Yan Xiong

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2023
The value on SUV-derived parameters assessed on <sup>18</sup>F-FDG PET/CT for predicting mediastinal lymph node metastasis in non-small cell lung cancer.
BMC Medical Imaging, December, 2023

Multi-strategy adaptive cuckoo search algorithm for numerical optimization.
Artif. Intell. Rev., March, 2023

Cross-Language Call Graph Construction Supporting Different Host Languages.
Proceedings of the IEEE International Conference on Software Analysis, 2023

Automated Inference on Financial Security of Ethereum Smart Contracts.
Proceedings of the 32nd USENIX Security Symposium, 2023

A Multi-scale Multi-modal Multi-dimension Joint Transformer for Two-Stream Action Classification.
Proceedings of the PRICAI 2023: Trends in Artificial Intelligence, 2023

Learning a Contextualized Multimodal Embedding for Zero-shot Cooking Video Caption Generation.
Proceedings of the ACM Multimedia Asia 2023, 2023

Research on Budget Performance Management System of Universitie under Big Data: A Case Study.
Proceedings of the 7th International Conference on Management Engineering, 2023

An Interpretable Data-Driven Approach for Employee Ability Assessment.
Proceedings of the 8th International Conference on Data Science in Cyberspace, 2023

Usage of Application-driven Ternary Divide-and-conquer Architecture of Heterogeneous Internet of Things in Environmental Monitoring.
Proceedings of the 9th International Conference on Big Data Computing and Communications, 2023

EOSVERIF: An Automated Analyzer for EOSIO Smart Contracts.
Proceedings of the 9th International Conference on Big Data Computing and Communications, 2023

SolScope: Effectively Hunting Potential Permission Backdoor Threats in Smart Contracts.
Proceedings of the 9th International Conference on Big Data Computing and Communications, 2023

MVVDroid: Android Malware Detection based on Multi-View Visualization.
Proceedings of the 9th International Conference on Big Data Computing and Communications, 2023

2022
Parameter Control Based Cuckoo Search Algorithm for Numerical Optimization.
Neural Process. Lett., 2022

Surrogate modeling for spacecraft thermophysical models using deep learning.
Neural Comput. Appl., 2022

D<sup>2</sup>F: discriminative dense fusion of appearance and motion modalities for end-to-end video classification.
Multim. Tools Appl., 2022

Skill Acquisition and Data Sales.
Manag. Sci., 2022

Versa: A 36-Core Systolic Multiprocessor With Dynamically Reconfigurable Interconnect and Memory.
IEEE J. Solid State Circuits, 2022

Neighborhood Learning-Based Cuckoo Search Algorithm for Global Optimization.
Int. J. Pattern Recognit. Artif. Intell., 2022

An Automated Analyzer for Financial Security of Ethereum Smart Contracts.
CoRR, 2022

An improved artificial electric field algorithm and its application in neural network optimization.
Comput. Electr. Eng., 2022

An Adjustable Farthest Point Sampling Method for Approximately-sorted Point Cloud Data.
Proceedings of the IEEE Workshop on Signal Processing Systems, 2022

Improving Energy Efficiency of Convolutional Neural Networks on Multi-core Architectures through Run-time Reconfiguration.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2022

2021
New Results on Self-Dual Generalized Reed-Solomon Codes.
IEEE Trans. Inf. Theory, 2021

AppAngio: Revealing Contextual Information of Android App Behaviors by API-Level Audit Logs.
IEEE Trans. Inf. Forensics Secur., 2021

Potential Pathogenic Genes Prioritization Based on Protein Domain Interaction Network Analysis.
IEEE ACM Trans. Comput. Biol. Bioinform., 2021

Imbalance Data Processing Strategy for Protein Interaction Sites Prediction.
IEEE ACM Trans. Comput. Biol. Bioinform., 2021

A reversible extended secret image sharing scheme based on Chinese remainder theorem.
Signal Process. Image Commun., 2021

Grouped Secret Sharing Schemes Based on Lagrange Interpolation Polynomials and Chinese Remainder Theorem.
Secur. Commun. Networks, 2021

Research on influence mechanism of running clothing fatigue based on BP neural network.
J. Intell. Fuzzy Syst., 2021

Disclosure, competition, and learning from asset prices.
J. Econ. Theory, 2021

A proactive secret sharing scheme based on Chinese remainder theorem.
Frontiers Comput. Sci., 2021

Versa: A Dataflow-Centric Multiprocessor with 36 Systolic ARM Cortex-M4F Cores and a Reconfigurable Crossbar-Memory Hierarchy in 28nm.
Proceedings of the 2021 Symposium on VLSI Circuits, Kyoto, Japan, June 13-19, 2021, 2021

Computationally-efficient voice activity detection based on deep neural networks.
Proceedings of the IEEE Workshop on Signal Processing Systems, 2021

Static Type Inference for Foreign Functions of Python.
Proceedings of the 32nd IEEE International Symposium on Software Reliability Engineering, 2021

A Certificate Authority Domain-based Cross-domain Authentication Scheme for Virtual Enterprise Using Identity Based Encryption.
Proceedings of the 7th International Conference on Big Data Computing and Communications, 2021

Security Analysis of Session Initiation Protocol Digest Access Authentication Scheme.
Proceedings of the 7th International Conference on Big Data Computing and Communications, 2021

2020
SieveDroid: Intercepting Undesirable Private-Data Transmissions in Android Applications.
IEEE Syst. J., 2020

Limiting Privacy Breaches in Average-Distance Query.
Secur. Commun. Networks, 2020

Quantum multiparty cryptosystems based on a homomorphic random basis encryption.
Quantum Inf. Process., 2020

A verifiable framework of entanglement-free quantum secret sharing with information-theoretical security.
Quantum Inf. Process., 2020

Convergence of Batch Gradient Method Based on the Entropy Error Function for Feedforward Neural Networks.
Neural Process. Lett., 2020

Incremental learning imbalanced data streams with concept drift: The dynamic updated ensemble algorithm.
Knowl. Based Syst., 2020

Threshold changeable secret sharing with secure secret reconstruction.
Inf. Process. Lett., 2020

A Formal Framework of Shielding Systems by Stepwise Refinement.
Int. J. Netw. Secur., 2020

Detecting Improper Behaviors of Stubbornly Requesting Permissions in Android Applications.
Int. J. Netw. Secur., 2020

Static Analysis of Superfluous Network Transmissions in Android Applications.
Int. J. Netw. Secur., 2020

The influences of product similarity on consumer preferences: a study based on eye-tracking analysis.
Cogn. Technol. Work., 2020

A new function-based patent knowledge retrieval tool for conceptual design of innovative products.
Comput. Ind., 2020

Intelligent Optimization Strategy Based on Statistical Machine Learning for Spacecraft Thermal Design.
IEEE Access, 2020

Temperature-Dependent Logic Behavior of Logic Transistors Based on WS<sub>2</sub>.
IEEE Access, 2020

Convolution Encoders for End-to-End Action Tracking With Space-Time Cubic Kernels.
IEEE Access, 2020

SmartVerif: Push the Limit of Automation Capability of Verifying Security Protocols by Dynamic Strategies.
Proceedings of the 29th USENIX Security Symposium, 2020

Accelerating Deep Neural Network Computation on a Low Power Reconfigurable Architecture.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2020

Identifying compatibility-related APIs by exploring biased distribution in Android apps.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Companion Volume, Seoul, South Korea, 27 June, 2020

Defending Bit-Flip Attack through DNN Weight Reconstruction.
Proceedings of the 57th ACM/IEEE Design Automation Conference, 2020

Joint Self-Attention and Multi-Embeddings for Chinese Named Entity Recognition.
Proceedings of the 6th International Conference on Big Data Computing and Communications, 2020

Automated Theorem Proving via Interacting with Proof Assistants by Dynamic Strategies.
Proceedings of the 6th International Conference on Big Data Computing and Communications, 2020

KIMS: Kernel Integrity Measuring System based on TrustZone.
Proceedings of the 6th International Conference on Big Data Computing and Communications, 2020

Context-aware Generation of Proof Scripts for Theorem Proving.
Proceedings of the 6th International Conference on Big Data Computing and Communications, 2020

SPrune: A Code Pruning Tool for Ethereum Solidity Contract Static Analysis.
Proceedings of the 6th International Conference on Big Data Computing and Communications, 2020

Transmuter: Bridging the Efficiency Gap using Memory and Dataflow Reconfiguration.
Proceedings of the PACT '20: International Conference on Parallel Architectures and Compilation Techniques, 2020

2019
Concurrent Transmission Based on Distributed Scheduling for Underwater Acoustic Networks.
Sensors, 2019

AppScalpel: Combining static analysis and outlier detection to identify and prune undesirable usage of sensitive data in Android applications.
Neurocomputing, 2019

Cuckoo search algorithm with memory and the vibrant fault diagnosis for hydroelectric generating unit.
Eng. Comput., 2019

Tightly coupled multi-group threshold secret sharing based on Chinese Remainder Theorem.
Discret. Appl. Math., 2019

Tightly Coupled Secret Sharing and Its Application to Group Authentication.
CoRR, 2019

Ensemble of cuckoo search variants.
Comput. Ind. Eng., 2019

Semi-supervised prediction of protein interaction sites from unlabeled sample information.
BMC Bioinform., 2019

Residual + Capsule Networks (ResCap) for Simultaneous Single-Channel Overlapped Keyword Recognition.
Proceedings of the Interspeech 2019, 2019

Divide and conquer: recovering contextual information of behaviors in Android apps around limited-quantity audit logs.
Proceedings of the 41st International Conference on Software Engineering: Companion Proceedings, 2019

An Observational Study on Compatibility-Related API Usage.
Proceedings of the 5th International Conference on Big Data Computing and Communications, 2019

Differentially Private Geo-Social Ranking.
Proceedings of the 5th International Conference on Big Data Computing and Communications, 2019

Drift-detection Based Incremental Ensemble for Reacting to Different Kinds of Concept Drift.
Proceedings of the 5th International Conference on Big Data Computing and Communications, 2019

Formal Verification of BNB Smart Contract.
Proceedings of the 5th International Conference on Big Data Computing and Communications, 2019

FLChain: A Blockchain for Auditable Federated Learning with Trust and Incentive.
Proceedings of the 5th International Conference on Big Data Computing and Communications, 2019

The improved protocol based on the Bennett 92 protocol.
Proceedings of the ACM Turing Celebration Conference - China, 2019

2018
Modified cuckoo search algorithm and the prediction of flashover voltage of insulators.
Neural Comput. Appl., 2018

Lightitude: Indoor Positioning Using Uneven Light Intensity Distribution.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2018

Speech Enhancement Using Heterogeneous Information.
Int. J. Grid High Perform. Comput., 2018

Constructing Ideal Secret Sharing Schemes based on Chinese Remainder Theorem.
IACR Cryptol. ePrint Arch., 2018

Cuckoo search algorithm with dynamic feedback information.
Future Gener. Comput. Syst., 2018

Differences between beginning and advanced design students in analogical reasoning during idea generation: evidence from eye movements.
Cogn. Technol. Work., 2018

Verifying Security Protocols using Dynamic Strategies.
CoRR, 2018

Retrieval of Semantic-Based Inspirational Sources for Emotional Design.
Comput. Intell. Neurosci., 2018

A novel cuckoo search algorithm with multiple update rules.
Appl. Intell., 2018

An EEG study of the relationship between design problem statements and cognitive behaviors during conceptual design.
Artif. Intell. Eng. Des. Anal. Manuf., 2018

A Formal Framework for State Continuity of Protected Modules.
Proceedings of the 4th International Conference on Big Data Computing and Communications, 2018

Formally Verifying Memory Isolation Based on ARM Processors.
Proceedings of the 4th International Conference on Big Data Computing and Communications, 2018

Automatically Detecting Malicious Sensitive Data Usage in Android Applications.
Proceedings of the 4th International Conference on Big Data Computing and Communications, 2018

A Privacy Enforcement Framework for Android Systems Using Symbolic Execution-Based Instrumentation.
Proceedings of the 4th International Conference on Big Data Computing and Communications, 2018

Detecting Stubborn Permission Requests in Android Applications.
Proceedings of the 4th International Conference on Big Data Computing and Communications, 2018

Identifying Superfluous Network Transmissions in Android Applications.
Proceedings of the 4th International Conference on Big Data Computing and Communications, 2018

KeyChain: Blockchain-Based Key Distribution.
Proceedings of the 4th International Conference on Big Data Computing and Communications, 2018

2017
Stride-in-the-Loop Relative Positioning Between Users and Dummy Acoustic Speakers.
IEEE J. Sel. Areas Commun., 2017

A General Formal Framework of Analyzing Selective Disclosure Attribute-Based Credential Systems.
Int. J. Netw. Secur., 2017

Developing a nomogram based on multiparametric magnetic resonance imaging for forecasting high-grade prostate cancer to reduce unnecessary biopsies within the prostate-specific antigen gray zone.
BMC Medical Imaging, 2017

Depth data research of GIS based on clustering analysis algorithm.
Proceedings of the MIPPR 2017: Remote Sensing Image Processing, 2017

A Verified Secure Protocol Model of OAuth Dynamic Client Registration.
Proceedings of the 3rd International Conference on Big Data Computing and Communications, 2017

Mining Anomalous Usage of Sensitive Data through Anomaly Detection.
Proceedings of the 3rd International Conference on Big Data Computing and Communications, 2017

2016
"Friend is Treasure": Exploring and Exploiting Mobile Social Contacts for Efficient Task Offloading.
IEEE Trans. Veh. Technol., 2016

An Accurate Direction Finding Scheme Using Virtual Antenna Array via Smartphones.
Sensors, 2016

A non-parametric symbolic approximate representation for long time series.
Pattern Anal. Appl., 2016

Numerical simulation on the effects of drug-eluting stents with different bending angles on hemodynamics and drug distribution.
Medical Biol. Eng. Comput., 2016

An investigation of the information system security issues in Taiwan.
Int. J. Bus. Inf. Syst., 2016

A new method for discovering behavior patterns among animal movements.
Int. J. Geogr. Inf. Sci., 2016

Dynamic mean-risk portfolio selection with multiple risk measures in continuous-time.
Eur. J. Oper. Res., 2016

Formal Analysis of Selective Disclosure Attribute-Based Credential System in Applied Pi Calculus.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

WalkieLokie: sensing relative positions of surrounding presenters by acoustic signals.
Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2016

Rotate and Guide: Accurate and Lightweight Indoor Direction Finding Using Smartphones.
Proceedings of the Big Data Computing and Communications - Second International Conference, 2016

2015
Privacy preserving RSS map generation for a crowdsensing network.
IEEE Wirel. Commun., 2015

Online Sequential Channel Accessing Control: A Double Exploration vs. Exploitation Problem.
IEEE Trans. Wirel. Commun., 2015

WizBee: Wise ZigBee Coexistence via Interference Cancellation with Single Antenna.
IEEE Trans. Mob. Comput., 2015

Swadloon: Direction Finding and Indoor Localization Using Acoustic Signal by Shaking Smartphones.
IEEE Trans. Mob. Comput., 2015

Randomized Component and Its Application to (t, m, n)-Group Oriented Secret Sharing.
IEEE Trans. Inf. Forensics Secur., 2015

Modified Internal Model Control Scheme for the Drive Part with Elastic Joints in Robotic System.
J. Intell. Robotic Syst., 2015

Collapsible graphs and Hamilton cycles of line graphs.
Discret. Appl. Math., 2015

WalkieLokie: Relative Positioning for Augmented Reality Using a Dummy Acoustic Speaker.
CoRR, 2015

Magemite: Character inputting system based on magnetic sensor.
Proceedings of the 16th IEEE International Symposium on A World of Wireless, 2015

Lightitude: Indoor Positioning Using Ubiquitous Visible Lights and COTS Devices.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

Discovering Loose Group Movement Patterns from Animal Trajectories.
Proceedings of the 11th IEEE International Conference on e-Science, 2015

Fast Similarity Search of Multi-Dimensional Time Series via Segment Rotation.
Proceedings of the Database Systems for Advanced Applications, 2015

Anti-multipath Indoor Direction Finding Using Acoustic Signal via Smartphones.
Proceedings of the Big Data Computing and Communications - First International Conference, 2015

2014
Sparsest Random Scheduling for Compressive Data Gathering in Wireless Sensor Networks.
IEEE Trans. Wirel. Commun., 2014

Collaborative Outsourced Data Mining for Secure Cloud Computing.
J. Networks, 2014

A new similarity measure based on shape information for invariant with multiple distortions.
Neurocomputing, 2014

Hierarchical Storage Model and Priority Ranking Method of Rules in Rule-based Reasoning System.
Int. J. Comput. Intell. Syst., 2014

Walk globally, act locally: efficient influential user identification in mobile social networks.
Proceedings of the first international workshop on Mobile sensing, 2014

Confidence-interval based sensing quality evaluation for mobile sensor networks.
Proceedings of the first international workshop on Mobile sensing, 2014

Compressive sensing meets unreliable link: sparsest random scheduling for compressive data gathering in lossy WSNs.
Proceedings of the Fifteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2014

Shake and walk: Acoustic direction finding and fine-grained indoor localization using smartphones.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

A new dynamic clustering method based on nuclear field.
Proceedings of the 10th International Conference on Natural Computation, 2014

Continuous-time mean-variance portfolio optimization with Safety-First Principle.
Proceedings of the 11th IEEE International Conference on Control & Automation, 2014

A fast algorithm of geometry generalization.
Proceedings of the 22nd ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, 2014

2013
Fine-Grained Refinement on TPM-Based Protocol Applications.
IEEE Trans. Inf. Forensics Secur., 2013

Using an SQP Algorithm to Choose the Feature Set for Data Field Clustering.
Smart Comput. Rev., 2013

Detection System of Clone Attacks based on RSSI in Wireless Sensor Networks.
J. Networks, 2013

Integrity Verification for Outsourcing Uncertain Frequent Itemset Mining.
CoRR, 2013

A Secure Distributed Authentication scheme based on CRT-VSS and Trusted Computing in MANET.
CoRR, 2013

Accurate Indoor Localization Using Acoustic Direction Finding via Smart Phones.
CoRR, 2013

An efficient compressive data gathering routing scheme for large-scale wireless sensor networks.
Comput. Electr. Eng., 2013

Routing attacks detection and reaction scheme for mobile ad hoc networks using statistical methods.
Proceedings of the 22nd Wireless and Optical Communication Conference, 2013

A Regional Statistics Detection Scheme against Sybil Attacks in WSNs.
Proceedings of the 12th IEEE International Conference on Trust, 2013

TARS: Trusted Adaptive Routing Strategy with Back-Off Observing Mechanism.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Dynamic mean-CVaR portfolio optimization in continuous-time.
Proceedings of the 10th IEEE International Conference on Control and Automation, 2013

Integrating Social Information into Collaborative Filtering for Celebrities Recommendation.
Proceedings of the Intelligent Information and Database Systems - 5th Asian Conference, 2013

2012
Dominance-Based Service Selection Scheme with Concurrent Requests.
J. Comput. Sci. Eng., 2012

A Distributed ECC-DSS Authentication Scheme Based on CRT-VSS and Trusted Computing in MANET.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Secure Collaborative Outsourced Data Mining with Multi-owner in Cloud Computing.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Replicator Dynamic Inspired Differential Evolution Algorithm for Global Optimization.
Proceedings of the IJCCI 2012 - Proceedings of the 4th International Joint Conference on Computational Intelligence, Barcelona, Spain, 5, 2012

Research on User Authentication Scheme against the Man-in-the-Middle Attack.
Proceedings of the Information Computing and Applications - Third International Conference, 2012

Probabilistic Top-k Dominating Composite Service Selection.
Proceedings of the Ninth IEEE International Conference on e-Business Engineering, 2012

2011
A New Protocol for the Detection of Node Replication Attacks in Mobile Wireless Sensor Networks.
J. Comput. Sci. Technol., 2011

Fast Support Vector Regression Based on Cut.
Proceedings of the Advances in Swarm Intelligence - Second International Conference, 2011

TSP evolutionary algorithm based on fitness increment.
Proceedings of the Seventh International Conference on Natural Computation, 2011

An Efficient and Lightweight User Authentication Scheme for Wireless Sensor Networks.
Proceedings of the Information Computing and Applications, 2011

A Dominance-Based Approach for Selection in Service Composition.
Proceedings of the IEEE 8th International Conference on e-Business Engineering, 2011

The Research and Realization of Algorithms for Guillotine Rectangle Cutting Stock Problem.
Proceedings of the Second International Conference on Digital Manufacturing and Automation, 2011

2010
Application of artificial neural network for switching loss modeling in power IGBTs.
J. Zhejiang Univ. Sci. C, 2010

Knowledge transfer for cross domain learning to rank.
Inf. Retr., 2010

MoBility-Assisted Detection Of The Replication attacks in mobile wireless sensor networks.
Proceedings of the IEEE 6th International Conference on Wireless and Mobile Computing, 2010

Constraints Partition Based Service Process Replacement with End-to-End QoS Constraints.
Proceedings of the Sixth International Conference on Semantics Knowledge and Grid, 2010

2009
DAAODV: A Secure Ad Hoc Routing Protocol Based on Direct Anonymous Attestation.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2008
A robust localization algorithm in wireless sensor networks.
Frontiers Comput. Sci. China, 2008

TransRank: A Novel Algorithm for Transfer of Rank Learning.
Proceedings of the Workshops Proceedings of the 8th IEEE International Conference on Data Mining (ICDM 2008), 2008

2007
Convergence Analysis of Batch Gradient Algorithm for Three Classes of Sigma-Pi Neural Networks.
Neural Process. Lett., 2007

Training Pi-Sigma Network by Online Gradient Algorithm with Penalty for Small Weight Update.
Neural Comput., 2007

Research on Customer Profile Integration of Telecom Enterprises Based on Ontology.
Proceedings of the Research and Practical Issues of Enterprise Information Systems II, 2007

A Mechanism of Timely Knowledge Push on Demand Based on ECA and Multi-Agent Techniques.
Proceedings of the Research and Practical Issues of Enterprise Information Systems II, 2007

Convergence of Online Gradient Algorithm with Stochastic Inputs for Pi-Sigma Neural Networks.
Proceedings of the IEEE Symposium on Foundations of Computational Intelligence, 2007

Multiple Hierarchical Reasoning in Uncertain Situations for Complex Device Fault Diagnosis.
Proceedings of the 22nd IEEE International Symposium on Intelligent Control, 2007

2006
Priority-Based Routing Resource Assignment Considering Crosstalk.
J. Comput. Sci. Technol., 2006

Detection and analysis of table of contents based on content association.
Int. J. Document Anal. Recognit., 2006

2005
Reliable buffered clock tree routing algorithm with process variation tolerance.
Sci. China Ser. F Inf. Sci., 2005

2002
A Web-based Microarray Experiment Management System.
Proceedings of the 15th International Conference on Computer Applications in Industry and Engineering, 2002

2001
A Discrete Contextual Stochastic Model for the Offline Recognition of Handwritten Chinese Characters.
IEEE Trans. Pattern Anal. Mach. Intell., 2001

1999
Information theoretic assessment and design of hyperspectral imaging systems.
Proceedings of the Visual Information Processing VIII, Orlando, FL, USA, April 5, 1999, 1999

Maximum mutual information estimation of a simplified hidden MRF for offline handwritten Chinese character recognition.
Proceedings of the Document Recognition and Retrieval VI, 1999

1997
The unique solution of projective invariants of six points from four uncalibrated images.
Pattern Recognit., 1997


  Loading...