default search action
Yihai Zhu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j17]Hong Zhang, Fangming Liu, Bo Li, Ling Zhang, Yihai Zhu, Ziwei Wang:
Deep discriminative image feature learning for cross-modal semantics understanding. Knowl. Based Syst. 216: 106812 (2021) - 2020
- [j16]Qingzhu Wang, Dan Yu, Yihai Zhu:
Angle-Range-Polarization Estimation for Polarization Sensitive Bistatic FDA-MIMO Radar via PARAFAC Algorithm. KSII Trans. Internet Inf. Syst. 14(7): 2879-2890 (2020)
2010 – 2019
- 2019
- [j15]Qingzhu Wang, Yonghao Yu, Bin Li, Yihai Zhu:
Tensor-Based Optimal Temperature Control of CRACs in Multi-Datacenters. IEEE Access 7: 41445-41453 (2019) - 2018
- [j14]Qingzhu Wang, Mengying Wei, Yihai Zhu:
Compressive Sensing of Noisy 3-D Images Based on Threshold Selection. J. Adv. Comput. Intell. Intell. Informatics 22(1): 70-75 (2018) - [j13]Qingzhu Wang, Mengying Wei, Yihai Zhu:
Channel Estimation for Multi-user Massive MIMO Systems based on Compressive Sensing with Truncated-HOSVD. J. Inf. Hiding Multim. Signal Process. 9(2): 423-431 (2018) - 2017
- [j12]Shanwen Zhang, Yihai Zhu, Zhuhong You, Xiaowei Wu:
Fusion of superpixel, expectation maximization and PHOG for recognizing cucumber diseases. Comput. Electron. Agric. 140: 338-347 (2017) - [j11]Shanwen Zhang, Chuanlei Zhang, Yihai Zhu, Zhuhong You:
Discriminant WSRC for Large-Scale Plant Species Recognition. Comput. Intell. Neurosci. 2017: 9581292:1-9581292:10 (2017) - [j10]Qingzhu Wang, Xiaoming Chen, Yihai Zhu:
Higher-order singular value decomposition-based discrete fractional random transform for simultaneous compression and encryption of video images. J. Electronic Imaging 26(5): 53014 (2017) - [j9]Qingzhu Wang, Xiao-Ming Chen, Yi-Hai Zhu:
Simultaneous Compression and Encryption of Video Sequences Based on 3D Compressive Sensing and 3D Discrete Fractional Random Transform. J. Inf. Hiding Multim. Signal Process. 8(2): 468-477 (2017) - [j8]Yue-Tong Luo, Lan-Ying Zhao, Bob Zhang, Wei Jia, Feng Xue, Jing-Ting Lu, Yi-Hai Zhu, Bing-Qing Xu:
Erratum to "Local line directional pattern for palmprint recognition" [Pattern Recognit. 50(2016) 26-44]. Pattern Recognit. 61: 221 (2017) - [j7]Wei Jia, Bob Zhang, Jing-Ting Lu, Yihai Zhu, Yang Zhao, Wangmeng Zuo, Haibin Ling:
Palmprint Recognition Based on Complete Direction Representation. IEEE Trans. Image Process. 26(9): 4483-4498 (2017) - 2016
- [j6]Yue-Tong Luo, Lan-Ying Zhao, Bob Zhang, Wei Jia, Feng Xue, Jing-Ting Lu, Yi-Hai Zhu, Bing-Qing Xu:
Local line directional pattern for palmprint recognition. Pattern Recognit. 50: 26-44 (2016) - 2015
- [j5]Yihai Zhu, Jun Yan, Yufei Tang, Yan Lindsay Sun, Haibo He:
Joint Substation-Transmission Line Vulnerability Assessment Against the Smart Grid. IEEE Trans. Inf. Forensics Secur. 10(5): 1010-1024 (2015) - [c13]Yongbo Zeng, Yihai Zhu, Yan Lindsay Sun:
Equal rating opportunity analysis for detecting review manipulation. ChinaSIP 2015: 846-850 - [c12]Jun Yan, Yufei Tang, Yihai Zhu, Haibo He, Yan Sun:
Smart Grid Vulnerability under Cascade-Based Sequential Line-Switching Attacks. GLOBECOM 2015: 1-7 - [c11]Yihai Zhu, Jun Yan, Yufei Tang, Yan Lindsay Sun, Haibo He:
Diversity of cascading failure processes in electrical grids. ISGT 2015: 1-5 - 2014
- [j4]Yihai Zhu, Jun Yan, Yufei Tang, Yan Lindsay Sun, Haibo He:
Resilience Analysis of Power Grids Under the Sequential Attack. IEEE Trans. Inf. Forensics Secur. 9(12): 2340-2354 (2014) - [j3]Yihai Zhu, Jun Yan, Yan Sun, Haibo He:
Revealing Cascading Failure Vulnerability in Power Grids Using Risk-Graph. IEEE Trans. Parallel Distributed Syst. 25(12): 3274-3284 (2014) - [c10]Yihai Zhu, Jun Yan, Yufei Tang, Yan Lindsay Sun, Haibo He:
Coordinated attacks against substations and transmission lines in power grids. GLOBECOM 2014: 655-661 - [c9]Yihai Zhu, Jun Yan, Yufei Tang, Yan Sun, Haibo He:
The sequential attack against power grid networks. ICC 2014: 616-621 - 2013
- [j2]Jun Yan, Yihai Zhu, Haibo He, Yan Sun:
Multi-Contingency Cascading Analysis of Smart Grid Based on Self-Organizing Map. IEEE Trans. Inf. Forensics Secur. 8(4): 646-656 (2013) - [c8]Jun Yan, Yihai Zhu, Haibo He, Yan Sun:
Revealing temporal features of attacks against smart grid. ISGT 2013: 1-6 - 2012
- [j1]Shu-Ling Wang, Yi-Hai Zhu, Wei Jia, De-Shuang Huang:
Robust Classification Method of Tumor Subtype by Using Correlation Filters. IEEE ACM Trans. Comput. Biol. Bioinform. 9(2): 580-591 (2012) - [c7]Yihai Zhu, Yan Sun, Haibo He:
Load distribution vector based attack strategies against power grid systems. GLOBECOM 2012: 935-941
2000 – 2009
- 2009
- [c6]Yi-Hai Zhu, Wei Jia, Ling-Feng Liu:
Palmprint Recognition Using Band-Limited Phase-Only Correlation and Different Representations. ICIC (1) 2009: 270-277 - [c5]Ling-Feng Liu, Wei Jia, Yi-Hai Zhu:
Gait Recognition Using Hough Transform and Principal Component Analysis. ICIC (1) 2009: 363-370 - [c4]Dan-Feng Zhu, Hong Wang, Yi-Hai Zhu, Jing Wei:
Palmprint Recognition Combining LDA and the Center Band of Fourier Magnitude. ICIC (1) 2009: 378-385 - [c3]Ling-Feng Liu, Wei Jia, Yi-Hai Zhu:
Survey of Gait Recognition. ICIC (2) 2009: 652-659 - [c2]Shulin Wang, Yihai Zhu:
A Novel Method to Robust Tumor Classification Based on MACE Filter. ICIC (2) 2009: 945-954 - [c1]Wei Jia, Yi-Hai Zhu, Ling-Feng Liu, De-Shuang Huang:
Fast Palmprint Retrieval Using Principal Lines. SMC 2009: 4118-4123
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:48 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint