default search action
Zheng Yuan
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Zheng Yuan 0001 — Real Communications Inc. (and 1 more)
- Zheng Yuan 0002 — Tsinghua University, China
- Zheng Yuan 0003 — King's College London, Department of Informatics, UK (and 1 more)
- Zheng Yuan 0004 — Northwestern University, Evanston, IL, USA
- Zheng Yuan 0005 — University of Chinese Academy of Sciences, Beijing, China
- Zheng Byron Yuan (aka: Zheng Yuan 0006) — Italian Institute of Technology, Italy (and 1 more)
Other persons with a similar name
- Yuan Zheng Li (aka: Yuanzheng Li)
- Zheng-Yuan Xue
- Jiazheng Yuan (aka: Jia-Zheng Yuan)
- Yuan Zheng — disambiguation page
- Yuan-Guang Zheng
- Yuan F. Zheng (aka: Yuan-Fang Zheng)
- Yuan Zheng 0001 — Hong Kong Polytechnic University, Department of Computing, Hong Kong
- Yuan Zheng 0002 — Inner Mongolia University, School of Computer Science, Hohhot, China (and 2 more)
- Yuan Zheng 0003 — Shenzhen University, College of Information Engineering, China
- Yuan Zheng 0004 — Hohai University, College of Energy and Electrical Engineering, Nanjing, China
- show all similar names
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j33]Xiao Feng, Zheng Yuan:
Real-time and secure identity authentication transmission mechanism for artificial intelligence generated image content. J. Real Time Image Process. 21(4): 130 (2024) - [j32]Mingjie Zhao, Zheng Yuan, Lixiang Li, Xiu-Bo Chen:
A novel efficient S-box design algorithm based on a new chaotic map and permutation. Multim. Tools Appl. 83(24): 64899-64918 (2024) - [j31]Chen Zhao, Weiling Cai, Chengwei Hu, Zheng Yuan:
Cycle contrastive adversarial learning with structural consistency for unsupervised high-quality image deraining transformer. Neural Networks 178: 106428 (2024) - [j30]Shuke Wang, Leming Zhou, Daoying Xiong, Zheng Yuan, Tongxu Liu, Xiaokai Liu, Quan Chen:
Zero-Resistance-Branch Electrical Drainage System to Solve the Adverse Influence of Stray Current on Buried Pipelines. IEEE Trans. Ind. Electron. 71(5): 4618-4628 (2024) - [j29]Zhikang Li, Jiazhu Li, Yihe Zhao, Zixuan Li, Xuan Shi, Shaohui Qin, Jie Li, Jiawei Yuan, Qi Ma, Zilong Zhao, Shiwang Zhang, Zheng Yuan, Xiaozhang Wang, Libo Zhao:
Noninvasive Stress Detection Based on Piezoelectric Micromachined Ultrasonic Transducers for Bolt Loosening Warning. IEEE Trans. Instrum. Meas. 73: 1-16 (2024) - [j28]Chen Dai, Zheng Yuan, Hao Sun, Shihua Li:
GPIO-based nonsingular terminal sliding mode control for high-pressure common rail systems. Trans. Inst. Meas. Control 46(4): 678-689 (2024) - [j27]Xinhang Li, Yiying Yang, Zheng Yuan, Zhe Wang, Qinwen Wang, Chen Xu, Lei Li, Jianhua He, Lin Zhang:
Progression Cognition Reinforcement Learning With Prioritized Experience for Multi-Vehicle Pursuit. IEEE Trans. Intell. Transp. Syst. 25(8): 10035-10048 (2024) - [j26]Zheng Yuan, Youliang Tian, Zhou Zhou, Ta Li, Shuai Wang, Jinbo Xiong:
Trustworthy Federated Learning Against Malicious Attacks in Web 3.0. IEEE Trans. Netw. Sci. Eng. 11(5): 3969-3982 (2024) - [c47]Zijin Hong, Zheng Yuan, Hao Chen, Qinggang Zhang, Feiran Huang, Xiao Huang:
Knowledge-to-SQL: Enhancing SQL Generation with Data Expert LLM. ACL (Findings) 2024: 10997-11008 - [c46]Keren Tan, Kangyang Luo, Yunshi Lan, Zheng Yuan, Jinlong Shu:
An LLM-Enhanced Adversarial Editing System for Lexical Simplification. LREC/COLING 2024: 1136-1146 - [c45]Qiao Wang, Zheng Yuan:
Assessing the Efficacy of Grammar Error Correction: A Human Evaluation Approach in the Japanese Context. LREC/COLING 2024: 1666-1672 - [c44]Yunfei Yin, Congrui Zou, Zheng Yuan, Xianjian Bao:
MLDSP-MA: Multidimensional Attention for Multi-Round Long Dialogue Sentiment Prediction. LREC/COLING 2024: 11405-11414 - [c43]Tom Potter, Zheng Yuan:
LLM-based Code-Switched Text Generation for Grammatical Error Correction. EMNLP 2024: 16957-16965 - [c42]Yijie Zhang, Yuanchen Bei, Hao Chen, Qijie Shen, Zheng Yuan, Huan Gong, Senzhang Wang, Feiran Huang, Xiao Huang:
Multi-Behavior Collaborative Filtering with Partial Order Graph Convolutional Networks. KDD 2024: 6257-6268 - [c41]Hongyi Yuan, Zheng Yuan, Chuanqi Tan, Fei Huang, Songfang Huang:
Text Diffusion Model with Encoder-Decoder Transformers for Sequence-to-Sequence Generation. NAACL-HLT 2024: 22-39 - [c40]Zheng Yuan, Youliang Tian, Jinbo Xiong, Linjie Wang:
Enhancing Privacy-Preserving Federated Learning: A Robust and Resilient Approach. NaNA 2024: 8-14 - [c39]Pratik B. Vyas, Ludovico Megalini, Ashish Pal, Joshua Holt, Archana Kumar, Stephen Weeks, Charisse Zhao, Lucien Date, Hansel Lo, Michel Khoury, Safdar Muhammad, Fabian Piallat, Ricky Fang, William Charles, Pratim Palit, Jinghe Yang, Qintao Zhang, Jang Seok Oh, Bryan Turner, Samphy Hong, Aswin Prathap Pitchiya, Benjamin Briggs, Jiao Yang, Dae Yang, Fengshou Wang, Joseph Lee, Gopal Prabhu, Dustin Ho, Carlos Caballero, Durga Chaturvedula, Zheng Yuan, Yi Zheng, David A. Britz, Stephen Krause, Raghav Sreenivasan, Michael Chudzik, Subi Kengeri, Siddarth A. Krishnan, El Mehdi Bazizi:
Novel Material, Process and Device Innovations for Next Generation Silicon Carbide (SiC) Trench MOSFET Technology. VLSI Technology and Circuits 2024: 1-2 - [c38]Qiao Wang, Yixuan Huang, Zheng Yuan:
Reducing Redundancy in Japanese-to-English Translation: A Multi-Pipeline Approach for Translating Repeated Elements in Japanese. WMT 2024: 1047-1055 - [c37]Junchen Fu, Fajie Yuan, Yu Song, Zheng Yuan, Mingyue Cheng, Shenghui Cheng, Jiaqi Zhang, Jie Wang, Yunzhu Pan:
Exploring Adapter-based Transfer Learning for Recommender Systems: Empirical Studies and Practical Insights. WSDM 2024: 208-217 - [i34]Yijie Zhang, Yuanchen Bei, Hao Chen, Qijie Shen, Zheng Yuan, Huan Gong, Senzhang Wang, Feiran Huang, Xiao Huang:
Multi-Behavior Collaborative Filtering with Partial Order Graph Convolutional Networks. CoRR abs/2402.07659 (2024) - [i33]Zijin Hong, Zheng Yuan, Hao Chen, Qinggang Zhang, Feiran Huang, Xiao Huang:
Knowledge-to-SQL: Enhancing SQL Generation with Data Expert LLM. CoRR abs/2402.11517 (2024) - [i32]Keren Tan, Kangyang Luo, Yunshi Lan, Zheng Yuan, Jinlong Shu:
An LLM-Enhanced Adversarial Editing System for Lexical Simplification. CoRR abs/2402.14704 (2024) - [i31]Qiao Wang, Zheng Yuan:
Assessing the Efficacy of Grammar Error Correction: A Human Evaluation Approach in the Japanese Context. CoRR abs/2402.18101 (2024) - [i30]Siya Qi, Yulan He, Zheng Yuan:
Can We Catch the Elephant? The Evolvement of Hallucination Evaluation on Natural Language Generation: A Survey. CoRR abs/2404.12041 (2024) - [i29]Zijin Hong, Zheng Yuan, Qinggang Zhang, Hao Chen, Junnan Dong, Feiran Huang, Xiao Huang:
Next-Generation Database Interfaces: A Survey of LLM-based Text-to-SQL. CoRR abs/2406.08426 (2024) - [i28]Chen Zhao, Weiling Cai, ChengWei Hu, Zheng Yuan:
Cycle Contrastive Adversarial Learning for Unsupervised image Deraining. CoRR abs/2407.11750 (2024) - [i27]Tom Potter, Zheng Yuan:
LLM-based Code-Switched Text Generation for Grammatical Error Correction. CoRR abs/2410.10349 (2024) - 2023
- [j25]Yinsong Xu, Zheng Yuan:
Quantum meet-in-the-middle attack on Feistel construction. Quantum Inf. Process. 22(3): 155 (2023) - [j24]Bao-Min Zhou, Zheng Yuan:
Breaking symmetric cryptosystems using the offline distributed Grover-meets-Simon algorithm. Quantum Inf. Process. 22(9): 333 (2023) - [j23]Zheng Yuan, Zhe Wang, Xinhang Li, Lei Li, Lin Zhang:
Hierarchical Trajectory Planning for Narrow-Space Automated Parking with Deep Reinforcement Learning: A Federated Learning Scheme. Sensors 23(8): 4087 (2023) - [j22]Zheng Yuan, Junhua Wang, Yuxin Lv, Ding Wang, Yi Fang:
Laformer: Vision Transformer for Panoramic Image Semantic Segmentation. IEEE Signal Process. Lett. 30: 1792-1796 (2023) - [c36]Chen Chu, Zheng Yuan, Shuyue Hu, Chunjiang Mu, Zhen Wang:
A Pair-Approximation Method for Modelling the Dynamics of Multi-Agent Stochastic Games. AAAI 2023: 5565-5572 - [c35]Andrea Sottana, Bin Liang, Kai Zou, Zheng Yuan:
Evaluation Metrics in the Era of GPT-4: Reliably Evaluating Large Language Models on Sequence to Sequence Tasks. EMNLP 2023: 8776-8788 - [c34]Zheng Yuan, Wang Yu, Junfei Li, Yongji Dong, Pengshuai Cui:
Research on Energy Efficiency Routing Technology Based on Improved A3C. ICNCC 2023: 39-45 - [c33]Hongyi Yuan, Zheng Yuan, Chuanqi Tan, Wei Wang, Songfang Huang, Fei Huang:
RRHF: Rank Responses to Align Language Models with Human Feedback. NeurIPS 2023 - [c32]Zheng Yuan, Weiling Cai, Chen Zhao:
Context-FPN and Memory Contrastive Learning for Partially Supervised Instance Segmentation. PRCV (12) 2023: 172-184 - [c31]Zheng Yuan, Fajie Yuan, Yu Song, Youhua Li, Junchen Fu, Fei Yang, Yunzhu Pan, Yongxin Ni:
Where to Go Next for Recommender Systems? ID- vs. Modality-based Recommender Models Revisited. SIGIR 2023: 2639-2649 - [i26]Zheng Yuan, Fajie Yuan, Yu Song, Youhua Li, Junchen Fu, Fei Yang, Yunzhu Pan, Yongxin Ni:
Where to Go Next for Recommender Systems? ID- vs. Modality-based recommender models revisited. CoRR abs/2303.13835 (2023) - [i25]Chen Zhao, Weiling Cai, Zheng Yuan:
Spectral normalized dual contrastive regularization for image-to-image translation. CoRR abs/2304.11319 (2023) - [i24]Chen Zhao, Weiling Cai, Zheng Yuan, Chengwei Hu:
Multi-crop Contrastive Learning for Unsupervised Image-to-Image Translation. CoRR abs/2304.12235 (2023) - [i23]Ruyu Li, Wenhao Deng, Yu Cheng, Zheng Yuan, Jiaqi Zhang, Fajie Yuan:
Exploring the Upper Limits of Text-Based Collaborative Filtering Using Large Language Models: Discoveries and Insights. CoRR abs/2305.11700 (2023) - [i22]Junchen Fu, Fajie Yuan, Yu Song, Zheng Yuan, Mingyue Cheng, Shenghui Cheng, Jiaqi Zhang, Jie Wang, Yunzhu Pan:
Exploring Adapter-based Transfer Learning for Recommender Systems: Empirical Studies and Practical Insights. CoRR abs/2305.15036 (2023) - [i21]Xinhang Li, Yiying Yang, Zheng Yuan, Zhe Wang, Qinwen Wang, Chen Xu, Lei Li, Jianhua He, Lin Zhang:
Progression Cognition Reinforcement Learning with Prioritized Experience for Multi-Vehicle Pursuit. CoRR abs/2306.05016 (2023) - [i20]Jiaqi Zhang, Yu Cheng, Yongxin Ni, Yunzhu Pan, Zheng Yuan, Junchen Fu, Youhua Li, Jie Wang, Fajie Yuan:
NineRec: A Benchmark Dataset Suite for Evaluating Transferable Recommendation. CoRR abs/2309.07705 (2023) - [i19]Andrea Sottana, Bin Liang, Kai Zou, Zheng Yuan:
Evaluation Metrics in the Era of GPT-4: Reliably Evaluating Large Language Models on Sequence to Sequence Tasks. CoRR abs/2310.13800 (2023) - [i18]Enhong Liu, Joseph Suarez, Chenhui You, Bo Wu, Bingcheng Chen, Jun Hu, Jiaxin Chen, Xiaolong Zhu, Clare Zhu, Julian Togelius, Sharada P. Mohanty, Weijun Hong, Rui Du, Yibing Zhang, Qinwen Wang, Xinhang Li, Zheng Yuan, Xiang Li, Yuejia Huang, Kun Zhang, Hanhui Yang, Shiqi Tang, Phillip Isola:
The NeurIPS 2022 Neural MMO Challenge: A Massively Multiagent Competition with Specialization and Trade. CoRR abs/2311.03707 (2023) - 2022
- [j21]Zhao Qiu, Lin Yuan, Lihao Liu, Zheng Yuan, Tao Chen, Zihan Xiao:
Generative Image Inpainting with Dilated Deformable Convolution. J. Circuits Syst. Comput. 31(6): 2250114:1-2250114:13 (2022) - [j20]Zheng Yuan, Song Feng, Shanshan Chen, Weixuan Jing, Libo Zhao, Zhuangde Jiang:
A Ferromagnetic Particle Sensor Based on a Honeycomb Permanent Magnet for High Precision and High Throughput. IEEE Trans. Instrum. Meas. 71: 1-9 (2022) - [c30]Zheng Yuan, Dugang Liu, Weike Pan, Zhong Ming:
SQL-Rank++: A Novel Listwise Approach for Collaborative Ranking with Implicit Feedback. IJCNN 2022: 1-8 - [c29]Qinwen Wang, Xinhang Li, Zheng Yuan, Yiying Yang, Chen Xu, Lin Zhang:
An Opponent-Aware Reinforcement Learning Method for Team-to-Team Multi-Vehicle Pursuit via Maximizing Mutual Information Indicator. MSN 2022: 526-533 - [c28]Yiying Yang, Xinhang Li, Zheng Yuan, Qinwen Wang, Chen Xu, Lin Zhang:
Graded-Q Reinforcement Learning with Information-Enhanced State Encoder for Hierarchical Collaborative Multi-Vehicle Pursuit. MSN 2022: 534-541 - [i17]Zheng Yuan, Tianhao Wu, Qinwen Wang, Yiying Yang, Lei Li, Lin Zhang:
T3OMVP: A Transformer-based Time and Team Reinforcement Learning Scheme for Observation-constrained Multi-Vehicle Pursuit in Urban Area. CoRR abs/2203.00183 (2022) - [i16]Xinhang Li, Zihao Li, Nan Yang, Zheng Yuan, Qinwen Wang, Yiying Yang, Yupeng Huang, Xuri Song, Lei Li, Lin Zhang:
Confidence Estimation Transformer for Long-term Renewable Energy Forecasting in Reinforcement Learning-based Power Grid Dispatching. CoRR abs/2204.04612 (2022) - [i15]Qinwen Wang, Xinhang Li, Zheng Yuan, Yiying Yang, Chen Xu, Lin Zhang:
An Opponent-Aware Reinforcement Learning Method for Team-to-Team Multi-Vehicle Pursuit via Maximizing Mutual Information Indicator. CoRR abs/2210.13015 (2022) - [i14]Yiying Yang, Xinhang Li, Zheng Yuan, Qinwen Wang, Chen Xu, Lin Zhang:
Graded-Q Reinforcement Learning with Information-Enhanced State Encoder for Hierarchical Collaborative Multi-Vehicle Pursuit. CoRR abs/2210.13470 (2022) - 2021
- [j19]Liang Gong, Xiaofeng Du, Kai Zhu, Chenghui Lin, Ke Lin, Tao Wang, Qiaojun Lou, Zheng Yuan, Guoqiang Huang, Chengliang Liu:
Pixel level segmentation of early-stage in-bag rice root for its architecture analysis. Comput. Electron. Agric. 186: 106197 (2021) - [j18]Bao-Min Zhou, Zheng Yuan:
Quantum key-recovery attack on Feistel constructions: Bernstein-Vazirani meet Grover algorithm. Quantum Inf. Process. 20(10): 330 (2021) - [c27]Zheng Yuan, Andre Esteva, Ran Xu:
MetaHistoSeg: A Python Framework for Meta Learning in Histopathology Image Segmentation. DGM4MICCAI/DALI@MICCAI 2021: 268-275 - [c26]Enhong Liu, Joseph Suarez, Chenhui You, Bo Wu, Bingcheng Chen, Jun Hu, Jiaxin Chen, Xiaolong Zhu, Clare Zhu, Julian Togelius, Sharada P. Mohanty, Weijun Hong, Rui Du, Yibing Zhang, Qinwen Wang, Xinhang Li, Zheng Yuan, Xiang Li, Yuejia Huang, Kun Zhang, Hanhui Yang, Shiqi Tang, Phillip Isola:
The NeurIPS 2022 Neural MMO Challenge: A Massively Multiagent Competition with Specialization and Trade. NeurIPS (Competition and Demos) 2021: 18-34 - [c25]Zhe Wang, Yubo Zheng, Xinhang Li, Xikang Jiang, Zheng Yuan, Lei Li, Lin Zhang:
DP-YOLOv5: Computer Vision-Based Risk Behavior Detection in Power Grids. PRCV (1) 2021: 318-328 - [i13]Tianhao Wu, Mingzhi Jiang, Yinhui Han, Zheng Yuan, Lin Zhang:
Density-Aware Federated Imitation Learning for Connected and Automated Vehicles with Unsignalized Intersection. CoRR abs/2105.01889 (2021) - [i12]Zheng Yuan, Andre Esteva, Ran Xu:
MetaHistoSeg: A Python Framework for Meta Learning in Histopathology Image Segmentation. CoRR abs/2109.14754 (2021)
2010 – 2019
- 2019
- [c24]Wei Sun, Zhihua Huang, Zikai Wang, Zheng Yuan, Wei Dai:
A Method and Application for Constructing a Authentic Data Space. IoTaIS 2019: 218-224 - 2018
- [j17]Yu-Guang Yang, Jing-Lin Bi, Xiu-Bo Chen, Zheng Yuan, Yi-Hua Zhou, Wei-Min Shi:
Simple hash function using discrete-time quantum walks. Quantum Inf. Process. 17(8): 189 (2018) - [c23]Zheng Yuan:
Neural sequence modelling for learner error prediction. BEA@NAACL-HLT 2018: 381-388 - [c22]Pengfei Li, Yu Kang, Yun-Bo Zhao, Zheng Yuan:
Packet-Based Model Predictive Control for Networked Control Systems With Random Packet Losses. CDC 2018: 3457-3462 - 2017
- [i11]Zheng Yuan, William Hendrix, Seung Woo Son, Christoph Federrath, Ankit Agrawal, Wei-keng Liao, Alok N. Choudhary:
Parallel Implementation of Lossy Data Compression for Temporal Data Sets. CoRR abs/1703.02438 (2017) - 2016
- [c21]Zheng Yuan, William Hendrix, Seung Woo Son, Christoph Federrath, Ankit Agrawal, Wei-keng Liao, Alok N. Choudhary:
Parallel Implementation of Lossy Data Compression for Temporal Data Sets. HiPC 2016: 62-71 - 2015
- [c20]He Zheng, Gang Yang, Junyan Yi, Zheng Yuan, Xiaowei Liu, Meng Shuai:
Simplify the Basic Artificial Bee Colony Algorithm. SMC 2015: 2141-2146 - [c19]Gang Yang, Jieping Xu, Junyan Yi, He Zheng, Zheng Yuan, Xiaowei Liu:
Artificial Bee Group Colony Algorithm for Numerical Function Optimization. SMC 2015: 2914-2919 - [i10]Mei Wang, Zheng Yuan, Xiao Feng:
A Secure Oblivious Transfer Protocol from Indistinguishing Obfuscation. IACR Cryptol. ePrint Arch. 2015: 601 (2015) - [i9]Zheng Yuan, Zhen Peng, Ming Mao:
A Star-based Independent Biclique Attack on Full Rounds SQUARE. IACR Cryptol. ePrint Arch. 2015: 1201 (2015) - [i8]Zheng Yuan, Zhen Peng, Haiwen Ou:
Two Kinds of Biclique Attacks on Lightweight Block Cipher PRINCE. IACR Cryptol. ePrint Arch. 2015: 1208 (2015) - 2014
- [c18]Xiao Feng, Zheng Yuan:
A Secure Obfuscator for Encrypted Blind Signature Functionality. NSS 2014: 311-322 - 2013
- [j16]Xican Li, Zheng Yuan, Guangbo Zhang:
Soil organic matter content GM(0, N) estimation model based on hyper-spectral technique. Grey Syst. Theory Appl. 3(2): 112-120 (2013) - [j15]Xican Li, Tao Yu, Zheng Yuan:
Model GM(1, 1, ß) and its applicable region. Grey Syst. Theory Appl. 3(3): 266-275 (2013) - [j14]Yan-Bing Li, Su-Juan Qin, Zheng Yuan, Wei Huang, Ying Sun:
Quantum private comparison against decoherence noise. Quantum Inf. Process. 12(6): 2191-2205 (2013) - [c17]Zheng Yuan, Bo Li:
MEFTTD: A Parallel Awareness Scheduler. CSC 2013: 152-153 - [c16]Gao-Xiang Gong, Zheng Yuan, Xiao Feng:
The Homomorphic Encryption Scheme of Security Obfuscation. BIC-TA 2013: 595-603 - [c15]Xing Wei, Zheng Yuan, Xian Li, Xiao Feng, Jintao Liu:
Secure Obfuscation for Tightly Structure-Preserving Encrypted Proxy Signatures. CIS 2013: 589-593 - [i7]Zheng Yuan, Xian Li, Haixia Liu:
Impossible Differential-Linear Cryptanalysis of Full-Round CLEFIA-128. IACR Cryptol. ePrint Arch. 2013: 301 (2013) - [i6]Xiao Feng, Zheng Yuan:
A Secure Obfuscator for Encrypted Blind Signature Functionality. IACR Cryptol. ePrint Arch. 2013: 716 (2013) - 2012
- [j13]Xican Li, Tao Yu, Xiao Wang, Zheng Yuan, Xiaodong Shang:
The pattern of grey fuzzy forecasting with feedback. Kybernetes 41(5/6): 568-576 (2012) - [j12]Ying Sun, Fei Gao, Zheng Yuan, Yan-Bing Li, Qiao-Yan Wen:
Splitting a quantum secret without the assistance of entanglements. Quantum Inf. Process. 11(6): 1741-1750 (2012) - [c14]Yulong Ou, Bo Li, Zheng Yuan, Qiang Hao, Zhongzhi Luan, Depei Qian:
LPFSC: A Light Weight Parallel Framework for Super Computing. PDCAT 2012: 453-458 - [c13]Yuriy A. Reznik, Ed Asbun, Zhifeng Chen, Yan Ye, Eldad Zeira, Rahul Vanam, Zheng Yuan, Gregory Sternberg, Ariela Zeira, Naresh Soni:
User-adaptive mobile video streaming. VCIP 2012: 1 - 2011
- [j11]Zheng Yuan, Jin-Hong Shi, Wenjun Lin, Bolin Chen, Fang-Xiang Wu:
Features-Based Deisotoping Method for Tandem Mass Spectra. Adv. Bioinformatics 2011: 210805:1-210805:12 (2011) - [j10]Xican Li, Tao Yu, Xiao Wang, Zheng Yuan, Xiaodong Shang:
The soil organic matter content grey relationship inversion pattern based on hyper-spectral technique. Grey Syst. Theory Appl. 1(3): 261-267 (2011) - [j9]Huo Zhihong, Zheng Yuan, Xu Chang:
A robust fault-tolerant control strategy for networked control systems. J. Netw. Comput. Appl. 34(2): 708-714 (2011) - [c12]Jacob Fish, Vasilina Filonova, Zheng Yuan:
Reduced Order Computational Continua. ECMS 2011: 7-10 - [c11]Li Wen, Hongjiang Zeng, Zheng Yuan, Jiaru Chu, Hai Wang:
Simulation and experiments of intrinsic bending of multilayer microcantilever for maskless scanning plasma etching. NEMS 2011: 634-637 - 2010
- [c10]Huai-bin Wang, Hong-liang Yang, Zhijian Xu, Zheng Yuan:
A Clustering Algorithm Use SOM and K-Means in Intrusion Detection. ICEE 2010: 1281-1284 - [i5]Zheng Yuan:
New Impossible Di®erential Attacks on AES. IACR Cryptol. ePrint Arch. 2010: 93 (2010) - [i4]Shengbao Wu, Mingsheng Wang, Zheng Yuan:
A Flaw in The Internal State Recovery Attack on ALPHA-MAC. IACR Cryptol. ePrint Arch. 2010: 160 (2010) - [i3]Zheng Yuan, Jintao Liu, Xiaoqiu Ren:
Distinguishing Attacks on MAC/HMAC Based on A New Dedicated Compression Function Framework. IACR Cryptol. ePrint Arch. 2010: 216 (2010)
2000 – 2009
- 2009
- [j8]Stefan Maetschke, Zheng Yuan:
Exploiting structural and topological information to improve prediction of RNA-protein binding sites. BMC Bioinform. 10: 341 (2009) - [c9]Huai-bin Wang, Zhijian Xu, Chundong Wang, Zheng Yuan:
A New Algorithm Combining Self Organizing Map with Simulated Annealing Used in Intrusion Detection. BMEI 2009: 1-4 - [c8]Keting Jia, Xiaoyun Wang, Zheng Yuan, Guangwu Xu:
Distinguishing and Second-Preimage Attacks on CBC-Like MACs. CANS 2009: 349-361 - [c7]Zheng Yuan, Wei Wang, Keting Jia, Guangwu Xu, Xiaoyun Wang:
New Birthday Attacks on Some MACs Based on Block Ciphers. CRYPTO 2009: 209-230 - 2008
- [c6]Tao Zhang, Ying Sai, Zheng Yuan:
Research of Stock Index Futures Prediction Model based on Rough Set and Support Vector Machine. GrC 2008: 797-800 - [c5]Zheng Yuan, Jianxun Li, Zhengfu Zhu:
Robust image restoration for rotary motion degradations and the motion parameter identification. ICIP 2008: 501-504 - [i2]Zheng Yuan, Keting Jia, Wei Wang, Xiaoyun Wang:
Distinguishing and Forgery Attacks on Alred and Its AES-based Instance Alpha-MAC. IACR Cryptol. ePrint Arch. 2008: 516 (2008) - [i1]Keting Jia, Xiaoyun Wang, Zheng Yuan, Guangwu Xu:
Distinguishing Attack and Second-Preimage Attack on the CBC-like MACs. IACR Cryptol. ePrint Arch. 2008: 542 (2008) - 2007
- [j7]Jiangning Song, Zheng Yuan, Hao Tan, Thomas Huber, Kevin Burrage:
Predicting disulfide connectivity from protein sequence using multiple sequence feature vectors and secondary structure. Bioinform. 23(23): 3147-3154 (2007) - [c4]Ya-tao Yang, Zheng Yuan, Yong Fang, Ping Zeng:
A Novel Authentication Scheme Based on Trust-value Updated Model in Adhoc Network. COMPSAC (1) 2007: 643-645 - [c3]Ying Sai, Zheng Yuan, Kanglin Gao:
Mining Stock Market Tendency by RS-Based Support Vector Machines. GrC 2007: 659-664 - 2006
- [j6]Mikael Bodén, Zheng Yuan, Timothy L. Bailey:
Prediction of protein continuum secondary structure with probabilistic models based on NMR solved structures. BMC Bioinform. 7: 68 (2006) - [j5]Jiangning Song, Kevin Burrage, Zheng Yuan, Thomas Huber:
Prediction of cis/trans isomerization in proteins using PSI-BLAST profiles and secondary structure information. BMC Bioinform. 7: 124 (2006) - [j4]Melissa J. Davis, Fasheng Zhang, Zheng Yuan, Rohan D. Teasdale:
MemO: A Consensus Approach to the Annotation of a Protein's Membrane Organization. Silico Biol. 6(5): 387-399 (2006) - [c2]Zheng Yuan, Qiaoyan Wen, Wenling Wu, Qing Zhang:
An ID-Based Watermarking Scheme for Java Programs. EUC Workshops 2006: 848-857 - 2005
- [j3]Zheng Yuan:
Better prediction of protein contact number using a support vector regression analysis of amino acid sequence. BMC Bioinform. 6: 248 (2005) - [c1]Denis C. Bauer, Mikael Bodén, Ricarda Thier, Zheng Yuan:
Predicting Structural Disruption of Proteins Caused by Crossover (based on Amino Acid Sequence). CIBCB 2005: 514-520 - 2004
- [j2]Zheng Yuan, John S. Mattick, Rohan D. Teasdale:
SVMtm: Support vector machines to predict transmembrane segments. J. Comput. Chem. 25(5): 632-636 (2004) - 2002
- [j1]Zheng Yuan, Rohan D. Teasdale:
Prediction of Golgi Type II membrane proteins based on their transmembrane domains. Bioinform. 18(8): 1109-1115 (2002)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-24 17:13 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint