default search action
Yu Zhan
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j29]Zheng Lv, Fangfang Qiang, Yu Zhan:
Node positioning based on IPSO-IDE in WSNs. Evol. Intell. 17(1): 483-492 (2024) - [j28]Fang Wang, Abdallah Shaheen, Robabeh Yousefi, Quansheng Ge, Renguang Wu, Jos Lelieveld, Dimitris G. Kaskaoutis, Zifeng Lu, Yu Zhan, Yuyu Zhou:
Long-Term Dynamics of Atmospheric Sulfur Dioxide in Urban and Rural Regions of China: Urbanization and Policy Impacts. Remote. Sens. 16(2): 391 (2024) - [j27]Yu Zhan, Ying Fu, Liang Huang, Jianmin Guo, Heyuan Shi, Houbing Song, Chao Hu:
Cube-Evo: A Query-Efficient Black-Box Attack on Video Classification System. IEEE Trans. Reliab. 73(2): 1160-1171 (2024) - [i6]Jieting Zhao, Hanjing Ye, Yu Zhan, Hong Zhang:
Human Orientation Estimation under Partial Observation. CoRR abs/2404.14139 (2024) - 2023
- [j26]Yu Zhan, Ziqian Zhang, Qian Liu, Baocang Wang:
Hiding the input-size in multi-party private set intersection. Des. Codes Cryptogr. 91(9): 2893-2915 (2023) - [j25]Yufeng Chi, Yu Zhan, Kai Wang, Hong Ye:
Spatial Distribution of Multiple Atmospheric Pollutants in China from 2015 to 2020. Remote. Sens. 15(24): 5705 (2023) - [c13]Xin Yao, Yu Zhan, Yimin Chen, Fengxiao Tang, Ming Zhao, Enlang Li, Yanchao Zhang:
DUO: Stealthy Adversarial Example Attack on Video Retrieval Systems via Frame-Pixel Search. ICDCS 2023: 1-11 - [i5]Chao Hu, Ruishi Yu, Binqi Zeng, Yu Zhan, Ying Fu, Quan Zhang, Rongkai Liu, Heyuan Shi:
HyperAttack: Multi-Gradient-Guided White-box Adversarial Structure Attack of Hypergraph Neural Networks. CoRR abs/2302.12407 (2023) - [i4]Hanjing Ye, Jieting Zhao, Yu Zhan, Weinan Chen, Li He, Hong Zhang:
Person Re-Identification for Robot Person Following with Online Continual Learning. CoRR abs/2309.11727 (2023) - 2022
- [j24]Zhiyong Hong, Liguo Zhou, Yu Zhan, Chengdong Liu, Baocang Wang:
Cryptanalysis of an additively homomorphic public key encryption scheme. Comput. Stand. Interfaces 82: 103623 (2022) - [j23]Yu Zhan, Danfeng Shen, Pu Duan, Benyu Zhang, Zhiyong Hong, Baocang Wang:
MDOPE: Efficient multi-dimensional data order preserving encryption scheme. Inf. Sci. 595: 334-343 (2022) - [j22]Linfan Liu, Huajun Zhang, Yu Zhan, Yixin Su, Changfan Zhang:
Intelligent optimization method for the evacuation routes of dense crowds on cruise ships. Simul. Model. Pract. Theory 117: 102496 (2022) - [j21]Yu Zhan, Liguo Zhou, Baocang Wang, Pu Duan, Benyu Zhang:
Efficient Function Queryable and Privacy Preserving Data Aggregation Scheme in Smart Grid. IEEE Trans. Parallel Distributed Syst. 33(12): 3430-3441 (2022) - [j20]Wenju Xu, Qingqing Zhao, Yu Zhan, Baocang Wang, Yupu Hu:
Privacy-preserving association rule mining based on electronic medical system. Wirel. Networks 28(1): 303-317 (2022) - [c12]Yu Zhan, Fenghai Li, Renliang Weng, Wongun Choi:
Ray3D: ray-based 3D human pose estimation for monocular absolute 3D localization. CVPR 2022: 13106-13115 - [c11]Runzhe Wang, Qinglong Wang, Yuxi Hu, Heyuan Shi, Yuheng Shen, Yu Zhan, Ying Fu, Zheng Liu, Xiaohai Shi, Yu Jiang:
Industry practice of configuration auto-tuning for cloud applications and services. ESEC/SIGSOFT FSE 2022: 1555-1565 - [i3]Yu Zhan, Fenghai Li, Renliang Weng, Wongun Choi:
Ray3D: ray-based 3D human pose estimation for monocular absolute 3D localization. CoRR abs/2203.11471 (2022) - [i2]Yuejun Wang, Baocang Wang, Qiqi Lai, Yu Zhan:
Identity-based Matchmaking Encryption with Stronger Security and Instantiation on Lattices. IACR Cryptol. ePrint Arch. 2022: 1718 (2022) - 2021
- [j19]Jie Lin, Yu Zhan, Wan-Lei Zhao:
Instance search based on weakly supervised feature learning. Neurocomputing 424: 117-124 (2021) - [j18]Yu Zhan, Baocang Wang, Rongxing Lu:
Cryptanalysis and Improvement of a Pairing-Free Certificateless Aggregate Signature in Healthcare Wireless Medical Sensor Networks. IEEE Internet Things J. 8(7): 5973-5984 (2021) - [j17]Yu Zhan, Baocang Wang, Rongxing Lu, Yong Yu:
DRBFT: Delegated randomization Byzantine fault tolerance consensus protocol for blockchains. Inf. Sci. 559: 8-21 (2021) - [j16]Yu Zhan, Wan-Lei Zhao:
Instance search via instance level segmentation and feature representation. J. Vis. Commun. Image Represent. 79: 103253 (2021) - 2020
- [j15]Yuan Ping, Yu Zhan, Ke Lu, Baocang Wang:
Public Data Integrity Verification Scheme for Secure Cloud Storage. Inf. 11(9): 409 (2020) - [j14]Ke Xiong, Basanta Raj Adhikari, Constantine A. Stamatopoulos, Yu Zhan, Shaolin Wu, Zhongtao Dong, Baofeng Di:
Comparison of Different Machine Learning Methods for Debris Flow Susceptibility Mapping: A Case Study in the Sichuan Province, China. Remote. Sens. 12(2): 295 (2020) - [j13]Yu Zhan, Baocang Wang, Zheng Wang, Tao Pei, Yuan Chen, Quanbo Qu, Zhili Zhang:
Improved Proxy Re-Encryption With Delegatable Verifiability. IEEE Syst. J. 14(1): 592-602 (2020) - [j12]Yanting Chai, Yu Zhan, Baocang Wang, Yuan Ping, Zhili Zhang:
Improvement on a privacy-preserving outsourced classification protocol over encrypted data. Wirel. Networks 26(6): 4363-4374 (2020)
2010 – 2019
- 2019
- [j11]Wenju Xu, Yu Zhan, Zheng Wang, Baocang Wang, Yuan Ping:
Attack and Improvement on a Symmetric Fully Homomorphic Encryption Scheme. IEEE Access 7: 68373-68379 (2019) - [j10]Yu Zhan, Baocang Wang:
Cryptanalysis of a Certificateless Aggregate Signature Scheme for Healthcare Wireless Sensor Network. Secur. Commun. Networks 2019: 6059834:1-6059834:5 (2019) - [c10]Jianzhong Fan, Haihui Li, Yu Zhan, Yajun Yu:
An Electrocardiogram Acquisition and Analysis System for Detection of Human Stress. CISP-BMEI 2019: 1-6 - 2018
- [j9]Christopher DeMars, Yu Zhan, Huajin Chen, Phil Heilman, Xuyang Zhang, Minghua Zhang:
Integrating GLEAMS sedimentation into RZWQM for pesticide sorbed sediment runoff modeling. Environ. Model. Softw. 109: 390-401 (2018) - [j8]Baocang Wang, Yu Zhan, Zhili Zhang:
Cryptanalysis of a Symmetric Fully Homomorphic Encryption Scheme. IEEE Trans. Inf. Forensics Secur. 13(6): 1460-1467 (2018) - [c9]Yuanrong Lin, Weidang Lu, Qibin Ye, Hong Peng, Yu Zhan, Xin Liu:
Subcarrier Allocation of Cognitive OFDM Systems with SWIPT-Enabled Relay. CSPS (1) 2018: 317-320 - [i1]Yu Zhan, Wan-Lei Zhao:
Instance Search via Instance Level Segmentation and Feature Representation. CoRR abs/1806.03576 (2018) - 2016
- [j7]Yu Zhan, Haiwei Pan, Xiaoqin Xie, Zhiqiang Zhang, Wenbo Li:
Graph entropy-based clustering algorithm in medical brain image database. J. Intell. Fuzzy Syst. 31(2): 1029-1039 (2016) - 2015
- [j6]Rongxi Zhou, Yu Zhan, Ru Cai, Guanqun Tong:
A Mean-Variance Hybrid-Entropy Model for Portfolio Selection with Fuzzy Returns. Entropy 17(5): 3319-3331 (2015) - [j5]Francisco Ceba, Eduardo Makhoul, Antoni Broquetas, Yu Zhan, Alasdhair J. Beaton:
Modeling Fast Boat Motion Impact on Satellite SAR MTI Systems. IEEE Geosci. Remote. Sens. Lett. 12(10): 2145-2149 (2015) - [j4]Eduardo Makhoul, Antoni Broquetas, Josep Ruiz Rodon, Yu Zhan, Francisco Ceba:
A Performance Evaluation of SAR-GMTI Missions for Maritime Applications. IEEE Trans. Geosci. Remote. Sens. 53(5): 2496-2509 (2015) - [c8]Yu Zhan, Haiwei Pan, Qilong Han, Xiaoqin Xie, Zhiqiang Zhang, Xiao Zhai:
Medical image clustering algorithm based on graph entropy. FSKD 2015: 1151-1157 - 2014
- [j3]Jianxin Ma, Yu Zhan:
Full-duplex hybrid PON/RoF link with the 10 Gbit/s 16-QAM signal for alternative wired and 60 GHz millimeter-wave wireless accesses. Photonic Netw. Commun. 27(1): 16-27 (2014) - [c7]Eduardo Makhoul Varona, Yu Zhan, Antoni Broquetas, Josep Ruiz Rodon, Stefan Valentin Baumgartner:
Sea clutter statistical characterization using TerraSAR-X data. IGARSS 2014: 5130-5133 - [c6]Sutao Song, Gongxiang Chen, Yu Zhan, Jiacai Zhang, Li Yao:
Comparative study of two sparse multinomial logistic regression models in decoding visual stimuli from brain activity of fMRI. Medical Imaging: Image Processing 2014: 90341R - 2013
- [j2]Yu Zhan, Minghua Zhang:
Application of a combined sensitivity analysis approach on a pesticide environmental risk indicator. Environ. Model. Softw. 49: 129-140 (2013) - [c5]Di Wang, Rongxi Zhou, Yu Zhan, Qinghua Zheng:
Model Formulation and Empirical Analyses on the Macro Factors Affecting Credit Spreads of Enterprise Bonds in China. BIFE 2013: 225-230 - [c4]Yu Zhan, Jiacai Zhang, Sutao Song, Li Yao:
Visual Image Reconstruction from fMRI Activation Using Multi-scale Support Vector Machine Decoders. HCI (5) 2013: 491-497 - 2012
- [j1]Jianxin Ma, Yu Zhan, Min Zhou, Hao Liang, Yufeng Shao, Chongxiu Yu:
Full-Duplex Radio Over Fiber With a Centralized Optical Source for a 60 GHz Millimeter-Wave System With a 10 Gb/s 16-QAM Downstream Signal Based on Frequency Quadrupling. JOCN 4(7): 557-564 (2012)
2000 – 2009
- 2009
- [c3]Tomek Strzalkowski, Sarah M. Taylor, Samira Shaikh, Ben-Ami Lipetz, Hilda Hardy, Nick Webb, Tony Cresswell, Ting Liu, Min Wu, Yu Zhan, Song Chen:
COLLANE: An Experiment in Computer-Mediated Tacit Collaboration. Aspects of Natural Language Processing 2009: 411-448 - [c2]Jianming Cheng, Min Li, Kaige Feng, Yu Zhan:
The Study of Braking Performance of Automobile ABS Based on Fuzzy Control Algorithm. DET 2009: 145-155 - 2007
- [c1]Min Wu, Song Chen, Yu Zhan, Tomek Strzalkowski:
UAlbany's ILQUA at TREC 2007. TREC 2007
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint