default search action
Hai Yu 0001
Person information
- affiliation: Northeastern University, Software College, Shenyang, China
Other persons with the same name
- Hai Yu — disambiguation page
- Hai Yu 0002 — Beijing Institute of Technology, Beijing, China (and 1 more)
- Hai Yu 0003 — Chinese Academy of Sciences, Changchun Institute of Optics, Fine Mechanics and Physics, Changchun, China
- Hai Yu 0004 — University of Science and Technology Beijing, School of Computer and Communication Engineering, Beijing, China
- Hai Yu 0005 — Duke University, Durham, NC, USA
- Hai Yu 0006 — Nanjing University of Science and Technology, School of Electronic and Optical Engineering, Nanjing, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j50]Wei Zhang, Guangdong Zhu, Meng Xing, Jingjing Yang, Hai Yu, Zhiliang Zhu:
A New Diffusion Strategy Using an Epidemic Spreading Model for Encryption. Entropy 26(9): 760 (2024) - [j49]Yingli Hou, Wei Zhang, Zhiliang Zhu, Hai Yu:
Language-vision matching for text-to-image synthesis with context-aware GAN. Expert Syst. Appl. 255: 124615 (2024) - [j48]Meng Xing, Hai Yu, Wei Zhang, Zhiliang Zhu:
A Hierarchical Multiscenario H.265/HEVC Video Encryption Scheme. Int. J. Bifurc. Chaos 34(1): 2450013:1-2450013:17 (2024) - [j47]Fanyi Meng, Hai Yu, Chun Yong Chong, Ying Wang, Zhiliang Zhu:
Automated construction of reference model for software remodularization through software evolution. J. Softw. Evol. Process. 36(10) (2024) - [j46]Yuli Zhao, Yin Zhang, Francis C. M. Lau, Hai Yu, Zhiliang Zhu, Bin Zhang:
Expanding-Window Zigzag Decodable Fountain Codes for Scalable Multimedia Transmission. ACM Trans. Multim. Comput. Commun. Appl. 20(8): 248:1-248:24 (2024) - [c14]Fanyi Meng, Ying Wang, Chun Yong Chong, Hai Yu, Zhiliang Zhu:
CLUE: Customizing clustering techniques using machine learning for software modularization. Internetware 2024 - 2023
- [j45]Ying Wang, Yibo Wang, Sinan Wang, Yepang Liu, Chang Xu, Shing-Chi Cheung, Hai Yu, Zhiliang Zhu:
Runtime Permission Issues in Android Apps: Taxonomy, Practices, and Ways Forward. IEEE Trans. Software Eng. 49(1): 185-210 (2023) - [j44]Ying Wang, Peng Sun, Lin Pei, Yue Yu, Chang Xu, Shing-Chi Cheung, Hai Yu, Zhiliang Zhu:
Plumber: Boosting the Propagation of Vulnerability Fixes in the npm Ecosystem. IEEE Trans. Software Eng. 49(5): 3155-3181 (2023) - [c13]Yibo Wang, Ying Wang, Tingwei Zhang, Yue Yu, Shing-Chi Cheung, Hai Yu, Zhiliang Zhu:
Can Machine Learning Pipelines Be Better Configured? ESEC/SIGSOFT FSE 2023: 463-475 - [i4]Md Mahir Asef Kabir, Sk Adnan Hassan, Xiaoyin Wang, Ying Wang, Hai Yu, Na Meng:
An empirical study of ChatGPT-3.5 on question answering and code maintenance. CoRR abs/2310.02104 (2023) - 2022
- [j43]Yuli Zhao, Yin Zhang, Francis C. M. Lau, Zhiliang Zhu, Hai Yu:
Duplicated zigzag decodable fountain codes with the unequal error protection property. Comput. Commun. 185: 66-78 (2022) - [j42]Yin Zhang, Yuli Zhao, Francis C. M. Lau, Bin Zhang, Zhiliang Zhu, Hai Yu:
Weighted zigzag decodable fountain codes for unequal error protection. IET Commun. 16(17): 2082-2090 (2022) - [j41]Yiru Wei, Zhiliang Zhu, Hai Yu, Wei Zhang:
$\hbox {ABDF}^{2}$-Net: an adaptive bi-directional features fusion network for real-time detection of threat object. J. Real Time Image Process. 19(4): 739-749 (2022) - [j40]Fanyi Meng, Ying Wang, Hai Yu, Zhiliang Zhu:
Devising optimal integration test orders using cost-benefit analysis. Frontiers Inf. Technol. Electron. Eng. 23(5): 692-714 (2022) - [j39]Li Guo, Zhiliang Zhu, Francis C. M. Lau, Yuli Zhao, Hai Yu:
Joint Security and Energy-Efficient Cooperative Architecture for 5G Underlaying Cellular Networks. Symmetry 14(6): 1160 (2022) - [j38]Ying Wang, Rongxin Wu, Chao Wang, Ming Wen, Yepang Liu, Shing-Chi Cheung, Hai Yu, Chang Xu, Zhiliang Zhu:
Will Dependency Conflicts Affect My Program's Semantics? IEEE Trans. Software Eng. 48(7): 2295-2316 (2022) - [c12]Meiqiu Xu, Ying Wang, Shing-Chi Cheung, Hai Yu, Zhiliang Zhu:
Insight: Exploring Cross-Ecosystem Vulnerability Impacts. ASE 2022: 58:1-58:13 - 2021
- [j37]Yiru Wei, Zhiliang Zhu, Hai Yu, Wei Zhang:
An automated detection model of threat objects for X-ray baggage inspection based on depthwise separable convolution. J. Real Time Image Process. 18(3): 923-935 (2021) - [j36]Yiru Wei, Zhiliang Zhu, Hai Yu, Wei Zhang:
AFTD-Net: real-time anchor-free detection network of threat objects for X-ray baggage screening. J. Real Time Image Process. 18(4): 1343-1356 (2021) - [j35]Wei Zhang, Weijie Han, Zhiliang Zhu, Hai Yu:
An ultrahigh-resolution image encryption algorithm using random super-pixel strategy. Multim. Tools Appl. 80(24): 33429-33454 (2021) - [j34]Ye Yuan, Wei Zhang, Hai Yu, Zhiliang Zhu:
Superpixels With Content-Adaptive Criteria. IEEE Trans. Image Process. 30: 7702-7716 (2021) - [c11]Ying Wang, Liang Qiao, Chang Xu, Yepang Liu, Shing-Chi Cheung, Na Meng, Hai Yu, Zhiliang Zhu:
HERO: On the Chaos When PATH Meets Modules. ICSE 2021: 99-111 - [i3]Ying Wang, Liang Qiao, Chang Xu, Yepang Liu, Shing-Chi Cheung, Na Meng, Hai Yu, Zhiliang Zhu:
Hero: On the Chaos When PATH Meets Modules. CoRR abs/2102.12105 (2021) - [i2]Ying Wang, Yibo Wang, Sinan Wang, Yepang Liu, Chang Xu, Shing-Chi Cheung, Hai Yu, Zhiliang Zhu:
Runtime Permission Issues in Android Apps: Taxonomy, Practices, and Ways Forward. CoRR abs/2106.13012 (2021) - 2020
- [j33]Xue Yang, Zhiliang Zhu, Hai Yu, Yuli Zhao:
A Naming Game-Based Method for the Location of Information Source in Social Networks. Complex. 2020: 6975250:1-6975250:8 (2020) - [j32]Wei Zhang, Shuwen Wang, Weijie Han, Hai Yu, Zhiliang Zhu:
An Image Encryption Algorithm Based on Random Hamiltonian Path. Entropy 22(1): 73 (2020) - [j31]Zhiliang Zhu, Yanjie Song, Wei Zhang, Hai Yu, Yuli Zhao:
A novel compressive sensing-based framework for image compression-encryption with S-box. Multim. Tools Appl. 79(35-36): 25497-25533 (2020) - [j30]Ye Yuan, Zhiliang Zhu, Hai Yu, Wei Zhang:
Watershed-Based Superpixels With Global and Local Boundary Marching. IEEE Trans. Image Process. 29: 7375-7388 (2020) - [c10]Ying Wang, Ming Wen, Yepang Liu, Yibo Wang, Zhenming Li, Chao Wang, Hai Yu, Shing-Chi Cheung, Chang Xu, Zhiliang Zhu:
Watchman: monitoring dependency conflicts for Python library ecosystem. ICSE 2020: 125-135 - [i1]Ying Wang, Rongxin Wu, Chao Wang, Ming Wen, Yepang Liu, Shing-Chi Cheung, Hai Yu, Chang Xu, Zhiliang Zhu:
Will Dependency Conflicts Affect My Program's Semantics? CoRR abs/2006.07633 (2020)
2010 – 2019
- 2019
- [j29]Zhiliang Zhu, Jie Liang, Deyang Li, Hai Yu, Guoqi Liu:
Hot Topic Detection Based on a Refined TF-IDF Algorithm. IEEE Access 7: 26996-27007 (2019) - [j28]Yanjie Song, Zhiliang Zhu, Wei Zhang, Hai Yu, Yuli Zhao:
Efficient and Secure Image Encryption Algorithm Using a Novel Key-Substitution Architecture. IEEE Access 7: 84386-84400 (2019) - [j27]Xue Yang, Zhiliang Zhu, Hai Yu, Yuli Zhao, Li Guo:
Evolutionary Game Dynamics of the Competitive Information Propagation on Social Networks. Complex. 2019: 8385426:1-8385426:11 (2019) - [j26]Wei Zhang, Zhiliang Zhu, Hai Yu:
A Symmetric Image Encryption Algorithm Based on a Coupled Logistic-Bernoulli Map and Cellular Automata Diffusion Strategy. Entropy 21(5): 504 (2019) - [j25]Yanjie Song, Zhiliang Zhu, Wei Zhang, Hai Yu:
Efficient protection using chaos for Context-Adaptive Binary Arithmetic Coding in H.264/Advanced Video Coding. Multim. Tools Appl. 78(14): 18967-18994 (2019) - [c9]Ying Wang, Ming Wen, Rongxin Wu, Zhenwei Liu, Shin Hwei Tan, Zhiliang Zhu, Hai Yu, Shing-Chi Cheung:
Could I have a stack trace to examine the dependency conflict issue? ICSE 2019: 572-583 - 2018
- [j24]Zhiliang Zhu, Deyang Li, Jie Liang, Guoqi Liu, Hai Yu:
A Dynamic Personalized News Recommendation System Based on BAP User Profiling Method. IEEE Access 6: 41068-41078 (2018) - [j23]Zhiliang Zhu, Zejun Ke, Jiayin Cui, Hai Yu, Guoqi Liu:
The construction of Chinese microblog gender-specific thesauruses and user gender classification. Appl. Netw. Sci. 3(1): 47:1-47:17 (2018) - [j22]Ye Yuan, Yen-Wei Chen, Chunhua Dong, Hai Yu, Zhiliang Zhu:
Hybrid method combining superpixel, random walk and active contour model for fast and accurate liver segmentation. Comput. Medical Imaging Graph. 70: 119-134 (2018) - [j21]Li Guo, Zhiliang Zhu, Francis C. M. Lau, Yuli Zhao, Hai Yu:
SSCSMA-based random relay selection scheme for large-scale relay networks. Comput. Commun. 127: 13-19 (2018) - [j20]Guanrong Chen, Marius-F. Danca, Xiaosong Yang, Genaro J. Martínez, Hai Yu:
Research Frontier in Chaos Theory and Complex Networks. Entropy 20(10): 734 (2018) - [j19]Yuli Zhao, Yin Zhang, Francis C. M. Lau, Hai Yu, Zhiliang Zhu:
Improved online fountain codes. IET Commun. 12(18): 2297-2304 (2018) - [j18]Ying Wang, Zhiliang Zhu, Bo Yang, Fangda Guo, Hai Yu:
Using reliability risk analysis to prioritize test cases. J. Syst. Softw. 139: 14-31 (2018) - [j17]Dong-dai Liu, Wei Zhang, Hai Yu, Zhiliang Zhu:
An image encryption scheme using self-adaptive selective permutation and inter-intra-block feedback diffusion. Signal Process. 151: 130-143 (2018) - [j16]Ying Wang, Zhiliang Zhu, Hai Yu, Bo Yang:
Risk Analysis on Multi-Granular Flow Network for Software Integration Testing. IEEE Trans. Circuits Syst. II Express Briefs 65-II(8): 1059-1063 (2018) - [j15]Ying Wang, Hai Yu, Zhiliang Zhu, Wei Zhang, Yuli Zhao:
Automatic Software Refactoring via Weighted Clustering in Method-Level Networks. IEEE Trans. Software Eng. 44(3): 202-236 (2018) - [c8]Ying Wang, Ming Wen, Zhenwei Liu, Rongxin Wu, Rui Wang, Bo Yang, Hai Yu, Zhiliang Zhu, Shing-Chi Cheung:
Do the dependency conflicts in my project matter? ESEC/SIGSOFT FSE 2018: 319-330 - 2017
- [j14]Hong-Jian Yin, Hai Yu, Yuli Zhao, Zhiliang Zhu, Wei Zhang:
Analysis of the Dynamic Influence of Social Network Nodes. Sci. Program. 2017: 5046905:1-5046905:6 (2017) - [c7]Kai Shi, Hai Yu, Zhiliang Zhu, Jingde Cheng:
Anticipatory Runway Incursion Prevention Based on Inaccurate Position Surveillance Information. ACIIDS (2) 2017: 93-104 - [c6]Yuli Zhao, Hai Yu, Zhiliang Zhu, Yin Zhang:
A distributed energy-efficient cooperative routing algorithm based on optimal power allocation. IECON 2017: 5675-5680 - [c5]Xiwei Liu, Kai Shi, Hai Yu, Zhiliang Zhu:
Relative health index of wind turbines based on kernel density estimation. IECON 2017: 5957-5961 - 2016
- [j13]Hegui Zhu, Xiangde Zhang, Hai Yu, Cheng Zhao, Zhiliang Zhu:
A Novel Image Encryption Scheme Using the Composite Discrete Chaotic System. Entropy 18(8): 276 (2016) - [j12]Chong Fu, Zhan-kao Wen, Zhiliang Zhu, Hai Yu:
A security improved image encryption scheme based on chaotic Baker map and hyperchaotic Lorenz system. Int. J. Comput. Sci. Eng. 12(2/3): 113-123 (2016) - [j11]Wei Zhang, Hai Yu, Yuli Zhao, Zhiliang Zhu:
Image encryption based on three-dimensional bit matrix permutation. Signal Process. 118: 36-50 (2016) - [c4]Kai Shi, Hang Song, Hai Yu, Zhiliang Zhu:
Collaborative Contextual Anomaly Detection for Industrial Equipment Groups. ISCID (1) 2016: 381-385 - 2015
- [j10]Junxin Chen, Zhiliang Zhu, Chong Fu, Hai Yu, Li-bo Zhang:
A fast chaos-based image encryption scheme with a dynamic state variables selection mechanism. Commun. Nonlinear Sci. Numer. Simul. 20(3): 846-860 (2015) - [j9]Jun-Xin Chen, Zhiliang Zhu, Chong Fu, Hai Yu, Yushu Zhang:
Reusing the permutation matrix dynamically for efficient image cryptographic algorithm. Signal Process. 111: 294-307 (2015) - 2014
- [j8]Zhiliang Zhu, Jingping Song, Yanjie Song, Hai Yu:
A Multiaddress Co-Chaos Shift Keying Communication Scheme and Performance Analysis. Int. J. Bifurc. Chaos 24(4) (2014) - [j7]Zhiliang Zhu, Fangda Guo, Hai Yu, Chen Chen:
Fast Single Image Super-Resolution via Self-Example Learning and Sparse Representation. IEEE Trans. Multim. 16(8): 2178-2190 (2014) - 2013
- [j6]Wei Zhang, Kwok-Wo Wong, Hai Yu, Zhiliang Zhu:
A symmetric color image encryption algorithm using the intrinsic features of bit distributions. Commun. Nonlinear Sci. Numer. Simul. 18(3): 584-600 (2013) - [j5]Wei Zhang, Kwok-Wo Wong, Hai Yu, Zhiliang Zhu:
An image encryption scheme using reverse 2-dimensional chaotic map and dependent diffusion. Commun. Nonlinear Sci. Numer. Simul. 18(8): 2066-2080 (2013) - [j4]Tao Ren, Zhiliang Zhu, Hai Yu, Georgi M. Dimirovski:
Integral sliding mode controller design for congestion problem in ATM networks. Int. J. Control 86(3): 529-539 (2013) - 2012
- [j3]Yuli Zhao, Francis Chung-Ming Lau, Zhiliang Zhu, Hai Yu:
Scale-Free Luby Transform Codes. Int. J. Bifurc. Chaos 22(4) (2012) - 2011
- [j2]Zhiliang Zhu, Wei Zhang, Kwok-Wo Wong, Hai Yu:
A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf. Sci. 181(6): 1171-1186 (2011)
2000 – 2009
- 2009
- [c3]Jingping Song, Zhiliang Zhu, Ye Yang, Hai Yu, Mengmeng Li:
Research and Implementation of Embedded Intelligent Network Self-Healing Equipment Based on E1 Link. HIS (2) 2009: 229-234 - 2008
- [j1]Zhiliang Zhu, Shuping Li, Hai Yu:
A new approach to generalized chaos synchronization based on the stability of the error system. Kybernetika 44(4): 492-500 (2008) - [c2]Zhiliang Zhu, Jingping Song, Dong Aoshuang, Hai Yu, Ye Yang:
Research and Analysis of Securities Market based on Multi-Fractal Generator. ICYCS 2008: 2776-2781 - [c1]Zhen Qin, Hai Yu, Jinling Ju:
Fractal Image Compression Based on Number of Hopping and Variance of Continuing Positive and Negative Pixels. ICYCS 2008: 2954-2958
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-05 22:03 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint