Limin Yang

Orcid: 0000-0001-5652-9382

According to our database1, Limin Yang authored at least 45 papers between 1998 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Obstacle Avoidance Strategy for a Novel Skiing Robot in Unknown Snow Environments.
IEEE Robotics Autom. Lett., 2024

2023
SW-LIO: A Sliding Window Based Tightly Coupled LiDAR-Inertial Odometry.
IEEE Robotics Autom. Lett., October, 2023

Jigsaw Puzzle: Selective Backdoor Attack to Subvert Malware Classifiers.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Everybody's Got ML, Tell Me What Else You Have: Practitioners' Perception of ML-Based Security Tools and Explanations.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Is It Overkill? Analyzing Feature-Space Concept Drift in Malware Detectors.
Proceedings of the 2023 IEEE Security and Privacy Workshops (SPW), 2023

Force-Estimation Based Interaction of Legged Robots through Whole-Body Dynamics.
Proceedings of the Intelligent Robotics and Applications - 16th International Conference, 2023

Design and Control of a Novel Six-Legged Robot for Flat, Downhill, and Uphill Skiing.
Proceedings of the Intelligent Robotics and Applications - 16th International Conference, 2023

HexGuide: A Hexapod Robot for Autonomous Blind Guidance in Challenging Environments.
Proceedings of the Intelligent Robotics and Applications - 16th International Conference, 2023

2022
Model Predictive Control of a Novel Wheeled-Legged Planetary Rover for Trajectory Tracking.
Sensors, 2022

FEVO-LOAM: Feature Extraction and Vertical Optimized Lidar Odometry and Mapping.
IEEE Robotics Autom. Lett., 2022

2021
CADE: Detecting and Explaining Concept Drift Samples for Security Applications.
Proceedings of the 30th USENIX Security Symposium, 2021

BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware.
Proceedings of the IEEE Security and Privacy Workshops, 2021

2020
Characterization of MSS Channel Reflectance and Derived Spectral Indices for Building Consistent Landsat 1-5 Data Record.
IEEE Trans. Geosci. Remote. Sens., 2020

Security Vetting Process of Smart-home Assistant Applications: A First Look and Case Studies.
CoRR, 2020

Measuring and Modeling the Label Dynamics of Online Anti-Malware Engines.
Proceedings of the 29th USENIX Security Symposium, 2020

A Case Study of the Security Vetting Process of Smart-home Assistant Applications.
Proceedings of the 2020 IEEE Security and Privacy Workshops, 2020

Benchmarking Label Dynamics of VirusTotal Engines.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

A New Data Visualization and Digitization Method for Building Electronic Health Record.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2020

2019
A Simplified Analytical Calculation Model of Average Power Loss for Modular Multilevel Converter.
IEEE Trans. Ind. Electron., 2019

Overall Methodology Design for the United States National Land Cover Database 2016 Products.
Remote. Sens., 2019

Opening the Blackbox of VirusTotal: Analyzing Online Phishing Scan Engines.
Proceedings of the Internet Measurement Conference, 2019

2018
Understanding the Reproducibility of Crowd-reported Security Vulnerabilities.
Proceedings of the 27th USENIX Security Symposium, 2018

Radiation dose reduction in digital breast tomosynthesis (DBT) by means of deep-learning-based supervised image processing.
Proceedings of the Medical Imaging 2018: Image Processing, 2018

Radiation dose reduction in digital breast tomosynthesis (DBT) by means of neural network convolution (NNC) deep learning.
Proceedings of the 14th International Workshop on Breast Imaging, 2018

2017
Characterizing user behaviors in location-based find-and-flirt services: Anonymity and demographics - A WeChat Case Study.
Peer-to-Peer Netw. Appl., 2017

A low-loss energy rebalancing control scheme of MMC under submodule fault conditions.
Proceedings of the IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, China, October 29, 2017

VulDigger: A Just-in-Time and Cost-Aware Tool for Digging Vulnerability-Contributing Changes.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

2016
An Assessment of the Cultivated Cropland Class of NLCD 2006 Using a Multi-Source and Multi-Criteria Approach.
Remote. Sens., 2016

Efficiency optimization of MMC adopting harmonic circulating current injection.
Proceedings of the IECON 2016, 2016

2015
Validating the Modified Perpendicular Drought Index in the North China Region Using In Situ Soil Moisture Measurement.
IEEE Geosci. Remote. Sens. Lett., 2015

Frequency Recognition Based on Wavelet-Independent Component Analysis for SSVEP-Based BCIs.
Proceedings of the Advances in Neural Networks - ISNN 2015, 2015

Fast Basis Searching Method of Adaptive Fourier Decomposition Based on Nelder-Mead Algorithm for ECG Signals.
Proceedings of the Advances in Neural Networks - ISNN 2015, 2015

Beta/theta ratio neurofeedback training effects on the spectral topography of EEG.
Proceedings of the 37th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2015

2013
Bond graph representations of hydraulic pipelines using normal modes with dissipative friction.
Simul., 2013

Real-time apparent density measurement of the working fluid in outlet pipes of a steam-injection boiler.
Proceedings of the IEEE International Instrumentation and Measurement Technology Conference, 2013

2012
Comparison of 15° and 30° Angle Acquisition Digital Breast Tomosynthesis for Visualization and Characterization of Breast Abnormalities.
Proceedings of the Breast Imaging, 2012

2011
High-resolution velocity estimation and range profile analysis of moving target for pulse LFM UWB radar.
Signal Process., 2011

MAC layer broadcast algorithm in Ad Hoc networks with directional antennas.
Proceedings of the 14th International Symposium on Wireless Personal Multimedia Communications, 2011

Cooperation Policy Selection for Energy-Constrained Ad Hoc Networks Using Correlated Equilibrium.
Proceedings of the Green Communications and Networking - First International Conference, 2011

2009
Developing Consistent Landsat Data Sets for Large Area Applications: The MRLC 2001 Protocol.
IEEE Geosci. Remote. Sens. Lett., 2009

2007
Land Cover Classification in the Poyang Lake Region, China, Using Landsat TM and JERS-1 Synthetic Aperture Radar Data.
Ann. GIS, 2007

A semi-empirical backscattering model for estimation of leaf area index (LAI) of rice in southern China.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2007

2006
Fingerprint Matching Based on Octantal Nearest-Neighbor Structure and Core Points.
Proceedings of the Computer Vision, Graphics and Image Processing, 5th Indian Conference, 2006

2005
A robust method for eye features extraction on color image.
Pattern Recognit. Lett., 2005

1998
An Automated Quality Control Program for Whole Breast Digital Image Receptors.
Proceedings of the Digital Mammography, 1998


  Loading...