Jiawei Yuan

Orcid: 0000-0001-5440-3794

According to our database1, Jiawei Yuan authored at least 70 papers between 2012 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
An adaptive parental guidance strategy and its derived indicator-based evolutionary algorithm for multi- and many-objective optimization.
Swarm Evol. Comput., February, 2024

Efficient and anonymous password-hardened encryption services.
Inf. Sci., January, 2024

2023
Faulty-Feeder Detection for Single Phase-to-Ground Faults in Distribution Networks Based on Waveform Encoding and Waveform Segmentation.
IEEE Trans. Smart Grid, September, 2023

EvaGoNet: An integrated network of variational autoencoder and Wasserstein generative adversarial network with gradient penalty for binary classification tasks.
Inf. Sci., June, 2023

A Kalman filter-based prediction strategy for multiobjective multitasking optimization.
Expert Syst. Appl., 2023

Virtual Curtain: A Communicative Fine-grained Privacy Control Framework for Augmented Reality.
Proceedings of the International Conference on Computing, Networking and Communications, 2023

A Hybrid Delay-aware Approach Towards UAV Flight Data Anomaly Detection.
Proceedings of the International Conference on Computing, Networking and Communications, 2023

Towards the Security of AI-Enabled UAV Anomaly Detection.
Proceedings of the IEEE International Conference on Communications, 2023

2022
Pedestrian Collision Risk Assessment Based on State Estimation and Motion Prediction.
IEEE Trans. Veh. Technol., 2022

Indicator-Based Evolutionary Algorithm for Solving Constrained Multiobjective Optimization Problems.
IEEE Trans. Evol. Comput., 2022

A constrained multi-objective evolutionary algorithm using valuable infeasible solutions.
Swarm Evol. Comput., 2022

Automated Braking Decision and Control for Pedestrian Collision Avoidance Based on Risk Assessment.
IEEE Intell. Transp. Syst. Mag., 2022

Adversarial Attacks and Defenses Toward AI-Assisted UAV Infrastructure Inspection.
IEEE Internet Things J., 2022

Integrated optimization of train timetable, rolling stock assignment and short-turning strategy for a metro line.
Eur. J. Oper. Res., 2022

Faulty feeder detection based on image recognition of current waveform superposition in distribution networks.
Appl. Soft Comput., 2022

Keycrux: A New Design of Distributed and Convenient Blockchain Digital Wallet.
Proceedings of the IEEE Smartworld, 2022

Generative Data Augmentation with Contrastive Learning for Zero-Shot Stance Detection.
Proceedings of the 2022 Conference on Empirical Methods in Natural Language Processing, 2022

Study on Dynamic Characteristics of Sliding Friction Interfaces in Feed System During Non-stable Starting Stage.
Proceedings of the 8th International Conference on Control, 2022

2021
Investigating the Properties of Indicators and an Evolutionary Many-Objective Algorithm Using Promising Regions.
IEEE Trans. Evol. Comput., 2021

Solving binary multi-objective knapsack problems with novel greedy strategy.
Memetic Comput., 2021

Dynamic grid-based uniform search for solving constrained multiobjective optimization problems.
Memetic Comput., 2021

Low-Latency Privacy-Preserving Outsourcing of Deep Neural Network Inference.
IEEE Internet Things J., 2021

Performance investigation of I∊-indicator and I∊+-indicator based on Lp-norm.
Neurocomputing, 2021

Blockchain enabled verification for cellular-connected unmanned aircraft system networking.
Future Gener. Comput. Syst., 2021

Self-learning soft computing algorithms for prediction machines of estimating crowd density.
Appl. Soft Comput., 2021

UCLP: A Novel UAV Cybersecurity Laboratory Platform.
Proceedings of the SIGITE '21: The 22nd Annual Conference on Information Technology Education, SnowBird, UT, USA, October 6, 2021

Design and Simulation of a Wide-Bandwidth CMUTs Array with Dual-Mixed radii and Multi Operating Modes.
Proceedings of the 16th IEEE International Conference on Nano/Micro Engineered and Molecular Systems, 2021

Sensor Data-Driven UAV Anomaly Detection using Deep Learning Approach.
Proceedings of the 2021 IEEE Military Communications Conference, 2021

Lightweight and Reliable Decentralized Reward System using Blockchain.
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021

Blur the Eyes of UAV: Effective Attacks on UAV-based Infrastructure Inspection.
Proceedings of the 33rd IEEE International Conference on Tools with Artificial Intelligence, 2021

Detecting Spying Activities from the Sky via Deep Learning.
Proceedings of the ICC 2021, 2021

2020
CPAR: Cloud-Assisted Privacy-preserving Image Annotation with Randomized k-d Forest.
EAI Endorsed Trans. Security Safety, 2020

2019
Practical Privacy-Preserving MapReduce Based K-Means Clustering Over Large-Scale Dataset.
IEEE Trans. Cloud Comput., 2019

Efficient privacy-preserving authentication framework for edge-assisted Internet of Drones.
J. Inf. Secur. Appl., 2019

Optimizing the energy-spectrum efficiency of cellular systems by evolutionary multi-objective algorithm.
Integr. Comput. Aided Eng., 2019

LEP-CNN: A Lightweight Edge Device Assisted Privacy-preserving CNN Inference Solution for IoT.
CoRR, 2019

Edge-Assisted CNN Inference over Encrypted Data for Internet of Things.
Proceedings of the Security and Privacy in Communication Networks, 2019

Workload-Aware Task Placement in Edge-Assisted Human Re-identification.
Proceedings of the 16th Annual IEEE International Conference on Sensing, 2019

PDF-DS: Privacy-Preserving Data Filtering for Distributed Data Streams in Cloud.
Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2019

Edge-Assisted Image Processing with Joint Optimization of Responding and Placement Strategy.
Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2019

Analysis of Rogue Access Points Using SDR.
Proceedings of the IEEE International Conference on Industrial Internet, 2019

Blockchain-based Secure Routing Strategy for Airborne Mesh Networks.
Proceedings of the IEEE International Conference on Industrial Internet, 2019

Edge-Assisted Learning for Real-Time UAV Imagery via Predictive Offloading.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Secure and Reliable Decentralized Truth Discovery Using Blockchain.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

2018
A multi-point parameterized model reduction for large parametric systems by using Krylov-subspace techniques.
Trans. Inst. Meas. Control, 2018

A parameterised model order reduction method for parametric systems based on Laguerre polynomials.
Int. J. Control, 2018

CPAR: Cloud-Assisted Privacy-preserving Image Annotation with Randomized KD-Forest.
CoRR, 2018

Fountain Code Enabled ADS-B for Aviation Security and Safety Enhancement.
Proceedings of the 37th IEEE International Performance Computing and Communications Conference, 2018

A Cost Value Based Evolutionary Many-Objective Optimization Algorithm with Neighbor Selection Strategy.
Proceedings of the 2018 IEEE Congress on Evolutionary Computation, 2018

2017
Towards a privacy preserving cohort discovery framework for clinical research networks.
J. Biomed. Informatics, 2017

Population Decomposition-Based Greedy Approach Algorithm for the Multi-Objective Knapsack Problems.
Int. J. Pattern Recognit. Artif. Intell., 2017

CAPIA: Cloud assisted privacy-preserving image annotation.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

2016
Examining Healthcare Utilization Patterns of Elderly and Middle-Aged Adults in the United States.
Proceedings of the Twenty-Ninth International Florida Artificial Intelligence Research Society Conference, 2016

SBPA: Social behavior based cross Social Network phishing attacks.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

A New Dominance Relation Based on Simplex for Many Objective Optimization Problems.
Proceedings of the 12th International Conference on Computational Intelligence and Security, 2016

2015
Public Integrity Auditing for Dynamic Data Sharing With Multiuser Modification.
IEEE Trans. Inf. Forensics Secur., 2015

Structure-preserving model order reduction by general orthogonal polynomials for integral-differential systems.
J. Frankl. Inst., 2015

PCPOR: Public and constant-cost proofs of retrievability in cloud.
J. Comput. Secur., 2015

MASK-BAN: Movement-Aided Authenticated Secret Key Extraction Utilizing Channel Characteristics in Body Area Networks.
IEEE Internet Things J., 2015

SEISA: Secure and efficient encrypted image search with access control.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

2014
Privacy Preserving Back-Propagation Neural Network Learning Made Practical with Cloud Computing.
IEEE Trans. Parallel Distributed Syst., 2014

Efficient public integrity checking for cloud data sharing with multi-user modification.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

2013
BANA: Body Area Network Authentication Exploiting Channel Characteristics.
IEEE J. Sel. Areas Commun., 2013

Flexible and Publicly Verifiable Aggregation Query for Outsourced Databases in Cloud.
IACR Cryptol. ePrint Arch., 2013

Secure and Constant Cost Public Cloud Storage Auditing with Deduplication.
IACR Cryptol. ePrint Arch., 2013

ASK-BAN: authenticated secret key extraction utilizing channel characteristics for body area networks.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013

Efficient privacy-preserving biometric identification in cloud computing.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

2012
Proofs of Retrievability with Public Verifiability and Constant Communication Cost in Cloud.
IACR Cryptol. ePrint Arch., 2012

Privacy Preserving Back-Propagation Learning Made Practical with Cloud Computing.
Proceedings of the Security and Privacy in Communication Networks, 2012

Authenticated secret key extraction using channel characteristics for body area networks.
Proceedings of the ACM Conference on Computer and Communications Security, 2012


  Loading...