Skip navigation
Statistics
Help
About OPUS
How to Deposit
Managing Copyright
Browse
UTS Organisational Groups
Browse Items by:
Issue Date
Author
Title
Type
ARC/NHRMC Funded
Search OPUS
OPUS at UTS
Browsing byAuthorYu, K
Jump to:
0-9
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
or enter first few letters:
Sort by:
title
issue date
submit date
ARC/NHRMC funded
In order:
Ascending
Descending
Results/Page
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Authors/Record:
All
1
5
10
15
20
25
30
35
40
45
50
Showing results 1 to 20 of 62
next >
Issue Date
Title
Author(s)
2020
A New Ultrasound Elastography Displacement Estimation Method for Mobile Telemedicine
Li, HA
;
Zhang, M
;
Yu, K
;
Qi, X
;
Zhen, L
;
GONG, YI
;
Tong, J
2021-05-01
A novel Dual-Blockchained structure for contract-theoretic LoRa-based information systems
Yu, G
;
Zhang, L
;
Wang, X
;
Yu, K
;
Ni, W
;
Zhang, JA
;
Liu, RP
2019-01-01
A qualitative investigation of bank employee experiences of information security and phishing
Conway, D
;
Taib, R
;
Harris, M
;
Berkovsky, S
;
Yu, K
;
Chen, F
2020-09-01
A Unified Analytical model for proof-of-X schemes
Yu, G
;
Zha, X
;
Wang, X
;
Ni, W
;
Yu, K
;
Zhang, JA
;
Liu, RP
2020
Analysis and Insights for Myths Circulating on Twitter During the COVID-19 Pandemic
Yang, S
;
Jiang, J
;
Pal, A
;
Yu, K
;
Chen, F
;
Yu, S
2006-04-01
Analysis of repeated pregnancy outcomes
Louis, GB
;
Dukic, V
;
Heagerty, PJ
;
Louis, TA
;
Lynch, CD
;
Ryan, LM
;
Schisterman, EF
;
Trumble, A
;
Klebanoff, M
;
Liu, A
;
Yu, K
;
Collins, J
;
Olsen, G
2023-07-04
Are People with Cyber Security Training Worse at Checking Phishing Email Addresses? Testing the Automaticity of Verifying the Sender’s Address
Conway, D
;
Butavicius, M
;
Yu, K
;
Chen, F
2023-01-01
Are People with Cyber Security Training Worse at Checking Phishing Email Addresses? Testing the Automaticity of Verifying the Sender’s Address
Conway, D
;
Butavicius, M
;
Yu, K
;
Chen, F
2021-01-01
Artificial Intelligence in Pilot Training and Education – Towards a Machine Learning Aided Instructor Assistant for Flight Simulators
Yang, S
;
Yu, K
;
Lammers, T
;
Chen, F
2019-05-01
Birefringence and Dispersion Analysis of Hexagonal Boron Nitride (H-Bn)
Rah, Y
;
Jin, Y
;
Kim, S
;
Yu, K
2020-01-01
Contour-Maintaining-Based Image Adaption for an Efficient Ambulance Service in Intelligent Transportation Systems
Liu, Q
;
Kang, B
;
Yu, K
;
Qi, X
;
Li, J
;
Wang, S
;
Li, HA
2012-12-01
CRLB derivation for mobile tracking in NLOS propagation environments
Yu, K
;
Dutkiewicz, E
2016-12-15
Derivation of CRLB for Wireless Capsule Endoscope Localization Using Received Signal Strength
Ara, P
;
Yu, K
;
Cheng, S
;
Dutkiewicz, E
;
Heimlich, MC
2023-06-01
Digital twin-driven partial domain adaptation network for intelligent fault diagnosis of rolling bearing
Zhang, Y
;
Ji, JC
;
Ren, Z
;
Ni, Q
;
Gu, F
;
Feng, K
;
Yu, K
;
Ge, J
;
Lei, Z
;
Liu, Z
2018
Do I trust a machine? Differences in user trust based on system performance
Yu, K
;
Berkovsky, S
;
Conway, D
;
Taib, R
;
Zhou, J
;
Chen, F
2019-01-01
Do I trust my machine teammate? An investigation from perception to decision
Yu, K
;
Berkovsky, S
;
Taib, R
;
Zhou, J
;
Chen, F
2018-07-01
Dynamic handwriting signal features predict domain expertise
Oviatt, S
;
Hang, K
;
Zhou, J
;
Yu, K
;
Chen, F
2022-01-01
Dynamic Model-Assisted Bearing Remaining Useful Life Prediction Using the Cross-Domain Transformer Network
Zhang, Y
;
Feng, K
;
Ji, JC
;
Yu, K
;
Ren, Z
;
Liu, Z
2021-08-01
Dynamic Scheduling Algorithm in Cyber Mimic Defense Architecture of Volunteer Computing
Li, Q
;
Meng, S
;
Sang, X
;
Zhang, H
;
Wang, S
;
Bashir, AK
;
Yu, K
;
Tariq, U
2022-01-01
Dynamic Scheduling Techniques in Cloud Manufacturing – An Exploration of Deep Reinforcement Learning as a Critical Opportunity for Future Research
Chambers, D
;
Lammers, T
;
Yu, K