default search action
Yuli Zhao
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j19]Yuli Zhao, Yin Zhang, Francis C. M. Lau, Hai Yu, Zhiliang Zhu, Bin Zhang:
Expanding-Window Zigzag Decodable Fountain Codes for Scalable Multimedia Transmission. ACM Trans. Multim. Comput. Commun. Appl. 20(8): 248:1-248:24 (2024) - 2023
- [j18]Yuli Zhao, Yuyang Bai, Yin Zhang, Bin Zhang, Pertti Vakkari:
A Probabilistic Model Toward How People Search to Build Outcomes. IEEE Access 11: 22450-22467 (2023) - 2022
- [j17]Yuli Zhao, Yin Zhang, Francis C. M. Lau, Zhiliang Zhu, Hai Yu:
Duplicated zigzag decodable fountain codes with the unequal error protection property. Comput. Commun. 185: 66-78 (2022) - [j16]Yin Zhang, Yuli Zhao, Francis C. M. Lau, Bin Zhang, Zhiliang Zhu, Hai Yu:
Weighted zigzag decodable fountain codes for unequal error protection. IET Commun. 16(17): 2082-2090 (2022) - [j15]Jun-Bo Wang, Ji Zhang, Chuanwen Chang, Wei Zhu, Yuli Zhao, Hua Zhang, Jiangzhou Wang:
A Low-Complexity and Adaptive Extraction Method for Reflection Hyperbolic Edges in Impulse GPR Images. IEEE Geosci. Remote. Sens. Lett. 19: 1-5 (2022) - [j14]Li Guo, Zhiliang Zhu, Francis C. M. Lau, Yuli Zhao, Hai Yu:
Joint Security and Energy-Efficient Cooperative Architecture for 5G Underlaying Cellular Networks. Symmetry 14(6): 1160 (2022) - 2020
- [j13]Xue Yang, Zhiliang Zhu, Hai Yu, Yuli Zhao:
A Naming Game-Based Method for the Location of Information Source in Social Networks. Complex. 2020: 6975250:1-6975250:8 (2020) - [j12]Zhiliang Zhu, Yanjie Song, Wei Zhang, Hai Yu, Yuli Zhao:
A novel compressive sensing-based framework for image compression-encryption with S-box. Multim. Tools Appl. 79(35-36): 25497-25533 (2020) - [j11]Liangliang Ding, Jingyuan Zhou, Xianwen Ran, Wenhui Tang, Xiaoguang Xue, Yuli Zhao:
Theoretical Model of Radial Scattering Velocity of Fragments of the Reactive Core PELE Projectile. Symmetry 12(7): 1190 (2020) - [c2]Weina Dai, Yuli Zhao:
A Novel Luby Transform Code with Improved Ripple Size. SimuTools (2) 2020: 649-658
2010 – 2019
- 2019
- [j10]Yanjie Song, Zhiliang Zhu, Wei Zhang, Hai Yu, Yuli Zhao:
Efficient and Secure Image Encryption Algorithm Using a Novel Key-Substitution Architecture. IEEE Access 7: 84386-84400 (2019) - [j9]Xue Yang, Zhiliang Zhu, Hai Yu, Yuli Zhao, Li Guo:
Evolutionary Game Dynamics of the Competitive Information Propagation on Social Networks. Complex. 2019: 8385426:1-8385426:11 (2019) - 2018
- [j8]Li Guo, Zhiliang Zhu, Francis C. M. Lau, Yuli Zhao, Hai Yu:
SSCSMA-based random relay selection scheme for large-scale relay networks. Comput. Commun. 127: 13-19 (2018) - [j7]Yuli Zhao, Yin Zhang, Bin Zhang, Kening Gao, Pengfei Li:
Recommending Queries by Extracting Thematic Experiences from Complex Search Tasks. Entropy 20(6): 459 (2018) - [j6]Yuli Zhao, Yin Zhang, Francis C. M. Lau, Hai Yu, Zhiliang Zhu:
Improved online fountain codes. IET Commun. 12(18): 2297-2304 (2018) - [j5]Ying Wang, Hai Yu, Zhiliang Zhu, Wei Zhang, Yuli Zhao:
Automatic Software Refactoring via Weighted Clustering in Method-Level Networks. IEEE Trans. Software Eng. 44(3): 202-236 (2018) - 2017
- [j4]Hong-Jian Yin, Hai Yu, Yuli Zhao, Zhiliang Zhu, Wei Zhang:
Analysis of the Dynamic Influence of Social Network Nodes. Sci. Program. 2017: 5046905:1-5046905:6 (2017) - [c1]Yuli Zhao, Hai Yu, Zhiliang Zhu, Yin Zhang:
A distributed energy-efficient cooperative routing algorithm based on optimal power allocation. IECON 2017: 5675-5680 - 2016
- [j3]Wei Zhang, Hai Yu, Yuli Zhao, Zhiliang Zhu:
Image encryption based on three-dimensional bit matrix permutation. Signal Process. 118: 36-50 (2016) - 2015
- [j2]Yuli Zhao, Francis Chung-Ming Lau, Zhiliang Zhu, Wei Zhang:
Generation of Luby Transform Codes with Low Redundancy. Int. J. Bifurc. Chaos 25(5): 1550072:1-1550072:8 (2015) - 2012
- [j1]Yuli Zhao, Francis Chung-Ming Lau, Zhiliang Zhu, Hai Yu:
Scale-Free Luby Transform Codes. Int. J. Bifurc. Chaos 22(4) (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:21 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint