Yunyi Zhang

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2024
On the continuous probability distribution attribute weight of belief rule base model.
J. Supercomput., November, 2024

GuessFuse: Hybrid Password Guessing With Multi-View.
IEEE Trans. Inf. Forensics Secur., 2024

A New Method for Oil-Immersed Transformers Fault Diagnosis Based on Evidential Reasoning Rule With Optimized Probabilistic Distributed.
IEEE Access, 2024

Cross the Zone: Toward a Covert Domain Hijacking via Shared DNS Infrastructure.
Proceedings of the 33rd USENIX Security Symposium, 2024

Into the Dark: Unveiling Internal Site Search Abused for Black Hat SEO.
Proceedings of the 33rd USENIX Security Symposium, 2024

Rethinking the Security Threats of Stale DNS Glue Records.
Proceedings of the 33rd USENIX Security Symposium, 2024

2023
A New Ensemble Learning Method for Multiple Fusion Weighted Evidential Reasoning Rule.
J. Electr. Comput. Eng., 2023

A Rotor Flywheel Robot: Land-air Amphibious Design and Control.
IROS, 2023

Wolf in Sheep's Clothing: Evaluating Security Risks of the Undelegated Record on DNS Hosting Services.
Proceedings of the 2023 ACM on Internet Measurement Conference, 2023

RBSAC: Rolling Balance Controller Based on Soft Actor-Critic Algorithm of the Unicycle Air Robot.
Proceedings of the Intelligent Robotics and Applications - 16th International Conference, 2023

2022
ViviPaint: Creating Dynamic Painting with a Thermochromic Toolkit.
Multimodal Technol. Interact., 2022

Inter-cloud secure data sharing and its formal verification.
Trans. Emerg. Telecommun. Technol., 2022

Gushing Resolvers: Measuring Open Resolvers' Recursive Behavior.
Proceedings of the 4th International Conference on Advanced Information Science and System, 2022

2021
Scaling Deep Contrastive Learning Batch Size with Almost Constant Peak Memory Usage.
CoRR, 2021

Hacks Hit the Phish: Phish Attack Detection Based on Hacks Search.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

Vulnerability Detection in C/C++ Source Code With Graph Representation Learning.
Proceedings of the 11th IEEE Annual Computing and Communication Workshop and Conference, 2021

Acceptance and Use of Mobile-Assisted Language Learning for Vocational College Students.
Proceedings of the 6GN for Future Wireless Networks - 4th EAI International Conference, 2021

2020
Complexity of Leading Digit Sequences.
Discret. Math. Theor. Comput. Sci., 2020

Web Attack Detection Based on User Behaviour Semantics.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020

Which DGA Family does A Malicious Domain Name Belong To.
Proceedings of the 5th IEEE International Conference on Data Science in Cyberspace, 2020

2019
Degree-biased random walk for large-scale network embedding.
Future Gener. Comput. Syst., 2019

2015
A New Multi-Service Token Bucket-Shaping Scheme Based on 802.11e.
Proceedings of the International Conference on Identification, 2015

2014
A Shearlet-Based Filter for Low-Dose Mammography.
Proceedings of the Breast Imaging - 12th International Workshop, IWDM 2014, Gifu City, Japan, June 29, 2014

2009
Packet-Level FEC Research over Wireless Networks.
Int. J. Distributed Sens. Networks, 2009

A Global Information Model for Service-Oriented System Engineering.
Proceedings of the 2009 IEEE International Conference on e-Business Engineering, 2009

An Energy-Efficient Data Gathering Protocol for Wireless Sensor Networks.
Proceedings of the 8th IEEE/ACIS International Conference on Computer and Information Science, 2009

2008
A hybrid modeling method of Chinese ancient architecture.
Proceedings of the 7th International Conference on Virtual Reality Continuum and its Applications in Industry, 2008

Cluster-Based Error Messages Detecting and Processing for Wireless Sensor Networks.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

2007
A Novel Adaptive Load Shedding Scheme for Data Stream Processing.
Proceedings of the Future Generation Communication and Networking, 2007


  Loading...