Jianyi Zhang

Orcid: 0000-0001-8765-053X

According to our database1, Jianyi Zhang authored at least 70 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Proformer: a hybrid macaron transformer model predicts expression values from promoter sequences.
BMC Bioinform., December, 2024

Nonlinear speed-tracking control with overcurrent protection for uncertain permanent magnet synchronous motor systems.
Trans. Inst. Meas. Control, February, 2024

Adaptive Neural Asymptotic Tracking Control for PMSM Systems Under Current Constraints and Unknown Dynamics.
IEEE Trans. Circuits Syst. II Express Briefs, February, 2024

GPU Accelerated Full Homomorphic Encryption Cryptosystem, Library, and Applications for IoT Systems.
IEEE Internet Things J., February, 2024

A New Method for Identifying Influential Spreaders in Complex Networks.
Comput. J., January, 2024

2023
SAFTE: A self-injection based anti-fuzzing technique.
Comput. Electr. Eng., November, 2023

PriRPT: Practical blockchain-based privacy-preserving reporting system with rewards.
J. Syst. Archit., October, 2023

MAD-YOLO: A quantitative detection algorithm for dense small-scale marine benthos.
Ecol. Informatics, July, 2023

LST-EMG-Net: Long short-term transformer feature fusion network for sEMG gesture recognition.
Frontiers Neurorobotics, June, 2023

Unlocking the Potential of Federated Learning: The Symphony of Dataset Distillation via Deep Generative Latents.
CoRR, 2023

DACBERT: Leveraging Dependency Agreement for Cost-Efficient Bert Pretraining.
CoRR, 2023

Ethical Considerations and Policy Implications for Large Language Models: Guiding Responsible Development and Deployment.
CoRR, 2023

Towards Building the Federated GPT: Federated Instruction Tuning.
CoRR, 2023

MGCN: Medical Relation Extraction Based on GCN.
Comput. Informatics, 2023

Systematic Analysis of Security and Vulnerabilities in Miniapps.
Proceedings of the 2023 ACM Workshop on Secure and Trustworthy Superapps, 2023

Fed-CBS: A Heterogeneity-Aware Client Sampling Mechanism for Federated Learning via Class-Imbalance Reduction.
Proceedings of the International Conference on Machine Learning, 2023

A Small Leak Will Sink Many Ships: Vulnerabilities Related to mini-programs Permissions.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023

ReAugKD: Retrieval-Augmented Knowledge Distillation For Pre-trained Language Models.
Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics (Volume 2: Short Papers), 2023

2022
WINNER: A network biology tool for biomolecular characterization and prioritization.
Frontiers Big Data, 2022

YoloXT: A object detection algorithm for marine benthos.
Ecol. Informatics, 2022

XMAM: X-raying Models with A Matrix to Reveal Backdoor Attacks for Federated Learning.
CoRR, 2022

Rethinking Normalization Methods in Federated Learning.
CoRR, 2022

FADE: Enabling Large-Scale Federated Adversarial Training on Resource-Constrained Edge Devices.
CoRR, 2022

A Small Leak Will Sink Many Ships: Vulnerabilities Related to Mini Programs Permissions.
CoRR, 2022

GAN-based Medical Image Small Region Forgery Detection via a Two-Stage Cascade Framework.
CoRR, 2022

SWTRU: Star-shaped Window Transformer Reinforced U-Net for medical image segmentation.
Comput. Biol. Medicine, 2022

Intelligent Annotation Algorithm Based on Deep-Sea Macrobenthic Images.
Comput. Informatics, 2022

Ultrannel: Ultrasound based Covert Communication Channel.
Proceedings of the IEEE Smartworld, 2022

Why do We Need Large Batchsizes in Contrastive Learning? A Gradient-Bias Perspective.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

Three-Stage Salient Object Detection based on Integrated Priors.
Proceedings of the International Symposium on Intelligent Signal Processing and Communication Systems, 2022

Join-Chain Network: A Logical Reasoning View of the Multi-head Attention in Transformer.
Proceedings of the IEEE International Conference on Data Mining Workshops, 2022

Next Generation Federated Learning for Edge Devices: An Overview.
Proceedings of the 8th IEEE International Conference on Collaboration and Internet Computing, 2022

2021
A Malicious URL Detection Model Based on Convolutional Neural Network.
Secur. Commun. Networks, 2021

LIDDE: A differential evolution algorithm based on local-influence-descending search strategy for influence maximization in social networks.
J. Netw. Comput. Appl., 2021

User behavior prediction via heterogeneous information in social networks.
Inf. Sci., 2021

Differentiable Logic Machines.
CoRR, 2021

Identifying Influential Nodes in Complex Networks Based on Neighborhood Entropy Centrality.
Comput. J., 2021

Ranking influential nodes in complex networks based on local and global structures.
Appl. Intell., 2021

Mobile Device Fingerprint Identification Using Gyroscope Resonance.
IEEE Access, 2021

FLOP: Federated Learning on Medical Datasets using Partial Networks.
Proceedings of the KDD '21: The 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2021

Safe Distributional Reinforcement Learning.
Proceedings of the Distributed Artificial Intelligence - Third International Conference, 2021

Towards Fair Federated Learning With Zero-Shot Data Augmentation.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2021

Automated Mapping of Real-world Oncology Laboratory Data to LOINC.
Proceedings of the AMIA 2021, American Medical Informatics Association Annual Symposium, San Diego, CA, USA, October 30, 2021, 2021

2020
Nonlinear Motion Control of Complicated Dual Rotary Crane Systems Without Velocity Feedback: Design, Analysis, and Hardware Experiments.
IEEE Trans Autom. Sci. Eng., 2020

Gemini-Chain: A Regulatable Digital Currency Model based on Blockchain.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Security of Medical Cyber-physical Systems: An Empirical Study on Imaging Devices.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Variance Reduction in Stochastic Particle-Optimization Sampling.
Proceedings of the 37th International Conference on Machine Learning, 2020

Cyclical Stochastic Gradient MCMC for Bayesian Deep Learning.
Proceedings of the 8th International Conference on Learning Representations, 2020

Stochastic Particle-Optimization Sampling and the Non-Asymptotic Convergence Theory.
Proceedings of the 23rd International Conference on Artificial Intelligence and Statistics, 2020

2019
WIPER: Weighted in-Path Edge Ranking for biomolecular association networks.
Quant. Biol., 2019

Typer vs. CAPTCHA: Private information based CAPTCHA to defend against crowdsourcing human cheating.
CoRR, 2019

No One Can Escape: A General Approach to Detect Tampered and Generated Image.
IEEE Access, 2019

Nonlinear Output Feedback Control of Flexible Rope Crane Systems With State Constraints.
IEEE Access, 2019

A Quantitative Approach for Medical Imaging Device Security Assessment.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

DGA and DNS Covert Channel Detection System based on Machine Learning.
Proceedings of the 3rd International Conference on Computer Science and Application Engineering, 2019

Android Malware Detection Based on Convolutional Neural Networks.
Proceedings of the 3rd International Conference on Computer Science and Application Engineering, 2019

Honeynet Construction Based on Intrusion Detection.
Proceedings of the 3rd International Conference on Computer Science and Application Engineering, 2019

DICOM-Fuzzer: Research on DICOM Vulnerability Mining Based on Fuzzing Technology.
Proceedings of the Communications and Networking, 2019

Medical Protocol Security: DICOM Vulnerability Mining Based on Fuzzing Technology.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Self-Adversarially Learned Bayesian Sampling.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

2018
Stochastic Particle-Optimization Sampling and the Non-Asymptotic Convergence Theory.
CoRR, 2018

Efficient and Provable Security Searchable Asymmetric Encryption in the Cloud.
IEEE Access, 2018

A Flexible Rope Crane Control Method.
Proceedings of the IEEE International Conference on Real-time Computing and Robotics, 2018

Medical Devices are at Risk: Information Security on Diagnostic Imaging System.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Design and Elementary Evaluation of a Highly-Automated Fluorescence-Based Instrument System for On-Site Detection of Food-Borne Pathogens.
Sensors, 2017

2016
URL Based Gateway Side Phishing Detection Method.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

2012
A Prior-based Transfer Learning Method for the Phishing Detection.
J. Networks, 2012

2009
Optimization and Innovation of Screw Joints of Micron-Wood-Fiber Molded Products.
Proceedings of the Growth and Development of Computer-Aided Innovation, 2009

Research on Operating Parameters and Energy Consumption of Cold Store Based on Rough Set Theory.
Proceedings of the Sixth International Conference on Fuzzy Systems and Knowledge Discovery, 2009

2004
A Personalized Commodities Recommendation Procedure and Algorithm Based on Association Rule Mining.
Proceedings of the Fourth International Conference on Electronic Business, 2004


  Loading...