default search action
Yuting Zhu
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j27]Xianming Zhao, Yuting Zhu, Hongtao Zhang:
User-Centric Joint Beamforming for Multi-Antenna UAV Networks With 3D Blockage Effects. IEEE Access 12: 103450-103460 (2024) - [j26]Xinyu Cao, Yuting Zhu:
The Power of Commitment in Group Search. Mark. Sci. 43(1): 213-228 (2024) - [j25]Yuting Zhu, Giuseppe Grieco, Jiarong Lin, Marcos Portabella, Xiaoqing Wang:
On the Use of Azimuth Cutoff for Sea Surface Wind Speed Retrieval From SAR. IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. 17: 10367-10379 (2024) - [j24]Ruochen Tai, Liyong Lin, Yuting Zhu, Rong Su:
Synthesis of Distributed Covert Sensor-Actuator Attackers. IEEE Trans. Autom. Control. 69(8): 4942-4957 (2024) - [j23]Yuting Zhu, Zhiyu Xu, Hongtao Zhang:
Intelligent Omni-Surfaces Aided Cell-Free Networks: Cooperative Beamforming With Coupled Phase-Shift. IEEE Trans. Veh. Technol. 73(9): 13991-13996 (2024) - [c23]Ruizhong Du, Yidan Li, Mingyue Li, Jinjia Peng, Yuting Zhu, Caixia Ma:
Multi-attribute Semantic Adversarial Attack Based on Cross-layer Interpolation for Face Recognition. IJCNN 2024: 1-9 - [c22]Jinchen Gu, Yaoxuan Wang, Caiwen Jiang, Jiameng Liu, Yuting Zhu, Mengda Jiang, Zhaoyan Wang, Feihong Liu, Hao Wu, Dinggang Shen:
Auditory Fiber Bundle Parcellation using Text-Prompted Decomposition Networks. ISBI 2024: 1-5 - [c21]Mingyue Li, Yuting Zhu, Ruizhong Du, Chunfu Jia:
Secure Verification Encrypted Image Retrieval Scheme with Addition Homomorphic Bitmap Index. ICMR 2024: 193-201 - 2023
- [j22]Ruochen Tai, Liyong Lin, Yuting Zhu, Rong Su:
Privacy-preserving co-synthesis against sensor-actuator eavesdropping intruder. Autom. 150: 110860 (2023) - [j21]Wenyu Zhang, Yuting Zhu:
The Probabilistic Dual Hesitant Fuzzy Multi-Attribute Decision-Making Method Based on Cumulative Prospect Theory and Its Application. Axioms 12(10): 925 (2023) - [j20]Yuting Zhu, Liyong Lin, Ruochen Tai, Rong Su:
Overview of networked supervisory control with imperfect communication channels. Discret. Event Dyn. Syst. 33(1): 25-61 (2023) - [j19]Zhanjun Tang, Xiaobing Shi, Huayu Zou, Yuting Zhu, Yushi Yang, Yajia Zhang, Jianfeng He:
Fault Diagnosis of Wind Turbine Generators Based on Stacking Integration Algorithm and Adaptive Threshold. Sensors 23(13): 6198 (2023) - [j18]Yushi Yang, Zhanjun Tang, Zhiyuan Li, Jianfeng He, Xiaobing Shi, Yuting Zhu:
Dual-Path Information Fusion and Twin Attention-Driven Global Modeling for Solar Irradiance Prediction. Sensors 23(17): 7469 (2023) - [j17]Ruochen Tai, Liyong Lin, Yuting Zhu, Rong Su:
Synthesis of the Supremal Covert Attacker Against Unknown Supervisors by Using Observations. IEEE Trans. Autom. Control. 68(6): 3453-3468 (2023) - [j16]Yonghua Zhang, Hongxu Jiang, Yuting Zhu, Runhua Zhang, Yongxiang Cao, Chenhui Zhu, Wei Wang, Dong Dong, Xiaobin Li:
LOCP: Latency-optimized channel pruning for CNN inference acceleration on GPUs. J. Supercomput. 79(13): 14313-14341 (2023) - [j15]Yuting Zhu, Danyang Wu, Hongtao Zhang:
Tunable SRS-Aware Robust Coordinated Beamforming Design With Channel Aging. IEEE Trans. Veh. Technol. 72(12): 16754-16759 (2023) - [i13]Yuting Zhu, Qiang He, Yudong Yao, Yueyang Teng:
Self-supervised Noise2noise Method Utilizing Corrupted Images with a Modular Network for LDCT Denoising. CoRR abs/2308.06746 (2023) - 2022
- [j14]Ruochen Tai, Liyong Lin, Yuting Zhu, Rong Su:
A new modeling framework for networked discrete-event systems. Autom. 138: 110139 (2022) - [j13]Liyong Lin, Yuting Zhu, Ruochen Tai, Simon Ware, Rong Su:
Networked supervisor synthesis against lossy channels with bounded network delays as non-networked synthesis. Autom. 142: 110279 (2022) - [j12]Yuting Zhu, Lihong Long, Jinjie Wang, Jingwen Yan, Xiaoqing Wang:
Road Segmentation from High-Fidelity Remote Sensing Images using a Context Information Capture Network. Cogn. Comput. 14(2): 780-793 (2022) - [j11]Liyong Lin, Ruochen Tai, Yuting Zhu, Rong Su:
Observation-assisted heuristic synthesis of covert attackers against unknown supervisors. Discret. Event Dyn. Syst. 32(3): 495-520 (2022) - [j10]Yuting Zhu, Jianghui Li, Qiong Wang, Chunhua Yu, Lan Tang, Yechao Bai:
Intrusion detection by optical fiber in windy conditions. IEICE Electron. Express 19(8): 20220098 (2022) - [j9]Yuting Zhu, Tim Giffney, Kean C. Aw:
A Dielectric Elastomer-Based Multimodal Capacitive Sensor. Sensors 22(2): 622 (2022) - [c20]Yuting Zhu, Liyong Lin, Ruochen Tai, Rong Su:
Distributed Control of Timed Networked System against Communication Delays. ICCA 2022: 1008-1013 - [c19]Yuting Zhu, Hongxu Jiang, Runhua Zhang, Yonghua Zhang, Dong Dong:
CNNBooster: Accelerating CNN Inference with Latency-aware Channel Pruning for GPU. ISPA/BDCloud/SocialCom/SustainCom 2022: 355-362 - [c18]Yuting Zhu, Mingkai Tao, Lingxi Guo, Xiaoqing Wang:
Tire pattern classification based on ConvNeXt Network. VCIP 2022: 1-5 - [i12]Ruochen Tai, Liyong Lin, Yuting Zhu, Rong Su:
Synthesis of the Supremal Covert Attacker Against Unknown Supervisors by Using Observations. CoRR abs/2203.08360 (2022) - 2021
- [j8]Yuting Zhu, Rongqing Pan, Yushun Tan, Shumin Fei:
Adaptive Event-Based Non-Fragile Output Pinning Synchronization Control for Complex Networks With Random Saturations and Cyber-Attacks. IEEE Access 9: 122712-122722 (2021) - [j7]Ying Tian, Yuting Zhu:
Quality Variable Prediction for Dynamic Process Based on Adaptive Principal Component Regression with Selective Integration of Multiple Local Models. KSII Trans. Internet Inf. Syst. 15(4): 1193-1215 (2021) - [j6]T. Tony Ke, Yuting Zhu:
Cheap Talk on Freelance Platforms. Manag. Sci. 67(9): 5901-5920 (2021) - [j5]Yuting Zhu, Zili Liang, Jingwen Yan, Gao Chen, Xiaoqing Wang:
E-D-Net: Automatic Building Extraction From High-Resolution Aerial Images With Boundary Information. IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. 14: 4595-4606 (2021) - [j4]Yanfang Fu, Yuting Zhu, Zijian Cao, Zhiqiang Du, Guochuang Yan, Jiang Du:
Multi-Controller Load Balancing Algorithm for Test Network Based on IACO. Symmetry 13(10): 1901 (2021) - [c17]Liyong Lin, Ruochen Tai, Yuting Zhu, Rong Su:
Heuristic Synthesis of Covert Attackers Against Unknown Supervisors. CDC 2021: 7003-7008 - [c16]Jingwen Yan, Yuting Zhu, Zili Liang, Yisheng Zhu, Keer Wu, Zhinan Lin:
Tire Pattern Classification Based On Few-Shot Learning. ICME Workshops 2021: 1-7 - [i11]Ruochen Tai, Liyong Lin, Yuting Zhu, Rong Su:
Synthesis of Covert Sensor Attacks in Networked Discrete-Event Systems with Non-FIFO Channels. CoRR abs/2103.07132 (2021) - [i10]Liyong Lin, Ruochen Tai, Yuting Zhu, Rong Su:
Observation-Assisted Heuristic Synthesis of Covert Attackers Against Unknown Supervisors. CoRR abs/2103.11197 (2021) - [i9]Liyong Lin, Yuting Zhu, Ruochen Tai, Simon Ware, Rong Su:
Networked Supervisor Synthesis Against Lossy Channels with Bounded Network Delays as Non-Networked Synthesis. CoRR abs/2103.11273 (2021) - [i8]Ruochen Tai, Liyong Lin, Yuting Zhu, Rong Su:
Privacy-Preserving Supervisory Control of Discrete-Event Systems via Co-Synthesis of Edit Function and Supervisor for Opacity Enforcement and Requirement Satisfaction. CoRR abs/2104.04299 (2021) - [i7]Ruochen Tai, Liyong Lin, Yuting Zhu, Rong Su:
Privacy-Preserving Co-synthesis Against Sensor-Actuator Eavesdropping Intruder. CoRR abs/2104.14919 (2021) - [i6]Ruochen Tai, Liyong Lin, Yuting Zhu, Rong Su:
Synthesis of Maximally Permissive Covert Attackers Against Unknown Supervisors by Using Observations. CoRR abs/2106.12268 (2021) - 2020
- [j3]Liyong Lin, Yuting Zhu, Rong Su:
Synthesis of covert actuator attackers for free. Discret. Event Dyn. Syst. 30(4): 561-577 (2020) - [j2]FaJun Yang, Yan Qiao, Kaizhou Gao, Naiqi Wu, Yuting Zhu, Ian Ware Simon, Rong Su:
Efficient Approach to Scheduling of Transient Processes for Time-Constrained Single-Arm Cluster Tools With Parallel Chambers. IEEE Trans. Syst. Man Cybern. Syst. 50(10): 3646-3657 (2020) - [c15]Liyong Lin, Yuting Zhu, Rong Su:
A Topological Approach for Computing Supremal Sublanguages. ICARCV 2020: 1015-1019 - [c14]Yuting Zhu, Liyong Lin, Ruochen Tai, Rong Su:
Supervisor Synthesis for Networked Discrete Event Systems with Delays against Non-FIFO Communication Channels. ICARCV 2020: 1027-1032 - [i5]Yuting Zhu, Liyong Lin, Ruochen Tai, Rong Su:
Overview of Networked Supervisory Control with Imperfect Communication Channels. CoRR abs/2010.11491 (2020)
2010 – 2019
- 2019
- [c13]Liyong Lin, Sander Thuijsman, Yuting Zhu, Simon Ware, Rong Su, Michel A. Reniers:
Synthesis of Supremal Successful Normal Actuator Attackers on Normal Supervisors. ACC 2019: 5614-5619 - [c12]Yuting Zhu, Liyong Lin, Simon Ware, Rong Su:
Supervisor Synthesis for Networked Discrete Event Systems With Communication Delays and Lossy Channels. CDC 2019: 6730-6735 - [c11]Liyong Lin, Yuting Zhu, Rong Su:
Towards Bounded Synthesis of Resilient Supervisors. CDC 2019: 7659-7664 - [c10]Aida Rashidinejad, Bart Wetzels, Michel A. Reniers, Liyong Lin, Yuting Zhu, Rong Su:
Supervisory Control of Discrete-Event Systems under Attacks: An Overview and Outlook. ECC 2019: 1732-1739 - [c9]Yuting Zhu, Liyong Lin, Rong Su:
Supervisor Obfuscation Against Actuator Enablement Attack. ECC 2019: 1760-1765 - [c8]Liyong Lin, Rong Su, Bertil A. Brandin, Simon Ware, Yuting Zhu, Yajuan Sun:
Synchronous Composition of Finite Interval Automata. ICCA 2019: 578-583 - [c7]Yuting Zhu, Liang Qian, Chuyan Wang, Lianghui Ding, Feng Yang, Hao Wang:
Research on CNN Parallel Computing and Learning Architecture Based on Real-Time Streaming Architecture. ICDCIT 2019: 150-158 - [c6]Yuting Zhu, Jingwen Yan, Cong Wang, Yiqing Zhou:
Road Detection of Remote Sensing Image Based on Convolutional Neural Network. ICIG (2) 2019: 106-118 - [c5]Wenyu Zhang, Yuting Zhu, Danshu Wang, Songmin Zhao, Dadi Dong:
A Multi-attribute Decision Making Method Based on Interval Pythagorean Fuzzy Language and the PROMETHEE Method. ICNC-FSKD 2019: 818-826 - [c4]Wenyu Zhang, Songmin Zhao, Dadi Dong, Yuting Zhu, Danshu Wang:
A Multi-criterion Group Decision Making Method: CRITIC-WASPAS Based on Trapezoidal Intuitionistic Fuzzy Numbers. ICNC-FSKD 2019: 827-835 - [c3]Wenyu Zhang, Dadi Dong, Songmin Zhao, Yuting Zhu, Danshu Wang:
An Interval Intuitionistic Fuzzy VIKOR Evaluation Method Based on Unknown Weight. ICNC-FSKD 2019: 836-844 - [i4]Liyong Lin, Yuting Zhu, Rong Su:
Towards Bounded Synthesis of Resilient Supervisors Against Actuator Attacks. CoRR abs/1903.08358 (2019) - [i3]Liyong Lin, Yuting Zhu, Rong Su:
Synthesis of Actuator Attackers for Free. CoRR abs/1904.10159 (2019) - 2018
- [j1]Fajun Yang, Kaizhou Gao, Ian Ware Simon, Yuting Zhu, Rong Su:
Decomposition methods for manufacturing system scheduling: a survey. IEEE CAA J. Autom. Sinica 5(2): 389-400 (2018) - [i2]Liyong Lin, Sander Thuijsman, Yuting Zhu, Simon Ware, Rong Su, Michel A. Reniers:
Synthesis of Successful Actuator Attackers on Supervisors. CoRR abs/1807.06720 (2018) - [i1]Yuting Zhu, Liyong Lin, Rong Su:
Supervisor Obfuscation Against Actuator Enablement Attack. CoRR abs/1811.02932 (2018) - 2017
- [c2]Bo Fu, Liang Qian, Yuting Zhu, Liangpeng Wang:
Reinforcement learning-based algorithm for efficient and adaptive forwarding in named data networking. ICCC 2017: 1-6 - 2015
- [c1]Emmanouil Fytrakis, Ioannis Georgoulas, Jose Part, Yuting Zhu:
Speech-based home automation system. BCS HCI 2015: 271-272
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint