Chi Yang

Orcid: 0000-0002-6770-4593

According to our database1, Chi Yang authored at least 61 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Robust Time-Frequency Synchronization Method for Underwater Acoustic OFDM Communication Systems.
IEEE Access, 2024

2023
Dynamic deformable transformer for end-to-end face alignment.
IET Comput. Vis., December, 2023

Data heterogeneous federated learning algorithm for industrial entity extraction.
Displays, December, 2023

Correction to: A system based on Hadoop for radar data analysis.
J. Ambient Intell. Humaniz. Comput., October, 2023

Computed Tomography and 3-D Face Scan Fusion for IoT-Based Diagnostic Solutions.
IEEE Internet Things J., July, 2023

Automatic temporomandibular disc displacement diagnosis via deep learning.
Displays, April, 2023

Special issue on privacy, security, and trust in computational intelligence.
Comput. Intell., February, 2023

Communication Interruption Analysis for Air-water Wireless Optical Communication.
Proceedings of the International Wireless Communications and Mobile Computing, 2023

Multi-Resampling Equalizer for Underwater Acoustic Single Carrier Communication.
Proceedings of the IEEE International Conference on Signal Processing, 2023

2022
Cross-domain sequence labelling using language modelling and parameter generating.
CAAI Trans. Intell. Technol., December, 2022

FlowSpectrum: a concrete characterization scheme of network traffic behavior for anomaly detection.
World Wide Web, 2022

Evaluation of internal fixation techniques for extracapsular fracture: A finite element analysis and comparison.
Comput. Methods Programs Biomed., 2022

Federated Learning for Industrial Entity Extraction.
Proceedings of the Digital Multimedia Communications - The 19th International Forum, 2022

2021
Clustering-based Efficient Privacy-preserving Face Recognition Scheme without Compromising Accuracy.
ACM Trans. Sens. Networks, 2021

Targeted aspect based multimodal sentiment analysis: an attention capsule extraction and multi-head fusion network.
CoRR, 2021

Targeted Aspect-Based Multimodal Sentiment Analysis: An Attention Capsule Extraction and Multi-Head Fusion Network.
IEEE Access, 2021

Dual-Channel Domain Adaptation Model.
Proceedings of the WI-IAT '21: IEEE/WIC/ACM International Conference on Web Intelligence, Hybrid Event / Melbourne, VIC, Australia, December 14 - 17, 2021, 2021

International Workshop on Privacy, Security and Trust in Computational Intelligence (PSTCI2021).
Proceedings of the CIKM '21: The 30th ACM International Conference on Information and Knowledge Management, Virtual Event, Queensland, Australia, November 1, 2021

2020
A Scalable Multi-Data Sources Based Recursive Approximation Approach for Fast Error Recovery in Big Sensing Data on Cloud.
IEEE Trans. Knowl. Data Eng., 2020

Privacy-preserving matrix product based static mutual exclusive roles constraints violation detection in interoperable role-based access control.
Future Gener. Comput. Syst., 2020

2019
A system based on Hadoop for radar data analysis.
J. Ambient Intell. Humaniz. Comput., 2019

2018
Curve fitting based efficient parameter selection for robust provable data possession.
J. Parallel Distributed Comput., 2018

A two-stage locality-sensitive hashing based approach for privacy-preserving mobile service recommendation in cross-platform edge environment.
Future Gener. Comput. Syst., 2018

Comparison of Animation and Static-picture based Instruction: Effects on Performance and Cognitive Load for Learning Genetics.
J. Educ. Technol. Soc., 2018

The Blockchain as a Decentralized Security Framework [Future Directions].
IEEE Consumer Electron. Mag., 2018

Asymmetric Commutative Encryption Scheme Based Efficient Solution to the Millionaires' Problem.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Study of Robotic System Design in Iron and Steel Enterprises.
Proceedings of the 3rd International Conference on Control, Robotics and Cybernetics, 2018

Stock market analysis using social networks.
Proceedings of the Australasian Computer Science Week Multiconference, 2018

2017
A Scalable Data Chunk Similarity Based Compression Approach for Efficient Big Sensing Data Processing on Cloud.
IEEE Trans. Knowl. Data Eng., 2017

An efficient secure Internet of things data storage auditing protocol with adjustable parameter in cloud computing.
Int. J. Distributed Sens. Networks, 2017

Big-Sensing-Data Curation for the Cloud is Coming: A Promise of Scalable Cloud-Data-Center Mitigation for Next-Generation IoT and Wireless Sensor Networks.
IEEE Consumer Electron. Mag., 2017

Privacy-Preserving Detection of Statically Mutually Exclusive Roles Constraints Violation in Interoperable Role-Based Access Control.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Privacy-Preserving Distributed Service Recommendation Based on Locality-Sensitive Hashing.
Proceedings of the 2017 IEEE International Conference on Web Services, 2017

UnitecDEAMP: Flow Feature Profiling for Malicious Events Identification in Darknet Space.
Proceedings of the Applications and Techniques in Information Security, 2017

2016
HKE-BC: hierarchical key exchange for secure scheduling and auditing of big data in cloud computing.
Concurr. Comput. Pract. Exp., 2016

Cloud Encryption Using Distributed Environmental Keys.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016

2015
A Big Picture of Integrity Verification of Big Data in Cloud Computing.
Proceedings of the Handbook on Data Centers, 2015

A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud.
IEEE Trans. Parallel Distributed Syst., 2015

Proximity-Aware Local-Recoding Anonymization with MapReduce for Scalable Big Data Privacy Preservation in Cloud.
IEEE Trans. Computers, 2015

MuR-DPA: Top-Down Levelled Multi-Replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud.
IEEE Trans. Computers, 2015

External integrity verification for outsourced big data in cloud and IoT: A big picture.
Future Gener. Comput. Syst., 2015

2014
Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-Grained Updates.
IEEE Trans. Parallel Distributed Syst., 2014

A hybrid approach for scalable sub-tree anonymization over big data using MapReduce on cloud.
J. Comput. Syst. Sci., 2014

A spatiotemporal compression based approach for efficient big data processing on Cloud.
J. Comput. Syst. Sci., 2014

2013
CCBKE - Session key negotiation for fast and secure scheduling of scientific applications in cloud computing.
Future Gener. Comput. Syst., 2013

SaC-FRAPP: a scalable and cost-effective framework for privacy preservation over big data on cloud.
Concurr. Comput. Pract. Exp., 2013

Combining Top-Down and Bottom-Up: Scalable Sub-tree Anonymization over Big Data Using MapReduce on Cloud.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Querying Streaming XML Big Data with Multiple Filters on Cloud.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013

Public Auditing for Big Data Storage in Cloud Computing - A Survey.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013

A MapReduce Based Approach of Scalable Multidimensional Anonymization for Big Data Privacy Preservation on Cloud.
Proceedings of the 2013 International Conference on Cloud and Green Computing, Karlsruhe, Germany, September 30, 2013

2011
An Authenticated Key Exchange Scheme for Efficient Security-Aware Scheduling of Scientific Applications in Cloud Computing.
Proceedings of the IEEE Ninth International Conference on Dependable, 2011

A CSMA-based approach for detecting composite data aggregate events with collaborative sensors in WSN.
Proceedings of the 2011 15th International Conference on Computer Supported Cooperative Work in Design, 2011

2010
A Query System for XML Data Stream and its Semanticsbased Buffer Reduction.
J. Res. Pract. Inf. Technol., 2010

A collaborative trust model of firewall-through based on Cloud Computing.
Proceedings of the 2010 14th International Conference on Computer Supported Cooperative Work in Design, 2010

2009
Gradual Removal of QoS Constraint Violations by Employing Recursive Bargaining Strategy for Optimizing Service Composition Execution Path.
Proceedings of the IEEE International Conference on Web Services, 2009

2008
Multi-filters collaboration for querying XML data streams.
Proceedings of the 12th International Conference on CSCW in Design, 2008

Semantics based Buffer Reduction for Queries over XML Data Streams.
Proceedings of the Database Technologies 2008. Proceedings of the Nineteenth Australasian Database Conference, 2008

Computing Structural Similarity of Source XML Schemas against Domain XML Schema.
Proceedings of the Database Technologies 2008. Proceedings of the Nineteenth Australasian Database Conference, 2008

2007
Heterogeneous Information Processing and Integration in Enterprise Management Information Systems.
Proceedings of the Computer Supported Cooperative Work in Design IV, 2007

Heterogeneous information processing and integration method research in Enterprise Management Information Systems.
Proceedings of the 11th International Conference on Computer Supported Cooperative Work in Design, 2007

2004
Large-scale fluid-structure interaction simulations.
Comput. Sci. Eng., 2004


  Loading...