


default search action
Yunfei Zhao
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j18]Jiang Li, Weizhao Tang
, Jiepeng Liu, Yunfei Zhao, Y. Frank Chen:
EEG-based floor vibration serviceability evaluation using machine learning. Adv. Eng. Informatics 64: 103089 (2025) - [j17]Jia Li, Zheng Fang, Xianjie Shi, Zhi Jin, Fang Liu, Jia Li, Yunfei Zhao, Ge Li:
SCodeSearcher: soft contrastive learning for code search. Empir. Softw. Eng. 30(3): 87 (2025) - [i8]Zibo Zhao, Zeqiang Lai, Qingxiang Lin, Yunfei Zhao, Haolin Liu, Shuhui Yang, Yifei Feng, Mingxin Yang, Sheng Zhang, Xianghui Yang, Huiwen Shi, Sicong Liu, Junta Wu, Yihang Lian, Fan Yang, Ruining Tang, Zebin He, Xinzhou Wang, Jian Liu, Xuhui Zuo, Zhuo Chen, Biwen Lei, Haohan Weng, Jing Xu, Yiling Zhu, Xinhai Liu, Lixin Xu, Changrong Hu, Tianyu Huang, Lifu Wang, Jihong Zhang, Meng Chen, Liang Dong, Yiwen Jia, Yulin Cai, Jiaao Yu, Yixuan Tang, Hao Zhang, Zheng Ye, Peng He, Runzhou Wu, Chao Zhang, Yonghao Tan, Jie Xiao, Yangyu Tao, Jianchen Zhu, Jinbao Xue, Kai Liu, Chongqing Zhao, Xinming Wu, Zhichao Hu, Lei Qin, Jianbing Peng, Zhan Li, Minghui Chen, Xipeng Zhang, Lin Niu, Paige Wang, Yingkai Wang, Haozhao Kuang, Zhongyi Fan, Xu Zheng, Weihao Zhuang, YingPing He, Tian Liu, Yong Yang, Di Wang, Yuhong Liu, Jie Jiang, Jingwei Huang, Chunchao Guo:
Hunyuan3D 2.0: Scaling Diffusion Models for High Resolution Textured 3D Assets Generation. CoRR abs/2501.12202 (2025) - [i7]Zeqiang Lai, Yunfei Zhao, Zibo Zhao, Haolin Liu, Fuyun Wang, Huiwen Shi, Xianghui Yang, Qingxiang Lin, Jingwei Huang, Yuhong Liu, Jie Jiang, Chunchao Guo, Xiangyu Yue:
Unleashing Vecset Diffusion Model for Fast Shape Generation. CoRR abs/2503.16302 (2025) - [i6]Kechi Zhang, Huangzhao Zhang, Ge Li, Jinliang You, Jia Li, Yunfei Zhao, Zhi Jin:
SEAlign: Alignment Training for Software Engineering Agent. CoRR abs/2503.18455 (2025) - 2024
- [j16]Xiaoxu Diao
, Yunfei Zhao
, Pavan Kumar Vaddi, Michael C. Pietrykowski, Marat Khafizov, Carol S. Smidts:
Multiple aspects maintenance ontology-based intelligent maintenance optimization framework for safety-critical systems. Artif. Intell. Eng. Des. Anal. Manuf. 38 (2024) - [j15]Huangzhao Zhang, Kechi Zhang, Zhuo Li, Jia Li, Jia Li, Yongmin Li, Yunfei Zhao, Yuqi Zhu, Fang Liu, Ge Li, Zhi Jin:
Deep learning for code generation: a survey. Sci. China Inf. Sci. 67(9) (2024) - [j14]Zhen Yang
, Jacky Wai Keung
, Zeyu Sun
, Yunfei Zhao
, Ge Li
, Zhi Jin
, Shuo Liu
, Yishu Li
:
Improving domain-specific neural code generation with few-shot meta-learning. Inf. Softw. Technol. 166: 107365 (2024) - [j13]Xiaoxu Diao
, Yunfei Zhao
, Carol S. Smidts, Pavan Kumar Vaddi, Ruixuan Li
, Hangtian Lei, Yacine Chakhchoukh, Brian Johnson, Katya Le Blanc:
Dynamic probabilistic risk assessment for electric grid cybersecurity. Reliab. Eng. Syst. Saf. 241: 109699 (2024) - [j12]Jia Li
, Yunfei Zhao
, Yongmin Li
, Ge Li
, Zhi Jin
:
AceCoder: An Effective Prompting Technique Specialized in Code Generation. ACM Trans. Softw. Eng. Methodol. 33(8): 204:1-204:26 (2024) - [c13]Yuqi Zhu, Jia Li, Ge Li, Yunfei Zhao, Jia Li, Zhi Jin, Hong Mei:
Hot or Cold? Adaptive Temperature Sampling for Code Generation with Large Language Models. AAAI 2024: 437-445 - [c12]Jia Li, Ge Li, Yunfei Zhao, Yongmin Li, Huanyu Liu, Hao Zhu, Lecheng Wang, Kaibo Liu, Zheng Fang, Lanshen Wang, Jiazheng Ding, Xuanming Zhang, Yuqi Zhu, Yihong Dong, Zhi Jin, Binhua Li, Fei Huang, Yongbin Li, Bin Gu, Mengfei Yang:
DevEval: A Manually-Annotated Code Generation Benchmark Aligned with Real-World Code Repositories. ACL (Findings) 2024: 3603-3614 - [c11]Jia Li, Ge Li, Xuanming Zhang, Yunfei Zhao, Yihong Dong, Zhi Jin, Binhua Li, Fei Huang, Yongbin Li:
EvoCodeBench: An Evolving Code Generation Benchmark with Domain-Specific Evaluations. NeurIPS 2024 - [i5]Jia Li, Ge Li, Yunfei Zhao, Yongmin Li, Huanyu Liu, Hao Zhu, Lecheng Wang, Kaibo Liu, Zheng Fang, Lanshen Wang, Jiazheng Ding, Xuanming Zhang, Yuqi Zhu, Yihong Dong, Zhi Jin, Binhua Li, Fei Huang, Yongbin Li:
DevEval: A Manually-Annotated Code Generation Benchmark Aligned with Real-World Code Repositories. CoRR abs/2405.19856 (2024) - [i4]Jia Li, Ge Li, Xuanming Zhang, Yunfei Zhao, Yihong Dong, Zhi Jin, Binhua Li, Fei Huang, Yongbin Li:
EvoCodeBench: An Evolving Code Generation Benchmark with Domain-Specific Evaluations. CoRR abs/2410.22821 (2024) - 2023
- [j11]Yunfei Zhao
, Pavan Kumar Vaddi, Michael C. Pietrykowski, Marat Khafizov, Carol S. Smidts:
An empirical study of the added value of the sequential learning of model parameters to industrial system health monitoring. Reliab. Eng. Syst. Saf. 240: 109592 (2023) - [j10]Xuanhua Shi
, Xuan Peng
, Ligang He
, Yunfei Zhao
, Hai Jin
:
Waterwave: A GPU Memory Flow Engine for Concurrent DNN Training. IEEE Trans. Computers 72(10): 2938-2950 (2023) - [c10]Lele Lv, Zhi Feng, Wei Dong, Yunfei Zhao, Yunze Zhao, Xinyu Gai:
Research on vulnerability mining of authentication protocol based on fuzzy simulation. BMSB 2023: 1-4 - [c9]Yunfei Zhao
, Yihong Dong
, Ge Li
:
Seq2Seq or Seq2Tree: Generating Code Using Both Paradigms via Mutual Learning. Internetware 2023: 238-248 - [c8]Jia Li, Fang Liu, Jia Li, Yunfei Zhao
, Ge Li, Zhi Jin
:
MCodeSearcher: Multi-View Contrastive Learning for Code Search. Internetware 2023: 270-280 - [i3]Jia Li, Yunfei Zhao, Yongmin Li, Ge Li, Zhi Jin:
Towards Enhancing In-Context Learning for Code Generation. CoRR abs/2303.17780 (2023) - [i2]Yuqi Zhu, Jia Li, Ge Li, Yunfei Zhao, Jia Li, Zhi Jin, Hong Mei:
Improving Code Generation by Dynamic Temperature Sampling. CoRR abs/2309.02772 (2023) - 2022
- [b1]Carol S. Smidts, Indrajit Ray, Quanyan Zhu, Pavan Kumar Vaddi, Yunfei Zhao
, Linan Huang
, Xiaoxu Diao, Rakibul Talukdar, Michael C. Pietrykowski:
Cyber-Security Threats and Response Models in Nuclear Power Plants. Springer Briefs in Computer Science, Springer 2022, ISBN 978-3-031-12710-6, pp. 1-90 - [j9]Yunfei Zhao
:
A Bayesian approach to comparing human reliability analysis methods using human performance data. Reliab. Eng. Syst. Saf. 219: 108213 (2022) - [j8]Yunfei Zhao
, Carol S. Smidts
:
Reinforcement learning for adaptive maintenance policy optimization under imperfect knowledge of the system degradation model and partial observability of system states. Reliab. Eng. Syst. Saf. 224: 108541 (2022) - [c7]Han Peng, Ge Li, Yunfei Zhao, Zhi Jin:
Rethinking Positional Encoding in Tree Transformer for Code Representation. EMNLP 2022: 3204-3214 - [c6]Yunfei Zhao, Lei Wan, En Cheng, Feng Xu:
Adaptive Power Allocation for Non-coherent FSK in Time-varying Underwater Acoustic Communication Channels. ICSPCC 2022: 1-6 - 2021
- [j7]Yunfei Zhao
, Carol S. Smidts:
CMS-BN: A cognitive modeling and simulation environment for human performance assessment, part 2 - Application. Reliab. Eng. Syst. Saf. 213: 107775 (2021) - [j6]Yunfei Zhao
, Carol S. Smidts:
CMS-BN: A cognitive modeling and simulation environment for human performance assessment, part 1 - methodology. Reliab. Eng. Syst. Saf. 213: 107776 (2021) - [j5]Yunfei Zhao
, Wei Gao
, Carol S. Smidts
:
Sequential Bayesian inference of transition rates in the hidden Markov model for multi-state system degradation. Reliab. Eng. Syst. Saf. 214: 107662 (2021) - [j4]Jun Xu
, Xuesong Mei
, Xiao Wang, Yumeng Fu, Yunfei Zhao, Junping Wang:
A Relative State of Health Estimation Method Based on Wavelet Analysis for Lithium-Ion Battery Cells. IEEE Trans. Ind. Electron. 68(8): 6973-6981 (2021) - [c5]Han Peng, Ge Li, Wenhan Wang, Yunfei Zhao, Zhi Jin:
Integrating Tree Path in Transformer for Code Representation. NeurIPS 2021: 9343-9354 - 2020
- [j3]Rachel Benish Shirley, Carol S. Smidts, Yunfei Zhao
:
Development of a quantitative Bayesian network mapping objective factors to subjective performance shaping factor evaluations: An example using student operators in a digital nuclear power plant simulator. Reliab. Eng. Syst. Saf. 194: 106416 (2020) - [j2]Yunfei Zhao
, Linan Huang
, Carol S. Smidts, Quanyan Zhu:
Finite-horizon semi-Markov game for time-sensitive attack response and probabilistic risk assessment in nuclear power plants. Reliab. Eng. Syst. Saf. 201: 106878 (2020) - [c4]Fang Liu, Ge Li, Yunfei Zhao, Zhi Jin:
Multi-task Learning based Pre-trained Language Model for Code Completion. ASE 2020: 473-485 - [i1]Fang Liu, Ge Li, Yunfei Zhao, Zhi Jin:
Multi-task Learning based Pre-trained Language Model for Code Completion. CoRR abs/2012.14631 (2020)
2010 – 2019
- 2019
- [j1]Yunfei Zhao
, Carol S. Smidts:
A method for systematically developing the knowledge base of reactor operators in nuclear power plants to support cognitive modeling of operator performance. Reliab. Eng. Syst. Saf. 186: 64-77 (2019) - [c3]Yunfei Zhao, Shikui Wei, Xiang Jiang, Tao Ruan, Yao Zhao:
Face Verification Between ID Document Photos and Partial Occluded Spot Photos. ICIG (2) 2019: 94-105 - 2017
- [c2]Yunfei Zhao
, Keith Altman, Kreteeka Chaudhury, Muhammad Anandika, Carol S. Smidts:
A Systematic Method to Build a Knowledge Base to be Used in a Human Reliability Analysis Model. AHFE (5) 2017: 50-60 - [c1]Yunfei Zhao
, Carol S. Smidts:
A Dynamic Mechanistic Model of Human Response Proposed for Human Reliability Analysis. AHFE (5) 2017: 261-270
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-05-06 21:32 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint