default search action
Sizhao Li
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j19]Jianguo Sun, Wenshan Wang, Sizhao Li, Qingan Da, Lei Chen:
Scheduling optimization for UAV communication coverage using virtual force-based PSO model. Digit. Commun. Networks 10(4): 1103-1112 (2024) - [j18]Yang Yang, Guoyin Zhang, Sizhao Li, Zechao Liu:
Offline/online attribute-based searchable encryption scheme from ideal lattices for IoT. Frontiers Comput. Sci. 18(3): 183817 (2024) - [j17]Zining Yan, Guisheng Yin, Sizhao Li, Biplab Sikdar:
Path Planning for Heterogeneous UAVs With Radar Sensors. IEEE Internet Things J. 11(6): 9979-9994 (2024) - 2023
- [j16]Qingan Da, Guoyin Zhang, Wenshan Wang, Yingnan Zhao, Dan Lu, Sizhao Li, Dapeng Lang:
Adversarial Defense Method Based on Latent Representation Guidance for Remote Sensing Image Scene Classification. Entropy 25(9): 1306 (2023) - [j15]Zining Yan, Guisheng Yin, Sizhao Li, Zechao Liu:
Intelligent agents path planning in wireless sensor networks based on Vor-PSO algorithm. Int. J. Bio Inspired Comput. 22(2): 89-98 (2023) - [j14]Xinyu Han, Huosheng Xu, Hao Yu, Sizhao Li:
A reinforcement learning intelligent deductive model with pre-trained sequence information. Int. J. Bio Inspired Comput. 22(4): 195-205 (2023) - [j13]Qingan Da, Guoyin Zhang, Sizhao Li, Zechao Liu, Wenshan Wang:
Gradient-free adversarial attack algorithm based on differential evolution. Int. J. Bio Inspired Comput. 22(4): 217-226 (2023) - [c5]Liguo Zhang, Zilin Tian, Yunfei Long, Sizhao Li, Guisheng Yin:
Cross-modal and Cross-medium Adversarial Attack for Audio. ACM Multimedia 2023: 444-453 - [c4]Yuming Xiang, Sizhao Li, Rongpeng Li, Zhifeng Zhao, Honggang Zhang:
Decentralized Adaptive Formation via Consensus-Oriented Multi-Agent Communication. WCSP 2023: 449-454 - [i2]Yuming Xiang, Sizhao Li, Rongpeng Li, Zhifeng Zhao, Honggang Zhang:
Decentralized Adaptive Formation via Consensus-Oriented Multi-Agent Communication. CoRR abs/2307.12287 (2023) - [i1]Sizhao Li, Yuming Xiang, Rongpeng Li, Zhifeng Zhao, Honggang Zhang:
Imitation Learning based Alternative Multi-Agent Proximal Policy Optimization for Well-Formed Swarm-Oriented Pursuit Avoidance. CoRR abs/2311.02912 (2023) - 2022
- [j12]Dapeng Lang, Deyun Chen, Jinjie Huang, Sizhao Li:
A Momentum-Based Local Face Adversarial Example Generation Algorithm. Algorithms 15(12): 465 (2022) - [j11]Junpeng Wu, Enyuan Zhao, Sizhao Li, Yanqiang Wang:
Intelligent fitting global real-time task scheduling strategy for high-performance multi-core systems. CAAI Trans. Intell. Technol. 7(2): 244-255 (2022) - [j10]Guoyin Zhang, Qingan Da, Sizhao Li, Jianguo Sun, Wenshan Wang, Qing Hu, Jiashuai Lu:
Adversarial transformation network with adaptive perturbations for generating adversarial examples. Int. J. Bio Inspired Comput. 20(2): 94-103 (2022) - [j9]Dapeng Lang, Deyun Chen, Sizhao Li, Yongjun He:
An Adversarial Attack Method against Specified Objects Based on Instance Segmentation. Inf. 13(10): 465 (2022) - 2021
- [j8]Sizhao Li, Xinyu Han, Lvqing Bi, Bo Hu, Songsong Dai:
Complex fuzzy aggregation operations with complex weights. J. Intell. Fuzzy Syst. 40(6): 10999-11005 (2021) - [j7]Jianguo Sun, Zining Yan, Sizhao Li:
Multiagent Minimum Risk Path Intrusion Strategy with Computational Geometry. Wirel. Commun. Mob. Comput. 2021: 9974279:1-9974279:18 (2021)
2010 – 2019
- 2019
- [j6]Lvqing Bi, Songsong Dai, Bo Hu, Sizhao Li:
Complex fuzzy arithmetic aggregation operators. J. Intell. Fuzzy Syst. 36(3): 2765-2771 (2019) - [c3]Haiyan Lan, Xiaodong Zhu, Jianguo Sun, Sizhao Li:
Traffic Data Classification to Detect Man-in-the-Middle Attacks in Industrial Control System. DSA 2019: 430-434 - 2018
- [j5]Bo Hu, Lvqing Bi, Songsong Dai, Sizhao Li:
Distances of complex fuzzy sets and continuity of complex fuzzy operations. J. Intell. Fuzzy Syst. 35(2): 2247-2255 (2018) - [j4]Bo Hu, Lvqing Bi, Songsong Dai, Sizhao Li:
The approximate parallelity of complex fuzzy sets. J. Intell. Fuzzy Syst. 35(6): 6343-6351 (2018) - [j3]Sizhao Li, Yuanzhi Zhang, Hongyin Luo, Yan Chen, Chao Lu, Donghui Guo:
Race-Condition-Aware and Hardware-Oriented Task Partitioning and Scheduling Using Entropy Maximization. IEEE Trans. Parallel Distributed Syst. 29(7): 1589-1604 (2018) - 2017
- [j2]Sizhao Li, Donghui Guo:
Cache Coherence Scheme for HCS-Based CMP and Its System Reliability Analysis. IEEE Access 5: 7205-7215 (2017) - [j1]Bo Hu, Lvqing Bi, Sizhao Li, Songsong Dai:
Asymmetric Equivalences in Fuzzy Logic. Symmetry 9(10): 224 (2017) - 2015
- [c2]Shan He, Sizhao Li, Yan Chen, Donghui Guo:
Uncertainty Analysis of Race Conditions in Real-Time Systems. QRS 2015: 227-232 - 2014
- [c1]Sizhao Li, Shan Lin, Deming Chen, W. Eric Wong, Donghui Guo:
Analysis of System Reliability for Cache Coherence Scheme in Multi-processor. SERE (Companion) 2014: 247-251
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:34 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint