Yan Chang

According to our database1, Yan Chang authored at least 49 papers between 2000 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A relational extraction approach based on multiple embedding representations and multi-head self-attention.
J. Intell. Fuzzy Syst., March, 2024

Privacy-Preserving and Poisoning-Defending Federated Learning in Fog Computing.
IEEE Internet Things J., February, 2024

Direct and Inverse scattering in a three-dimensional planar waveguide.
CoRR, 2024

Inverse source problem of the biharmonic equation from multi-frequency phaseless data.
CoRR, 2024

2023
Constructing a Demand-Driven College English Learning Environment in Higher Education Institutions.
Appl. Artif. Intell., December, 2023

Recovering source location, polarization, and shape of obstacle from elastic scattering data.
J. Comput. Phys., 2023

DualFluidNet: an Attention-based Dual-pipeline Network for Accurate and Generalizable Fluid-solid Coupled Simulation.
CoRR, 2023

A novel Newton method for inverse elastic scattering problems.
CoRR, 2023

Mathematical and numerical study of an inverse source problem for the biharmonic wave equation.
CoRR, 2023

Jointly determining the point sources and obstacle from Cauchy data.
CoRR, 2023

Quantum-Inspired Fully Complex-Valued Neutral Network for Sentiment Analysis.
Axioms, 2023

2022
Checking Only When It Is Necessary: Enabling Integrity Auditing Based on the Keyword With Sensitive Information Privacy for Encrypted Cloud Data.
IEEE Trans. Dependable Secur. Comput., 2022

Multi-party controlled cyclic hybrid quantum communication protocol in noisy environment.
Quantum Inf. Process., 2022

Co-inversion of a scattering cavity and its internal sources: uniqueness, decoupling and imaging.
CoRR, 2022

SafetyNet: Safe Planning for Real-World Self-Driving Vehicles Using Machine-Learned Policies.
Proceedings of the 2022 International Conference on Robotics and Automation, 2022

2021
Semi-quantum private comparison protocol with three-particle G-like states.
Quantum Inf. Process., 2021

Research on information steganography based on network data stream.
Neural Comput. Appl., 2021

Achieving low-entropy secure cloud data auditing with file and authenticator deduplication.
Inf. Sci., 2021

SafetyNet: Safe planning for real-world self-driving vehicles using machine-learned policies.
CoRR, 2021

2020
Research and Analysis of Electromagnetic Trojan Detection Based on Deep Learning.
Secur. Commun. Networks, 2020

Arbitrated quantum signature scheme with quantum teleportation by using two three-qubit GHZ states.
Quantum Inf. Process., 2020

Design of software-defined gateway for industrial interconnection.
J. Ind. Inf. Integr., 2020

Quantum Secret Sharing Scheme with Credible Authentication based on Quantum Walk.
KSII Trans. Internet Inf. Syst., 2020

Quantum key distribution based on single-particle and EPR entanglement.
Sci. China Inf. Sci., 2020

A Quantum Proxy Arbitrated Signature Scheme Based on Two Three-Qubit GHZ States.
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020

Multi-party Semi-quantum Secret Sharing Scheme Based on Bell States.
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020

A Semi-quantum Group Signature Scheme Based on Bell States.
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020

2019
An efficiency batch authentication scheme for smart grid using binary authentication tree.
Int. Arab J. Inf. Technol., 2019

Multi-function Quantum Cryptography Protocol Based on Bell State.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

2018
Active contours driven by edge entropy fitting energy for image segmentation.
Signal Process., 2018

Semi-quantum protocol for deterministic secure quantum communication using Bell states.
Quantum Inf. Process., 2018

The security analysis of E91 protocol in collective-rotation noise channel.
Int. J. Distributed Sens. Networks, 2018

An Optimal LiDAR Configuration Approach for Self-Driving Cars.
CoRR, 2018

Fuel Economy and Emission Testing for Connected and Automated Vehicles Using Real-world Driving Datasets.
CoRR, 2018

Energy Efficiency and Emission Testing for Connected and Automated Vehicles Using Real-World Driving Data.
Proceedings of the 21st International Conference on Intelligent Transportation Systems, 2018

An Information Monitoring Platform for Thermal Energy Storage Systems Using Cloud Computing.
Proceedings of the 2018 International Conference on Cloud Computing and Internet of Things, 2018

2017
Comment on "flexible protocol for quantum private query based on B92 protocol".
Quantum Inf. Process., 2017

An active contour model based on local fitted images for image segmentation.
Inf. Sci., 2017

Comments on 'An improved authentication scheme for mobile satellite communication systems'.
Int. J. Electron. Secur. Digit. Forensics, 2017

A lightweight authentication and key agreement scheme for smart grid.
Int. J. Distributed Sens. Networks, 2017

An Ant-Colony Based Approach for Identifying a Minimal Set of Rare Variants Underlying Complex Traits.
Proceedings of the Intelligent Computing Theories and Application, 2017

2016
Quantum Private Query Protocol Based on Two Non-Orthogonal States.
Entropy, 2016

Perturbation Correction Calculation Method for Remote Rendezvous between Non-Coplanar Elliptic Orbits.
Proceedings of the 12th International Conference on Computational Intelligence and Security, 2016

2013
Uncertainty-Aware Sensor Deployment Strategy in Mixed Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2013

2007
A New Technique of the Single TEOAES Mix Signal Separation Based on Independent Sub-band Functions.
Proceedings of the Third International Conference on Natural Computation, 2007

2006
Application of Grid Technology in Multi-Objective Aircraft Optimization System.
Proceedings of the 10th International Conference on CSCW in Design, 2006

2002
An Effective Multilevel Thresholding Approach Using Conditional Probability Entropy and Genetic Algorithm.
Proceedings of the Visualisation 2002, 2002

2001
A Hierarchical Approach in Multilevel Thresholding Based on Maximum Entropy and Bayes' Formula.
Proceedings of the Visualisation 2001, 2001

2000
Comparison of Five Conditional Probabilities in 2-Level Image Threshold Based on Bayesian Formulation.
Proceedings of the Visualisation 2000, 2000


  Loading...