default search action
Bing Zhou 0002
Person information
- affiliation: Sam Houston State University, Huntsville, TX, USA
- affiliation (former): University of Regina, Canada
Other persons with the same name
- Bing Zhou — disambiguation page
- Bing Zhou 0001 — IBM T. J. Watson Research Center, Yorktown Heights, NY, USA (and 3 more)
- Bing Zhou 0003 — Zhengzhou University, School of Information Engineering, Collaborative Innovation Center of Internet Healthcare, China (and 1 more)
- Bing Zhou 0004 — Trent University, Department of Mathematics, Peterborough, ON, Canada
- Bing Zhou 0005 — Texas A&M University, Department of Geography, TX, USA
Other persons with a similar name
- Zhou Bing
- Bing-Feng Zhou
- Bing-Hai Zhou (aka: Binghai Zhou, Bing-hai Zhou) — disambiguation page
- Bing-He Zhou
- Bing Bing Zhou
- Guo-Bing Zhou
- Xiangbing Zhou (aka: Xiang-bing Zhou)
- Yi Bing Zhou
- Zhangbing Zhou (aka: ZhangBing Zhou, Zhang Bing Zhou) — China University of Geosciences, Beijing, China (and 1 more)
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j14]Khushi Gupta, Cihan Varol, Bing Zhou:
Digital forensic analysis of discord on google chrome. Forensic Sci. Int. Digit. Investig. 44: 301479 (2023) - [c34]Damilola Oladimeji, Laura Garland, Jayanthi Ramamoorthy, Bing Zhou:
Ethical Hacking in Digital Forensics. IEEE Big Data 2023: 5539-5548 - [c33]Razaq Jinad, Khushi Gupta, Chukwuemeka Ihekweazu, Qingzhong Liu, Bing Zhou:
Detecting Web-Based Attacks: A Comparative Analysis of Machine Learning and BERT Transformer Approaches. IEA/AIE (2) 2023: 325-332 - [c32]Jayanthi Ramamoorthy, Narasimha K. Shashidhar, Bing Zhou:
Anomaly based malware threat detection on Linux Systems. TrustCom 2023: 1744-1750 - 2022
- [c31]Damilola Oladimeji, Bing Zhou:
Forensic Analysis of Amazon Alexa Echo Dot 4th Generation. IEEE Big Data 2022: 3053-3062 - [c30]Chandlor Ratcliffe, Biodoumoye George Bokolo, Damilola Oladimeji, Bing Zhou:
Detection of Anti-forensics and Malware Applications in Volatile Memory Acquisition. IEA/AIE 2022: 516-527 - 2021
- [j13]Doug Weeks, Bing Zhou:
Physical security design of a digital forensic lab. Int. J. Electron. Secur. Digit. Forensics 13(4): 418-444 (2021) - [c29]Todd Mason, Bing Zhou:
Digital Forensics Process of an Attack Vector in ICS environment. IEEE BigData 2021: 2532-2541 - 2020
- [c28]Selim Ozcan, Merve Astekin, Narasimha K. Shashidhar, Bing Zhou:
Centrality and Scalability Analysis on Distributed Graph of Large-Scale E-mail Dataset for Digital Forensics. IEEE BigData 2020: 2318-2327
2010 – 2019
- 2019
- [j12]Weiwei Li, Xiuyi Jia, Lu Wang, Bing Zhou:
Multi-objective attribute reduction in three-way decision-theoretic rough set model. Int. J. Approx. Reason. 105: 327-341 (2019) - [c27]Ashar Neyaz, Bing Zhou, Narasimha Karpoor:
Comparative Study of Wear-leveling in Solid-State Drive with NTFS File System. IEEE BigData 2019: 4294-4298 - [c26]Shinelle Hutchinson, Bing Zhou, Umit Karabiyik:
Are We Really Protected? An Investigation into the Play Protect Service. IEEE BigData 2019: 4997-5004 - [c25]Min Kyung An, Hyuk Cho, Bing Zhou, Lei Chen:
Minimum Latency Aggregation Scheduling in Internet of Things. ICNC 2019: 395-401 - 2018
- [j11]Hong Yu, Bing Zhou, Mingyao Deng, Feng Hu:
Tag recommendation method in folksonomy based on user tagging status. J. Intell. Inf. Syst. 50(3): 479-500 (2018) - [c24]Ahmet Furkan Aydogan, Bing Zhou:
Improving Database Security with Pixel-based Granular Encryption. IEEE BigData 2018: 2591-2596 - [c23]Bing Zhou, Hyuk Cho, Xin Zhang:
Scalable Implementations of Rough Set Algorithms: A Survey. IEA/AIE 2018: 648-660 - 2017
- [j10]Bing Zhou, Yang He:
Fast Circle Detection Using Spatial Decomposition of Hough Transform. Int. J. Pattern Recognit. Artif. Intell. 31(3): 1755006:1-1755006:22 (2017) - [c22]Joshua Sablatura, Bing Zhou:
Forensic database reconstruction. IEEE BigData 2017: 3700-3704 - [c21]Hong Yu, Zhihua Chang, Bing Zhou:
A Novel Three-Way Clustering Algorithm for Mixed-Type Data. ICBK 2017: 119-126 - [c20]Bing Zhou, Hyuk Cho, Adam Mansfield:
Robust Sensor Data Fusion Through Adaptive Threshold Learning. IEA/AIE (1) 2017: 277-282 - [c19]Lu Wang, Weiwei Li, Xiuyi Jia, Bing Zhou:
A Multi-objective Attribute Reduction Method in Decision-Theoretic Rough Set Model. KSEM 2017: 117-128 - 2016
- [j9]Yiyu Yao, Bing Zhou:
Two Bayesian approaches to rough sets. Eur. J. Oper. Res. 251(3): 904-917 (2016) - [j8]Xiuyi Jia, Lin Shang, Bing Zhou, Yiyu Yao:
Generalized attribute reduct in rough set theory. Knowl. Based Syst. 91: 204-218 (2016) - [j7]Franklin Leung, Bing Zhou:
Performance evaluation of Twitter datasets on SQL and NoSQL DBMS. Web Intell. 14(4): 275-286 (2016) - [c18]Qingzhong Liu, Andrew H. Sung, Bing Zhou, Mengyu Qiao:
Exposing Inpainting Forgery in JPEG Images under Recompression Attacks. ICMLA 2016: 164-169 - [c17]Raja Prasad Karuparthi, Bing Zhou:
Enhanced Approach to Detection of SQL Injection Attack. ICMLA 2016: 466-469 - [c16]Bing Zhou, Yiyu Yao, Qingzhong Liu:
Utilizing DTRS for Imbalanced Text Classification. IJCRS 2016: 219-228 - 2015
- [c15]Bing Zhou:
Using Vector Quantization of Hough Transform for Circle Detection. ICMLA 2015: 447-450 - [c14]Bing Zhou, Yiyu Yao:
Decision-Level Sensor-Fusion Based on DTRS. RSKT 2015: 321-332 - 2014
- [j6]Bing Zhou:
Multi-class decision-theoretic rough sets. Int. J. Approx. Reason. 55(1): 211-224 (2014) - [j5]Bing Zhou, Yiyu Yao, Jigang Luo:
Cost-sensitive three-way email spam filtering. J. Intell. Inf. Syst. 42(1): 19-45 (2014) - [c13]Bing Zhou, Yiyu Yao:
Feature Selection Based on Confirmation-Theoretic Rough Sets. RSCTC 2014: 181-188 - 2013
- [c12]Bing Zhou:
Applying rough set theory to information retrieval. CCECE 2013: 1-4 - [c11]Qingzhong Liu, Peter A. Cooper, Bing Zhou:
An improved approach to detecting content-aware scaling-based tampering in JPEG images. ChinaSIP 2013: 432-436 - [c10]Bing Zhou, Yiyu Yao:
Comparison of Two Models of Probabilistic Rough Sets. RSKT 2013: 121-132 - 2012
- [j4]Xiaohong Zhang, Bing Zhou, Peng Li:
A general frame for intuitionistic fuzzy rough sets. Inf. Sci. 216: 34-49 (2012) - [c9]Bing Zhou, Qingzhong Liu:
A Comparison Study of Cost-Sensitive Classifier Evaluations. Brain Informatics 2012: 360-371 - 2011
- [j3]Bing Zhou, Yiyu Yao:
In Search of Effective Granulization with DTRS for Ternary Classification. Int. J. Cogn. Informatics Nat. Intell. 5(3): 47-60 (2011) - [c8]Bing Zhou:
A New Formulation of Multi-category Decision-Theoretic Rough Sets. RSKT 2011: 514-522 - 2010
- [j2]Bing Zhou, Yiyu Yao:
Evaluating information retrieval system performance based on user preference. J. Intell. Inf. Syst. 34(3): 227-248 (2010) - [c7]Bing Zhou, Yiyu Yao:
In search for effective granularity with DTRS. IEEE ICCI 2010: 464-470 - [c6]Bing Zhou, Yiyu Yao, Jigang Luo:
A Three-Way Decision Approach to Email Spam Filtering. Canadian AI 2010: 28-39 - [c5]Yiyu Yao, Bing Zhou:
Naive Bayesian Rough Sets. RSKT 2010: 719-726
2000 – 2009
- 2008
- [j1]Bing Zhou, Yiyu Yao:
A Logic Approach to Granular Computing. Int. J. Cogn. Informatics Nat. Intell. 2(2): 63-79 (2008) - [c4]Yiyu Yao, Bing Zhou:
Micro and macro evaluation of classification rules. IEEE ICCI 2008: 441-448 - [c3]Bing Zhou, Yiyu Yao:
Evaluating Information Retrieval System Performance Based on Multi-grade Relevance. ISMIS 2008: 424-433 - 2007
- [c2]Yiyu Yao, Bing Zhou:
A Logic Language of Granular Computing. IEEE ICCI 2007: 178-185 - [c1]Yiyu Yao, Bing Zhou, Yaohua Chen:
Interpreting Low and High Order Rules: A Granular Computing Approach. RSEISP 2007: 371-380
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-28 23:36 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint