Jun Yan

According to our database1, Jun Yan authored at least 104 papers between 2005 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
A New Asymptotic Analysis Technique for Diversity Receptions Over Correlated Lognormal Fading Channels.
IEEE Trans. Communications, 2018

A bibliometric analysis of text mining in medical research.
Soft Comput., 2018

Chemical-induced disease extraction via recurrent piecewise convolutional neural networks.
BMC Med. Inf. & Decision Making, 2018

Three-Dimensional VLC Positioning Based on Angle Difference of Arrival With Arbitrary Tilting Angle of Receiver.
IEEE Journal on Selected Areas in Communications, 2018

Language Modeling with Sparse Product of Sememe Experts.
CoRR, 2018

Adapting to Unknown Noise Distribution in Matrix Denoising.
CoRR, 2018

The Impact of Different Channel of Online Review on Consumers' Online Trust.
Proceedings of the 22nd Pacific Asia Conference on Information Systems, 2018

Understanding the Determinants of Online Consumer Review Helpfulness in Social Networking Service Context.
Proceedings of the 22nd Pacific Asia Conference on Information Systems, 2018

LAND: a user-friendly and customizable test generation tool for Android apps.
Proceedings of the 27th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2018

Finding Overlapping Communities by Increasing the Determinacy of SLPA in Complex Networks.
Proceedings of the Intelligence Science and Big Data Engineering, 2018

Improved Lorentzian Greedy Iterative Algorithm Based on Bi-directional Support Estimation for Compressed Sensing.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2018

Batch Normalization: Is Learning An Adaptive Gain and Bias Necessary?
Proceedings of the 10th International Conference on Machine Learning and Computing, 2018

Checking Activity Transition Systems with Back Transitions Against Assertions.
Proceedings of the Formal Methods and Software Engineering, 2018

Gridless Two-Dimensional Doa Estimation With L-Shaped Array Based on the Cross-Covariance Matrix.
Proceedings of the 2018 IEEE International Conference on Acoustics, 2018

Language Modeling with Sparse Product of Sememe Experts.
Proceedings of the 2018 Conference on Empirical Methods in Natural Language Processing, Brussels, Belgium, October 31, 2018

Android Stack Machine.
Proceedings of the Computer Aided Verification - 30th International Conference, 2018

2017
Asymptotically Tight Performance Bounds of Diversity Receptions Over α-μ Fading Channels With Arbitrary Correlation.
IEEE Trans. Vehicular Technology, 2017

Automated selection of r for the r largest order statistics approach with adjustment for sequential testing.
Statistics and Computing, 2017

Large-scale extraction of drug-disease pairs from the medical literature.
JASIST, 2017

Understanding usage of Internet of Things (IOT) systems in China: Cognitive experience and affect experience as moderator.
IT & People, 2017

A New Asymptotic Analysis Technique for Diversity Receptions Over Correlated Lognormal Fading Channels.
CoRR, 2017

A novel phase performance evaluation method for particle swarm optimization algorithms using velocity-based state estimation.
Appl. Soft Comput., 2017

Sentence-level Sentiment Classification with Weak Supervision.
Proceedings of the 40th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2017

Uncertain Graph Method Based on Triadic Closure Improving Privacy Preserving in Social Network.
Proceedings of the International Conference on Networking and Network Applications, 2017

A Privacy Measurement Method Using Network Structure Entropy.
Proceedings of the International Conference on Networking and Network Applications, 2017

Preserving Friendly-Correlations in Uncertain Graphs Using Differential Privacy.
Proceedings of the International Conference on Networking and Network Applications, 2017

Self-paced Compensatory Deep Boltzmann Machine for Semi-Structured Document Embedding.
Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, 2017

Optimal relay placement for UAV-assisted wireless regenerative communication system.
Proceedings of the 13th International Conference on Natural Computation, 2017

An CNN-LSTM Attention Approach to Understanding User Query Intent from Online Health Communities.
Proceedings of the 2017 IEEE International Conference on Data Mining Workshops, 2017

VLC Positioning Using Cameras with Unknown Tilting Angles.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

GIS applications in developing zero-waste strategies at a mid-size American university.
Proceedings of the 25th International Conference on Geoinformatics, 2017

A new technique for analyzing asymptotic outage performance of diversity over lognormal fading channels.
Proceedings of the 15th Canadian Workshop on Information Theory, 2017

Optimal user node placement for multi-hop FSO broadcasting communications under weak turbulence conditions.
Proceedings of the 15th Canadian Workshop on Information Theory, 2017

Active Sentiment Domain Adaptation.
Proceedings of the 55th Annual Meeting of the Association for Computational Linguistics, 2017

2016
Online Updating of Statistical Inference in the Big Data Setting.
Technometrics, 2016

Variance Analysis and Adaptive Sampling for Indirect Light Path Reuse.
J. Comput. Sci. Technol., 2016

A visible light communication indoor localization algorithm in rotated environments.
Proceedings of the International Conference on Computer, 2016

2015
Fuzzy control and wavelet transform-based energy management strategy design of a hybrid tracked bulldozer.
Journal of Intelligent and Fuzzy Systems, 2015

Automatic Modulation Recognition of PSK Signals with Sub-Nyquist Sampling Based on High Order Statistics.
CoRR, 2015

Automatic Modulation Recognition of PSK Signals Using Nonuniform Compressive Samples Based on High Order Statistics.
CoRR, 2015

A Novel Compressed Sensing Based Model for Reconstructing Sparse Signals Using Phase Sparse Character.
CoRR, 2015

A Data Fusion Scheme for Modified EKF Banks Positioning Algorithm in Mixed LOS/NLOS Conditions.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

Automatic Detection of Parameter Shielding for Test Case Generation.
Proceedings of the 27th International Conference on Software Engineering and Knowledge Engineering, 2015

Quantum Bit Commitment with Application in Quantum Zero-Knowledge Proof (Extended Abstract).
Proceedings of the Algorithms and Computation - 26th International Symposium, 2015

2014
Quantum Bit Commitment with Application in Quantum Zero-Knowledge Proof.
IACR Cryptology ePrint Archive, 2014

Trust-oriented QoS-aware composite service selection based on genetic algorithms.
Concurrency and Computation: Practice and Experience, 2014

Attribute-Based Data Transfer with Filtering Scheme in Cloud Computing.
Comput. J., 2014

Professional or interactive: CEOs' image strategies in the microblogging context.
Computers in Human Behavior, 2014

Towards a Trust Model for Trust Establishment and Management in Business-to-Consumer E-Commerce.
Proceedings of the 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops, 2014

Automated Coverage-Driven Test Data Generation Using Dynamic Symbolic Execution.
Proceedings of the Eighth International Conference on Software Security and Reliability, 2014

Automatic modulation recognition of PSK signals with Sub-Nyquist sampling based on high order statistics.
Proceedings of the 2014 IEEE International Symposium on Signal Processing and Information Technology, 2014

Low-rate turbo-Hadamard coding approach for narrow-band interference suppression.
Proceedings of the IEEE International Conference on Communications, 2014

Patients' adoption of the e-appointment scheduling service: A case study in primary healthcare.
Proceedings of the Investing in E-Health: People, Knowledge and Technology for a Healthy Future, 2014

A novel direct approach for highway design and visualization based on LIDAR.
Proceedings of the 22nd International Conference on Geoinformatics, 2014

Improved Spectral Clustering Algorithm Based on Similarity Measure.
Proceedings of the Advanced Data Mining and Applications - 10th International Conference, 2014

2013
METscout: a pathfinder exploring the landscape of metabolites, enzymes and transporters.
Nucleic Acids Research, 2013

PyDPI: Freely Available Python Package for Chemoinformatics, Bioinformatics, and Chemogenomics Studies.
Journal of Chemical Information and Modeling, 2013

DOA estimation based on sparse representation via folding OMP.
Proceedings of the 15th IEEE International Conference on Communication Technology, 2013

Accurate and Low-Overhead Process-Level Energy Estimation for Modern Hard Disk Drives.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

Multilateral Game in Chinese Real Estate Price: A Game Analysis of Real Estate Tax and Land Tightening.
Proceedings of the Sixth International Conference on Business Intelligence and Financial Engineering, 2013

2012
Privacy preserving protocol for service aggregation in cloud computing.
Softw., Pract. Exper., 2012

Privacy enhanced data outsourcing in the cloud.
J. Network and Computer Applications, 2012

New constructions of OSBE schemes and their applications in oblivious access control.
Int. J. Inf. Sec., 2012

Base station identification in single-frequency network positioning system under mixed line-of-sight/non-line-of-sight condition.
IET Communications, 2012

Efficient oblivious transfers with access control.
Computers & Mathematics with Applications, 2012

Attribute-Based Oblivious Access Control.
Comput. J., 2012

Cooperative scheme in SFN positioning system.
Proceedings of the 2012 Ubiquitous Positioning, 2012

A Surprisingly Simple Way of Reversing Trace Distance via Entanglement.
Proceedings of the Theory and Applications of Models of Computation, 2012

Complete Problem for Perfect Zero-Knowledge Quantum Proof.
Proceedings of the SOFSEM 2012: Theory and Practice of Computer Science, 2012

Automating Code Reviews with Simulink Code Inspector.
Proceedings of the Dagstuhl-Workshop MBEES: Modellbasierte Entwicklung eingebetteter Systeme VIII, 2012

