


default search action
Yuyang Zhou
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2026
[j46]Tian Qin
, Guang Cheng
, Yuyang Zhou
, Zihan Chen
, Xing Luan
:
SNAKE: A sustainable and multi-functional traffic analysis system utilizing specialized large-scale models with a mixture of experts architecture. Comput. Networks 276: 111960 (2026)
[j45]Mengdi Ouyang
, Fagen Li
, Qinshuo Sun
, Cuixiang Yang
, Yuyang Zhou
:
Secure Broadcast Encryption With Reverse Firewalls on Corrupted Machines. IEEE Trans. Computers 75(1): 87-100 (2026)
[j44]Yuyang Zhou
, Guang Cheng
, Kang Du
, Zihan Chen
, Tian Qin
, Yuyu Zhao
:
From Static to Adaptive Defense: Federated Multi-Agent Deep Reinforcement Learning-Driven Moving Target Defense Against DoS Attacks in UAV Swarm Networks. IEEE Trans. Cogn. Commun. Netw. 12: 3407-3421 (2026)
[j43]Zihan Chen
, Guang Cheng
, Dandan Niu
, Yuyu Zhao
, Yuyang Zhou
, Shanqing Jiang
:
Ultimate Encrypted Traffic Feature Engineering: HTTPS Encrypted Traffic Classification Using Restored Application Data Unit Length. IEEE Trans. Dependable Secur. Comput. 23(1): 1290-1307 (2026)- 2025
[j42]Shengyuan Qi, Lin Yang, Linru Ma, Yuyang Zhou, Shanqing Jiang, Lianxiao Meng, Guang Cheng:
A network integrated performance evaluation method based on multi-attribute decisions of topology and traffic. Frontiers Comput. Sci. 19(11): 1911504 (2025)
[j41]Di Wang, Li Wang, Yuyang Zhou
:
MAE-CoReNet: Masking Autoencoder-Convolutional Reformer Net. Int. J. Inf. Syst. Model. Des. 16(1): 1-23 (2025)
[j40]Dan Li, Ruozhou Lv, Jie Li
, Yuyang Zhou, Yutong Zhou, Fengye Hu
:
Energy-Efficient Access Resource Allocation in Wireless Body Area Networks via Coalitional Game-Based Optimization. IEEE Internet Things J. 12(14): 26104-26115 (2025)
[j39]Daya Guo, Dejian Yang, Haowei Zhang, Junxiao Song, Peiyi Wang, Qihao Zhu, Runxin Xu, Ruoyu Zhang, Shirong Ma, Xiao Bi, Xiaokang Zhang, Xingkai Yu, Yu Wu, Z. F. Wu, Zhibin Gou, Zhihong Shao, Zhuoshu Li, Ziyi Gao, Aixin Liu, Bing Xue, Bingxuan Wang, Bochao Wu, Bei Feng, Chengda Lu, Chenggang Zhao, Chengqi Deng, Chong Ruan, Damai Dai, Deli Chen, Dongjie Ji, Erhang Li, Fangyun Lin, Fucong Dai, Fuli Luo, Guangbo Hao, Guanting Chen, Guowei Li, Hao Zhang, Hanwei Xu, Honghui Ding, Huazuo Gao, Hui Qu, Hui Li, Jianzhong Guo, Jiashi Li, Jingchang Chen, Jingyang Yuan, Jinhao Tu, Junjie Qiu, Junlong Li, J. L. Cai, Jiaqi Ni, Jian Liang, Jin Chen, Kai Dong, Kai Hu, Kaichao You, Kaige Gao, Kang Guan, Kexin Huang, Kuai Yu, Lean Wang, Lecong Zhang, Liang Zhao, Litong Wang, Liyue Zhang, Lei Xu, Leyi Xia, Mingchuan Zhang, Minghua Zhang, Minghui Tang, Mingxu Zhou, Meng Li, Miaojun Wang, Mingming Li, Ning Tian, Panpan Huang, Peng Zhang, Qiancheng Wang, Qinyu Chen, Qiushi Du, Ruiqi Ge, Ruisong Zhang, Ruizhe Pan, Runji Wang, R. J. Chen, R. L. Jin, Ruyi Chen, Shanghao Lu, Shangyan Zhou, Shanhuang Chen, Shengfeng Ye, Shiyu Wang, Shuiping Yu, Shunfeng Zhou, Shuting Pan, S. S. Li, Shuang Zhou, Shaoqing Wu, Tao Yun, Tian Pei, Tianyu Sun, Tao Wang, Wangding Zeng, Wen Liu, Wenfeng Liang, Wenjun Gao, Wenqin Yu, Wentao Zhang, W. L. Xiao, Wei An, Xiaodong Liu, Xiaohan Wang, Xiaokang Chen, Xiaotao Nie, Xin Cheng, Xin Liu, Xin Xie, Xingchao Liu, Xinyu Yang, Xinyuan Li, Xuecheng Su, Xuheng Lin, X. Q. Li, Xiangyue Jin, Xiaojin Shen, Xiaosha Chen, Xiaowen Sun, Xiaoxiang Wang, Xinnan Song, Xinyi Zhou, Xianzu Wang, Xinxia Shan, Y. K. Li, Y. Q. Wang, Y. X. Wei, Yang Zhang, Yanhong Xu, Yao Li, Yao Zhao, Yaofeng Sun, Yaohui Wang, Yi Yu, Yichao Zhang, Yifan Shi, Yiliang Xiong, Ying He, Yishi Piao, Yisong Wang, Yixuan Tan, Yiyang Ma, Yiyuan Liu, Yongqiang Guo, Yuan Ou, Yuduan Wang, Yue Gong, Yuheng Zou, Yujia He, Yunfan Xiong, Yuxiang Luo, Yuxiang You, Yuxuan Liu, Yuyang Zhou, Y. X. Zhu, Yanping Huang, Yaohui Li, Yi Zheng, Yuchen Zhu, Yunxian Ma, Ying Tang, Yukun Zha, Yuting Yan, Z. Z. Ren, Zehui Ren, Zhangli Sha, Zhe Fu, Zhean Xu, Zhenda Xie, Zhengyan Zhang, Zhewen Hao, Zhicheng Ma, Zhigang Yan, Zhiyu Wu, Zihui Gu, Zijia Zhu, Zijun Liu, Zilin Li, Ziwei Xie, Ziyang Song, Zizheng Pan, Zhen Huang, Zhipeng Xu, Zhongyu Zhang, Zhen Zhang:
DeepSeek-R1 incentivizes reasoning in LLMs through reinforcement learning. Nat. 645(8081): 633-638 (2025)
[j38]Yuyang Zhou, Yulai You, Xiaokai Tan, Juncheng Tang:
AMAY-Net: adaptive multi-scale attention YOLO network for liver and gallbladder segmentation in laparoscopic cholecystectomy. PeerJ Comput. Sci. 11: e2961 (2025)
[j37]Guojie Li
, Ping Zhou
, Yuyang Zhou, Tianyou Chai
:
Virtual Error-Based Data-Driven P-Type Adaptive Predictive Control and Its Applications. IEEE Trans Autom. Sci. Eng. 22: 18773-18785 (2025)
[j36]Yuyang Zhou
, Liang Zhao
, Fagen Li
, Tsuyoshi Takagi:
Exfiltration-Resistant Proxy Re-Encryption for IoT Data Sharing in Unreliable Clouds. IEEE Trans. Dependable Secur. Comput. 22(4): 4070-4085 (2025)
[j35]Ran Ran
, Jiwei Wei
, Yuyang Zhou, Xiang Guan
, Yang Yang
, Heng Tao Shen
:
HCFMN: Hierarchical Cross-Modal Fine-Grained Mining Network for Temporal Sentence Grounding. IEEE Trans. Multim. 27: 6462-6474 (2025)
[j34]Yuyang Zhou
, Guang Cheng
, Zhi Ouyang, Zongyao Chen
:
Resource-Efficient Low-Rate DDoS Mitigation With Moving Target Defense in Edge Clouds. IEEE Trans. Netw. Serv. Manag. 22(1): 168-186 (2025)
[j33]Songjiang Yang
, Cheng-Xiang Wang
, Yinghua Wang
, Jie Huang
, Yuyang Zhou, El-Hadi M. Aggoune
:
An Efficient Pre-Processing Method for 6G Dynamic Ray-Tracing Channel Modeling. IEEE Trans. Veh. Technol. 74(5): 6941-6953 (2025)
[c31]Ran Chen, Yuyang Zhou, Jingyang Deng, Zeren Zhang, Xuefei Tong, Jinwen Ma, Qinghui Shi, Qian Xu, Yuanjun Li:
Reframing Multimodal Complex Document Layout Understanding: A Layout-Aware Multi-Source Reasoning Decision Framework. ECAI 2025: 3411-3418
[c30]Yuyang Zhou
, Ferrante Neri
, Yew-Soon Ong
, Ruibin Bai
:
SiamNAS: Siamese Surrogate Model for Dominance Relation Prediction in Multi-objective Neural Architecture Search. GECCO 2025: 1309-1318
[c29]Yuyang Zhou, Songjiang Yang, Yinghua Wang, Jie Huang
, Chengxiang Wang:
Ray Launching Based Super-Resolution Method for Antenna Elements of Massive MIMO Scenario. ICC 2025: 4848-4853
[c28]Pinhui Zhao, Decai Li, Minjiang Wu, Yuyang Zhou, Yuqing He:
Real-Time Optimization-Based Quadrotor Trajectory Generation with Kinodynamic Constraints in Unknown Environments. IROS 2025: 13250-13257
[c27]Tingsheng Feng
, Zhihao Shen
, Xi Zhao
, Xiaoni Lu
, Yuyang Zhou
:
CryptoMixer: Fine-grained market information-aware MLP Networks for Individual Cryptocurrency Trading Prediction. KDD (2) 2025: 603-614
[c26]Hengyu Zhang, Guang Cheng, Yuyang Zhou, Zongyao Chen:
MalShield: Enhancing Android Malware Detection with Stateful Defense against Query Attacks. TrustCom 2025: 681-689
[i15]Zihan Chen, Guang Cheng, Jinhui Li, Tian Qin, Yuyang Zhou, Xing Luan:
Drift-oriented Self-evolving Encrypted Traffic Application Classification for Actual Network Environment. CoRR abs/2501.04246 (2025)
[i14]Tian Qin, Guang Cheng, Yuyang Zhou, Zihan Chen, Xing Luan:
SNAKE: A Sustainable and Multi-functional Traffic Analysis System utilizing Specialized Large-Scale Models with a Mixture of Experts Architecture. CoRR abs/2503.13808 (2025)
[i13]Yuyang Zhou, Ferrante Neri
, Yew-Soon Ong, Ruibin Bai:
SiamNAS: Siamese Surrogate Model for Dominance Relation Prediction in Multi-objective Neural Architecture Search. CoRR abs/2506.02623 (2025)
[i12]Yuyang Zhou, Guang Cheng, Kang Du, Zihan Chen, Tian Qin, Yuyu Zhao:
From Static to Adaptive Defense: Federated Multi-Agent Deep Reinforcement Learning-Driven Moving Target Defense Against DoS Attacks in UAV Swarm Networks. CoRR abs/2506.07392 (2025)
[i11]Tian Qin, Guang Cheng, Zihan Chen, Yuyang Zhou:
PRIME: Plasticity-Robust Incremental Model for Encrypted Traffic Classification in Dynamic Network Environments. CoRR abs/2508.02031 (2025)- 2024
[j32]Yuyang Zhou, Dongshu Wang, Lei Liu:
Exploring unknown environments: motivated developmental learning for autonomous navigation of mobile robots. Intell. Serv. Robotics 17(2): 197-219 (2024)
[j31]Chenwei Jin
, Ruibin Bai
, Yuyang Zhou, Xinan Chen, Leshan Tan
:
Enhancing online yard crane scheduling through a two-stage rollout memetic genetic programming. Memetic Comput. 16(3): 467-489 (2024)
[j30]Yulan Liu
, Yuyang Zhou
, Rongrong Lin
:
The Proximal Operator of the Piece-Wise Exponential Function. IEEE Signal Process. Lett. 31: 894-898 (2024)
[j29]Yuyang Zhou
, Guang Cheng
, Shui Yu
, Zongyao Chen
, Yujia Hu
:
MTDroid: A Moving Target Defense-Based Android Malware Detector Against Evasion Attacks. IEEE Trans. Inf. Forensics Secur. 19: 6377-6392 (2024)
[j28]Heyuan Yao
, Zhenhua Song
, Yuyang Zhou
, Tenglong Ao
, Baoquan Chen
, Libin Liu
:
MoConVQ: Unified Physics-Based Motion Control via Scalable Discrete Representations. ACM Trans. Graph. 43(4): 144:1-144:21 (2024)
[c25]Yuyang Zhou, Ferrante Neri, Ruibin Bai
:
Characterising Deep Learning Loss Landscapes with Local Optima Networks. CEC 2024: 1-8
[c24]Jin Su, Chenchen Han, Yuyang Zhou, Junjie Shan, Xibin Zhou, Fajie Yuan:
SaProt: Protein Language Modeling with Structure-aware Vocabulary. ICLR 2024
[c23]Yuyang Zhou, Alexander P. Turner, Ferrante Neri:
Local Optima Networks for Reinforcement Learning - A Case Study: Coupled Inverted Pendulum Task. CAI 2024: 865-870
[c22]Haoyue Bai
, Le Wu
, Min Hou
, Miaomiao Cai
, Zhuangzhuang He
, Yuyang Zhou
, Richang Hong
, Meng Wang
:
Multimodality Invariant Learning for Multimedia-Based New Item Recommendation. SIGIR 2024: 677-686
[i10]Haoyue Bai, Le Wu, Min Hou, Miaomiao Cai, Zhuangzhuang He, Yuyang Zhou, Richang Hong, Meng Wang:
Multimodality Invariant Learning for Multimedia-Based New Item Recommendation. CoRR abs/2405.15783 (2024)
[i9]Yujia Wu, Yiming Shi, Jiwei Wei, Chengwei Sun, Yuyang Zhou, Yang Yang, Heng Tao Shen:
DiffLoRA: Generating Personalized Low-Rank Adaptation Weights with Diffusion. CoRR abs/2408.06740 (2024)
[i8]Yuyang Zhou, Guang Cheng, Kang Du, Zihan Chen:
Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense. CoRR abs/2412.21051 (2024)- 2023
[j27]Youcheng Zheng, Guangqing Wang, Qiangguo Zhu, Guangbo Li, Yuyang Zhou, Lugang Hou, Yifan Jiang:
Bifurcations and nonlinear dynamics of asymmetric tri-stable piezoelectric vibration energy harvesters. Commun. Nonlinear Sci. Numer. Simul. 119: 107077 (2023)
[j26]Yi Yang
, Yong Zhang
, Yuyang Zhou:
Tracking Control for Output Probability Density Function of Stochastic Systems Using FPD Method. Entropy 25(2): 186 (2023)
[j25]Randa Herzallah
, Yuyang Zhou
:
An efficient message passing algorithm for decentrally controlling complex systems. Int. J. Control 96(3): 719-730 (2023)
[j24]Yuyang Zhou, Randa Herzallah, Qichun Zhang:
Decentralised fully probabilistic design for stochastic networks with multiplicative noise. Int. J. Syst. Sci. 54(8): 1841-1854 (2023)
[j23]Yuyang Zhou
, Zhebin Hu, Fagen Li
:
Searchable Public-Key Encryption With Cryptographic Reverse Firewalls for Cloud Storage. IEEE Trans. Cloud Comput. 11(1): 383-396 (2023)
[j22]Xiaoyan Hu
, Wenjie Gao, Guang Cheng
, Ruidong Li
, Yuyang Zhou
, Hua Wu
:
Toward Early and Accurate Network Intrusion Detection Using Graph Embedding. IEEE Trans. Inf. Forensics Secur. 18: 5817-5831 (2023)
[c21]Ismail A. Mageed, Yuyang Zhou, Yefeng Liu, Qichun Zhang:
Towards a Revolutionary Info-Geometric Control Theory with Potential Applications of Fokker Planck Kolmogorov(FPK) Equation to System Control, Modelling and Simulation. ICAC 2023: 1-6
[i7]Yulan Liu, Yuyang Zhou, Rongrong Lin:
The Proximal Operator of the Piece-wise Exponential Function and Its Application in Compressed Sensing. CoRR abs/2306.13425 (2023)
[i6]Heyuan Yao, Zhenhua Song, Yuyang Zhou, Tenglong Ao, Baoquan Chen, Libin Liu:
MoConVQ: Unified Physics-Based Motion Control via Scalable Discrete Representations. CoRR abs/2310.10198 (2023)
[i5]Yuyang Zhou, Guang Cheng, Zongyao Chen, Shui Yu:
MalPurifier: Enhancing Android Malware Detection with Adversarial Purification against Evasion Attacks. CoRR abs/2312.06423 (2023)- 2022
[j21]Shanqing Jiang
, Lin Yang, Guang Cheng, Xianming Gao, Tao Feng, Yuyang Zhou:
A quantitative framework for network resilience evaluation using Dynamic Bayesian Network. Comput. Commun. 194: 387-398 (2022)
[j20]Zihan Chen
, Guang Cheng, Ziheng Xu, Shuyi Guo, Yuyang Zhou
, Yuyu Zhao
:
Length matters: Scalable fast encrypted internet traffic service classification based on multiple protocol data unit length sequence with composite deep learning. Digit. Commun. Networks 8(3): 289-302 (2022)
[j19]Xiafei Tang
, Yuyang Zhou
, Yiqun Zou
, Qichun Zhang
:
Variance and Entropy Assignment for Continuous-Time Stochastic Nonlinear Systems. Entropy 24(1): 25 (2022)
[j18]Yuyang Zhou, Liang Zhao
, Yuqiao Jin, Fagen Li:
Backdoor-resistant identity-based proxy re-encryption for cloud-assisted wireless body area networks. Inf. Sci. 604: 80-96 (2022)
[j17]Huizhen Zhang, Kun Zhang
, Yuyang Zhou, Liang Ma, Ziying Zhang:
An immune algorithm for solving the optimization problem of locating the battery swapping stations. Knowl. Based Syst. 248: 108883 (2022)
[j16]Yuyang Zhou
, Guang Cheng
, Yuyu Zhao
, Zihan Chen
, Shanqing Jiang
:
Toward Proactive and Efficient DDoS Mitigation in IIoT Systems: A Moving Target Defense Approach. IEEE Trans. Ind. Informatics 18(4): 2734-2744 (2022)
[c20]Zhuoran Jin, Tianyi Men, Hongbang Yuan, Yuyang Zhou, Pengfei Cao, Yubo Chen
, Zhipeng Xue
, Kang Liu, Jun Zhao:
CogKTR: A Knowledge-Enhanced Text Representation Toolkit for Natural Language Understanding. EMNLP (Demos) 2022: 1-11
[c19]Yuyang Zhou, Ferrante Neri
:
A Fitness Landscape Analysis of the LeNet-5 Loss Function. SSCI 2022: 352-359
[c18]Yuyang Zhou, Yinghua Wang, Yuxiao Li, Jialing Huang, Jie Huang, Cheng-Xiang Wang:
An Improved Equiangular Division Algorithm for SBR based Ray Tracing Channel Modeling. VTC Fall 2022: 1-5
[c17]Zihan Chen
, Guang Cheng
, Zijun Wei, Ziheng Xu, Nan Fu, Yuyang Zhou
:
Higher Layers, Better Results: Application Layer Feature Engineering in Encrypted Traffic Classification. WASA (2) 2022: 548-556- 2021
[j15]Yuyu Zhao
, Guang Cheng, Yu Duan, Zhouchao Gu, Yuyang Zhou
, Lu Tang:
Secure IoT edge: Threat situation awareness based on network traffic. Comput. Networks 201: 108525 (2021)
[j14]Yuyang Zhou
, Randa Herzallah:
Probabilistic message passing control for complex stochastic switching systems. J. Frankl. Inst. 358(10): 5451-5469 (2021)
[j13]Yuyang Zhou
, Guang Cheng
, Shui Yu
:
An SDN-Enabled Proactive Defense Framework for DDoS Mitigation in IoT Networks. IEEE Trans. Inf. Forensics Secur. 16: 5366-5380 (2021)
[j12]Yazhe Mao, Baina He
, Deshun Wang, Renzhuo Jiang, Yuyang Zhou, Xingmin He, Jingru Zhang, Yanchen Dong:
Microgrid Group Control Method Based on Deep Learning under Cloud Edge Collaboration. Wirel. Commun. Mob. Comput. 2021: 6635638:1-6635638:8 (2021)
[c16]Ferrante Neri
, Yuyang Zhou:
Covariance Pattern Search with Eigenvalue-determined Radii. CEC 2021: 335-342
[c15]Yuyang Zhou
, Peiyu Wang, Mengyang Qin, Minhe Zhao, Shuyan Zheng:
Bus Load Factor Analysis Based on Smart Card Data and Survey Data. ITSC 2021: 2318-2323
[c14]Ming Gao, Xiaokun Yu, Lei Ren, Hongxiang Cai, Zhiyong Wang, Yuyang Zhou:
A Renewable Energy Certificate Trading System Based on Blockchain. TrustCom 2021: 1514-1518
[i4]Shanqing Jiang, Lin Yang, Guang Cheng, Xianming Gao, Tao Feng, Yuyang Zhou:
A Quantitative Framework for Network Resilience Evaluation using Dynamic Bayesian Network. CoRR abs/2108.09040 (2021)- 2020
[j11]Yuyang Zhou
, Randa Herzallah
:
DOBC Based Fully Probability Design for Stochastic System With the Multiplicative Noise. IEEE Access 8: 34225-34235 (2020)
[j10]Yuyang Zhou
, Ruxin Xie
, Tianhui Zhang
, José Holguín-Veras
:
Joint Distribution Center Location Problem for Restaurant Industry Based on Improved K-Means Algorithm With Penalty. IEEE Access 8: 37746-37755 (2020)
[j9]Yuyang Zhou
, Aiping Wang, Ping Zhou, Hong Wang
, Tianyou Chai:
Dynamic performance enhancement for nonlinear stochastic systems using RBF driven nonlinear compensation with extended Kalman filter. Autom. 112 (2020)
[j8]Yuyang Zhou
, Guang Cheng, Shanqing Jiang
, Mian Dai:
Building an efficient intrusion detection system based on feature selection and ensemble classifier. Comput. Networks 174: 107247 (2020)
[j7]Yuyang Zhou
, Guang Cheng, Shanqing Jiang
, Yuyu Zhao, Zihan Chen
:
Cost-effective moving target defense against DDoS attacks using trilateral game and multi-objective Markov decision processes. Comput. Secur. 97: 101976 (2020)
[j6]Huizhen Zhang
, Fan Liu
, Yuyang Zhou, Ziying Zhang:
A hybrid method integrating an elite genetic algorithm with tabu search for the quadratic assignment problem. Inf. Sci. 539: 347-374 (2020)
[j5]Xiaoyu Zheng, Yuyang Zhou, Yalan Ye
, Fagen Li:
A cloud data deduplication scheme based on certificateless proxy re-encryption. J. Syst. Archit. 102 (2020)
[j4]Yuyang Zhou, Jing Guo, Fagen Li:
Certificateless public key encryption with cryptographic reverse firewalls. J. Syst. Archit. 109: 101754 (2020)
[j3]Fagen Li
, Jiye Wang, Yuyang Zhou, Chunhua Jin, SK Hafizul Islam:
A heterogeneous user authentication and key establishment for mobile client-server environment. Wirel. Networks 26(2): 913-924 (2020)
[c13]Ferrante Neri
, Yuyang Zhou:
Covariance Local Search for Memetic Frameworks: A Fitness Landscape Analysis Approach. CEC 2020: 1-8
[c12]Hua Wu
, Yu Gu, Guang Cheng, Yuyang Zhou
:
Effectiveness Evaluation Method for Cyber Deception Based on Dynamic Bayesian Attack Graph. CSSE 2020: 1-9
[c11]Zhaoming Qin, Haochen Hua, Hong Liang, Randa Herzallah, Yuyang Zhou
, Junwei Cao:
Optimal Electricity Trading Strategy for a Household Microgrid. ICCA 2020: 1308-1313
[c10]Zihan Chen
, Guang Cheng, Bomiao Jiang, Shuye Tang, Shuyi Guo, Yuyang Zhou
:
Length Matters: Fast Internet Encrypted Traffic Service Classification based on Multi-PDU Lengths. MSN 2020: 531-538
2010 – 2019
- 2019
[j2]Chen Li
, Jianling Huang, Bo Wang
, Yuyang Zhou
, Yunyun Bai, Yanyan Chen
:
Spatial-Temporal Correlation Prediction Modeling of Origin-Destination Passenger Flow Under Urban Rail Transit Emergency Conditions. IEEE Access 7: 162353-162365 (2019)
[c9]Yuyang Zhou
, Guang Cheng, Shanqing Jiang
, Ying Hu, Yuyu Zhao, Zihan Chen:
A Cost-effective Shuffling Method against DDoS Attacks using Moving Target Defense. MTD@CCS 2019: 57-66
[c8]Yuyang Zhou, Yuanfeng Guan, Zhiwei Zhang, Fagen Li:
Cryptographic Reverse Firewalls for Identity-Based Encryption. FCS 2019: 36-52
[c7]Yuyang Zhou
, Randa Herzallah, Ana Zafar:
Fully Probabilistic Design for Stochastic Discrete System with Multiplicative Noise. ICCA 2019: 940-945
[c6]Yuyang Zhou, Qianyang Zhao, Yanyan Chen, Der-Horng Lee
, Jiajun Pang
, Guopeng Liu:
Semi-buspool: Demand-driven Scheduling for Intercity Bus Based on Smart Card Data. ITSC 2019: 752-757
[c5]Yuyang Zhou, Yuanfeng Guan, Zhiwei Zhang, Fagen Li:
A Blockchain-Based Access Control Scheme for Smart Grids. NaNA 2019: 368-373
[i3]Yuyang Zhou
, Guang Cheng, Shanqing Jiang, Ying Hu, Yuyu Zhao, Zihan Chen:
A cost-effective shuffling method against DDoS attacks using Moving Target Defense. CoRR abs/1903.10102 (2019)
[i2]Yuyang Zhou, Guang Cheng:
An Efficient Network Intrusion Detection System Based on Feature Selection and Ensemble Classifier. CoRR abs/1904.01352 (2019)
[i1]Yuyang Zhou, Yuanfeng Guan, Zhiwei Zhang, Fagen Li:
A Blockchain-Based Access Control Scheme for Smart Grids. IACR Cryptol. ePrint Arch. 2019: 880 (2019)- 2018
[j1]Yuyang Zhou
, Qichun Zhang
, Hong Wang
, Ping Zhou
, Tianyou Chai
:
EKF-Based Enhanced Performance Controller Design for Nonlinear Stochastic Systems. IEEE Trans. Autom. Control. 63(4): 1155-1162 (2018)
[c4]Zhaoqi Li, Yuyang Zhou:
Secure and Achievable Heterogeneous Access Control Scheme for Wireless Body Area Networks. FCS 2018: 190-198
[c3]Yuyang Zhou, Songtao Tang, Minhe Zhao, William H. K. Lam, Tony N. N. Sze, Yanyan Chen:
Modeling the Travel Mode Choice for Outpatient Trips Before and After Bike-Sharing in Beijing. ITSC 2018: 242-247- 2017
[c2]Yuyang Zhou, Zhaoqi Li, Fei Hu, Fagen Li:
Identity-Based Combined Public Key Schemes for Signature, Encryption, and Signcryption. ICITAM 2017: 3-22- 2015
[c1]Yuyang Zhou
, Lin Yao, Yu Jiang, Yanyan Chen, Yi Gong:
GIS-Based Commute Analysis Using Smart Card Data: A Case Study of Multi-Mode Public Transport for Smart City. GRMSE 2015: 83-94
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-02-28 00:47 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







