default search action
Yan Zhai
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Xiaolong Wei, Wenpeng Cui, Xianglin Huang, Lifang Yang, Xiaoqi Geng, Zhulin Tao, Yan Zhai:
Hierarchical RNNs with graph policy and attention for drone swarm. J. Comput. Des. Eng. 11(2): 314-326 (2024) - [c26]Shu Wang, Kun Sun, Yan Zhai:
Dye4AI: Assuring Data Boundary on Generative AI Services. CCS 2024: 2281-2295 - [i1]Shu Wang, Kun Sun, Yan Zhai:
Dye4AI: Assuring Data Boundary on Generative AI Services. CoRR abs/2406.14114 (2024) - 2023
- [j10]Xing Wei, Ting Bai, Yan Zhai, Lei Chen, Hui Luo, Chong Zhao, Yang Lu:
Source-free domain adaptive object detection based on pseudo-supervised mean teacher. J. Supercomput. 79(6): 6228-6251 (2023) - [c25]Yan Zhai, Zhulin Tao, Longquan Dai, He Wang, Xianglin Huang, Lifang Yang:
Flow-Guided Transformer for Video Colorization. ICIP 2023: 2485-2489 - [c24]He Wang, Longquan Dai, Jinglin Tong, Yan Zhai:
Odd: One-Class Anomaly Detection Via The Diffusion Model. ICIP 2023: 3000-3004 - 2022
- [c23]Hao Yu, Chong Zhao, Xing Wei, Yan Zhai, Zhen Chen, Guangling Sun, Yang Lu:
Posture and Appearance Fusion Network for Driver Distraction Recognition. WASA (1) 2022: 165-174 - 2021
- [j9]Yan Zhai, Zhenkuan Pan, Weibo Wei:
Two Variational Models for Image Denoising Using Jacobian of Normals. IEEE Access 9: 43301-43315 (2021)
2010 – 2019
- 2017
- [c22]Yan Zhai, Qiang Cao, Jeffrey S. Chase, Michael M. Swift:
TapCon: Practical Third-Party Attestation for the Cloud. HotCloud 2017 - 2016
- [c21]Yan Zhai, Lichao Yin, Jeffrey S. Chase, Thomas Ristenpart, Michael M. Swift:
CQSTR: Securing Cross-Tenant Applications with Cloud Containers. SoCC 2016: 223-236 - 2015
- [c20]Guozheng Xu, Xiaobo Guo, Yan Zhai, Huijun Li:
An intelligent control framework for robot-aided resistance training using hybrid system modeling and impedance estimation. EMBC 2015: 3602-3606 - [c19]Liang Shi, Derek Lin, Chunsheng Victor Fang, Yan Zhai:
A Hybrid Learning from Multi-behavior for Malicious Domain Detection on Enterprise Network. ICDM Workshops 2015: 987-996 - 2014
- [c18]Robert Jellinek, Yan Zhai, Thomas Ristenpart, Michael M. Swift:
A Day Late and a Dollar Short: The Case for Research on Cloud Billing Systems. HotCloud 2014 - [c17]Adam Everspaugh, Yan Zhai, Robert Jellinek, Thomas Ristenpart, Michael M. Swift:
Not-So-Random Numbers in Virtualized Linux and the Whirlwind RNG. IEEE Symposium on Security and Privacy 2014: 559-574 - [c16]Yan Zhai, Xiao Zhang, Stéphane Eranian, Lingjia Tang, Jason Mars:
HaPPy: Hyperthread-aware Power Profiling Dynamically. USENIX ATC 2014: 211-217 - 2013
- [c15]Mingliang Liu, Ye Jin, Jidong Zhai, Yan Zhai, Qianqian Shi, Xiaosong Ma, Wenguang Chen:
ACIC: automatic cloud I/O configurator for parallel applications. HPDC 2013: 111-112 - [c14]Yan Zhai, Guoying Zhao, Toni Alatalo, Janne Heikkilä, Timo Ojala, Xinyuan Huang:
Gesture interaction for wall-sized touchscreen display. UbiComp (Adjunct Publication) 2013: 175-178 - [c13]Mingliang Liu, Ye Jin, Jidong Zhai, Yan Zhai, Qianqian Shi, Xiaosong Ma, Wenguang Chen:
ACIC: automatic cloud I/O configurator for HPC applications. SC 2013: 38:1-38:12 - 2012
- [j8]Vijay Venkataraman, Guoliang Fan, Joseph P. Havlicek, Xin Fan, Yan Zhai, Mark B. Yeary:
Adaptive Kalman Filtering for Histogram-Based Appearance Learning in Infrared Imagery. IEEE Trans. Image Process. 21(11): 4622-4635 (2012) - [c12]Shuangcheng Niu, Jidong Zhai, Xiaosong Ma, Mingliang Liu, Yan Zhai, Wenguang Chen, Weimin Zheng:
Employing Checkpoint to Improve Job Scheduling in Large-Scale Systems. JSSPP 2012: 36-55 - 2011
- [j7]Shuang Wang, Lijuan Cui, Samuel Cheng, Yan Zhai, Mark B. Yeary, Qiang Wu:
Noise Adaptive LDPC Decoding Using Particle Filtering. IEEE Trans. Commun. 59(4): 913-916 (2011) - [c11]Mingliang Liu, Jidong Zhai, Yan Zhai, Xiaosong Ma, Wenguang Chen:
One optimized I/O configuration per HPC application: leveraging the configurability of cloud. APSys 2011: 15 - [c10]Yan Zhai, Mingliang Liu, Jidong Zhai, Xiaosong Ma, Wenguang Chen:
Cloud versus in-house cluster: evaluating Amazon cluster compute instances for running MPI applications. SC State of the Practice Reports 2011: 11:1-11:10 - 2010
- [j6]Zhenfei Tai, Samuel Cheng, Pramode K. Verma, Yan Zhai:
Braille document recognition using Belief Propagation. J. Vis. Commun. Image Represent. 21(7): 722-730 (2010)
2000 – 2009
- 2009
- [j5]Mark B. Yeary, Shamim Nemati, Tian-You Yu, Yadong Wang, Yan Zhai:
A Support-Vector-Machine-Based Approach to RF Sensor Spectral Signature Classifications. IEEE Trans. Instrum. Meas. 58(1): 221-228 (2009) - [j4]Yan Zhai, Mark B. Yeary, Samuel Cheng, Nasser Kehtarnavaz:
An Object-Tracking Algorithm Based on Multiple-Model Particle Filtering With State Partitioning. IEEE Trans. Instrum. Meas. 58(5): 1797-1809 (2009) - 2008
- [j3]Yan Zhai, Mark B. Yeary, Joseph P. Havlicek, Guoliang Fan:
A New Centralized Sensor Fusion-Tracking Methodology Based on Particle Filtering for Power-Aware Systems. IEEE Trans. Instrum. Meas. 57(10): 2377-2387 (2008) - [c9]Xiaobo Guo, Aiguo Song, Yan Zhai:
Neural Network Control for Tele-rehabilitation Robot based on Variable Gain. BMEI (2) 2008: 778-782 - 2007
- [c8]Yan Zhai, Mark B. Yeary, Dayong Zhou:
Target Tracking using a Particle Filter Based on the Projection Method. ICASSP (3) 2007: 1189-1192 - 2006
- [j2]Mark B. Yeary, Yan Zhai, Tian-You Yu, Shamim Nematifar, Alan Shapiro:
Spectral signature calculations and target tracking for remote sensing. IEEE Trans. Instrum. Meas. 55(4): 1430-1442 (2006) - [j1]Mark B. Yeary, Wei Zhang, Jennifer Q. Trelewicz, Yan Zhai, Blake McGuire:
Theory and Implementation of a Computationally Efficient Decimation Filter for Power-Aware Embedded Systems. IEEE Trans. Instrum. Meas. 55(5): 1839-1849 (2006) - [c7]Dayong Zhou, Victor E. DeBrunner, Yan Zhai, Mark B. Yeary:
Efficient Adaptive Nonlinear ECHO Cancellation, Using Sub-band Implementation of the Adaptive Volterra Filter. ICASSP (5) 2006: 277-280 - [c6]Yan Zhai, Mark B. Yeary, Jean-Charles Noyer, Joseph P. Havlicek, Shamim Nemati, Patrick Lanvin:
Visual Target Tracking using Improved and Computationally Efficient Particle Filtering. ICIP 2006: 1757-1760 - [c5]Yan Zhai, Peng Ning, Jun Xu:
Integrating IDS Alert Correlation and OS-Level Dependency Tracking. ISI 2006: 272-284 - 2005
- [c4]Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Christopher Bookholt:
Automatic diagnosis and response to memory corruption vulnerabilities. CCS 2005: 223-234 - [c3]Yan Zhai, Mark B. Yeary, Victor E. DeBrunner, Joseph P. Havlicek, Osama Alkhouli:
Image restoration using a hybrid combination of particle filtering and wavelet denoising. ICIP (2) 2005: 790-793 - [c2]Yan Zhai, Mark B. Yeary, Joseph P. Havlicek, Jean-Charles Noyer, Patrick Lanvin:
Visual tracking using sequential importance sampling with a state partition technique. ICIP (3) 2005: 876-879 - 2004
- [c1]Yan Zhai, Peng Ning, Purush Iyer, Douglas S. Reeves:
Reasoning About Complementary Intrusion Evidence. ACSAC 2004: 39-48
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-13 20:04 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint