default search action
Luyi Li
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j34]Kai Li, Zidie Chen, Luyi Li, Kanglong Li:
The Impact of Title Features on the Communication Effect of County-Level Converged Media Centers' WeChat Official Accounts: Taking Guangxi as an Example. IEEE Access 12: 136837-136844 (2024) - [j33]Luyi Li, Xueliang Li, Yuan Si:
Gallai-Ramsey numbers for 3-uniform rainbow Berge triangles and monochromatic linear paths or cycles. Discret. Appl. Math. 344: 81-87 (2024) - [j32]Xiaozheng Chen, Luyi Li, Xueliang Li:
Edge-disjoint properly colored cycles in edge-colored complete graphs. Discret. Appl. Math. 350: 84-96 (2024) - [j31]Jie Hu, Luyi Li, Xueliang Li, Ningyan Xu:
Vertex-bipancyclicity in a bipartite graph collection. Discret. Math. 347(7): 113980 (2024) - [j30]Luyi Li, Jiayi Huang, Lang Feng, Zhongfeng Wang:
Prefender: A Prefetching Defender Against Cache Side Channel Attacks as a Pretender. IEEE Trans. Computers 73(6): 1457-1471 (2024) - [c19]Luyi Li, Hosein Yavarzadeh, Dean M. Tullsen:
Indirector: High-Precision Branch Target Injection Attacks Exploiting the Indirect Branch Predictor. USENIX Security Symposium 2024 - [i2]Shanshan Guo, Ethan Y. H. Li, Luyi Li, Ping Li:
Conflict-free chromatic index of trees. CoRR abs/2409.10899 (2024) - 2023
- [j29]Luyi Li, Ping Li, Xueliang Li:
Rainbow structures in a collection of graphs with degree conditions. J. Graph Theory 104(2): 341-359 (2023) - [j28]Yushan Liu, Luyi Li, Zeming Chang:
Efficient Bayesian model updating for dynamic systems. Reliab. Eng. Syst. Saf. 236: 109294 (2023) - [c18]Luyi Li, Yueyang Li, Ruxue Luo, Yuzhen Chen, Wenjun Fan:
Still Not Aware of the Loophole of Unintentional Access to Docker? A Proof of Concept. ISCC 2023: 1331-1334 - [c17]Yueyang Li, Luyi Li, Ruxue Luo, Yuzhen Chen, Arijet Sarker, Sang-Yoon Chang, Wenjun Fan:
Investigation and Countermeasure toward Unintentional Access to Docker Container. SVCC 2023: 1-6 - [i1]Luyi Li, Jiayi Huang, Lang Feng, Zhongfeng Wang:
PREFENDER: A Prefetching Defender against Cache Side Channel Attacks as A Pretender. CoRR abs/2307.06756 (2023) - 2022
- [j27]Luyi Li, Xueliang Li:
Edge-disjoint rainbow triangles in edge-colored graphs. Discret. Appl. Math. 318: 21-30 (2022) - [j26]Luyi Li, Fei Huang, Jinjiang Yuan:
Proper vertex-pancyclicity of edge-colored complete graphs without monochromatic paths of length three. Discret. Math. 345(6): 112838 (2022) - [j25]Luyi Li, Xueliang Li:
Vertex-disjoint rainbow cycles in edge-colored graphs. Discret. Math. 345(7): 112878 (2022) - [j24]Luyi Li, Zhenzhong Zeng, Guo Zhang, Kai Duan, Bingjun Liu, Xitian Cai:
Exploring the Individualized Effect of Climatic Drivers on MODIS Net Primary Productivity through an Explainable Machine Learning Framework. Remote. Sens. 14(17): 4401 (2022) - [j23]Yong Yang, Hangyuan Lu, Shuying Huang, Weiguo Wan, Luyi Li:
Pansharpening Based on Variational Fractional-Order Geometry Model and Optimized Injection Gains. IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. 15: 2128-2141 (2022) - [j22]Lang Feng, Jiayi Huang, Luyi Li, Haochen Zhang, Zhongfeng Wang:
RvDfi: A RISC-V Architecture With Security Enforcement by High Performance Complete Data-Flow Integrity. IEEE Trans. Computers 71(10): 2499-2512 (2022) - [j21]Luyi Li, Xueliang Li:
Rainbow edge-pancyclicity of strongly edge-colored graphs. Theor. Comput. Sci. 907: 26-33 (2022) - [c16]Luyi Li, Jiayi Huang, Lang Feng, Zhongfeng Wang:
PREFENDER: A Prefetching Defender against Cache Side Channel Attacks as A Pretender. DATE 2022: 1509-1514 - 2021
- [j20]Yushan Liu, Luyi Li, Sihan Zhao, Shufang Song:
A global surrogate model technique based on principal component analysis and Kriging for uncertainty propagation of dynamic systems. Reliab. Eng. Syst. Saf. 207: 107365 (2021) - [j19]Luyi Li, Xueliang Li:
Digraphs with proper connection number two. Theor. Comput. Sci. 873: 64-75 (2021) - [c15]Luyi Li, Jun Lin, Zhongfeng Wang:
PipeBSW: A Two-Stage Pipeline Structure for Banded Smith-Waterman Algorithm on FPGA. ISVLSI 2021: 182-187 - 2020
- [j18]Shiyi Kong, Minyan Lu, Luyi Li, Lihua Gao:
Runtime Monitoring of Software Execution Trace: Method and Tools. IEEE Access 8: 114020-114036 (2020) - [j17]Wanying Yun, Zhenzhou Lu, Kaixuan Feng, Xian Jiang, Pan Wang, Luyi Li:
Two Efficient AK-Based Global Reliability Sensitivity Methods by Elaborative Combination of Bayes' Theorem and the Law of Total Expectation in the Successive Intervals Without Overlapping. IEEE Trans. Reliab. 69(1): 260-276 (2020)
2010 – 2019
- 2019
- [j16]Yong Yang, Yingmei Zhang, Jiahua Wu, Luyi Li, Shuying Huang:
Multi-Focus Image Fusion Based on a Non-Fixed-Base Dictionary and Multi-Measure Optimization. IEEE Access 7: 46376-46388 (2019) - [j15]Wanying Yun, Zhenzhou Lu, Kaixuan Feng, Luyi Li:
An elaborate algorithm for analyzing the Borgonovo moment-independent sensitivity by replacing the probability density function estimation with the probability estimation. Reliab. Eng. Syst. Saf. 189: 99-108 (2019) - 2018
- [j14]Liyang Xu, Zhenzhou Lu, Luyi Li, Yan Shi, Gang Zhao:
Sensitivity analysis of correlated outputs and its application to a dynamic model. Environ. Model. Softw. 105: 39-53 (2018) - [j13]Luyi Li, Zhenzhou Lu:
A new method for model validation with multivariate output. Reliab. Eng. Syst. Saf. 169: 579-592 (2018) - [c14]Xingming Zhang, Mingzhu Li, Jun Yin, Xiangming Zhou, Hequn Zhang, Luyi Li, Junwei Li, Peng Zhang, Qing Chen, Zhiqiang Wang:
Improved CACF Algorithm Based on Channel Reliability. CISP-BMEI 2018: 1-6 - [c13]Luyi Li, Minyan Lu, Tingyang Gu:
Extracting Interaction-Related Failure Indicators for Online Detection and Prediction of Content Failures. ISSRE Workshops 2018: 278-285 - [c12]Shiyi Kong, Minyan Lu, Luyi Li:
Tracing Error Propagation in C/C++ Applications. QRS Companion 2018: 308-315 - 2017
- [j12]Luyi Li, Zhenzhou Lu:
Importance analysis for model with mixed uncertainties. Fuzzy Sets Syst. 310: 90-107 (2017) - 2016
- [j11]Luyi Li, Zhenzhou Lu:
A new algorithm for importance analysis of the inputs with distribution parameter uncertainty. Int. J. Syst. Sci. 47(13): 3065-3077 (2016) - [j10]Luyi Li, Zhenzhou Lu, Danqing Wu:
A new kind of sensitivity index for multivariate output. Reliab. Eng. Syst. Saf. 147: 123-131 (2016) - [j9]Hong Xiao, Luyi Li:
Discussion of paper by Matieyendou Lamboni, Hervé Monod, David Makowski "Multivariate sensitivity analysis to measure global contribution of input factors in dynamic models", Reliab. Eng. Syst. Saf. 99(2011) 450-459. Reliab. Eng. Syst. Saf. 147: 194-195 (2016) - [c11]Qian Ye, Minyan Lu, Luyi Li:
Empirical Analysis of Factors Affecting Time-Leverage Nodes of Complex Software. QRS Companion 2016: 15-22 - 2015
- [c10]Luyi Li, Minyan Lu:
Analyzing failure mechanism for complex software-intensive systems. ISSRE Workshops 2015: 57-58 - [c9]Qian Ye, Minyan Lu, Luyi Li:
Critical Nodes Evaluation in Large-Scale Software Based on Static Structure and Runtime Information. QRS Companion 2015: 186-187 - 2014
- [j8]Luyi Li, Zhenzhou Lu, Lei Cheng, Danqing Wu:
Importance analysis on the failure probability of the fuzzy and random system and its state dependent parameter solution. Fuzzy Sets Syst. 250: 69-89 (2014) - [j7]Lei Cheng, Zhenzhou Lu, Luyi Li:
Global Sensitivity Analysis of Fuzzy Distribution Parameter on Failure Probability and Its Single-Loop Estimation. J. Appl. Math. 2014: 490718:1-490718:11 (2014) - [j6]Luyi Li, Zhenzhou Lu, Jixiang Hu:
A new kind of regional importance measure of the input variable and its state dependent parameter solution. Reliab. Eng. Syst. Saf. 128: 1-16 (2014) - 2013
- [j5]Luyi Li, Zhenzhou Lu:
Regional importance effect analysis of the input variables on failure probability and its state dependent parameter estimation. Comput. Math. Appl. 66(10): 2075-2091 (2013) - [j4]Wenrui Hao, Zhenzhou Lu, Luyi Li:
A new interpretation and validation of variance based importance measures for models with correlated inputs. Comput. Phys. Commun. 184(5): 1401-1413 (2013) - [j3]Luyi Li, Zhenzhou Lu:
Importance analysis for models with correlated variables and its sparse grid solution. Reliab. Eng. Syst. Saf. 119: 207-217 (2013) - 2011
- [j2]Luyi Li, Zhenzhou Lu, Changcong Zhou:
Importance analysis for models with correlated input variables by the state dependent parameters method. Comput. Math. Appl. 62(12): 4547-4556 (2011) - [c8]Luyi Li, Yanlin Zheng, Fanglin Zheng:
Perception of Technology Introduction in Blended Learning. CSEE (3) 2011: 347-351 - 2010
- [c7]Yanlin Zheng, Luyi Li, Fanglin Zheng:
An Analysis Framework of Activity Context in e-Learning Environments. Edutainment 2010: 258-268 - [c6]Su Cai, Qiang Liu, Luyi Li:
A Case for Web-Based Interactive 3D Game Using Motion Capture Data. Edutainment 2010: 541-549
2000 – 2009
- 2008
- [c5]Yanlin Zheng, Luyi Li, Fanglin Zheng:
Research on Potential Peer Interaction in the E-learning Context. CSSE (5) 2008: 1192-1195 - [c4]Luyi Li, Yanlin Zheng:
Research on Ubiquitous Learning Environment Design. CSSE (5) 2008: 1196-1199 - 2005
- [j1]Luyi Li, Yanlin Zheng, Hiroaki Ogata, Yoneo Yano:
Ubiquitous Computing in Learning: Toward a Conceptual Framework of Ubiquitous Learning Environment. Int. J. Pervasive Comput. Commun. 1(3): 207-216 (2005) - [c3]Yanlin Zheng, Luyi Li, Hiroaki Ogata, Yoneo Yano:
A Three-dimensional Context-awareness Model: Support Learning Services Providing in e-Learning Environments. ICCE 2005: 579-586 - 2004
- [c2]Luyi Li, Yanlin Zheng, Hiroaki Ogata, Yoneo Yano:
A Framework of Ubiquitous Learning Environment. CIT 2004: 345-350 - [c1]Yanlin Zheng, Hiroaki Ogata, Luyi Li, Yoneo Yano:
Using Knowledge Awareness Support Learning Services Providing in e-Learning Environment. Web Intelligence 2004: 694-697
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:35 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint