default search action
Yunyi Zhang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Yunyi Zhang 0001 — University of Illinois at Urbana-Champaign, IL, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j10]Jina E., Yunyi Zhang, Wei He, Wei Zhang, You Cao, Gang Lv:
A New Method for Oil-Immersed Transformers Fault Diagnosis Based on Evidential Reasoning Rule With Optimized Probabilistic Distributed. IEEE Access 12: 34289-34305 (2024) - [j9]Zhijie Xie, Fan Shi, Min Zhang, Huimin Ma, Huaixi Wang, Zhenhan Li, Yunyi Zhang:
GuessFuse: Hybrid Password Guessing With Multi-View. IEEE Trans. Inf. Forensics Secur. 19: 4215-4230 (2024) - [j8]Yunyi Zhang, Jina E., You Cao, Wei Zhang, Wei He:
Performance evaluation of complex systems based on hierarchical evidential reasoning rule considering disturbances. J. Supercomput. 80(15): 22124-22154 (2024) - [j7]Yunyi Zhang, Hongbin Huang, Ye Du, Wei He:
On the continuous probability distribution attribute weight of belief rule base model. J. Supercomput. 80(16): 23225-23270 (2024) - [c21]Chengxi Xu, Yunyi Zhang, Fan Shi:
Poster: Capture the List: Ranking Manipulation Leveraging Open Forwarders. IMC 2024: 741-742 - [c20]Chengxi Xu, Yuxuan Wang, Yunyi Zhang, Fan Shi:
Poster: A Fistful of Queries: Accurate and Lightweight Anycast Enumeration of Public DNS. IMC 2024: 743-744 - [c19]Yunyi Zhang, Baojun Liu, Haixin Duan, Min Zhang, Xiang Li, Fan Shi, Chengxi Xu, Eihal Alowaisheq:
Rethinking the Security Threats of Stale DNS Glue Records. USENIX Security Symposium 2024 - [c18]Yunyi Zhang, Mingxuan Liu, Baojun Liu, Yiming Zhang, Haixin Duan, Min Zhang, Hui Jiang, Yanzhe Li, Fan Shi:
Into the Dark: Unveiling Internal Site Search Abused for Black Hat SEO. USENIX Security Symposium 2024 - [c17]Yunyi Zhang, Mingming Zhang, Baojun Liu, Zhan Liu, Jia Zhang, Haixin Duan, Min Zhang, Fan Shi, Chengxi Xu:
Cross the Zone: Toward a Covert Domain Hijacking via Shared DNS Infrastructure. USENIX Security Symposium 2024 - 2023
- [j6]Yizhe Zhang, Yunyi Zhang, Guohui Zhou, Wei Zhang, KangLe Li, Quanqi Mu, Wei He, Kai Tang:
A New Ensemble Learning Method for Multiple Fusion Weighted Evidential Reasoning Rule. J. Electr. Comput. Eng. 2023: 8987461:1-8987461:15 (2023) - [c16]Chunzheng Wang, Yunyi Zhang, Chenlong Zhang, Qixiang Zhao, Wei Wang:
RBSAC: Rolling Balance Controller Based on Soft Actor-Critic Algorithm of the Unicycle Air Robot. ICIRA (8) 2023: 229-240 - [c15]Fenglu Zhang, Yunyi Zhang, Baojun Liu, Eihal Alowaisheq, Lingyun Ying, Xiang Li, Zaifeng Zhang, Ying Liu, Haixin Duan, Min Zhang:
Wolf in Sheep's Clothing: Evaluating Security Risks of the Undelegated Record on DNS Hosting Services. IMC 2023: 188-197 - [c14]Chunzheng Wang, Yunyi Zhang, Chuanzhao Li, Wei Wang, Yangmin Li:
A Rotor Flywheel Robot: Land-air Amphibious Design and Control. IROS 2023: 4341-4346 - 2022
- [j5]Jintian Lu, Yunyi Zhang, Likun Yang, Shuyuan Jin:
Inter-cloud secure data sharing and its formal verification. Trans. Emerg. Telecommun. Technol. 33(1) (2022) - [j4]Guanhong Liu, Tianyu Yu, Zhihao Yao, Haiqing Xu, Yunyi Zhang, Xuhai Xu, Xiaomeng Xu, Mingyue Gao, Qirui Sun, Tingliang Zhang, Haipeng Mi:
ViviPaint: Creating Dynamic Painting with a Thermochromic Toolkit. Multimodal Technol. Interact. 6(8): 63 (2022) - [c13]Chengxi Xu, Yunyi Zhang, Fan Shi, Huimin Ma, Wanmeng Ding, Hong Shan:
Gushing Resolvers: Measuring Open Resolvers' Recursive Behavior. AISS 2022: 54:1-54:6 - 2021
- [c12]Yunyi Zhang, Ling Zhang, Tinghua Chen, Hai Lin, Shengke Ye, Jun Du, Tao Yu, Chuqiao Chen:
Acceptance and Use of Mobile-Assisted Language Learning for Vocational College Students. 6GN 2021: 573-589 - [c11]Yuelong Wu, Jintian Lu, Yunyi Zhang, Shuyuan Jin:
Vulnerability Detection in C/C++ Source Code With Graph Representation Learning. CCWC 2021: 1519-1524 - [c10]Yunyi Zhang, Shuyuan Jin:
Hacks Hit the Phish: Phish Attack Detection Based on Hacks Search. WASA (3) 2021: 299-309 - [i1]Luyu Gao, Yunyi Zhang:
Scaling Deep Contrastive Learning Batch Size with Almost Constant Peak Memory Usage. CoRR abs/2101.06983 (2021) - 2020
- [j3]Xinwei He, A. J. Hildebrand, Yuchen Li, Yunyi Zhang:
Complexity of Leading Digit Sequences. Discret. Math. Theor. Comput. Sci. 22(1) (2020) - [c9]Yunyi Zhang, Yuelong Wu, Shuyuan Jin:
Which DGA Family does A Malicious Domain Name Belong To. DSC 2020: 53-60 - [c8]Yunyi Zhang, Jintian Lu, Shuyuan Jin:
Web Attack Detection Based on User Behaviour Semantics. ICA3PP (3) 2020: 459-474
2010 – 2019
- 2019
- [j2]Yunyi Zhang, Zhan Shi, Dan Feng, Xiu-Xiu Zhan:
Degree-biased random walk for large-scale network embedding. Future Gener. Comput. Syst. 100: 198-209 (2019) - 2015
- [c7]Yunyi Zhang, Shuru Liu, Ran Zhang, Wei Wei, Houbing Song, Wei Li, Xiumei Fan:
A New Multi-Service Token Bucket-Shaping Scheme Based on 802.11e. IIKI 2015: 197-200 - 2014
- [c6]Huiqin Jiang, Yunyi Zhang, Ling Ma, Xiaopeng Yang, Yumin Liu:
A Shearlet-Based Filter for Low-Dose Mammography. Digital Mammography / IWDM 2014: 707-714
2000 – 2009
- 2009
- [j1]Lin Liu, Yunyi Zhang, Xiaoshe Dong:
Packet-Level FEC Research over Wireless Networks. Int. J. Distributed Sens. Networks 5(1): 100 (2009) - [c5]Jun Yang, Deyun Zhang, Yunyi Zhang:
An Energy-Efficient Data Gathering Protocol for Wireless Sensor Networks. ACIS-ICIS 2009: 780-785 - [c4]Yinsheng Li, Yunyi Zhang, Han Chen, Ying Huang:
A Global Information Model for Service-Oriented System Engineering. ICEBE 2009: 529-534 - 2008
- [c3]Yunyi Zhang, Deyun Zhang, Jun Yang, Wei Wei:
Cluster-Based Error Messages Detecting and Processing for Wireless Sensor Networks. CSSE (3) 2008: 194-197 - [c2]Wu Guo, Yunyi Zhang, Dongfeng Han, Wenhui Li:
A hybrid modeling method of Chinese ancient architecture. VRCAI 2008 - 2007
- [c1]Yunyi Zhang, Chongzheng Huang, Deyun Zhang:
A Novel Adaptive Load Shedding Scheme for Data Stream Processing. FGCN (1) 2007: 378-384
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint