Yuchen Zhou

Orcid: 0000-0002-2470-0293

According to our database1, Yuchen Zhou authored at least 129 papers between 1993 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Research on Multi-Source Heterogeneous Big Data Fusion Method Based on Feature Level.
Int. J. Pattern Recognit. Artif. Intell., February, 2024

Distributed control for semi-grant-free non-orthogonal multiple access.
Wirel. Networks, January, 2024

Adaptive Data Transmission and Computing for Vehicles in the Internet-of-Intelligence.
IEEE Trans. Veh. Technol., 2024

EST-TSANet: Video-Based Remote Heart Rate Measurement Using Temporal Shift Attention Network and ESTmap.
IEEE Trans. Instrum. Meas., 2024

Self-organized swarm robot for multi-target trapping based on self-regulated density interaction.
Inf. Sci., 2024

CEBin: A Cost-Effective Framework for Large-Scale Binary Code Similarity Detection.
CoRR, 2024

CLAP: Learning Transferable Binary Code Representations with Natural Language Supervision.
CoRR, 2024

2023
PIT: Progressive Interaction Transformer for Pedestrian Crossing Intention Prediction.
IEEE Trans. Intell. Transp. Syst., December, 2023

Characterizing Pairwise U-Turn Behavior in Fish: A Data-Driven Analysis.
Entropy, December, 2023

Resource allocation and energy trading in the short blocklength regime for radio access networks.
IET Commun., November, 2023

Explainable Hyperbolic Temporal Point Process for User-Item Interaction Sequence Generation.
ACM Trans. Inf. Syst., October, 2023

Learning From Interaction-Enhanced Scene Graph for Pedestrian Collision Risk Assessment.
IEEE Trans. Intell. Veh., September, 2023

Latency optimization of task offloading in NOMA-MEC systems.
IET Commun., March, 2023

Cascade Learning for Driver Facial Monitoring.
IEEE Trans. Intell. Veh., January, 2023

A dynamic graph Hawkes process based on linear complexity self-attention for dynamic recommender systems.
PeerJ Comput. Sci., 2023

Research on the construction of marine creatures classification and identification model based on ResNet50.
J. Comput. Methods Sci. Eng., 2023

PartSLIP++: Enhancing Low-Shot 3D Part Segmentation via Multi-View Instance Segmentation and Maximum Likelihood Estimation.
CoRR, 2023

How Far Have We Gone in Vulnerability Detection Using Large Language Models.
CoRR, 2023

Divergences between Language Models and Human Brains.
CoRR, 2023

Heteroskedastic Tensor Clustering.
CoRR, 2023

Grounding Visual Illusions in Language: Do Vision-Language Models Perceive Illusions Like Humans?
CoRR, 2023

Efficiently Visualizing Large Graphs.
CoRR, 2023

kTrans: Knowledge-Aware Transformer for Binary Code Embedding.
CoRR, 2023

Quantifying the Roles of Visual, Linguistic, and Visual-Linguistic Complexity in Verb Acquisition.
CoRR, 2023

Deflated HeteroPCA: Overcoming the curse of ill-conditioning in heteroskedastic PCA.
CoRR, 2023

Energy-Delay Tradeoff in Helper-Assisted NOMA-MEC Systems: A Four-Sided Matching Algorithm.
CoRR, 2023

Multi-Aspect Heterogeneous Graph Augmentation.
Proceedings of the ACM Web Conference 2023, 2023

OntoSustain: Towards an Ontology for Corporate Sustainability Reporting.
Proceedings of the ISWC 2023 Posters, 2023

Learning from Easy to Hard Pairs: Multi-step Reasoning Network for Human-Object Interaction Detection.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

SweepCache: Intermittence-Aware Cache on the Cheap.
Proceedings of the 56th Annual IEEE/ACM International Symposium on Microarchitecture, 2023

On the MEC Service Reliability of Two-Tier HetNets: A Stochastic Perspective.
Proceedings of the 23rd IEEE International Conference on Communication Technology, 2023

Cooperative NOMA for Simultaneous Uplink and Downlink Transmission.
Proceedings of the 23rd IEEE International Conference on Communication Technology, 2023

Grounding Visual Illusions in Language: Do Vision-Language Models Perceive Illusions Like Humans?
Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing, 2023

An improved method for reasonable segmentation based on Post-DAE.
Proceedings of the IEEE International Conference on Cyborg and Bionic Systems, 2023

2022
API-GNN: attribute preserving oriented interactive graph neural network.
World Wide Web, 2022

Joint Resource Allocation for Ultra-Reliable and Low-Latency Radio Access Networks With Edge Computing.
IEEE Trans. Wirel. Commun., 2022

Driver attention prediction based on convolution and transformers.
J. Supercomput., 2022

Optimal High-Order Tensor SVD via Tensor-Train Orthogonal Iteration.
IEEE Trans. Inf. Theory, 2022

Sparse Group Lasso: Optimal Sample Complexity, Convergence Rate, and Statistical Inference.
IEEE Trans. Inf. Theory, 2022

System Design and SVM Identification Algorithm for the Ultrasonically Catalyzed Single-Sensor E-Nose.
IEEE Trans. Instrum. Meas., 2022

DNS Poisoning of Operating System Caches: Attacks and Mitigations.
IEEE Trans. Dependable Secur. Comput., 2022

A novel resource management scheme for virtualized cyber-physical-social system.
Phys. Commun., 2022

Structure-Based Discovery of a Novel Class of Small-Molecule Pure Antagonists of Integrin αVβ3.
J. Chem. Inf. Model., 2022

Simultaneous detection and tracking using deep learning and integrated channel feature for ambint traffic light recognition.
J. Ambient Intell. Humaniz. Comput., 2022

Dependent task offloading with energy-latency tradeoff in mobile edge computing.
IET Commun., 2022

Capacity enhancement for cooperative NOMA systems by successive user relaying.
IET Commun., 2022

Cooperative NOMA-MEC With Helper Scheduling.
IEEE Commun. Lett., 2022

Server Deployment and Load Balancing in Stochastic Mobile Edge Computing Networks.
IEEE Commun. Lett., 2022

Max-Min Fair Beamforming for IRS-Aided Secure NOMA Systems.
IEEE Commun. Lett., 2022

Secure coordinated direct and untrusted relay transmissions via interference engineering.
Sci. China Inf. Sci., 2022

H2-FDetector: A GNN-based Fraud Detector with Homophilic and Heterophilic Connections.
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022

Managing Intermittent Renewable Generation with Battery Storage using a Deep Reinforcement Learning Strategy.
Proceedings of the WI for Grand Challenges, 2022

Resource Allocation for Intelligent Reflecting Surface-Assisted Cooperative NOMA-URLLC Networks in Smart Grid.
Proceedings of the IEEE International Conference on Communications, 2022

Task-level Relations Modelling for Graph Meta-learning.
Proceedings of the IEEE International Conference on Data Mining, 2022

Enriching an online suicidal dataset with active machine learning.
Proceedings of the ACM SE '22: 2022 ACM Southeast Conference, Virtual Event, April 18, 2022

2021
On the Application of Cooperative NOMA to Spatially Random Wireless Caching Networks.
IEEE Trans. Veh. Technol., 2021

Low Velocity Impact Localization of Variable Thickness Composite Laminates.
Sensors, 2021

Joint computation and power allocation for NOMA enabled MEC networks in the finite blocklength regime.
IET Commun., 2021

Exploiting UAV-emitted jamming to improve physical-layer security: A 3D trajectory control perspective.
IET Commun., 2021

Hybrid fog/cloud computing resource allocation: Joint consideration of limited communication resources and user credibility.
Comput. Commun., 2021

Energy Consumption Minimization for Wireless Powered NOMA-MEC with User Cooperation.
Proceedings of the 13th International Conference on Wireless Communications and Signal Processing, 2021

Energy-Delay Tradeoff in Device-Assisted NOMA MEC Systems: A Matching-Based Algorithm.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2021

Innocent Until Proven Guilty (IUPG): Building Deep Learning Models with Embedded Robustness to Out-Of-Distribution Content.
Proceedings of the IEEE Security and Privacy Workshops, 2021

Data Trading for Blockchain-Based Data Market in Cyber-Physical-Social Smart Systems.
Proceedings of the 32nd IEEE Annual International Symposium on Personal, 2021

Understanding the performance of webassembly applications.
Proceedings of the IMC '21: ACM Internet Measurement Conference, 2021

Field-Emission Enhanced Contacts for Disordered Semiconductor based Thin-Film Transistors.
Proceedings of the Device Research Conference, 2021

A common framework for quantifying the learnability of nouns and verbs.
Proceedings of the 43rd Annual Meeting of the Cognitive Science Society, 2021

Deep Differential Amplifier for Extractive Summarization.
Proceedings of the 59th Annual Meeting of the Association for Computational Linguistics and the 11th International Joint Conference on Natural Language Processing, 2021

2020
User Satisfaction Oriented Resource Allocation for Fog Computing: A Mixed-Task Paradigm.
IEEE Trans. Commun., 2020

Stochastic Workload Scheduling for Uncoordinated Datacenter Clouds with Multiple QoS Constraints.
IEEE Trans. Cloud Comput., 2020

Stochastic scheduling for variation-aware virtual machine placement in a cloud computing CPS.
Future Gener. Comput. Syst., 2020

Inference for Low-rank Tensors - No Need to Debias.
CoRR, 2020

Cyber-Physical-Social Systems: A State-of-the-Art Survey, Challenges and Opportunities.
IEEE Commun. Surv. Tutorials, 2020

An Energy-Efficient Mixed-Task Paradigm in Resource Allocation for Fog Computing.
Proceedings of the 2020 IEEE Wireless Communications and Networking Conference, 2020


2019
Transmit Beamforming for Layered Physical Layer Security.
IEEE Trans. Veh. Technol., 2019

Smart Home Cyberattack Detection Framework for Sponsor Incentive Attacks.
IEEE Trans. Smart Grid, 2019

Stochastic Buffering for Bundled SWCNT Interconnects Considering Unidimensional Fabrication Variation.
IEEE Trans. Emerg. Top. Comput., 2019

Robust Energy-Efficient Resource Allocation for IoT-Powered Cyber-Physical-Social Smart Systems With Virtualization.
IEEE Internet Things J., 2019

Energy-efficiency fog computing resource allocation in cyber physical internet of things systems.
IET Commun., 2019

Artificial-Noise-Aided Optimal Beamforming in Layered Physical Layer Security.
IEEE Commun. Lett., 2019

Elites and foreign actors among the alt-right: The Gab social media platform.
First Monday, 2019

Coalesced TLB to Exploit Diverse Contiguity of Memory Mapping.
CoRR, 2019

Detecting Malicious Campaigns in Obfuscated JavaScript with Scalable Behavioral Analysis.
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019

Optimal Analysis of Subset-Selection Based L_p Low-Rank Approximation.
Proceedings of the Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, 2019

UAFA: Unsupervised Attribute-Friendship Attention Framework for User Representation.
Proceedings of the Knowledge Science, Engineering and Management, 2019

Collaborative Client-Side DNS Cache Poisoning Attack.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Improved Grey Relational Analysis for Model Validation.
Proceedings of the Methods and Applications for Modeling and Simulation of Complex Systems, 2019

2018
Communications, Caching, and Computing for Next Generation HetNets.
IEEE Wirel. Commun., 2018

Data and Decision Intelligence for Human-in-the-Loop Cyber-Physical Systems: Reference Model, Recent Progresses and Challenges.
J. Signal Process. Syst., 2018

Cache-Aware Multicast Beamforming Design for Multicell Multigroup Multicast.
IEEE Trans. Veh. Technol., 2018

Energy Theft Detection in Multi-Tenant Data Centers with Digital Protective Relay Deployment.
IEEE Trans. Sustain. Comput., 2018

Toward Energy-Awareness Smart Building: Discover the Fingerprint of Your Electrical Appliances.
IEEE Trans. Ind. Informatics, 2018

Combating Coordinated Pricing Cyberattack and Energy Theft in Smart Home Cyber-Physical Systems.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2018

Video Transcoding, Caching, and Multicast for Heterogeneous Networks Over Wireless Network Virtualization.
IEEE Commun. Lett., 2018

A Non-asymptotic, Sharp, and User-friendly Reverse Chernoff-Cramèr Bound.
CoRR, 2018

Betrayed by Your Dashboard: Discovering Malicious Campaigns via Web Analytics.
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018

Low Rank Approximation of Binary Matrices: Column Subset Selection and Generalizations.
Proceedings of the 43rd International Symposium on Mathematical Foundations of Computer Science, 2018

Weakly Supervised Audio Source Separation via Spectrum Energy Preserved Wasserstein Learning.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

Dropout Training, Data-dependent Regularization, and Generalization Bounds.
Proceedings of the 35th International Conference on Machine Learning, 2018

An Intelligent Model Validation Method Based on ECOC SVM.
Proceedings of the 10th International Conference on Computer Modeling and Simulation, 2018

2017
Resource Allocation for Information-Centric Virtualized Heterogeneous Networks With In-Network Caching and Mobile Edge Computing.
IEEE Trans. Veh. Technol., 2017

Cooperative Cross-Layer Resource Allocation for Self-Healing in Interworking of WLAN and Femtocell Systems.
IEEE Commun. Lett., 2017

Information-Centric Wireless Networks with Mobile Edge Computing.
CoRR, 2017

Discover the fingerprint of electrical appliance: Online appliance behavior learning and detection in smart homes.
Proceedings of the 2017 IEEE SmartWorld, 2017

Virtual resource allocation for information-centric heterogeneous networks with mobile edge computing.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017

2016
Fairness Resource Allocation for Parallel Multi-Radio Access in Cognitive Multi-Cell.
Wirel. Pers. Commun., 2016

Buffering Carbon Nanotube Interconnects Considering Inductive Effects.
J. Circuits Syst. Comput., 2016

Energy-efficiency resource allocation for cognitive heterogeneous networks with imperfect channel state information.
IET Commun., 2016

Hardware Software Co-design for Automotive CPS using Architecture Analysis and Design Language.
CoRR, 2016

Leveraging carbon nanotube technologies in developing Physically Unclonable Function for cyber-physical system authentication.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

Analysis of production data manipulation attacks in petroleum cyber-physical systems.
Proceedings of the 35th International Conference on Computer-Aided Design, 2016

Timed automata approach for motion planning using metric interval temporal logic.
Proceedings of the 15th European Control Conference, 2016

Time varying control set design for UAV collision avoidance using reachable tubes.
Proceedings of the 55th IEEE Conference on Decision and Control, 2016

2015
A Dynamic Programming Algorithm for Leveraging Probabilistic Detection of Energy Theft in Smart Home.
IEEE Trans. Emerg. Top. Comput., 2015

On Low Rank Approximation of Binary Matrices.
CoRR, 2015

Understanding and Monitoring Embedded Web Scripts.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Optimal mission planner with timed temporal logic constraints.
Proceedings of the 14th European Control Conference, 2015

Reachable set approach to collision avoidance for UAVs.
Proceedings of the 54th IEEE Conference on Decision and Control, 2015

2014
SSOScan: Automated Testing of Web Applications for Single Sign-On Vulnerabilities.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Dynamic programming based game theoretic algorithm for economical multi-user smart home scheduling.
Proceedings of the IEEE 57th International Midwest Symposium on Circuits and Systems, 2014

Buffering Single-Walled Carbon Nanotubes Bundle Interconnects for Timing Optimization.
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2014

2013
Compositional Analysis of Dynamic Bayesian Networks and Applications to Complex Dynamic System Decomposition.
Proceedings of the Conference on Systems Engineering Research, 2013

Explicating SDKs: Uncovering Assumptions Underlying Secure Authentication and Authorization.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

CPS Modeling Integration Hub and Design Space Exploration with Application to Microrobotics.
Proceedings of the Control of Cyber-Physical Systems, 2013

2012
Error variance-constrained <sub>∞</sub> filtering for a class of nonlinear stochastic systems with degraded measurements: the finite horizon case.
Int. J. Syst. Sci., 2012

2011
Progress and outlook for STT-MRAM.
Proceedings of the 2011 IEEE/ACM International Conference on Computer-Aided Design, 2011

Protecting Private Web Content from Embedded Scripts.
Proceedings of the Computer Security - ESORICS 2011, 2011

1993
Tracking control of multiple flexible link robots.
Proceedings of 1993 IEEE/RSJ International Conference on Intelligent Robots and Systems, 1993


  Loading...