Yihe Zhang

Orcid: 0009-0009-7739-3870

According to our database1, Yihe Zhang authored at least 22 papers between 2019 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Data-driven modeling for thermo-elastic properties of vacancy-defective graphene reinforced nanocomposites with its application to functionally graded beams.
Eng. Comput., August, 2023

MMST-ViT: Climate Change-aware Crop Yield Prediction via Multi-Modal Spatial-Temporal Vision Transformer.
CoRR, 2023

Comprehensive Transformer-Based Model Architecture for Real-World Storm Prediction.
Proceedings of the Machine Learning and Knowledge Discovery in Databases: Applied Data Science and Demo Track, 2023

MMST-ViT: Climate Change-aware Crop Yield Prediction via Multi-Modal Spatial-Temporal Vision Transformer.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

Devils in Your Apps: Vulnerabilities and User Privacy Exposure in Mobile Notification Systems.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023

2022
Performance Optimization Blockchain-Enabled Fog Computing with Deep Reinforcement Learning.
Proceedings of the 12th International Conference on Communication and Network Security, 2022

Resource Allocation for Blockchain-Enabled Fog Computing with Deep Reinforcement Learning.
Proceedings of the 12th International Conference on Communication and Network Security, 2022

Decentralized Consensus Blockchain-Based Authentication Algorithm Using in Secure Internet of Vehicles.
Proceedings of the 12th International Conference on Communication and Network Security, 2022

Deep Reinforcement Learning-Based Computation Offloading for Anti-jamming in Fog Computing Networks.
Proceedings of the 12th International Conference on Communication and Network Security, 2022

Detection Scheme of Impersonation Attack Based on Sarsa(Lambda) Algorithm in Fog Computing.
Proceedings of the 12th International Conference on Communication and Network Security, 2022

SPoW: A solution to the problem of centralization of computing power.
Proceedings of the 12th International Conference on Communication and Network Security, 2022

Blockchain Enable IoT Using Deep Reinforcement Learning: A Novel Architecture to Ensure Security of Data Sharing and Storage.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022

2021
Precise Weather Parameter Predictions for Target Regions via Neural Networks.
Proceedings of the Machine Learning and Knowledge Discovery in Databases. Applied Data Science Track, 2021

Reverse Attack: Black-box Attacks on Collaborative Recommendation.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Platform-Oblivious Anti-Spam Gateway.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
Enabling Encrypted Boolean Queries in Geographically Distributed Databases.
IEEE Trans. Parallel Distributed Syst., 2020

Towards Poisoning the Neural Collaborative Filtering-Based Recommender Systems.
Proceedings of the Computer Security - ESORICS 2020, 2020

2019
An Experimental Study on the Abrasive Machining Process of Electronic Substrate Material With A Novel Ultraviolet-Curable Resin Bond Diamond Lapping Plate.
IEEE Access, 2019

Tracking of Intracavitary Instrument Markers in Coronary Angiography Images.
Proceedings of the Machine Learning and Medical Engineering for Cardiovascular Health and Intravascular Imaging and Computer Assisted Stenting, 2019

Pseudo-Honeypot: Toward Efficient and Scalable Spam Sniffer.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

Toward Efficient Spammers Gathering in Twitter Social Networks.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

TweetScore: Scoring Tweets via Social Attribute Relationships for Twitter Spammer Detection.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019


  Loading...