default search action
Yan Zhu 0007
Person information
- affiliation: Southwest Jiaotong University, Chengdu, China
- affiliation (former): Darmstadt University of Technology, Germany
Other persons with the same name
- Yan Zhu — disambiguation page
- Yan Zhu 0001 — University of Macau, Analog and Mixed Signal VLSI Laboratory, Macao, China
- Yan Zhu 0002 — Stanford University, CA, USA
- Yan Zhu 0003 — Northwestern University, Evanston, IL, USA
- Yan Zhu 0004 — University of Sydney, Department of Electrical Engineering, Australia
- Yan Zhu 0005 — Nanjing Agricultural University, China
- Yan Zhu 0006 — Monash University, Department of Medicinal Chemistry, Melbourne, Australia
- Yan Zhu 0008 — East China University of Science and Technology, Department of Mathematics, Shanghai, China (and 2 more)
- Yan Zhu 0009 — Facebook, Applied Machine Learning, USA (and 2 more)
- Yan Zhu 0010 — University of Science and Technology Beijing, China (and 3 more)
- Yan Zhu 0011 — Tsinghua University, Department of Management Science & Engineering, Beijing, China
- Yan Zhu 0012 — Beijing Jiaotong University, China
- Yan Zhu 0013 — New Mexico University, Albuquerque, NM, USA
- Yan Zhu 0014 — University of California, Riverside, CA, USA (and 1 more)
- Yan Zhu 0015 — Shanghai Jiao Tong University, School of Mathematical Sciences, China
- Yan Zhu 0016 — Chinese Academy of Sciences, State Key Laboratory of Computer Architecture, Beijing, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c15]Yan Zhu, Xiaofei Wang, Xinrui Lin, Yiqiang Peng:
GADEC: Discovering Abnormal Citation Groups Based on Enhanced Local Community Expansion and DQN. DEXA (2) 2024: 37-52 - 2023
- [j21]Lei Wang, Yan Zhu, Qiang Peng:
TNSEIR: A SEIR pattern-based embedding approach for temporal network. Appl. Intell. 53(20): 24202-24216 (2023) - 2022
- [j20]Faisal Khurshid, Yan Zhu, Jie Hu, Muqeet Ahmad, Mushtaq Ahmad:
Battering Review Spam Through Ensemble Learning in Imbalanced Datasets. Comput. J. 65(7): 1666-1678 (2022) - 2021
- [j19]Xu Zhuang, Yan Zhu, Qiang Peng, Faisal Khurshid:
Using deep belief network to demote web spam. Future Gener. Comput. Syst. 118: 94-106 (2021) - [j18]Cheng Cheng, Chunping Li, Youfang Han, Yan Zhu:
A semi-supervised deep learning image caption model based on Pseudo Label and N-gram. Int. J. Approx. Reason. 131: 93-107 (2021) - [j17]Rong Wang, Benjamin C. M. Fung, Yan Zhu, Qiang Peng:
Differentially private data publishing for arbitrarily partitioned data. Inf. Sci. 553: 247-265 (2021) - 2020
- [j16]Rong Wang, Yan Zhu, Chin-Chen Chang, Qiang Peng:
Privacy-preserving high-dimensional data publishing for classification. Comput. Secur. 93: 101785 (2020) - [j15]Rong Wang, Benjamin C. M. Fung, Yan Zhu:
Heterogeneous data release for cluster analysis with differential privacy. Knowl. Based Syst. 201-202: 106047 (2020) - [c14]Xiaobao Wu, Chunping Li, Yan Zhu, Yishu Miao:
Short Text Topic Modeling with Topic Distribution Quantization and Negative Sampling Decoder. EMNLP (1) 2020: 1772-1782 - [c13]Xiaobao Wu, Chunping Li, Yan Zhu, Yishu Miao:
Learning Multilingual Topics with Neural Variational Inference. NLPCC (1) 2020: 840-851
2010 – 2019
- 2019
- [j14]Faisal Khurshid, Yan Zhu, Xu Zhuang, Mushtaq Ahmad, Muqeet Ahmad:
Enactment of Ensemble Learning for Review Spam Detection on Selected Features. Int. J. Comput. Intell. Syst. 12(1): 387-394 (2019) - [j13]Chen Sun, Chunping Li, Yan Zhu:
A Novel Convolutional Neural Network Based Localization System for Monocular Images. Int. J. Softw. Sci. Comput. Intell. 11(2): 38-50 (2019) - [c12]Xin Wang, Lan Yang, Yan Zhu, Huayi Zhan, Yuan Jin:
Querying Knowledge Graphs with Natural Languages. DEXA (2) 2019: 30-46 - [c11]Liangqiang Huang, Yan Zhu, Xin Wang, Faisal Khurshid:
An Attribute-Based Fine-Grained Access Control Mechanism for HBase. DEXA (1) 2019: 44-59 - [c10]Jiefan Tan, Yan Zhu, Qiang Du:
Triplet-CSSVM: Integrating Triplet-Sampling CNN and Cost-Sensitive Classification for Imbalanced Image Detection. DEXA (2) 2019: 341-350 - 2018
- [j12]Rong Wang, Yan Zhu, Tung-Shou Chen, Chin-Chen Chang:
An Authentication Method Based on the Turtle Shell Algorithm for Privacy-Preserving Data Mining. Comput. J. 61(8): 1123-1132 (2018) - [j11]Rong Wang, Yan Zhu, Tung-Shou Chen, Chin-Chen Chang:
Privacy-Preserving Algorithms for Multiple Sensitive Attributes Satisfying t-Closeness. J. Comput. Sci. Technol. 33(6): 1231-1242 (2018) - [j10]Xu Zhuang, Yan Zhu, Chin-Chen Chang, Qiang Peng:
Security Issues in Ultralightweight RFID Authentication Protocols. Wirel. Pers. Commun. 98(1): 779-814 (2018) - 2017
- [j9]Xu Zhuang, Yan Zhu, Chin-Chen Chang, Qiang Peng:
Feature bundling in decision tree algorithm. Intell. Data Anal. 21(2): 371-383 (2017) - [j8]Xu Zhuang, Yan Zhu, Chin-Chen Chang, Qiang Peng, Faisal Khurshid:
A unified score propagation model for web spam demotion algorithm. Inf. Retr. J. 20(6): 547-574 (2017) - [j7]Rong Wang, Yan Zhu, Jiefan Tan, Binbin Zhou:
Detection of malicious web pages based on hybrid analysis. J. Inf. Secur. Appl. 35: 68-74 (2017) - [c9]Sha Wei, Yan Zhu:
Cleaning Out Web Spam by Entropy-Based Cascade Outlier Detection. DEXA (2) 2017: 232-246 - [c8]Faisal Khurshid, Yan Zhu, Chubato Wondaferaw Yohannese, Muhammad Iqbal:
Recital of supervised learning on review spam detection: An empirical analysis. ISKE 2017: 1-6 - 2016
- [j6]Zhi-Hui Wang, Xu Zhuang, Chin-Chen Chang, Chuan Qin, Yan Zhu:
Reversible Data Hiding Based on Geometric Structure of Pixel Groups. Int. J. Netw. Secur. 18(1): 52-59 (2016) - 2015
- [j5]Shouhong Tang, Yan Zhu, Fan Yang:
基于Bagging-SVM集成分类器的网页作弊检测 (Web Spam Detection Based on Integrated Classifier with Bagging-SVM). 计算机科学 42(1): 239-243 (2015) - 2014
- [j4]Bo Zhao, Yan Zhu:
Formalizing and validating the web quality model for web source quality evaluation. Expert Syst. Appl. 41(7): 3306-3312 (2014) - [j3]Xu Zhuang, Chin-Chen Chang, Zhi-Hui Wang, Yan Zhu:
A Simple Password Authentication Scheme Based on Geometric Hashing Function. Int. J. Netw. Secur. 16(4): 271-277 (2014) - [j2]Xu Zhuang, Yan Zhu, Chin-Chen Chang:
A New Ultralightweight RFID Protocol for Low-Cost Tags: R 2 AP. Wirel. Pers. Commun. 79(3): 1787-1802 (2014) - [c7]Shouhong Tang, Yan Zhu, Fan Yang, Qing Xu:
Ascertaining Spam Web Pages Based on Ant Colony Optimization Algorithm. DEXA (2) 2014: 231-239 - [c6]Yan Zhu, Fan Yang, Shouhong Tang:
WSD-AIS: an Artificial Immune System Approach against Web Spam. ICS 2014: 934-943 - 2013
- [j1]Xu Zhuang, Zhi-Hui Wang, Chin-Chen Chang, Yan Zhu:
Security Analysis of a new Ultra-lightweight RFID Protocol and Its Improvement. J. Inf. Hiding Multim. Signal Process. 4(3): 166-177 (2013)
2000 – 2009
- 2008
- [c5]Yan Zhu:
Group Assessment of Web Source/Information Quality Based on WebQM and Fuzzy Logic. RSKT 2008: 660-667 - 2005
- [c4]Yan Zhu, Alejandro P. Buchmann:
Cubing Web Data Based on Multidimensional Arrays. ASIAN 2005: 268-269 - 2004
- [b1]Yan Zhu:
Integrating external data from Web sources into a data warehouse for OLAP and decision making. Darmstadt University of Technology, Germany, 2004, ISBN 3-8322-3355-5, pp. 1-197 - 2002
- [c3]Yan Zhu, Alejandro P. Buchmann:
Evaluating and Selecting Web Sources as External Information Resources of a Data Warehouse. WISE 2002: 149-160 - 2001
- [c2]Yan Zhu, Christof Bornhövd, Alejandro P. Buchmann:
Data Transformation for Warehousing Web Data. WECWIS 2001: 74-85 - 2000
- [c1]Yan Zhu, Christof Bornhövd, Doris Sautner, Alejandro P. Buchmann:
Materializing Web Data for OLAP and DSS. Web-Age Information Management 2000: 201-214
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-15 20:37 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint