Yiting Zhang

Orcid: 0000-0002-8729-830X

According to our database1, Yiting Zhang authored at least 27 papers between 2011 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Precision strike: Precise backdoor attack with dynamic trigger.
Comput. Secur., 2025

2024
An Improved YOLOv8 Network for Detecting Electric Pylons Based on Optical Satellite Image.
Sensors, June, 2024

A Detection Method Against Selfish Mining-Like Attacks Based on Ensemble Deep Learning in IoT.
IEEE Internet Things J., June, 2024

Bayesian Deep Learning via Expectation Maximization and Turbo Deep Approximate Message Passing.
IEEE Trans. Signal Process., 2024

Differentiable Discrete Elastic Rods for Real-Time Modeling of Deformable Linear Objects.
CoRR, 2024

Knowledge Graph Large Language Model (KG-LLM) for Link Prediction.
CoRR, 2024

Bayesian Federated Learning Via Expectation Maximization and Turbo Deep Approximate Message Passing.
CoRR, 2024

Privacy Protection for Image Sharing Using Reversible Adversarial Examples.
Proceedings of the IEEE International Conference on Communications, 2024

Implicit Event-RGBD Neural SLAM.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024

2023
A mini-batch algorithm for large-scale learning problems with adaptive step size.
Digit. Signal Process., November, 2023

Achieving optimal rewards in cryptocurrency stubborn mining with state transition analysis.
Inf. Sci., May, 2023

Computing the Tracy-Widom distribution for arbitrary β>0.
CoRR, 2023

A Family of High Gain Converters Based on Switched Inductor and Switched Capacitor Units.
Proceedings of the 49th Annual Conference of the IEEE Industrial Electronics Society, 2023

2022
An intelligent forecast for COVID-19 based on single and multiple features.
Int. J. Intell. Syst., 2022

Optimal Revenue Analysis of the Stubborn Mining Based on Markov Decision Process.
Proceedings of the Machine Learning for Cyber Security - 4th International Conference, 2022

2021
BSMRL: Bribery Selfish Mining with Reinforcement Learning.
Proceedings of the Data Mining and Big Data - 6th International Conference, 2021

2020
FingerAuth: 3D magnetic finger motion pattern based implicit authentication for mobile devices.
Future Gener. Comput. Syst., 2020

Vroom!: A Search Engine for Sounds by Vocal Imitation Queries.
Proceedings of the CHIIR '20: Conference on Human Information Interaction and Retrieval, 2020

2019
Sound Search by Text Description or Vocal Imitation?
CoRR, 2019

2018
Fingerprinting Network Entities Based on Traffic Analysis in High-Speed Network Environment.
Secur. Commun. Networks, 2018

Edible fiducial marker made of edible retroreflector.
Comput. Graph., 2018

Path Planning Algorithm for UAV Sensing Data Collection Based on the Efficacy Function.
Proceedings of the IoT as a Service - 4th EAI International Conference, 2018

2017
Edible retroreflector.
Proceedings of the 23rd ACM Symposium on Virtual Reality Software and Technology, 2017

2013
Unintended adverse consequences of introducing electronic health records in residential aged care homes.
Int. J. Medical Informatics, 2013

2012
The benefits of introducing electronic health records in residential aged care facilities: A multiple case study.
Int. J. Medical Informatics, 2012

2011
Comparing the Macroeconomic Responses of US and Japan through Time Series Segmentation.
Proceedings of the Knowledge Discovery, Knowledge Engineering and Knowledge Management, 2011

Time Series Segmentation as a Discovery Tool - A Case Study of the US and Japanese Financial Markets.
Proceedings of the KDIR 2011, 2011


  Loading...