default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 55 matches
- 2024
- Jiao Yu, Qinyi Wang, Chunjie Wu:
Online monitoring of the Weibull distributed process based on progressive Type II censoring scheme. J. Comput. Appl. Math. 443: 115744 (2024) - Zengyang Li, Guangzong Cai, Qinyi Yu, Peng Liang, Ran Mo, Hui Liu:
Bug priority change: An empirical study on Apache projects. J. Syst. Softw. 212: 112019 (2024) - Huali Duan, Erping Li, Qinyi Huang, Yuehang Xu, Wenchao Chen:
Multiphysics simulation study of thermal stress effects in nanoscale FinFETs heterogeneously integrated with GaN high-power device on silicon substrate. Microelectron. J. 150: 106286 (2024) - Xun Li, Xiang Yu, Qinyi Zhang:
Optimal Consumption with Loss Aversion and Reference to Past Spending Maximum. SIAM J. Financial Math. 15(1): 121-160 (2024) - Binbin Zhao, Shouling Ji, Jiacheng Xu, Yuan Tian, Qiuyang Wei, Qinying Wang, Chenyang Lyu, Xuhong Zhang, Changting Lin, Jingzheng Wu, Raheem Beyah:
One Bad Apple Spoils the Barrel: Understanding the Security Risks Introduced by Third-Party Components in IoT Firmware. IEEE Trans. Dependable Secur. Comput. 21(3): 1372-1389 (2024) - Yu Lei, Fei Liu, Yizhan Zhuang, Qinyi Liu, Hongxi Zhu, Yanhui Huang:
A Dual LC Interleaved Four-Port Converter for Bipolar DC Microgrids. IEEE Trans. Ind. Electron. 71(9): 10783-10794 (2024) - Xuejie Hu, Yue Tian, Qinying Li, Yau Hee Kho, Xianling Wang, Baiyun Xiao, Zheng Yang, Wenda Li:
A Novel RIS-Aided Optimization Strategy for Semantic Communication System. IEEE Wirel. Commun. Lett. 13(6): 1655-1659 (2024) - Xilong Zhao, Siyuan Bian, Yaoyun Zhang, Yuliang Zhang, Qinying Gu, Xinbing Wang, Chenghu Zhou, Nanyang Ye:
Domain Invariant Learning for Gaussian Processes and Bayesian Exploration. AAAI 2024: 17024-17032 - Jiacheng Xu, Xuhong Zhang, Shouling Ji, Yuan Tian, Binbin Zhao, Qinying Wang, Peng Cheng, Jiming Chen:
MOCK: Optimizing Kernel Fuzzing Mutation with Context-aware Dependency. NDSS 2024 - Qinying Wang, Boyu Chang, Shouling Ji, Yuan Tian, Xuhong Zhang, Binbin Zhao, Gaoning Pan, Chenyang Lyu, Mathias Payer, Wenhai Wang, Raheem Beyah:
SyzTrust: State-aware Fuzzing on Trusted OS Designed for IoT Devices. SP 2024: 2310-2387 - Qinyi Luo, Penghan Wang, Wei Zhang, Fan Lai, Jiachen Mao, Xiaohan Wei, Jun Song, Wei-Yu Tsai, Shuai Yang, Yuxi Hu, Xuehai Qian:
Fine-Grained Embedding Dimension Optimization During Training for Recommender Systems. CoRR abs/2401.04408 (2024) - Yuwen Lu, Yuewen Yang, Qinyi Zhao, Chengzhi Zhang, Toby Jia-Jun Li:
AI Assistance for UX: A Literature Review Through Human-Centered AI. CoRR abs/2402.06089 (2024) - Zengyang Li, Guangzong Cai, Qinyi Yu, Peng Liang, Ran Mo, Hui Liu:
Bug Priority Change: An Empirical Study on Apache Projects. CoRR abs/2403.05059 (2024) - Yuwen Lu, Ziang Tong, Qinyi Zhao, Yewon Oh, Bryan Wang, Toby Jia-Jun Li:
Flowy: Supporting UX Design Decisions Through AI-Driven Pattern Annotation in Multi-Screen User Flows. CoRR abs/2406.16177 (2024) - Congqi Cao, Yueran Zhang, Yating Yu, Qinyi Lv, Lingtong Min, Yanning Zhang:
Task-Adapter: Task-specific Adaptation of Image Models for Few-shot Action Recognition. CoRR abs/2408.00249 (2024) - 2023
- Ye Chen, Zhigang Jin, Guozhen Xing, Qinyi Zeng, Yueyan Chen, Ziyu Zhou, Qiuling Yang:
An Energy-Efficient MAC Protocol for Three-Dimensional Underwater Acoustic Sensor Networks With Time Synchronization and Power Control. IEEE Access 11: 20842-20860 (2023) - Yue Tian, Baiyun Xiao, Xianling Wang, Yau Hee Kho, Chen Zhu, Wenda Li, Qinying Li, Xuejie Hu:
Opportunistic RIS-assisted rate splitting transmission in coordinated multiple points networks. Comput. Commun. 202: 23-32 (2023) - Qinyi Wang, Yang Yu, Fan Zhang, Panfeng Huang:
Neural-network-based backstepping control for the post-capture tethered space combination using HDO. Neurocomputing 521: 79-88 (2023) - Wenqi Wei, Qinying Liu, Le Yuan, Jian Zhang, Shiyu Liu, Rui Zhou, Yongkang Luo, Xiaotao Han:
Nuclear Magnetic Resonance Measurements in High Flat-Top Pulsed Magnetic Field Up to 40 T at WHMFC. IEEE Trans. Instrum. Meas. 72: 1-9 (2023) - Yu Wang, Qinyin Ni, Junjiang Yu, Enfu Jia, Xiaorong Zhu:
An intelligent access algorithm for large scale multihop wireless networks based on mean field game. Wirel. Networks 29(1): 331-344 (2023) - Binbin Zhao, Shouling Ji, Xuhong Zhang, Yuan Tian, Qinying Wang, Yuwen Pu, Chenyang Lyu, Raheem Beyah:
UVSCAN: Detecting Third-Party Component Usage Violations in IoT Firmware. USENIX Security Symposium 2023: 3421-3438 - Binbin Zhao, Shouling Ji, Xuhong Zhang, Yuan Tian, Qinying Wang, Yuwen Pu, Chenyang Lyu, Raheem Beyah:
UVSCAN: Detecting Third-Party Component Usage Violations in IoT Firmware. CoRR abs/2306.11206 (2023) - Qinying Wang, Boyu Chang, Shouling Ji, Yuan Tian, Xuhong Zhang, Binbin Zhao, Gaoning Pan, Chenyang Lyu, Mathias Payer, Wenhai Wang, Raheem Beyah:
SyzTrust: State-aware Fuzzing on Trusted OS Designed for IoT Devices. CoRR abs/2309.14742 (2023) - Yuwen Lu, Ziang Tong, Qinyi Zhao, Chengzhi Zhang, Toby Jia-Jun Li:
UI Layout Generation with LLMs Guided by UI Grammar. CoRR abs/2310.15455 (2023) - Zengyang Li, Xiaoxiao Qi, Qinyi Yu, Peng Liang, Ran Mo, Chen Yang:
Exploring Multi-Programming-Language Commits and Their Impacts on Software Quality: An Empirical Study on Apache Projects. CoRR abs/2311.08424 (2023) - Xilong Zhao, Siyuan Bian, Yaoyun Zhang, Yuliang Zhang, Qinying Gu, Xinbing Wang, Chenghu Zhou, Nanyang Ye:
Domain Invariant Learning for Gaussian Processes and Bayesian Exploration. CoRR abs/2312.11318 (2023) - Qinying Liu, Kecheng Zheng, Wei Wu, Zhan Tong, Yu Liu, Wei Chen, Zilei Wang, Yujun Shen:
TagAlign: Improving Vision-Language Alignment with Multi-Tag Classification. CoRR abs/2312.14149 (2023) - 2022
- Yupan Shi, Qinying Ma, Chunyu Feng, Mingwei Wang, Hualong Wang, Bing Li, Jiyu Fang, Shaochen Ma, Xin Guo, Tongliang Li:
Microstate feature fusion for distinguishing AD from MCI. Health Inf. Sci. Syst. 10(1): 16 (2022) - Zengyang Li, Xiaoxiao Qi, Qinyi Yu, Peng Liang, Ran Mo, Chen Yang:
Exploring multi-programming-language commits and their impacts on software quality: An empirical study on Apache projects. J. Syst. Softw. 194: 111508 (2022) - Fanlei Meng, Qinyin Fan, Yue Li:
Self-Supervised Learning for Seismic Data Reconstruction and Denoising. IEEE Geosci. Remote. Sens. Lett. 19: 1-5 (2022)
skipping 25 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-28 14:49 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint