Yan Wen

Orcid: 0000-0002-6527-8826

According to our database1, Yan Wen authored at least 83 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
More to tip, or tip more? Examining consumers' preservice tipping behavior in the on-demand supermarket delivery context.
Decis. Support Syst., March, 2024

2023
Four-input-C-element-based multiple-node-upset-self-recoverable latch designs.
Integr., May, 2023

A highly reliable and low-power cross-coupled 18T SRAM cell.
Microelectron. J., April, 2023

Weighted Sparseness-Based Anomaly Detection for Hyperspectral Imagery.
Sensors, February, 2023

Low-power and high-speed SRAM cells for double-node-upset recovery.
Integr., 2023

Enhancing online-to-offline delivery efficiency facilitated by Industry 4.0: a personnel configuration perspective.
Ind. Manag. Data Syst., 2023

A marker-less human motion analysis system for motion-based biomarker discovery in knee disorders.
CoRR, 2023

Rethinking the Transfer Learning for FCN Based Polyp Segmentation in Colonoscopy.
IEEE Access, 2023

Image Encryption Algorithm Based on Chaotic Mapping and Binary Bidirectional Zigzag Transform.
IEEE Access, 2023

Efficient and Joint Hyperparameter and Architecture Search for Collaborative Filtering.
Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023

A Low-Delay Quadruple-Node-Upset Self-Recoverable Latch Design.
Proceedings of the 32nd IEEE Asian Test Symposium, 2023

2022
The interaction of discount promotion and display-related promotion on on-demand platforms.
Inf. Syst. E Bus. Manag., 2022

Multi-Path GMM-MobileNet Based on Attack Algorithms and Codecs for Synthetic Speech and Deepfake Detection.
Proceedings of the Interspeech 2022, 2022

Mining the Impacts of COVID-19 Pandemic on the Labour Market.
Proceedings of the 16th International Conference on Ubiquitous Information Management and Communication, 2022

Effectively and Efficiently Supporting Visual Big Data Analytics over Big Sequential Data: An Innovative Data Science Approach.
Proceedings of the Computational Science and Its Applications - ICCSA 2022, 2022

Recommending Online Course Resources Based on Knowledge Graph.
Proceedings of the Web Information Systems and Applications, 2022

2021
Modeling and Analysis of Permanent Magnet Spherical Motors by a Multitask Gaussian Process Method and Finite Element Method for Output Torque.
IEEE Trans. Ind. Electron., 2021

Smart City Transportation Data Analytics with Conceptual Models and Knowledge Graphs.
Proceedings of the 2021 IEEE SmartWorld, 2021

A Visual Data Science Solution for Visualization and Visual Analytics of Big Sequential Data.
Proceedings of the 25th International Conference Information Visualisation, 2021

A Low-Cost Quadruple-Node-Upset Self-Recoverable Latch Design.
Proceedings of the IEEE International Test Conference in Asia, 2021

Revealing COVID-19 Data by Data Mining and Visualization.
Proceedings of the Advances in Intelligent Networking and Collaborative Systems, 2021

A transformer-based framework for automatic COVID19 diagnosis in chest CTs.
Proceedings of the IEEE/CVF International Conference on Computer Vision Workshops, 2021

Spatial-Temporal Data Science of COVID-19 Data.
Proceedings of the 15th IEEE International Conference on Big Data Science and Engineering, 2021

Conceptual Modeling and Smart Computing for Big Transportation Data.
Proceedings of the IEEE International Conference on Big Data and Smart Computing, 2021

2020
Identifying psychiatric disorder-associated gut microbiota using microbiota-related gene set enrichment analysis.
Briefings Bioinform., 2020

Robust Adaptive Sliding-Mode Control of a Permanent Magnetic Spherical Actuator With Delay Compensation.
IEEE Access, 2020

Big Data Visualization and Visual Analytics of COVID-19 Data.
Proceedings of the 24th International Conference on Information Visualisation, 2020

Data Mining on Open Public Transit Data for Transportation Analytics During Pre-COVID-19 Era and COVID-19 Era.
Proceedings of the Advances in Intelligent Networking and Collaborative Systems - The 12th International Conference on Intelligent Networking and Collaborative Systems (INCoS-2020), Victoria, BC, Canada, 31 August, 2020

Super-resolution Convolutional Neural Networks: An Application to Scene Text in the Wild Recognition.
Proceedings of the ICBDT 2020: 3rd International Conference on Big Data Technologies, 2020

2019
PCA-based GRS analysis enhances the effectiveness for genetic correlation detection.
Briefings Bioinform., 2019

Loc2Vec-Based Cluster-Level Transition Behavior Mining for Successive POI Recommendation.
IEEE Access, 2019

A heuristic fuzz test generator for Java native interface.
Proceedings of the 2nd ACM SIGSOFT International Workshop on Software Qualities and Their Dependencies, 2019

A New Intelligent Trajectory Planning Algorithm Based on Bug2 Algorithm: Bridge Algorithm.
Proceedings of the 2019 IEEE International Conference on Robotics and Biomimetics, 2019

A Novel Deep Convolutional Neural Network Structure for Off-line Handwritten Digit Recognition.
Proceedings of the 2nd International Conference on Big Data Technologies, 2019

POI Recommendation Based on Heterogeneous Network.
Proceedings of the Communications, Signal Processing, and Systems, 2019

A Survey on Named Entity Recognition.
Proceedings of the Communications, Signal Processing, and Systems, 2019

A Vehicle Positioning Algorithm Based on Single Base Station in the Vehicle Ad Hoc Networks.
Proceedings of the Communications, Signal Processing, and Systems, 2019

2018
GWAS summary-based pathway analysis correcting for the genetic confounding impact of environmental exposures.
Briefings Bioinform., 2018

Highly-Sensitive Magnetic Tunnel Junction Based Flow Cytometer.
Proceedings of the 2018 IEEE International Symposium on Medical Measurements and Applications, 2018

2017
Tissue-specific pathway association analysis using genome-wide association study summaries.
Bioinform., 2017

A Keyword-Driven Data Service Composition Sequence Generation Approach on Ad-Hoc Data Query.
Proceedings of the 2017 IEEE International Conference on Web Services, 2017

A Keyword-Driven Data Service Mashup Plan Generation Approach for Ad-Hoc Data Query.
Proceedings of the 2017 IEEE International Conference on Services Computing, 2017

2016
Fault Diagnosis Based on Multi-sensor Data Fusion for Numerical Control Machine.
Int. J. Online Eng., 2016

PAPA: a flexible tool for identifying pleiotropic pathways using genome-wide association study summaries.
Bioinform., 2016

2015
CPAS: A trans-omics pathway analysis tool for jointly analyzing DNA copy number variations and mRNA expression profiles data.
J. Biomed. Informatics, 2015

SWGDT: A sliding window-based genotype dependence testing tool for genome-wide susceptibility gene scan.
J. Biomed. Informatics, 2015

Creating Multi-domain Query Plans on Data Services.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

Design of a multifunction astronomical CCD camera.
Proceedings of the Seventh International Conference on Digital Image Processing, 2015

2014
A model synthesis method based on single building facade.
Graph. Model., 2014

Towards Thwarting Data Leakage with Memory Page Access Interception.
Proceedings of the IEEE 12th International Conference on Dependable, 2014

FVisor: Towards Thwarting Unauthorized File Accesses with a Light-Weight Hypervisor.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014

Shielding Your Privacy with the Local-Booted Virtual Machine.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014

2013
Qualitative and Quantitative Integrated Modeling for Stochastic Simulation and Optimization.
J. Appl. Math., 2013

Evaluation on the influence of internet prefix hijacking events.
Comput. Sci. Inf. Syst., 2013

Emulation on the Internet Prefix Hijacking Attack Impaction.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

A Method of Sensor Data Services Query in Emergency Management.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

Towards sharing disks between host OS and virtual machine with volume snapshot technology.
Proceedings of the 2013 IEEE International Conference on Granular Computing, 2013

Towards Implicitly Introspecting the Preinstalled Operating System with Local-Booting Virtualization Technology.
Proceedings of the IEEE 11th International Conference on Dependable, 2013

2012
The Relation on Prefix Hijacking and the Internet Hierarchy.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

A Survey of Virtualization Technologies Focusing on Untrusted Code Execution.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Reversing Engineering Data Structures in Binary Programs: Overview and Case Study.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Secure Service and Management for Security-Critical Wireless Sensor Network.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

A robust method of detecting hand gestures using depth sensors.
Proceedings of the 2012 IEEE International Workshop on Haptic Audio Visual Environments and Games, 2012

Detecting microtubules in high noise Cryo-EM micrograph.
Proceedings of the 5th International Conference on BioMedical Engineering and Informatics, 2012

Analysis on the Effect of Prefix Hijacking Attack and Internet Hierarchy.
Proceedings of the 12th IEEE International Conference on Computer and Information Technology, 2012

2011
Towards Detecting Thread Deadlock in Java Programs with JVM Introspection.
Proceedings of the IEEE 10th International Conference on Trust, 2011

H-Fuzzing: A New Heuristic Method for Fuzzing Data Generation.
Proceedings of the Network and Parallel Computing - 8th IFIP International Conference, 2011

Towards a Flaw Function Heuristic Vulnerability Static Analysis Framework for Executable File.
Proceedings of the Seventh International Conference on Mobile Ad-hoc and Sensor Networks, 2011

An Overview of Bootkit Attacking Approaches.
Proceedings of the Seventh International Conference on Mobile Ad-hoc and Sensor Networks, 2011

A Network Security Evaluation Method Framework Based on Multiple Criteria Decision Making Theory.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

Aquarius: A Tiny Hypervisor to Introspect Commodity OSes in a Non-bypassable Way.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

2010
A software vulnerability analysis environment based on virtualization technology.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

A Proactive Approach to Load Balancing of Workflow Execution in a SaaS Environment.
Proceedings of the Fifth IEEE International Symposium on Service-Oriented System Engineering, 2010

Implicit detection of stealth software with a local-booted virtual machine.
Proceedings of the 3rd International Conference on Information Sciences and Interaction Sciences (ICIS 2010), 2010

Towards Detecting the Interaction Vulnerabilities in Large Distributed System.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
Research on Technologies of Building Experimental Environment for Network Worm Simulation.
Proceedings of the 15th IEEE International Conference on Parallel and Distributed Systems, 2009

2008
Hiding "real" machine from attackers and malware with a minimal virtual machine monitor.
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008

A Novel Intrusion-Tolerant Approach for Internet Access.
Proceedings of the International Symposium on Information Processing, 2008

Reliability Design for Large Scale Storage Systems.
Proceedings of the 11th IEEE High Assurance Systems Engineering Symposium, 2008

Implicit Detection of Hidden Processes with a Feather-Weight Hardware-Assisted Virtual Machine Monitor.
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008

2007
A Secure Virtual Execution Environment for Untrusted Code.
Proceedings of the Information Security and Cryptology, 2007

A Novel Approach for Untrusted Code Execution.
Proceedings of the Information and Communications Security, 9th International Conference, 2007

On the Power-Law of the Internet and the Hierarchy of BGP Convergence.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2007


  Loading...