default search action
Yuancheng Li
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j70]Qinghua Zhang, Hongwu Li, Yuan Tang, Yuancheng Li, Minghao Bai, Xianglong Li, Haotian Ju, Tianjiao Zheng, Mingzhu Lai, Jie Zhao, Yanhe Zhu:
Configuration Design and Analysis of Reconfigurable Supernumerary Robotic Legs for Multitask Adaptation: SuperLegs. Adv. Intell. Syst. 6(3) (2024) - [j69]Qing-Hua Zhang, Dongbao Sui, Hongwei Jing, Kerui Sun, Yuancheng Li, Xianglong Li, Haotian Ju, Yuan Tang, Mingzhu Lai, Jie Zhao, Yanhe Zhu:
Motion-Compensation Control of Supernumerary Robotic Arms Subject to Human-Induced Disturbances. Adv. Intell. Syst. 6(5) (2024) - [j68]Hui Chen, Liguang Zang, Yuancheng Li:
Node-Smoothness-Based Adaptive Initial Residual Deep Graph Convolutional Network. IEEE Internet Things J. 11(13): 23878-23888 (2024) - [j67]Liguang Zang, Yuancheng Li:
Detection and Mitigation of Label-Flipping Attacks in FL Systems With KL Divergence. IEEE Internet Things J. 11(19): 32221-32233 (2024) - [j66]Sardar Shan Ali Naqvi, Yuancheng Li, Muhammad Uzair:
DDoS attack detection in smart grid network using reconstructive machine learning models. PeerJ Comput. Sci. 10: e1784 (2024) - [j65]Jiawei Liu, Qingle Wang, Qingxia Mu, Yuancheng Li, Long Cheng, Wenqi Sun:
Advancing multi-party quantum key agreement protocols: the power of a two-layer approach. Quantum Inf. Process. 23(3): 97 (2024) - [j64]Zhiying Liu, Yuancheng Li, Qingle Wang, Jianbin Li:
TSCW-GAN Based FDIAs Defense for State-of-Charge Estimation of Battery Energy Storage Systems in Smart Distribution Networks. IEEE Trans. Ind. Informatics 20(4): 5048-5059 (2024) - [j63]Zhichao Ju, Yuancheng Li:
Local Differential Privacy-Based Privacy-Preserving Data Range Query Scheme for Electric Vehicle Charging. IEEE Trans. Netw. Sci. Eng. 11(1): 673-684 (2024) - [j62]Zhichao Ju, Yuancheng Li:
V2V-ESP: Vehicle-to-Vehicle Energy Sharing Privacy Protection Scheme Based on SDP Algorithm. IEEE Trans. Netw. Sci. Eng. 11(1): 1093-1105 (2024) - [c28]Sardar Shan Ali Naqvi, Yuancheng Li, Muhammad Uzair:
DDoS Attack Detection in Smart Grid Networks Using Visual Features. ICCR 2024: 1-5 - [c27]Yuancheng Li, Yalei Hou, Yehui Xie, Mingwei Sheng, Mei Wang, Tian Ma:
Enhancing Non-Coal Object Recognition Using Deep Learning on Conveyor Belts. SPML 2024: 67-74 - [c26]Tian Ma, Wenna Zhu, Weilu Shi, Jiahui Li, Yuancheng Li:
Deep learning-based method for recognizing violation behaviors of underground personnel. SPML 2024: 82-87 - [i5]Tian Ma, Chuyang Shang, Wanzhu Ren, Yuancheng Li, Jiayi Yang, Jiali Qian:
Sparse Generation: Making Pseudo Labels Sparse for weakly supervision with points. CoRR abs/2403.19306 (2024) - [i4]Linqing Chen, Weilei Wang, Zilong Bai, Peng Xu, Yan Fang, Jie Fang, Wentao Wu, Lizhi Zhou, Ruiji Zhang, Yubin Xia, Chaobo Xu, Ran Hu, Licong Xu, Qijun Cai, Haoran Hua, Jing Sun, Jin Liu, Tian Qiu, Haowen Liu, Meng Hu, Xiuwen Li, Fei Gao, Yufu Wang, Lin Tie, Chaochao Wang, Jianping Lu, Cheng Sun, Yixin Wang, Shengjie Yang, Yuancheng Li, Lu Jin, Lisha Zhang, Fu Bian, Changyang Tu:
PharmGPT: Domain-Specific Large Language Models for Bio-Pharmaceutical and Chemistry. CoRR abs/2406.18045 (2024) - 2023
- [j61]Yuancheng Li, Na Wang, Mingwei Sheng, Jiaqi Shi:
Automatic Compilation of CNN on Reconfigurable Array Processor Based on Scalable Instruction Group Library. IEEE Access 11: 116752-116761 (2023) - [j60]Hui Chen, Yuancheng Li:
Multi-constraints in deep graph convolutional networks with initial residual. Appl. Intell. 53(11): 13608-13620 (2023) - [j59]Yuancheng Li, Chaohang Yu, Yaqi Cui:
TPCaps: a framework for code clone detection and localization based on improved CapsNet. Appl. Intell. 53(13): 16594-16605 (2023) - [j58]Yuancheng Li, Yongtai Qin:
Real-Time Cost Optimization Approach Based on Deep Reinforcement Learning in Software-Defined Security Middle Platform. Inf. 14(4): 209 (2023) - [j57]Mei Wang, Hao Cheng, Yuancheng Li, Hongguang Pan, Gang Wang, Yuan Guo:
Vision mechanism model using brain-computer interface for light sensing. Int. J. Mach. Learn. Cybern. 14(8): 2709-2722 (2023) - [j56]Liguang Zang, Yuancheng Li, Hui Chen:
Multilabel Recognition Algorithm With Multigraph Structure. IEEE Trans. Circuits Syst. Video Technol. 33(2): 782-792 (2023) - [j55]Mei Wang, Jiang Wang, Yuancheng Li, Huimin Lu:
Edge Computing With Complementary Capsule Networks for Mental State Detection in Underground Mining Industry. IEEE Trans. Ind. Informatics 19(7): 8508-8517 (2023) - [j54]Rixuan Qiu, Jiawen Bao, Yuancheng Li, Xin Zhou, Liang Liang, Hui Tian, Yanting Zeng, Jie Shi:
Virtual network function deployment algorithm based on graph convolution deep reinforcement learning. J. Supercomput. 79(6): 6849-6870 (2023) - [j53]Rong Huang, Yuancheng Li:
Adversarial Attack Mitigation Strategy for Machine Learning-Based Network Attack Detection Model in Power System. IEEE Trans. Smart Grid 14(3): 2367-2376 (2023) - [c25]Xinkai Wang, Hao He, Yuancheng Li, Chao Li, Xiaofeng Hou, Jing Wang, Quan Chen, Jingwen Leng, Minyi Guo, Leibo Wang:
Not All Resources are Visible: Exploiting Fragmented Shadow Resources in Shared-State Scheduler Architecture. SoCC 2023: 109-124 - [c24]Lin Jiang, Shuai Liu, Jiayang Zhu, Rui Shan, Yuancheng Li:
Dynamic Multi-bit Parallel Computing Method Based on Reconfigurable Structure. ICA3PP (2) 2023: 347-359 - 2022
- [j52]Yuancheng Li, Shenglong Zhou, Hui Chen:
Attention-based fusion factor in FPN for object detection. Appl. Intell. 52(13): 15547-15556 (2022) - [j51]Haiqing Liu, Ming Ai, Rong Huang, Rixuan Qiu, Yuancheng Li:
Identity authentication for edge devices based on zero-trust architecture. Concurr. Comput. Pract. Exp. 34(23) (2022) - [j50]Hui Chen, Hao Mao, Yuancheng Li:
Elliptical convolution kernel: More real visual field. Neurocomputing 492: 107-116 (2022) - [j49]Mei Wang, Wenbin Chai, Changfeng Xu, Lihong Dong, Yuancheng Li, Pai Wang, Xuebin Qin:
An edge computing method using a novel mode component for power transmission line fault diagnosis in distribution network. J. Ambient Intell. Humaniz. Comput. 13(11): 5163-5176 (2022) - [j48]Yuancheng Li, Haiyan Hou:
An Improved PMU Data Manipulation Attack Model. J. Circuits Syst. Comput. 31(5): 2250089:1-2250089:23 (2022) - [j47]Tian Ma, Yizhou Yang, Yun Li, Zhanli Li, Yuancheng Li:
An Efficient Method of Tooth Segmentation Under Massive Medical Data. J. Database Manag. 33(2): 1-22 (2022) - [j46]Long Cheng, Archana Kalapgar, Amogh Jain, Yue Wang, Yongtai Qin, Yuancheng Li, Cong Liu:
Cost-aware real-time job scheduling for hybrid cloud using deep reinforcement learning. Neural Comput. Appl. 34(21): 18579-18593 (2022) - [j45]Mingming Meng, Yuancheng Li:
SFedChain: blockchain-based federated learning scheme for secure data sharing in distributed energy storage networks. PeerJ Comput. Sci. 8: e1027 (2022) - [j44]Tian Ma, Jiahao Lyu, Jiayi Yang, Runtao Xi, Yuancheng Li, Jinpeng An, Chao Li:
CLSQL: Improved Q-Learning Algorithm Based on Continuous Local Search Policy for Mobile Robot Path Planning. Sensors 22(15): 5910 (2022) - [j43]Yifeng Huang, Long Cheng, Lianting Xue, Cong Liu, Yuancheng Li, Jianbin Li, Tomás Ward:
Deep Adversarial Imitation Reinforcement Learning for QoS-Aware Cloud Job Scheduling. IEEE Syst. J. 16(3): 4232-4242 (2022) - [j42]Mei Wang, Chen Ma, Li Zhan-Li, Siming Zhang, Yuancheng Li:
Alertness Estimation Using Connection Parameters of the Brain Network. IEEE Trans. Intell. Transp. Syst. 23(12): 25448-25457 (2022) - [j41]Rong Huang, Yuancheng Li:
False Phasor Data Detection Under Time Synchronization Attacks: A Neural Network Approach. IEEE Trans. Smart Grid 13(6): 4828-4836 (2022) - [j40]Yuancheng Li, Rongyan Yang:
Edge Computing Offloading Strategy Based on Dynamic Non-cooperative Games in D-IoT. Wirel. Pers. Commun. 122(1): 109-127 (2022) - [c23]Rixuan Qiu, Yongtai Qin, Yuancheng Li, Xin Zhou, Junfeng Fu, Wei Li, Juan Yan, Jie Shi:
A software-defined security middle platform architecture. CSSE 2022: 647-651 - 2021
- [j39]Tian Ma, Ming Guo, Zhenhua Yu, Yanping Chen, Xincheng Ren, Runtao Xi, Yuancheng Li, Xinlei Zhou:
RetinexGAN: Unsupervised Low-Light Enhancement With Two-Layer Convolutional Decomposition Networks. IEEE Access 9: 56539-56550 (2021) - [j38]Mei Wang, Ziyang Huang, Yuancheng Li, Lihong Dong, Hongguang Pan:
Maximum weight multi-modal information fusion algorithm of electroencephalographs and face images for emotion recognition. Comput. Electr. Eng. 94: 107319 (2021) - [j37]Yuancheng Li, Tianwei Zheng, Mei Wang, Lihong Dong, Pai Wang, Xuebin Qin:
A coloring and timing brain-computer interface for the nursing bed robot. Comput. Electr. Eng. 95: 107415 (2021) - [j36]Qingle Wang, Chaohang Yu, Yuancheng Li, Jiangshan Liu, Runhua Shi, Yuqian Zhou:
Authenticated Quantum Sortition and Application in "Picking at Random" Problems. IEEE Commun. Lett. 25(2): 518-522 (2021) - [j35]Yuancheng Li, Rong Huang, Longqiang Ma:
False Data Injection Attack and Defense Method on Load Frequency Control. IEEE Internet Things J. 8(4): 2910-2919 (2021) - [j34]Yuancheng Li, Rong Huang, Longqiang Ma:
Hierarchical-Attention-Based Defense Method for Load Frequency Control System Against DoS Attack. IEEE Internet Things J. 8(20): 15522-15530 (2021) - [j33]Haiqing Liu, Daoxing Li, Yuancheng Li:
Confident sequence learning: A sequence class-label noise filtering technique to improve scene digit recognition. J. Intell. Fuzzy Syst. 40(5): 9345-9359 (2021) - [j32]Guixian Wu, Yuancheng Li:
Non-maximum suppression for object detection based on the chaotic whale optimization algorithm. J. Vis. Commun. Image Represent. 74: 102985 (2021) - [j31]Guixian Wu, Yuancheng Li:
CyclicNet: an alternately updated network for semantic segmentation. Multim. Tools Appl. 80(2): 3213-3227 (2021) - [j30]Haiqing Liu, Daoxing Li, Yuancheng Li:
Poisonous Label Attack: Black-Box Data Poisoning Attack with Enhanced Conditional DCGAN. Neural Process. Lett. 53(6): 4117-4142 (2021) - [j29]Rixuan Qiu, Xiong Liu, Rong Huang, Fuyong Zheng, Liang Liang, Yuancheng Li:
Differential privacy EV charging data release based on variable window. PeerJ Comput. Sci. 7: e481 (2021) - [j28]Qingle Wang, Yuancheng Li, Chaohang Yu, Runhua Shi, Zhichao Zhang:
Quantum-based anonymity and secure veto. Quantum Inf. Process. 20(3): 85 (2021) - [j27]Qingle Wang, Jiangshan Liu, Yuancheng Li, Chaohang Yu, Shijie Pan:
Quantum Bell states-based anonymous voting with anonymity trace. Quantum Inf. Process. 20(4): 142 (2021) - [j26]Yuancheng Li, Baiji Hu:
A Consortium Blockchain-Enabled Secure and Privacy-Preserving Optimized Charging and Discharging Trading Scheme for Electric Vehicles. IEEE Trans. Ind. Informatics 17(3): 1968-1977 (2021) - [c22]Jincai Zhang, Mei Wang, Yuancheng Li:
Support Vector Machine of Particle Swarm Optimization For Motor Imagery Recognition using Feature Fusion. ICCPR 2021: 51-57 - [c21]Lianting Xue, Long Cheng, Yuancheng Li, Ying Mao:
Quantum Machine Learning for Electricity Theft Detection: an Initial Investigation. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2021: 204-208 - 2020
- [j25]Yuancheng Li, Wendan Huo, Rixuan Qiu, Jing Zeng:
Efficient detection of false data injection attack with invertible automatic encoder and long-short-term memory. IET Cyper-Phys. Syst.: Theory & Appl. 5(1): 110-118 (2020) - [j24]Yuancheng Li, Boyan Wang, Baiji Hu:
Semantically find similar binary codes with mixed key instruction sequence. Inf. Softw. Technol. 125: 106320 (2020) - [j23]Yuancheng Li, Haiyan Hou, Wenping Chen:
A privacy-preserving multi-keyword ranked retrieval scheme in cloud computing. Inf. Secur. J. A Glob. Perspect. 29(6): 284-296 (2020) - [j22]Yuancheng Li, Yuanyuan Wang:
Developing graphical detection techniques for maintaining state estimation integrity against false data injection attack in integrated electric cyber-physical system. J. Syst. Archit. 105: 101705 (2020) - [j21]Qingle Wang, Yuancheng Li, Chaohang Yu, Hui He, Kejia Zhang:
Quantum anonymous ranking and selection with verifiability. Quantum Inf. Process. 19(5): 166 (2020) - [j20]Yuancheng Li, Yuanyuan Wang, Shiyan Hu:
Online Generative Adversary Network Based Measurement Recovery in False Data Injection Attacks: A Cyber-Physical Approach. IEEE Trans. Ind. Informatics 16(3): 2031-2043 (2020) - [j19]Yuancheng Li, Baiji Hu:
An Iterative Two-Layer Optimization Charging and Discharging Trading Scheme for Electric Vehicle Using Consortium Blockchain. IEEE Trans. Smart Grid 11(3): 2627-2637 (2020)
2010 – 2019
- 2019
- [j18]Yuancheng Li, Yuanyuan Wang:
False Data Injection Attacks With Incomplete Network Topology Information in Smart Grid. IEEE Access 7: 3656-3664 (2019) - [j17]Yuancheng Li, Pan Zhang, Rong Huang:
Lightweight Quantum Encryption for Secure Transmission of Power Data in Smart Grid. IEEE Access 7: 36285-36293 (2019) - [j16]Jiyan Qiu, Bin Liu, Jinrong He, Chaoyang Liu, Yuancheng Li:
Parallel Fast Pencil Drawing Generation Algorithm Based on GPU. IEEE Access 7: 83543-83555 (2019) - [j15]Shan Ali, Yuancheng Li:
Learning Multilevel Auto-Encoders for DDoS Attack Detection in Smart Grid Network. IEEE Access 7: 108647-108659 (2019) - [j14]Haiqing Liu, Yan Zhang, Shiqiang Zheng, Yuancheng Li:
Electric Vehicle Power Trading Mechanism Based on Blockchain and Smart Contract in V2G Network. IEEE Access 7: 160546-160558 (2019) - [j13]Yuancheng Li, Yimeng Wang, Daoxing Li:
Privacy-preserving lightweight face recognition. Neurocomputing 363: 212-222 (2019) - [j12]Yuancheng Li, Yuanyuan Wang, Shuhua Hao, Xiaoyu Zhao:
Intelligent terminal face spoofing detection algorithm based on deep belief network. J. Electronic Imaging 28(4): 043024 (2019) - [j11]Yuancheng Li, Pan Zhang, Longqiang Ma:
Denial of service attack and defense method on load frequency control system. J. Frankl. Inst. 356(15): 8625-8645 (2019) - [j10]Xiaolong Xu, Yuancheng Li, Tao Huang, Yuan Xue, Kai Peng, Lianyong Qi, Wanchun Dou:
An energy-aware computation offloading method for smart edge computing in wireless metropolitan area networks. J. Netw. Comput. Appl. 133: 75-85 (2019) - [c20]Yuancheng Li, Jiaqi Shi:
CRbS: A Code Reordering Based Speeding-up Method of Irregular Loops on CMP. ASAP 2019: 34 - [c19]Xiao Qi, Bin Liu, Yuancheng Li, Yanning Du, Yuxiang Li, Dangdang Niu:
A Parallel BMH String Matching Algorithm Based on OpenMP. HPCC/SmartCity/DSS 2019: 75-81 - [c18]Tian Ma, Yun Li, Jiaojiao Li, Yuancheng Li:
A Deformation Method in a Wrapping Manner for Virtual Gingiva Based on Mass-Spring Model. ISMAR Adjunct 2019: 52-57 - [c17]Bin Liu, Hao Yang, Yuancheng Li, Yuxiang Li, Dangdang Niu, Zhiming Lv:
An Improved Programming Model for Thread-Level Speculation. ISPA/BDCloud/SocialCom/SustainCom 2019: 666-672 - [c16]Shixiong Cheng, Bin Liu, Dongjian He, Jinrong He, Yuancheng Li, Yanning Du:
A Parallel Retinex Image Enhancement Algorithm Based on OpenMP. NPC 2019: 376-381 - [i3]Abdelmonim Naway, Yuancheng Li:
Android Malware Detection Using Autoencoder. CoRR abs/1901.07315 (2019) - [i2]Abdelmonim Naway, Yuancheng Li:
Using Deep Neural Network for Android Malware Detection. CoRR abs/1904.00736 (2019) - 2018
- [j9]Haiqing Liu, Shiqiang Zheng, Shuhua Hao, Yuancheng Li:
Multifeature Fusion Detection Method for Fake Face Attack in Identity Authentication. Adv. Multim. 2018: 9025458:1-9025458:10 (2018) - [j8]Yuancheng Li, Xiangqian Nie, Rong Huang:
Web spam classification method based on deep belief networks. Expert Syst. Appl. 96: 261-270 (2018) - [j7]Yuancheng Li, Boyan Wang, Wenping Chen:
A Multi-Keywords Ranking Searchable Encryption Based on Similarity in Cloud Computing. J. Inf. Hiding Multim. Signal Process. 9(3): 669-679 (2018) - [j6]Xiaolong Xu, Rui Huang, Ruihan Dou, Yuancheng Li, Jie Zhang, Tao Huang, Wenbin Yu:
Energy-Efficient Cloudlet Management for Privacy Preservation in Wireless Metropolitan Area Networks. Secur. Commun. Networks 2018: 8180451:1-8180451:13 (2018) - [c15]Xiaolong Xu, Yuancheng Li, Yuan Yuan, Kai Peng, Wenbin Yu, Wanchun Dou, Alex X. Liu:
An Energy-Aware Virtual Machine Scheduling Method for Cloudlets in Wireless Metropolitan Area Networks. iThings/GreenCom/CPSCom/SmartData 2018: 517-523 - [i1]Abdelmonim Naway, Yuancheng Li:
A Review on The Use of Deep Learning in Android Malware Detection. CoRR abs/1812.10360 (2018) - 2017
- [j5]Yuancheng Li, Yan Li:
Face aging effect simulation model based on multilayer representation and shearlet transform. J. Electronic Imaging 26(5): 53011 (2017) - [c14]Yuancheng Li, Bin Liu:
Exploring thread-level parallelism based on cost-driven model for irregular programs. ICSPCC 2017: 1-6 - 2016
- [j4]Yuancheng Li, Panpan Guo, Xiang Li:
Short-Term Load Forecasting Based on the Analysis of User Electricity Behavior. Algorithms 9(4): 80 (2016) - 2012
- [c13]Yanning Du, Yinliang Zhao, Bo Han, Yuancheng Li:
A Data Structure Centric Method and Execution Model for Partitioning Sequential Programs into Multiple Speculative Threads. HPCC-ICESS 2012: 556-563 - 2011
- [c12]Yuancheng Li, Yinliang Zhao, Peipei Yin, Yanning Du:
Speculative Thread Partitioning Using Fuzzy C-means Clustering. CSE 2011: 199-206 - 2010
- [j3]Yuancheng Li, Qiu Yang, Runhai Jiao:
Image compression scheme based on curvelet transform and support vector machine. Expert Syst. Appl. 37(4): 3063-3069 (2010) - [c11]Yuancheng Li, Yinliang Zhao, Yuanke Wei, Yanning Du:
A Cost Estimation Model for Speculative Thread Partitioning. ISPA 2010: 66-74 - [c10]Yanning Du, Yinliang Zhao, Bo Han, Yuancheng Li:
Optimistic Parallelism Based on Speculative Asynchronous Messages Passing. ISPA 2010: 382-391
2000 – 2009
- 2009
- [j2]Yinglong Ma, Shipeng Zhang, Yuancheng Li, Zheng Yi, Shaohua Liu:
An approach for multi-agent coordination based on semantic approximation. Int. J. Intell. Inf. Database Syst. 3(2): 163-179 (2009) - [c9]Yuancheng Li, Jie Yang:
A Novel Method to Extract Informative Blocks from Web Pages. JCAI 2009: 536-539 - 2008
- [c8]Xiaojian Ding, Yuancheng Li, Yinliang Zhao:
A Framework of User Model Based on Semi-Supervised Techniques. ICEBE 2008: 396-401 - 2007
- [j1]Bo Li, Runhai Jiao, Yuancheng Li:
Fast Adaptive Wavelet for Remote Sensing Image Compression. J. Comput. Sci. Technol. 22(5): 770-778 (2007) - [c7]Yuancheng Li, Haitao Hu:
Image Compression Using Wavelet Support Vector Machines. ICIC (1) 2007: 922-929 - [c6]Yinglong Ma, Beihong Jin, Yuancheng Li, Kehe Wu:
A Timing Analysis Model for Ontology Evolutions Based on Distributed Environments. PAKDD 2007: 183-192 - [c5]Yuancheng Li, Kehe Wu, Yinglong Ma, Shipeng Zhang:
Image Digital Watermarking Technique Based on Kernel Independent Component Analysis. RSFDGrC 2007: 467-474 - 2005
- [c4]Runhai Jiao, Yuancheng Li, Qingyuan Wang, Bo Li:
SVM Regression and Its Application to Image Compression. ICIC (1) 2005: 747-756 - 2003
- [c3]Yuancheng Li, Tingjian Fang:
Rough Set Methods for Constructing Support Vector Machines. RSFDGrC 2003: 334-338 - [c2]Yuancheng Li, Tingjian Fang:
Application of Fuzzy Support Vector Machines in Short-Term Load Forecasting. RSFDGrC 2003: 363-367 - [c1]Yuancheng Li, Tingjian Fang:
Wavelet and Support Vector Machines for Short-Term Electrical Load Forecasting. WAA 2003: 399-404
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint