Yiting Zhang

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2025
Evo-MARL: Co-Evolutionary Multi-Agent Reinforcement Learning for Internalized Safety.
CoRR, August, 2025

An Adaptive DoH Encrypted Tunnel Detection Method Based on Contrastive Learning.
IEEE Internet Things J., July, 2025

Certifiably Safe Manipulation of Deformable Linear Objects via Joint Shape and Tension Prediction.
CoRR, May, 2025

XPG-RL: Reinforcement Learning with Explainable Priority Guidance for Efficiency-Boosted Mechanical Search.
CoRR, April, 2025

AerialVG: A Challenging Benchmark for Aerial Visual Grounding by Exploring Positional Relations.
CoRR, April, 2025

Achilles Heel of Distributed Multi-Agent Systems.
CoRR, April, 2025

OceanSim: A GPU-Accelerated Underwater Robot Perception Simulation Framework.
CoRR, March, 2025

Precision strike: Precise backdoor attack with dynamic trigger.
Comput. Secur., 2025

Indexing history spatio-temporal samples with error-bounded regression Hilbert trees.
Comput. Electr. Eng., 2025

Unsupervised Deep Clustering for Human Behavior Understanding.
Proceedings of the 3rd International Workshop on Human-Centered Sensing, 2025

DUal-NET: A Transformer-Based U-Net Model for Denoising Bone Conduction Speech.
Proceedings of the 3rd International Workshop on Human-Centered Sensing, 2025

DomAIn: Towards Programless Smart Homes.
Proceedings of the 3rd International Workshop on Human-Centered Sensing, 2025

A Comprehensive Framework for Fine-Grained Object Recognition in Remote Sensing.
Proceedings of the Computational Visual Media - 13th International Conference, 2025

CSTree-SRI: Introspection-Driven Cognitive Semantic Tree for Multi-Turn Question Answering over Extra-Long Contexts.
Proceedings of the 63rd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2025

2024
An Improved YOLOv8 Network for Detecting Electric Pylons Based on Optical Satellite Image.
Sensors, June, 2024

A Detection Method Against Selfish Mining-Like Attacks Based on Ensemble Deep Learning in IoT.
IEEE Internet Things J., June, 2024

Bayesian Deep Learning via Expectation Maximization and Turbo Deep Approximate Message Passing.
IEEE Trans. Signal Process., 2024

FreeGaussian: Guidance-free Controllable 3D Gaussian Splats with Flow Derivatives.
CoRR, 2024

An Expeditious Spatial Mean Radiant Temperature Mapping Framework using Visual SLAM and Semantic Segmentation.
CoRR, 2024

Knowledge Graph Large Language Model (KG-LLM) for Link Prediction.
CoRR, 2024

Bayesian Federated Learning Via Expectation Maximization and Turbo Deep Approximate Message Passing.
CoRR, 2024

Privacy Protection for Image Sharing Using Reversible Adversarial Examples.
Proceedings of the IEEE International Conference on Communications, 2024

Implicit Event-RGBD Neural SLAM.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024

Differentiable Discrete Elastic Rods for Real-Time Modeling of Deformable Linear Objects.
Proceedings of the Conference on Robot Learning, 6-9 November 2024, Munich, Germany., 2024

On Joint Dereverberation and Single Moving Source Separation with Online Source Steering.
Proceedings of the Asia Pacific Signal and Information Processing Association Annual Summit and Conference, 2024

2023
A mini-batch algorithm for large-scale learning problems with adaptive step size.
Digit. Signal Process., November, 2023

Achieving optimal rewards in cryptocurrency stubborn mining with state transition analysis.
Inf. Sci., May, 2023

Computing the Tracy-Widom distribution for arbitrary β>0.
CoRR, 2023

A Family of High Gain Converters Based on Switched Inductor and Switched Capacitor Units.
Proceedings of the 49th Annual Conference of the IEEE Industrial Electronics Society, 2023

2022
An intelligent forecast for COVID-19 based on single and multiple features.
Int. J. Intell. Syst., 2022

Optimal Revenue Analysis of the Stubborn Mining Based on Markov Decision Process.
Proceedings of the Machine Learning for Cyber Security - 4th International Conference, 2022

2021
BSMRL: Bribery Selfish Mining with Reinforcement Learning.
Proceedings of the Data Mining and Big Data - 6th International Conference, 2021

2020
FingerAuth: 3D magnetic finger motion pattern based implicit authentication for mobile devices.
Future Gener. Comput. Syst., 2020

Vroom!: A Search Engine for Sounds by Vocal Imitation Queries.
Proceedings of the CHIIR '20: Conference on Human Information Interaction and Retrieval, 2020

2019
Sound Search by Text Description or Vocal Imitation?
CoRR, 2019

2018
Fingerprinting Network Entities Based on Traffic Analysis in High-Speed Network Environment.
Secur. Commun. Networks, 2018

Edible fiducial marker made of edible retroreflector.
Comput. Graph., 2018

Path Planning Algorithm for UAV Sensing Data Collection Based on the Efficacy Function.
Proceedings of the IoT as a Service - 4th EAI International Conference, 2018

2017
Edible retroreflector.
Proceedings of the 23rd ACM Symposium on Virtual Reality Software and Technology, 2017

2013
Unintended adverse consequences of introducing electronic health records in residential aged care homes.
Int. J. Medical Informatics, 2013

2012
The benefits of introducing electronic health records in residential aged care facilities: A multiple case study.
Int. J. Medical Informatics, 2012

2011
Comparing the Macroeconomic Responses of US and Japan through Time Series Segmentation.
Proceedings of the Knowledge Discovery, Knowledge Engineering and Knowledge Management, 2011

Time Series Segmentation as a Discovery Tool - A Case Study of the US and Japanese Financial Markets.
Proceedings of the KDIR 2011, 2011


  Loading...