Alert button
Picture for Fengfeng Zhou

Fengfeng Zhou

Alert button

Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education, Jilin University, Changchun, China, College of Computer Science and Technology, Jilin University, Changchun, China, Corresponding Authors

AMPCliff: quantitative definition and benchmarking of activity cliffs in antimicrobial peptides

Add code
Bookmark button
Alert button
Apr 15, 2024
Kewei Li, Yuqian Wu, Yutong Guo, Yinheng Li, Yusi Fan, Ruochi Zhang, Lan Huang, Fengfeng Zhou

Viaarxiv icon

PepHarmony: A Multi-View Contrastive Learning Framework for Integrated Sequence and Structure-Based Peptide Encoding

Add code
Bookmark button
Alert button
Jan 21, 2024
Ruochi Zhang, Haoran Wu, Chang Liu, Huaping Li, Yuqian Wu, Kewei Li, Yifan Wang, Yifan Deng, Jiahui Chen, Fengfeng Zhou, Xin Gao

Viaarxiv icon

PepLand: a large-scale pre-trained peptide representation model for a comprehensive landscape of both canonical and non-canonical amino acids

Add code
Bookmark button
Alert button
Nov 08, 2023
Ruochi Zhang, Haoran Wu, Yuting Xiu, Kewei Li, Ningning Chen, Yu Wang, Yan Wang, Xin Gao, Fengfeng Zhou

Viaarxiv icon

An FEA surrogate model with Boundary Oriented Graph Embedding approach

Add code
Bookmark button
Alert button
Aug 30, 2021
Xingyu Fu, Fengfeng Zhou, Dheeraj Peddireddy, Zhengyang Kang, Martin Byung-Guk Jun, Vaneet Aggarwal

Figure 1 for An FEA surrogate model with Boundary Oriented Graph Embedding approach
Figure 2 for An FEA surrogate model with Boundary Oriented Graph Embedding approach
Figure 3 for An FEA surrogate model with Boundary Oriented Graph Embedding approach
Figure 4 for An FEA surrogate model with Boundary Oriented Graph Embedding approach
Viaarxiv icon

Heuristic Black-box Adversarial Attacks on Video Recognition Models

Add code
Bookmark button
Alert button
Nov 21, 2019
Zhipeng Wei, Jingjing Chen, Xingxing Wei, Linxi Jiang, Tat-Seng Chua, Fengfeng Zhou, Yu-Gang Jiang

Figure 1 for Heuristic Black-box Adversarial Attacks on Video Recognition Models
Figure 2 for Heuristic Black-box Adversarial Attacks on Video Recognition Models
Figure 3 for Heuristic Black-box Adversarial Attacks on Video Recognition Models
Figure 4 for Heuristic Black-box Adversarial Attacks on Video Recognition Models
Viaarxiv icon