Towards Modelling Real Time Constraints.
Proceedings of the ICSOFT 2012 - Proceedings of the 7th International Conference on Software Paradigm Trends, Rome, Italy, 24, 2012

2011
A goodness-of-fit test for multivariate multiparameter copulas based on multiplier central limit theorems.
Statistics and Computing, 2011

A passive location system for single frequency networks using digital terrestrial TV signals.
European Transactions on Telecommunications, 2011

Fitting semiparametric regressions for panel count survival data with an R package spef.
Computer Methods and Programs in Biomedicine, 2011

Privacy-Preserved Access Control for Cloud Computing.
Proceedings of the IEEE 10th International Conference on Trust, 2011

RCM-Fuzzy Model and Its Applications to Maintenance with Cost/Serviceability Optimization.
Proceedings of the Applied Informatics and Communication - International Conference, 2011

Improving the Performance of Personalized Recommendation with Ontological User Interest Model.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

2010
Nonparametric rank-based tests of bivariate extreme-value dependence.
J. Multivariate Analysis, 2010

An Agent-Based Personalized Active Service Model.
Proceedings of the Fifth IEEE International Symposium on Service-Oriented System Engineering, 2010

Using landsat data to detect long-term morphodynamic behavior of estuaries: A case study in the Xiaoqing River estuary, China.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2010

The application of BP and RBF model in the forecasting of the runoff and the sediment transport volume in Linjin section.
Proceedings of the Sixth International Conference on Natural Computation, 2010

2009
An expert system using rough sets theory for aided conceptual design of ship's engine room automation.
Expert Syst. Appl., 2009

Forwarding index of cube-connected cycles.
Discrete Applied Mathematics, 2009

The moderate deviation principle for self-normalized sums of sums of i.i.d. random variables.
Appl. Math. Lett., 2009

Optimization Way of Engineering Equipment Maintenance Based on Process Algebra.
Proceedings of the 2009 IITA International Conference on Services Science, 2009

The Fuzzy Synthesize Assess in Reliability and Maintainability of Military Engineer Machinery.
Proceedings of the 2009 IITA International Conference on Services Science, 2009

Levenberg-Marquardt Algorithm Applied to Forecast the Ice Conditions in Ningmeng Reach of the Yellow River.
Proceedings of the Fifth International Conference on Natural Computation, 2009

The Fuzzy-AI Modeling for Optimization of Long-Term Metro Vehicle Repair.
Proceedings of the Sixth International Conference on Fuzzy Systems and Knowledge Discovery, 2009

Closed-loop identification for model predictive control: Direct method.
Proceedings of the 48th IEEE Conference on Decision and Control, 2009

Research and Design of Extension Case Base Based on CBR.
Proceedings of the Business Intelligence: Artificial Intelligence in Business, 2009

2008
Kernel Density Estimation of traffic accidents in a network space.
Computers, Environment and Urban Systems, 2008

Cross-estimator design for coordinated systems: Constraints, covariance, and communications resource assignment.
Automatica, 2008

Application of Multi-layer Feed-forward Neural Network in Fault Diagnosis Based on FBP Algorithm.
Proceedings of the Ninth ACIS International Conference on Software Engineering, 2008

Robust Watermark Algorithm Based on the Wavelet Moment Modulation and Neural Network Detection.
Proceedings of the Advances in Neural Networks, 2008

Improve Web Search Ranking by Co-ranking SVM.
Proceedings of the Fourth International Conference on Natural Computation, 2008

A fully integrated zero-IF mobile TV tuner RFIC for S-band CMMB application.
Proceedings of the IEEE 2008 Custom Integrated Circuits Conference, 2008

A multifunction transceiver RFIC for 802.11a/b/g WLAN and DVB-H applications.
Proceedings of the IEEE 2008 Custom Integrated Circuits Conference, 2008

3D Measurement of Human Faces for Biometric Application by Digital Fringe Projection with Digital Light Projection (DLP).
Proceedings of the BIOSIG 2008, 2008

2007
Parallelizing MCMC for Bayesian spatiotemporal geostatistical models.
Statistics and Computing, 2007

A New Upper Bound On Forwarding Index of Graphs.
Ars Comb., 2007

Secure Routing Protocol based Trust for Ad Hoc Networks.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

An agent-based decentralised process management framework for web service composition.
Proceedings of the 2nf International Conference on Scalable Information Systems, 2007

2006
A direct-conversion mixer with DC-offset cancellation for IEEE 802.11a WLAN receiver.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2006), 2006

2005
Incorporating state estimation into model predictive control and its application to network traffic control.
Automatica, 2005


  Loading...