Shaojie Yang

Orcid: 0000-0002-6566-9528

According to our database1, Shaojie Yang authored at least 16 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Wave breaking phenomenon in the unidirectional non-local wave model.
Appl. Math. Lett., April, 2024

2023
A Federated Learning Multi-Task Scheduling Mechanism Based on Trusted Computing Sandbox.
Sensors, February, 2023

2022
Toward machine intelligence that learns to fingerprint polymorphic worms in IoT.
Int. J. Intell. Syst., 2022

An Android Malware Detection and Classification Approach Based on Contrastive Lerning.
Comput. Secur., 2022

2021
An internet of things malware classification method based on mixture of experts neural network.
Trans. Emerg. Telecommun. Technol., 2021

Fault Diagnosis Based on Multi-scale LSTM-FCNs for Industrial Process.
Proceedings of the CAA Symposium on Fault Detection, 2021

Intelligent Pain Management System Based On IoT Technology.
Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2021

2020
A Real-Time and Adaptive-Learning Malware Detection Method Based on API-Pair Graph.
IEEE Access, 2020

A Novel Intrusion Detection System for Malware Based on Time-Series Meta-learning.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020

Mastering Complex Control in MOBA Games with Deep Reinforcement Learning.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
Lie symmetry analysis for a parabolic Monge-Ampère equation in the optimal investment theory.
J. Comput. Appl. Math., 2019

Local-in-space blow-up and symmetric waves for a generalized two-component Camassa-Holm system.
Appl. Math. Comput., 2019

An Automatic Signature-Based Approach for Polymorphic Worms in Big Data Environment.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

Approach using Transforming Structural Data into Image for Detection of Malicious MS-DOC Files based on Deep Learning Models.
Proceedings of the 2019 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2019

2014
Lie symmetry reductions and exact solutions of a coupled KdV-Burgers equation.
Appl. Math. Comput., 2014

2012
Virtual cell-breathing based load balancing in downlink LTE-A self-optimizing networks.
Proceedings of the International Conference on Wireless Communications and Signal Processing, 2012


  Loading...