Остановите войну!
for scientists:
default search action
Yanhui Zhou
- > Home > Persons > Yanhui Zhou
Publications
- 2023
- [j20]Xin Qiao, Chenyang Ge, Youmin Zhang, Yanhui Zhou, Fabio Tosi, Matteo Poggi, Stefano Mattoccia:
Depth super-resolution from explicit and implicit high-frequency features. Comput. Vis. Image Underst. 237: 103841 (2023) - [i1]Xin Qiao, Chenyang Ge, Youmin Zhang, Yanhui Zhou, Fabio Tosi, Matteo Poggi, Stefano Mattoccia:
Depth Super-Resolution from Explicit and Implicit High-Frequency Features. CoRR abs/2303.09307 (2023) - 2022
- [j17]Weiwei Xu, Yanhui Zhou, Xiaokai Wang, Wenchao Chen:
MoG-Based Robust Sparse Representation for Seismic Erratic Noise Suppression. IEEE Geosci. Remote. Sens. Lett. 19: 1-5 (2022) - [j16]Weiwei Xu, Yanhui Zhou, Dawei Liu, Xiaokai Wang, Wenchao Chen:
Seismic Intelligent Deblending via Plug and Play Method With Blended CSGs Trained Deep CNN Gaussian Denoiser. IEEE Trans. Geosci. Remote. Sens. 60: 1-13 (2022) - 2019
- [j12]Yanhui Zhou, Wenchao Chen:
MCA-Based Clutter Reduction From Migrated GPR Data of Shallowly Buried Point Target. IEEE Trans. Geosci. Remote. Sens. 57(1): 432-448 (2019) - [c8]Xin Qiao, Chenyang Ge, Huimin Yao, Pengchao Deng, Yanhui Zhou:
Valid depth data extraction and correction for time-of-flight camera. ICMV 2019: 114332K - 2017
- [j10]Xufei Zheng, Yanhui Zhou, Yonghui Fang:
The dual negative selection algorithm and its application for network anomaly detection. Int. J. Inf. Commun. Technol. 11(1): 94-118 (2017) - [j8]Ling Tu, Yue Ma, Cheng Cheng, Yanhui Zhou:
基于协议混合变形的Web安全模糊测试与效用评估方法 (Hybrid Protocol Deformation Based Web Security Fuzzy Testing and Utility Evaluation Approach). 计算机科学 44(5): 141-145 (2017) - 2016
- [j6]Cheng Cheng, Yanhui Zhou:
基于模糊测试和遗传算法的XSS漏洞挖掘 (Findding XSS Vulnerabilities Based on Fuzzing Test and Genetic Algorithm). 计算机科学 43(Z6): 328-331 (2016) - [j5]Yanhui Zhou, Jinghuai Gao, Wenchao Chen, Pascal Frossard:
Seismic Simultaneous Source Separation via Patchwise Sparse Representation. IEEE Trans. Geosci. Remote. Sens. 54(9): 5271-5284 (2016) - [c4]Yanhui Zhou, Wenchao Chen:
MCA based clutter reduction from migrated GPR data. IGARSS 2016: 7481-7484 - 2013
- [j3]Xufei Zheng, Yanhui Zhou, Yonghui Fang:
The Dual Negative Selection Algorithm Based on Pattern Recognition Receptor Theory and Its Application in Two-class Data Classification. J. Comput. 8(8): 1951-1959 (2013) - [j2]Xufei Zheng, Yonghui Fang, Yanhui Zhou, Jing Zhang:
A Novel Multi-layered Immune Network Intrusion Detection Defense Model: MINID. J. Networks 8(3): 636-644 (2013) - 2010
- [c2]Yanhui Zhou, Wei Zhao, Yan Ge, Jinghuai Gao, Xiaokai Wang, Chenyang Ge:
Seismic quality factor estimation using continuous wavelet transform. IGARSS 2010: 3941-3944 - 2006
- [c1]Yanhui Zhou, Zili Zhang:
Fuzzy Logic Based Metric in Software Testing. AMT 2006: 261-267
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2023-12-11 20:21 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint