
Xi Yu
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Other persons with the same name
- Xi Yu 0001
— University of Pennsylvania, Department of Mechanical Engineering and Applied Mechanics, Philadelphia, PA, USA (and 1 more)
- Xi Yu 0002
— University of Electronic Science and Technology of China, School of Electronic Science and Engineering, Chengdu, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j11]Zhihong Chen, Tao Yan, ErLei Wang
, Hong Jiang, Yiqian Tang, Xi Yu
, Jian Zhang
, Chang Liu
:
Detecting Abnormal Brain Regions in Schizophrenia Using Structural MRI via Machine Learning. Comput. Intell. Neurosci. 2020: 6405930:1-6405930:13 (2020) - [j10]Xi Yu, Qi Yang, Ruiqi Wang, Runqing Fang, Mingsen Deng
:
Data Cleaning for Personal Credit Scoring by Utilizing Social Media Data: An Empirical Study. IEEE Intell. Syst. 35(2): 7-15 (2020) - [j9]Abdelhak Belhi, Abdulaziz Khalid Al-Ali, Abdelaziz Bouras, Sebti Foufou, Xi Yu, Haiqing Zhang:
Investigating low-delay deep learning-based cultural image reconstruction. J. Real Time Image Process. 17(6): 1911-1926 (2020) - [c21]Jie Wang, Daiwei Li, Haiqing Zhang, Xi Yu, Aicha Sekhari, Yacine Ouzrout, Abdelaziz Bouras:
An Improvement of Support Vector Machine Imputation Algorithm Based on Multiple Iteration and Grid Search Strategies. ICIoT 2020: 538-543 - [c20]Suresh Srinivasan, Xi Yu, Alireza Keshavarz-Haddad, Ehsan Aryafar:
Fair Initial Access Design for mmWave Wireless. ICNP 2020: 1-11
2010 – 2019
- 2019
- [j8]Zheng Zhou
, Xi Yu, Yu Zou, Honghua Zhong:
Dynamics of quantum droplets in a one-dimensional optical lattice. Commun. Nonlinear Sci. Numer. Simul. 78: 104881 (2019) - [j7]Haiqing Zhang, Daiwei Li
, Tao Wang
, Tianrui Li, Xi Yu, Abdelaziz Bouras:
Uncertainty and Equivalence Relation Analysis for Hesitant Fuzzy-Rough Sets and Their Applications in Classification. Comput. Sci. Eng. 21(6): 26-39 (2019) - [c19]Dawei Du, Yue Zhang, Liefeng Bo, Hailin Shi, Rui Zhu, Bo Han, Chunhui Zhang, Guizhong Liu, Han Wu, Hao Wen, Haoran Wang, Pengfei Zhu, Jiaqing Fan, Jie Chen, Jie Gao, Jie Zhang, Jinghao Zhou, Jinliu Zhou, Jinwang Wang, Jiuqing Wan, Josef Kittler, Kaihua Zhang, Longyin Wen, Kaiqi Huang, Kang Yang, Kangkai Zhang, Lianghua Huang, Lijun Zhou, Lingling Shi, Lu Ding, Ning Wang, Peng Wang, Qintao Hu, Xiao Bian, Robert Laganière, Ruiyan Ma, Ruohan Zhang, Shanrong Zou, Shengwei Zhao, Shengyang Li, Shengyin Zhu, Shikun Li, Shiming Ge, Shiyu Xuan, Haibin Ling, Tianyang Xu, Ting He, Wei Shi, Wei Song, Weiming Hu, Wenhua Zhang, Wenjun Zhu, Xi Yu, Xianhai Wang, Xiaojun Wu, Qinghua Hu, Xiaotong Li, Xiaoxue Li, Xiaoyue Yin, Xin Zhang, Xin Zhao, Xizhe Xue, Xu Lei, Xueyuan Yang, Yanjie Gao, Yanyun Zhao, Jiayu Zheng, Yinda Xu, Ying Li, Yong Wang, Yong Yang, Yuting Yang, Yuxuan Li, Zeyu Wang, Zhen-Hua Feng, Zhipeng Zhang, Zhiyong Yu, Tao Peng, Zhizhao Duan, Zhuojin Sun, Xinyao Wang:
VisDrone-SOT2019: The Vision Meets Drone Single Object Tracking Challenge Results. ICCV Workshops 2019: 199-212 - [c18]Xi Yu, Ying Ma, Stephanie Farrington, John Reed, Bing Ouyang, José C. Príncipe:
Fast segmentation for large and sparsely labeled coral images. IJCNN 2019: 1-6 - [c17]Daiwei Li, Tianrui Li, Haiqing Zhang, Abdelaziz Bouras, Xi Yu, Dan Tang:
A Fitted Fuzzy-rough Method for Missing Data Imputation. ISKE 2019: 74-81 - [c16]Abdelhak Belhi, Houssem Gasmi, Abdulaziz Khalid Al-Ali, Abdelaziz Bouras, Sebti Foufou, Xi Yu, Haiqing Zhang:
Deep Learning and Cultural Heritage: The CEPROQHA Project Case Study. SKIMA 2019: 1-5 - 2018
- [j6]Haiqing Zhang, Daiwei Li
, Tao Wang
, Tianrui Li, Xi Yu, Abdelaziz Bouras:
Hesitant extension of fuzzy-rough set to address uncertainty in classification. J. Intell. Fuzzy Syst. 34(4): 2535-2550 (2018) - [c15]Xi Yu, Weilian Xue:
Joint Spectrum Allocation and Power Control for Cognitive Radio Networks Based on Potential Game. ISNCC 2018: 1-8 - 2017
- [j5]Yixiong Xiao
, Xiang Chen
, Qiang Li, Xi Yu, Jin Chen, Jing Guo:
Exploring Determinants of Housing Prices in Beijing: An Enhanced Hedonic Regression with Open Access POI Data. ISPRS Int. J. Geo Inf. 6(11): 358 (2017) - [j4]Cai-Sen Chen, Xi Yu, Yang-Xia Xiang, Xiong Li, Tengrun Li:
An Improved DPA Attack on DES with Forth and Back Random Round Algorithm. Int. J. Netw. Secur. 19(2): 285-294 (2017) - [c14]Xi Yu, Huan Zhao, Xiangfei Li
, Han Ding:
Fractional-Order Integral Sliding Mode Controller for Biaxial Motion Control System. ICIRA (2) 2017: 24-35 - [c13]Can Wang, Xi Yu, Lijuan Wang, Danni Liu, Chunming Xu:
Attribute reduction based on object concepts. ICNC-FSKD 2017: 1802-1806 - 2016
- [c12]Chang Liu, Xi Wu, Yuan Yan Tang, Xi Yu, Weidong Zhao, Li Zhang:
Super Resolution Reconstruction of Brain MR Image Based on Convolution Sparse Network. CCBD 2016: 275-278 - [c11]Xi Yu, Can Wang:
A graded rough set with variable precision over two inconsistent and related universes. ICNC-FSKD 2016: 955-959 - [c10]Lin-Tao Duan, Michael Lawo, Ingrid Rügge, Xi Yu:
Power Management of Smartphones Based on Device Usage Patterns. LDIC 2016: 197-207 - 2015
- [c9]Xi Yu, Antoine Nongaillard
, Aicha Sekhari, Abdelaziz Bouras:
An Environmental Burden Shifting Approach to Re-evaluate the Environmental Impacts of Products. PLM 2015: 56-65 - [c8]Xi Yu, Dongmei Fu, Tao Yang, Kamil Ríha:
The application of negative selection algorithm in multi-angle infrared vehicle images recognition. TSP 2015: 776-780 - 2014
- [c7]Can Wang, Xi Yu:
Research on attribute reduction based on L-context. FSKD 2014: 441-446 - 2013
- [c6]Xi Yu, Aicha Sekhari, Antoine Nongaillard
, Abdelaziz Bouras, Suiran Yu, Qingyan Yang:
A LCIA Model Considering Pollution Transfer Phenomena. PLM 2013: 365-374 - 2012
- [c5]Qingni Shen, Yahui Yang, Zhonghai Wu, Xin Yang, Lizhe Zhang, Xi Yu, Zhenming Lao, Dandan Wang, Min Long:
SAPSC: Security Architecture of Private Storage Cloud Based on HDFS. AINA Workshops 2012: 1292-1297 - 2011
- [j3]Xi Yu
, Sam-Po Law, Zaizhu Han, Caozhe Zhu, Yanchao Bi:
Dissociative neural correlates of semantic processing of nouns and verbs in Chinese - A language with minimal inflectional morphology. NeuroImage 58(3): 912-922 (2011) - [c4]Qingni Shen, Xin Yang, Xi Yu, Pengfei Sun, Yahui Yang, Zhonghai Wu:
Towards Data Isolation & Collaboration in Storage Cloud. APSCC 2011: 139-146 - [c3]Xi Yu, Huaqun Guo, Wai-Choong Wong
:
A reliable routing protocol for VANET communications. IWCMC 2011: 1748-1753
2000 – 2009
- 2005
- [c2]Fuyuan Peng, Yan Tian, Xi Yu, Guohua Xu, Qian Xia:
Target Segmentation and Feature Extraction for Undersea Image Based on Function Transformation. ADMA 2005: 400-406 - 2000
- [j2]Xi Yu, Mahmood R. Azimi-Sadjadi:
Neural network directed Bayes decision rule for moving target classification. IEEE Trans. Aerosp. Electron. Syst. 36(1): 176-188 (2000)
1990 – 1999
- 1999
- [j1]Mahmood R. Azimi-Sadjadi, Rongrui Xiao, Xi Yu:
Neural network decision directed edge-adaptive Kalman filter for image estimation. IEEE Trans. Image Process. 8(4): 589-592 (1999) - [c1]Xi Yu, Mahmood R. Azimi-Sadjadi:
A neural network-based sequential Bayes classifier for moving target discrimination. IJCNN 1999: 3217-3220
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2021-01-06 01:01 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint