default search action
Yongzhong Li
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c15]Yuqun Wu, Yongzhong Li, Bo Xu:
A Personalized Scenic Spot Recommendation Algorithm Based on Improved TrustSVD Model. CBD 2022: 128-132 - [c14]Yuqun Wu, Yongzhong Li, Bo Xu:
Research on Personalized Tourism Recommendation Technology Based on Improved S-TrustSVD Model. EITCE 2022: 796-802 - [c13]Yuheng Li, Yongzhong Li, Shipeng Zhang:
A New Transparent File Encryption Method Based on SM4 for Android Platform. ICAIS (3) 2022: 520-531 - 2021
- [j11]Yufei Zhu, Zuocheng Xing, Jinhui Xue, Zerun Li, Yifan Hu, Yang Zhang, Yongzhong Li:
Area-Efficient Parallel Reconfigurable Stream Processor for Symmetric Cryptograph. IEEE Access 9: 28377-28392 (2021) - [j10]Lirui Chen, Yu Wang, Zuocheng Xing, Shikai Qiu, Qinglin Wang, Yongzhong Li:
Low latency group-sorted QR decomposition algorithm for larger-scale MIMO systems. IET Commun. 15(12): 1548-1560 (2021) - [c12]Yongli Geng, Yongzhong Li, Shipeng Zhang:
Research on Multi-granularity Intrusion Detection Algorithm Based onSequential Three-Way Decision. EITCE 2021: 1154-1160 - 2020
- [j9]Lirui Chen, Zuocheng Xing, Yongzhong Li, Shikai Qiu:
Efficient MIMO Preprocessor With Sorting-Relaxed QR Decomposition and Modified Greedy LLL Algorithm. IEEE Access 8: 54085-54099 (2020) - [j8]Yongzhong Li, Yinpeng Wang, Shutong Qi, Qiang Ren, Lei Kang, Sawyer D. Campbell, Pingjuan L. Werner, Douglas H. Werner:
Predicting Scattering From Complex Nano-Structures via Deep Learning. IEEE Access 8: 139983-139993 (2020) - [j7]Zerun Li, Qinglin Wang, Weisong Liu, Qiang Xu, Zuocheng Xing, Yongzhong Li:
Practical AMC model based on SAE with various optimisation methods under different noise environments. IET Commun. 14(22): 4081-4088 (2020) - [c11]Xiangtong Du, Yongzhong Li, Shipeng Zhang:
Research on Intrusion Detection Algorithm Based on Deep Belief Networks and Three-way Decisions. EITCE 2020: 50-56 - [c10]Shipeng Zhang, Yongzhong Li, Xiangtong Du:
An Intrusion Detection Approach Based on Autoencoder and Three-way Decisions. EITCE 2020: 495-500 - [c9]Yongli Geng, Yongzhong Li, Shipeng Zhang, Yurong Tu:
A New Intrusion Detection Algorithm Based on PSO and Kernel Extreme Learning Machine. EITCE 2020: 653-657 - [c8]Yongzhong Li, Shipeng Zhang, Yi Li:
Study of Transparent File Encryption Technology on Android Platform. SpaCCS Workshops 2020: 137-145 - [c7]Xiangtong Du, Yongzhong Li, Zunlei Feng:
A Semi-supervised Intrusion Detection Algorithm Based on Auto-encoder. SpaCCS 2020: 188-199
2010 – 2019
- 2018
- [j6]Yinglei Song, Yongzhong Li, Junfeng Qu:
A New Approach for Supervised Dimensionality Reduction. Int. J. Data Warehous. Min. 14(4): 20-37 (2018) - [c6]Yongzhong Li, Xuan Luo, Yi Li:
An adaptive blind watermarking algorithm based on DCT and its application in multimedia data processing. ICIMCS 2018: 13:1-13:5 - 2017
- [c5]Miao Du, Yongzhong Li, Qing Lu, Kun Wang:
Bayesian Game Based Pseudo Honeypot Model in Social Networks. ICCCS (2) 2017: 62-71 - 2015
- [j5]Yinglei Song, Chunmei Liu, Yongzhong Li:
A New Parameterized Algorithm for Predicting the Secondary Structure of RNA Sequences Including Pseudoknots. Comput. J. 58(11): 3114-3125 (2015) - [j4]Yanyan Qian, Yongzhong Li, Xiya Yu:
基于多标记与半监督学习的入侵检测方法研究 (Intrusion Detection Method Based on Multi-label and Semi-supervised Learning). 计算机科学 42(2): 134-136 (2015) - [j3]Yongzhong Li, Jie Zhang:
基于云模型和半监督聚类的入侵检测算法 (Intrusion Detection Algorithm Based on Cluster and Cloud Model). 计算机科学 42(2): 147-149 (2015) - [j2]Pengfei Wu, Yiguang Liu, Yongzhong Li, Bingbing Liu:
Robust Prostate Segmentation Using Intrinsic Properties of TRUS Images. IEEE Trans. Medical Imaging 34(6): 1321-1335 (2015) - 2013
- [j1]Pengfei Wu, Yiguang Liu, Yongzhong Li, Yongtao Shi:
TRUS image segmentation with non-parametric kernel density estimation shape prior. Biomed. Signal Process. Control. 8(6): 764-771 (2013) - 2012
- [c4]Pengfei Wu, Yiguang Liu, Yongzhong Li, Liping Cao:
TRUS Image Segmentation Driven by Narrow Band Contrast Pattern Using Shape Space Embedded Level Sets. IScIDE 2012: 339-346 - 2010
- [c3]Yongzhong Li, Chunwei Jing, Jing Xu:
A New Distributed Intrusion Detection Method Based on Immune Mobile Agent. LSMS/ICSEE (1) 2010: 233-243
2000 – 2009
- 2009
- [c2]Yongzhong Li, Rushan Wang, Jing Xu, Ge Yang, Bo Zhao:
Intrusion Detection Method Based on Fuzzy Hidden Markov Model. FSKD (3) 2009: 470-474 - 2008
- [c1]Yongzhong Li, Hua Zhu, Ruiqing Yu, Ge Yang, Jing Xu:
An Adaptive Blind Watermarking Algorithm Based on DCT and Modified Watson's Visual Model. ISECS 2008: 904-907
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:05 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint