Yunzhe Tian

Orcid: 0000-0003-0015-7780

According to our database1, Yunzhe Tian authored at least 12 papers between 2020 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Mitigating Overfitting for Deep Learning-based Aging-related Bug Prediction via Brain-inspired Regularization in Spiking Neural Networks.
Proceedings of the 34th IEEE International Symposium on Software Reliability Engineering, ISSRE 2023, 2023

Robust Reinforcement Learning via Progressive Task Sequence.
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023

2022
Multiagent Reinforcement Learning-Based Signal Planning for Resisting Congestion Attack in Green Transportation.
IEEE Trans. Green Commun. Netw., 2022

2021
A Hierarchical Energy-Efficient Service Selection Approach With QoS Constraints for Internet of Things.
IEEE Trans. Green Commun. Netw., 2021

Towards Revealing Parallel Adversarial Attack on Politician Socialnet of Graph Structure.
Secur. Commun. Networks, 2021

A Training-Based Identification Approach to VIN Adversarial Examples in Path Planning.
J. Circuits Syst. Comput., 2021

Protecting Reward Function of Reinforcement Learning via Minimal and Non-catastrophic Adversarial Trajectory.
Proceedings of the 40th International Symposium on Reliable Distributed Systems, 2021

Improving Convolutional Neural Network-Based Webshell Detection Through Reinforcement Learning.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

2020
Exposing Spoofing Attack on Flocking-Based Unmanned Aerial Vehicle Cluster: A Threat to Swarm Intelligence.
Secur. Commun. Networks, 2020

Exploring Data Correlation between Feature Pairs for Generating Constraint-based Adversarial Examples.
Proceedings of the 26th IEEE International Conference on Parallel and Distributed Systems, 2020

Bidirectional RNN-Based Few-Shot Training for Detecting Multi-stage Attack.
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020

Type-Aware Open Information Extraction via Graph Augmentation Model.
Proceedings of the Knowledge Graph and Semantic Computing: Knowledge Graph and Cognitive Intelligence, 2020


  Loading...