Haijian Wang, Zhaohui Zhang, Pengwei Wang:
A Situation Analysis Method for Specific Domain Based on Multi-source Data Fusion. ICIC (1) 2018: 160-171
[c2]Pengwei Wang
, Caihui Zhao, Zhaohui Zhang:
An ant colony algorithm-based approach for cost-effective data hosting with high availability in multi-cloud environments. ICNSC 2018: 1-6- 2017
[c1]Tianyuan Zhuang, Pengwei Wang
, Yaying Zhang, Zhaohui Zhang:
A Novel Method for Open Relation Extraction from Public Announcements of Chinese Listed Companies. CBD 2017: 200-205
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-11-22 01:08 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







