default search action
Zimu Li
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j10]Weina Niu, Zimu Li, Zhaoxu He, Aduo Wang, Beibei Li, Xiaosong Zhang:
FSMFLog: Discovering Anomalous Logs Combining Full Semantic Information and Multifeature Fusion. IEEE Internet Things J. 11(3): 4442-4453 (2024) - [j9]Xiaoyu Cai, Zimu Li, Jiajia Dai, Liang Lv, Bo Peng:
Flow prediction of mountain cities arterial road network for real-time regulation. J. King Saud Univ. Comput. Inf. Sci. 36(9): 102190 (2024) - [j8]Zimu Li, Yanyan Xu, Dengfeng Ke, Kaile Su:
PLDE: A lightweight pooling layer for spoken language recognition. Speech Commun. 158: 103055 (2024) - [c25]Jiaxiang Li, Zimu Li, Yun Yin, Changgu Yan, Nan Qi, Ming Liu, Hongtao Xu:
4.4 A Highly-Integrated 6-Phase Cell-Reused Digital Transmitter Using 1/3 Duty-Cycle LO Signals for Harmonic Rejection. ISSCC 2024: 82-84 - [i6]Zihan Pengmei, Zimu Li:
Technical Report: The Graph Spectral Token - Enhancing Graph Transformers with Spectral Information. CoRR abs/2404.05604 (2024) - 2023
- [j7]Zimu Li, Yanyan Xu, Dengfeng Ke, Kaile Su:
Three-stage training and orthogonality regularization for spoken language recognition. EURASIP J. Audio Speech Music. Process. 2023(1): 14 (2023) - [c24]Xuan Kan, Zimu Li, Hejie Cui, Yue Yu, Ran Xu, Shaojun Yu, Zilong Zhang, Ying Guo, Carl Yang:
R-Mixup: Riemannian Mixup for Biological Networks. KDD 2023: 1073-1085 - [i5]Xuan Kan, Zimu Li, Hejie Cui, Yue Yu, Ran Xu, Shaojun Yu, Zilong Zhang, Ying Guo, Carl Yang:
R-Mixup: Riemannian Mixup for Biological Networks. CoRR abs/2306.02532 (2023) - [i4]Zihan Pengmei, Zimu Li, Chih-chan Tien, Risi Kondor, Aaron R. Dinner:
Transformers are efficient hierarchical chemical graph learners. CoRR abs/2310.01704 (2023) - 2022
- [j6]Zimu Li, Qingliang Wu:
Capturing the crack process of the Antarctic A74 iceberg with Sentinel-1 based offset tracking and radar interferometry techniques. Int. J. Digit. Earth 15(1): 397-415 (2022) - [j5]Junyu Liu, Zimu Li, Han Zheng, Xiao Yuan, Jinzhao Sun:
Towards a variational Jordan-Lee-Preskill quantum algorithm. Mach. Learn. Sci. Technol. 3(4): 45030 (2022) - [c23]Weina Niu, Zhenqi Yu, Zimu Li, Beibei Li, Runzi Zhang, Xiaosong Zhang:
LogTracer: Efficient Anomaly Tracing Combining System Log Detection and Provenance Graph. GLOBECOM 2022: 3356-3361 - [c22]Zimu Li, Xiangming Wen, Zhaoming Lu, Wenpeng Jing:
A DDPG-based Transfer Learning Optimization Framework for User Association and Power Control in HetNet. ICC Workshops 2022: 343-348 - [i3]Han Zheng, Zimu Li, Junyu Liu, Sergii Strelchuk, Risi Kondor:
On the Super-exponential Quantum Speedup of Equivariant Quantum Machine Learning Algorithms with SU(d) Symmetry. CoRR abs/2207.07250 (2022) - [i2]Zimu Li, Han Zheng, Erik H. Thiede, Junyu Liu, Risi Kondor:
Group-Equivariant Neural Networks with Fusion Diagrams. CoRR abs/2211.07482 (2022) - 2021
- [j4]Zimu Li, Behnam Yazdani Bejarbaneh, Panagiotis G. Asteris, Mohammadreza Koopialipoor, Danial Jahed Armaghani, Mahmood M. D. Tahir:
A hybrid GEP and WOA approach to estimate the optimal penetration rate of TBM in granitic rock mass. Soft Comput. 25(17): 11877-11895 (2021) - [c21]Shize Zhang, Zhiliang Wang, Jiahai Yang, Xin Cheng, Xiaoqian Ma, Hui Zhang, Bo Wang, Zimu Li, Jianping Wu:
MineHunter: A Practical Cryptomining Traffic Detection Algorithm Based on Time Series Tracking. ACSAC 2021: 1051-1063 - [c20]Shize Zhang, Zhiliang Wang, Jiahai Yang, Dongbin Bai, Fuliang Li, Zimu Li, Jianping Wu, Xinran Liu:
Unsupervised IoT Fingerprinting Method via Variational Auto-encoder and K-means. ICC 2021: 1-6 - [c19]Zimu Li, Xiangming Wen, Zhaoming Lu, Wenpeng Jing:
A General DRL-based Optimization Framework of User Association and Power Control for HetNet. PIMRC 2021: 1141-1147 - [i1]Han Zheng, Zimu Li, Junyu Liu, Sergii Strelchuk, Risi Kondor:
Speeding up Learning Quantum States through Group Equivariant Convolutional Quantum Ans{ä}tze. CoRR abs/2112.07611 (2021)
2010 – 2019
- 2019
- [j3]Maryam Babaee, Zimu Li, Gerhard Rigoll:
A dual CNN-RNN for multiple people tracking. Neurocomputing 368: 69-83 (2019) - [c18]Jing Sun, Huiqun Zhao, Sanwen Mu, Zimu Li:
Purchasing Behavior Analysis Based on Customer's Data Portrait Model. COMPSAC (1) 2019: 352-357 - [c17]Shuhan Fan, Songyun Wu, Zhiliang Wang, Zimu Li, Jiahai Yang, Heng Liu, Xinran Liu:
ALEAP: Attention-based LSTM with Event Embedding for Attack Projection. IPCCC 2019: 1-8 - 2018
- [j2]Yi Zhang, Zimu Li, Hu Zhang, Zhen Yu, Tongtong Lu:
Fuzzy c-means clustering-based mating restriction for multiobjective optimization. Int. J. Mach. Learn. Cybern. 9(10): 1609-1621 (2018) - [c16]Maryam Babaee, Zimu Li, Gerhard Rigoll:
Occlusion Handling in Tracking Multiple People Using RNN. ICIP 2018: 2715-2719 - 2017
- [c15]Geng Tian, Zhiliang Wang, Xia Yin, Jun Chen, Xingang Shi, Chao Zhou, Zimu Li, Yingya Guo:
CEFF: An efficient approach for traffic anomaly detection and classification. ISCC 2017: 779-786 - 2016
- [c14]Kaixin Sui, Youjian Zhao, Dapeng Liu, Minghua Ma, Lei Xu, Zimu Li, Dan Pei:
Your trajectory privacy can be breached even if you walk in groups. IWQoS 2016: 1-6 - [c13]Kaixin Sui, Siqi Sun, Yousef Azzabi, Xiaoping Zhang, Youjian Zhao, Jilong Wang, Zimu Li, Dan Pei:
Understanding the Impact of AP Density on WiFi Performance Through Real-World Deployment. LANMAN 2016: 1-6 - [c12]Kaixin Sui, Mengyu Zhou, Dapeng Liu, Minghua Ma, Dan Pei, Youjian Zhao, Zimu Li, Thomas Moscibroda:
Characterizing and Improving WiFi Latency in Large-Scale Operational Networks. MobiSys 2016: 347-360 - 2015
- [c11]Geng Tian, Zhiliang Wang, Xia Yin, Zimu Li, Xingang Shi, Ziyi Lu, Chao Zhou, Yingya Guo:
Adjustable Piecewise Entropy for network traffic anomaly detection. INFOCOM Workshops 2015: 59-60 - [c10]Kaixin Sui, Youjian Zhao, Dan Pei, Zimu Li:
How bad are the rogues' impact on enterprise 802.11 network performance? INFOCOM 2015: 361-369 - [c9]Geng Tian, Zhiliang Wang, Xia Yin, Zimu Li, Xingang Shi, Ziyi Lu, Chao Zhou, Yang Yu, Yingya Guo:
Mining network traffic anomaly based on adjustable piecewise entropy. IWQoS 2015: 299-308 - [c8]Geng Tian, Zhiliang Wang, Xia Yin, Zimu Li, Xingang Shi, Ziyi Lu, Chao Zhou, Yang Yu, Dan Wu:
TADOOP: Mining Network Traffic Anomalies with Hadoop. SecureComm 2015: 175-192 - 2012
- [j1]Wei Peng, Zimu Li, Yujing Liu, Jinshu Su:
Assessing the vulnerability of network topologies under large-scale regional failures. J. Commun. Networks 14(4): 451-460 (2012) - 2011
- [c7]Wei Peng, Zimu Li, Jinshu Su, Muwei Dong:
Evaluation of Topological Vulnerability of the Internet under Regional Failures. ARES 2011: 164-175
2000 – 2009
- 2009
- [c6]Zimu Li, Xing Li, Jianping Wu, Haibin Wang:
Security and Reliability Design of Olympic Games Network. APNOMS 2009: 444-447 - 2006
- [c5]Zimu Li, Jilong Wang, Jianping Wu:
P3Cast: A hybrid VoD streaming architecture of proxy with caching, patching, and peering for large-scale deployment. Communication Systems and Networks 2006: 213-218 - [c4]Zimu Li, Jianping Wu, ShaoHua Qin:
Accelerating VOD Streaming with Adaptive Proxy- Assisted Scheduling, Caching and Patching. ICSNC 2006: 46 - 2004
- [c3]Cai Qingsong, Zimu Li, Jianping Hu:
Suffix Caching Techniques of Streaming Media Based On Batch Patching. ECBS 2004: 94-101 - [c2]ShaoHua Qin, Weihong He, Zimu Li, Jianping Hu:
An Adaptive Batched Patch Caching Scheme for Multimedia Streaming. MMNS 2004: 63-73 - [c1]ShaoHua Qin, Zimu Li, Cai Qingsong, Jianping Hu:
Segment-Based Adaptive Caching for Streaming Media Delivery on the Internet. WCW 2004: 116-128
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-15 20:46 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint