Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Yadi Zhang
@article{DBLP:journals/ipm/JiangZP22, author = {Chloris Qiaolei Jiang and Yadi Zhang and Wenjing Pian}, title = {Chatbot as an emergency exist: Mediated empathy for resilience via human-AI interaction during the {COVID-19} pandemic}, journal = {Inf. Process. Manag.}, volume = {59}, number = {6}, pages = {103074}, year = {2022}, url = {https://doi.org/10.1016/j.ipm.2022.103074}, doi = {10.1016/J.IPM.2022.103074}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ipm/JiangZP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/YangLZW16, author = {MingWei Yang and Yahui Li and Yadi Zhang and WanRen Wang}, title = {{H-DAT:} An Improved Buffer Scheduling Algorithm for Multi-Channel {SSD}}, booktitle = {12th International Conference on Computational Intelligence and Security, {CIS} 2016, Wuxi, China, December 16-19, 2016}, pages = {23--27}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CIS.2016.0015}, doi = {10.1109/CIS.2016.0015}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/YangLZW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WenLZ16, author = {Pengcheng Wen and Yahui Li and Yadi Zhang}, title = {Methods to Capability Improvement for Multiple UAVs' Control}, booktitle = {12th International Conference on Computational Intelligence and Security, {CIS} 2016, Wuxi, China, December 16-19, 2016}, pages = {444--447}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CIS.2016.0108}, doi = {10.1109/CIS.2016.0108}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/WenLZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WenZLL15, author = {Pengcheng Wen and Yadi Zhang and Yahui Li and Xiaoan Li}, title = {Intelligence Computing Technology for UAV's Autonomy}, booktitle = {11th International Conference on Computational Intelligence and Security, {CIS} 2015, Shenzhen, China, December 19-20, 2015}, pages = {22--25}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CIS.2015.14}, doi = {10.1109/CIS.2015.14}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/WenZLL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/CaiLZL15, author = {Xiaole Cai and Yahui Li and Yadi Zhang and Peng Li}, title = {An Efficient Address Mapping Algorithm for Multichannel Structure {SSD}}, booktitle = {11th International Conference on Computational Intelligence and Security, {CIS} 2015, Shenzhen, China, December 19-20, 2015}, pages = {121--124}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CIS.2015.37}, doi = {10.1109/CIS.2015.37}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/CaiLZL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LiZWB15, author = {Di Li and Yadi Zhang and Pengcheng Wen and Linting Bai}, title = {A Retinex Algorithm for Image Enhancement Based on Recursive Bilateral Filtering}, booktitle = {11th International Conference on Computational Intelligence and Security, {CIS} 2015, Shenzhen, China, December 19-20, 2015}, pages = {154--157}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CIS.2015.45}, doi = {10.1109/CIS.2015.45}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/LiZWB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LiZLG15, author = {Yahui Li and Yadi Zhang and Peng Li and Peng Guo}, title = {An Efficient Trusted Chain Model for Real-Time Embedded Systems}, booktitle = {11th International Conference on Computational Intelligence and Security, {CIS} 2015, Shenzhen, China, December 19-20, 2015}, pages = {428--432}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CIS.2015.109}, doi = {10.1109/CIS.2015.109}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/LiZLG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WangSGZ15, author = {Le Wang and Yunmin Sun and Peng Guo and Yadi Zhang}, title = {An Enhanced Reconfiguration Method for the Second Generation Integrated Modular Avionics}, booktitle = {11th International Conference on Computational Intelligence and Security, {CIS} 2015, Shenzhen, China, December 19-20, 2015}, pages = {433--436}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CIS.2015.110}, doi = {10.1109/CIS.2015.110}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/WangSGZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LiNZMS11, author = {Yahui Li and Wen Sheng Niu and Yadi Zhang and Jianfeng Ma and Yulong Shen}, editor = {Yuping Wang and Yiu{-}ming Cheung and Ping Guo and Yingbin Wei}, title = {Key Management Protocol Based on Finely Granular Multi-level Security Method in Wireless Networks}, booktitle = {Seventh International Conference on Computational Intelligence and Security, {CIS} 2011, Sanya, Hainan, China, December 3-4, 2011}, pages = {731--735}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/CIS.2011.166}, doi = {10.1109/CIS.2011.166}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/LiNZMS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uic/LiZN10, author = {Yahui Li and Yadi Zhang and Wen Sheng Niu}, title = {A Method of Privacy Preserving in Mobile Wireless Environments}, booktitle = {Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing: 7th International Conference on Ubiquitous Intelligence {\&} Computing and 7th International Conference on Autonomic {\&} Trusted Computing, {UIC-ATC} 2010, 26-29 October 2010, Xi'an, China}, pages = {132--137}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/UIC-ATC.2010.12}, doi = {10.1109/UIC-ATC.2010.12}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uic/LiZN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uic/ZhaoZNZZ10, author = {Xiaodong Zhao and Wan Zhang and Wen Sheng Niu and Yadi Zhang and Liqiang Zhao}, editor = {Zhiwen Yu and Ramiro Liscano and Guanling Chen and Daqing Zhang and Xingshe Zhou}, title = {Power and Bandwidth Efficiency of {IEEE} 802.15.4 Wireless Sensor Networks}, booktitle = {Ubiquitous Intelligence and Computing - 7th International Conference, {UIC} 2010, Xi'an, China, October 26-29, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6406}, pages = {243--251}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16355-5\_21}, doi = {10.1007/978-3-642-16355-5\_21}, timestamp = {Wed, 11 Nov 2020 16:58:38 +0100}, biburl = {https://dblp.org/rec/conf/uic/ZhaoZNZZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.