default search action
Zhaobin Li
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]Zhaobin Li, Zixuan Zhong, Peiliang Zuo, Hong Zhao:
A personalized federated learning method based on the residual multi-head attention mechanism. J. King Saud Univ. Comput. Inf. Sci. 36(5): 102043 (2024) - [i3]Zhaobin Li, Patrick Shafto:
On Feasibility of Intent Obfuscating Attacks. CoRR abs/2408.02674 (2024) - 2023
- [j5]Hong Zhao, Guowei Sun, Weiheng Li, Peiliang Zuo, Zhaobin Li, Zhanzhen Wei:
Intelligent Computing Collaboration for the Security of the Fog Internet of Things. Symmetry 15(5): 974 (2023) - [i2]Zhaobin Li, Luna Yee, Nathaniel Sauerberg, Irene Sakson, Joseph Jay Williams, Anna N. Rafferty:
Getting too personal(ized): The importance of feature choice in online adaptive algorithms. CoRR abs/2309.02856 (2023) - 2022
- [j4]Zaipeng Xie, Zhaobin Li, Yida Zhang, Jianan Zhang, Fangming Liu, Wei Chen:
A Multi-Sensory Guidance System for the Visually Impaired Using YOLO and ORB-SLAM. Inf. 13(7): 343 (2022) - [j3]Zhaobin Li, Bin Yang, Xinyu Zhang, Chao Guo:
DDoS Defense Method in Software-Defined Space-Air-Ground Network from Dynamic Bayesian Game Perspective. Secur. Commun. Networks 2022: 1886516:1-1886516:13 (2022) - [c6]Peiliang Zuo, Chen Wang, Zhanzhen Wei, Zhaobin Li, Hong Zhao, Hua Jiang:
Deep Reinforcement Learning Based Load Balancing Routing for LEO Satellite Network. VTC Spring 2022: 1-6 - 2021
- [j2]Weichen Lian, Zhaobin Li, Chao Guo, Zhanzhen Wei, Xingyuan Peng:
FRChain: A Blockchain-based Flow-Rules-oriented Data Forwarding Security Scheme in SDN. KSII Trans. Internet Inf. Syst. 15(1): 264-284 (2021) - [i1]Tomas Folke, Zhaobin Li, Ravi B. Sojitra, Scott Cheng-Hsin Yang, Patrick Shafto:
Explainable AI for Natural Adversarial Images. CoRR abs/2106.09106 (2021) - 2020
- [c5]Zhaobin Li, Luna Yee, Nathaniel Sauerberg, Irene Sakson, Joseph Jay Williams, Anna N. Rafferty:
Getting too personal(ized): The importance of feature choice in online adaptive algorithms. EDM 2020
2010 – 2019
- 2017
- [c4]ZhanZhen Wei, Feng Wang, Zhaobin Li:
Loop-Free Forwarding in Hierarchical Location-Based Routing. CyberC 2017: 433-436 - 2015
- [j1]Zhaobin Li, Xiao Xia, Qian Liu, Yu Ma:
网络层设备性能测试方法概述 (Test Method of Performance of Network Layer Device). 计算机科学 42(Z6): 271-273 (2015) - 2011
- [c3]Jun Wu, Xin Xu, Lei Zuo, Zhaobin Li, Jian Wang:
Adaptive Kernel-Width Selection for Kernel-Based Least-Squares Policy Iteration Algorithm. ISNN (2) 2011: 611-619
2000 – 2009
- 2009
- [c2]Yaping Chi, Zhaobin Li, Zhonghua Wang, Yong Fang:
An Improved Bytecode Verification Algorithm on Java Card. CIS (1) 2009: 552-555 - 2006
- [c1]Ting Jiang, Zhaobin Li, Zheng Zhou:
On Complementary Punctured Binary Sequence Pairs. ISIT 2006: 2008-2011
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint