


default search action
Yufei Song
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[j15]Wanzhen Zhou, Junjie Wang, Xi Meng, Jianxia Wang, Yufei Song, Zhiguo Liu:
MP-YOLO: multidimensional feature fusion based layer adaptive pruning YOLO for dense vehicle object detection algorithm. J. Vis. Commun. Image Represent. 112: 104560 (2025)
[j14]Ziqi Zhou
, Menghao Deng, Yufei Song
, Hangtao Zhang
, Wei Wan
, Shengshan Hu
, Minghui Li
, Leo Yu Zhang
, Dezhong Yao
:
DarkHash: A Data-Free Backdoor Attack Against Deep Hashing. IEEE Trans. Inf. Forensics Secur. 20: 8139-8153 (2025)
[j13]Chang Yang
, Tao Zheng
, Yufei Song, Jiefeng Hu
, Josep M. Guerrero
:
Coordinated Control Strategy of Hybrid AC/DC Microgrid for Power Quality Improvement Under Unbalanced AC Conditions. IEEE Trans. Smart Grid 16(2): 837-849 (2025)
[j12]Bo Zhang
, Xuan Liu
, Haofeng Zheng
, Yufei Song
:
Hidden Markov Model-Based Cyberattack Prediction in Power Systems. IEEE Trans. Smart Grid 16(2): 1694-1705 (2025)
[c10]Ziqi Zhou, Bowen Li, Yufei Song, Zhifei Yu, Shengshan Hu, Wei Wan
, Leo Yu Zhang, Dezhong Yao, Hai Jin:
NumbOD: A Spatial-Frequency Fusion Attack Against Object Detectors. AAAI 2025: 1201-1209
[c9]Boxun Xu, Yufei Song, Peng Li:
Trimming Down Large Spiking Vision Transformers Via Heterogeneous Quantization Search. ASAP 2025: 41-48
[c8]Yufei Song, Ziqi Zhou, Minghui Li, Xianlong Wang, Hangtao Zhang, Menghao Deng, Wei Wan
, Shengshan Hu, Leo Yu Zhang:
PB-UAP: Hybride Universal Adversarial Attack for Image Segmentation. ICASSP 2025: 1-5
[i8]Ziqi Zhou, Menghao Deng, Yufei Song, Hangtao Zhang, Wei Wan, Shengshan Hu, Minghui Li, Leo Yu Zhang, Dezhong Yao:
DarkHash: A Data-Free Backdoor Attack Against Deep Hashing. CoRR abs/2510.08094 (2025)
[i7]Yufei Song, Ziqi Zhou, Qi Lu, Hangtao Zhang, Yifan Hu, Lulu Xue, Shengshan Hu, Minghui Li, Leo Yu Zhang:
SegTrans: Transferable Adversarial Examples for Segmentation Models. CoRR abs/2510.08922 (2025)- 2024
[j11]Jing Li
, Xinyue Kang, Xingyun Shi
, Yufei Song:
A second-order numerical method for nonlinear variable-order fractional diffusion equation with time delay. Math. Comput. Simul. 219: 101-111 (2024)
[j10]Yi Lin, Lin He
, Daiqi Zhong
, Yufei Song
, Lujia Wei, Liang Xin:
A High Spatial Resolution Aerial Image Dataset and an Efficient Scene Classification Model. IEEE Trans. Geosci. Remote. Sens. 62: 1-13 (2024)
[c7]Jingxiao Han
, Yufei Song
, Qi Wu
, Baiyang Han
, Tiankui Zhang
:
Divide and Conquer: Adaptive Graph Neural Networks Leveraging Sequence Factorization for IP Network. ICCIP 2024: 41-45
[c6]Yu Zou, Yufei Song, Hong Shen, Tianyi Shi, Tiankui Zhang:
Spatial-Temporal Traffic Prediction Based Load Balancing in Cellular Networks. ICCT 2024: 462-467
[c5]Ziqi Zhou, Yufei Song, Minghui Li, Shengshan Hu, Xianlong Wang, Leo Yu Zhang, Dezhong Yao, Hai Jin:
DarkSAM: Fooling Segment Anything Model to Segment Nothing. NeurIPS 2024
[i6]Ziqi Zhou, Yufei Song, Minghui Li, Shengshan Hu, Xianlong Wang, Leo Yu Zhang, Dezhong Yao, Hai Jin:
DarkSAM: Fooling Segment Anything Model to Segment Nothing. CoRR abs/2409.17874 (2024)
[i5]Boxun Xu, Yufei Song, Peng Li:
Trimming Down Large Spiking Vision Transformers via Heterogeneous Quantization Search. CoRR abs/2412.05505 (2024)
[i4]Yufei Song, Ziqi Zhou, Minghui Li, Xianlong Wang, Menghao Deng, Wei Wan
, Shengshan Hu, Leo Yu Zhang:
