Jian-Ping Yu

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Known people with the same name:

Bibliography

2024
A cross-layered cluster embedding learning network with regularization for multivariate time series anomaly detection.
J. Supercomput., May, 2024

Adaptive Sampling Allocation for Distributed Data Storage in Compressive CrowdSensing.
IEEE Internet Things J., April, 2024

Graph representation learning method based on three-way partial order structure.
Int. J. Approx. Reason., February, 2024

Design of a 3-D Tactile Sensing Array for Incipient Slip Detection in Robotic Dexterous Manipulation.
IEEE Trans. Instrum. Meas., 2024

A preliminary study on few-shot knowledge reasoning mechanism based on three-way partial order structure.
Inf. Sci., 2024

Region-based compressive distributed storage in Mobile CrowdSensing.
Future Gener. Comput. Syst., 2024

2023
Towards Reliable Federated Learning Using Blockchain-Based Reverse Auctions and Reputation Incentives.
Symmetry, December, 2023

MSK-UNET: A Modified U-Net Architecture Based on Selective Kernel with Multi-Scale Input for Pavement Crack Detection.
J. Circuits Syst. Comput., January, 2023

A Filter-APOSD approach for feature selection and linguistic knowledge discovery.
J. Intell. Fuzzy Syst., 2023

2022
Review and data mining of linguistic studies of English modal verbs.
WIREs Data Mining Knowl. Discov., 2022

Manufacture of Three-Dimensional Optofluidic Spot-Size Converters in Fused Silica Using Hybrid Laser Microfabrication.
Sensors, 2022

Investigation of features causing semantic mergers of English modal verbs by approach of attribute partial order diagram.
J. Intell. Fuzzy Syst., 2022

Further study of the localized solutions of the (2+1)-dimensional B-Kadomtsev-Petviashvili equation.
Commun. Nonlinear Sci. Numer. Simul., 2022

SEACU-Net: Attentive ConvLSTM U-Net with squeeze-and-excitation layer for skin lesion segmentation.
Comput. Methods Programs Biomed., 2022

Towards An Integrated Framework for Neural Temporal Point Process.
Proceedings of the International Joint Conference on Neural Networks, 2022

2021
Value-aware cache replacement in edge networks for Internet of Things.
Trans. Emerg. Telecommun. Technol., 2021

N-soliton solutions and dynamic property analysis of a generalized three-component Hirota-Satsuma coupled KdV equation.
Appl. Math. Lett., 2021

Group-Based Deep Transfer Learning with Mixed Gate Control for Cross- Domain Recommendation.
Proceedings of the International Joint Conference on Neural Networks, 2021

Learning Self-Modulating Attention in Continuous Time Space with Applications to Sequential Recommendation.
Proceedings of the 38th International Conference on Machine Learning, 2021

2020
Private Machine Learning Classification Based on Fully Homomorphic Encryption.
IEEE Trans. Emerg. Top. Comput., 2020

N-soliton solutions and long-time asymptotic analysis for a generalized complex Hirota-Satsuma coupled KdV equation.
Appl. Math. Lett., 2020

A Real-Time Audio and Video Streaming Transmission Scheme for Social Media.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2020

2019
Diversity of Interaction Solutions of a Shallow Water Wave Equation.
Complex., 2019

Dynamics of lump solitary wave of Kadomtsev-Petviashvili-Boussinesq-like equation.
Comput. Math. Appl., 2019

2017
A Parallel Hash Function with Variable Initial Values.
Wirel. Pers. Commun., 2017

Research on the Hash Function Structures and its Application.
Wirel. Pers. Commun., 2017

Efficient Chosen-Ciphertext Secure Encryption from R-LWE.
Wirel. Pers. Commun., 2017

Utilizing fully homomorphic encryption to implement secure medical computation in smart cities.
Pers. Ubiquitous Comput., 2017

A note on the Gaussons of some new logarithmic evolution equations.
Comput. Math. Appl., 2017

Anonymous Anti-Sybil Attack Protocol for Mobile Healthcare Networks Analytics.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

An Improved Leveled Fully Homomorphic Encryption Scheme over the Integers.
Proceedings of the Information Security Practice and Experience, 2017

Clustering Boundary Cutting for Packet Classification Based on Distribution Density.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

2016
An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing.
IEEE Trans. Inf. Forensics Secur., 2016

Attribute-Based Data Sharing Scheme Revisited in Cloud Computing.
IEEE Trans. Inf. Forensics Secur., 2016

Efficient identity-based leveled fully homomorphic encryption from RLWE.
Secur. Commun. Networks, 2016

Efficient multi-party quantum key agreement by cluster states.
Quantum Inf. Process., 2016

A new approach of attribute partial order structure diagram for word sense disambiguation of English prepositions.
Knowl. Based Syst., 2016

Efficient Signature Schemes from R-LWE.
KSII Trans. Internet Inf. Syst., 2016

Optimizing security and quality of service in a Real-time database system using Multi-objective genetic algorithm.
Expert Syst. Appl., 2016

Modified method of simplest equation and its applications to the Bogoyavlenskii equation.
Comput. Math. Appl., 2016

Rational solutions to two new KP-like equations.
Comput. Math. Appl., 2016

(n+1)-Dimensional reduced differential transform method for solving partial differential equations.
Appl. Math. Comput., 2016

An accelerated fully homomorphic encryption scheme over the integers.
Proceedings of the 4th International Conference on Cloud Computing and Intelligence Systems, 2016

2015
Improved Hash Functions for Cancelable Fingerprint Encryption Schemes.
Wirel. Pers. Commun., 2015

Dynamic deployment of virtual machines in cloud computing using multi-objective optimization.
Soft Comput., 2015

Quantum private comparison with a malicious third party.
Quantum Inf. Process., 2015

Research on Anonymization and De-anonymization in the Bitcoin System.
CoRR, 2015

A Blind-Mixing Scheme for Bitcoin based on an Elliptic Curve Cryptography Blind Digital Signature Algorithm.
CoRR, 2015

Transaction Remote Release (TRR): A New Anonymization Technology for Bitcoin.
CoRR, 2015

A novel hybrid multi-objective immune algorithm with adaptive differential evolution.
Comput. Oper. Res., 2015

A Fingerprint Encryption Scheme Based on Irreversible Function and Secure Authentication.
Comput. Math. Methods Medicine, 2015

A new approach of rules extraction for word sense disambiguation by features of attributes.
Appl. Soft Comput., 2015

A double-module immune algorithm for multi-objective optimization problems.
Appl. Soft Comput., 2015

2014
Efficient Linear Homomorphic Encryption from LWE Over Rings.
Wirel. Pers. Commun., 2014

Energy-efficient filtering for skyline queries in cluster-based sensor networks.
Comput. Electr. Eng., 2014

Privacy-preserving Data Aggregation Scheme Based on the P-Function Set in Wireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2014

2013
A planar capacitive sensor for 2D long-range displacement measurement.
J. Zhejiang Univ. Sci. C, 2013

Improved Multi-objective Evolutionary Algorithm for Multi-agent Coalition Formation.
J. Softw., 2013

Hybrid Ant Algorithm Based Query Processing with Multiagents in Sensor Networks.
Int. J. Distributed Sens. Networks, 2013

Skyline Monitoring in Wireless Sensor Networks.
IEICE Trans. Commun., 2013

2012
Unified analysis of statics of some limited-DOF parallel manipulators.
Robotica, 2012

2011
Modelling the guaranteed QoS for wireless sensor networks: a network calculus approach.
EURASIP J. Wirel. Commun. Netw., 2011

Modeling on Guaranteed QoS for Wireless Sensor Networks: A Network Calculus Method
CoRR, 2011

The degree and connectivity of Internet's scale-free topology
CoRR, 2011

Solving Stiffness and Elastic Deformation of Two Limited-Degree-of-Freedom Parallel Manipulators with a Constrained Leg Based on Active/Constrained Wrench.
Adv. Robotics, 2011

2010
Determination of singularities of some 4-DOF parallel manipulators by translational/rotational Jacobian matrices.
Robotica, 2010

Attack Model and Performance Evaluation of Text Digital Watermarking.
J. Comput., 2010

Simulation of normal machining of 3D free-form surface by an orthogonal 3-leg parallel machine tool with 5-DOF.
Comput. Ind. Eng., 2010

Dynamics Analysis of Some Limited-Degree-of-Freedom Parallel Manipulators with <i>n</i> UPS Active Legs and a Passive Constraining Leg.
Adv. Robotics, 2010

Detection of Behavioral Contextual Properties in Asynchronous Pervasive Computing Environments.
Proceedings of the 16th IEEE International Conference on Parallel and Distributed Systems, 2010

Middleware Support for Context-awareness in Asynchronous Pervasive Computing Environments.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

2009
Kinematics and statics analysis of a novel 4-dof 2SPS+2SPR parallel manipulator and solving its workspace.
Robotica, 2009

Kinematic analysis of limited-dof parallel manipulators based on translational/rotational Jacobian and Hessian matrices.
Robotica, 2009

Ant-Based Reliable Multi-Constrained Anycast Routing for Sensor Networks.
Int. J. Distributed Sens. Networks, 2009

Ant-Based Delay-Sensitive Query Processing for Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2009

Using CAD variation geometry solving constrained wrench of some limited-dof parallel manipulators.
Int. J. Comput. Aided Eng. Technol., 2009

Checking Behavioral Consistency Constraints for Pervasive Context in Asynchronous Environments
CoRR, 2009

A Survey on Position-Based Routing Algorithms in Wireless Sensor Networks.
Algorithms, 2009

2008
Word sense disambiguation of the English modal verb may by back propagation neural network.
Proceedings of the 4th International Conference on Natural Language Processing and Knowledge Engineering, 2008

A Novel Cloud-Based Fuzzy Self-Adaptive Ant Colony System.
Proceedings of the Fourth International Conference on Natural Computation, 2008

Ant-based query processing for replicated events in wireless sensor networks.
Proceedings of the IEEE Congress on Evolutionary Computation, 2008

2006
Implicitization of Parametric Curves via Lagrange Interpolation.
Computing, 2006

AINIDS: an immune-based network intrusion detection system.
Proceedings of the Data Mining, 2006

A Key Distribution Scheme Based on Public Key Cryptography for Sensor Networks.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

Implicitization of Rational Curves.
Proceedings of the Artificial Intelligence and Symbolic Computation, 2006

2004
Reduction of training datasets via fuzzy entropy for support vector machines.
Proceedings of the IEEE International Conference on Systems, 2004

Hybrid Method for Solving New Pose Estimation Equation System.
Proceedings of the Computer Algebra and Geometric Algebra with Applications, 2004


  Loading...