


default search action
Yuli Yang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Yuli Yang 0001
— Anhui University, Hefei, Anhui, China - Yuli Yang 0002
— Zhengzhou University of Light Industry, Zhengzhou, China - Yuli Yang 0003
— Soochow University, Suzhou, China - Yuli Yang 0004
— Taiyuan University of Technology, Taiyuan, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[j23]Yuli Yang, Jianxin Song, Dan Yu, Xiaoyan Hao, Yongle Chen:
A Self-Adaptive Mimic Scheduling Method Based on Fine-Grained Heterogeneity. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 108(6): 834-844 (2025)
[j22]Yongle Chen
, Yubo Ji
, Haoran Wang, Xiaoyan Hao, Yuli Yang, Yao Ma, Dan Yu
:
Causal Inference-Based Adversarial Domain Adaptation for Cross-Domain Industrial Intrusion Detection. IEEE Trans. Ind. Informatics 21(1): 970-979 (2025)
[c10]Fuji Deng, Jinpeng Li, Yuli Yang, Yunni Xia, Zhaobin Ouyang:
Joint Task Offloading and Service Caching for Mobile Edge Computing in Failure-Prone Environment. ICWS 2025: 80-95- 2024
[j21]Junjie Bin
, Mei Wu, Meiyun Huang, Yuguang Liao, Yuli Yang, Xianqiong Shi, Siqi Tao:
Predicting invasion in early-stage ground-glass opacity pulmonary adenocarcinoma: a radiomics-based machine learning approach. BMC Medical Imaging 24(1): 240 (2024)
[j20]Yuli Yang, Rui-Yun Chang, Xiufang Feng, Peizhen Li, Yongle Chen, Hao Zhang
:
An n-Dimensional Chaotic Map with Application in Reversible Data Hiding for Medical Images. Entropy 26(3): 254 (2024)
[j19]Yao Ma, Xurong Zhai, Dan Yu, Yuli Yang, Xingyu Wei, Yongle Chen:
Label-Only Membership Inference Attack Based on Model Explanation. Neural Process. Lett. 56(5): 236 (2024)- 2023
[j18]Yuanmeng Zhang, Jiangtao Xu, Kaiming Nie, Changju Liu, Yuli Yang, Hao Wang:
Analysis and optimization design of control signal line parasitic effects on streaking phenomenon in CMOS image sensor. Microelectron. J. 133: 105721 (2023)
[j17]Chengwei Luo
, Yuli Yang, Zhiming Xin, Junran Li, Xiaoxiao Jia, Guangpeng Fan, Junying Zhu, Jindui Song, Zhou Wang, Huijie Xiao:
Assessment of the Declining Degree of Farmland Shelterbelts in a Desert Oasis Based on LiDAR and Hyperspectral Imagery. Remote. Sens. 15(18): 4508 (2023)
[c9]Yuli Yang:
Secure and Timely Status Updates in the IoT using Short-Packet Permutation-Based Transmissions. VTC Fall 2023: 1-6- 2022
[j16]Yongle Chen
, Jun Pan, Dan Yu
, Yao Ma, Yuli Yang:
Retransmission-Based TCP Fingerprints for Fine-Grain IoV Edge Device Identification. IEEE Trans. Veh. Technol. 71(7): 7835-7847 (2022)- 2021
[i10]Mingxi Yin, Bingli Jiao, Dongsheng Zheng, Yuli Yang:
A Practical Consideration on Convex Mutual Information. CoRR abs/2105.11272 (2021)
[i9]Bingli Jiao, Mingxi Yin, Yuli Yang:
Application of Opportunistic Bit to Multilevel Codes. CoRR abs/2105.11273 (2021)- 2020
[j15]Yongle Chen, Xiaojian Wang
, Yuli Yang, Hong Li:
Location-Aware Wi-Fi Authentication Scheme Using Smart Contract. Sensors 20(4): 1062 (2020)
[c8]Haoping Ji, Yuli Yang, Xiangwei Chen, Yanfeng Wang:
Three-Variable Chaotic Oscillatory System Based on DNA Chemical Reaction Networks. BIC-TA 2020: 502-512
2010 – 2019
- 2019
[j14]Yongle Chen
, Qinghua Yao, Dan Yu, Yuli Yang:
WiLabel: Behavior-Based Room Type Automatic Annotation for Indoor Floorplan. IEEE Access 7: 79118-79126 (2019)
[c7]Yuli Yang, Zhi Li, Yanfeng Wang:
Risk Prediction of Esophageal Cancer Using SOM Clustering, SVM and GA-SVM. BIC-TA (2) 2019: 345-358
[c6]Min Wan, Yuli Yang, Xiaodan Zhao, Shuang Leng, Jun-Mei Zhang
, Ru-San Tan
, Liang Zhong:
Classifying HCM Subtypes via Left Ventricular Two-Dimensional Curvature and Dynamic Time Wrapping. CinC 2019: 1-4
[c5]Min Wan, Yuli Yang, Xiaodan Zhao, Shuang Leng, Jun-Mei Zhang, Ru-San Tan
, Liang Zhong:
Reconstructing Cardiac Shape via Constrained Voronoi Diagram and Cyclic Dynamic Time Wrapping From CMR. CinC 2019: 1-4
[i8]Bingli Jiao, Yuli Yang, Mingxi Yin:
Cocktail BPSK: Achievable Data Rate beyond Channel Capacity. CoRR abs/1901.06122 (2019)
[i7]Bingli Jiao, Yuli Yang, Mingxi Yin:
A Method Beyond Channel Capacity in the Low SNR Regime: Theoretical Proof and Numerical Confirmation. CoRR abs/1903.00136 (2019)
[i6]Bingli Jiao, Mingxi Yin, Yuli Yang:
Cocktail Intra-Symbol-Codes: Exceeding the Channel Limit of QPSK Input. CoRR abs/1905.08915 (2019)
[i5]Bingli Jiao, Dongsheng Zheng, Mingxi Yin, Yuli Yang:
Beyond the Channel Capacity of BPSK Input. CoRR abs/1908.08836 (2019)
[i4]Bingli Jiao, Dongsheng Zheng, Yuli Yang:
A Signal Separation Method for Exceeding the Channel Capacity of BPSK Input. CoRR abs/1909.08220 (2019)- 2018
[j13]Yuli Yang, Rui Liu, Yongle Chen, Tong Li
, Yi Tang
:
Normal Cloud Model-Based Algorithm for Multi-Attribute Trusted Cloud Service Selection. IEEE Access 6: 37644-37652 (2018)
[j12]Yongle Chen, Xiaojian Wang
, Dan Yu, Yuli Yang, Jian Chen:
Localizing Access Point Through Simple Gesture. IEEE Access 6: 38870-38880 (2018)
[j11]Wei Ge, Hong Yang, Xiaobo Zhu
, Mingguo Ma
, Yuli Yang:
Ghost City Extraction and Rate Estimation in China Based on NPP-VIIRS Night-Time Light Data. ISPRS Int. J. Geo Inf. 7(6): 219 (2018)
[i3]Bingli Jiao, Yuli Yang, Mingxi Yin:
Layered BPSK for High Data Rates. CoRR abs/1809.07537 (2018)
[i2]Bingli Jiao, Yuli Yang, Mingxi Yin:
Cocktail BPSK: Cross Power Utilization for High Data Rates. CoRR abs/1809.10839 (2018)
[i1]Bingli Jiao, Yuli Yang, Mingxi Yin:
Cocktail BPSK: Energy Reused Scheme for High Achievable Data Rates. CoRR abs/1811.01540 (2018)- 2017
[j10]Yuli Yang, Xinguang Peng, Donglai Fu:
A framework of cloud service selection based on trust mechanism. Int. J. Ad Hoc Ubiquitous Comput. 25(3): 109-119 (2017)
[j9]Yuli Yang, Mingguo Ma, Chao Tan, Wangping Li:
Spatial Recognition of the Urban-Rural Fringe of Beijing Using DMSP/OLS Nighttime Light Data. Remote. Sens. 9(11): 1141 (2017)- 2016
[j8]Donglai Fu, Xinguang Peng, Yuli Yang:
Unbalanced tree-formed verification data for trusted platforms. Secur. Commun. Networks 9(7): 622-633 (2016)- 2015
[j7]Dong Lai Fu, Xinguang Peng, Yuli Yang:
Trusted Validation for Geolocation of Cloud Data. Comput. J. 58(10): 2595-2607 (2015)
[j6]Yuli Yang, Xinguang Peng, Jianfang Cao:
Trust-Based Scheduling Strategy for Cloud Workflow Applications. Informatica 26(1): 159-180 (2015)
[j5]Yuli Yang, Xinguang Peng, Xiaohong Wan:
Security-aware data replica selection strategy for Bag-of-Tasks application in cloud computing. J. High Speed Networks 21(4): 299-311 (2015)
[j4]Yuli Yang, Xinguang Peng, Zheng Wang:
主观信任评估模型与决策方法的研究 (Research of Subjective Trust Evaluation Model and Decision-making). 计算机科学 42(1): 170-174 (2015)- 2013
[c4]Yuli Yang, Xinguang Peng:
Trust-Based Scheduling Strategy for Workflow Applications in Cloud Environment. 3PGCIC 2013: 316-320- 2011
[j3]Yaodong Cui, Yuli Yang:
A recursive branch-and-bound algorithm for constrained homogenous T-shape cutting patterns. Math. Comput. Model. 54(5-6): 1320-1333 (2011)- 2010
[j2]Yaodong Cui, Yuli Yang:
A heuristic for the one-dimensional cutting stock problem with usable leftover. Eur. J. Oper. Res. 204(2): 245-250 (2010)
[c3]Rui-feng Han, Yuli Yang:
Optimization of parameters of the chemic kinetic model by improved genetic algorithms. ICNC 2010: 4143-4146
[c2]Yuli Yang, Sonia Aïssa:
Common Information Multicast with Different Data Rates. VTC Spring 2010: 1-5
2000 – 2009
- 2009
[c1]Rui-feng Han, Yuli Yang, Yong-kui Zhang:
Optimization of Parameters of the Chemic Kinetic Model by Improved Genetic Algorithms. IITSI 2009: 211-214- 2008
[j1]Yaodong Cui, Yuli Yang, Xian Cheng, Peihua Song:
A recursive branch-and-bound algorithm for the rectangular guillotine strip packing problem. Comput. Oper. Res. 35(4): 1281-1291 (2008)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-11-20 22:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







