default search action
Yuntao Zhao
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j25]Lu Xie, Weigang Li, Yongqiang Wang, Yuntao Zhao:
Prototype Consistency Learning for Medical Image Segmentation by Cross Pseudo Supervision. Cogn. Comput. 16(1): 215-228 (2024) - [j24]Lu Xie, Weigang Li, Yuntao Zhao:
Pairwise-Pixel Self-Supervised and Superpixel-Guided Prototype Contrastive Loss for Weakly Supervised Semantic Segmentation. Cogn. Comput. 16(3): 936-948 (2024) - [j23]Yang Li, Weigang Li, Songtao Li, Yuntao Zhao:
An infill sampling criterion based on improvement of probability and mapping crowding distance for expensive multi/many-objective optimization. Eng. Appl. Artif. Intell. 133: 108616 (2024) - [j22]Yuntao Zhao, Deao Ma, Wei Liu:
Efficient Detection of Malicious Traffic Using a Decision Tree-Based Proximal Policy Optimisation Algorithm: A Deep Reinforcement Learning Malicious Traffic Detection Model Incorporating Entropy. Entropy 26(8): 648 (2024) - [j21]Yutao Hu, Yuntao Zhao, Yongxin Feng, Xiangyu Ma:
OneR-DQN: a botnet traffic detection model based on deep Q network algorithm in deep reinforcement learning. Int. J. Secur. Networks 19(1): 31-42 (2024) - [j20]Yang Li, Weigang Li, Songtao Li, Yuntao Zhao:
A performance indicator-based evolutionary algorithm for expensive high-dimensional multi-/many-objective optimization. Inf. Sci. 678: 121045 (2024) - [j19]Junming Liu, Yuntao Zhao, Yongxin Feng, Yutao Hu, Xiangyu Ma:
SeMalBERT: Semantic-based malware detection with bidirectional encoder representations from transformers. J. Inf. Secur. Appl. 80: 103690 (2024) - 2023
- [j18]Yang Li, Weigang Li, Yuntao Zhao, Songtao Li:
Hybrid multi-objective optimization algorithm based on angle competition and neighborhood protection mechanism. Appl. Intell. 53(8): 9598-9620 (2023) - [j17]Weigang Li, Lu Xie, Ping Gan, Yuntao Zhao:
Self-supervised pairwise-sample resistance model for few-shot classification. Appl. Intell. 53(18): 20661-20674 (2023) - [j16]Yudi Zhang, Yongxin Feng, Yuntao Zhao:
MalGA-LSTM: a malicious code detection model based on genetic algorithm optimising LSTM trainable parameters. Int. J. Secur. Networks 18(3): 133-142 (2023) - [j15]Yuntao Zhao, Jie Huang, Weigang Li:
Reliable registration method for point clouds with low overlap. J. Electronic Imaging 32(5) (2023) - 2022
- [j14]Yuntao Zhao, Jun Chen, Weigang Li:
Improved whale algorithm and its application in cobot excitation trajectory optimization. Int. J. Intell. Robotics Appl. 6(4): 615-624 (2022) - [c6]Liang Zhen, Yuntao Zhao:
Research on Visual Malicious Code Classification Based on Improved Faster R-CNN. ISCIPT 2022: 170-174 - 2020
- [j13]Yuntao Zhao, Wenjie Cui, Shengnan Geng, Bo Bo, Yongxin Feng, Wenbo Zhang:
A Malware Detection Method of Code Texture Visualization Based on an Improved Faster RCNN Combining Transfer Learning. IEEE Access 8: 166630-166641 (2020) - [j12]Ao Liu, Peng Li, Weiliang Sun, Xudong Deng, Weigang Li, Yuntao Zhao, Bo Liu:
Prediction of mechanical properties of micro-alloyed steels via neural networks learned by water wave optimization. Neural Comput. Appl. 32(10): 5583-5598 (2020) - [j11]Yuntao Zhao, Weigang Li, Ao Liu:
Improved grey wolf optimization based on the two-stage search of hybrid CMA-ES. Soft Comput. 24(2): 1097-1115 (2020) - [j10]Yuntao Zhao, Weigang Li, Ao Liu:
Optimization of geometry quality model for wire and arc additive manufacture based on adaptive multi-objective grey wolf algorithm. Soft Comput. 24(22): 17401-17416 (2020) - [c5]Yuntao Zhao, Wei Mei, Weigang Li:
An Enhanced Grey Wolf Algorithm Based on Equalization Mechanism. ISMSI 2020: 123-128
2010 – 2019
- 2019
- [j9]Yuntao Zhao, Bo Bo, Yongxin Feng:
A Scheduling Method of Cross-Layers Optimization of Polling Weight for AOS Multiplexing. Int. J. Digit. Multim. Broadcast. 2019: 2560623:1-2560623:10 (2019) - [j8]Yuntao Zhao, Jingcheng Chen, Weigang Li:
融合自适应差分进化机制的多目标灰狼优化算法 (Multi-objective Grey Wolf Optimization Hybrid Adaptive Differential Evolution Mechanism). 计算机科学 46(11A): 83-88 (2019) - [j7]Yuntao Zhao, Bo Bo, Yongxin Feng, ChunYu Xu, Bo Yu:
A Feature Extraction Method of Hybrid Gram for Malicious Behavior Based on Machine Learning. Secur. Commun. Networks 2019: 2674684:1-2674684:8 (2019) - [j6]Yuntao Zhao, ChunYu Xu, Bo Bo, Yongxin Feng:
MalDeep: A Deep Learning Classification Framework against Malware Variants Based on Texture Visualization. Secur. Commun. Networks 2019: 4895984:1-4895984:11 (2019) - 2018
- [j5]Wenbo Zhang, Yue Liu, Guangjie Han, Yongxin Feng, Yuntao Zhao:
An Energy Efficient and QoS Aware Routing Algorithm Based on Data Classification for Industrial Wireless Sensor Networks. IEEE Access 6: 46495-46504 (2018) - [j4]Yuntao Zhao, Lishi Liu:
A Scheduling Model of Isochronous Frame Generation on Self-similar Traffic of AOS Multiplexing. Int. J. Online Eng. 14(7): 15-29 (2018) - [j3]Yuntao Zhao, Wenbo Zhang, Yongxin Feng, Bo Yu:
A Classification Detection Algorithm Based on Joint Entropy Vector against Application-Layer DDoS Attack. Secur. Commun. Networks 2018: 9463653:1-9463653:8 (2018) - [c4]Ao Liu, Weiliang Sun, Xiaofeng Yue, Weigang Li, Yuntao Zhao, Bo Liu:
Designing Neural Networks Using Novel Water Wave Optimization Based Memetic Algorithm. ICNC-FSKD 2018: 445-449 - 2017
- [j2]Wenbo Zhang, Xiaopeng Gong, Guangjie Han, Yuntao Zhao:
An Improved Ant Colony Algorithm for Path Planning in One Scenic Area With Many Spots. IEEE Access 5: 13260-13269 (2017) - 2016
- [j1]Yuntao Zhao, Hengchi Liu, Yongxin Feng:
An Algorithm of Traffic Perception of DDoS Attacks against SOA Based on Time United Conditional Entropy. J. Electr. Comput. Eng. 2016: 2579274:1-2579274:5 (2016)
2000 – 2009
- 2009
- [c3]Yuntao Zhao, Jing Wang, Yong Song:
An improved differential evolution to continuous domains and its convergence. GEC Summit 2009: 1061-1064 - 2008
- [c2]Yongxin Feng, Yuntao Zhao, Chengsheng Pan:
The Research of Reconfiguration Technology in Mobile Ad Hoc Network. FGCN (2) 2008: 173-177 - [c1]Yuntao Zhao, Yongxin Feng, Liu Fang:
An Improved Resistant to Destruction Routing Algorithm Based on LEO Satellite Network. FGCN (1) 2008: 230-233
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 12:53 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint