To seek and maintain full-time position that offers professional challenges utilizing interpersonal skills, excellent time management, and problem-solving skills using Graph theory, Mathematical Statistic with Python, and Few-shot Clustering in business and cybersecurity industrial area, such as Business Recommendation and Cybersecurity Analyst.
Few shot learning Applications:
Zhu, Jinting, et al. "A few-shot meta-learning based siamese neural network using entropy features for ransomware classification." Computers & Security 117 (2022): 102691.
Zhu, Jinting, et al. "Task-Aware Meta Learning-Based Siamese Neural Network for Classifying Control Flow Obfuscated Malware." Future Internet 15.6 (2023): 214.
Zhu J, Jang-Jaccard J, Watters PA. Multi-loss Siamese neural network with batch normalization layer for malware detection. IEEE Access. 2020 Sep 18;8:171542-50.
Zhu, Jinting and Jang-Jaccard, Julian and Welch, Ian and Sahaf, Harith AI and Camtepe, Seyit and Dunmore, Aeryn, Relation-Aware Based Siamese Denoising Autoencoder for Malware Few-Shot Classification. Available at SSRN: https://ssrn.com/abstract=4367408
Zhu, Jinting, et al. "A Ransomware Triage Approach using a Task Memory based on Meta-Transfer Learning Framework." arXiv preprint arXiv:2207.10242 (2022).
Graph Theory and Data Mining Applications:
Zhu, Jinting, et al. "Joint spectral clustering based on optimal graph and feature selection." Neural Processing Letters 53 (2021): 257-273.
Liu, T., Zhu, J., Zhou, J., Zhu, Y., & Zhu, X. (2019). Initialization-similarity clustering algorithm. Multimedia Tools and Applications, 78, 33279-33296.
Zhou, J., Liu, T., & Zhu, J. (2019). Weighted adjacent matrix for K-means clustering. Multimedia Tools and Applications, 78, 33415-33434.
Shallow Machine Learning Applications:
Li, H., Xu, J., Zhu, J., Tao, D., & Yu, Z. (2019). Top distance regularized projection and dictionary learning for person re-identification. Information Sciences, 502, 472-491.
Li, H., Zhu, J., & Tao, D. (2018). Asymmetric projection and dictionary learning with listwise and identity consistency constraints for person re-identification. IEEE Access, 6, 37977-37990.
Why does Few-shot learning and Meta-learning help the team be ahead of other competitors?
Please refer to these references published on the top-tier conference: