Yusen Zhang
This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.
Known people with the same name:
- Yusen Zhang 001 (Penn State University, PA, USA)
- Yusen Zhang 002 (Shandong University at Weihai, Weihai, China)
- Yusen Zhang 003 (Beijing Institute of Technology, China)
- Yusen Zhang 004 (Dalian University of Technology, Dalian, China)
- Yusen Zhang 005 (Northwestern Polytechnical University, School of Automation, Xi'an, China)
- Yusen Zhang 006 (University of Shanghai for Science and Technology, China)
Bibliography
2024
Adaptive Gaussian Filter Based on ICEEMDAN Applying in Non-Gaussian Non-stationary Noise.
Circuits Syst. Signal Process., July, 2024
Neural Networks, January, 2024
Neural Comput. Appl., 2024
Asymmetric slack contrastive learning for full use of feature information in image translation.
Knowl. Based Syst., 2024
Inf. Sci., 2024
CoRR, 2024
When Can LLMs Actually Correct Their Own Mistakes? A Critical Survey of Self-Correction of LLMs.
CoRR, 2024
DGLP: Incorporating Orientation Information for Enhanced Link Prediction in Directed Graphs.
Proceedings of the IEEE International Conference on Acoustics, 2024
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024
2023
MaxCLK: discovery of cancer driver genes via maximal clique and information entropy of modules.
Bioinform., December, 2023
Appl. Intell., October, 2023
A Learnable Image-Based Load Signature Construction Approach in NILM for Appliances Identification.
IEEE Trans. Smart Grid, September, 2023
A detector for page-level handwritten music object recognition based on deep learning.
Neural Comput. Appl., May, 2023
2022
Proceedings of the International Joint Conference on Neural Networks, 2022
AiM: Taking Answers in Mind to Correct Chinese Cloze Tests in Educational Applications.
Proceedings of the 29th International Conference on Computational Linguistics, 2022
2011
Formal Threat Analysis for Ad-Hoc Routing Protocol: Modelling and Checking the Sybil Attack.
Intell. Autom. Soft Comput., 2011
2007
Universal Steganalysis Using Multiwavelet Higher-Order Statistics and Support Vector Machines.
Proceedings of the Advances in Neural Networks, 2007