Yang Li

Affiliations:
  • Central University of Finance and Economics, School of Information, Beijing, China


According to our database1, Yang Li authored at least 14 papers between 2012 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Improved AdaBoost algorithm using misclassified samples oriented feature selection and weighted non-negative matrix factorization.
Neurocomputing, 2022

BMSC: A Novel Anonymous Trading Scheme Based on Zero-Knowledge Proof in Ethereum.
Proceedings of the Data Science, 2022

Blockchain Access Control Scheme Based on Multi-authority Attribute-Based Encryption.
Proceedings of the Data Science, 2022

KPH: A Novel Blockchain Privacy Preserving Scheme Based on Paillier and FO Commitment.
Proceedings of the Data Science, 2022

Decentralized Blockchain Transaction Scheme Based on Digital Commitment.
Proceedings of the Blockchain and Trustworthy Systems - 4th International Conference, 2022

2021
ASTS: attention based spatio-temporal sequential framework for movie trailer genre classification.
Multim. Tools Appl., 2021

Comprehensive study of schedulability tests and optimal design for rate-monotonic scheduling.
Comput. Commun., 2021

Privacy Protection Model for Blockchain Data Sharing Based on zk-SNARK.
Proceedings of the Data Science, 2021

IoT Security Situational Awareness Based on Q-Learning and Bayesian Game.
Proceedings of the Data Science, 2021

Trustworthy Blockchain Data Sharing Model Based on Multi-authority ABE and zk-SNARK.
Proceedings of the Blockchain and Trustworthy Systems - Third International Conference, 2021

2020
Convolutional Neural Network Visualization in Adversarial Example Attack.
Proceedings of the Data Science, 2020

2017
Two-step based feature selection method for filtering redundant information.
J. Intell. Fuzzy Syst., 2017

2016
Hierarchical and multi-featured fusion for effective gait recognition under variable scenarios.
Pattern Anal. Appl., 2016

2012
Provably secure identity-based authenticated key agreement protocol and its application.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012


  Loading...