Yubao Zhang

Orcid: 0000-0002-1421-4072

According to our database1, Yubao Zhang authored at least 26 papers between 2010 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A multiview clustering framework for detecting deceptive reviews.
J. Comput. Secur., 2024

2023
Pan-cancer analysis of SYNGR2 with a focus on clinical implications and immune landscape in liver hepatocellular carcinoma.
BMC Bioinform., December, 2023

Deep Reinforcement Learning-Based Battery Conditioning Hierarchical V2G Coordination for Multi-Stakeholder Benefits.
CoRR, 2023

Collective Large-scale Wind Farm Multivariate Power Output Control Based on Hierarchical Communication Multi-Agent Proximal Policy Optimization.
CoRR, 2023

Privacy-Preserving Multi-User Joint Data Logistic Regression Inference Scheme.
Proceedings of the International Conference on Networking and Network Applications, 2023

Research on NAS-Oriented Blockchain Aggregation Consensus Algorithm.
Proceedings of the International Conference on Networking and Network Applications, 2023

Research on Cross-Chain Consensus Models in Complex Trust Environments.
Proceedings of the International Conference on Networking and Network Applications, 2023

Dial "N" for NXDomain: The Scale, Origin, and Security Implications of DNS Queries to Non-Existent Domains.
Proceedings of the 2023 ACM on Internet Measurement Conference, 2023

2022
Gamma Radiation Image Noise Prediction Method Based on Statistical Analysis and Random Walk.
Sensors, 2022

Transfer Deep Reinforcement Learning-based Large-scale V2G Continuous Charging Coordination with Renewable Energy Sources.
CoRR, 2022

2021
Mingling of Clear and Muddy Water: Understanding and Detecting Semantic Confusion in Blackhat SEO.
Proceedings of the Computer Security - ESORICS 2021, 2021

2020
Understanding the Manipulation on Recommender Systems through Web Injection.
IEEE Trans. Inf. Forensics Secur., 2020

Image feature extraction algorithm in big data environment.
J. Intell. Fuzzy Syst., 2020

Review Trade: Everything Is Free in Incentivized Review Groups.
Proceedings of the Security and Privacy in Communication Networks, 2020

Understanding Promotion-as-a-Service on GitHub.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Numerical Research on Energy Evolution in Granite under Different Confining Pressures Using Otsu's Digital Image Processing and PFC2D.
Symmetry, 2019

Casino royale: a deep exploration of illegal online gambling.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
End-Users Get Maneuvered: Empirical Analysis of Redirection Hijacking in Content Delivery Networks.
Proceedings of the 27th USENIX Security Symposium, 2018

2017
Twitter Trends Manipulation: A First Look Inside the Security of Twitter Trending.
IEEE Trans. Inf. Forensics Secur., 2017

Deformation Monitoring of Waste-Rock-Backfilled Mining Gob for Ground Control.
Sensors, 2017

2016
An efficient method based on progressive interpolation for solving non-linear equations.
Appl. Math. Lett., 2016

2014
What scale of audience a campaign can reach in what price on Twitter?
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

2013
Modeling analysis of server loading in large-scale P2P-VoD systems with actively collaborative helpers.
Telecommun. Syst., 2013

2012
Characterizing top user behavior of Sina microblogging in the context of different events.
Proceedings of the International Conference on Computing, Networking and Communications, 2012

2011
A geographic analysis of P2P-TV viewership.
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011

2010
The Benefits of Network Coding in Distributed Caching in Large-Scale P2P-VoD Systems.
Proceedings of the Global Communications Conference, 2010


  Loading...