Yunkai Zhang

Orcid: 0009-0008-1359-9688

According to our database1, Yunkai Zhang authored at least 26 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Comprehensive Survey on Person Identification: Queries, Methods, and Datasets.
Proceedings of the 1st ICMR Workshop on Multimedia Object Re-Identification, 2024

Resource Allocation with Service Affinity in Large-Scale Cloud Environments.
Proceedings of the 40th IEEE International Conference on Data Engineering, 2024

NTIRE 2024 Challenge on Low Light Image Enhancement: Methods and Results.
, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024

2023
Scalable Primal-Dual Actor-Critic Method for Safe Multi-Agent RL with General Utilities.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

2021
Bullet Subtitle Sentiment Classification Based on Affective Computing and Ensemble Learning.
Wirel. Commun. Mob. Comput., 2021

Application of Skeleton Data and Long Short-Term Memory in Action Recognition of Children with Autism Spectrum Disorder.
Sensors, 2021

Continuous Conditional Generative Adversarial Networks (cGAN) with Generator Regularization.
CoRR, 2021

2020
TabFact: A Large-scale Dataset for Table-based Fact Verification.
Proceedings of the 8th International Conference on Learning Representations, 2020

Logic2Text: High-Fidelity Natural Language Generation from Logical Forms.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2020, 2020

2019
You May Not Need Order in Time Series Forecasting.
CoRR, 2019

2018
Exploration of Numerical Precision in Deep Neural Networks.
CoRR, 2018

2016
Stability Analysis of a Worm Propagation Model with Quarantine and Vaccination.
Int. J. Netw. Secur., 2016

Analysis of an SEIVR Epidemic Model with Partial Immunization and Nonlinear Infection Rate.
Proceedings of the International Conference on Networking and Network Applications, 2016

2015
A Worm Defending Model with Partial Immunization and Its Stability Analysis.
J. Commun., 2015

Global Analysis of a SEIQV Epidemic Model for Scanning Worms with Quarantine Strategy.
Int. J. Netw. Secur., 2015

Stability analysis of an <i>e</i>-<i>SEIAR</i> model with point-to-group worm propagation.
Commun. Nonlinear Sci. Numer. Simul., 2015

2014
Stability Analysis of a SEIQRS Model with Graded Infection Rates for Internet Worms.
J. Comput., 2014

2013
Combating Good Point Set Scanning-based Self-learning Worms by Using Predators.
Int. J. Netw. Secur., 2013

CloudAP: Improving the QoS of Mobile Applications with Efficient VM Migration.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

2010
Modelling and Analyzing Passive Worms over Unstructured Peer-to-Peer Networks.
Int. J. Netw. Secur., 2010

Stability analysis of a SEIQV epidemic model for rapid spreading worms.
Comput. Secur., 2010

Combating self-learning worms by using predators.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

2009
Modeling and analysis of a self-learning worm based on good point set scanning.
Wirel. Commun. Mob. Comput., 2009

Defending passive worms in unstructured P2P networks based on healthy file dissemination.
Comput. Secur., 2009

Predators Combat Good Point Set Scanning-Based Self-Learning Worms.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

2005
Worm Propagation Modeling and Analysis on Network.
Proceedings of the Computational Intelligence and Security, International Conference, 2005


  Loading...