default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Exact matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 25 matches
- 2024
- Rongfang Wang, Haojiang Wei, Yuhui Kong, Peng Zhang, Xiaokai Wang, Weibin Li:
A Potential Landslide Hazard Benchmark Dataset for Geological Disaster Detection of Remote Sensing. IGARSS 2024: 7410-7414 - Yuhui Liu, Taosong Zhao, Hiroki Nishikawa, Xiangbo Kong, Hiroyuki Tomiyama:
FPGA Design of a Masked AES Circuit with PPRM-based S-Box. ISOCC 2024: 328-329 - 2023
- Xin Xiong, Minrui Li, Yuyan Ren, Xusheng Yao, Yuhui Du, Qingsong Huang, Xiangyang Kong, Jianfeng He:
A new method for mining information of gut microbiome with probabilistic topic models. Multim. Tools Appl. 82(11): 16081-16104 (2023) - Yuhui Du, Yanshu Kong, Xingyu He:
IABC: A Toolbox for Intelligent Analysis of Brain Connectivity. Neuroinformatics 21(2): 303-321 (2023) - Linghao Kong, Wenjian Luo, Hongwei Zhang, Yang Liu, Yuhui Shi:
Evolutionary Multilabel Adversarial Examples: An Effective Black-Box Attack. IEEE Trans. Artif. Intell. 4(3): 562-572 (2023) - Jieqi Ru, Linyu Liang, Lingya Kong, Yuhui Liu:
Application of BP neural network model based on genetic algorithm to population data analysis and prediction in a province of China. BDSIC 2023: 50-55 - Weibin Li, Yuhui Kong, Rongfang Wang, Chunlei Huo, Jiawei Chen, Yi Niu:
Lightweight Landslide Detection Method Based On Depth Separable Convolution And Double Self-Attention Mechanism *. IGARSS 2023: 6198-6201 - 2022
- Weibin Li, Bingzhen An, Yuhui Kong:
Data Augmentation Method on Pine Wilt Disease Recognition. IFIP TC12 ICIS 2022: 458-465 - 2020
- Kun Gao, Wenwen Kong, Sijie Niu, Dengwang Li, Yuehui Chen:
Automatic retinal layer segmentation in SD-OCT images with CSC guided by spatial characteristics. Multim. Tools Appl. 79(7-8): 4417-4428 (2020) - 2017
- Lingcheng Kong, Hui Zhang, Yuhui Zheng, Yunjie Chen, Jiezhong Zhu, Qingming Jonathan Wu:
Image segmentation using a hierarchical student's-t mixture model. IET Image Process. 11(11): 1094-1102 (2017) - 2015
- Zhihua Yuan, Jipeng Wang, Xiaolong Kong, Yuhui Hu:
Research on five axis NC Machining Simulation Based on VERICUT. Int. J. Online Eng. 11(7): 51-53 (2015) - Wenzheng Bao, Dong Wang, Fanliang Kong, Ruizhi Han, Yuehui Chen:
Prediction of Protein Structure Classes. ICIC (1) 2015: 737-743 - Fanliang Kong, Dong Wang, Wenzheng Bao, Yuehui Chen:
Prediction of Protein Structural Classes Based on Predicted Secondary Structure. ICIC (2) 2015: 408-416 - 2014
- Wenzheng Bao, Yuehui Chen, Dong Wang, Fanliang Kong, Gaoqiang Yu:
Prediction of Protein Structure Classes with Ensemble Classifiers. ICIC (3) 2014: 330-338 - 2009
- Yuehui Huang, Chi K. Tse:
Circuit theory of paralleling switching converters. Int. J. Circuit Theory Appl. 37(1): 109-135 (2009) - Yuehui Huang, Chi Kong Tse, Xinbo Ruan:
General Control Considerations for Input-Series Connected DC/DC Converters. IEEE Trans. Circuits Syst. I Regul. Pap. 56-I(6): 1286-1296 (2009) - Yuehui Huang, Chi K. Tse:
Complex Behavior of Parallel-Connected DC/DC Converters from Nonlinear Viewpoint. Intelligent Computing Based on Chaos 2009: 269-290 - 2008
- Yuehui Huang, Herbert H. C. Iu, Chi K. Tse:
Boundaries between fast- and slow-scale bifurcations in parallel-connected buck converters. Int. J. Circuit Theory Appl. 36(5-6): 681-695 (2008) - 2007
- Yuehui Huang, Chi Kong Tse:
Circuit Theoretic Classification of Parallel Connected DC-DC Converters. IEEE Trans. Circuits Syst. I Regul. Pap. 54-I(5): 1099-1108 (2007) - Yuehui Huang, Chi K. Tse:
Classification of parallel DC/DC converters part I: circuit theory. ECCTD 2007: 1010-1013 - Yuehui Huang, Chi K. Tse:
Classification of parallel DC/DC converters part II: Comparisons and experimental verifications. ECCTD 2007: 1014-1017 - Yuehui Huang, Herbert H. C. Iu, C. K. Michael Tse:
Boundaries Between Fast-and Slow-Scale Bifurcations in Parallel-Connected Buck Converters. ISCAS 2007: 2419-2422 - 2006
- Yuehui Huang, C. K. Tse:
On the basins of attraction of parallel connected buck switching converters. ISCAS 2006 - 2005
- Yuhui Luo:
Quantum cryptography and applications in the optical fiber network. Chinese University of Hong Kong, Hong Kong, 2005 - 2003
- Jiuchao Feng, C. K. Tse, Yuhui Qiu:
Wavelet-transform-based strategy for generating new Chinese fonts. ISCAS (4) 2003: 337-340
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-01-15 22:03 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint