Dan Yu

Orcid: 0000-0003-1262-9503

According to our database1, Dan Yu authored at least 139 papers between 1999 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Improved secure PCA and LDA algorithms for intelligent computing in IoT-to-cloud setting.
Comput. Intell., February, 2024

Heterogeneous Cuckoo Search-Based Unsupervised Band Selection for Hyperspectral Image Classification.
IEEE Trans. Geosci. Remote. Sens., 2024

Data-Driven Model Predictive Control for Uncalibrated Visual Servoing.
Symmetry, 2024

2023
Optimal Acceptance Sampling Testing Plan With Pivotal Quantity for Log-Location-Scale Distributions.
IEEE Trans. Reliab., December, 2023

Spatial-temporal dual-channel adaptive graph convolutional network for remaining useful life prediction with multi-sensor information fusion.
Adv. Eng. Informatics, August, 2023

An Enhanced Flower Pollination Algorithm with Gaussian Perturbation for Node Location of a WSN.
Sensors, July, 2023

Relationships between Landscape Patterns and Hydrological Processes in the Subtropical Monsoon Climate Zone of Southeastern China.
Remote. Sens., May, 2023

Monitoring the Weibull Scale Parameter Based on Type I Censored Data Using a Modified EWMA Control Chart.
Axioms, May, 2023

Clustering Hidden Markov Models With Variational Bayesian Hierarchical EM.
IEEE Trans. Neural Networks Learn. Syst., March, 2023

Balancing Localization Accuracy and Location Privacy in Mobile Cooperative Localization.
IEEE Trans. Signal Process., 2023

Coordinated Cloud-Edge Anomaly Identification for Active Distribution Networks.
IEEE Trans. Cloud Comput., 2023

Cross-Domain Industrial Intrusion Detection Deep Model Trained With Imbalanced Data.
IEEE Internet Things J., 2023

CRSF: An Intrusion Detection Framework for Industrial Internet of Things Based on Pretrained CNN2D-RNN and SVM.
IEEE Access, 2023

Modeling Recommendation and Project Deployment Automation for Semantic Knowledge Graphs.
Proceedings of the 17th IEEE International Conference on Semantic Computing, 2023

Multi-Track Music Generation with WGAN-GP and Attention Mechanisms.
Proceedings of the 12th IEEE Global Conference on Consumer Electronics, 2023

Assessing ChatGPT's Comprehension of Perturbed Text through Text Linguistic Features.
Proceedings of the 10th International Conference on Dependable Systems and Their Applications, 2023

An Evaluation Method for Large Language Models' Code Generation Capability.
Proceedings of the 10th International Conference on Dependable Systems and Their Applications, 2023

Learning-Based Model Predictive Control with Application in Robotic Trajectory Tracking.
Proceedings of the 62nd IEEE Conference on Decision and Control, 2023

2022
Retransmission-Based TCP Fingerprints for Fine-Grain IoV Edge Device Identification.
IEEE Trans. Veh. Technol., 2022

Decoupled Data-Based Approach for Learning to Control Nonlinear Dynamical Systems.
IEEE Trans. Autom. Control., 2022

Performance of the Shiryaev-Roberts-type scheme in comparison to the CUSUM and EWMA schemes in monitoring weibull scale parameter based on Type I censored data.
Qual. Reliab. Eng. Int., 2022

Comparisons of some memory-type control chart for monitoring Weibull-distributed time between events and some new results.
Qual. Reliab. Eng. Int., 2022

Statistical analysis and optimal inspection planning for lifetime delayed gamma degradation processes.
Qual. Reliab. Eng. Int., 2022

CLAP: A Contract-Based Incentive Mechanism for Cooperative Localization Balancing Localization Accuracy and Location Privacy.
IEEE Internet Things J., 2022

Analysis and Optimization for Large-Scale LoRa Networks: Throughput Fairness and Scalability.
IEEE Internet Things J., 2022

Vulnerability association evaluation of Internet of thing devices based on attack graph.
Int. J. Distributed Sens. Networks, 2022

Tradeoff Analysis Between Localization Accuracy and Location Privacy Level in Moving Target Localization.
Proceedings of the 13th Asian Control Conference, 2022

2021
Unifying Consensus and Covariance Intersection for Efficient Distributed State Estimation Over Unreliable Networks.
IEEE Trans. Robotics, 2021

Reliability modeling and evaluation of lifetime delayed degradation process with nondestructive testing.
Reliab. Eng. Syst. Saf., 2021

Video summary generation by visual shielding compressed sensing coding and double-layer affinity propagation.
J. Vis. Commun. Image Represent., 2021

An Underwater Image Semantic Segmentation Method Focusing on Boundaries and a Real Underwater Scene Semantic Segmentation Dataset.
CoRR, 2021

A Safety Prediction System for Lunar Orbit Rendezvous and Docking Mission.
Algorithms, 2021

Automatic modeling and fault diagnosis of car production lines based on first-principle qualitative mechanics and semantic web technology.
Adv. Eng. Informatics, 2021

A Location Constrained Dual-Branch Network for Reliable Diagnosis of Jaw Tumors and Cysts.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2021 - 24th International Conference, Strasbourg, France, September 27, 2021

Generative Adversarial Domain Generalization via Cross-Task Feature Attention Learning for Prostate Segmentation.
Proceedings of the Neural Information Processing - 28th International Conference, 2021

2020
Context Construction and Virtual Human Based Intelligent Navigation in Virtual Experiment.
Trans. Edutainment, 2020

Quantitative Relationship Between Localization Accuracy and Location Privacy Level in Wireless Localization System.
IEEE Signal Process. Lett., 2020

A Time-efficient Multi-Protocol Probe Scheme for Fine-grain IoT Device Identification.
Sensors, 2020

A randomized balanced proper orthogonal decomposition technique.
J. Comput. Appl. Math., 2020

Angle-Range-Polarization Estimation for Polarization Sensitive Bistatic FDA-MIMO Radar via PARAFAC Algorithm.
KSII Trans. Internet Inf. Syst., 2020

Higher-order normal approximation approach for highly reliable system assessment.
IISE Trans., 2020

On the Search for Feedback in Reinforcement Learning.
CoRR, 2020

Large-Scale IoT Devices Firmware Identification Based on Weak Password.
IEEE Access, 2020

Cross-Layer Protocol Fingerprint for Large-Scale Fine-Grain Devices Identification.
IEEE Access, 2020

Exploring Shodan From the Perspective of Industrial Control Systems.
IEEE Access, 2020

Achieving Max-Min Throughput in LoRa Networks.
Proceedings of the International Conference on Computing, Networking and Communications, 2020

SS-AOE: Subspace Based Classification Framework for Avoiding Over-Confidence Errors.
Proceedings of the Advanced Data Mining and Applications - 16th International Conference, 2020

Brain CT Image with Motion Artifact Augmentation Based on PGGAN and FBP for Artifact Detection.
Proceedings of the Advanced Data Mining and Applications - 16th International Conference, 2020

Motion Artifacts Detection from Computed Tomography Images.
Proceedings of the Advanced Data Mining and Applications - 16th International Conference, 2020

Pre-trained StyleGAN Based Data Augmentation for Small Sample Brain CT Motion Artifacts Detection.
Proceedings of the Advanced Data Mining and Applications - 16th International Conference, 2020

Personal Health Index Based on Residential Health Examination.
Proceedings of the Advanced Data Mining and Applications - 16th International Conference, 2020

Evolutionary Strategy for Graph Embedding.
Proceedings of the Advanced Data Mining and Applications - 16th International Conference, 2020

High-Quality Plane Wave Compounding Using Deep Learning for Hand-Held Ultrasound Devices.
Proceedings of the Advanced Data Mining and Applications - 16th International Conference, 2020

2019
Statistical inference for <i>M<sub>t</sub></i>/<i>G</i>/<i>Infinity</i> queueing systems under incomplete observations.
Eur. J. Oper. Res., 2019

Research on UUV Obstacle Avoiding Method Based on Recurrent Neural Networks.
Complex., 2019

A Novel GRU-RNN Network Model for Dynamic Path Planning of Mobile Robot.
IEEE Access, 2019

WiLabel: Behavior-Based Room Type Automatic Annotation for Indoor Floorplan.
IEEE Access, 2019

Digital Companion for Industry.
Proceedings of the Companion of The 2019 World Wide Web Conference, 2019

A Decoupled Data Based Control (D2C) Approach to Generalized Motion Planning Problems.
Proceedings of the 58th IEEE Conference on Decision and Control, 2019

2018
Long-Term Changes in Water Clarity in Lake Liangzi Determined by Remote Sensing.
Remote. Sens., 2018

2DPCANet: a deep leaning network for face recognition.
Multim. Tools Appl., 2018

A Decoupled Data Based Approach to Stochastic Optimal Control Problems.
CoRR, 2018

Localizing Access Point Through Simple Gesture.
IEEE Access, 2018

Malware Variants Detection Using Behavior Destructive Features.
Proceedings of the 2018 IEEE Symposium on Privacy-Aware Computing, 2018

2017
Quantifying Nanoparticle Mixing State to Account for Both Location and Size Effects.
Technometrics, 2017

An Open Semantic Framework for the Industrial Internet of Things.
IEEE Intell. Syst., 2017

A Separation-Based Design to Data-Driven Control for Large-Scale Partially Observed Systems.
CoRR, 2017

HoloMiracle: Intuitive In-Situ Querying for Industrial Environments.
Proceedings of the ISWC 2017 Posters & Demonstrations and Industry Tracks co-located with 16th International Semantic Web Conference (ISWC 2017), Vienna, Austria, October 23rd - to, 2017

Enabler for Interdisciplinary eHealthcare: A Qualitative Study.
Proceedings of the Integrating and Connecting Care, 2017

E-Health Readiness for Teams: A Comprehensive Conceptual Model.
Proceedings of the Integrating and Connecting Care, 2017

Stochastic feedback control of systems with unknown nonlinear dynamics.
Proceedings of the 56th IEEE Annual Conference on Decision and Control, 2017

A Conceptual Measurement Model for eHealth Readiness: a Team Based Perspective.
Proceedings of the AMIA 2017, 2017

2016
Hierarchy-associated semantic-rule inference framework for classifying indoor scenes.
J. Electronic Imaging, 2016

A stochastic unknown input realization and filtering technique.
Autom., 2016

Efficient and Load Balancing Strategy for Task Scheduling in Spatial Crowdsourcing.
Proceedings of the Web-Age Information Management, 2016

VLAD Is not Necessary for CNN.
Proceedings of the Computer Vision - ECCV 2016 Workshops, 2016

A computationally optimal randomized proper orthogonal decomposition technique.
Proceedings of the 2016 American Control Conference, 2016

2015
Precise Image Matching: A Similarity Measure Approach.
Proceedings of the Intelligence Science and Big Data Engineering. Image and Video Data Engineering, 2015

Mining High Utility Itemsets over Uncertain Databases.
Proceedings of the 2015 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2015

An autoregressive (AR) model based stochastic unknown input realization and filtering technique.
Proceedings of the American Control Conference, 2015

A randomized proper orthogonal decomposition technique.
Proceedings of the American Control Conference, 2015

2014
Surrogate Modeling of Computer Experiments With Different Mesh Densities.
Technometrics, 2014

Lower confidence limit for reliability based on grouped data using a quantile-filling algorithm.
Comput. Stat. Data Anal., 2014

Missing data analyses: a hybrid multiple imputation algorithm using Gray System Theory and entropy based on clustering.
Appl. Intell., 2014

2013
A fuzzy TOPSIS model via chi-square test for information source selection.
Knowl. Based Syst., 2013

A rough set algorithm for attribute reduction via mutual information and conditional entropy.
Proceedings of the 10th International Conference on Fuzzy Systems and Knowledge Discovery, 2013

2012
A randomly perturbed iterative proper orthogonal decomposition (RI-POD) technique for filtering distributed parameter systems.
Proceedings of the American Control Conference, 2012

2011
A tracking and predicting scheme for ping pong robot.
J. Zhejiang Univ. Sci. C, 2011

Research on Quantitative Method about Driver Reliability.
J. Softw., 2011

Highway Incident Detection Research Based on Lipschitz Exponent Algorithm.
J. Networks, 2011

The Design and Implementation of Workflow Engine for Spacecraft Automatic Testing.
J. Comput., 2011

A Method of Analysis and Verification for Safety-Critical Software Based on Modelling and Testing.
Proceedings of the Fifth International Conference on Secure Software Integration and Reliability Improvement, 2011

Reader planning in UHF RFID application.
Proceedings of the 2011 IEEE International Conference on RFID-Technologies and Applications, 2011

A reliability integrated acceptance test plan for series systems whose components following exponential distributions.
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011

Researches on real-time satellite data flow processing based on file buffer.
Proceedings of the Seventh International Conference on Natural Computation, 2011

Driving Intentions Identification Based on Continuous P-2D HMM.
Proceedings of the Second International Conference on Digital Manufacturing and Automation, 2011

Interpolation algorithm and simulation on automatic saddle-shaped welding machine of heavy pressure vessels.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011

Gird or cloud? Survey on scientific computing infrastructure.
Proceedings of the 2011 IEEE International Conference on Cloud Computing and Intelligence Systems, 2011

2010
Research on Knowledge-Based Optimization Model for Top Management Team.
J. Softw., 2010

2009
Mining Compressed Repetitive Gapped Sequential Patterns Efficiently
CoRR, 2009

Discovering Compatible Top-K Theme Patterns from Text Based on Users' Preferences.
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2009

Mining Compressed Repetitive Gapped Sequential Patterns Efficiently.
Proceedings of the Advanced Data Mining and Applications, 5th International Conference, 2009

2008
Be Brief, And They Shall Learn: Generating Concise Language Feedback for a Computer Tutor.
Int. J. Artif. Intell. Educ., 2008

Segmented Cyclic Redundancy Check: A Data Protection Scheme for Fast Reading RFID Tag's Memory.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

Exact BER Analysis for Signal Code Modulation in Wireless Communication.
Proceedings of the 67th IEEE Vehicular Technology Conference, 2008

Tag Count Frame Slotted Aloha: A Novel Anti-Collision Protocol in RFID Systems.
Proceedings of the 67th IEEE Vehicular Technology Conference, 2008

The Workflow-Based Modelling Method for Spacecraft Automatic Testing Process.
Proceedings of the 2008 International Conference on Information & Knowledge Engineering, 2008

Using targeted statistics for face regeneration.
Proceedings of the 8th IEEE International Conference on Automatic Face and Gesture Recognition (FG 2008), 2008

A New Approach to Improve Signal Classification in Low SNR Environment in Spectrum Sensing.
Proceedings of the 3rd International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications, 2008

The Spacecraft Automatic Testing System Based on Workflow.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

A Novel Enterprise Mobile E-mail System Using the SyncML Protocol.
Proceedings of the 7th IEEE/ACIS International Conference on Computer and Information Science, 2008

2007
Spectrum Partitioning and Relay Positioning for Cellular System Enhanced with Two-Hop Fixed Relay Nodes.
IEICE Trans. Commun., 2007

Collaborative Learning Grouping Based On Fuzzy Clustering.
Proceedings of the 2007 International Conference on Artificial Intelligence, 2007

Creating Computer Supported Collaborative Learning Activities with IMS LD.
Proceedings of the Human-Computer Interaction. HCI Applications and Services, 2007

2006
Multiresolution fragile watermarking using complex chirp signals for content authentication.
Pattern Recognit., 2006

Transparent robust information hiding for ownership verification.
J. Electronic Imaging, 2006

A Secure Watermarking Scheme for Buyer-Seller Identification and Copyright Protection.
EURASIP J. Adv. Signal Process., 2006

Reuse partitioning in fixed two-hop cellular relaying network.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2006

Analysis of Relay Enhanced Cellular System's Power Saving Characteristic.
Proceedings of the 64th IEEE Vehicular Technology Conference, 2006

Radio Resource Allocation in Two-hop Cellular Relaying Network.
Proceedings of the 63rd IEEE Vehicular Technology Conference, 2006

Reuse Partitioning Based Frequency Planning for Relay Enhanced Cellular System with NLOS BS-Relay Links.
Proceedings of the 64th IEEE Vehicular Technology Conference, 2006

Using Bayesian Networks to Implement Adaptivity in Mobile Learning.
Proceedings of the 2006 International Conference on Semantics, 2006

Reuse Partitioning Based Frequency Planning for Cellular Network with two-HOP Fixed Relay Nodes.
Proceedings of the IEEE 17th International Symposium on Personal, 2006

New Generation of E-Learning Technologies.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

Multi-Path QoS Routing with Power Control in TDMA-Based Mobile Ad Hoc Networks.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

A Tracking Algorithm in RFID Reader Network.
Proceedings of the Japan-China Joint Workshop on Frontier of Computer Science and Technology, 2006

2005
New Era of E-Learning.
Proceedings of the 2005 International Conference on Semantics, 2005

An Improved P2P Model Based on Chord.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

Natural Language Generation for Intelligent Tutoring Systems: a case study.
Proceedings of the Artificial Intelligence in Education, 2005

Aggregation Improves Learning: Experiments in Natural Language Generation for Intelligent Tutoring Systems.
Proceedings of the ACL 2005, 2005

2004
Multiresolution fragile watermarking using complex chirp signal for content integrity verification.
Proceedings of the 2004 International Conference on Image Processing, 2004

Transparent information hiding with automatic embedding range selection for ownership verification.
Proceedings of the 2004 International Conference on Image Processing, 2004

Multihop network capacity estimation.
Proceedings of IEEE International Conference on Communications, 2004

2003
New approach to multihop - cellular based multihop network.
Proceedings of the IEEE 14th International Symposium on Personal, 2003

2002
Watermark Detection and Extraction Using Independent Component Analysis Method.
EURASIP J. Adv. Signal Process., 2002

A New Blind Watermarking Technique Based on Independent Component Analysis.
Proceedings of the Digital Watermarking, First International Workshop, 2002

A Statistical Study of Neighbor Node Properties in Ad Hoc Network.
Proceedings of the 31st International Conference on Parallel Processing Workshops (ICPP 2002 Workshops), 2002

Robust image watermarking based on Independent Component Analysis.
Proceedings of the IEEE International Conference on Acoustics, 2002

1999
Integrated system for image storage, retrieval, and transmission using wavelet transform.
Proceedings of the Storage and Retrieval for Image and Video Databases VII, 1999


  Loading...