PB-UAP: Hybrid Universal Adversarial Attack For Image Segmentation. CoRR abs/2412.16651 (2024)
[i3]Ziqi Zhou, Bowen Li, Yufei Song, Zhifei Yu, Shengshan Hu, Wei Wan
, Leo Yu Zhang, Dezhong Yao, Hai Jin:
NumbOD: A Spatial-Frequency Fusion Attack Against Object Detectors. CoRR abs/2412.16955 (2024)- 2023
[i2]Zhenqiao Song, Yunlong Zhao, Yufei Song, Wenxian Shi, Yang Yang, Lei Li:
Joint Design of Protein Sequence and Structure based on Motifs. CoRR abs/2310.02546 (2023)- 2022
[j9]Jinhua Mi
, Yuhua Cheng, Yufei Song, Libing Bai, Kai Chen:
Application of dynamic evidential networks in reliability analysis of complex systems with epistemic uncertainty and multiple life distributions. Ann. Oper. Res. 311(1): 311-333 (2022)
[j8]Yuzhong Zhou, Zhengping Lin, Liang Tu, Yufei Song, Zhengrong Wu:
Big Data and Knowledge Graph Based Fault Diagnosis for Electric Power Systems. EAI Endorsed Trans. Ind. Networks Intell. Syst. 9(32): 1 (2022)
[j7]Hao Zhou
, Qingzhou Mao
, Yufei Song, Anlei Wu, Xueqing Hu:
Analysis of Internal Angle Error of UAV LiDAR Based on Rotating Mirror Scanning. Remote. Sens. 14(20): 5260 (2022)
[j6]Yufei Song, Wen Fan, Ningyu Yu, Yanbo Cao
, Chengcheng Jiang, Xiaoqing Chai, Yalin Nan:
Rainfall Induced Shallow Landslide Temporal Probability Modelling and Early Warning Research in Mountains Areas: A Case Study of Qin-Ba Mountains, Western China. Remote. Sens. 14(23): 5952 (2022)
[c4]Yufei Song
, Junyang Mo
, Zhongming Pan
:
Online Review System Using Relational Triple Extraction with Novel Data Augmentation Methods. ACAI 2022: 82:1-82:5- 2021
[j5]Yiren Li, Tieke Li, Pei Shen, Liang Hao, Wenjing Liu, Shuai Wang, Yufei Song, Liang Bao:
Sim-DRS: a similarity-based dynamic resource scheduling algorithm for microservice-based web systems. PeerJ Comput. Sci. 7: e824 (2021)
[j4]Yufei Song, Jinhua Mi, Yuhua Cheng, Libing Bai, Kai Chen:
Reliability assessment for failure-dependent and uncertain systems: A Bayesian network based on copula method and probability-box. Qual. Reliab. Eng. Int. 37(5): 1894-1921 (2021)
[c3]Yuekui Zhang, Yunxia Chu, Yunfang Fu, Zhixiang Li, Yufei Song:
UWB Positioning Analysis and Algorithm Research. EUSPN/ICTH 2021: 466-471
[c2]Mingde Chu, Yufei Song:
Analysis of network security and privacy security based on AI in IOT environment. ICISCAE (IEEE) 2021: 390-393
[c1]Yufei Song, Mingde Chu:
Research on the Application of Data Encryption Technology in Computer Network Security Based on Machine Learning. ICISCAE (IEEE) 2021: 399-403- 2020
[j3]Yufei Song, Jinhua Mi, Yuhua Cheng, Libing Bai
, Kai Chen:
A dependency bounds analysis method for reliability assessment of complex system with hybrid uncertainty. Reliab. Eng. Syst. Saf. 204: 107119 (2020)
[j2]Xuan Liu
, Yufei Song, Zuyi Li
:
Dummy Data Attacks in Power Systems. IEEE Trans. Smart Grid 11(2): 1792-1795 (2020)
2010 – 2019
- 2019
[j1]Yufei Song, Jinhua Mi
, Yuhua Cheng, Libing Bai, Xinyuan Wang:
Application of discrete-time Bayesian network on reliability analysis of uncertain system with common cause failure. Qual. Reliab. Eng. Int. 35(4): 1025-1045 (2019)- 2015
[i1]Qi Mu, Liqing Cui, Yufei Song:
The implementation and optimization of Bitonic sort algorithm based on CUDA. CoRR abs/1506.01446 (2015)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-11-13 00:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







