Tao Ye

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2024
An Overlapping Self-Organizing Sharding Scheme Based on DRL for Large-Scale IIoT Blockchain.
IEEE Internet Things J., February, 2024

Generalized hurdle count data models based on interpretable machine learning with an application to health care demand.
Computing, February, 2024

2023
A novel routing optimization strategy based on reinforcement learning in perception layer networks.
Comput. Networks, December, 2023

Color-saliency-aware correlation filters with approximate affine transform for visual tracking.
Vis. Comput., September, 2023

A novel multi-objective immune optimization algorithm for under sampling software defect prediction problem.
Concurr. Comput. Pract. Exp., February, 2023

A Survey on Redactable Blockchain: Challenges and Opportunities.
IEEE Trans. Netw. Sci. Eng., 2023

2022
Density-Peak-Based Overlapping Community Detection Algorithm.
IEEE Trans. Comput. Soc. Syst., 2022

Improving Spatial Disaggregation of Crop Yield by Incorporating Machine Learning with Multisource Data: A Case Study of Chinese Maize Yield.
Remote. Sens., 2022

Multi-branch self-learning Vision Transformer (MSViT) for crop type mapping with Optical-SAR time-series.
Comput. Electron. Agric., 2022

2021
High Resolution Distribution Dataset of Double-Season Paddy Rice in China.
Remote. Sens., 2021

Mapping Crop Rotation by Using Deeply Synergistic Optical and SAR Time Series.
Remote. Sens., 2021

A Satellite-Based Method for National Winter Wheat Yield Estimating in China.
Remote. Sens., 2021

Research on lightweight detection model of fake domain name.
Int. J. Wirel. Mob. Comput., 2021

Generative adversarial network-enabled learning scheme for power grid vulnerability analysis.
Int. J. Web Grid Serv., 2021

A Machine Learning Approach to Evaluate the Performance of Rural Bank.
Complex., 2021

Impossible Differential Cryptanalysis and Integral Cryptanalysis of the ACE-Class Permutation.
Proceedings of the Information Security Practice and Experience: 16th International Conference, 2021

2020
Weighted Densely Connected Convolutional Networks for Reinforcement Learning.
Int. J. Pattern Recognit. Artif. Intell., 2020

Music Classification in MIDI Format based on LSTM Mdel.
CoRR, 2020

Whale Optimization Algorithm for Multiconstraint Second-Order Stochastic Dominance Portfolio Optimization.
Comput. Intell. Neurosci., 2020

How to Promote the Development of Youth Information Technology Education in China through Programming Ability for Adolescents Standard.
Proceedings of the 15th International Conference on Computer Science & Education, 2020

Exploration on the construction of big data basic course for non computer major.
Proceedings of the 15th International Conference on Computer Science & Education, 2020

Discovery of Sparse Formula Based on Elastic Network Method and Its Application in Identification of Turbulent Boundary Layer Wall Function.
Proceedings of the Big Data - 8th CCF Conference, 2020

2019
A New Cube Attack on MORUS by Using Division Property.
IEEE Trans. Computers, 2019

An efficient access control scheme based on CP-ABE with supporting attribute change in cloud storage systems.
Int. J. Wirel. Mob. Comput., 2019

Design of Hybrid Control Algorithm for Fault Ride-Through of Photovoltaic System.
IEEE Access, 2019

VR Course Construction Oriented by Innovation Project Development.
Proceedings of the 14th International Conference on Computer Science & Education, 2019

2018
Generalized Nonlinear Invariant Attack and a New Design Criterion for Round Constants.
IACR Trans. Symmetric Cryptol., 2018

Software behaviour analysis method based on behaviour template.
Int. J. Simul. Process. Model., 2018

Gray Wolf Optimization Algorithm for Multi-Constraints Second-Order Stochastic Dominance Portfolio Optimization.
Algorithms, 2018

2017
Smartphone-Based Real Time Vehicle Tracking in Indoor Parking Structures.
IEEE Trans. Mob. Comput., 2017

Biogeography-Based Optimization of the Portfolio Optimization Problem with Second Order Stochastic Dominance Constraints.
Algorithms, 2017

2016
Multi-Story Indoor Floor Plan Reconstruction via Mobile Crowdsensing.
IEEE Trans. Mob. Comput., 2016

An Empirical Study on Detecting and Fixing Buffer Overflow Bugs.
Proceedings of the 2016 IEEE International Conference on Software Testing, 2016

2015
Integrating tabu search and VLSN search to develop enhanced algorithms: A case study using bipartite boolean quadratic programs.
Eur. J. Oper. Res., 2015

VeTrack: Real Time Vehicle Tracking in Uninstrumented Indoor Environments.
Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems, 2015

2014
A novel low-noise high-linearity CMOS transmitter for mobile UHF RFID reader.
Sci. China Inf. Sci., 2014

VeLoc: finding your car in the parking lot.
Proceedings of the 12th ACM Conference on Embedded Network Sensor Systems, 2014

Jigsaw: indoor floor plan reconstruction via mobile crowdsensing.
Proceedings of the 20th Annual International Conference on Mobile Computing and Networking, 2014

A hazard based approach to user return time prediction.
Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2014

RA-inspired codes for efficient information theoretic multi-path network security.
Proceedings of the International Symposium on Information Theory and its Applications, 2014

2013
Binary Coded Output Support Vector Machine.
Proceedings of the Intelligent Computing Theories and Technology, 2013

2012
A novel compact low-power direct conversion receiver for mobile UHF RFID reader.
Sci. China Inf. Sci., 2012

Coded Output Support Vector Machine.
Proceedings of the Intelligent Computing Theories and Applications, 2012

2011
The bridge relating process neural networks and traditional neural networks.
Neurocomputing, 2011

Five-Axis Milling Simulation Based on B-rep Model.
Proceedings of the Intelligent Robotics and Applications - 4th International Conference, 2011

2009
Improving wireless security through network diversity.
Comput. Commun. Rev., 2009

Labor Mobility, Goods Tradability, and Efficient Allocation of Disaster Risk.
Proceedings of the IEEE International Conference on Systems, 2009

2008
Large-scale network parameter configuration using an on-line simulation framework.
IEEE/ACM Trans. Netw., 2008

Time separations of cyclic event rule systems with min-max timing constraints.
Theor. Comput. Sci., 2008

Geometric parameter optimization in multi-axis machining.
Comput. Aided Des., 2008

Combined international and intergenerational disaster risk diversification: An innovative instrument for government intervention into the private disaster insurance program.
Proceedings of the IEEE International Conference on Systems, 2008

A resource-minimalist flow size histogram estimator.
Proceedings of the 8th ACM SIGCOMM Internet Measurement Conference, 2008

Kinematics Constrained Toolpath Planning for Five-Axis Machines.
Proceedings of the Intelligent Robotics and Applications, First International Conference, 2008

2007
Tracking port scanners on the IP backbone.
Proceedings of the 2007 Workshop on Large Scale Attack Defense, 2007

How to scalably and accurately skip past streams.
Proceedings of the 23rd International Conference on Data Engineering Workshops, 2007

2006
Impact of Packet Sampling on Portscan Detection.
IEEE J. Sel. Areas Commun., 2006

Connectionless port scan detection on the backbone.
Proceedings of the 25th IEEE International Performance Computing and Communications Conference, 2006

Fisher information of sampled packets: an application to flow size estimation.
Proceedings of the 6th ACM SIGCOMM Internet Measurement Conference, 2006

Is sampled data sufficient for anomaly detection?
Proceedings of the 6th ACM SIGCOMM Internet Measurement Conference, 2006

Analysis of Vehicle Emissions and Prediction of Gross Emitter using Remote Sensing Data.
Proceedings of the Ninth International Conference on Control, 2006

A Soft Sensor Based on Multiple Neural Networks Combined with Two Information Fusion Methods.
Proceedings of the Ninth International Conference on Control, 2006

2005
Splitting and merging of packet traffic: Measurement and modelling.
Perform. Evaluation, 2005

Divide and Conquer: PC-Based Packet Trace Replay at OC-48 Speeds.
Proceedings of the 1st International Conference on Testbeds & Research Infrastructures for the DEvelopment of NeTworks & COMmunities (TRIDENTCOM 2005), 2005

An Information-theoretic Approach to Network Monitoring and Measurement.
Proceedings of the 5th Internet Measurement Conference, 2005

2004
A recursive random search algorithm for network parameter optimization.
SIGMETRICS Perform. Evaluation Rev., 2004

2003
A recursive random search algorithm for large-scale network parameter configuration.
Proceedings of the International Conference on Measurements and Modeling of Computer Systems, 2003

Minimizing Packet Loss by Optimizing OSPF Weights Using Online Simulation.
Proceedings of the 11th International Workshop on Modeling, 2003

2002
Adaptive tuning of RED using on-line simulation.
Proceedings of the Global Telecommunications Conference, 2002

2001
Traffic management and network control using collaborative on-line simulation.
Proceedings of the IEEE International Conference on Communications, 2001

1998
Mobile Awareness in a Wide Area Wireless Network of Info-Stations.
Proceedings of the MOBICOM '98, 1998


  Loading...