Fei Yan

According to our database1, Fei Yan authored at least 88 papers between 2004 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
A New Approach to Cooperative Output Regulation for Heterogeneous Multi-Agent Systems.
SIAM J. Control and Optimization, 2018

Improvement of Detection Sensitivity of Microbubbles as Sensors to Detect Ambient Pressure.
Sensors, 2018

Robust Discriminative multi-view K-means clustering with feature selection and group sparsity learning.
Multimedia Tools Appl., 2018

Semi-supervised adaptive feature analysis and its application for multimedia understanding.
Multimedia Tools Appl., 2018

Hierarchical Temporal Memory method for time-series-based anomaly detection.
Neurocomputing, 2018

Time delay control of cable-driven manipulators with adaptive fractional-order nonsingular terminal sliding mode.
Advances in Engineering Software, 2018

Effectiveness Proving and Control of Platoon-Based Vehicular Cyber-Physical Systems.
IEEE Access, 2018

Practical Adaptive Integral Terminal Sliding Mode Control for Cable-Driven Manipulators.
IEEE Access, 2018

Optimal Nonsingular Terminal Sliding Mode Control of Cable-Driven Manipulators Using Super-Twisting Algorithm and Time-Delay Estimation.
IEEE Access, 2018

Continuous Nonsingular Fast Terminal Sliding Mode Control of Cable-Driven Manipulators With Super-Twisting Algorithm.
IEEE Access, 2018

Quantized Consensus of Unidirectional Pedestrian Flow based on Two-Time-Scale Hybrid Models.
Proceedings of the 21st International Conference on Intelligent Transportation Systems, 2018

ActivityShielder: An Activity Hijacking Defense Scheme for Android Devices.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

2017
An alternating iterative algorithm for the synthesis of complex-excitation and pattern reconfigurable planar sparse array.
Signal Processing, 2017

CHAOS: An SDN-Based Moving Target Defense System.
Security and Communication Networks, 2017

Quantum image rotation by an arbitrary angle.
Quantum Information Processing, 2017

Building driver's trust in lane change assistance systems by adapting to driver's uncertainty states.
Proceedings of the IEEE Intelligent Vehicles Symposium, 2017

Estimation of heat flux distribution in convective heat transfer system based on decentralized fuzzy inference.
Proceedings of the 13th International Conference on Natural Computation, 2017

First Workshop on Trust in the Age of Automated Driving.
Proceedings of the Adjunct Proceedings of the 9th International Conference on Automotive User Interfaces and Interactive Vehicular Applications, 2017

2016
A formal analysis of Trusted Platform Module 2.0 hash-based message authentication code authorization under digital rights management scenario.
Security and Communication Networks, 2016

Numerical simulation on the effects of drug-eluting stents with different bending angles on hemodynamics and drug distribution.
Med. Biol. Engineering and Computing, 2016

Semi-supervised feature selection with exploiting shared information among multiple tasks.
J. Visual Communication and Image Representation, 2016

Kernel combination via debiased object correspondence analysis.
Information Fusion, 2016

Face recognition using class specific dictionary learning for sparse representation and collaborative representation.
Neurocomputing, 2016

An improved robust hand-eye calibration for endoscopy navigation system.
Proceedings of the Medical Imaging 2016: Image-Guided Procedures, Robotic Interventions, and Modeling, San Diego, California, United States, 27 February, 2016

Developing a model of driver's uncertainty in lane change situations for trustworthy lane change decision aid systems.
Proceedings of the 2016 IEEE Intelligent Vehicles Symposium, 2016

Baseline Is Fragile: On the Effectiveness of Stack Pivot Defense.
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016

An MR image segmentation algorithm based on bias field correction.
Proceedings of the 12th International Conference on Natural Computation, 2016

Development of a Lane Change Assistance System Adapting to Driver's Uncertainty During Decision-Making.
Proceedings of the Adjunct Proceedings of the 8th International Conference on Automotive User Interfaces and Interactive Vehicular Applications, 2016

Full information estimator for output regulation based on internal model principle.
Proceedings of the 2016 American Control Conference, 2016

2015
A model-free method for annotating on vascular structure in volume rendered images.
Proceedings of the Medical Imaging 2015: Image-Guided Procedures, 2015

Classifying driver's uncertainty about the distance gap at lane changing for developing trustworthy assistance systems.
Proceedings of the 2015 IEEE Intelligent Vehicles Symposium, 2015

A hand-eye calibration method for computer assisted endoscopy.
Proceedings of the 11th International Conference on Natural Computation, 2015

Local region based active contours for colon tissue segmentation.
Proceedings of the 11th International Conference on Natural Computation, 2015

A study on CT aorta segmentation using vessel enhancement diffusion filter and region growing.
Proceedings of the 11th International Conference on Natural Computation, 2015

An improved multilevel banded graph cuts method for extracting colon tissue.
Proceedings of the 12th International Conference on Fuzzy Systems and Knowledge Discovery, 2015

2014
Dental Numbering for Periapical Radiograph Based on Multiple Fuzzy Attribute Approach.
JACIII, 2014

Segmented Wavelet Decomposition for Capnogram Feature Extraction in Asthma Classification.
JACIII, 2014

TOUGH-RDCA modeling of multiple fracture interactions in caprock during CO2 injection into a deep brine aquifer.
Computers & Geosciences, 2014

Classifying driver's uncertainty for developing trustworthy assistance systems.
Proceedings of the 8th Nordic Conference on Human-Computer Interaction: Fun, 2014

Distributed urban traffic signal control based on spontaneous synchronization.
Proceedings of the 17th International IEEE Conference on Intelligent Transportation Systems, 2014

POSTER: An E2E Trusted Cloud Infrastructure.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

A Poodle or a Dog? Evaluating Automatic Image Annotation Using Human Descriptions at Different Levels of Granularity.
Proceedings of the Third Workshop on Vision and Language, 2014

2013
Personalized search in digital libraries via spreading activation model.
Web Intelligence and Agent Systems, 2013

Similarity-Based Fuzzy Classification of ECG and Capnogram Signals.
JACIII, 2013

Efficient online/offline signcryption without key exposure.
IJGUC, 2013

Dictionary learning based sparse coefficients for audio classification with max and average pooling.
Digital Signal Processing, 2013

A clique-superposition model for social networks.
SCIENCE CHINA Information Sciences, 2013

Evaluation of an artificial neural network to ascertain why there is a high incidence of hepatitis B in the Chinese population after vaccination.
Comp. in Bio. and Med., 2013

An autonomous vehicle sequencing problem at intersections: A genetic algorithm approach.
Applied Mathematics and Computer Science, 2013

Mathematical proof of effectiveness of platoon-based traffic control at intersections.
Proceedings of the 16th International IEEE Conference on Intelligent Transportation Systems, 2013

Dental classification for periapical radiograph based on multiple fuzzy attribute.
Proceedings of the Joint IFSA World Congress and NAFIPS Annual Meeting, 2013

Visual semantic parameterization - To enhance blind user perception for indoor navigation.
Proceedings of the 2013 IEEE International Conference on Multimedia and Expo Workshops, 2013

Information Gain with Weight Based Decision Tree for the Employment Forecasting of Undergraduates.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

Towards a Trusted Launch Mechanism for Virtual Machines in Cloud Computing.
Proceedings of the Cloud Computing - 4th International Conference, CloudComp 2013, Wuhan, 2013

2012
Contribution à la modélisation et à la régulation du trafic aux intersections : intégration des communications Vehicule-Infrastructure. (Contribution of modelling and traffic control at intersections : Integration with the communication Vehicles-Infrastructure).
PhD thesis, 2012

New vehicle sequencing algorithms with vehicular infrastructure integration for an isolated intersection.
Telecommunication Systems, 2012

Combinatorial optimization algorithms for intelligent vehicle sequencing problem at an isolated intersection.
IJCOPI, 2012

Modeling the cracking process of rocks from continuity to discontinuity using a cellular automaton.
Computers & Geosciences, 2012

Emotion Recognition of Violin Music based on Strings Music Theory for Mascot Robot System.
Proceedings of the ICINCO 2012 - Proceedings of the 9th International Conference on Informatics in Control, Automation and Robotics, Volume 1, Rome, Italy, 28, 2012

2011
Multimodal gesture recognition based on Choquet integral.
Proceedings of the FUZZ-IEEE 2011, 2011

Non-invasive assessment for endothelial CD81 expression via targeted microbubbles.
Proceedings of the 33rd Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2011

FPD Image Quality Evaluation Based on Visual Ergonomics.
Proceedings of the Advances in Computer Science, 2011

Evolution of Social Networks: New Patterns and a New Generator.
Proceedings of the Ninth International Conference on Creating, 2011

2010
Gender consistency and difference in healthy adults revealed by cortical thickness.
NeuroImage, 2010

Research on theory and key technology of trusted computing platform security testing and evaluation.
SCIENCE CHINA Information Sciences, 2010

Research on trusted computing and its development.
SCIENCE CHINA Information Sciences, 2010

Users' Book-Loan Behaviors Analysis and Knowledge Dependency Mining.
Proceedings of the Web-Age Information Management, 11th International Conference, 2010

Analysis of the structure and evolution of the co-borrowing network in Peking University library.
Proceedings of the Seventh International Conference on Fuzzy Systems and Knowledge Discovery, 2010

Large-Scale Social Network Analysis Based on MapReduce.
Proceedings of the International Conference on Computational Aspects of Social Networks, 2010

2009
Analyzing user's book-loan behaviors in Peking university library from social network perspective.
Proceedings of the 2009 Joint International Conference on Digital Libraries, 2009

On-Line Inference for Fuzzy Controllers in Continuous Domains.
Proceedings of the Fuzzy Information and Engineering, 2009

Efficient IRM enforcement of history-based access control policies.
Proceedings of the 2009 ACM Symposium on Information, 2009

A Secure Multi-party Computing Model Based on Trusted Computing Platform.
Proceedings of the Ninth IEEE International Conference on Computer and Information Technology, 2009

2008
Community Discovery Based on Social Actors' Interests and Social Relationships.
Proceedings of the Fourth International Conference on Semantics, Knowledge and Grid, 2008

2007
Daonity - Grid security from two levels of virtualization.
Inf. Sec. Techn. Report, 2007

Daonity: Protocol Solutions to Grid Security Using Hardware Strengthened Software Environment.
Proceedings of the Security Protocols, 2007

Trusted Code Remote Execution through Trusted Computing and Virtualization.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

Building Trusted Sub-domain for the Grid with Trusted Computing.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

2006
A real-time blind source separation scheme and its application to reverberant and noisy acoustic environments.
Signal Processing, 2006

Intelligent Railway Systems in China.
IEEE Intelligent Systems, 2006

Grid System Integrated with Trusted Computing Platform.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

Daonity: grid security with behaviour conformity from trusted computing.
Proceedings of the 1st ACM Workshop on Scalable Trusted Computing, 2006

An Improved Global Trust Value Computing Method in P2P System.
Proceedings of the Autonomic and Trusted Computing, Third International Conference, 2006

Daonity: An Experience on Enhancing Grid Security by Trusted Computing Technology.
Proceedings of the Autonomic and Trusted Computing, Third International Conference, 2006

Research on Association Rules Based Group Ranking Model with Fuzzy Preference Relation Structure.
Proceedings of The 1st IEEE Asia-Pacific Services Computing Conference, 2006

2005
A Jackson Network-Based Model for Quantitative Analysis of Network Security.
Proceedings of the Intelligence and Security Informatics, 2005

2004
A Framework for Adaptive Anomaly Detection Based on Support Vector Data Description.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2004

Real-Time Convolutive Blind Source Separation Based on a Broadband Approach.
Proceedings of the Independent Component Analysis and Blind Signal Separation, 2004


  Loading...