Baijian Justin Yang

Orcid: 0000-0003-4440-3701

Affiliations:
  • Purdue University, USA


According to our database1, Baijian Justin Yang authored at least 64 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Hyper-STTN: Social Group-aware Spatial-Temporal Transformer Network for Human Trajectory Prediction with Hypergraph Reasoning.
CoRR, 2024

2023
SpaRx: elucidate single-cell spatial heterogeneity of drug responses for personalized treatment.
Briefings Bioinform., September, 2023

spaCI: deciphering spatial cellular communications through adaptive graph model.
Briefings Bioinform., January, 2023

Affective Workload Allocation for Multi-human Multi-robot Teams.
CoRR, 2023

Feature Selection for Unsupervised Machine Learning.
Proceedings of the 8th IEEE International Conference on Smart Cloud, 2023

ARDaC Common Data Model Facilitates Data Dissemination and Enables Data Commons for Modern Clinical Studies.
Proceedings of the MEDINFO 2023 - The Future Is Accessible, 2023

Improved Clustering Using Nice Initialization.
Proceedings of the IEEE Global Communications Conference, 2023

PINet: Privileged Information Improve the Interpretablity and generalization of structural MRI in Alzheimer's Disease.
Proceedings of the 14th ACM International Conference on Bioinformatics, 2023

2022
A Triangulation-Based Visual Localization for Field Robots.
IEEE CAA J. Autom. Sinica, 2022

Managing Controlled Unclassified Information in Research Institutions.
CoRR, 2022

Husformer: A Multi-Modal Transformer for Multi-Modal Human State Recognition.
CoRR, 2022

Cybersecurity Education in the Age of Artificial Intelligence: A Novel Proactive and Collaborative Learning Paradigm.
Proceedings of the IEEE Frontiers in Education Conference, 2022

SemiCon: A Semi-supervised Learning for Industrial Image Inspection.
Proceedings of the 9th IEEE International Conference on Cyber Security and Cloud Computing, 2022

The Alcoholic Hepatitis Network Research Data Commons (ARDaC): Design and Development.
Proceedings of the AMIA 2022, 2022

2021
Anomaly detection of core failures in die casting X-ray inspection images using a convolutional autoencoder.
Mach. Vis. Appl., 2021

Securing CHEESEHub: A Cloud-based, Containerized Cybersecurity Education Platform.
Proceedings of the PEARC '21: Practice and Experience in Advanced Research Computing, 2021

DenserNet: Weakly Supervised Visual Localization Using Multi-Scale Feature Aggregation.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
PENet: Object Detection using Points Estimation in Aerial Images.
CoRR, 2020

HOOD: High-Order Orthogonal Decomposition for Tensors.
Proceedings of the Smart Computing and Communication - 5th International Conference, 2020

Managing Controlled Unclassified Information (CUI) in Research Institutions.
Proceedings of the SIGITE '20: The 21st Annual Conference on Information Technology Education, 2020

Visual Localization for Autonomous Driving: Mapping the Accurate Location in the City Maze.
Proceedings of the 25th International Conference on Pattern Recognition, 2020

PENet: Object Detection Using Points Estimation in High Definition Aerial Images.
Proceedings of the 19th IEEE International Conference on Machine Learning and Applications, 2020

Low-Rank Sparse Tensor Approximations for Large High-Resolution Videos.
Proceedings of the 19th IEEE International Conference on Machine Learning and Applications, 2020

Regression PCA for Moving Objects Separation.
Proceedings of the IEEE Global Communications Conference, 2020

CHEESE: Cyber Human Ecosystem of Engaged Security Education.
Proceedings of the IEEE Frontiers in Education Conference, 2020

2019
A Performance Evaluation of CAN Encryption.
Proceedings of the First IEEE International Conference on Trust, 2019

Computer Vision-based Algae Removal Planner for Multi-robot Teams.
Proceedings of the 2019 IEEE International Conference on Systems, Man and Cybernetics, 2019

The Role of Multiple Representations and Representational Fluency in Cryptography Education.
Proceedings of the 20th Annual SIG Conference on Information Technology Education, 2019

Multiple Learning for Regression in Big Data.
Proceedings of the 18th IEEE International Conference On Machine Learning And Applications, 2019

Security Vulnerabilities in Consumer IoT Applications.
Proceedings of the 5th IEEE International Conference on Big Data Security on Cloud, 2019

Predicting Network Attacks with CNN by Constructing Images from NetFlow Data.
Proceedings of the 5th IEEE International Conference on Big Data Security on Cloud, 2019

Sparse Block Regression (SBR) for Big Data with Categorical Variables.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

2018
Internet of things: Survey on security.
Inf. Secur. J. A Glob. Perspect., 2018

Algae Detection Using Computer Vision and Deep Learning.
CoRR, 2018

Representational Fluency in Cryptography: An Eye-Tracking Study.
Proceedings of the 19th Annual SIG Conference on Information Technology Education, 2018

Blockchain-Based Whitelisting for Consumer IoT Devices and Home Networks.
Proceedings of the 19th Annual SIG Conference on Information Technology Education, 2018

RFID Security, Verification, and Blockchain: Vulnerabilities within the Supply Chain for Food Security.
Proceedings of the 19th Annual SIG Conference on Information Technology Education, 2018

Phoenixmap: Spatio-Temporal Distribution Analysis With Deep Learning Classifications.
Proceedings of the 13th IEEE Conference on Visual Analytics Science and Technology, 2018

Deep CNN-Based Methods to Evaluate Neighborhood-Scale Urban Valuation Through Street Scenes Perception.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

Streaming Algorithm for Big Data Logistic Regression.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

File Toolkit for Selective Analysis & Reconstruction (FileTSAR) for Large-Scale Networks.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

A Study of Exact Ridge Regression for Big Data.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

2017
Box-Cox Transformation in Big Data.
Technometrics, 2017

NetFlowMatrix: a visual approach for analysing large NetFlow data.
Int. J. Secur. Networks, 2017

An exact approach to ridge regression for big data.
Comput. Stat., 2017

Internet of Things: Survey on Security and Privacy.
CoRR, 2017

Try-CybSI: An Extensible Cybersecurity Learning and Demonstration Platform.
Proceedings of the 18th Annual Conference on Information Technology Education and the 6th Annual Conference on Research in Information Technology, 2017

Indexing Architecture for File Extraction from Network Traffic.
Proceedings of the 6th Annual Conference on Research in Information Technology, 2017

A countermeasure against relay attack in NFC payment.
Proceedings of the Second International Conference on Internet of things and Cloud Computing, 2017

Multichannel key exchange.
Proceedings of the Second International Conference on Internet of things and Cloud Computing, 2017

Vulnerabilities in hub architecture IoT devices.
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017

Finding the best box-cox transformation from massive datasets on spark.
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017

2016
Try-CybSI: A Platform for Trying Out Cybersecurity.
IEEE Secur. Priv., 2016

Big Data Dimension Reduction Using PCA.
Proceedings of the 2016 IEEE International Conference on Smart Cloud, 2016

A Scalable Feature Selection and Model Updating Approach for Big Data Machine Learning.
Proceedings of the 2016 IEEE International Conference on Smart Cloud, 2016

Predicting network attack patterns in SDN using machine learning approach.
Proceedings of the 2016 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), 2016

A Scalable Meta-Model for Big Data Security Analyses.
Proceedings of the 2nd IEEE International Conference on Big Data Security on Cloud, 2016

A Black-Box Self-Learning Scheduler for Cloud Block Storage Systems.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016

2015
A Study on Botnets Utilizing DNS.
Proceedings of the 4th Annual ACM Conference on Research in Information Technology, 2015

A Man-in-the-Middle attack against OpenDayLight SDN controller.
Proceedings of the 4th Annual ACM Conference on Research in Information Technology, 2015

A visual analytics approach to detecting server redirections and data exfiltration.
Proceedings of the 2015 IEEE International Conference on Intelligence and Security Informatics, 2015

Forensically Sound Retrieval and Recovery of Images from GPU Memory.
Proceedings of the Digital Forensics and Cyber Crime - 7th International Conference, 2015

2014
Detecting subtle port scans through characteristics based on interactive visualization.
Proceedings of the 3rd annual conference on Research in information technology, 2014

A taxonomy of privacy-protecting tools to browse the world wide web.
Proceedings of the 3rd annual conference on Research in information technology, 2014


  Loading...