Остановите войну!
for scientists:
default search action
Yi Zhuang
Publications
- 2024
- [j23]Gongzhe Qiao, Yi Zhuang, Tong Ye, Yuan Qiao:
FRAMB: A man-machine cooperation risk assessment method for intelligent network information systems. J. Intell. Fuzzy Syst. 46(4): 10213-10229 (2024) - 2023
- [j21]Zeng Gao, Yi Zhuang, Jingjing Gu, Bo Yang, Zhicheng Nie:
A joint local-global search mechanism for long-term tracking with dynamic memory network. Expert Syst. Appl. 223: 119890 (2023) - [j20]Aravind Nagulu, Yi Zhuang, Mingyu Yuan, Sasank Garikapati, Harish Krishnaswamy:
A Third-Order Quasi-Elliptic N-Path Filter With Enhanced Linearity Through Clock Boosting. IEEE J. Solid State Circuits 58(12): 3351-3363 (2023) - [j17]Zeng Gao, Yi Zhuang, Chen Chen, Qiuhong Wang:
Hybrid modified marine predators algorithm with teaching-learning-based optimization for global optimization and abrupt motion tracking. Multim. Tools Appl. 82(13): 19793-19828 (2023) - [j16]Nan Jiang, Yi Zhuang:
Privacy-preserving personalized similarity retrieval of large CT image sequences. Multim. Tools Appl. 82(13): 20407-20429 (2023) - [c16]Xiaojiang Liu, Gaoqiang Niu, Jin Li, Yi Zhuang, Xitong Sun, Fei Wang:
MEMS Gas Sensors with Metal-Oxide Semiconductor Materials Patterned at Wafer-Level by Photolithography Technique. SENSORS 2023: 1-4 - [c15]Aravind Nagulu, Mingyu Yi, Yi Zhuang, Sasank Garikapati, Harish Krishnaswamy:
A 1-to-5GHz All-Passive Frequency-Translational 4th-Order N-path Filter with Low-Power Clock Boosting for High Linearity and Relaxed $\mathrm{P}_{\text{dc}}$-Frequency Trade-Off. ISSCC 2023: 378-379 - [c14]Tao Chen, Yi Zhuang:
A Dynamic Hierarchical Single Link Fault Recovery Scheme for SDN Based on Dynamic Hierarchies. SPCNC 2023: 390-396 - 2022
- [j15]Wenjie Ren, Changhui Zhao, Gaoqiang Niu, Yi Zhuang, Fei Wang:
Gas Sensor Array with Pattern Recognition Algorithms for Highly Sensitive and Selective Discrimination of Trimethylamine. Adv. Intell. Syst. 4(12) (2022) - [i1]Hongcheng Guo, Xingyu Lin, Jian Yang, Yi Zhuang, Jiaqi Bai, Tieqiao Zheng, Bo Zhang, Zhoujun Li:
TransLog: A Unified Transformer-based Framework for Log Anomaly Detection. CoRR abs/2201.00016 (2022) - 2021
- [c13]Chen Bao, Anxin Luo, Yi Zhuang, Junlong Huang, Fei Wang:
A Wearable Health Monitoring System Self-powered by Human-motion Energy Harvester. NEMS 2021: 990-993 - 2020
- [j13]Jinlong Hu, Tenghui Li, Yi Zhuang, Song Huang, Shoubin Dong:
GFD: A Weighted Heterogeneous Graph Embedding Based Approach for Fraud Detection in Mobile Advertising. Secur. Commun. Networks 2020: 8810817:1-8810817:12 (2020) - [c11]Songpeng Zhang, Yi Zhuang, Zining Cao:
Intelligent Medical Security Framework of Body Area Network Based on Fog Computing. SpaCCS 2020: 356-366 - 2018
- [j9]Fa-jia Sheng, Huijun Tan, Yi Zhuang, He-xia Huang, Hao Chen, Weixing Wang:
Visualization of conical vortex and shock in swept shock/turbulent boundary layer interaction flow. J. Vis. 21(6): 909-914 (2018) - [c9]Jinlong Hu, Yi Zhuang, Jiang Yang, Lei Lei, Minjie Huang, Runchao Zhu, Shoubin Dong:
pRNN: A Recurrent Neural Network based Approach for Customer Churn Prediction in Telecommunication Sector. IEEE BigData 2018: 4081-4085 - 2014
- [c7]Yi Zhuang, Tao Zheng, Zhitian Lin:
Runtime Code Reuse Attacks: A Dynamic Framework Bypassing Fine-Grained Address Space Layout Randomization. SEKE 2014: 609-614 - 2010
- [c5]Yang Gao, Yi Zhuang, Tianquan Ni, Keke Yin, Tongtong Xue:
An improved genetic algorithm for wireless sensor networks localization. BIC-TA 2010: 439-443 - [e1]Heng Tao Shen, Jian Pei, M. Tamer Özsu, Lei Zou, Jiaheng Lu, Tok Wang Ling, Ge Yu, Yi Zhuang, Jie Shao:
Web-Age Information Management - WAIM 2010 International Workshops: IWGD 2010, XMLDM 2010, WCMT 2010, Jiuzhaigou Valley, China, July 15-17, 2010, Revised Selected Papers. Lecture Notes in Computer Science 6185, Springer 2010, ISBN 978-3-642-16719-5 [contents] - 2009
- [c4]Yi Zhuang, Xinrong Hu, Jianchun Wang:
The Implement of an Image Stitching Algorithm Based on Feature Extraction. ETT 2009: 327-330 - 2002
- [c1]Ming Xu, Yi Zhuang:
Multi-agent Coordination Mechanism in Distributed Environment. EDCIS 2002: 444-455 - 2000
- [j1]Yi Zhuang, Li Chen, Ron Venter:
CyberEye: An Internet-Enabled Environment to Support Collaborative Design. Concurr. Eng. Res. Appl. 8(3): 213-229 (2000)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-09 00:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint