Yuntao Zhao

Orcid: 0000-0002-2627-8276

According to our database1, Yuntao Zhao authored at least 31 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Efficient Detection of Malicious Traffic Using a Decision Tree-Based Proximal Policy Optimisation Algorithm: A Deep Reinforcement Learning Malicious Traffic Detection Model Incorporating Entropy.
Entropy, August, 2024

Pairwise-Pixel Self-Supervised and Superpixel-Guided Prototype Contrastive Loss for Weakly Supervised Semantic Segmentation.
Cogn. Comput., May, 2024

SeMalBERT: Semantic-based malware detection with bidirectional encoder representations from transformers.
J. Inf. Secur. Appl., February, 2024

Prototype Consistency Learning for Medical Image Segmentation by Cross Pseudo Supervision.
Cogn. Comput., January, 2024

A performance indicator-based evolutionary algorithm for expensive high-dimensional multi-/many-objective optimization.
Inf. Sci., 2024

OneR-DQN: a botnet traffic detection model based on deep Q network algorithm in deep reinforcement learning.
Int. J. Secur. Networks, 2024

An infill sampling criterion based on improvement of probability and mapping crowding distance for expensive multi/many-objective optimization.
Eng. Appl. Artif. Intell., 2024

2023
Self-supervised pairwise-sample resistance model for few-shot classification.
Appl. Intell., September, 2023

Hybrid multi-objective optimization algorithm based on angle competition and neighborhood protection mechanism.
Appl. Intell., April, 2023

Reliable registration method for point clouds with low overlap.
J. Electronic Imaging, 2023

MalGA-LSTM: a malicious code detection model based on genetic algorithm optimising LSTM trainable parameters.
Int. J. Secur. Networks, 2023

2022
Improved whale algorithm and its application in cobot excitation trajectory optimization.
Int. J. Intell. Robotics Appl., 2022

Research on Visual Malicious Code Classification Based on Improved Faster R-CNN.
Proceedings of the 2022 International Conference on Computer and Information Processing Technology Virtual Event, 2022

2020
Optimization of geometry quality model for wire and arc additive manufacture based on adaptive multi-objective grey wolf algorithm.
Soft Comput., 2020

Improved grey wolf optimization based on the two-stage search of hybrid CMA-ES.
Soft Comput., 2020

Prediction of mechanical properties of micro-alloyed steels via neural networks learned by water wave optimization.
Neural Comput. Appl., 2020

A Malware Detection Method of Code Texture Visualization Based on an Improved Faster RCNN Combining Transfer Learning.
IEEE Access, 2020

An Enhanced Grey Wolf Algorithm Based on Equalization Mechanism.
Proceedings of the ISMSI '20: 2020 4th International Conference on Intelligent Systems, 2020

2019
MalDeep: A Deep Learning Classification Framework against Malware Variants Based on Texture Visualization.
Secur. Commun. Networks, 2019

A Feature Extraction Method of Hybrid Gram for Malicious Behavior Based on Machine Learning.
Secur. Commun. Networks, 2019

融合自适应差分进化机制的多目标灰狼优化算法 (Multi-objective Grey Wolf Optimization Hybrid Adaptive Differential Evolution Mechanism).
计算机科学, 2019

A Scheduling Method of Cross-Layers Optimization of Polling Weight for AOS Multiplexing.
Int. J. Digit. Multim. Broadcast., 2019

2018
A Classification Detection Algorithm Based on Joint Entropy Vector against Application-Layer DDoS Attack.
Secur. Commun. Networks, 2018

A Scheduling Model of Isochronous Frame Generation on Self-similar Traffic of AOS Multiplexing.
Int. J. Online Eng., 2018

An Energy Efficient and QoS Aware Routing Algorithm Based on Data Classification for Industrial Wireless Sensor Networks.
IEEE Access, 2018

Designing Neural Networks Using Novel Water Wave Optimization Based Memetic Algorithm.
Proceedings of the 14th International Conference on Natural Computation, 2018

2017
An Improved Ant Colony Algorithm for Path Planning in One Scenic Area With Many Spots.
IEEE Access, 2017

2016
An Algorithm of Traffic Perception of DDoS Attacks against SOA Based on Time United Conditional Entropy.
J. Electr. Comput. Eng., 2016

2009
An improved differential evolution to continuous domains and its convergence.
Proceedings of the first ACM/SIGEVO Summit on Genetic and Evolutionary Computation, 2009

2008
An Improved Resistant to Destruction Routing Algorithm Based on LEO Satellite Network.
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008

The Research of Reconfiguration Technology in Mobile Ad Hoc Network.
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008


  Loading...