Yan Xiong

According to our database1, Yan Xiong authored at least 112 papers between 1997 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Concurrent Transmission Based on Distributed Scheduling for Underwater Acoustic Networks.
Sensors, 2019

AppScalpel: Combining static analysis and outlier detection to identify and prune undesirable usage of sensitive data in Android applications.
Neurocomputing, 2019

Cuckoo search algorithm with memory and the vibrant fault diagnosis for hydroelectric generating unit.
Eng. Comput. (Lond.), 2019

Tightly Coupled Secret Sharing and Its Application to Group Authentication.
CoRR, 2019

Ideal Tightly Couple (t, m, n) Secret Sharing.
CoRR, 2019

Ensemble of cuckoo search variants.
Computers & Industrial Engineering, 2019

Divide and conquer: recovering contextual information of behaviors in Android apps around limited-quantity audit logs.
Proceedings of the 41st International Conference on Software Engineering: Companion Proceedings, 2019

The improved protocol based on the Bennett 92 protocol.
Proceedings of the ACM Turing Celebration Conference - China, 2019

2018
Modified cuckoo search algorithm and the prediction of flashover voltage of insulators.
Neural Computing and Applications, 2018

Lightitude: Indoor Positioning Using Uneven Light Intensity Distribution.
IMWUT, 2018

Speech Enhancement Using Heterogeneous Information.
IJGHPC, 2018

Constructing Ideal Secret Sharing Schemes based on Chinese Remainder Theorem.
IACR Cryptology ePrint Archive, 2018

Cuckoo search algorithm with dynamic feedback information.
Future Generation Comp. Syst., 2018

Differences between beginning and advanced design students in analogical reasoning during idea generation: evidence from eye movements.
Cognition, Technology & Work, 2018

Divide and Conquer: Recovering Contextual Information of Behaviors in Android Apps around Limited-quantity Audit Logs.
CoRR, 2018

Verifying Security Protocols using Dynamic Strategies.
CoRR, 2018

Retrieval of Semantic-Based Inspirational Sources for Emotional Design.
Comp. Int. and Neurosc., 2018

A novel cuckoo search algorithm with multiple update rules.
Appl. Intell., 2018

An EEG study of the relationship between design problem statements and cognitive behaviors during conceptual design.
AI EDAM, 2018

Formally Verifying Memory Isolation Based on ARM Processors.
Proceedings of the 4th International Conference on Big Data Computing and Communications, 2018

Automatically Detecting Malicious Sensitive Data Usage in Android Applications.
Proceedings of the 4th International Conference on Big Data Computing and Communications, 2018

A Privacy Enforcement Framework for Android Systems Using Symbolic Execution-Based Instrumentation.
Proceedings of the 4th International Conference on Big Data Computing and Communications, 2018

Detecting Stubborn Permission Requests in Android Applications.
Proceedings of the 4th International Conference on Big Data Computing and Communications, 2018

Identifying Superfluous Network Transmissions in Android Applications.
Proceedings of the 4th International Conference on Big Data Computing and Communications, 2018

KeyChain: Blockchain-Based Key Distribution.
Proceedings of the 4th International Conference on Big Data Computing and Communications, 2018

Constructing Ideal Secret Sharing Schemes Based on Chinese Remainder Theorem.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

2017
Stride-in-the-Loop Relative Positioning Between Users and Dummy Acoustic Speakers.
IEEE Journal on Selected Areas in Communications, 2017

A General Formal Framework of Analyzing Selective Disclosure Attribute-Based Credential Systems.
I. J. Network Security, 2017

Developing a nomogram based on multiparametric magnetic resonance imaging for forecasting high-grade prostate cancer to reduce unnecessary biopsies within the prostate-specific antigen gray zone.
BMC Medical Imaging, 2017

Depth data research of GIS based on clustering analysis algorithm.
Proceedings of the MIPPR 2017: Remote Sensing Image Processing, 2017

A Verified Secure Protocol Model of OAuth Dynamic Client Registration.
Proceedings of the 3rd International Conference on Big Data Computing and Communications, 2017

Mining Anomalous Usage of Sensitive Data through Anomaly Detection.
Proceedings of the 3rd International Conference on Big Data Computing and Communications, 2017

2016
"Friend is Treasure": Exploring and Exploiting Mobile Social Contacts for Efficient Task Offloading.
IEEE Trans. Vehicular Technology, 2016

An Accurate Direction Finding Scheme Using Virtual Antenna Array via Smartphones.
Sensors, 2016

A non-parametric symbolic approximate representation for long time series.
Pattern Anal. Appl., 2016

Numerical simulation on the effects of drug-eluting stents with different bending angles on hemodynamics and drug distribution.
Med. Biol. Engineering and Computing, 2016

An investigation of the information system security issues in Taiwan.
IJBIS, 2016

A new method for discovering behavior patterns among animal movements.
International Journal of Geographical Information Science, 2016

Dynamic mean-risk portfolio selection with multiple risk measures in continuous-time.
European Journal of Operational Research, 2016

Formal Analysis of Selective Disclosure Attribute-Based Credential System in Applied Pi Calculus.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

WalkieLokie: sensing relative positions of surrounding presenters by acoustic signals.
Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2016

Rotate and Guide: Accurate and Lightweight Indoor Direction Finding Using Smartphones.
Proceedings of the Big Data Computing and Communications - Second International Conference, 2016

2015
Privacy preserving RSS map generation for a crowdsensing network.
IEEE Wireless Commun., 2015

Online Sequential Channel Accessing Control: A Double Exploration vs. Exploitation Problem.
IEEE Trans. Wireless Communications, 2015

WizBee: Wise ZigBee Coexistence via Interference Cancellation with Single Antenna.
IEEE Trans. Mob. Comput., 2015

Swadloon: Direction Finding and Indoor Localization Using Acoustic Signal by Shaking Smartphones.
IEEE Trans. Mob. Comput., 2015

Randomized Component and Its Application to (t, m, n)-Group Oriented Secret Sharing.
IEEE Trans. Information Forensics and Security, 2015

Modified Internal Model Control Scheme for the Drive Part with Elastic Joints in Robotic System.
Journal of Intelligent and Robotic Systems, 2015

Collapsible graphs and Hamilton cycles of line graphs.
Discrete Applied Mathematics, 2015

WalkieLokie: Relative Positioning for Augmented Reality Using a Dummy Acoustic Speaker.
CoRR, 2015

Lightitude: Indoor Positioning Using Ubiquitous Visible Lights and COTS Devices.
CoRR, 2015

Magemite: Character inputting system based on magnetic sensor.
Proceedings of the 16th IEEE International Symposium on A World of Wireless, 2015

Lightitude: Indoor Positioning Using Ubiquitous Visible Lights and COTS Devices.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

Discovering Loose Group Movement Patterns from Animal Trajectories.
Proceedings of the 11th IEEE International Conference on e-Science, 2015

Fast Similarity Search of Multi-Dimensional Time Series via Segment Rotation.
Proceedings of the Database Systems for Advanced Applications, 2015

Anti-multipath Indoor Direction Finding Using Acoustic Signal via Smartphones.
Proceedings of the Big Data Computing and Communications - First International Conference, 2015

2014
Sparsest Random Scheduling for Compressive Data Gathering in Wireless Sensor Networks.
IEEE Trans. Wireless Communications, 2014

Collaborative Outsourced Data Mining for Secure Cloud Computing.
JNW, 2014

A new similarity measure based on shape information for invariant with multiple distortions.
Neurocomputing, 2014

Hierarchical Storage Model and Priority Ranking Method of Rules in Rule-based Reasoning System.
Int. J. Comput. Intell. Syst., 2014

Walk globally, act locally: efficient influential user identification in mobile social networks.
Proceedings of the first international workshop on Mobile sensing, 2014

Confidence-interval based sensing quality evaluation for mobile sensor networks.
Proceedings of the first international workshop on Mobile sensing, 2014

Compressive sensing meets unreliable link: sparsest random scheduling for compressive data gathering in lossy WSNs.
Proceedings of the Fifteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2014

Shake and walk: Acoustic direction finding and fine-grained indoor localization using smartphones.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

A new dynamic clustering method based on nuclear field.
Proceedings of the 10th International Conference on Natural Computation, 2014

Continuous-time mean-variance portfolio optimization with Safety-First Principle.
Proceedings of the 11th IEEE International Conference on Control & Automation, 2014

A fast algorithm of geometry generalization.
Proceedings of the 22nd ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, 2014

2013
Fine-Grained Refinement on TPM-Based Protocol Applications.
IEEE Trans. Information Forensics and Security, 2013

Using an SQP Algorithm to Choose the Feature Set for Data Field Clustering.
Smart CR, 2013

Detection System of Clone Attacks based on RSSI in Wireless Sensor Networks.
JNW, 2013

Integrity Verification for Outsourcing Uncertain Frequent Itemset Mining.
CoRR, 2013

A Secure Distributed Authentication scheme based on CRT-VSS and Trusted Computing in MANET.
CoRR, 2013

Accurate Indoor Localization Using Acoustic Direction Finding via Smart Phones.
CoRR, 2013

An efficient compressive data gathering routing scheme for large-scale wireless sensor networks.
Computers & Electrical Engineering, 2013

Routing attacks detection and reaction scheme for mobile ad hoc networks using statistical methods.
Proceedings of the 22nd Wireless and Optical Communication Conference, 2013

A Regional Statistics Detection Scheme against Sybil Attacks in WSNs.
Proceedings of the 12th IEEE International Conference on Trust, 2013

TARS: Trusted Adaptive Routing Strategy with Back-Off Observing Mechanism.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Dynamic mean-CVaR portfolio optimization in continuous-time.
Proceedings of the 10th IEEE International Conference on Control and Automation, 2013

Integrating Social Information into Collaborative Filtering for Celebrities Recommendation.
Proceedings of the Intelligent Information and Database Systems - 5th Asian Conference, 2013

2012
Dominance-Based Service Selection Scheme with Concurrent Requests.
JCSE, 2012

A Distributed ECC-DSS Authentication Scheme Based on CRT-VSS and Trusted Computing in MANET.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Secure Collaborative Outsourced Data Mining with Multi-owner in Cloud Computing.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Replicator Dynamic Inspired Differential Evolution Algorithm for Global Optimization.
Proceedings of the IJCCI 2012 - Proceedings of the 4th International Joint Conference on Computational Intelligence, Barcelona, Spain, 5, 2012

Research on User Authentication Scheme against the Man-in-the-Middle Attack.
Proceedings of the Information Computing and Applications - Third International Conference, 2012

Probabilistic Top-k Dominating Composite Service Selection.
Proceedings of the Ninth IEEE International Conference on e-Business Engineering, 2012

2011
A New Protocol for the Detection of Node Replication Attacks in Mobile Wireless Sensor Networks.
J. Comput. Sci. Technol., 2011

Fast Support Vector Regression Based on Cut.
Proceedings of the Advances in Swarm Intelligence - Second International Conference, 2011

TSP evolutionary algorithm based on fitness increment.
Proceedings of the Seventh International Conference on Natural Computation, 2011

An Efficient and Lightweight User Authentication Scheme for Wireless Sensor Networks.
Proceedings of the Information Computing and Applications, 2011

A Dominance-Based Approach for Selection in Service Composition.
Proceedings of the IEEE 8th International Conference on e-Business Engineering, 2011

The Research and Realization of Algorithms for Guillotine Rectangle Cutting Stock Problem.
Proceedings of the Second International Conference on Digital Manufacturing and Automation, 2011

2010
Application of artificial neural network for switching loss modeling in power IGBTs.
Journal of Zhejiang University - Science C, 2010

Knowledge transfer for cross domain learning to rank.
Inf. Retr., 2010

MoBility-Assisted Detection Of The Replication attacks in mobile wireless sensor networks.
Proceedings of the IEEE 6th International Conference on Wireless and Mobile Computing, 2010

Constraints Partition Based Service Process Replacement with End-to-End QoS Constraints.
Proceedings of the Sixth International Conference on Semantics Knowledge and Grid, 2010

2009
DAAODV: A Secure Ad Hoc Routing Protocol Based on Direct Anonymous Attestation.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2008
A robust localization algorithm in wireless sensor networks.
Frontiers Comput. Sci. China, 2008

TransRank: A Novel Algorithm for Transfer of Rank Learning.
Proceedings of the Workshops Proceedings of the 8th IEEE International Conference on Data Mining (ICDM 2008), 2008

2007
Convergence Analysis of Batch Gradient Algorithm for Three Classes of Sigma-Pi Neural Networks.
Neural Processing Letters, 2007

Training Pi-Sigma Network by Online Gradient Algorithm with Penalty for Small Weight Update.
Neural Computation, 2007

Research on Customer Profile Integration of Telecom Enterprises Based on Ontology.
Proceedings of the Research and Practical Issues of Enterprise Information Systems II, 2007

A Mechanism of Timely Knowledge Push on Demand Based on ECA and Multi-Agent Techniques.
Proceedings of the Research and Practical Issues of Enterprise Information Systems II, 2007

Convergence of Online Gradient Algorithm with Stochastic Inputs for Pi-Sigma Neural Networks.
Proceedings of the IEEE Symposium on Foundations of Computational Intelligence, 2007

Multiple Hierarchical Reasoning in Uncertain Situations for Complex Device Fault Diagnosis.
Proceedings of the 22nd IEEE International Symposium on Intelligent Control, 2007

2006
Priority-Based Routing Resource Assignment Considering Crosstalk.
J. Comput. Sci. Technol., 2006

Detection and analysis of table of contents based on content association.
IJDAR, 2006

2005
Reliable buffered clock tree routing algorithm with process variation tolerance.
Science in China Series F: Information Sciences, 2005

2002
A Web-based Microarray Experiment Management System.
Proceedings of the 15th International Conference on Computer Applications in Industry and Engineering, 2002

2001
A Discrete Contextual Stochastic Model for the Offline Recognition of Handwritten Chinese Characters.
IEEE Trans. Pattern Anal. Mach. Intell., 2001

1999
Information theoretic assessment and design of hyperspectral imaging systems.
Proceedings of the Visual Information Processing VIII, Orlando, FL, USA, April 5, 1999, 1999

Maximum mutual information estimation of a simplified hidden MRF for offline handwritten Chinese character recognition.
Proceedings of the Document Recognition and Retrieval VI, 1999

1997
The unique solution of projective invariants of six points from four uncalibrated images.
Pattern Recognition, 1997


  Loading...