


Остановите войну!
for scientists:


default search action
Yahui Li
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j33]Yahui Li, Yifan Liu, Zhenfang Zhu, Peiyu Liu
:
Exploring semantic awareness via graph representation for text classification. Appl. Intell. 53(2): 2088-2097 (2023) - [j32]Biao Han, Yahui Li, Xiaoyan Wang, Hanxun Li, Jinsen Huang:
FLoRa: Sequential fuzzy extractor based physical layer key generation for LPWAN. Future Gener. Comput. Syst. 140: 253-265 (2023) - [j31]Liming Zhou
, Xiaohan Rao
, Yahui Li
, Xianyu Zuo
, Yang Liu
, Yinghao Lin
, Yong Yang
:
SWDet: Anchor-Based Object Detector for Solid Waste Detection in Aerial Images. IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. 16: 306-320 (2023) - [j30]Yahui Li
, Yuanyuan Sun
, Ke-Jun Li
, Kaiqi Sun
, Zhijie Liu
, Qingshen Xu:
Harmonic Modeling of the Series-Connected Multipulse Rectifiers Under Unbalanced Conditions. IEEE Trans. Ind. Electron. 70(7): 6494-6505 (2023) - [j29]Yahui Li, Han Zhang, Jilong Wang, Zhiliang Wang, Xia Yin, Xingang Shi, Jianping Wu:
A General Approach to Generate Test Packets With Network Configurations. IEEE Trans. Parallel Distributed Syst. 34(4): 1362-1375 (2023) - 2022
- [j28]Yan Yang, Xingang Shi, Qiang Ma, Yahui Li, Xia Yin, Zhiliang Wang:
Path stability in partially deployed secure BGP routing. Comput. Networks 206: 108762 (2022) - [j27]Weifeng Gong
, Yahui Li
, Chuanhui Wang
, Hai-xia Zhang
, Zhengjie Zhai:
The Catastrophe Analysis of Shanghai Crude Oil Futures Price from the Perspective of Volatility Factors. Complex. 2022: 5367693:1-5367693:12 (2022) - [j26]Liming Zhou
, Xiaohan Rao
, Yahui Li, Xianyu Zuo, Baojun Qiao, Yinghao Lin:
A Lightweight Object Detection Method in Aerial Images Based on Dense Feature Fusion Path Aggregation Network. ISPRS Int. J. Geo Inf. 11(3): 189 (2022) - [j25]Quan Wang, Yahui Li, Dong Xiao
, Zhenya Zang
, Ziao Jiao, Yu Chen, David Day-Uei Li
:
Simple and Robust Deep Learning Approach for Fast Fluorescence Lifetime Imaging. Sensors 22(19): 7293 (2022) - [c39]Yahui Li, Yuanyuan Sun, Ke-Jun Li, Jie Lou, Kaiqi Sun, Peng An:
Harmonic Power Flow Calculation Based on Unified Harmonic State-Space Model of Converter. IAS 2022: 1-7 - [c38]Yahui Li, Kaiqi Sun, Yuanyuan Sun, Ke-Jun Li, Jie Lou, Yanqing Pang:
A Comparative Study on Power Quality Standards and Interaction Analysis for LVDC Systems. IAS 2022: 1-8 - [c37]Xiaolan Ji, Biao Han, Ruidong Li, Cao Xu, Yahui Li, Jinshu Su:
ACCeSS: Adaptive QoS-aware Congestion Control for Multipath TCP. IWQoS 2022: 1-10 - [c36]Shiyang Ma, Yahui Li, Zhonghua Wang, Di Lu, Xuewen Dong, Wei Tong, Lingxiao Yang:
Link-ability: A Prediction Method of Web Service Compatibility based on Markov Process. NaNA 2022: 511-516 - 2021
- [j24]Xue Li, Yuanji Li, Wenfei Song, Daohao Xie, Fangfang Zhu, Minghua Yang, Yahui Li:
cDNA cloning, expression and bioinformatical analysis of Tssk genes in tree shrews. Comput. Biol. Chem. 92: 107474 (2021) - [j23]Liming Zhou
, Haoxin Yan
, Chang Zheng
, Xiaohan Rao
, Yahui Li, Wencheng Yang, Junfeng Tian
, Minghu Fan
, Xianyu Zuo:
Aircraft Detection for Remote Sensing Image Based on Bidirectional and Dense Feature Fusion. Comput. Intell. Neurosci. 2021: 7618828:1-7618828:14 (2021) - [j22]Hui Sun
, Chengrui Bai
, Yahui Li
, Kaixin Yang
:
A Novel Dynamic Routing Approach to Distributed Wireless Sensor Network in Aircraft Environment. Complex. 2021: 6686977:1-6686977:8 (2021) - [j21]Rui Wang
, Yahui Li
, Hui Sun
, Kaixin Yang
:
Multisensor-Weighted Fusion Algorithm Based on Improved AHP for Aircraft Fire Detection. Complex. 2021: 8704924:1-8704924:10 (2021) - [j20]Yahui Li, Jian Mou, Liying Ye, Jing Long, Wei (Wayne) Huang:
An empirical investigation of the utilitarian, social benefits in LBS information disclosure - The moderating effect of the gender based social role theory. Int. J. Inf. Manag. 56: 102243 (2021) - [j19]Rui Wang
, Yahui Li, Hui Sun
, Youmin Zhang
:
Freshness constraints of an age of information based event-triggered Kalman consensus filter algorithm over a wireless sensor network. Frontiers Inf. Technol. Electron. Eng. 22(1): 51-67 (2021) - [j18]Yahui Li, Yuanyuan Sun, Kejun Li
, Jingru Zhuang, Yongliang Liang, Yanqing Pang:
Analysis and Suppression of Voltage Violation and Fluctuation with Distributed Photovoltaic Integration. Symmetry 13(10): 1894 (2021) - [c35]Peng Guo, Feiyang Liu, Na Wu, Yahui Li, Ning Hu:
Non-functional Attribute Modeling and Verification Method for Integrated Modular Avionics System. CSDM Asia / CSDM 2021: 325-341 - [c34]Lei Shi, Yahui Li, Boon Thau Loo, Rajeev Alur:
Network Traffic Classification by Program Synthesis. TACAS (1) 2021: 430-448 - 2020
- [j17]Yahui Li
, Yang Li
:
Security-Constrained Multi-Objective Optimal Power Flow for a Hybrid AC/VSC-MTDC System With Lasso-Based Contingency Filtering. IEEE Access 8: 6801-6811 (2020) - [j16]Ying Zhong, Wenqi Chen, Zhiliang Wang, Yifan Chen, Kai Wang, Yahui Li, Xia Yin, Xingang Shi, Jiahai Yang, Keqin Li:
HELAD: A novel network anomaly detection model based on heterogeneous ensemble learning. Comput. Networks 169: 107049 (2020) - [j15]Yahui Li, Zhiliang Wang, Xia Yin, Xingang Shi, Jianping Wu, Fangdan Ye, Jiangyuan Yao, Han Zhang:
Assisting reachability verification of network configurations updates with NUV. Comput. Networks 177: 107326 (2020) - [j14]Jihong Sun
, Yahui Li
, Xiaoyun Zhao
, Nanxing Zhang
:
An Evaluation on Investment of Research Funds with a Neural Network Algorithm in "Double First-Class" Universities. Complex. 2020: 7496126:1-7496126:8 (2020) - [c33]Jianchun Xie, Yahui Li, Zhonghua Wang, Linting Bai:
The Airborne Information Processing System Development Research. DSA 2020: 527-531 - [i3]Yahui Li, Yang Li:
Security-Constrained Multi-Objective Optimal Power Flow for a Hybrid AC/VSC-MTDC System with Lasso-based Contingency Filtering. CoRR abs/2001.01579 (2020) - [i2]Lei Shi, Yahui Li, Rajeev Alur, Boon Thau Loo:
Session-layer Attack Traffic Classification by Program Synthesis. CoRR abs/2010.06135 (2020)
2010 – 2019
- 2019
- [j13]Yahui Li, Zhiliang Wang, Jiangyuan Yao, Xia Yin, Xingang Shi, Jianping Wu, Han Zhang:
MSAID: Automated detection of interference in multiple SDN applications. Comput. Networks 153: 49-62 (2019) - [j12]Yahui Li
, Xia Yin, Zhiliang Wang
, Jiangyuan Yao, Xingang Shi, Jianping Wu, Han Zhang, Qing Wang:
A Survey on Network Verification and Testing With Formal Methods: Approaches and Challenges. IEEE Commun. Surv. Tutorials 21(1): 940-969 (2019) - [j11]Jun Zhang, Guosheng Li, Yahui Li, Xiaokang Dai:
Barrier Lyapunov functions-based localized adaptive neural control for nonlinear systems with state and asymmetric control constraints. Trans. Inst. Meas. Control 41(6): 1656-1664 (2019) - [j10]Han Zhang
, Haijun Geng
, Yahui Li
, Xia Yin, Xingang Shi
, Zhiliang Wang
, Qianhong Wu
, Jianwei Liu:
DA&FD-Deadline-Aware and Flow Duration-Based Rate Control for Mixed Flows in DCNs. IEEE/ACM Trans. Netw. 27(6): 2458-2471 (2019) - [j9]Zhiliang Wang
, Han Zhang
, Xingang Shi
, Xia Yin, Yahui Li
, Haijun Geng, Qianhong Wu
, Jianwei Liu
:
Efficient Scheduling of Weighted Coflows in Data Centers. IEEE Trans. Parallel Distributed Syst. 30(9): 2003-2017 (2019) - [c32]Kailong Zhang, Liuyang Li, Yahui Li, Baorong Xie, Chao Fei, Zhonghua Wang:
Resource-Visualization-based Cooperative Architecture and Mechanisms within the Tactical Clouds*. ICIS 2019: 512-517 - 2018
- [j8]Biting Lei, Pengxing Yi, Yahui Li, Jiayun Xiang:
A Temperature Drift Compensation Method for Pulsed Eddy Current Technology. Sensors 18(6): 1952 (2018) - [c31]Yahui Li, Zhiliang Wang, Xia Yin, Xingang Shi, Jianping Wu, Jiangyuan Yao, Yingya Guo:
Efficient network configuration verification using optimized datalog. INFOCOM Workshops 2018: 1-2 - [c30]Lei Zhang, Zhengjun Zhai, Linting Bai, Yahui Li, Wensheng Niu, Lei Yuan:
Visual-inertial State Estimation for the Civil Aircraft Landing in Low Visibility Conditions. NaNA 2018: 292-297 - [c29]Jianchun Xie, Zhonghua Wang, Yahui Li:
The Distributed Computing Framework Research for Avionics Cloud. NaNA 2018: 390-393 - [i1]Yahui Li, Yang Li, Yuanyuan Sun:
Online Static Security Assessment of Power Systems Based on Lasso Algorithm. CoRR abs/1808.07998 (2018) - 2017
- [c28]Yahui Li, Zhiliang Wang, Jiangyuan Yao, Xia Yin, Xingang Shi, Jianping Wu:
MSAID: Automated interference detection for multiple SDN applications. ICNP 2017: 1-2 - [c27]Jiangyuan Yao, Zhiliang Wang, Xia Yin, Xingang Shi, Yahui Li, Chongrong Li:
Testing Black-Box SDN Applications with Formal Behavior Models. MASCOTS 2017: 110-120 - [c26]Yahui Li, Muyun Yang
, Tiejun Zhao, Dequan Zheng, Sheng Li:
An Empirical Study on Incorporating Prior Knowledge into BLSTM Framework in Answer Selection. NLPCC 2017: 683-692 - 2016
- [j7]Wensheng Niu, Yahui Li, Peng Guo:
面向无人装置协同操作的安全认证协议 (Authentication Protocol for Cooperation of Unmanned Vehicles). 计算机科学 43(1): 178-180 (2016) - [j6]Peng Guo, Yahui Li, Lei Sun, Xiaole Cai:
面向嵌入式软件开发的UML到Simulink模型转换方法 (UML Model to Simulink Model Transformation Method in Design of Embedded Software). 计算机科学 43(2): 192-198 (2016) - [j5]Yiting Wang
, Donghui Xie, Song Liu, Ronghai Hu
, Yahui Li, Guangjian Yan
:
Scaling of FAPAR from the Field to the Satellite. Remote. Sens. 8(4): 310 (2016) - [c25]Yahui Li, Wayne Huong:
The Role of Espoused National Cultural Values in Information Disclosure from the Perspective of Dual-calculus. AMCIS 2016 - [c24]MingWei Yang, Yahui Li, Yadi Zhang, WanRen Wang:
H-DAT: An Improved Buffer Scheduling Algorithm for Multi-Channel SSD. CIS 2016: 23-27 - [c23]Pengcheng Wen, Yahui Li, Yadi Zhang:
Methods to Capability Improvement for Multiple UAVs' Control. CIS 2016: 444-447 - 2015
- [j4]Kang Zhang, Pengxing Yi, Yahui Li, Bing Hui, Xuming Zhang
:
A New Method to Evaluate Surface Defects with an Electromagnetic Acoustic Transducer. Sensors 15(7): 17420-17432 (2015) - [c22]Yahui Li, Cheng Cai:
Video segment retrieval based on affine hulls. ASCC 2015: 1-6 - [c21]Pengcheng Wen, Yadi Zhang, Yahui Li, Xiaoan Li:
Intelligence Computing Technology for UAV's Autonomy. CIS 2015: 22-25 - [c20]Xiaole Cai, Yahui Li, Yadi Zhang, Peng Li:
An Efficient Address Mapping Algorithm for Multichannel Structure SSD. CIS 2015: 121-124 - [c19]Yahui Li, Yadi Zhang, Peng Li, Peng Guo:
An Efficient Trusted Chain Model for Real-Time Embedded Systems. CIS 2015: 428-432 - [c18]Jingyuan Han, Yahui Li:
Modification of Huff Model and ITS Application in County Market: A Case of Pharmacy Siting in Huanghua City, Hebei Province. ICSS 2015: 63-69 - 2014
- [j3]Pengxing Yi, Kang Zhang, Yahui Li, Xuming Zhang
:
Influence of the Lift-Off Effect on the Cut-Off Frequency of the EMAT-Generated Rayleigh Wave Signal. Sensors 14(10): 19687-19699 (2014) - [c17]Tingyu Jiang, Yahui Li, Yuan Dong:
A Hybrid Task Schedule Algorithm for Real-Time System Employing Trusted Computing Technology. CIS 2014: 553-557 - [c16]Peng Guo, Yahui Li, Peng Li, Shuai Liu, Dongya Sun:
A UML Model to Simulink Model Transformation Method in the Design of Embedded Software. CIS 2014: 583-587 - [c15]Kaiqiang Li, Hao Feng, Yahui Li, Zhiwei Zhang:
An Improved Method of Access Control Based on BLP Model in MILS. CIS 2014: 588-592 - [c14]Kaiqiang Li, Hao Feng, Yahui Li, Zhiwei Zhang:
Information Flow Control Model and Method in Distribute MILS. CIS 2014: 598-602 - [c13]Yahui Li, Wen Sheng Niu, Peng Li, Jianfeng Ma, Yulong Shen:
Secure Networking Protocol with Identity Protection for Cooperation of Unmanned Platforms. CIS 2014: 603-607 - [c12]Jiangyuan Yao, Zhiliang Wang, Xia Yin, Xingang Shi, Jianping Wu, Yahui Li:
Model Based Black-Box Testing of SDN Applications. CoNEXT Student Workshop 2014: 37-39 - [c11]Jianqing Huang, Yahui Li, Hailin Li:
Study on Factors to Adopt Mobile Payment for Tourism E-Business: Based on Valence Theory and Trust Transfer Theory. ENTER 2014: 747-759 - [c10]Jiangyuan Yao, Zhiliang Wang, Xia Yin, Xingang Shi, Jianping Wu, Yahui Li:
Test oriented formal model of SDN applications. IPCCC 2014: 1-2 - 2013
- [c9]Yahui Li, Muhammad Zeeshan Asghar, Petri Pulli:
Visually-aided smart kitchen environment for senior citizens suffering from dementia. iCAST/UMEDIA 2013: 584-590 - [c8]Yahui Li, Yuewen Liu, Hongyun Zhang, Wei Sun, Wei Huang:
An Investigation of the Factors Influencing Information Quality: From the Expectation-Perception Perspective. PACIS 2013: 266 - 2012
- [c7]Yinping Zhou, Yulong Shen, Qingqi Pei, Xining Cui, Yahui Li:
Security Information Flow Control Model and Method in MILS. CIS 2012: 591-595 - 2011
- [c6]Yameng Cheng, Yulong Shen, Jianfeng Ma, Xining Cui, Yahui Li:
AHP-GRAP Based Security Evaluation Method for MILS System within CC Framework. CIS 2011: 635-639 - [c5]Yahui Li, Wen Sheng Niu, Yadi Zhang, Jianfeng Ma, Yulong Shen:
Key Management Protocol Based on Finely Granular Multi-level Security Method in Wireless Networks. CIS 2011: 731-735 - 2010
- [j2]Yahui Li, Jianfeng Ma, Sang-Jae Moon:
Secure Message Distribution Scheme with Configurable Privacy in Heterogeneous Wireless Sensor Networks. IEICE Trans. Inf. Syst. 93-D(3): 484-490 (2010) - [c4]Yahui Li, Xining Cui, Linping Hu, Yulong Shen:
Efficient security transmission protocol with identity-based encryption in wireless mesh networks. HPCS 2010: 679-685 - [c3]Yahui Li, Yadi Zhang, Wen Sheng Niu:
A Method of Privacy Preserving in Mobile Wireless Environments. UIC/ATC Workshops 2010: 132-137
2000 – 2009
- 2008
- [c2]Yahui Li, Ding Yong, Jianfeng Ma:
Secure Message Distribution Scheme with Configurable Privacy for Heterogeneous Wireless Sensor Networks. EUC (2) 2008: 10-15 - 2004
- [j1]Yahui Li, Sheng Qiang, Xianyi Zhuang, Okyay Kaynak
:
Robust and adaptive backstepping control for nonlinear systems using RBF neural networks. IEEE Trans. Neural Networks 15(3): 693-701 (2004) - 2003
- [c1]Yahui Li, Xianyi Zhuang, Sheng Qiang:
Adaptive backstepping control for nonlinear systems using RBF neural networks. ACC 2003: 4536-4541
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2023-03-26 00:55 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint