
Yuchen Zhou
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j25]Yuchen Zhou
, F. Richard Yu
, Jian Chen
, Yonghong Kuo
:
Cyber-Physical-Social Systems: A State-of-the-Art Survey, Challenges and Opportunities. IEEE Commun. Surv. Tutorials 22(1): 389-425 (2020) - [j24]Yunliang Chen, Xiaodao Chen, Wangyang Liu, Yuchen Zhou, Albert Y. Zomaya
, Rajiv Ranjan
, Shiyan Hu:
Stochastic scheduling for variation-aware virtual machine placement in a cloud computing CPS. Future Gener. Comput. Syst. 105: 779-788 (2020) - [j23]Yunliang Chen
, Lizhe Wang
, Xiaodao Chen, Rajiv Ranjan
, Albert Y. Zomaya
, Yuchen Zhou, Shiyan Hu
:
Stochastic Workload Scheduling for Uncoordinated Datacenter Clouds with Multiple QoS Constraints. IEEE Trans. Cloud Comput. 8(4): 1284-1295 (2020) - [j22]Xincheng Chen
, Yuchen Zhou
, Long Yang
, Lu Lv
:
User Satisfaction Oriented Resource Allocation for Fog Computing: A Mixed-Task Paradigm. IEEE Trans. Commun. 68(10): 6470-6482 (2020) - [c29]Vijay Janapa Reddi, Christine Cheng, David Kanter, Peter Mattson, Guenther Schmuelling, Carole-Jean Wu, Brian Anderson, Maximilien Breughe, Mark Charlebois, William Chou, Ramesh Chukka, Cody Coleman, Sam Davis, Pan Deng, Greg Diamos, Jared Duke, Dave Fick, J. Scott Gardner, Itay Hubara, Sachin Idgunji, Thomas B. Jablin, Jeff Jiao, Tom St. John, Pankaj Kanwar, David Lee, Jeffery Liao, Anton Lokhmotov, Francisco Massa, Peng Meng, Paulius Micikevicius, Colin Osborne, Gennady Pekhimenko, Arun Tejusve Raghunath Rajan, Dilip Sequeira, Ashish Sirasao, Fei Sun, Hanlin Tang, Michael Thomson, Frank Wei, Ephrem Wu, Lingjie Xu, Koichi Yamada, Bing Yu, George Yuan, Aaron Zhong, Peizhao Zhang, Yuchen Zhou:
MLPerf Inference Benchmark. ISCA 2020: 446-459 - [c28]Xincheng Chen, Yuchen Zhou, Long Yang, Lu Lv:
An Energy-Efficient Mixed-Task Paradigm in Resource Allocation for Fog Computing. WCNC 2020: 1-6 - [i13]Yuchen Zhou, Anru R. Zhang, Lili Zheng, Yazhen Wang:
Optimal High-order Tensor SVD via Tensor-Train Orthogonal Iteration. CoRR abs/2010.02482 (2020) - [i12]Dong Xia, Anru R. Zhang, Yuchen Zhou:
Inference for Low-rank Tensors - No Need to Debias. CoRR abs/2012.14844 (2020)
2010 – 2019
- 2019
- [j21]Yuchen Zhou, Mark Dredze, David A. Broniatowski, William D. Adler:
Elites and foreign actors among the alt-right: The Gab social media platform. First Monday 24(9) (2019) - [j20]Wei Zhang
, Jian Chen
, Yonghong Kuo
, Yuchen Zhou
:
Artificial-Noise-Aided Optimal Beamforming in Layered Physical Layer Security. IEEE Commun. Lett. 23(1): 72-75 (2019) - [j19]Xincheng Chen, Yuchen Zhou, Bintao He, Lu Lv:
Energy-efficiency fog computing resource allocation in cyber physical internet of things systems. IET Commun. 13(13): 2003-2011 (2019) - [j18]Yuchen Zhou
, Fei Richard Yu
, Jian Chen
, Yonghong Kuo
:
Robust Energy-Efficient Resource Allocation for IoT-Powered Cyber-Physical-Social Smart Systems With Virtualization. IEEE Internet Things J. 6(2): 2413-2426 (2019) - [j17]Lin Liu
, Yuchen Zhou
, Shiyan Hu
:
Stochastic Buffering for Bundled SWCNT Interconnects Considering Unidimensional Fabrication Variation. IEEE Trans. Emerg. Top. Comput. 7(4): 585-595 (2019) - [j16]Yuchen Zhou
, Yang Liu
, Shiyan Hu
:
Smart Home Cyberattack Detection Framework for Sponsor Incentive Attacks. IEEE Trans. Smart Grid 10(2): 1916-1927 (2019) - [j15]Wei Zhang
, Jian Chen
, Yonghong Kuo
, Yuchen Zhou
:
Transmit Beamforming for Layered Physical Layer Security. IEEE Trans. Veh. Technol. 68(10): 9747-9760 (2019) - [c27]Ke Fang, Yuchen Zhou, Ju Huo:
Improved Grey Relational Analysis for Model Validation. AsiaSim 2019: 243-250 - [c26]Fatemah Alharbi, Jie Chang, Yuchen Zhou, Feng Qian, Zhiyun Qian
, Nael B. Abu-Ghazaleh
:
Collaborative Client-Side DNS Cache Poisoning Attack. INFOCOM 2019: 1153-1161 - [c25]Yuchen Zhou, Yanmin Shang, Yaman Cao, Yanbing Liu, Jianlong Tan:
UAFA: Unsupervised Attribute-Friendship Attention Framework for User Representation. KSEM (1) 2019: 155-167 - [c24]Chen Dan, Hong Wang, Hongyang Zhang, Yuchen Zhou, Pradeep Ravikumar:
Optimal Analysis of Subset-Selection Based L_p Low-Rank Approximation. NeurIPS 2019: 2537-2548 - [c23]Oleksii Starov, Yuchen Zhou, Jun Wang:
Detecting Malicious Campaigns in Obfuscated JavaScript with Scalable Behavioral Analysis. IEEE Symposium on Security and Privacy Workshops 2019: 218-223 - [i11]Yikun Ban, Yuchen Zhou, Jingrui He, Xu Cheng, Jiangfang Yi:
Coalesced TLB to Exploit Diverse Contiguity of Memory Mapping. CoRR abs/1908.08774 (2019) - [i10]T. Tony Cai, Anru Zhang, Yuchen Zhou:
Sparse Group Lasso: Optimal Sample Complexity, Convergence Rate, and Statistical Inference. CoRR abs/1909.09851 (2019) - [i9]Chen Dan, Hong Wang, Hongyang Zhang, Yuchen Zhou, Pradeep Ravikumar:
Optimal Analysis of Subset-Selection Based L_p Low Rank Approximation. CoRR abs/1910.13618 (2019) - [i8]Vijay Janapa Reddi, Christine Cheng, David Kanter, Peter Mattson, Guenther Schmuelling, Carole-Jean Wu, Brian Anderson, Maximilien Breughe, Mark Charlebois, William Chou, Ramesh Chukka, Cody Coleman, Sam Davis, Pan Deng, Greg Diamos, Jared Duke, Dave Fick, J. Scott Gardner, Itay Hubara, Sachin Idgunji, Thomas B. Jablin, Jeff Jiao, Tom St. John, Pankaj Kanwar, David Lee, Jeffery Liao, Anton Lokhmotov, Francisco Massa, Peng Meng, Paulius Micikevicius, Colin Osborne, Gennady Pekhimenko, Arun Tejusve Raghunath Rajan, Dilip Sequeira, Ashish Sirasao, Fei Sun, Hanlin Tang, Michael Thomson, Frank Wei, Ephrem Wu, Lingjie Xu, Koichi Yamada, Bing Yu, George Yuan, Aaron Zhong, Peizhao Zhang, Yuchen Zhou:
MLPerf Inference Benchmark. CoRR abs/1911.02549 (2019) - 2018
- [j14]Yuchen Zhou
, F. Richard Yu
, Jian Chen
, Yonghong Kuo
:
Video Transcoding, Caching, and Multicast for Heterogeneous Networks Over Wireless Network Virtualization. IEEE Commun. Lett. 22(1): 141-144 (2018) - [j13]Yang Liu
, Yuchen Zhou, Shiyan Hu:
Combating Coordinated Pricing Cyberattack and Energy Theft in Smart Home Cyber-Physical Systems. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 37(3): 573-586 (2018) - [j12]Meng Ma
, Weilan Lin, Jingbin Zhang, Ping Wang
, Yuchen Zhou, Xiaoxing Liang
:
Toward Energy-Awareness Smart Building: Discover the Fingerprint of Your Electrical Appliances. IEEE Trans. Ind. Informatics 14(4): 1458-1468 (2018) - [j11]Yuchen Zhou
, Yang Liu
, Shiyan Hu:
Energy Theft Detection in Multi-Tenant Data Centers with Digital Protective Relay Deployment. IEEE Trans. Sustain. Comput. 3(1): 16-29 (2018) - [j10]Yuchen Zhou
, F. Richard Yu
, Jian Chen
, Yonghong Kuo
:
Cache-Aware Multicast Beamforming Design for Multicell Multigroup Multicast. IEEE Trans. Veh. Technol. 67(12): 11681-11693 (2018) - [j9]Meng Ma, Weilan Lin, Disheng Pan, Yangxin Lin, Ping Wang, Yuchen Zhou, Xiaoxing Liang:
Data and Decision Intelligence for Human-in-the-Loop Cyber-Physical Systems: Reference Model, Recent Progresses and Challenges. J. Signal Process. Syst. 90(8-9): 1167-1178 (2018) - [j8]Yuchen Zhou, Fei Richard Yu, Jian Chen, Yonghong Kuo:
Communications, Caching, and Computing for Next Generation HetNets. IEEE Wirel. Commun. 25(4): 104-111 (2018) - [c22]Wenlong Mou, Yuchen Zhou, Jun Gao, Liwei Wang:
Dropout Training, Data-dependent Regularization, and Generalization Bounds. ICML 2018: 3642-3650 - [c21]Ning Zhang, Junchi Yan, Yuchen Zhou:
Weakly Supervised Audio Source Separation via Spectrum Energy Preserved Wasserstein Learning. IJCAI 2018: 4574-4580 - [c20]Chen Dan, Kristoffer Arnsfelt Hansen
, He Jiang, Liwei Wang, Yuchen Zhou:
Low Rank Approximation of Binary Matrices: Column Subset Selection and Generalizations. MFCS 2018: 41:1-41:16 - [c19]Oleksii Starov, Yuchen Zhou, Xiao Zhang, Najmeh Miramirkhani, Nick Nikiforakis:
Betrayed by Your Dashboard: Discovering Malicious Campaigns via Web Analytics. WWW 2018: 227-236 - [i7]Anru Zhang, Yuchen Zhou:
A Non-asymptotic, Sharp, and User-friendly Reverse Chernoff-Cramèr Bound. CoRR abs/1810.09006 (2018) - 2017
- [j7]Yuchen Zhou, Jian Chen
, Yonghong Kuo:
Cooperative Cross-Layer Resource Allocation for Self-Healing in Interworking of WLAN and Femtocell Systems. IEEE Commun. Lett. 21(1): 136-139 (2017) - [j6]Yuchen Zhou, F. Richard Yu
, Jian Chen
, Yonghong Kuo
:
Resource Allocation for Information-Centric Virtualized Heterogeneous Networks With In-Network Caching and Mobile Edge Computing. IEEE Trans. Veh. Technol. 66(12): 11339-11351 (2017) - [c18]Yuchen Zhou, F. Richard Yu, Jian Chen, Yonghong Kuo:
Virtual resource allocation for information-centric heterogeneous networks with mobile edge computing. INFOCOM Workshops 2017: 235-240 - [c17]Meng Ma, Weilan Lin, Jingbin Zhang, Ping Wang, Yuchen Zhou, Xiaoxing Liang:
Discover the fingerprint of electrical appliance: Online appliance behavior learning and detection in smart homes. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017: 1-8 - [i6]Yuchen Zhou, F. Richard Yu, Jian Chen, Yonghong Kuo:
Information-Centric Wireless Networks with Mobile Edge Computing. CoRR abs/1706.09541 (2017) - 2016
- [j5]Jian Chen, Yuchen Zhou, Yonghong Kuo:
Energy-efficiency resource allocation for cognitive heterogeneous networks with imperfect channel state information. IET Commun. 10(11): 1312-1319 (2016) - [j4]Jia Wang, Lin Liu, Yuchen Zhou, Shiyan Hu:
Buffering Carbon Nanotube Interconnects Considering Inductive Effects. J. Circuits Syst. Comput. 25(8): 1650093:1-1650093:17 (2016) - [j3]Yuchen Zhou, Jian Chen, Yonghong Kuo:
Fairness Resource Allocation for Parallel Multi-Radio Access in Cognitive Multi-Cell. Wirel. Pers. Commun. 88(3): 587-602 (2016) - [c16]Yuchen Zhou, Aneesh Raghavan, John S. Baras:
Time varying control set design for UAV collision avoidance using reachable tubes. CDC 2016: 6857-6862 - [c15]Yuchen Zhou, Dipankar Maity, John S. Baras:
Timed automata approach for motion planning using metric interval temporal logic. ECC 2016: 690-695 - [c14]Xiaodao Chen, Yuchen Zhou, Hong Zhou, Chaowei Wan, Qi Zhu
, Wenchao Li, Shiyan Hu:
Analysis of production data manipulation attacks in petroleum cyber-physical systems. ICCAD 2016: 108 - [c13]Yang Liu, Lin Liu, Yuchen Zhou, Shiyan Hu:
Leveraging carbon nanotube technologies in developing Physically Unclonable Function for cyber-physical system authentication. INFOCOM Workshops 2016: 176-180 - [i5]Yuchen Zhou, John S. Baras, Shige Wang:
Hardware Software Co-design for Automotive CPS using Architecture Analysis and Design Language. CoRR abs/1603.05069 (2016) - [i4]Yuchen Zhou, Dipankar Maity, John S. Baras:
Timed Automata Approach for Motion Planning Using Metric Interval Temporal Logic. CoRR abs/1603.08246 (2016) - 2015
- [j2]Yuchen Zhou, Xiaodao Chen, Albert Y. Zomaya
, Lizhe Wang, Shiyan Hu:
A Dynamic Programming Algorithm for Leveraging Probabilistic Detection of Energy Theft in Smart Home. IEEE Trans. Emerg. Top. Comput. 3(4): 502-513 (2015) - [c12]Yuchen Zhou, John S. Baras:
Reachable set approach to collision avoidance for UAVs. CDC 2015: 5947-5952 - [c11]Yuchen Zhou, Dipankar Maity, John S. Baras:
Optimal mission planner with timed temporal logic constraints. ECC 2015: 759-764 - [c10]Yuchen Zhou, David Evans:
Understanding and Monitoring Embedded Web Scripts. IEEE Symposium on Security and Privacy 2015: 850-865 - [i3]Yuchen Zhou, Dipankar Maity, John S. Baras:
Optimal Mission Planner with Timed Temporal Logic Constraints. CoRR abs/1510.01261 (2015) - [i2]Chen Dan, Kristoffer Arnsfelt Hansen, He Jiang, Liwei Wang, Yuchen Zhou:
On Low Rank Approximation of Binary Matrices. CoRR abs/1511.01699 (2015) - [i1]Yuchen Zhou, John S. Baras:
Reachable Set Approach to Collision Avoidance for UAVs. CoRR abs/1512.01195 (2015) - 2014
- [c9]Lin Liu, Yuchen Zhou, Shiyan Hu:
Buffering Single-Walled Carbon Nanotubes Bundle Interconnects for Timing Optimization. ISVLSI 2014: 362-367 - [c8]Lin Liu, Yuchen Zhou, Yang Liu, Shiyan Hu:
Dynamic programming based game theoretic algorithm for economical multi-user smart home scheduling. MWSCAS 2014: 362-365 - [c7]Yuchen Zhou, David Evans:
SSOScan: Automated Testing of Web Applications for Single Sign-On Vulnerabilities. USENIX Security Symposium 2014: 495-510 - 2013
- [c6]Yuchen Zhou, John S. Baras:
CPS Modeling Integration Hub and Design Space Exploration with Application to Microrobotics. CPSW@CISS 2013: 23-42 - [c5]Rui Wang, Yuchen Zhou, Shuo Chen, Shaz Qadeer, David Evans, Yuri Gurevich:
Explicating SDKs: Uncovering Assumptions Underlying Secure Authentication and Authorization. USENIX Security Symposium 2013: 399-314 - [c4]Shahan Yang, Yuchen Zhou, John S. Baras:
Compositional Analysis of Dynamic Bayesian Networks and Applications to Complex Dynamic System Decomposition. CSER 2013: 167-176 - 2012
- [j1]Lifeng Ma
, Yuming Bo, Yuchen Zhou, Zhi Guo:
Error variance-constrained ∞ filtering for a class of nonlinear stochastic systems with degraded measurements: the finite horizon case. Int. J. Syst. Sci. 43(12): 2361-2372 (2012) - 2011
- [c3]Yuchen Zhou, David Evans:
Protecting Private Web Content from Embedded Scripts. ESORICS 2011: 60-79 - [c2]Yiming Huai, Yuchen Zhou, Ioan Tudosa, Roger Malmhall, Rajiv Ranjan, Jing Zhang:
Progress and outlook for STT-MRAM. ICCAD 2011: 235
1990 – 1999
- 1993
- [c1]Yuchen Zhou:
Tracking control of multiple flexible link robots. IROS 1993: 810-817
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2021-01-21 23:04 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint