default search action
Zhiyu Wu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c8]Zhiyu Wu, Yisu Wang:
Qiao: DIY your routing protocol in Internet-of-Things. CSCWD 2024: 353-358 - [c7]Zhiyu Wu, Jinshi Cui:
Image-Feature Weak-to-Strong Consistency: An Enhanced Paradigm for Semi-supervised Learning. ECCV (15) 2024: 372-388 - [c6]Zhiyu Wu, Jinshi Cui:
AllMatch: Exploiting All Unlabeled Data for Semi-Supervised Learning. IJCAI 2024: 5245-5253 - [c5]Lin Zhang, Zhiyu Wu, Zhou Zhou, Yongjie Chang, Hongrui Wu, Hongliu Yu, Bingshan Hu:
Mechanism Design of Cable-driven Multi-functional Knee Osteoarthritis Rehabilitation Robot. M2VIP 2024: 1-6 - [c4]Xiang Ling, Zhiyu Wu, Bin Wang, Wei Deng, Jingzheng Wu, Shouling Ji, Tianyue Luo, Yanjun Wu:
A Wolf in Sheep's Clothing: Practical Black-box Adversarial Attacks for Evading Learning-based Windows Malware Detection in the Wild. USENIX Security Symposium 2024 - [i14]Jiachen Liu, Zhiyu Wu, Jae-Won Chung, Fan Lai, Myungjin Lee, Mosharaf Chowdhury:
Andes: Defining and Enhancing Quality-of-Experience in LLM-Based Text Streaming Services. CoRR abs/2404.16283 (2024) - [i13]Zhiwei Bao, Liu Liao-Liao, Zhiyu Wu, Yifan Zhou, Dan Fan, Michal Aibin, Yvonne Coady, Andrew Brownsword:
Delta Tensor: Efficient Vector and Tensor Storage in Delta Lake. CoRR abs/2405.03708 (2024) - [i12]Zhiyu Wu, Jinshi Cui:
AllMatch: Exploiting All Unlabeled Data for Semi-Supervised Learning. CoRR abs/2406.15763 (2024) - [i11]Xiang Ling, Zhiyu Wu, Bin Wang, Wei Deng, Jingzheng Wu, Shouling Ji, Tianyue Luo, Yanjun Wu:
A Wolf in Sheep's Clothing: Practical Black-box Adversarial Attacks for Evading Learning-based Windows Malware Detection in the Wild. CoRR abs/2407.02886 (2024) - [i10]Minxuan Zhou, Hao Liang, Tianpeng Li, Zhiyu Wu, Mingan Lin, Linzhuang Sun, Yaqi Zhou, Yan Zhang, Xiaoqin Huang, Yicong Chen, Yujing Qiao, Weipeng Chen, Bin Cui, Wentao Zhang, Zenan Zhou:
MathScape: Evaluating MLLMs in multimodal Math Scenarios through a Hierarchical Benchmark. CoRR abs/2408.07543 (2024) - [i9]Zhiyu Wu, Jinshi Cui:
Image-Feature Weak-to-Strong Consistency: An Enhanced Paradigm for Semi-Supervised Learning. CoRR abs/2408.12614 (2024) - [i8]Chengyue Wu, Xiaokang Chen, Zhiyu Wu, Yiyang Ma, Xingchao Liu, Zizheng Pan, Wen Liu, Zhenda Xie, Xingkai Yu, Chong Ruan, Ping Luo:
Janus: Decoupling Visual Encoding for Unified Multimodal Understanding and Generation. CoRR abs/2410.13848 (2024) - 2023
- [j8]Qiaolian Xie, Qiaoling Meng, Wenwei Yu, Zhiyu Wu, Rongna Xu, Qingxin Zeng, Zhongchao Zhou, Tianyi Yang, Hongliu Yu:
Design of a SMA-based soft composite structure for wearable rehabilitation gloves. Frontiers Neurorobotics 17 (2023) - [j7]Qiaolian Xie, Qiaoling Meng, Wenwei Yu, Zhiyu Wu, Rongna Xu, Qingxin Zeng, Zhongchao Zhou, Tianyi Yang, Hongliu Yu:
Corrigendum: Design of a SMA-based soft composite structure for wearable rehabilitation gloves. Frontiers Neurorobotics 17 (2023) - [j6]Mingfu Xue, Yinghao Wu, Zhiyu Wu, Yushu Zhang, Jian Wang, Weiqiang Liu:
Detecting backdoor in deep neural networks via intentional adversarial perturbations. Inf. Sci. 634: 564-577 (2023) - [j5]Mingfu Xue, Chengxiang Yuan, Can He, Yinghao Wu, Zhiyu Wu, Yushu Zhang, Zhe Liu, Weiqiang Liu:
Use the Spear as a Shield: An Adversarial Example Based Privacy-Preserving Technique Against Membership Inference Attacks. IEEE Trans. Emerg. Top. Comput. 11(1): 153-169 (2023) - [j4]Mingfu Xue, Zhiyu Wu, Yushu Zhang, Jian Wang, Weiqiang Liu:
AdvParams: An Active DNN Intellectual Property Protection Technique via Adversarial Perturbation Based Parameter Encryption. IEEE Trans. Emerg. Top. Comput. 11(3): 664-678 (2023) - [c3]Xiangyu Qin, Zhiyu Wu, Tingting Zhang, Yanran Li, Jian Luan, Bin Wang, Li Wang, Jinshi Cui:
BERT-ERC: Fine-Tuning BERT Is Enough for Emotion Recognition in Conversation. AAAI 2023: 13492-13500 - [c2]Zhiyu Wu, Jinshi Cui:
LA-Net: Landmark-Aware Learning for Reliable Facial Expression Recognition under Label Noise. ICCV 2023: 20641-20650 - [i7]Xiangyu Qin, Zhiyu Wu, Jinshi Cui, Tingting Zhang, Yanran Li, Jian Luan, Bin Wang, Li Wang:
BERT-ERC: Fine-tuning BERT is Enough for Emotion Recognition in Conversation. CoRR abs/2301.06745 (2023) - [i6]Zhiyu Wu, Jinshi Cui:
LA-Net: Landmark-Aware Learning for Reliable Facial Expression Recognition under Label Noise. CoRR abs/2307.09023 (2023) - 2022
- [j3]Zhiyu Wu, Qun'ou Jiang, Yang Yu, Huijie Xiao, Dirk Freese:
Spatio-Temporal Evolution of a Typical Sandstorm Event in an Arid Area of Northwest China in April 2018 Based on Remote Sensing Data. Remote. Sens. 14(13): 3065 (2022) - 2021
- [j2]Mingfu Xue, Shichang Sun, Zhiyu Wu, Can He, Jian Wang, Weiqiang Liu:
SocialGuard: An adversarial example based privacy-preserving technique for social images. J. Inf. Secur. Appl. 63: 102993 (2021) - [i5]Mingfu Xue, Zhiyu Wu, Jian Wang, Yushu Zhang, Weiqiang Liu:
AdvParams: An Active DNN Intellectual Property Protection Technique via Adversarial Perturbation Based Parameter Encryption. CoRR abs/2105.13697 (2021) - [i4]Mingfu Xue, Yinghao Wu, Zhiyu Wu, Jian Wang, Yushu Zhang, Weiqiang Liu:
Detecting Backdoor in Deep Neural Networks via Intentional Adversarial Perturbations. CoRR abs/2105.14259 (2021) - 2020
- [c1]Mingfu Xue, Zhiyu Wu, Can He, Jian Wang, Weiqiang Liu:
Active DNN IP Protection: A Novel User Fingerprint Management and DNN Authorization Control Technique. TrustCom 2020: 975-982 - [i3]Mingfu Xue, Shichang Sun, Zhiyu Wu, Can He, Jian Wang, Weiqiang Liu:
SocialGuard: An Adversarial Example Based Privacy-Preserving Technique for Social Images. CoRR abs/2011.13560 (2020) - [i2]Mingfu Xue, Chengxiang Yuan, Can He, Zhiyu Wu, Yushu Zhang, Zhe Liu, Weiqiang Liu:
Use the Spear as a Shield: A Novel Adversarial Example based Privacy-Preserving Technique against Membership Inference Attacks. CoRR abs/2011.13696 (2020) - [i1]Mingfu Xue, Can He, Zhiyu Wu, Jian Wang, Zhe Liu, Weiqiang Liu:
3D Invisible Cloak. CoRR abs/2011.13705 (2020)
2010 – 2019
- 2012
- [j1]Meng Wen, Changsong Hu, Zhiyu Wu:
Convergence of Implicit and Explicit Schemes for an Asymptotically Nonexpansive Mapping in q-Uniformly Smooth and Strictly Convex Banach Spaces. J. Appl. Math. 2012: 474031:1-474031:15 (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-03 21:21 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint