Chunyan Yang

Orcid: 0009-0005-1517-4139

According to our database1, Chunyan Yang authored at least 38 papers between 2005 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Application of Zero Trust Security Architecture in Power Communication Network Security Management System.
Proceedings of the 2nd International Conference on Signal Processing, 2023

Multi-class Cancer Classification of Whole Slide Images Through Transformer and Multiple Instance Learning.
Proceedings of the Bioinformatics Research and Applications - 19th International Symposium, 2023

Rumor Detection Based on Depth and Breadth with Tree-Structured Recursive Neural Networks.
Proceedings of the International Joint Conference on Neural Networks, 2023

Research on fake news detection method based on multi-level semantic enhancement.
Proceedings of the International Joint Conference on Neural Networks, 2023

Application Design of Data Security Pool System Based on Network Security Data Link Technology.
Proceedings of the 8th International Conference on Information Systems Engineering, 2023

Federated Learning-Based Intrusion Detection Method for Smart Grid.
Proceedings of the 2023 2nd Asia Conference on Algorithms, Computing and Machine Learning, 2023

2022
The repelling factors of the management accounting methods under the COVID-19 - case studies based on the scenario of private enterprises.
Int. J. Technol. Manag., 2022

Diagnose Parkinson's disease and cleft lip and palate using deep convolutional neural networks evolved by IP-based chimp optimization algorithm.
Biomed. Signal Process. Control., 2022

Application of extension innovation method in assembly production process optimization.
Proceedings of the 9th International Conference on Information Technology and Quantitative Management, 2022

Extension knowledge representation of evolutionary law of technological systems in TRIZ.
Proceedings of the 9th International Conference on Information Technology and Quantitative Management, 2022

Deep Learning Based Malware Traffic Classification for Power Internet of Things Network Security.
Proceedings of the ICBDC 2022: 7th International Conference on Big Data and Computing, Shenzhen, China, May 27, 2022

2021
Comprehensive review and evaluation of computational methods for identifying FLT3-internal tandem duplication in acute myeloid leukaemia.
Briefings Bioinform., 2021

Prediction Method of Power Grid Security Risk Range Based on Graph Semi-supervised Learning.
Proceedings of the ICAIIS 2021: 2021 2nd International Conference on Artificial Intelligence and Information Systems, Chongqing, China, May 28, 2021

Network attack detection method for power system terminal based on improved random forest.
Proceedings of the ICAIIS 2021: 2021 2nd International Conference on Artificial Intelligence and Information Systems, Chongqing, China, May 28, 2021

Quantitative method of damage degree of power system network attack based on improved artificial immune algorithm.
Proceedings of the ICAIIS 2021: 2021 2nd International Conference on Artificial Intelligence and Information Systems, Chongqing, China, May 28, 2021

2020
Pharmacophore study using the HipHop for the screening novel potential BH3-mimetic compounds.
Proceedings of the 22nd IEEE International Conference on E-health Networking, 2020

2019
A Greedy Algorithm for Detecting Mutually Exclusive Patterns in Cancer Mutation Data.
Proceedings of the Bioinformatics and Biomedical Engineering, 2019

Classification conducting knowledge acquisition by an evolutionary robust GRBF-NN model.
Proceedings of the 7th International Conference on Information Technology and Quantitative Management, 2019

Extension Support Vector Machine for Extension Classification.
Proceedings of the 7th International Conference on Information Technology and Quantitative Management, 2019

2018
Nonparallel support vector regression model and its SMO-type solver.
Neural Networks, 2018

Ramp-loss nonparallel support vector regression: Robust, sparse and scalable approximation.
Knowl. Based Syst., 2018

Research on the Extension Evaluation Model and Strategy Generation Method of Enterprise Service Quality.
Proceedings of the 6th International Conference on Information Technology and Quantitative Management, 2018

Solution of Brain Contradiction by Extension Theory.
Proceedings of the Intelligence Science II, 2018

2017
Adopting gene expression programming to generate extension strategies for incompatible problem.
Neural Comput. Appl., 2017

2015
Extension Innovation Design of Product Family Based on Kano Requirement Model.
Proceedings of the Third International Conference on Information Technology and Quantitative Management, 2015

Combining How Net and Extension Strategy Generation Method to Improve Customer Values.
Proceedings of the Third International Conference on Information Technology and Quantitative Management, 2015

2014
The Influence of Network Structural Properties on Information Dissemination Power in Microblogging Systems.
Int. J. Hum. Comput. Interact., 2014

2012
Research on Customer Segmentation Based on Extension Classification.
Proceedings of the Web Technologies and Applications, 2012

2011
A Lightweight RFID Authenticate Protocol based on Smart SIM Card.
Proceedings of the LISS 2011 - Proceedings of the 1st International Conference on Logistics, Informatics and Service Science, Volume 3, Beijing, China, 8, 2011

2010
Research on network RTK positioning algorithm aided by quantum ranging.
Sci. China Inf. Sci., 2010

Research on RFID security protocol based on grouped tags and re-encryption scheme.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

Study of Collaborative Design Based on Fuzzy Theory.
Proceedings of the Cooperative Design, Visualization, and Engineering, 2010

2009
Neural Network Based Landscape Pattern Simulation in ChangBai Mountain, Northeast China.
Proceedings of the Advances in Neural Networks, 2009

2008
Extension Information-Knowledge-Strategy System for Semantic Interoperability.
J. Comput., 2008

2007
Eliminate semantic conflicts in Web mining with extension methods.
Proceedings of the IEEE International Conference on Systems, 2007

2005
Study on Knowledge Reasoning Based on Extended Formulas.
Proceedings of the Artificial Intelligence Applications and Innovations - IFIP TC12 WG12.5, 2005

Intelligent Optimal Control in Rare-Earth Countercurrent Extraction Process <i>via</i> Soft-Sensor.
Proceedings of the Advances in Natural Computation, First International Conference, 2005

Component Content Soft-Sensor Based on Adaptive Fuzzy System in Rare-Earth Countercurrent Extraction Process.
Proceedings of the Fuzzy Systems and Knowledge Discovery, Second International Conference, 2005


  Loading...