Seguir
Yihai Zhu
Yihai Zhu
Dremio
Dirección de correo verificada de tableau.com
Título
Citado por
Citado por
Año
Local line directional pattern for palmprint recognition
YT Luo, LY Zhao, B Zhang, W Jia, F Xue, JT Lu, YH Zhu, BQ Xu
Pattern Recognition 50, 26-44, 2016
2552016
Revealing Cascading Failure Vulnerability in Power Grids using Risk-Graph
Y Zhu, J Yan, Y Sun, H He
Parallel and Distributed Systems, IEEE Transactions on, 3274 - 3284, 2014
1872014
Palmprint recognition based on complete direction representation
W Jia, B Zhang, J Lu, Y Zhu, Y Zhao, W Zuo, H Ling
IEEE Transactions on Image Processing 26 (9), 4483-4498, 2017
1502017
Resilience Analysis of Power Grids under the Sequential Attack
Y Zhu, J Yan, Y Tang, Y Sun, H He
Information Forensics and Security, IEEE Transactions on, 2014
1342014
Multi-contingency cascading analysis of smart grid based on self-organizing map
J Yan, Y Zhu, H He, Y Sun
IEEE Transactions on Information Forensics and Security 8 (4), 646-656, 2013
862013
Joint Substation-Transmission line Vulnerability Assessment against the Smart Grid
Y Zhu, J Yan, Y Tang, Y Sun, H He
Information Forensics and Security, IEEE Transactions on, 1010 - 1024, 2015
762015
Survey of gait recognition
LF Liu, W Jia, YH Zhu
Emerging Intelligent Computing Technology and Applications. With Aspects of …, 2009
662009
Robust classification method of tumor subtype by using correlation filters
SL Wang, YH Zhu, W Jia, DS Huang
IEEE/ACM Transactions on Computational Biology and Bioinformatics 9 (2), 580-591, 2011
642011
Fusion of superpixel, expectation maximization and PHOG for recognizing cucumber diseases
S Zhang, Y Zhu, Z You, X Wu
Computers and Electronics in Agriculture 140, 338-347, 2017
612017
Smart Grid Vulnerability under Cascade-based Sequential Line-Switching Attacks
J Yan, Y Tang, Y Zhu, H He, Y Sun
IEEE GLOBECOM 2015, 2015
332015
The sequential attack against power grid networks
Y Zhu, J Yan, Y Tang, Y Sun, H He
2014 IEEE International Conference on Communications (ICC), 2014
332014
Load distribution vector based attack strategies against power grid systems
Y Zhu, Y Sun, H He
2012 IEEE Global Communications Conference (GLOBECOM), 935-941, 2012
292012
Risk-aware vulnerability analysis of electric grids from attacker's perspective
Y Zhu, J Yan, Y Sun, H He
2013 IEEE PES Innovative Smart Grid Technologies Conference (ISGT), 1-6, 2013
272013
Gait recognition using hough transform and principal component analysis
LF Liu, W Jia, YH Zhu
Emerging Intelligent Computing Technology and Applications: 5th …, 2009
212009
Palmprint recognition using band-limited phase-only correlation and different representations
YH Zhu, W Jia, LF Liu
Emerging Intelligent Computing Technology and Applications: 5th …, 2009
192009
Revealing temporal features of attacks against smart grid
J Yan, Y Zhu, H He, Y Sun
2013 IEEE PES Innovative Smart Grid Technologies Conference (ISGT), 1-6, 2013
182013
Coordinated Attacks against Substations and Transmission Lines in Power Grids
Y Zhu, J Yan, Y Tang, YL Sun, H He
Global Communications Conference (GLOBECOM), 2014 IEEE, 655 - 661, 2014
142014
Deep discriminative image feature learning for cross-modal semantics understanding
H Zhang, F Liu, B Li, L Zhang, Y Zhu, Z Wang
Knowledge-Based Systems 216, 2021
102021
Fast palmprint retrieval using principal lines
W Jia, YH Zhu, LF Liu, DS Huang
2009 IEEE International Conference on Systems, Man and Cybernetics, 4118-4123, 2009
102009
Discriminant WSRC for Large‐Scale Plant Species Recognition
S Zhang, C Zhang, Y Zhu, Z You
Computational intelligence and neuroscience 2017 (1), 9581292, 2017
92017
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20