default search action
Zheng Yu
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Zheng Yu 0001 — Fudan University, State Key Lab of ASIC and System, Shanghai, China
- Zheng Yu 0002 — Auckland University, New Zealand
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j22]Zheng Yu, Shengyan Zhang, Linshuai Zhang, Chuanbiao Wen, Shuguang Yu, Jiaqi Sun, Suheng Deng, Hongfu Ci, Yanxiong Gan:
Design and Performance Evaluation of a Home-Based Automatic Acupoint Identification and Treatment System. IEEE Access 12: 25491-25500 (2024) - [j21]Xuhua Dong, Woo-Young Kim, Zheng Yu, Ju-Youl Oh, Reza Ehsani, Kyeong-Hwan Lee:
Improved voxel-based volume estimation and pruning severity mapping of apple trees during the pruning period. Comput. Electron. Agric. 219: 108834 (2024) - [j20]Pengfei Zhang, Dexian Wang, Zheng Yu, Yujie Zhang, Tao Jiang, Tianrui Li:
A multi-scale information fusion-based multiple correlations for unsupervised attribute selection. Inf. Fusion 106: 102276 (2024) - [j19]Zheng Yu, Songyu Wu, Jielin Jiang, Dongqing Liu:
A knowledge-graph based text summarization scheme for mobile edge computing. J. Cloud Comput. 13(1): 9 (2024) - [j18]Zheng Yu, Junyu Zhang, Zheng Wen, Andrea Tacchetti, Mengdi Wang, Ian Gemp:
Teamwork Reinforcement Learning With Concave Utilities. IEEE Trans. Mob. Comput. 23(5): 5709-5721 (2024) - [c35]Jiahao Yu, Xingwei Lin, Zheng Yu, Xinyu Xing:
LLM-Fuzzer: Scaling Assessment of Large Language Model Jailbreaks. USENIX Security Symposium 2024 - [c34]Zhenpeng Lin, Zheng Yu, Ziyi Guo, Simone Campanoni, Peter A. Dinda, Xinyu Xing:
CAMP: Compiler and Allocator-based Heap Memory Protection. USENIX Security Symposium 2024 - [c33]Zheng Yu, Ganxiang Yang, Xinyu Xing:
ShadowBound: Efficient Heap Memory Protection Through Advanced Metadata Management and Customized Compiler Optimization. USENIX Security Symposium 2024 - [i19]Yanyuan Qiao, Zheng Yu, Longteng Guo, Sihan Chen, Zijia Zhao, Mingzhen Sun, Qi Wu, Jing Liu:
VL-Mamba: Exploring State Space Models for Multimodal Learning. CoRR abs/2403.13600 (2024) - [i18]Zhihang Li, Zhao Song, Weixin Wang, Junze Yin, Zheng Yu:
How to Inverting the Leverage Score Distribution? CoRR abs/2404.13785 (2024) - [i17]Zheng Yu, Ganxiang Yang, Xinyu Xing:
ShadowBound: Efficient Heap Memory Protection Through Advanced Metadata Management and Customized Compiler Optimization. CoRR abs/2406.02023 (2024) - [i16]Zhenpeng Lin, Zheng Yu, Ziyi Guo, Simone Campanoni, Peter A. Dinda, Xinyu Xing:
CAMP: Compiler and Allocator-based Heap Memory Protection. CoRR abs/2406.02737 (2024) - 2023
- [j17]Yanyuan Qiao, Yuankai Qi, Yicong Hong, Zheng Yu, Peng Wang, Qi Wu:
HOP+: History-Enhanced and Order-Aware Pre-Training for Vision-and-Language Navigation. IEEE Trans. Pattern Anal. Mach. Intell. 45(7): 8524-8537 (2023) - [c32]Yanyuan Qiao, Zheng Yu, Qi Wu:
VLN-PETL: Parameter-Efficient Transfer Learning for Vision-and-Language Navigation. ICCV 2023: 15397-15406 - [c31]Yanyuan Qiao, Yuankai Qi, Zheng Yu, Jing Liu, Qi Wu:
March in Chat: Interactive Prompting for Remote Embodied Referring Expression. ICCV 2023: 15712-15721 - [c30]Zheng Yu, Yikuan Li, Joseph C. Kim, Kaixuan Huang, Yuan Luo, Mengdi Wang:
Deep Reinforcement Learning for Cost-Effective Medical Diagnosis. ICLR 2023 - [c29]Zhao Song, Yitan Wang, Zheng Yu, Lichen Zhang:
Sketching for First Order Method: Efficient Algorithm for Low-Bandwidth Channel and Vulnerability. ICML 2023: 32365-32417 - [c28]Zheng Yu, Jielin Jiang, Bingkun He, Muhammad Bilal, Dongqing Liu:
Edge Intelligence-Driven Meteorological Knowledge Graph for Real-Time Decision-Making. ICPADS 2023: 2663-2672 - [c27]Lu Zhang, Chao Li, Xinkai Wang, Weiqi Feng, Zheng Yu, Quan Chen, Jingwen Leng, Minyi Guo, Pu Yang, Shang Yue:
FIRST: Exploiting the Multi-Dimensional Attributes of Functions for Power-Aware Serverless Computing. IPDPS 2023: 864-874 - [c26]Zheng Yu, Yutong Xie, Yong Xia, Qi Wu:
PLMVQA: Applying Pseudo Labels for Medical Visual Question Answering with Limited Data. MTSAIL/LEAF/AI4Treat/MMMI/REMIA@MICCAI 2023: 357-367 - [c25]Zheng Yu, Yanyuan Qiao, Yutong Xie, Qi Wu:
Multi-modal Adapter for Medical Vision-and-Language Learning. MLMI@MICCAI (1) 2023: 393-402 - [c24]Jingjing Wang, Hao Feng, Zheng Yu, Rongtao Liao, Shi Chen, Ting Liang:
Secure and Efficient Data Processing for Cloud Computing with Fine-Grained Access Control. SocialSec 2023: 187-202 - [i15]Zheng Yu, Yikuan Li, Joseph C. Kim, Kaixuan Huang, Yuan Luo, Mengdi Wang:
Deep Reinforcement Learning for Cost-Effective Medical Diagnosis. CoRR abs/2302.10261 (2023) - [i14]Yanyuan Qiao, Yuankai Qi, Zheng Yu, Jing Liu, Qi Wu:
March in Chat: Interactive Prompting for Remote Embodied Referring Expression. CoRR abs/2308.10141 (2023) - [i13]Yanyuan Qiao, Zheng Yu, Qi Wu:
VLN-PETL: Parameter-Efficient Transfer Learning for Vision-and-Language Navigation. CoRR abs/2308.10172 (2023) - [i12]Yikuan Li, Chengsheng Mao, Kaixuan Huang, Hanyin Wang, Zheng Yu, Mengdi Wang, Yuan Luo:
Deep Reinforcement Learning for Efficient and Fair Allocation of Health Care Resources. CoRR abs/2309.08560 (2023) - [i11]Jiahao Yu, Xingwei Lin, Zheng Yu, Xinyu Xing:
GPTFUZZER: Red Teaming Large Language Models with Auto-Generated Jailbreak Prompts. CoRR abs/2309.10253 (2023) - 2022
- [j16]Zhifang Wang, Jianguo Yu, Kun Bi, Shangjing Lin, Zheng Yu:
Research on Long-distance Transmission of Nodes in Amorphous Flat Air-to-ground Wireless Ad-Hoc Network Based on Bidirectional Relay Beamforming. Ad Hoc Sens. Wirel. Networks 51(1-3): 41-59 (2022) - [c23]Shunhua Jiang, Yunze Man, Zhao Song, Zheng Yu, Danyang Zhuo:
Fast Graph Neural Tangent Kernel via Kronecker Sketching. AAAI 2022: 7033-7041 - [c22]Shi Chen, Jingjing Wang, Zheng Yu, Huan Xu, Chenxi Dong:
A Cloud-Assisted Data Processing Scheme for Smart Grid with Flexible Access Control. ACAI 2022: 36:1-36:6 - [c21]Yanyuan Qiao, Yuankai Qi, Yicong Hong, Zheng Yu, Peng Wang, Qi Wu:
HOP: History-and-Order Aware Pretraining for Vision-and-Language Navigation. CVPR 2022: 15397-15406 - [i10]Yanyuan Qiao, Yuankai Qi, Yicong Hong, Zheng Yu, Peng Wang, Qi Wu:
HOP: History-and-Order Aware Pre-training for Vision-and-Language Navigation. CoRR abs/2203.11591 (2022) - [i9]Zhao Song, Yitan Wang, Zheng Yu, Lichen Zhang:
Sketching for First Order Method: Efficient Algorithm for Low-Bandwidth Channel and Vulnerability. CoRR abs/2210.08371 (2022) - 2021
- [j15]Jili Tao, Zheng Yu, Ridong Zhang, Furong Gao:
RBF neural network modeling approach using PCA based LM-GA optimization for coke furnace system. Appl. Soft Comput. 111: 107691 (2021) - [c20]Zhao Song, David P. Woodruff, Zheng Yu, Lichen Zhang:
Fast Sketching of Polynomial Kernels of Polynomial Degree. ICML 2021: 9812-9823 - [c19]Zhao Song, Zheng Yu:
Oblivious Sketching-based Central Path Method for Linear Programming. ICML 2021: 9835-9847 - [c18]Junyu Zhang, Chengzhuo Ni, Zheng Yu, Csaba Szepesvári, Mengdi Wang:
On the Convergence and Sample Efficiency of Variance-Reduced Policy Gradient Method. NeurIPS 2021: 2228-2240 - [i8]Junyu Zhang, Chengzhuo Ni, Zheng Yu, Csaba Szepesvári, Mengdi Wang:
On the Convergence and Sample Efficiency of Variance-Reduced Policy Gradient Method. CoRR abs/2102.08607 (2021) - [i7]Zhao Song, David P. Woodruff, Zheng Yu, Lichen Zhang:
Fast Sketching of Polynomial Kernels of Polynomial Degree. CoRR abs/2108.09420 (2021) - [i6]Shunhua Jiang, Yunze Man, Zhao Song, Zheng Yu, Danyang Zhuo:
Fast Graph Neural Tangent Kernel via Kronecker Sketching. CoRR abs/2112.02446 (2021) - 2020
- [j14]Fen Liu, Zheng Yu, Yixi Wang, Hao Feng, Zhiyong Zha, Rongtao Liao, Ying Zhang:
Falsified data filtering method for smart grid wireless communication based on SVM. Int. J. Internet Protoc. Technol. 13(4): 177-183 (2020) - [j13]Yaodeng Chen, Zheng Yu, Wei Han, Jing He, Min Chen:
Case Study of a Retrieval Method of 3D Proxy Reflectivity from FY-4A Lightning Data and Its Impact on the Assimilation and Forecasting for Severe Rainfall Storms. Remote. Sens. 12(7): 1165 (2020) - [j12]Wei Chen, Ruihan Wu, Zheng Yu:
Scalable Lattice Influence Maximization. IEEE Trans. Comput. Soc. Syst. 7(4): 956-970 (2020) - [c17]Zheng Yu, Xuhui Fan, Marcin Pietrasik, Marek Z. Reformat:
Fragmentation Coagulation Based Mixed Membership Stochastic Blockmodel. AAAI 2020: 6704-6711 - [c16]Xin He, Jiuyang Tang, Zhen Tan, Zheng Yu, Xiang Zhao:
Paperant: Key Elements Generation with New Ideas. APWeb/WAIM (2) 2020: 294-308 - [c15]Yanyuan Qiao, Zheng Yu, Jing Liu:
VC-VQA: Visual Calibration Mechanism For Visual Question Answering. ICIP 2020: 1481-1485 - [c14]Yanyuan Qiao, Zheng Yu, Jing Liu:
Rankvqa: Answer Re-Ranking For Visual Question Answering. ICME 2020: 1-6 - [c13]Yaqiong Li, Xuhui Fan, Ling Chen, Bin Li, Zheng Yu, Scott A. Sisson:
Recurrent Dirichlet Belief Networks for interpretable Dynamic Relational Data Modelling. IJCAI 2020: 2470-2476 - [c12]Jason D. Lee, Ruoqi Shen, Zhao Song, Mengdi Wang, Zheng Yu:
Generalized Leverage Score Sampling for Neural Networks. NeurIPS 2020 - [i5]Zheng Yu, Xuhui Fan, Marcin Pietrasik, Marek Z. Reformat:
Fragmentation Coagulation Based Mixed Membership Stochastic Blockmodel. CoRR abs/2002.00901 (2020) - [i4]Jason D. Lee, Ruoqi Shen, Zhao Song, Mengdi Wang, Zheng Yu:
Generalized Leverage Score Sampling for Neural Networks. CoRR abs/2009.09829 (2020)
2010 – 2019
- 2019
- [j11]Le Zhang, Jin Li, Kaikai Yin, Zhouyang Jiang, Tingting Li, Rong Hu, Zheng Yu, Hua Feng, Yujie Chen:
Computed tomography angiography-based analysis of high-risk intracerebral haemorrhage patients by employing a mathematical model. BMC Bioinform. 20-S(7): 109-116 (2019) - [j10]Zheng Yu, Wenmin Wang:
Learning DALTS for cross-modal retrieval. CAAI Trans. Intell. Technol. 4(1): 9-16 (2019) - [j9]Zheng Yu, Dangdang Dai, Zhiyong Zha, Yixi Wang, Hao Feng:
Research on equalisation scheduling algorithm for network channel under the impact of big data. Int. J. Inf. Commun. Technol. 14(4): 485-498 (2019) - [j8]Zhou Cheng, Zheng Yu, Yi Guo, Zhihong Wang:
基于外汇舆情的人民币汇率波动预测研究 (Research on Volatility Forecasting of RMB Exchange Rate Based on Public Opinion). 计算机科学 46(11A): 143-148 (2019) - [c11]Guoru Deng, Hui Yuan, Liang Dong, Shan Yang, Zheng Yu, Yan Zhuang, Haohua Meng, Xuan Luo:
Application Research of Intrusion Prevention System in Emergency Platform Network. CSIA 2019: 1158-1166 - [c10]Zheng Yu, Wenmin Wang, Ge Li:
Multi-step Self-attention Network for Cross-modal Retrieval Based on a Limited Text Space. ICASSP 2019: 2082-2086 - [c9]Lin F. Yang, Zheng Yu, Vladimir Braverman, Tuo Zhao, Mengdi Wang:
Online Factorization and Partition of Complex Networks by Random Walk. UAI 2019: 820-830 - [c8]Zheng Yu, Marcin Pietrasik, Marek Z. Reformat:
Deep Dynamic Mixed Membership Stochastic Blockmodel. WI 2019: 141-148 - [i3]Xinxin Zhu, Longteng Guo, Peng Yao, Jing Liu, Shichen Lu, Zheng Yu, Wei Liu, Hanqing Lu:
Multi-View Features and Hybrid Reward Strategies for Vatex Video Captioning Challenge 2019. CoRR abs/1910.11102 (2019) - 2018
- [j7]Zifeng Wang, Zheng Yu, Qing Ling, Dimitris Berberidis, Georgios B. Giannakis:
Decentralized RLS With Data-Adaptive Censoring for Regressions Over Large-Scale Networks. IEEE Trans. Signal Process. 66(6): 1634-1648 (2018) - [c7]Zheng Yu, Shujing Lyu, Yue Lu, Patrick S. P. Wang:
A Fusion Strategy for the Single Shot Text Detector. ICPR 2018: 3687-3691 - [i2]Ruihan Wu, Zheng Yu, Wei Chen:
Scalable Influence Maximization with General Marketing Strategies. CoRR abs/1802.04555 (2018) - 2017
- [c6]Zheng Yu, Wenmin Wang, Mengdi Fan:
Learning a Limited Text Space for Cross-Media Retrieval. CAIP (1) 2017: 292-303 - [c5]Zifeng Wang, Zheng Yu, Qing Ling, Dimitris Berberidis, Georgios B. Giannakis:
Distributed recursive least-squares with data-adaptive censoring. ICASSP 2017: 5860-5864 - 2016
- [j6]Zheng Yu, Haixun Wang, Xuemin Lin, Min Wang:
Understanding Short Texts through Semantic Enrichment and Hashing. IEEE Trans. Knowl. Data Eng. 28(2): 566-579 (2016) - [c4]Zheng Yu, Haixun Wang, Xuemin Lin, Min Wang:
Understanding short texts through semantic enrichment and hashing. ICDE 2016: 1552-1553 - [i1]Zifeng Wang, Zheng Yu, Qing Ling, Dimitris Berberidis, Georgios B. Giannakis:
Decentralized RLS with Data-Adaptive Censoring for Regressions over Large-Scale Networks. CoRR abs/1612.08263 (2016) - 2015
- [j5]Xiaokang Ding, Jianlei Kong, Lei Yan, Jinhao Liu, Zheng Yu:
A novel stumpage detection method for forest harvesting based on multi-sensor fusion. Signal Image Video Process. 9(8): 1843-1850 (2015) - [c3]Zheng Yu, Haixun Wang, Xuemin Lin, Min Wang:
Learning Term Embeddings for Hypernymy Identification. IJCAI 2015: 1390-1397 - 2014
- [c2]Zheng Yu, Xiang Zhao, Liping Wang:
Encoding Document Semantic into Binary Codes Space. WAIM 2014: 535-539 - 2013
- [j4]Lei Yan, Zheng Yu, Ning Han, Jinhao Liu:
Improved Image Fusion Algorithm for Detecting Obstacles in Forests. J. Digit. Inf. Manag. 11(5): 378-384 (2013) - [j3]Xiaokang Ding, Lei Yan, Jinhao Liu, Jianlei Kong, Zheng Yu:
Obstacles Detection Algorithm in Forest based on Multi-sensor Data Fusion. J. Multim. 8(6): 790-795 (2013)
2000 – 2009
- 2007
- [j2]Enwen Zhu, Haomin Zhang, Yong Wang, Jiezhong Zou, Zheng Yu, Zhenting Hou:
p th Moment Exponential Stability of Stochastic Cohen-Grossberg Neural Networks With Time-varying Delays. Neural Process. Lett. 26(3): 191-200 (2007) - 2005
- [j1]Zhenting Hou, Zheng Yu, Peng Shi:
Study on a class of nonlinear time series models and ergodicity in random environment domain. Math. Methods Oper. Res. 61(2): 299-310 (2005) - 2002
- [c1]Damian M. Tan, Hong Ren Wu, Zheng Yu:
Perceptual coding of digital images. ICASSP 2002: 4189
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-06 20:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint