Yan Ding

According to our database1, Yan Ding authored at least 54 papers between 2004 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Distractor-Aware Deep Regression for Visual Tracking.
Sensors, 2019

A keyword-based combination approach for detecting phishing webpages.
Computers & Security, 2019

A Hierarchical Energy Management Strategy Based on Model Predictive Control for Plug-In Hybrid Electric Vehicles.
IEEE Access, 2019

2018
A three-stage online map-matching algorithm by fully using vehicle heading direction.
J. Ambient Intelligence and Humanized Computing, 2018

A Novel Clustering-Based Sampling Approach for Minimum Sample Set in Big Data Environment.
IJPRAI, 2018

Exploring EFL Learners' Perspectives on Instructional Videos.
IJCALLT, 2018

A novel process-based association rule approach through maximal frequent itemsets for big data processing.
Future Generation Comp. Syst., 2018

An Online Trajectory Compression System Applied to Resource-Constrained GPS Devices in Vehicles.
Proceedings of the 15th Annual IEEE International Conference on Sensing, 2018

Solution Space Adjustable CNF Obfuscation for Privacy-Preserving SAT Solving.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018

Fuel Consumption Estimation of Potential Driving Paths by Leveraging Online Route APIs.
Proceedings of the Green, Pervasive, and Cloud Computing - 13th International Conference, 2018

2017
A Novel Distributed Recommendation Framework Using Big Data in Social Context.
IJPRAI, 2017

A heuristic placement selection approach of partitions of mobile applications in mobile cloud computing model based on community collaboration.
Cluster Computing, 2017

Explore virtual machine deployment to mobile cloud computing for multi-tenancy and energy conservation in wireless network.
Cluster Computing, 2017

A networked remote sensing system for on-road vehicle emission monitoring.
SCIENCE CHINA Information Sciences, 2017

A Broadband Power Amplifier Applied in GSM/TD-SCDMA/WLAN System.
Proceedings of the Wired/Wireless Internet Communications, 2017

GreenPlanner: Planning personalized fuel-efficient driving routes using multi-sourced urban data.
Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications, 2017

Global Illumination of Dynamic 3D Scene Based on Light Transport Path Reusing.
Proceedings of the 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2017

Policy-Customized: A New Abstraction for Building Security as a Service.
Proceedings of the 14th International Symposium on Pervasive Systems, 2017

2016
A Heuristic Clustering-Based Task Deployment Approach for Load Balancing Using Bayes Theorem in Cloud Environment.
IEEE Trans. Parallel Distrib. Syst., 2016

Research on Linux Trusted Boot Method Based on Reverse Integrity Verification.
Scientific Programming, 2016

SV-STAT accurately detects structural variation via alignment to reference-based assemblies.
Source Code for Biology and Medicine, 2016

A novel trajectory similarity-based approach for location prediction.
IJDSN, 2016

Enabling User-Policy-Confined VM Migration in Trusted Cloud Computing.
Proceedings of the 2016 IEEE 1st International Workshops on Foundations and Applications of Self* Systems (FAS*W), 2016

Explore maximal frequent itemsets for big data pre-processing based on small sample in cloud computing.
Proceedings of the 8th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2016

A target tracking realization method of UAV simulation training system.
Proceedings of the 14th International Conference on Control, 2016

Security Identifier Randomization: A Method to Prevent Kernel Privilege-Escalation Attacks.
Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops, 2016

2014
DSMC: A Novel Distributed Store-Retrieve Approach of Internet Data Using MapReduce Model and Community Detection in Big Data.
IJDSN, 2014

VAWS: Constructing Trusted Open Computing System of MapReduce with Verified Participants.
IEICE Transactions, 2014

Towards Trusted Result Verification in Mass Data Processing Service.
IEICE Transactions, 2014

PIIM: Method of Identifying Malicious Workers in the MapReduce System with an Open Environment.
Proceedings of the 8th IEEE International Symposium on Service Oriented System Engineering, 2014

A 2D to 3D conversion method based on support vector machine and image classification.
Proceedings of the 2014 International Conference on Machine Learning and Cybernetics, 2014

2013
Dynamic DTN Routing Strategies Based on Knowledge.
Wireless Personal Communications, 2013

Efficient Authentication and Key Agreement Protocol with Anonymity for Delay Tolerant Networks.
Wireless Personal Communications, 2013

Key Management in Secure Satellite Multicast Using Key Hypergraphs.
Wireless Personal Communications, 2013

A Security Differential Game Model for Sensor Networks in Context of the Internet of Things.
Wireless Personal Communications, 2013

A Cooperative Differential Game of Transmission Power Control in Wireless Networks.
Wireless Personal Communications, 2013

A Cooperative Differential Game Model for Multiuser Rate-Based Flow Control.
Wireless Personal Communications, 2013

A Transmission Rate Control Algorithm Based on Non-cooperative Differential Game Model in Deep Space Networks.
Wireless Personal Communications, 2013

A wisdom rate allocation scheme in wireless networks.
Oper. Res. Lett., 2013

An Approach for Domain Reduction with Data Dependence in Mutation Testing.
JSW, 2013

Engine fault detection using angle domain signal envelope algorithm.
J. Systems & Control Engineering, 2013

A Survey on Green Computing Based on Cloud Environment.
Int. J. Online Eng., 2013

Trusted Sampling-Based Result Verification on Mass Data Processing.
Proceedings of the Seventh IEEE International Symposium on Service-Oriented System Engineering, 2013

2012
Multi-stream 3D video distribution over peer-to-peer networks.
Sig. Proc.: Image Comm., 2012

A optimal power control strategy based on network wisdom in wireless networks.
Oper. Res. Lett., 2012

A Survey on Data Migration Management in Cloud Environment.
JDIM, 2012

A Lightweight Type Enforcement Access Control Approach with Role Based Authorization.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

2011
Efficient stereo segment scheduling in peer-to-peer 3D/multi-view video streaming.
Proceedings of the 2011 IEEE International Conference on Peer-to-Peer Computing, 2011

A Fair P2P Scalable Video Streaming Scheme Using Improved Priority Index Assignment and Multi-hierarchical Topology.
Proceedings of the Image Analysis and Recognition - 8th International Conference, 2011

CSCW-based electromagnetic prediction and analysis of railway traction converter.
Proceedings of the 2011 15th International Conference on Computer Supported Cooperative Work in Design, 2011

2010
Peer-to-peer video-on-demand with scalable video coding.
Computer Communications, 2010

2009
Prediction of DNA-binding residues in proteins from amino acid sequences using a random forest model with a hybrid feature.
Bioinformatics, 2009

2008
Research on Asset Proposal Method Based on E-commerce.
Proceedings of the International Symposium on Information Processing, 2008

2004
VirusFinder: A Web-Based Virus Identification System Using Viral Nucleotide Signatures.
Proceedings of the 3rd International IEEE Computer Society Computational Systems Bioinformatics Conference, 2004


  Loading...