


default search action
Yufei Han
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j22]Yufei Han, Chao Li, Jianbiao Zhang, Yifan Wang, Lehao Yu, Yihao Cao
, Hong Shen, Weixing Hou, Hailin Luo:
DMSCTS: Dynamic measurement scheme for the containers-hybrid-deployment based on trusted subsystem. Comput. Secur. 148: 104158 (2025) - [j21]Yufei Han
, Jiaye Xie:
An adaptive parameter fractional tap-length algorithm based on instantaneous and accumulated full-partial errors. Digit. Signal Process. 158: 104925 (2025) - [j20]Xiaoting Lyu, Yufei Han, Wei Wang, Jingkai Liu, Bin Wang, Kai Chen, Yidong Li, Jiqiang Liu, Xiangliang Zhang:
CoBA: Collusive Backdoor Attacks With Optimized Trigger to Federated Learning. IEEE Trans. Dependable Secur. Comput. 22(2): 1506-1518 (2025) - [j19]Xiangrui Xu, Wei Wang, Zheng Chen, Bin Wang, Chao Li, Li Duan, Zhen Han, Yufei Han:
Finding the PISTE: Towards Understanding Privacy Leaks in Vertical Federated Learning Systems. IEEE Trans. Dependable Secur. Comput. 22(2): 1537-1550 (2025) - [j18]Yufei Han
, Fan Zhang
, Zhaoqi Li
, Qichen Wang
, Chaofan Li
, Pei Lai
, Tianrui Li
, Fei Teng
, Zhenzhen Jin
:
MT-ConvFormer: A Multitask Bearing Fault Diagnosis Method Using a Combination of CNN and Transformer. IEEE Trans. Instrum. Meas. 74: 1-16 (2025) - 2024
- [j17]Xu Han
, Qiang Li, Hongbo Cao
, Lei Han, Bin Wang, Xuhua Bao, Yufei Han, Wei Wang
:
BFS2Adv: Black-box adversarial attack towards hard-to-attack short texts. Comput. Secur. 141: 103817 (2024) - [j16]Yufei Han, Jiaye Xie, Yibo Li:
Dynamic Limited Variable Step-Size Algorithm Based on the MSD Variation Cost Function. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 107(6): 919-922 (2024) - [j15]Kejun Chen, Yuehua Zhao
, Ningyuan Song
, Yufei Han, Jiaer Peng
, Jiaqing Wang:
You are not alone: Characterizing users' relationship-layer identities in online health communities. J. Assoc. Inf. Sci. Technol. 75(7): 807-828 (2024) - [j14]Haoyang Liu
, Chuanlin He, Yanting Yu, Yiqi Bai, Yufei Han:
Image Super Resolution-Based Channel Estimation for Orthogonal Chirp Division Multiplexing on Shallow Water Underwater Acoustic Communications. Sensors 24(9): 2846 (2024) - [c68]Jing Cui, Yufei Han, Yuzhe Ma, Jianbin Jiao, Junge Zhang:
BadRL: Sparse Targeted Backdoor Attack against Reinforcement Learning. AAAI 2024: 11687-11694 - [c67]Yufei Han, Haoyuan Chen, Linwei Yao, Kuan Li, Jianping Yin:
MAT-VIT: A Vision Transformer with MAE-Based Self-Supervised Auxiliary Task for Medical Image Classification. CSCWD 2024: 2046-2052 - [c66]Yufei Han, Heng Guo, Koki Fukai, Hiroaki Santo, Boxin Shi, Fumio Okura, Zhanyu Ma, Yunpeng Jia:
NeRSP: Neural 3D Reconstruction for Reflective Objects with Sparse Polarized Images. CVPR 2024: 11821-11830 - [c65]Yujun Zhou, Yufei Han, Haomin Zhuang, Kehan Guo, Zhenwen Liang, Hongyan Bao, Xiangliang Zhang:
Defending Jailbreak Prompts via In-Context Adversarial Game. EMNLP 2024: 20084-20105 - [c64]Adrien Schoen, Gregory Blanc, Pierre-François Gimenez, Yufei Han, Frédéric Majorczyk, Ludovic Mé:
A Tale of Two Methods: Unveiling the Limitations of GAN and the Rise of Bayesian Networks for Synthetic Network Traffic Generation. EuroS&P Workshops 2024: 273-286 - [c63]Yujun Zhou, Yufei Han, Haomin Zhuang, Hongyan Bao, Xiangliang Zhang:
Attack-free Evaluating and Enhancing Adversarial Robustness on Categorical Data. ICML 2024 - [c62]Pin Xu, Yanyi Li, Yufei Han, Haoyuan Chen, Kuan Li, Jianping Yin:
Leveraging Sample Complementarity: A Novel Ensemble Strategy. IJCNN 2024: 1-8 - [c61]Xiaoting Lyu
, Yufei Han
, Wei Wang
, Hangwei Qian
, Ivor W. Tsang
, Xiangliang Zhang
:
Cross-Context Backdoor Attacks against Graph Prompt Learning. KDD 2024: 2094-2105 - [c60]Helene Orsini, Yufei Han:
DYNAMO: Towards Network Attack Campaign Attribution via Density-Aware Active Learning. SECRYPT 2024: 91-102 - [c59]Natan Talon, Valérie Viet Triem Tong, Gilles Guette, Yufei Han, Youssef Laarouchi:
SCWAD: Automated Pentesting of Web Applications. SECRYPT 2024: 424-433 - [c58]Mohammad Naseri, Yufei Han, Emiliano De Cristofaro:
BadVFL: Backdoor Attacks in Vertical Federated Learning. SP 2024: 2013-2028 - [c57]Xiaoting Lyu, Yufei Han, Wei Wang, Jingkai Liu, Yongsheng Zhu, Guangquan Xu, Jiqiang Liu, Xiangliang Zhang:
Lurking in the shadows: Unveiling Stealthy Backdoor Attacks against Personalized Federated Learning. USENIX Security Symposium 2024 - [i26]Xiaodong Wu, Yufei Han, Hayssam Dahrouj, Jianbing Ni, Zhenwen Liang, Xiangliang Zhang:
Manipulating Predictions over Discrete Inputs in Machine Teaching. CoRR abs/2401.17865 (2024) - [i25]Yujun Zhou, Yufei Han, Haomin Zhuang, Taicheng Guo, Kehan Guo, Zhenwen Liang, Hongyan Bao, Xiangliang Zhang:
Defending Jailbreak Prompts via In-Context Adversarial Game. CoRR abs/2402.13148 (2024) - [i24]Xiaoting Lyu, Yufei Han, Wei Wang, Hangwei Qian, Ivor W. Tsang, Xiangliang Zhang:
Cross-Context Backdoor Attacks against Graph Prompt Learning. CoRR abs/2405.17984 (2024) - [i23]Xiaoting Lyu, Yufei Han, Wei Wang, Jingkai Liu, Yongsheng Zhu, Guangquan Xu, Jiqiang Liu, Xiangliang Zhang:
Lurking in the shadows: Unveiling Stealthy Backdoor Attacks against Personalized Federated Learning. CoRR abs/2406.06207 (2024) - [i22]Yufei Han, Heng Guo, Koki Fukai, Hiroaki Santo, Boxin Shi, Fumio Okura, Zhanyu Ma, Yunpeng Jia:
NeRSP: Neural 3D Reconstruction for Reflective Objects with Sparse Polarized Images. CoRR abs/2406.07111 (2024) - 2023
- [j13]Xiangrui Xu
, Pengrui Liu, Wei Wang
, Hongliang Ma, Bin Wang
, Zhen Han
, Yufei Han:
CGIR: Conditional Generative Instance Reconstruction Attacks Against Federated Learning. IEEE Trans. Dependable Secur. Comput. 20(6): 4551-4563 (2023) - [j12]Chu Zhou
, Yufei Han, Minggui Teng
, Jin Han, Si Li
, Chao Xu
, Boxin Shi
:
Polarization Guided HDR Reconstruction via Pixel-Wise Depolarization. IEEE Trans. Image Process. 32: 1774-1787 (2023) - [c56]Hongyan Bao
, Yufei Han, Yujun Zhou
, Xin Gao, Xiangliang Zhang
:
Towards Efficient and Domain-Agnostic Evasion Attack with High-Dimensional Categorical Inputs. AAAI 2023: 6753-6761 - [c55]Xiaoting Lyu, Yufei Han, Wei Wang, Jingkai Liu, Bin Wang, Jiqiang Liu, Xiangliang Zhang:
Poisoning with Cerberus: Stealthy and Colluded Backdoor Attack against Federated Learning. AAAI 2023: 9020-9028 - [c54]Savino Dambra
, Yufei Han
, Simone Aonzo
, Platon Kotzias
, Antonino Vitale
, Juan Caballero
, Davide Balzarotti
, Leyla Bilge
:
Decoding the Secrets of Machine Learning in Malware Classification: A Deep Dive into Datasets, Feature Extraction, and Model Performance. CCS 2023: 60-74 - [c53]Yufei Han, Chaofan Li, Tianrui Li, Fan Zhang:
A Multi-task Bearing Fault Diagnosis Method Based on Multi-scale Residual CNN with Dual Attention. ISKE 2023: 374-381 - [c52]Yanyi Li, Pin Xu, Haoyuan Chen, Yufei Han, Guojian Xiao, Kuan Li, Jianping Yin:
Coordinated Reconstruction Dual-Branch Network for Low-Dose PET Reconstruction. NCTCS 2023: 190-200 - [c51]Haoyuan Chen, Yufei Han, Yanyi Li, Pin Xu, Kuan Li, Jianping Yin:
MS-UNet: Swin Transformer U-Net with Multi-scale Nested Decoder for Medical Image Segmentation with Small Training Data. PRCV (13) 2023: 472-483 - [c50]Maxime Lanvin
, Pierre-François Gimenez
, Yufei Han
, Frédéric Majorczyk
, Ludovic Mé
, Eric Totel
:
Towards Understanding Alerts raised by Unsupervised Network Intrusion Detection Systems. RAID 2023: 135-150 - [c49]Vincent Raulin, Pierre-François Gimenez, Yufei Han, Valérie Viet Triem Tong:
BAGUETTE: Hunting for Evidence of Malicious Behavior in Dynamic Analysis Reports. SECRYPT 2023: 417-424 - [c48]Simone Aonzo, Yufei Han, Alessandro Mantovani, Davide Balzarotti:
Humans vs. Machines in Malware Classification. USENIX Security Symposium 2023: 1145-1162 - [i21]Mohammad Naseri, Yufei Han, Emiliano De Cristofaro:
BadVFL: Backdoor Attacks in Vertical Federated Learning. CoRR abs/2304.08847 (2023) - [i20]Savino Dambra, Yufei Han, Simone Aonzo, Platon Kotzias, Antonino Vitale, Juan Caballero, Davide Balzarotti, Leyla Bilge:
Decoding the Secrets of Machine Learning in Malware Classification: A Deep Dive into Datasets, Feature Extraction, and Model Performance. CoRR abs/2307.14657 (2023) - [i19]Haoyuan Chen, Yufei Han, Pin Xu, Yanyi Li, Kuan Li, Jianping Yin:
MS-UNet-v2: Adaptive Denoising Method and Training Strategy for Medical Image Segmentation with Small Training Data. CoRR abs/2309.03686 (2023) - [i18]Jing Cui, Yufei Han, Yuzhe Ma, Jianbin Jiao, Junge Zhang:
BadRL: Sparse Targeted Backdoor Attack Against Reinforcement Learning. CoRR abs/2312.12585 (2023) - 2022
- [j11]Fabien Charmet
, Harry Chandra Tanuwidjaja, Solayman Ayoubi
, Pierre-François Gimenez, Yufei Han, Houda Jmila, Gregory Blanc, Takeshi Takahashi, Zonghua Zhang:
Explainable artificial intelligence for cybersecurity: a literature survey. Ann. des Télécommunications 77(11-12): 789-812 (2022) - [j10]Yufei Han
, Yao Li:
Mixed Error Variable Step-Size Algorithm with Constrained Function. Circuits Syst. Signal Process. 41(9): 5307-5318 (2022) - [j9]Yufei Han
, Yibo Li, Yao Li:
Variable Tap-Length Algorithm Based on a Mixed Error Cost Function. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 105-A(6): 1006-1009 (2022) - [c47]Helene Orsini, Hongyan Bao
, Yujun Zhou
, Xiangrui Xu, Yufei Han, Longyang Yi
, Wei Wang, Xin Gao
, Xiangliang Zhang
:
AdvCat: Domain-Agnostic Robustness Assessment for Cybersecurity-Critical Applications with Categorical Inputs. IEEE Big Data 2022: 1060-1069 - [c46]Mohammad Naseri, Yufei Han, Enrico Mariconti
, Yun Shen, Gianluca Stringhini, Emiliano De Cristofaro:
CERBERUS: Exploring Federated Prediction of Security Events. CCS 2022: 2337-2351 - [c45]Yun Shen, Yufei Han, Zhikun Zhang, Min Chen
, Ting Yu, Michael Backes, Yang Zhang
, Gianluca Stringhini:
Finding MNEMON: Reviving Memories of Node Embeddings. CCS 2022: 2643-2657 - [c44]Maxime Lanvin, Pierre-François Gimenez, Yufei Han, Frédéric Majorczyk, Ludovic Mé, Eric Totel:
Errors in the CICIDS2017 Dataset and the Significant Differences in Detection Performances It Makes. CRiSIS 2022: 18-33 - [c43]Zichen Zhu, Siqiang Luo
, Xiaokui Xiao, Yin Yang, Dingheng Mo, Yufei Han:
VC-Tune: Tuning and Exploring Distributed Vertex-Centric Graph Systems. ICDE 2022: 3142-3145 - [c42]Hongyan Bao, Yufei Han, Yujun Zhou, Yun Shen, Xiangliang Zhang:
Towards Understanding the Robustness Against Evasion Attack on Categorical Data. ICLR 2022 - [c41]Yufei Han, Haoyuan Chen, Pin Xu, Yanyi Li, Kuan Li, Jianping Yin:
Hybrid Pre-training Based on Masked Autoencoders for Medical Image Segmentation. NCTCS 2022: 175-182 - [c40]Yun Shen, Xinlei He, Yufei Han, Yang Zhang
:
Model Stealing Attacks Against Inductive Graph Neural Networks. SP 2022: 1175-1192 - [i17]Yun Shen, Yufei Han, Zhikun Zhang, Min Chen, Ting Yu, Michael Backes, Yang Zhang
, Gianluca Stringhini:
Finding MNEMON: Reviving Memories of Node Embeddings. CoRR abs/2204.06963 (2022) - [i16]Mohammad Naseri, Yufei Han, Enrico Mariconti, Yun Shen, Gianluca Stringhini, Emiliano De Cristofaro:
Cerberus: Exploring Federated Prediction of Security Events. CoRR abs/2209.03050 (2022) - [i15]Hongyan Bao, Yufei Han, Yujun Zhou, Xin Gao, Xiangliang Zhang:
Towards Efficient and Domain-Agnostic Evasion Attack with High-dimensional Categorical Inputs. CoRR abs/2212.06836 (2022) - [i14]Helene Orsini, Hongyan Bao, Yujun Zhou, Xiangrui Xu, Yufei Han, Longyang Yi, Wei Wang, Xin Gao, Xiangliang Zhang:
AdvCat: Domain-Agnostic Robustness Assessment for Cybersecurity-Critical Applications with Categorical Inputs. CoRR abs/2212.13989 (2022) - 2021
- [c39]Zhuo Yang, Yufei Han, Xiangliang Zhang
:
Characterizing the Evasion Attackability of Multi-label Classifiers. AAAI 2021: 10647-10655 - [c38]Yufei Han, Kevin Alejandro Roundy, Acar Tamersoy:
Towards Stalkerware Detection with Precise Warnings. ACSAC 2021: 957-969 - [c37]Chuyu Jiang, Yuejin Zhang, Yufei Han:
Do Bond Investors Care about Margin Trading and Securities lending?: - - An Empirical Study Based on Secondary Market of Medium Term Notes. ITQM 2021: 613-620 - [c36]Alexander Küchler, Alessandro Mantovani, Yufei Han, Leyla Bilge, Davide Balzarotti:
Does Every Second Count? Time-based Evolution of Malware Behavior in Sandboxes. NDSS 2021 - [c35]Chu Zhou, Minggui Teng, Yufei Han, Chao Xu, Boxin Shi:
Learning to dehaze with polarization. NeurIPS 2021: 11487-11500 - [c34]Zhuo Yang, Yufei Han, Xiangliang Zhang
:
Attack Transferability Characterization for Adversarially Robust Multi-label Classification. ECML/PKDD (3) 2021: 397-413 - [c33]Yufei Han, Chuyu Jiang, Yanping Zeng:
Research on Influencing Factors of User Satisfaction of Knowledge Paid Products - from the Aspect of Heuristic-Systematic Model. WHICEB 2021: 49 - [i13]Zhuo Yang, Yufei Han, Xiangliang Zhang
:
Attack Transferability Characterization for Adversarially Robust Multi-label Classification. CoRR abs/2106.15360 (2021) - [i12]Yun Shen, Xinlei He, Yufei Han, Yang Zhang:
Model Stealing Attacks Against Inductive Graph Neural Networks. CoRR abs/2112.08331 (2021) - 2020
- [j8]Yun Lu
, Mingjiang Wang
, Wanqing Wu
, Qiquan Zhang, Yufei Han, Tasleem Kausar
, Shixiong Chen, Ming Liu
, Bo Wang:
Entropy-Based Pattern Learning Based on Singular Spectrum Analysis Components for Assessment of Physiological Signals. Complex. 2020: 4625218:1-4625218:17 (2020) - [j7]Min Pan, Lili Pang, Jiaye Xie, Yufei Han, Qiqing Xu:
A 0.6V 44.6 ppm/ºC subthreshold CMOS voltage reference with wide temperature range and inherent leakage compensation. Integr. 72: 111-122 (2020) - [j6]Yufei Han
, Mengqi Cui, Shaojun Liu
:
Optimal Sensor and Relay Nodes Power Scheduling for Remote State Estimation with Energy Constraint. Sensors 20(4): 1073 (2020) - [c32]Yufei Han, Xiangliang Zhang
:
Robust Federated Learning via Collaborative Machine Teaching. AAAI 2020: 4075-4082 - [c31]Giancarlo Fissore, Yufei Han, Aurélien Decelle, Cyril Furtlehner:
Robust Multi-Output Learning with Highly Incomplete Data via Restricted Boltzmann Machines. STAIRS@ECAI 2020 - [c30]Lili Pang, Jiaye Xie, Min Pan, Yufei Han:
Screening NLOS Anchor Nodes with Ellipsoid Constraint in 3D Positioning. EITCE 2020: 307-312 - [c29]Yutong Wang
, Yufei Han, Hongyan Bao
, Yun Shen, Fenglong Ma, Jin Li, Xiangliang Zhang
:
Attackability Characterization of Adversarial Evasion Attack on Discrete Data. KDD 2020: 1415-1425 - [c28]Uchenna Akujuobi
, Qiannan Zhang
, Yufei Han, Xiangliang Zhang
:
Recurrent Attention Walk for Semi-supervised Classification. WSDM 2020: 16-24 - [i11]Zhuo Yang, Yufei Han, Xiangliang Zhang
:
Characterizing the Evasion Attackability of Multi-label Classifiers. CoRR abs/2012.09427 (2020)
2010 – 2019
- 2019
- [c27]Uchenna Akujuobi
, Yufei Han, Qiannan Zhang
, Xiangliang Zhang
:
Collaborative Graph Walk for Semi-Supervised Multi-label Node Classification. ICDM 2019: 1-10 - [c26]Yun Lu, Mingjiang Wang, Wanqing Wu, Qiquan Zhang, Yufei Han, Ming Liu:
Identification of Emotional Valences via Memory-Informed Deep Neural Network with Entropy Features. ICMSSP 2019: 31-35 - [c25]Yufei Han, Yuzhe Ma, Christopher Gates, Kevin A. Roundy, Yun Shen:
Collaborative and Privacy-Preserving Machine Teaching via Consensus Optimization. IJCNN 2019: 1-8 - [i10]Yufei Han, Yuzhe Ma, Christopher Gates, Kevin A. Roundy, Yun Shen:
Collaborative and Privacy-Preserving Machine Teaching via Consensus Optimization. CoRR abs/1905.02796 (2019) - [i9]Yufei Han, Xiangliang Zhang
:
Robust Federated Training via Collaborative Machine Teaching using Trusted Instances. CoRR abs/1905.02941 (2019) - [i8]Uchenna Akujuobi
, Yufei Han, Qiannan Zhang
, Xiangliang Zhang
:
Collaborative Graph Walk for Semi-supervised Multi-Label Node Classification. CoRR abs/1910.09706 (2019) - [i7]Uchenna Akujuobi
, Qiannan Zhang
, Yufei Han, Xiangliang Zhang
:
Recurrent Attention Walk for Semi-supervised Classification. CoRR abs/1910.10266 (2019) - [i6]Zhuo Yang, Yufei Han, Guoxian Yu, Xiangliang Zhang:
Prototypical Networks for Multi-Label Learning. CoRR abs/1911.07203 (2019) - [i5]Giancarlo Fissore, Aurélien Decelle
, Cyril Furtlehner, Yufei Han:
Robust Multi-Output Learning with Highly Incomplete Data via Restricted Boltzmann Machines. CoRR abs/1912.09382 (2019) - 2018
- [j5]Yufei Han
, Mingjiang Wang
, Ming Liu:
An improved variable tap-length algorithm with adaptive parameters. Digit. Signal Process. 74: 111-118 (2018) - [j4]Yun Lu
, Mingjiang Wang
, Qiquan Zhang, Yufei Han:
Identification of Auditory Object-Specific Attention from Single-Trial Electroencephalogram Signals via Entropy Measures and Machine Learning. Entropy 20(5): 386 (2018) - [c24]Yufei Han, Guolei Sun
, Yun Shen, Xiangliang Zhang
:
Multi-label Learning with Highly Incomplete Data via Collaborative Embedding. KDD 2018: 1494-1503 - 2017
- [j3]Yufei Han
, Mingjiang Wang, Boya Zhao:
Variable Tap-Length NLMS Algorithm with Adaptive Parameter. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(8): 1720-1723 (2017) - [j2]Shenle Pan
, Vaggelis Giannikas
, Yufei Han, Etta Grover-Silva, Bin Qiao:
Using customer-related data to enhance e-grocery home delivery. Ind. Manag. Data Syst. 117(9): 1917-1933 (2017) - [c23]Gianluca Stringhini, Yun Shen, Yufei Han, Xiangliang Zhang
:
Marmite: Spreading Malicious File Reputation Through Download Graphs. ACSAC 2017: 91-102 - [c22]Shang-Tse Chen, Yufei Han, Duen Horng Chau
, Christopher S. Gates, Michael Hart, Kevin A. Roundy:
Predicting Cyber Threats with Virtual Security Products. ACSAC 2017: 189-199 - [c21]Leyla Bilge, Yufei Han, Matteo Dell'Amico
:
RiskTeller: Predicting the Risk of Cyber Incidents. CCS 2017: 1299-1311 - [c20]Yufei Han, Maurizio Filippone
:
Mini-batch spectral clustering. IJCNN 2017: 3888-3895 - 2016
- [j1]Yufei Han, Fabien Moutarde
:
Analysis of Large-Scale Traffic Dynamics in an Urban Transportation Network Using Non-Negative Tensor Factorization. Int. J. Intell. Transp. Syst. Res. 14(1): 36-49 (2016) - [c19]Ibrahim M. Alabdulmohsin
, Yufei Han, Yun Shen, Xiangliang Zhang
:
Content-Agnostic Malware Detection in Heterogeneous Malicious Distribution Graph. CIKM 2016: 2395-2400 - [c18]Yufei Han, Yun Shen:
Partially Supervised Graph Embedding for Positive Unlabelled Feature Selection. IJCAI 2016: 1548-1554 - [c17]Yufei Han, Yun Shen:
Accurate spear phishing campaign attribution and early detection. SAC 2016: 2079-2086 - [i4]Yufei Han, Yun Shen, Maurizio Filippone:
Mini-Batch Spectral Clustering. CoRR abs/1607.02024 (2016) - 2014
- [c16]Yufei Han, Xiaolan Sha, Etta Grover-Silva, Pietro Michiardi:
On the impact of socio-economic factors on power load forecasting. IEEE BigData 2014: 742-747 - [c15]Victorin Martin, Cyril Furtlehner, Yufei Han, Jean-Marc Lasgouttes:
GMRF Estimation under Topological and Spectral Constraints. ECML/PKDD (2) 2014: 370-385 - 2012
- [i3]Cyril Furtlehner, Yufei Han, Jean-Marc Lasgouttes, Victorin Martin:
Pairwise MRF Calibration by Perturbation of the Bethe Reference Point. CoRR abs/1210.5338 (2012) - [i2]Yufei Han, Fabien Moutarde:
Analysis of Large-scale Traffic Dynamics using Non-negative Tensor Factorization. CoRR abs/1212.4675 (2012) - [i1]Yufei Han, Fabien Moutarde:
Statistical Traffic State Analysis in Large-scale Transportation Networks Using Locality-Preserving Non-negative Matrix Factorization. CoRR abs/1212.5264 (2012) - 2011
- [c14]Yufei Han, Fabien Moutarde
:
Analysis of network-level traffic states using locality preservative non-negative matrix factorization. ITSC 2011: 501-506 - 2010
- [c13]Xiaogang Song, Xinjian Shan, Chunyan Qu, Yufei Han, Guifang Zhang, Limin Guo, Guohong Zhang:
The characteristics of post-seismic surface deformation of the Wenchuan MS8.0 earthquake from InSAR. IGARSS 2010: 1210-1213 - [c12]Cyril Furtlehner, Yufei Han, Jean-Marc Lasgouttes, Victorin Martin, Fabrice Marchal, Fabien Moutarde
:
Spatial and temporal analysis of traffic states on large scale networks. ITSC 2010: 1215-1220
2000 – 2009
- 2009
- [c11]Yufei Han, Tieniu Tan, Zhenan Sun:
Accurate Palmprint Recognition Using Spatial Bags of Local Layered Descriptors. ICB 2009: 566-576 - [c10]Yufei Han, Zhenan Sun, Tieniu Tan, Ying Hao:
Palmprint Recognition Based on Regional Rank Correlation of Directional Features. ICB 2009: 587-596 - [c9]Yufei Han, Zhenan Sun, Tieniu Tan:
Palmprint recognition using coarse-to-fine statistical image representation. ICIP 2009: 1969-1972 - 2008
- [c8]Zhuoshi Wei, Yufei Han, Zhenan Sun, Tieniu Tan:
Palmprint image synthesis: A preliminary study. ICIP 2008: 285-288 - [c7]Yufei Han, Zhenan Sun, Tieniu Tan:
Combine hierarchical appearance statistics for accurate palmprint recognition. ICPR 2008: 1-4 - 2007
- [c6]Yufei Han, Zhenan Sun, Fei Wang, Tieniu Tan:
Palmprint Recognition Under Unconstrained Scenes. ACCV (2) 2007: 1-11 - [c5]Rufeng Chu, Zhen Lei, Yufei Han, Ran He, Stan Z. Li:
Learning Gabor Magnitude Features for Palmprint Recognition. ACCV (2) 2007: 22-31 - [c4]Rufeng Chu, Shengcai Liao
, Yufei Han, Zhenan Sun, Stan Z. Li, Tieniu Tan:
Fusion of Face and Palmprint for Personal Identification Based on Ordinal Features. CVPR 2007 - [c3]Ying Hao, Tieniu Tan, Zhenan Sun, Yufei Han:
Identity Verification by Using Handprint. ICB 2007: 328-337 - [c2]Yufei Han, Tieniu Tan, Zhenan Sun:
Palmprint Recognition Based on Directional Features and Graph Matching. ICB 2007: 1164-1173 - [c1]Yufei Han, Tieniu Tan, Zhenan Sun, Ying Hao:
Embedded Palmprint Recognition System on Mobile Devices. ICB 2007: 1184-1193
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-28 23:44 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint