default search action
Yushu Zhang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Yushu Zhang 0001 — Nanjing University of Aeronautics and Astronautics, Nanjing, China
- Yushu Zhang 0002 — Chinese Academy of Sciences, Aerospace Information Research Institute and the Key Laboratory of Technology in Geo-Spatial Information Processing and Application System, Beijing, China
- Yushu Zhang 0003 — Tsinghua University, Department of Electronic Engineering, Beijing, China
- Yushu Zhang 0004 — Hangzhou Normal University, College of Hengyi Jing Education, Department of Psychology, Hangzhou, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j14]Shimin Li, Ruoyu Zhao, Qingxiao Guan, Junxin Chen, Yushu Zhang:
A 3D model encryption method supporting adaptive visual effects after decryption. Adv. Eng. Informatics 59: 102319 (2024) - [j13]Bo Wang, Xiaohan Wu, Fei Wang, Yushu Zhang, Fei Wei, Zengren Song:
Spatial-frequency feature fusion based deepfake detection through knowledge distillation. Eng. Appl. Artif. Intell. 133: 108341 (2024) - [j12]Yushu Zhang, Fangcheng Tang, Zeyuan Song, Jun Wang:
Interval-Valued Linguistic q-Rung Orthopair Fuzzy TODIM with Unknown Attribute Weight Information. Symmetry 16(9): 1161 (2024) - [c9]Yushu Zhang, Lin Yuan, Zhujun Li:
LCKGCN: Identifying Potential Circrna-Disease Associations Based on Large Convolutional Kernel and Graph Convolutional Network. ICIC (LNBI 2) 2024: 223-231 - 2023
- [j11]Qin Tao, Shuowen Zhang, Caijun Zhong, Yushu Zhang:
Joint information transmission design for intelligent reflecting surface aided system with discrete phase shifts. Sci. China Inf. Sci. 66(3) (2023) - [j10]Tao Wang, Yushu Zhang, Ruoyu Zhao:
Face Database Protection via Beautification with Chaotic Systems. Entropy 25(4): 566 (2023) - [j9]Dezhi An, Dawei Hao, Ruoyu Zhao, Shengcai Zhang, Jun Lu, Yushu Zhang:
Visually semantic-preserving and people-oriented color image encryption based on cross-plane thumbnail preservation. Expert Syst. Appl. 233: 120931 (2023) - [j8]Dezhi An, Dawei Hao, Ruoyu Zhao, Jun Lu, Yan Li, Yushu Zhang:
A novel color image privacy-preserving method: Combining breadth and depth visual encryption with chaotic system. J. King Saud Univ. Comput. Inf. Sci. 35(2): 576-589 (2023) - [c8]Boyuan Meng, Yushu Zhang, Zhujun Li, Wendong Yu, Hongwei Wei, Lin Yuan:
A New and Efficient Dormitory Management System. ICAI (2) 2023: 101-110 - [c7]Yufeng Jiang, Yushu Zhang, Zhujun Li, Wendong Yu, Hongwei Wei, Lin Yuan:
Tourist Attraction Recommendation System Based on Django and Collaborative Filtering. ICAI (2) 2023: 226-235 - 2022
- [j7]Fangcheng Tang, Yushu Zhang, Jun Wang:
How do enterprises determine which breakthrough invention should be commercialized? A multiple attribute group decision-making-based method. Comput. Appl. Math. 41(8) (2022) - [j6]Eko N. Onggosanusi, Min Zhang, Yushu Zhang, Jiwon Kang:
Enhancing 5G MIMO Core Spectral Efficiency with Higher-Resolution Multi-User MIMO and Multi-Beam Operation. IEEE Commun. Stand. Mag. 6(1): 20-26 (2022)
2010 – 2019
- 2019
- [j5]Yue Qi, Yushu Zhang, Siyuan Ma:
Parametrically computing efficient frontiers and reanalyzing efficiency-diversification discrepancies and naive diversification. INFOR Inf. Syst. Oper. Res. 57(3): 430-453 (2019) - 2018
- [c6]Leiqin Yan, Hongwen Yang, Yushu Zhang:
Beam Selection for Beam Refinement Procedure in Multi-cell Millimeter-Wave Massive MIMO Systems. ICCC Workshops 2018: 32-36 - [c5]Jian Song, Yushu Zhang:
On Construction of Rate-Compatible Raptor-Like QC-LDPC Code for Enhanced IDMA in 5G and Beyond. ISTC 2018: 1-5 - 2017
- [j4]WeiQiang Xu, Weiwei Chen, Yushu Zhang, Qingjiang Shi, Xiaodong Wang:
On the Optimization Model for Multi-Hop Information Transmission and Energy Transfer in TDMA-Based Wireless Sensor Networks. IEEE Commun. Lett. 21(5): 1095-1098 (2017) - [c4]Yushu Zhang, Yuan Zhu, Gang Xiong:
On Beam Aggregation in Millimeter-Wave System. VTC Spring 2017: 1-5 - 2015
- [j3]Chao Zhao, Huiqiang Wang, Junyu Lin, Hongwu Lv, Yushu Zhang:
A Generation Method of Network Security Hardening Strategy Based on Attack Graphs. Int. J. Web Serv. Res. 12(1): 45-61 (2015) - [j2]WeiQiang Xu, Yushu Zhang, Qingjiang Shi, Xiaodong Wang:
Energy Management and Cross Layer Optimization for Wireless Sensor Network Powered by Heterogeneous Energy Sources. IEEE Trans. Wirel. Commun. 14(5): 2814-2826 (2015) - 2014
- [c3]Chao Zhao, Huiqiang Wang, Fangfang Guo, Mo Zhou, Yushu Zhang:
A Heuristic Method of Attack Graph Analysis for Network Security Hardening. CyberC 2014: 43-47 - [i2]WeiQiang Xu, Yushu Zhang, Qingjiang Shi, Xiaodong Wang:
Energy Management and Cross Layer Optimization for Wireless Sensor Network Powered by Heterogeneous Energy Sources. CoRR abs/1410.1973 (2014) - [i1]WeiQiang Xu, Yushu Zhang, Qingjiang Shi, Xiaodong Wang:
Dynamic Optimization For Heterogeneous Powered Wireless Multimedia Sensor Networks With Correlated Sources and Network Coding. CoRR abs/1410.5697 (2014) - 2013
- [j1]Yushu Zhang, Grain Philip Adam, Tee C. Lim, Stephen J. Finney, Barry W. Williams:
Hybrid Multilevel Converter: Capacitor Voltage Balancing Limits and its Extension. IEEE Trans. Ind. Informatics 9(4): 2063-2073 (2013) - [c2]Yanbo Wang, Huiqiang Wang, Chao Zhao, Yushu Zhang, Ming Yu:
Research on Attack Graph Generation for Network Security Situation. BIC-TA 2013: 1147-1154 - 2010
- [c1]Yushu Zhang, Xinglin Wang, Xiaokun Yang, Xiaojin Zhang:
Study on Co-Existence of Macro WCDMA Cell and Micro HSUPA Cell. VTC Spring 2010: 1-5
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-04 20:43 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint