


default search action
Yifei Zhu
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Yifei Zhu 0001
— Shanghai Jiao Tong University, UM-SJTU Joint Institute, Shanghai, China (and 1 more)
- Yifei Zhu 0002
— University of Sheffield, Department of Automatic Control and Systems Engineering, Sheffield, UK
- Yifei Zhu 0003
(aka: Yifei (Rena) Zhu) — Colorado School of Mines, MIRRORLab, Golden, CO, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j8]Zhixiang Zhou
, Yifei Zhu, Yannan Li, Huaqing Wu:
How does energy transition improve energy utilization efficiency? A case study of China's coal-to-gas program. Expert Syst. J. Knowl. Eng. 42(2) (2025) - [c12]Xuening Feng, Zhaohui Jiang, Timo Kaufmann, Puchen Xu, Eyke Hüllermeier, Paul Weng, Yifei Zhu:
DUO: Diverse, Uncertain, On-Policy Query Generation and Selection for Reinforcement Learning from Human Feedback. AAAI 2025: 16604-16612 - [i6]Linyi Jiang, Silvery D. Fu, Yifei Zhu, Bo Li:
Janus: Collaborative Vision Transformer Under Dynamic Network Environment. CoRR abs/2502.10047 (2025) - 2024
- [i5]Daniel Zint, Zhouyuan Chen, Yifei Zhu, Denis Zorin, Teseo Schneider, Daniele Panozzo:
Topological Offsets. CoRR abs/2407.07725 (2024) - [i4]Zhaohui Jiang, Xuening Feng, Paul Weng, Yifei Zhu, Yan Song, Tianze Zhou, Yujing Hu, Tangjie Lv, Changjie Fan:
Reinforcement Learning From Imperfect Corrective Actions And Proxy Rewards. CoRR abs/2410.05782 (2024) - 2023
- [j7]Qiang Xiong
, Yifei Zhu, Zhangying Zeng, Xinqi Yang:
Signal Game Analysis between Software Vendors and Third-Party Platforms in Collaborative Disclosure of Network Security Vulnerabilities. Complex. 2023: 1027215:1-1027215:11 (2023) - [j6]Hui Li
, Yifei Zhu:
Privacy-Preserving Contact Tracing for Curbing the Spread of Infectious Disease. J. Database Manag. 34(3): 1-17 (2023) - [j5]Jin Fan, Ke Zhang, Yipan Huang, Yifei Zhu, Baiping Chen
:
Parallel spatio-temporal attention-based TCN for multivariate time series prediction. Neural Comput. Appl. 35(18): 13109-13118 (2023) - [i3]Jinghao Jia
, YiFei Zhu, Dan Williams, Andrea Arcangeli, Claudio Canella, Hubertus Franke, Tobin Feldman-Fitzthum, Dimitrios Skarlatos, Daniel Gruss, Tianyin Xu:
Programmable System Call Security with eBPF. CoRR abs/2302.10366 (2023) - [i2]Pingyao Feng, Siheng Yi, Qingrui Qu, Zhiwang Yu, Yifei Zhu:
Topology combined machine learning for consonant recognition. CoRR abs/2311.15210 (2023) - 2022
- [j4]Jing Gao, Lei Feng, Peng Yu, Fanqin Zhou, Zihao Wu, Xuesong Qiu, Jingchun Li, Yifei Zhu:
Resource consumption and security-aware multi-tenant service function chain deployment based on hypergraph matching. Comput. Networks 216: 109298 (2022) - [j3]Yifei Zhu
, Xin Yao, Chuangchuang Yao, Zhenkai Zhou, Zhenkui Gu, Leihua Yao:
Integration of Vertical and Horizontal Deformation Derived by SAR Observation for Identifying Landslide Motion Patterns in a Basaltic Weathered Crust Region of Guizhou, China. Remote. Sens. 14(16): 4014 (2022) - [i1]Jin Fan, Ke Zhang, Yipan Huang, Yifei Zhu, Baiping Chen:
Parallel Spatio-Temporal Attention-Based TCN for Multivariate Time Series Prediction. CoRR abs/2203.00971 (2022) - 2021
- [j2]Yifei Zhu
, Defu Lin
, Li Mo, Peijian Lv
, Jianchuan Ye
:
Numerical Study of the Aerodynamic Interference of Rotors Imposed on Fuselage for a Quadcopter. IEEE Access 9: 150021-150036 (2021) - [c11]Zhou Yang, Shuyi Chen, Tianhong Fang, Yifei Zhu:
The Packaging Design of Braille Beverage Bottle Based on Universal Design Thinking. HCI (45) 2021: 64-70 - [c10]Yifei Zhu, Wei Yu:
On the Life Aesthetics of Packaging Design in the Context of Digital Economy. HCI (44) 2021: 81-87 - [c9]Xuanxuan Tang, Shizhao Liu, Qi Cheng, Yifei Zhu, Li Zhao, Renliang Sun:
Secure Transmission for Multi-Antenna Wireless-Powered Networks with Joint Receiving Antenna Selection and Full-Duplex Zero-Forcing Jamming. ICITEE 2021: 20:1-20:6 - [c8]Evan Johnson, Maxwell Bland, Yifei Zhu, Joshua Mason, Stephen Checkoway, Stefan Savage, Kirill Levchenko:
Jetset: Targeted Firmware Rehosting for Embedded Systems. USENIX Security Symposium 2021: 321-338 - 2020
- [j1]Yurong Wang
, Yifei Zhu
, Qi Wang
, Yi Tang
, Fangwei Duan
, Yingxuan Yang
:
Complex Fault Source Identification Method for High-Voltage Trip-Offs of Wind Farms Based on SU-MRMR and PSO-SVM. IEEE Access 8: 130379-130391 (2020)
2010 – 2019
- 2019
- [c7]Yifei Zhu, Zhifeng Zhou, Peng Xiao:
Multifunctional human body data acquisition system Based on LabVIEW. RICAI 2019: 449-453 - 2014
- [c6]Li-Huan Liao, Yi-Fei Zhu, Li-Li Cao, Jun Zhang:
Combine Multiple Mass Spectral Similarity Measures for Compound Identification in GC-MS. ICIC (3) 2014: 255-261 - 2010
- [c5]Cheng-Xiang Yang, Yi-Fei Zhu:
Using genetic algorithms for time series prediction. ICNC 2010: 4405-4409
2000 – 2009
- 2009
- [c4]Yi-fei Zhu, Shi-ying Zheng, Jin-feng Ge, Jun Zhao, Dong Jiang:
Influence of Survivin and Caspase-3 on Cell Apoptosis and Prognosis in Gastric Carcinoma. BMEI 2009: 1-6 - 2007
- [c3]Cheng-Xiang Yang, Yi-Fei Zhu:
Time Series Analysis Using GA Optimized Neural Networks. ICNC (4) 2007: 270-276 - 2002
- [c2]Guo-Hong Ding, Yi-Fei Zhu, Chengrong Li, Bo Xu:
Implementing vocal tract length normalization in the MLLR framework. INTERSPEECH 2002: 1389-1392 - [c1]Yi-Fei Zhu, Chengrong Li, Bo Xu:
Improvement of the post-processing method for isolated word OOV rejection. ISCSLP 2002
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-04-23 21:04 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint