BibTeX records: Yadi Zhang

download as .bib file

@article{DBLP:journals/ipm/JiangZP22,
  author       = {Chloris Qiaolei Jiang and
                  Yadi Zhang and
                  Wenjing Pian},
  title        = {Chatbot as an emergency exist: Mediated empathy for resilience via
                  human-AI interaction during the {COVID-19} pandemic},
  journal      = {Inf. Process. Manag.},
  volume       = {59},
  number       = {6},
  pages        = {103074},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.ipm.2022.103074},
  doi          = {10.1016/J.IPM.2022.103074},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ipm/JiangZP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/YangLZW16,
  author       = {MingWei Yang and
                  Yahui Li and
                  Yadi Zhang and
                  WanRen Wang},
  title        = {{H-DAT:} An Improved Buffer Scheduling Algorithm for Multi-Channel
                  {SSD}},
  booktitle    = {12th International Conference on Computational Intelligence and Security,
                  {CIS} 2016, Wuxi, China, December 16-19, 2016},
  pages        = {23--27},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/CIS.2016.0015},
  doi          = {10.1109/CIS.2016.0015},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/YangLZW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WenLZ16,
  author       = {Pengcheng Wen and
                  Yahui Li and
                  Yadi Zhang},
  title        = {Methods to Capability Improvement for Multiple UAVs' Control},
  booktitle    = {12th International Conference on Computational Intelligence and Security,
                  {CIS} 2016, Wuxi, China, December 16-19, 2016},
  pages        = {444--447},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/CIS.2016.0108},
  doi          = {10.1109/CIS.2016.0108},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WenLZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WenZLL15,
  author       = {Pengcheng Wen and
                  Yadi Zhang and
                  Yahui Li and
                  Xiaoan Li},
  title        = {Intelligence Computing Technology for UAV's Autonomy},
  booktitle    = {11th International Conference on Computational Intelligence and Security,
                  {CIS} 2015, Shenzhen, China, December 19-20, 2015},
  pages        = {22--25},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CIS.2015.14},
  doi          = {10.1109/CIS.2015.14},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WenZLL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/CaiLZL15,
  author       = {Xiaole Cai and
                  Yahui Li and
                  Yadi Zhang and
                  Peng Li},
  title        = {An Efficient Address Mapping Algorithm for Multichannel Structure
                  {SSD}},
  booktitle    = {11th International Conference on Computational Intelligence and Security,
                  {CIS} 2015, Shenzhen, China, December 19-20, 2015},
  pages        = {121--124},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CIS.2015.37},
  doi          = {10.1109/CIS.2015.37},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/CaiLZL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiZWB15,
  author       = {Di Li and
                  Yadi Zhang and
                  Pengcheng Wen and
                  Linting Bai},
  title        = {A Retinex Algorithm for Image Enhancement Based on Recursive Bilateral
                  Filtering},
  booktitle    = {11th International Conference on Computational Intelligence and Security,
                  {CIS} 2015, Shenzhen, China, December 19-20, 2015},
  pages        = {154--157},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CIS.2015.45},
  doi          = {10.1109/CIS.2015.45},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiZWB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiZLG15,
  author       = {Yahui Li and
                  Yadi Zhang and
                  Peng Li and
                  Peng Guo},
  title        = {An Efficient Trusted Chain Model for Real-Time Embedded Systems},
  booktitle    = {11th International Conference on Computational Intelligence and Security,
                  {CIS} 2015, Shenzhen, China, December 19-20, 2015},
  pages        = {428--432},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CIS.2015.109},
  doi          = {10.1109/CIS.2015.109},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiZLG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WangSGZ15,
  author       = {Le Wang and
                  Yunmin Sun and
                  Peng Guo and
                  Yadi Zhang},
  title        = {An Enhanced Reconfiguration Method for the Second Generation Integrated
                  Modular Avionics},
  booktitle    = {11th International Conference on Computational Intelligence and Security,
                  {CIS} 2015, Shenzhen, China, December 19-20, 2015},
  pages        = {433--436},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CIS.2015.110},
  doi          = {10.1109/CIS.2015.110},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WangSGZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/LiNZMS11,
  author       = {Yahui Li and
                  Wen Sheng Niu and
                  Yadi Zhang and
                  Jianfeng Ma and
                  Yulong Shen},
  editor       = {Yuping Wang and
                  Yiu{-}ming Cheung and
                  Ping Guo and
                  Yingbin Wei},
  title        = {Key Management Protocol Based on Finely Granular Multi-level Security
                  Method in Wireless Networks},
  booktitle    = {Seventh International Conference on Computational Intelligence and
                  Security, {CIS} 2011, Sanya, Hainan, China, December 3-4, 2011},
  pages        = {731--735},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/CIS.2011.166},
  doi          = {10.1109/CIS.2011.166},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/LiNZMS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uic/LiZN10,
  author       = {Yahui Li and
                  Yadi Zhang and
                  Wen Sheng Niu},
  title        = {A Method of Privacy Preserving in Mobile Wireless Environments},
  booktitle    = {Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing:
                  7th International Conference on Ubiquitous Intelligence {\&} Computing
                  and 7th International Conference on Autonomic {\&} Trusted Computing,
                  {UIC-ATC} 2010, 26-29 October 2010, Xi'an, China},
  pages        = {132--137},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/UIC-ATC.2010.12},
  doi          = {10.1109/UIC-ATC.2010.12},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uic/LiZN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uic/ZhaoZNZZ10,
  author       = {Xiaodong Zhao and
                  Wan Zhang and
                  Wen Sheng Niu and
                  Yadi Zhang and
                  Liqiang Zhao},
  editor       = {Zhiwen Yu and
                  Ramiro Liscano and
                  Guanling Chen and
                  Daqing Zhang and
                  Xingshe Zhou},
  title        = {Power and Bandwidth Efficiency of {IEEE} 802.15.4 Wireless Sensor
                  Networks},
  booktitle    = {Ubiquitous Intelligence and Computing - 7th International Conference,
                  {UIC} 2010, Xi'an, China, October 26-29, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6406},
  pages        = {243--251},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16355-5\_21},
  doi          = {10.1007/978-3-642-16355-5\_21},
  timestamp    = {Wed, 11 Nov 2020 16:58:38 +0100},
  biburl       = {https://dblp.org/rec/conf/uic/ZhaoZNZZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics