Jianhua Yang

According to our database1, Jianhua Yang authored at least 131 papers between 2000 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
The linguistic modeling of interval-valued time series: A perspective of granular computing.
Inf. Sci., 2019

On the LFM signal improvement by piecewise vibrational resonance using a new spectral amplification factor.
IET Signal Processing, 2019

PLIT: An alignment-free computational tool for identification of long non-coding RNAs in plant transcriptomic datasets.
Comp. in Bio. and Med., 2019

Dynamic Background Subtraction Using Histograms Based on Fuzzy C-Means Clustering and Fuzzy Nearness Degree.
IEEE Access, 2019

Interval Granular Fuzzy Models: Concepts and Development.
IEEE Access, 2019

2018
Region-Adaptive Deformable Registration of CT/MRI Pelvic Images via Learning-Based Image Synthesis.
IEEE Trans. Image Processing, 2018

Deformable Image Registration Using a Cue-Aware Deep Regression Network.
IEEE Trans. Biomed. Engineering, 2018

The impact of mobile marketing on online consumer buying behaviour: empirical evidence from Pakistan.
IJMC, 2018

An Empirical Study to Understand the Effect of Supply Chain Agility on Organizational Operational Performance: SC Agility and Organizational Performance.
IJISSCM, 2018

Vibrational Resonance in an Overdamped System with a Fractional Order Potential Nonlinearity.
I. J. Bifurcation and Chaos, 2018

Realising the decomposition of a multi-frequency signal under the coloured noise background by the adaptive stochastic resonance in the non-linear system with periodic potential.
IET Signal Processing, 2018

A stacked deep autoencoder model for biomedical figure classification.
Proceedings of the 15th IEEE International Symposium on Biomedical Imaging, 2018

Steganography with Convincing Normal Image from A Joint Generative Adversarial Framework.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018

Deep Learning with Feature Reuse for JPEG Image Steganalysis.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018

Sniffing and Chaffing Network Traffic in Stepping-Stone Intrusion Detection.
Proceedings of the 32nd International Conference on Advanced Information Networking and Applications Workshops, 2018

Using Postal Mail System to Teach Packet Switching in Computer Networks.
Proceedings of the 32nd International Conference on Advanced Information Networking and Applications Workshops, 2018

2017
Concept and Evaluation of a New Piezoelectric Transducer for an Implantable Middle Ear Hearing Device.
Sensors, 2017

A Parallel Strategy for Convolutional Neural Network Based on Heterogeneous Cluster for Mobile Information System.
Mobile Information Systems, 2017

A Traffic Prediction Model for Self-Adapting Routing Overlay Network in Publish/Subscribe System.
Mobile Information Systems, 2017

Dual-core steered non-rigid registration for multi-modal images via bi-directional image synthesis.
Medical Image Analysis, 2017

The Effect of Mobile Marketing and Email Marketing on Exploratory Information Seeking (EIS) Behavior of the Consumers: Communication Through Wireless Technologies.
IJEIS, 2017

Dolphin Swarm Extreme Learning Machine.
Cognitive Computation, 2017

Deformable Image Registration Based on Similarity-Steered CNN Regression.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2017, 2017

Ensemble of CNN and rich model for steganalysis.
Proceedings of the International Conference on Systems, Signals and Image Processing, 2017

Steganalysis Based on Awareness of Selection-Channel and Deep Learning.
Proceedings of the Digital Forensics and Watermarking - 16th International Workshop, 2017

A closed-loop design to enhance weight stability of memristor based neural network chips.
Proceedings of the 2017 IEEE/ACM International Conference on Computer-Aided Design, 2017

Data-driven method of reverse modelling for multi-function radar.
Proceedings of the 25th European Signal Processing Conference, 2017

Integrate Stepping-Stone Intrusion Detection Technique into Cybersecurity Curriculum.
Proceedings of the 31st International Conference on Advanced Information Networking and Applications Workshops, 2017

Ethical Hacking and Network Defense: Choose Your Best Network Vulnerability Scanning Tool.
Proceedings of the 31st International Conference on Advanced Information Networking and Applications Workshops, 2017

Inject Stenography into Cybersecurity Education.
Proceedings of the 31st International Conference on Advanced Information Networking and Applications Workshops, 2017

2016
Harmonica: A Framework of Heterogeneous Computing Systems With Memristor-Based Neuromorphic Computing Accelerators.
IEEE Trans. on Circuits and Systems, 2016

Dolphin swarm algorithm.
Frontiers of IT & EE, 2016

The granular extension of Sugeno-type fuzzy models based on optimal allocation of information granularity and its application to forecasting of time series.
Appl. Soft Comput., 2016

Learning-Based Multimodal Image Registration for Prostate Cancer Radiation Therapy.
Proceedings of the Medical Image Computing and Computer-Assisted Intervention - MICCAI 2016, 2016

A Multi-purpose Image Counter-anti-forensic Method Using Convolutional Neural Networks.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

Integrate Hacking Technique into Information Assurance Education.
Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops, 2016

Resistance to Chaff Attack through TCP/IP Packet Cross-Matching and RTT-Based Random Walk.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016

2015
A Multi-Constrained Routing Algorithm for Software Defined Network Based on Nonlinear Annealing.
JNW, 2015

A Human-Computer Cooperation Fuzzy c-Means Clustering with Interval-Valued Weights.
Int. J. Intell. Syst., 2015

Using interval information granules to improve forecasting in fuzzy time series.
Int. J. Approx. Reasoning, 2015

Guest Editorial Solid-state Memristive Devices and Systems.
IEEE J. Emerg. Sel. Topics Circuits Syst., 2015

Denial of service hands-on lab for information assurance education: a case study.
Proceedings of the 2015 Information Security Curriculum Development Conference, 2015

A robust and fault-tolerant filter and its application in MEMS-INS/GPS.
Proceedings of the 12th IEEE International Conference on Networking, Sensing and Control, 2015

RENO: a high-efficient reconfigurable neuromorphic computing accelerator design.
Proceedings of the 52nd Annual Design Automation Conference, 2015

RTT-Based Random Walk Approach to Detect Stepping-Stone Intrusion.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

2014
The modeling and prediction of time series based on synergy of high-order fuzzy cognitive map and fuzzy c-means clustering.
Knowl.-Based Syst., 2014

Genetic ensemble of extreme learning machine.
Neurocomputing, 2014

The modeling of time series based on fuzzy information granules.
Expert Syst. Appl., 2014

NIM: A Node Influence Based Method for Cancer Classification.
Comp. Math. Methods in Medicine, 2014

Enhance learning through developing network security hands-on lab for online students.
Proceedings of the 2014 Information Security Curriculum Development Conference, 2014

2013
A Fast CT and CT-Fluoroscopy Registration Algorithm With Respiratory Motion Compensation for Image-Guided Lung Intervention.
IEEE Trans. Biomed. Engineering, 2013

Imaging of Spinning Targets via Narrow-Band T/R-R Bistatic Radars.
IEEE Geosci. Remote Sensing Lett., 2013

The Linguistic Forecasting of Time Series using Improved Fuzzy Cognitive Map.
International Journal of Computational Intelligence and Applications, 2013

Superpixel-Based Segmentation of Glioblastoma Multiforme from Multimodal MR Images.
Proceedings of the Multimodal Brain Image Analysis - Third International Workshop, 2013

The linguistic forecasting of time series based on fuzzy cognitive maps.
Proceedings of the Joint IFSA World Congress and NAFIPS Annual Meeting, 2013

Constructing a Novel Pos-neg Manifold for Global-Based Image Classification.
Proceedings of the Advanced Data Mining and Applications, 9th International Conference, 2013

2012
Study on the Education Investment Risk of Enterprise Human Capital Based on Monte Carlo Simulation Method.
JCP, 2012

The PID Controller Based on the Artificial Neural Network and the Differential Evolution Algorithm.
JCP, 2012

Bistatic scattering centres of cone-shaped targets and target length estimation.
SCIENCE CHINA Information Sciences, 2012

Channel selection and classification of electroencephalogram signals: An artificial neural network and genetic algorithm-based approach.
Artificial Intelligence in Medicine, 2012

Fast CT-CT fluoroscopy registration with respiratory motion compensation for image-guided lung intervention.
Proceedings of the Medical Imaging 2012: Image-Guided Procedures, 2012

Efficient traffic flow measurement for ISP networks.
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012

Support vector machine (SVM) active learning for automated Glioblastoma segmentation.
Proceedings of the 9th IEEE International Symposium on Biomedical Imaging: From Nano to Macro, 2012

Mining Network Traffic Efficiently to Detect Stepping-Stone Intrusion.
Proceedings of the IEEE 26th International Conference on Advanced Information Networking and Applications, 2012

2011
An equivalent method for blasting vibration simulation.
Simulation Modelling Practice and Theory, 2011

Ubiquitous and Cooperative Network Robot System within a Service Framework.
I. J. Humanoid Robotics, 2011

Correlating TCP/IP Packet contexts to detect stepping-stone intrusion.
Computers & Security, 2011

Exploring and Enhancing the Performance of Parallel IDS on Multi-core Processors.
Proceedings of the IEEE 10th International Conference on Trust, 2011

An investigation into iPod Touch generation 2.
Proceedings of the 2011 Information Security Curriculum Development Conference, 2011

A new algorithm of image denoising based on stationary wavelet multi-scale adaptive threshold.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011

Emerging non-volatile memories: opportunities and challenges.
Proceedings of the 9th International Conference on Hardware/Software Codesign and System Synthesis, 2011

Detect Stepping-Stone Insider Attacks by Network Traffic Mining and Dynamic Programming.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications, 2011

2010
A Novel Breath Analysis System Based on Electronic Olfaction.
IEEE Trans. Biomed. Engineering, 2010

A Colorimetric Sensor for Qualitative Discrimination and Quantitative Detection of Volatile Amines.
Sensors, 2010

Feature Reduction with Inconsistency.
IJCINI, 2010

Iterative class diagram construction in consideration of modeling granularity.
Proceedings of the Fourth IEEE International Conference on Research Challenges in Information Science, 2010

Diabetes Identification and Classification by Means of a Breath Analysis System.
Proceedings of the Medical Biometrics, Second International Conference, 2010

PICE: prior information constrained evolution for 3-D and 4-D brain tumor segmentation.
Proceedings of the 2010 IEEE International Symposium on Biomedical Imaging: From Nano to Macro, 2010

Optimal Sizing Design for Hybrid Renewable Energy Systems in Rural Areas.
Proceedings of the Computer and Computing Technologies in Agriculture IV, 2010

On the construction and implementation methods for performance measurement of reverse supply chain.
Proceedings of the Seventh International Conference on Fuzzy Systems and Knowledge Discovery, 2010

Resist Intruders' Manipulation via Context-Based TCP/IP Packet Matching.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

Using Dynamic Programming Techniques to Detect Multi-hop Stepping-Stone Pairs in a Connection Chain.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

2009
Integrative performance evaluation for supply chain system based on logarithm triangular fuzzy number-AHP method.
Kybernetes, 2009

A context quality management infrastructure for complex ubiquitous environment.
Comput. Syst. Sci. Eng., 2009

Research on Multi-Agent Parallel Computing Model of Hydrothermal Economic Dispatch in Power System.
Proceedings of the Advances in Neural Networks, 2009

Fairness Analysis of Electronic Commerce Protocol Based on Strand Space.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

A Ubiquitous and Cooperative Service Framework for Network Robot System.
Proceedings of the Intelligent Robotics and Applications, Second International Conference, 2009

Correlating TCP/IP Interactive Sessions with Correlation Coefficient to Detect Stepping-Stone Intrusion.
Proceedings of the IEEE 23rd International Conference on Advanced Information Networking and Applications, 2009

2008
Mitigate DDoS attack using TTL buckets and host threatening index.
Proceedings of the LCN 2008, 2008

Characterization of HTTP behavior on access networks in Web 2.0.
Proceedings of the 2008 International Conference on Telecommunications, 2008

Integrative Performance Evaluation for Strategic Supplier's under Supply Chain Management Based on Logarithm Triangular Fuzzy Number- AHP Method.
Proceedings of the Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008

Detecting Stepping-Stone Intrusion and Resisting Evasion through TCP/IP Packets Cross-Matching.
Proceedings of the Autonomic and Trusted Computing, 5th International Conference, 2008

Monitoring Network Traffic to Detect Stepping-Stone Intrusion.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
Mining TCP/IP packets to detect stepping-stone intrusion.
Computers & Security, 2007

Probabilistic analysis of an algorithm to compute TCP packet round-trip time for intrusion detection.
Computers & Security, 2007

Schwarz type algorithms for parabolic problems.
Applied Mathematics and Computation, 2007

Survey on Traffic of Metro Area Network with Measurement On-Line.
Proceedings of the Managing Traffic Performance in Converged Networks, 2007

Fuzzy Integrative Performance Evaluation for Supply Chain System.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

Self-Similar Characteristic of Traffic in Current Metro Area Network.
Proceedings of the 15th IEEE Workshop on Local & Metropolitan Area Networks, 2007

An Accurate and Efficient 3-Phase Measurement Method for IP Traffic Flow on High Speed Link.
Proceedings of the Sixth International Conference on Networking (ICN 2007), 2007

Handover Latency of MIPv6 Implementation in Linux.
Proceedings of the Global Communications Conference, 2007

Feedback and Resources Guided Mechanism for Adaptive Packet Sampling.
Proceedings of the Global Communications Conference, 2007

Stepping-Stone Detection Via Request-Response Traffic Analysis.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

Hybrid Clustering for Large Sequential Data.
Proceedings of the International Conference on Artificial Intelligence and Pattern Recognition, 2007

2006
Modeling and simulation of performance analysis for a cluster-based Web server.
Simulation Modelling Practice and Theory, 2006

A Secure Threshold Proxy Signature Scheme for Mobile Agent-Based Electronic Commerce Transactions.
Proceedings of the Seventh International Conference on Parallel and Distributed Computing, 2006

Resistance Analysis to Intruders' Evasion of Detecting Intrusion.
Proceedings of the Information Security, 9th International Conference, 2006

ODSG: An Architecture of Ontology-based Distributed Simulation on Grid.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

Finding TCP Packet Round-Trip Time for Intrusion Detection: Algorithm and Analysis.
Proceedings of the Cryptology and Network Security, 5th International Conference, 2006

Hybrid O(n Ön) Clustering for Sequential Web Usage Mining.
Proceedings of the AI 2006: Advances in Artificial Intelligence, 2006

Resistance Analysis to Intruders' Evasion of a Novel Algorithm to Detect Stepping-Stone.
Proceedings of the Autonomic and Trusted Computing, Third International Conference, 2006

A Clustering-Partitioning Algorithm to Find TCP Packet Round-Trip Time for Intrusion Detection.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

Finding the Longest Similar Subsequence of Thumbprints for Intrusion Detection.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

Probabilistic Proof of an Algorithm to Compute TCP Packet Round-Trip Time for Intrusion Detection.
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006

2005
Movement detection delay analysis in mobile IP.
Computer Communications, 2005

Additive Schwarz methods for parabolic problems.
Applied Mathematics and Computation, 2005

An NFSv4-Based Security Scheme for NAS.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

Improved Thumbprint and Its Application for Intrusion Detection.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

Voronoi-based Topological Information for Combining Partitioning and Hierarchical Clustering.
Proceedings of the 2005 International Conference on Computational Intelligence for Modelling Control and Automation (CIMCA 2005), 2005

Hybrid Agglomerative Clustering for Large Databases: An Efficient Interactivity Approach.
Proceedings of the AI 2005: Advances in Artificial Intelligence, 2005

Matching TCP Packets and Its Application to the Detection of Long Connection Chains on the Internet.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

2004
PID Controller Based on the Artificial Neural Network.
Proceedings of the Advances in Neural Networks, 2004

Cluster Validity Through Graph-based Boundary Analysis.
Proceedings of the International Conference on Information and Knowledge Engineering. IKE'04, 2004

Virtual Battlefield Attack-Defense Countermeasure Simulation on the Grid.
Proceedings of the Grid and Cooperative Computing, 2004

A Secure Model for Network-Attached Storage on the Grid.
Proceedings of the 2004 IEEE International Conference on Services Computing (SCC 2004), 2004

2003
Cluster Validity Using Support Vector Machines.
Proceedings of the Data Warehousing and Knowledge Discovery, 5th International Conference, 2003

Measurement-Based Modeling with Adaptive Sampling.
Proceedings of the 12th Asian Test Symposium (ATS 2003), 17-19 November 2003, Xian, China, 2003

2002
Clustering Web Visitors by Fast, Robust and Convergent Algorithms.
Int. J. Found. Comput. Sci., 2002

2001
Categorizing Visitors Dynamically by Fast and Robust Clustering of Access Logs.
Proceedings of the Web Intelligence: Research and Development, 2001

Non-crisp Clustering by Fast, Convergent, and Robust Algorithms.
Proceedings of the Principles of Data Mining and Knowledge Discovery, 2001

2000
Fast and Robust General Purpose Clustering Algorithms.
PRICAI, 2000


  Loading...