Yuntao Zhao
Orcid: 0000-0001-9330-2144
  According to our database1,
  Yuntao Zhao
  authored at least 39 papers
  between 2008 and 2025.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
  2025
IoT-ONDDQN: A detection model based on deep reinforcement learning for IoT data security.
    
  
    Comput. Commun., 2025
    
  
Hard example learning based on neural collapse for class-imbalanced semantic segmentation.
    
  
    Appl. Soft Comput., 2025
    
  
IVeri: A Scalable Privacy-Preserving Interdomain Configuration Verification Tool via Secure Multi-Party Computation.
    
  
    Proceedings of the 33rd IEEE/ACM International Symposium on Quality of Service, 2025
    
  
A Knowledge Reasoning Modeling for security vulnerability databases based on Gaussian-SVM hybrid clustering.
    
  
    Proceedings of the 2025 2nd International Conference on Generative Artificial Intelligence and Information Security, 2025
    
  
CBAM-EANet: Convolutional Block Attention Module Enhanced Efficient Network for Detection on Distributed Denial of Service Attacks.
    
  
    Proceedings of the 2025 2nd International Conference on Generative Artificial Intelligence and Information Security, 2025
    
  
  2024
Efficient Detection of Malicious Traffic Using a Decision Tree-Based Proximal Policy Optimisation Algorithm: A Deep Reinforcement Learning Malicious Traffic Detection Model Incorporating Entropy.
    
  
    Entropy, August, 2024
    
  
Pairwise-Pixel Self-Supervised and Superpixel-Guided Prototype Contrastive Loss for Weakly Supervised Semantic Segmentation.
    
  
    Cogn. Comput., May, 2024
    
  
SeMalBERT: Semantic-based malware detection with bidirectional encoder representations from transformers.
    
  
    J. Inf. Secur. Appl., February, 2024
    
  
Prototype Consistency Learning for Medical Image Segmentation by Cross Pseudo Supervision.
    
  
    Cogn. Comput., January, 2024
    
  
MalEXLNet: A semantic analysis and detection method of malware API sequence based on EXLNet model.
    
  
    KSII Trans. Internet Inf. Syst., 2024
    
  
A Method for Generating Malware Countermeasure Samples Based on Pixel Attention Mechanism.
    
  
    KSII Trans. Internet Inf. Syst., 2024
    
  
A performance indicator-based evolutionary algorithm for expensive high-dimensional multi-/many-objective optimization.
    
  
    Inf. Sci., 2024
    
  
OneR-DQN: a botnet traffic detection model based on deep Q network algorithm in deep reinforcement learning.
    
  
    Int. J. Secur. Networks, 2024
    
  
An infill sampling criterion based on improvement of probability and mapping crowding distance for expensive multi/many-objective optimization.
    
  
    Eng. Appl. Artif. Intell., 2024
    
  
Active Disturbance Rejection Power Predictive Control of Rectifier Based on Bus Voltage Optimized ESO Observer.
    
  
    IEEE Access, 2024
    
  
  2023
    Appl. Intell., September, 2023
    
  
Hybrid multi-objective optimization algorithm based on angle competition and neighborhood protection mechanism.
    
  
    Appl. Intell., April, 2023
    
  
    J. Electronic Imaging, 2023
    
  
MalGA-LSTM: a malicious code detection model based on genetic algorithm optimising LSTM trainable parameters.
    
  
    Int. J. Secur. Networks, 2023
    
  
  2022
Improved whale algorithm and its application in cobot excitation trajectory optimization.
    
  
    Int. J. Intell. Robotics Appl., 2022
    
  
    Proceedings of the 2022 International Conference on Computer and Information Processing Technology Virtual Event, 2022
    
  
  2020
Optimization of geometry quality model for wire and arc additive manufacture based on adaptive multi-objective grey wolf algorithm.
    
  
    Soft Comput., 2020
    
  
    Soft Comput., 2020
    
  
Prediction of mechanical properties of micro-alloyed steels via neural networks learned by water wave optimization.
    
  
    Neural Comput. Appl., 2020
    
  
A Malware Detection Method of Code Texture Visualization Based on an Improved Faster RCNN Combining Transfer Learning.
    
  
    IEEE Access, 2020
    
  
    Proceedings of the ISMSI '20: 2020 4th International Conference on Intelligent Systems, 2020
    
  
  2019
MalDeep: A Deep Learning Classification Framework against Malware Variants Based on Texture Visualization.
    
  
    Secur. Commun. Networks, 2019
    
  
A Feature Extraction Method of Hybrid Gram for Malicious Behavior Based on Machine Learning.
    
  
    Secur. Commun. Networks, 2019
    
  
融合自适应差分进化机制的多目标灰狼优化算法 (Multi-objective Grey Wolf Optimization Hybrid Adaptive Differential Evolution Mechanism).
    
  
    计算机科学, 2019
    
  
A Scheduling Method of Cross-Layers Optimization of Polling Weight for AOS Multiplexing.
    
  
    Int. J. Digit. Multim. Broadcast., 2019
    
  
  2018
A Classification Detection Algorithm Based on Joint Entropy Vector against Application-Layer DDoS Attack.
    
  
    Secur. Commun. Networks, 2018
    
  
A Scheduling Model of Isochronous Frame Generation on Self-similar Traffic of AOS Multiplexing.
    
  
    Int. J. Online Eng., 2018
    
  
An Energy Efficient and QoS Aware Routing Algorithm Based on Data Classification for Industrial Wireless Sensor Networks.
    
  
    IEEE Access, 2018
    
  
Designing Neural Networks Using Novel Water Wave Optimization Based Memetic Algorithm.
    
  
    Proceedings of the 14th International Conference on Natural Computation, 2018
    
  
  2017
An Improved Ant Colony Algorithm for Path Planning in One Scenic Area With Many Spots.
    
  
    IEEE Access, 2017
    
  
  2016
An Algorithm of Traffic Perception of DDoS Attacks against SOA Based on Time United Conditional Entropy.
    
  
    J. Electr. Comput. Eng., 2016
    
  
  2009
    Proceedings of the first ACM/SIGEVO Summit on Genetic and Evolutionary Computation, 2009
    
  
  2008
An Improved Resistant to Destruction Routing Algorithm Based on LEO Satellite Network.
    
  
    Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008
    
  
    Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008