Yajie Wang

Orcid: 0000-0002-0962-4464

According to our database1, Yajie Wang authored at least 85 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Maxwell's Demon in MLP-Mixer: towards transferable adversarial attacks.
Cybersecur., December, 2024

A Fast Scenario Transfer Approach for Portrait Styles Through Collaborative Awareness of Convolutional Neural Network and Generative Adversarial Learning.
J. Circuits Syst. Comput., May, 2024

Attentional Composition Networks for Long-Tailed Human Action Recognition.
ACM Trans. Multim. Comput. Commun. Appl., January, 2024

Crafting Transferable Adversarial Examples Against Face Recognition via Gradient Eroding.
IEEE Trans. Artif. Intell., January, 2024

Continuous Emotion-Based Image-to-Music Generation.
IEEE Trans. Multim., 2024

Teeth-SEG: An Efficient Instance Segmentation Framework for Orthodontic Treatment based on Anthropic Prior Knowledge.
CoRR, 2024

Line-Transitive Point-Imprimitive Linear Spaces with Fang-Li Parameter gcd$(k,r)$ at most $12$.
Electron. J. Comb., 2024

Towards Transferable Adversarial Attacks with Centralized Perturbation.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Optimal Reinsurance-Investment Strategy Based on Stochastic Volatility and the Stochastic Interest Rate Model.
Axioms, August, 2023

Membership reconstruction attack in deep neural networks.
Inf. Sci., July, 2023

Deep Fusion: Crafting Transferable Adversarial Examples and Improving Robustness of Industrial Artificial Intelligence of Things.
IEEE Trans. Ind. Informatics, June, 2023

Corrigendum to ['To tweet or not to tweet?' A study of the use of Twitter by scholarly book publishers in Social Sciences and Humanities', Journal of Informetrics, Volume15, (2021) 1-14/Article101170].
J. Informetrics, May, 2023

Continuous User Authentication on Multiple Smart Devices.
Inf., May, 2023

Membership Inference Attacks Against Deep Learning Models via Logits Distribution.
IEEE Trans. Dependable Secur. Comput., 2023

Stealthy and Flexible Trojan in Deep Learning Framework.
IEEE Trans. Dependable Secur. Comput., 2023

An Online Jamming Effect Evaluation Method for Asymmetric Radar Information in Complex Electromagnetic Environment.
IEEE Geosci. Remote. Sens. Lett., 2023

An integration model for Texas Hold'em.
Int. J. Comput. Sci. Math., 2023

Unified High-binding Watermark for Unconditional Image Generation Models.
CoRR, 2023

Towards Invisible Backdoor Attacks in the Frequency Domain against Deep Neural Networks.
CoRR, 2023

Stealthy Low-frequency Backdoor Attack against Deep Neural Networks.
CoRR, 2023

Exploring the Factors and Influence Mechanisms of User Loyalty for Generative AI.
Proceedings of the 8th International Conference on Data Science in Cyberspace, 2023

2022
A smart file-level continuous data protection scheme based on security baseline.
Int. J. Intell. Syst., December, 2022

Toward feature space adversarial attack in the frequency domain.
Int. J. Intell. Syst., December, 2022

sAuth: a hierarchical implicit authentication mechanism for service robots.
J. Supercomput., 2022

A Deep Domain-Adversarial Transfer Fault Diagnosis Method for Rolling Bearing Based on Ensemble Empirical Mode Decomposition.
J. Sensors, 2022

The application of improved UCT combined with neural network in Tibetan JIU chess.
Int. J. Wirel. Mob. Comput., 2022

Multi actor hierarchical attention critic with RNN-based feature extraction.
Neurocomputing, 2022

A multitarget backdooring attack on deep neural networks with random location trigger.
Int. J. Intell. Syst., 2022

Block-Transitive 3-Designs with Block Size At Most 6.
Graphs Comb., 2022

Alternating groups and flag-transitive non-symmetric 2-(<i>v</i>, <i>k</i>, <i>λ</i>) designs with <i>λ</i> ≥ (<i>r</i>, <i>λ</i>)<sup>2</sup>.
Discret. Math., 2022

Human Digital Twin: A Survey.
CoRR, 2022

Artificial Intelligence Security Competition (AISC).
CoRR, 2022

Enhancing Clean Label Backdoor Attack with Two-phase Specific Triggers.
CoRR, 2022

l-Leaks: Membership Inference Attacks with Logits.
CoRR, 2022

Improving the Transferability of Adversarial Examples with Restructure Embedded Patches.
CoRR, 2022

Boosting Adversarial Transferability of MLP-Mixer.
CoRR, 2022

Hyperspectral Image Classification Based on Transformer and Generative Adversarial Network.
Proceedings of the PRICAI 2022: Trends in Artificial Intelligence, 2022

An Unsupervised Multi-scale Generative Adversarial Network for Remote Sensing Image Pan-Sharpening.
Proceedings of the MultiMedia Modeling - 28th International Conference, 2022

Food Safety Risk Assessment Method Based on SVM Optimization Model.
Proceedings of the 7th International Conference on Multimedia Systems and Signal Processing, 2022

Universal Physical Adversarial Attack via Background Image.
Proceedings of the Applied Cryptography and Network Security Workshops, 2022

2021
Scholarly book publishers as publicity agents for SSH titles on Twitter.
Scientometrics, 2021

'To tweet or not to tweet?' A study of the use of Twitter by scholarly book publishers in Social Sciences and Humanities.
J. Informetrics, 2021

Towards a physical-world adversarial patch for blinding object detection models.
Inf. Sci., 2021

Unrestricted Adversarial Attacks on ImageNet Competition.
CoRR, 2021

Multi-agent deep reinforcement learning with type-based hierarchical group communication.
Appl. Intell., 2021

GEA-net: Global embedded attention neural network for image classification.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Human Trajectory Prediction Using Stacked Temporal Convolutional Network.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Demiguise Attack: Crafting Invisible Semantic Adversarial Perturbations with Perceptual Similarity.
Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, 2021

Design and Implementation of List and Dictionary in XD-M Language.
Proceedings of the Algorithmic Aspects in Information and Management, 2021

2020
An adversarial attack on DNN-based black-box object detectors.
J. Netw. Comput. Appl., 2020

Flag-transitive 2-(v, k, λ) symmetric designs with λ≥(k, λ)2 and alternating socle.
Discret. Math., 2020

Towards cross-task universal perturbation against black-box object detectors in autonomous driving.
Comput. Networks, 2020

AHAC: Actor Hierarchical Attention Critic for Multi-Agent Reinforcement Learning.
Proceedings of the 2020 IEEE International Conference on Systems, Man, and Cybernetics, 2020

Friend-or-Foe Deep Deterministic Policy Gradient.
Proceedings of the 2020 IEEE International Conference on Systems, Man, and Cybernetics, 2020

GHGC: Goal-based Hierarchical Group Communication in Multi-Agent Reinforcement Learning.
Proceedings of the 2020 IEEE International Conference on Systems, Man, and Cybernetics, 2020

BiC-DDPG: Bidirectionally-Coordinated Nets for Deep Multi-agent Reinforcement Learning.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2020

Fault Diagnosis for Ballast Water System Operation on Ships based on SVM.
Proceedings of the 5th International Conference on Automation, 2020

2019
Multi-scale aggregation network for temporal action proposals.
Pattern Recognit. Lett., 2019

Model Identification of Unobservable Behavior of Discrete Event Systems Using Petri Nets.
J. Control. Sci. Eng., 2019

Research on the security of information system authentication scheme based on the fuzzy number intuitionistic fuzzy information.
J. Intell. Fuzzy Syst., 2019

Scholarly Book Publishers and their Promotional Activity on Twitter.
Proceedings of the 17th International Conference on Scientometrics and Informetrics, 2019

An Application-Specific Microprocessor for Energy Metering Based on RISC-V.
Proceedings of the International Conference on IC Design and Technology, 2019

2018
Early cross-modal interactions underlie the audiovisual bounce-inducing effect.
NeuroImage, 2018

Optimal investment strategies for an insurer and a reinsurer with a jump diffusion risk process under the CEV model.
J. Comput. Appl. Math., 2018

Design Research on Customized Online Education Platform Catering to Business Demands.
Proceedings of the HCI International 2018 - Posters' Extended Abstracts, 2018

An Analytical Investigation on Ecological Strategy Based on "Edu+AR" Education Cloud Platform.
Proceedings of the Learning and Collaboration Technologies. Learning and Teaching, 2018

2017
Mapping <i>Torreya grandis</i> Spatial Distribution Using High Spatial Resolution Satellite Imagery with the Expert Rules-Based Approach.
Remote. Sens., 2017

Usage Count: A New Indicator to Detect Research Fronts.
J. Data Inf. Sci., 2017

A Scheduling Scheme of Task Allocation in Real Time Multiple-Partition Embedded Avionic.
Proceedings of the 2017 IEEE International Conference on Smart Cloud, 2017

Research on Information Architecture Design of Online Creative Space.
Proceedings of the Human Interface and the Management of Information: Supporting Learning, Decision-Making and Collaboration, 2017

2015
Flag-transitive Non-symmetric 2-designs with $(r, \lambda)=1$ and Alternating Socle.
Electron. J. Comb., 2015

A Novel NSCT Fusion Algorithm for Images Based on Compressive Sensing and Dynamic WNMF.
Proceedings of the Image and Graphics - 8th International Conference, 2015

Passivity Analysis of BAM NNs with Mixed Time Delays.
Proceedings of the Advanced Intelligent Computing Theories and Applications, 2015

A Brief Survey on Fuzzy Cognitive Maps Research.
Proceedings of the Advanced Intelligent Computing Theories and Applications, 2015

The Recent Developments and Comparative Analysis of Neural Network and Evolutionary Algorithms for Solving Symbolic Regression.
Proceedings of the Intelligent Computing Theories and Methodologies, 2015

2013
Study on Default Risk Based on LT Model: Evidence from Chinese List Companies.
Int. J. Online Biomed. Eng., 2013

The Color Fusion of Infrared and Visual Images Based on NSCT.
Proceedings of the Seventh International Conference on Image and Graphics, 2013

Application of User-Based Collaborative Filtering Recommendation Technology on Logistics Platform.
Proceedings of the Sixth International Conference on Business Intelligence and Financial Engineering, 2013

2012
Using Functional Signatures to Identify Repositioned Drugs for Breast, Myelogenous Leukemia and Prostate Cancer.
PLoS Comput. Biol., 2012

Computer Aided Diagnosis System for Breast Cancer Based on Color Doppler Flow Imaging.
J. Medical Syst., 2012

Pattern matching and Monte-Carlo simulation mechanism for the game of NoGo.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012

2011
Grey system model with time lag and application to simulation of karst spring discharge.
Grey Syst. Theory Appl., 2011

2010
Emergency repositories network layout model and calculation.
Proceedings of the Sixth International Conference on Natural Computation, 2010

A Kind of Webpage Styled PowerPoint Courseware Quiz Developed by VBA for Computer Courses.
Proceedings of the Second International Workshop on Database Technology and Applications, 2010

2009
The dynamic relationship between spot and futures prices of the soybean futures market in China.
Int. J. Netw. Virtual Organisations, 2009


  Loading...