Остановите войну!
for scientists:
default search action
Yi Zhao 0011
Person information
- affiliation: Tsinghua University, Department of Computer Science and Technology, China
Other persons with the same name
- Yi Zhao — disambiguation page
- Yi Zhao 0001 — University of Southampton, UK
- Yi Zhao 0002 — Shenzhen University, College of Mathematics and Statistics, China (and 1 more)
- Yi Zhao 0003 — Marvell Semiconductor, Santa Clara, CA, USA (and 1 more)
- Yi Zhao 0004 — Ohio State University, Columbus, OH, USA (and 1 more)
- Yi Zhao 0005 — Georgia State University, Department of Mathematics and Statistics, Atlanta, GA, USA
- Yi Zhao 0006 — University of Tokyo, Department of Electrical Engineering and Information Systems, Japan
- Yi Zhao 0007 — Harbin Institute of Technology, Shenzhen Graduate School, College of Science, China (and 1 more)
- Yi Zhao 0008 — Xiamen University, Department of Chemistry, China
- Yi Zhao 0009 — Hohai University, Department of Geomatics Engineering, Nanjing, China
- Yi Zhao 0010 — Beijing University of Chemical Technology, Beijing Key Laboratory for Health Monitoring and Self-Recovery of High End Mechanical Equipment, China
- Yi Zhao 0012 — University of Bonn, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i2]Qi Tan, Qi Li, Yi Zhao, Zhuotao Liu, Xiaobing Guo, Ke Xu:
Defending Against Data Reconstruction Attacks in Federated Learning: An Information Theory Approach. CoRR abs/2403.01268 (2024) - 2023
- [j10]Jiahui Chen, Yi Zhao, Qi Li, Xuewei Feng, Ke Xu:
FedDef: Defense Against Gradient Leakage in Federated Learning-Based Network Intrusion Detection Systems. IEEE Trans. Inf. Forensics Secur. 18: 4561-4576 (2023) - [j9]Yi Zhao, Meina Qiao, Haiyang Wang, Rui Zhang, Dan Wang, Ke Xu:
Friendship Inference in Mobile Social Networks: Exploiting Multi-Source Information With Two-Stage Deep Learning Framework. IEEE/ACM Trans. Netw. 31(2): 542-557 (2023) - 2022
- [j8]Yi Zhao, Ke Xu, Qi Li, Haiyang Wang, Dan Wang, Min Zhu:
Intelligent networking in adversarial environment: challenges and opportunities. Sci. China Inf. Sci. 65(7): 1-11 (2022) - [j7]Yi Zhao, Ke Xu, Jiahui Chen, Qi Tan:
Collaboration-Enabled Intelligent Internet Architecture: Opportunities and Challenges. IEEE Netw. 36(5): 98-105 (2022) - [c8]Yi Zhao, Qi Tan, Xiaohua Xu, Hui Su, Dan Wang, Ke Xu:
Congestion-Aware Modeling and Analysis of Sponsored Data Plan from End User Perspective. IWQoS 2022: 1-11 - 2021
- [j6]Yi Zhao, Ke Xu, Haiyang Wang, Bo Li, Meina Qiao, Haobin Shi:
MEC-Enabled Hierarchical Emotion Recognition and Perturbation-Aware Defense in Smart Cities. IEEE Internet Things J. 8(23): 16933-16945 (2021) - [j5]Yi Zhao, Ke Xu, Haiyang Wang, Bo Li, Ruoxi Jia:
Stability-Based Analysis and Defense against Backdoor Attacks on Edge Computing Services. IEEE Netw. 35(1): 163-169 (2021) - [j4]Rui Zhang, Xuelong Li, Tong Wu, Yi Zhao:
Data Clustering via Uncorrelated Ridge Regression. IEEE Trans. Neural Networks Learn. Syst. 32(1): 450-456 (2021) - [c7]Yang Liu, Yi Zhao, Guangmeng Zhou, Ke Xu:
FedPrune: Personalized and Communication-Efficient Federated Learning on Non-IID Data. ICONIP (5) 2021: 430-437 - [i1]Guangmeng Zhou, Ke Xu, Qi Li, Yang Liu, Yi Zhao:
AdaptCL: Efficient Collaborative Learning with Dynamic and Adaptive Pruning. CoRR abs/2106.14126 (2021) - 2020
- [j3]Yi Zhao, Ke Xu, Yifeng Zhong, Xiangyang Li, Ning Wang, Hui Su, Meng Shen, Ziwei Li:
Incentive mechanisms for mobile data offloading through operator-owned WiFi access points. Comput. Networks 174: 107226 (2020) - [j2]Yi Zhao, Haiyang Wang, Hui Su, Liang Zhang, Rui Zhang, Dan Wang, Ke Xu:
Understand Love of Variety in Wireless Data Market Under Sponsored Data Plans. IEEE J. Sel. Areas Commun. 38(4): 766-781 (2020) - [c6]Yi Zhao, Ke Xu, Feng Yan, Yuchao Zhang, Yao Fu, Haiyang Wang:
Auction-based High Timeliness Data Pricing under Mobile and Wireless Networks. ICC 2020: 1-6 - [c5]Yi Zhao, Wei Bao, Dan Wang, Ke Xu, Liang Lv:
Connection-based Pricing for IoT Devices: Motivation, Comparison, and Potential Problems. INFOCOM Workshops 2020: 1302-1303 - [c4]Liang Lv, Ke Xu, Haiyang Wang, Meng Shen, Yi Zhao, Minghui Li, Guanhui Geng, Zhichao Liu:
Analysis, Modeling, and Implementation of Publisher-side Ad Request Filtering. INFOCOM 2020: 2223-2232 - [c3]Fan Yang, Ke Xu, Qi Li, Rongxing Lu, Bo Wu, Tong Zhang, Yi Zhao, Meng Shen:
I Know If the Journey Changes: Flexible Source and Path Validation. IWQoS 2020: 1-6
2010 – 2019
- 2019
- [j1]Ziwei Li, Ke Xu, Haiyang Wang, Yi Zhao, Xiaoliang Wang, Meng Shen:
Machine-Learning-Based Positioning: A Survey and Future Directions. IEEE Netw. 33(3): 96-101 (2019) - [c2]Yi Zhao, Meina Qiao, Haiyang Wang, Rui Zhang, Dan Wang, Ke Xu, Qi Tan:
TDFI: Two-stage Deep Learning Framework for Friendship Inference via Multi-source Information. INFOCOM 2019: 1981-1989 - [c1]Yi Zhao, Hui Su, Liang Zhang, Dan Wang, Ke Xu:
Variety matters: a new model for the wireless data market under sponsored data plans. IWQoS 2019: 23:1-23:10
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-10 02:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint