Yusi Zhang

Orcid: 0000-0002-8395-0065

According to our database1, Yusi Zhang authored at least 13 papers between 2015 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Comparison of Phenological Parameters Extracted from SIF, NDVI and NIRv Data on the Mongolian Plateau.
Remote. Sens., January, 2023

2022
Urban Vitality and its Influencing Factors: Comparative Analysis Based on Taxi Trajectory Data.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2022

Towards spectral efficiency enhancement for IoT-aided smart transportation: a compressive OFDM transmission and regularized recovery approach.
EURASIP J. Adv. Signal Process., 2022

2021
MIRA: Leveraging Multi-Intention Co-click Information in Web-scale Document Retrieval using Deep Neural Networks.
Proceedings of the WWW '21: The Web Conference 2021, 2021

GLOW : Global Weighted Self-Attention Network for Web Search.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

2020
Partial FFT Demodulation Scheme Based on Fast Convolution Structure.
IEEE Signal Process. Lett., 2020

BISON: BM25-weighted Self-Attention Framework for Multi-Fields Document Search.
CoRR, 2020

2019
Autor3: <i>Au</i>tomated <i>R</i>eal-time <i>R</i>anking with <i>R</i>einforcement Learning in E-commerce Sponsored Search Advertising.
Proceedings of the 28th ACM International Conference on Information and Knowledge Management, 2019

2018
Onion-AE: Foundations of Nested Encryption.
Proc. Priv. Enhancing Technol., 2018

Simplifying Game-Based Definitions: Indistinguishability up to Correctness and Its Application to Stateful AE.
IACR Cryptol. ePrint Arch., 2018

DeepCredit: Exploiting User Cickstream for Loan Risk Prediction in P2P Lending.
Proceedings of the Twelfth International Conference on Web and Social Media, 2018

Defending against Social Network Sybils with Interaction Graph Embedding.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2015
Using an Error-Correction Code for Fast, Beyond-Birthday-Bound Authentication.
Proceedings of the Topics in Cryptology, 2015


  Loading...