Shiyong Zhang

Orcid: 0000-0002-6386-4952

According to our database1, Shiyong Zhang authored at least 104 papers between 2001 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Manipulability-Augmented Next-Best-Configuration Exploration Planner for High-DoF Manipulators.
IEEE Robotics Autom. Lett., May, 2024

BA-LIOM: tightly coupled laser-inertial odometry and mapping with bundle adjustment.
Robotica, March, 2024

Design of information management model based on multiobjective optimization algorithm in intelligent electric financial system.
PeerJ Comput. Sci., 2024

2023
STUNS-Planner: a Spatiotemporal Motion Planner with Unbending and Consistency Awareness for Quadrotors in Unknown Environments.
J. Intell. Robotic Syst., 2023

Highly reliable quantum dot laser directly grown on CMOS compatible Si (001) substrate.
Proceedings of the Optical Fiber Communications Conference and Exhibition, 2023

2022
Fast Active Aerial Exploration for Traversable Path Finding of Ground Robots in Unknown Environments.
IEEE Trans. Instrum. Meas., 2022

Near-Optimal 3-D Visual Coverage for Quadrotor Unmanned Aerial Vehicles Under Photogrammetric Constraints.
IEEE Trans. Ind. Electron., 2022

Barrier Function Enhanced Geometric Controller for Safe Control of a Quadrotor UAV.
Proceedings of the International Conference on Advanced Robotics and Mechatronics , 2022

2019
New results on the state cycles of Trivium.
Des. Codes Cryptogr., 2019

A 15 - 34 GHz Robust GaN based Low-Noise Amplifier with 0.8dB Minimum Noise Figure.
Proceedings of the 17th IEEE International New Circuits and Systems Conference, 2019

2017
Micro-Trivium: A lightweight algorithm designed for radio frequency identification systems.
Int. J. Distributed Sens. Networks, 2017

2016
Cube attack on reduced-round Enhanced-Bivium.
Proceedings of the International Conference on Security of Smart Cities, 2016

A challenge-response authentication for RFID using Enhanced-Trivium.
Proceedings of the International Conference on Security of Smart Cities, 2016

Design and implementation of a new web anti-attack method based on URL randomization.
Proceedings of the International Conference on Computer, 2016

STRESS: An IPv6 to IPv4 Converter for Sniffing Software.
Proceedings of the International Conference on Computer, 2016

State Recovering Attack Against Quavium.
Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops, 2016

2014
Implementing a novel load-aware auto scale scheme for private cloud resource management platform.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014

WarMops: A Workload-Aware Resource Management Optimization Strategy for IaaS Private Clouds.
Proceedings of the IEEE International Conference on Services Computing, SCC 2014, Anchorage, AK, USA, June 27, 2014

2013
Inter-training: Exploiting unlabeled data in multi-classifier systems.
Knowl. Based Syst., 2013

A hybrid generative/discriminative method for semi-supervised classification.
Knowl. Based Syst., 2013

The Algorithm of AAES.
IACR Cryptol. ePrint Arch., 2013

2012
A semi-supervised ensemble learning algorithm.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012

2011
Text stream clustering algorithm based on adaptive feature selection.
Expert Syst. Appl., 2011

Towards realistic mobility modeling for vehicular ad hoc networks.
Proceedings of the 2011 Spring Simulation Multi-conference, 2011

Meddler, Agents in the Bounded Confidence Model on Flocking Movement World.
Proceedings of the Advances in Neural Networks - ISNN 2011, 2011

2010
Semantic Network Language Generation based on a Semantic Networks Serialization Grammar.
World Wide Web, 2010

The Influence of a Low-Level Color or Figure Adaptation on a High-Level Face Perception.
IEICE Trans. Inf. Syst., 2010

A Variable Step-Size Proportionate NLMS Algorithm for Identification of Sparse Impulse Response.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

Tag tree template for Web information and schema extraction.
Expert Syst. Appl., 2010

The Opinion Dynamics and Bounded Confidence model on Flocking movement world.
Proceedings of the 2010 IEEE International Conference on Intelligent Systems and Knowledge Engineering, 2010

MARDO: A novel schema of dynamic QoS optimizing for composite web services using cooperative agents.
Proceedings of the 2010 14th International Conference on Computer Supported Cooperative Work in Design, 2010

2009
Incorporating topic transition in topic detection and tracking algorithms.
Expert Syst. Appl., 2009

A Variable Step-Size Proportionate Affine Projection Algorithm for Identification of Sparse Impulse Response.
EURASIP J. Adv. Signal Process., 2009

WS-CHMA: A Composite-Pattern Based Hierarchical WS-Management Architecture.
Proceedings of the 2009 IEEE Congress on Services, Part I, 2009

Improvement of the Mu-law Proportionate NLMS Algorithm.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2009), 2009

Research on WS-Management-based System and Network Resource Management Middleware Model.
Proceedings of the IEEE International Conference on Web Services, 2009

A variable step-size proportionate affine projection algorithm for network echo cancellation.
Proceedings of the 16th International Conference on Digital Signal Processing, 2009

The Output of Human Expression System Measured by Visual Adaptation and Its Implication for the Computer Recognition System.
Proceedings of the Ninth IEEE International Conference on Computer and Information Technology, 2009

2008
A framework for WWW user activity analysis based on user interest.
Knowl. Based Syst., 2008

An Intersection-Centric Priority Algorithm for Traffic Simulation Based on Multi-Agents.
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008

Approach to model WEB activity based on phase transition theory.
Proceedings of the 3rd International Conference on Intelligent System and Knowledge Engineering, 2008

KAEF: An En-route Scheme of Filtering False Data in Wireless Sensor Networks.
Proceedings of the 2008 IEEE International Performance, 2008

Self-Healing Key Distribution with Revocation and Collusion Resistance for Wireless Sensor Networks.
Proceedings of the International Multisymposiums on Computer and Computational Sciences, 2008

WSDSNM3: A Web Services-based Distributed System and Network Management Middleware Model and Scheme.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

MINC-Based Layered Multicast Dynamic Subscribing Mechanism.
Proceedings of the 2008 International Conference on Internet Computing, 2008

MultiPeerCast: A Tree-Mesh-Hybrid P2P Live Streaming Scheme Design and Implementation Based on PeerCast.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications, 2008

WS-M4: A Novel WS-Management-Based System Resource Management Middleware Model and Scheme.
Proceedings of the Seventh International Conference on Grid and Cooperative Computing, 2008

Efficient Self-Healing Key Distribution with Limited Group Membership for Communication-Constrained Networks.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

A variable parameter improved proportionate normalized LMS algorithm.
Proceedings of the IEEE Asia Pacific Conference on Circuits and Systems, 2008

SOAMS: A Novel SOA-based System and Network Management Model and Scheme.
Proceedings of the 2008 IEEE International Conference on Services Computing (SCC 2008), 2008

Learn adaptive dynamic policy under mixed multi-agent environment.
Proceedings of 8th IEEE International Conference on Computer and Information Technology, 2008

PeerCDN: A novel P2P network assisted streaming content delivery network scheme.
Proceedings of 8th IEEE International Conference on Computer and Information Technology, 2008

A performance study on deterministic label graph matching algorithm.
Proceedings of 8th IEEE International Conference on Computer and Information Technology, 2008

2007
Variable space hidden Markov model for topic detection and analysis.
Knowl. Based Syst., 2007

A Novel Automatic Framework for Scoliosis X-Ray Image Retrieval.
Proceedings of the International Joint Conference on Neural Networks, 2007

A Novel WSRF and Multi-Agent based Distributed System Resource Management Scheme.
Proceedings of the Grid and Cooperative Computing, 2007

Predictive Model for Internet Public Opinion.
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007

A Novel Image Semantic Block Clustering Method based on Artificial Visual Cortical Responding Model.
Proceedings of the IEEE Symposium on Computational Intelligence and Data Mining, 2007

Artificial Visual Cortical Responding Model in Image Semantic Processing.
Proceedings of the 2007 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2007), 2007

MCSAMS: A Novel WSRF and Multi-agent based Distributed Multimedia Content Service Alliance and Management Scheme.
Proceedings of the 2007 IEEE International Conference on Services Computing, 2007

Task Allocation Adaptable to Network Topology among Cooperative.
Proceedings of the Seventh International Conference on Computer and Information Technology (CIT 2007), 2007

A Matrix-Based Random Key Pre-distribution Scheme for Wireless Sensor Networks.
Proceedings of the Seventh International Conference on Computer and Information Technology (CIT 2007), 2007

KadStreaming: A Novel Kademlia P2P Network-Based VoD Streaming Scheme.
Proceedings of the Seventh International Conference on Computer and Information Technology (CIT 2007), 2007

Overview of LDPC Codes.
Proceedings of the Seventh International Conference on Computer and Information Technology (CIT 2007), 2007

Design and Implementation of a Novel P2P-Based VOD System Using Media File Segments Selecting Algorithm.
Proceedings of the Seventh International Conference on Computer and Information Technology (CIT 2007), 2007

Probabilistic Isolation of Malicious Vehicles in Pseudonym Changing VANETs.
Proceedings of the Seventh International Conference on Computer and Information Technology (CIT 2007), 2007

2006
SAID: A Self-Adaptive Intrusion Detection System in Wireless Sensor Networks.
Proceedings of the Information Security Applications, 7th International Workshop, 2006

SeLoc: Secure Localization for Wireless Sensor and Actor Network.
Proceedings of the IEEE 3rd International Conference on Mobile Adhoc and Sensor Systems, 2006

Fast Shape Index Framework Based on Principle Component Analysis Using Edge Co-occurrence Matrix.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006

A Novel Implementation of JPEG 2000 Lossless Coding Based on LZMA.
Proceedings of the Sixth International Conference on Computer and Information Technology (CIT 2006), 2006

PEAN: A Public Key Authentication Scheme in Wireless Sensor and Actor Network.
Proceedings of the Sixth International Conference on Computer and Information Technology (CIT 2006), 2006

Multi-Agent based Data Integration in Real-world.
Proceedings of the Sixth International Conference on Computer and Information Technology (CIT 2006), 2006

2005
An adaptive adjusting mechanism for agent distributed blackboard architecture.
Microprocess. Microsystems, 2005

A novel defense model for dynamic topology network based on mobile agent.
Microprocess. Microsystems, 2005

The agent migration and fault-tolerance management in dynamic network security system.
Int. J. Inf. Technol. Manag., 2005

Constructing agents blackboard communication architecture based on graph theory.
Comput. Stand. Interfaces, 2005

Autonomous trust construction in multi-agent systems - a graph theory methodology.
Adv. Eng. Softw., 2005

Distributed Intrusion Detection for Mobile Ad Hoc Networks.
Proceedings of the 2005 IEEE/IPSJ International Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops), 31 January, 2005

Resisting Flooding Attacks in Ad Hoc Networks.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

mdGrid: A Novel Broadband Multimedia Content Delivery Service Grid Model.
Proceedings of the Ninth IASTED International Conference on Internet and Multimedia Systems and Applications (IMSA 2005), 2005

Performance Analysis of a Novel MAC Protocol For Service Differentiation In Wireless Network.
Proceedings of the 2005 International Conference on Wireless Networks, 2005

An Architecture for Intrusion Detection and Active Response Using Autonomous Agents in Mobile Ad Hoc Networks.
Proceedings of the ICEIS 2005, 2005

Applying Mobile Agent to Intrusion Response for Ad Hoc Networks.
Proceedings of the Computational Science, 2005

A Novel Intrusion Detection Method for Mobile Ad Hoc Networks.
Proceedings of the Advances in Grid Computing, 2005

Gossip-based Multicast Loss Recovery Mechanisms in Group Key Distribution.
Proceedings of the Fifth International Conference on Computer and Information Technology (CIT 2005), 2005

WS-CABroker: A Novel Web Services-based Multimedia Content Alliance Broker Scheme.
Proceedings of the Fifth International Conference on Computer and Information Technology (CIT 2005), 2005

Frequency-hopping based Secure Schemes in Sensornets.
Proceedings of the Fifth International Conference on Computer and Information Technology (CIT 2005), 2005

GOD Queuing : A Novel Grid-based Resource Co-allocation Scheme in Distributed Multimedia System.
Proceedings of the Fifth International Conference on Computer and Information Technology (CIT 2005), 2005

Performance Tradeoff with Adaptive Frame Length and Modulation in Wireless Network.
Proceedings of the Fifth International Conference on Computer and Information Technology (CIT 2005), 2005

2004
Defend mobile agent against malicious hosts in migration itineraries.
Microprocess. Microsystems, 2004

A Novel Policy and Information Flow Security Model for Active Network.
Proceedings of the Intelligence and Security Informatics, 2004

A Novel Autonomous Trust Management Model for Mobile Agents.
Proceedings of the Intelligence and Security Informatics, 2004

An access control policy for active networks.
Proceedings of the 9th IEEE Symposium on Computers and Communications (ISCC 2006), June 28, 2004

The construction of a novel agent fault-tolerant migration model.
Proceedings of the 9th IEEE Symposium on Computers and Communications (ISCC 2006), June 28, 2004

Securing ad hoc networks through mobile agent.
Proceedings of the 3rd International Conference on Information Security, 2004

The Construction and Analysis of Agent Fault-Tolerance Model Based on pi-Calculus.
Proceedings of the Computational Science, 2004

Research and Design on a Novel OGSA-Based Open Content Alliance Scheme.
Proceedings of the Grid and Cooperative Computing, 2004

A Topology-Adapted Network Defense Model Based on Mobile Agent.
Proceedings of the Grid and Cooperative Computing, 2004

Applying Multi-medians Location and Steiner Tree Methods into Agents Distributed Blackboard Architecture Construction.
Proceedings of the AI 2004: Advances in Artificial Intelligence, 2004

Research on Service Model of Content Delivery Grid.
Proceedings of the Advanced Web Technologies and Applications, 2004

2003
Multimedia Delivery Grid: A Novel Multimedia Delivery Scheme.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003

Scheduling Model in Global Real-Time High Performance Computing with Network Calculus.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003

PLI: A New Framework to Protect Digital Content for P2P Networks.
Proceedings of the Applied Cryptography and Network Security, 2003

2001
Network Monitoring in Broadband Network.
Proceedings of the 2nd International Conference on Web Information Systems Engineering, 2001


  Loading...