default search action
Zimu Yuan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c23]Xiaowei Wang, Zimu Yuan, Yang Xiao, Liyan Wang, Yican Yao, Haiming Chen, Wei Huo:
Decompilation Based Deep Binary-Source Function Matching. SciSec 2023: 244-260 - 2022
- [c22]He Su, Lili Xu, Huina Chao, Feng Li, Zimu Yuan, Jianhua Zhou, Wei Huo:
A Sanitizer-centric Analysis to Detect Cross-Site Scripting in PHP Programs. ISSRE 2022: 355-365 - 2021
- [j7]Gu Ban, Lili Xu, Yang Xiao, Xinhua Li, Zimu Yuan, Wei Huo:
B2SMatcher: fine-Grained version identification of open-Source software in binary files. Cybersecur. 4(1): 21 (2021) - [c21]Yang Xiao, Zhengzi Xu, Weiwei Zhang, Chendong Yu, Longquan Liu, Wei Zou, Zimu Yuan, Yang Liu, Aihua Piao, Wei Huo:
VIVA: Binary Level Vulnerability Identification via Partial Signature. SANER 2021: 213-224 - 2020
- [j6]Shuhui Yang, Zimu Yuan, Wei Li:
Error data analytics on RSS range-based localization. Big Data Min. Anal. 3(3): 155-170 (2020) - [c20]Yang Xiao, Bihuan Chen, Chendong Yu, Zhengzi Xu, Zimu Yuan, Feng Li, Binghong Liu, Yang Liu, Wei Huo, Wei Zou, Wenchang Shi:
MVP: Detecting Vulnerabilities using Patch-Enhanced Vulnerability Signatures. USENIX Security Symposium 2020: 1165-1182
2010 – 2019
- 2019
- [c19]Zimu Yuan, Wei Li, Shuhui Yang:
Event Detection on Unreliable Distributed Storage Network. GLOBECOM 2019: 1-6 - [c18]Ruibang You, Zimu Yuan, Bibo Tu, Jie Cheng:
HP-SDDAN: High-Performance Software-Defined Data Access Network. HPCC/SmartCity/DSS 2019: 849-856 - [c17]Ruibang You, Bibo Tu, Zimu Yuan, Jie Cheng:
SecFT-SDN: Securing the Flow-Table for Software-Defined Network. ISPA/BDCloud/SocialCom/SustainCom 2019: 1139-1146 - [c16]Zimu Yuan, Wei Li, Shuhui Yang:
Beacon Node Placement for Minimal Localization Error. iThings/GreenCom/CPSCom/SmartData 2019: 980-985 - [c15]Muyue Feng, Zimu Yuan, Feng Li, Gu Ban, Shiyang Wang, Qian Tang, He Su, Chendong Yu, Jiahuan Xu, Aihua Piao, Jingling Xue, Wei Huo:
B2SFinder: Detecting Open-Source Software Reuse in COTS Software. ASE 2019: 1038-1049 - [c14]Muyue Feng, Weixuan Mao, Zimu Yuan, Yang Xiao, Gu Ban, Wei Wang, Shiyang Wang, Qian Tang, Jiahuan Xu, He Su, Binghong Liu, Wei Huo:
Open-Source License Violations of Binary Software at Large Scale. SANER 2019: 564-568 - 2018
- [c13]Ke Zhan, Lili Xu, Zimu Yuan, Weijuan Zhang:
Performance Optimization of Large Files Writes to Ceph Based on Multiple Pipelines Algorithm. ISPA/IUCC/BDCloud/SocialCom/SustainCom 2018: 525-532 - [c12]Wei Li, Zimu Yuan, Shuhui Yang, Wei Zhao:
Error Analysis on RSS Range-Based Localization Based on General Log-Distance Path Loss Model. MASS 2018: 469-474 - 2017
- [j5]Zimu Yuan, Huiying Liu:
Efficiently Coding Replicas to Erasure Coded Blocks in Distributed Storage Systems. IEEE Commun. Lett. 21(9): 1897-1900 (2017) - [j4]Zimu Yuan, Huiying Liu:
Analysis on Ensemble of Regenerating Codes and Replication. IEEE Commun. Lett. 21(9): 1901-1904 (2017) - 2015
- [j3]Shusheng Guo, Zimu Yuan, Aobing Sun, Qiang Yue:
A New ETL Approach Based on Data Virtualization. J. Comput. Sci. Technol. 30(2): 311-323 (2015) - [c11]Menghao Li, Liang Yang, Zimu Yuan, Rui Zhang, Rui Xue:
An Approach for Mitigating Potential Threats in Practical SSO Systems. Inscrypt 2015: 209-226 - [c10]Zimu Yuan, Wei Li, Junda Zhu, Wei Zhao:
A cost-efficiency method on beacon nodes placement for wireless localization. ICNC 2015: 546-550 - [c9]Zimu Yuan, Zhiwei Xu, Guojie Li:
CIUV: Collaborating information against unreliable views. ISCC 2015: 568-573 - [i7]Zimu Yuan:
Flow Demands Oriented Node Placement in Multi-Hop Wireless Networks. CoRR abs/1503.08396 (2015) - [i6]Zimu Yuan:
A Cyber-Human Interaction Based System on Mobile Phone for Indoor Localization. CoRR abs/1503.08398 (2015) - [i5]Zimu Yuan, Shusheng Guo:
Online Query Scheduling on Source Permutation for Big Data Integration. CoRR abs/1503.08400 (2015) - [i4]Zimu Yuan, Wei Li, Zhiwei Xu, Wei Zhao:
Beacon Node Placement for Minimal Localization Error. CoRR abs/1503.08404 (2015) - [i3]Zimu Yuan, Zhiwei Xu:
CIUV: Collaborating Information Against Unreliable Views. CoRR abs/1503.08407 (2015) - [i2]Zimu Yuan, Zhiwei Xu:
Founding Digital Currency on Imprecise Commodity. CoRR abs/1503.08818 (2015) - 2014
- [j2]Zimu Yuan, Wei Li, Shuhui Yang:
A New Routing Scheme Based on Adaptive Selection of Geographic Directions. J. Commun. 9(7): 521-534 (2014) - [c8]Shusheng Guo, Zimu Yuan, Li Zha, Zhiwei Xu:
SeaBase: An Implementation of Cloud Database. SKG 2014: 112-115 - 2013
- [j1]Zimu Yuan, Lizhao You, Wei Li, Biao Chen, Zhiwei Xu:
History-Aware Adaptive Backoff for Neighbor Discovery in Wireless Networks. Ad Hoc Sens. Wirel. Networks 18(1-2): 87-108 (2013) - [c7]Zimu Yuan, Shuhui Yang, Wei Li:
A two-tier positioning algorithm for wireless networks with diverse measurement types. GLOBECOM 2013: 134-139 - [i1]Lizhao You, Zimu Yuan, Bin Tang, Guihai Chen:
Minimum Latency Broadcast Scheduling in Single-Radio Multi-Channel Wireless Ad-Hoc Networks. CoRR abs/1304.5330 (2013) - 2012
- [c6]Zimu Yuan, Wei Li, Shuhui Yang:
A new routing scheme based on adaptive selection of geographic directions. GLOBECOM 2012: 14-19 - [c5]Zimu Yuan, Wei Li, Adam C. Champion, Wei Zhao:
An efficient hybrid localization scheme for Heterogeneous Wireless Networks. GLOBECOM 2012: 372-378 - [c4]Wei Li, Zimu Yuan, Biao Chen, Wei Zhao:
Performance Comparison of Positioning Algorithms for Complex GPS Systems. ICDCS Workshops 2012: 273-278 - [c3]Dechao Liu, Zhiyun Zheng, Zimu Yuan, Wei Li:
An Improved TPSN Algorithm for Time Synchronization in Wireless Sensor Network. ICDCS Workshops 2012: 279-284 - 2011
- [c2]Zimu Yuan, Lizhao You, Wei Li, Biao Chen, Zhiwei Xu:
History-Aware Adaptive Backoff for Neighbor Discovery in Wireless Networks. MSN 2011: 174-181 - [c1]Lizhao You, Zimu Yuan, Panlong Yang, Guihai Chen:
ALOHA-like neighbor discovery in low-duty-cycle wireless sensor networks. WCNC 2011: 749-754
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-08 20:10 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint