Yusen Zhang

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Known people with the same name:

Bibliography

2025
Break Stylistic Sophon: Are We Really Meant to Confine the Imagination in Style Transfer?
CoRR, June, 2025

Training Step-Level Reasoning Verifiers with Formal Verification Tools.
CoRR, May, 2025

NeuroGen: Neural Network Parameter Generation via Large Language Models.
CoRR, May, 2025

GREATERPROMPT: A Unified, Customizable, and High-Performing Open-Source Toolkit for Prompt Optimization.
CoRR, April, 2025

When Reasoning Meets Compression: Benchmarking Compressed Large Reasoning Models on Complex Reasoning Tasks.
CoRR, April, 2025

Efficient Energy Disaggregation via Residual Learning-Based Depthwise Separable Convolutions and Segmented Inference.
IEEE Trans. Ind. Informatics, March, 2025

Shape-Aware Nonintrusive Load Disaggregation via Prior-Guided State-Reused Multibranch Cross-Transformer.
IEEE Trans. Instrum. Meas., 2025

Multiple one-shot image generation via deep structure reshuffle.
Neural Networks, 2025

KABON: Knowledge Aggregation with Vision-Language Model for Black-Box Open-Set Domain Adaptation.
Proceedings of the 2025 IEEE International Conference on Acoustics, 2025

Chain-of-Scrutiny: Detecting Backdoor Attacks for Large Language Models.
Proceedings of the Findings of the Association for Computational Linguistics, 2025

2024
Adaptive Gaussian Filter Based on ICEEMDAN Applying in Non-Gaussian Non-stationary Noise.
Circuits Syst. Signal Process., July, 2024

FedSH: a federated learning framework for safety helmet wearing detection.
Neural Comput. Appl., 2024

Chain-of-Scrutiny: Detecting Backdoor Attacks for Large Language Models.
CoRR, 2024

A General Benchmark Framework is Dynamic Graph Neural Network Need.
CoRR, 2024

A Short-Term Industrial Load Forecasting Model Based on VMD-FFEN-ITR.
Proceedings of the 22nd IEEE International Conference on Industrial Informatics, 2024

Fault Detection Based on Attention Mechanism for Grid-Connected Photovoltaic Systems.
Proceedings of the 22nd IEEE International Conference on Industrial Informatics, 2024

Degradation Modes Identification of Lithium-Ion Batteries Based on Flexible Discharge Data.
Proceedings of the American Control Conference, 2024

2023
A Learnable Image-Based Load Signature Construction Approach in NILM for Appliances Identification.
IEEE Trans. Smart Grid, September, 2023

A detector for page-level handwritten music object recognition based on deep learning.
Neural Comput. Appl., May, 2023

2022
AiM: Taking Answers in Mind to Correct Chinese Cloze Tests in Educational Applications.
Proceedings of the 29th International Conference on Computational Linguistics, 2022

2011
Formal Threat Analysis for Ad-Hoc Routing Protocol: Modelling and Checking the Sybil Attack.
Intell. Autom. Soft Comput., 2011

2007
Universal Steganalysis Using Multiwavelet Higher-Order Statistics and Support Vector Machines.
Proceedings of the Advances in Neural Networks, 2007


  Loading...