Yadi Wang

Orcid: 0009-0005-2645-6764

According to our database1, Yadi Wang authored at least 31 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Multiperspective Fraud Detection Method for Multiparticipant E-Commerce Transactions.
IEEE Trans. Comput. Soc. Syst., April, 2024

2023
MISPSO-Attack: An efficient adversarial watermarking attack based on multiple initial solution particle swarm optimization.
Appl. Soft Comput., November, 2023

Multi-granularity re-ranking for visible-infrared person re-identification.
CAAI Trans. Intell. Technol., September, 2023

Neurodynamics-driven supervised feature selection.
Pattern Recognit., April, 2023

Feature Selection With Maximal Relevance and Minimal Supervised Redundancy.
IEEE Trans. Cybern., 2023

Neurodynamics-driven holistic approaches to semi-supervised feature selection.
Neural Networks, 2023

An Adaptive Framework of Multimodal Emotion Recognition Based on Collaborative Discriminative Learning.
Proceedings of the 15th International Conference on Advanced Computational Intelligence, 2023

Conveying Uncertainty in Data Visualizations to Screen-Reader Users Through Non-Visual Means.
Proceedings of the 25th International ACM SIGACCESS Conference on Computers and Accessibility, 2023

2022
A Detection Method for Abnormal Transactions in E-Commerce Based on Extended Data Flow Conformance Checking.
Wirel. Commun. Mob. Comput., 2022

A Survey on Sparse Learning Models for Feature Selection.
IEEE Trans. Cybern., 2022

Proton Electromagnetic Form Factors in the Time-like Region through the Scan Technique.
Symmetry, 2022

Robust multi-view learning via adaptive regression.
Inf. Sci., 2022

Multi-Cluster Feature Selection Based on Isometric Mapping.
IEEE CAA J. Autom. Sinica, 2022

Scheduling multi-tenant cloud workflow tasks with resource reliability.
Sci. China Inf. Sci., 2022

Abnormal Situation Simulation and Dynamic Causality Discovery in Urban Traffic Networks (Short Paper).
Proceedings of the 15th International Conference on Spatial Information Theory, 2022

2021
Two-timescale neurodynamic approaches to supervised feature selection based on alternative problem formulations.
Neural Networks, 2021

A neurodynamic optimization approach to supervised feature selection via fractional programming.
Neural Networks, 2021

2020
A Neurodynamic Approach to L0-Constrained Optimization.
Proceedings of the 12th International Conference on Advanced Computational Intelligence, 2020

2019
Weighted General Group Lasso for Gene Selection in Cancer Classification.
IEEE Trans. Cybern., 2019

Gene selection of rat hepatocyte proliferation using adaptive sparse group lasso with weighted gene co-expression network analysis.
Comput. Biol. Chem., 2019

Quantitative Relationship Model of Express Service Network and Service Facilities in Beijing.
Proceedings of the 2019 IEEE International Conference on Systems, Man and Cybernetics, 2019

Feature Selection via Adaptive Spectral Clustering based on Joint Mutual Information.
Proceedings of the 23rd IEEE International Conference on Computer Supported Cooperative Work in Design, 2019

2017
Online Learning Algorithms for Double-Weighted Least Squares Twin Bounded Support Vector Machines.
Neural Process. Lett., 2017

A cooperative scheduling method based on the device load feedback for multiple tasks scheduling.
J. Netw. Comput. Appl., 2017

2016
Weighted doubly regularized support vector machine and its application to microarray classification with noise.
Neurocomputing, 2016

2012
A Novel Method for Modeling Complex Network of Software System Security.
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012

2009
Automatic Verification for Secrecy of Cryptographic Protocols in First-Order Logic.
Int. J. Distributed Sens. Networks, 2009

A Security Architecture for Tactical Mobile Ad Hoc Networks.
Proceedings of the Second International Workshop on Knowledge Discovery and Data Mining, 2009

2008
Identity-Based Threshold Key Management for Ad Hoc Networks.
Proceedings of the PACIIA 2008, 2008

Analysis of Distributed CA Model for MANETs Based on Queuing Theory.
Proceedings of the PACIIA 2008, 2008

2005
An Intrusion-Resilient Authorization and Authentication Framework for Grid Computing Infrastructure.
Proceedings of the Computational Science, 2005


  Loading...