Yang Su

According to our database1, Yang Su authored at least 60 papers between 2003 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Adaptive simultaneous multibeam resource management for colocated MIMO radar in multiple targets tracking.
Signal Process., 2020

Evolution reconstruction of deviate Bell states by extending the novel Fourier-based method.
Quantum Inf. Process., 2020

Stakeholder-oriented multi-objective process optimization based on an improved genetic algorithm.
Comput. Chem. Eng., 2020

Secure Decentralized Machine Identifiers for Internet of Things.
Proceedings of the ICBCT'20: The 2nd International Conference on Blockchain Technology, 2020

Intrusion Detection Based on Cluster Analysis and Nonsymmetric Autoencoder.
Proceedings of the Web, Artificial Intelligence and Network Applications, 2020

2019
Lightweight (Reverse) Fuzzy Extractor With Multiple Reference PUF Responses.
IEEE Trans. Inf. Forensics Secur., 2019

基于PCA-LSTM的入侵检测研究 (Study on Intrusion Detection Based on PCA-LSTM).
计算机科学, 2019

Communication-efficient revocable identity-based signature from multilinear maps.
J. Ambient Intell. Humaniz. Comput., 2019

A high security and efficiency protection of confidentiality and integrity for off-chip memory.
J. Ambient Intell. Humaniz. Comput., 2019

An impedance sensing platform for monitoring heterogeneous connectivity and diagnostics in lab-on-a-chip systems.
CoRR, 2019

Automated calculation of heart girth measurement in pigs using body surface point clouds.
Comput. Electron. Agric., 2019

Hash Functions and Benchmarks for Resource Constrained Passive Devices: A Preliminary Study.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops, 2019

Building Secure SRAM PUF Key Generators on Resource Constrained Devices.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops, 2019

Memory Network-Based Quality Normalization of Magnetic Resonance Images for Brain Segmentation.
Proceedings of the Intelligence Science and Big Data Engineering. Visual Data Engineering, 2019

Closed-Form Equations and Experimental Verification for Soft Robot Arm Based on Cosserat Theory<sup>*</sup>.
Proceedings of the 2019 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2019

Key Technologies of Anomaly Detection Using PCA-LSTM.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2019

2018
SecuCode: Intrinsic PUF Entangled Secure Wireless Code Dissemination for Computational RFID Devices.
CoRR, 2018

Lightweight (Reverse) Fuzzy Extractor with Multiple Referenced PUF Responses.
CoRR, 2018

Phishing Detection Research Based on LSTM Recurrent Neural Network.
Proceedings of the Data Science, 2018

An Enhanced Lowrank Algorithm for Image Denoising.
Proceedings of the 5th International Conference on Systems and Informatics, 2018

Spatio-Temporal Large Margin Nearest Neighbor (ST-LMNN) Based on Riemannian Features for Individual Identification.
Proceedings of the 2018 IEEE International Conference on Multimedia and Expo, 2018

Power Network Vulnerability Detection Based on Improved Adaboost Algorithm.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

A Network Illegal Access Detection Method Based on PSO-SVM Algorithm in Power Monitoring System.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Double window spectrogram difference method: A blind estimation of frequency-hopping signal for battlefield communication environment.
Proceedings of the 24th Asia-Pacific Conference on Communications, 2018

2017
Online evolution reconstruction from a single measurement record with random time intervals for quantum communication.
Quantum Inf. Process., 2017

An Optimization Strategy for Weighted Extreme Learning Machine based on PSO.
Int. J. Pattern Recognit. Artif. Intell., 2017

USB Snooping Made Easy: Crosstalk Leakage Attacks on USB Hubs.
Proceedings of the 26th USENIX Security Symposium, 2017

Role-Oriented Designing: A Methodology to Designing for Appearance and Interaction Ways of Customized Professional Social Robots.
Proceedings of the Social Robotics - 9th International Conference, 2017

Estimation of area-averaged evapotranspiration in ejina oasis base on EC matrix flux measurements and footprint analysis.
Proceedings of the 2017 IEEE International Geoscience and Remote Sensing Symposium, 2017

Cyber-Attack Risks Analysis Based on Attack-Defense Trees.
Proceedings of the Advances in Internetworking, 2017

2016
Representing expectation values of projectors as series for evolution reconstruction.
Quantum Inf. Process., 2016

基于两层社区混合计算的个性化推荐方法 (Personalized Recommendation Method Based on Hybrid Computing in Two Layers of Community).
计算机科学, 2016

HoTAAL: Home of social things meet ambient assisted living.
Proceedings of the 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, 2016

Research and Design of Dedicated Instruction for Reconfigurable Matrix Multiplication of VLIW Processor.
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016

2015
Quantum key distribution with silent active polarization compensation without a reference optical beam.
Proceedings of the International Conference on Wireless Communications & Signal Processing, 2015

Investigating sensor data retrieval schemes for multi-sensor passive RFID tags.
Proceedings of the 2015 IEEE International Conference on RFID, 2015

Privacy-preserving friendship establishment based on blind signature and bloom filter in mobile social networks.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015

Protecting router cache privacy in named data networking.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015

Token based scheduling of HVAC Services in commercial buildings.
Proceedings of the American Control Conference, 2015

2014
Servo Model predictive Control for Offset-Free setpoint Tracking.
Control. Intell. Syst., 2014

2013
Convergence Analysis of EFOP Estimate Based on Frequency Domain Smoothing.
J. Appl. Math., 2013

2012
Comments on "Output feedback model predictive control for LPV systems based on quasi-min-max algorithm".
Autom., 2012

Computation delay compensation for real time implementation of robust model predictive control.
Proceedings of the IEEE 10th International Conference on Industrial Informatics, 2012

2011
Comments on "Model predictive control for systems with stochastic multiplicative uncertainty and probabilistic constraints" [Automatica 45 (2009) 167-172].
Autom., 2011

Research on reconfigurable multiplier unit based on GF[(2<sup>8</sup>)]<sup>4</sup> field of symmetric cryptography.
Proceedings of the 2011 IEEE 9th International Conference on ASIC, 2011

2010
Parallel implementation of wavelet-based image denoising on programmable PC-grade graphics hardware.
Signal Process., 2010

Approach on modeling crosscutting features in concurrent system.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2010

Understanding crosscutting concerns from various perspectives in software reverse engineering.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2010

Extracting traversing features at requirements level from software legacy system.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2010

2009
Real-time virtual environment signal extraction and denoising using programmable graphics hardware.
Int. J. Autom. Comput., 2009

Further Study on Proxy Authorization and Its Scheme.
Proceedings of the Complex Sciences, 2009

2008
Modeling and Throughput Analysis for Wireless Ad Hoc Networks.
Proceedings of the 67th IEEE Vehicular Technology Conference, 2008

Validation of a miniaturized wireless network testbed.
Proceedings of the Third ACM Workshop on Wireless Network Testbeds, 2008

Performance of TCP in Multi-Hop Access Networks.
Proceedings of the 16th International Workshop on Quality of Service, 2008

GPGPU-based Gaussian Filtering for Surface Metrological Data Processing.
Proceedings of the 12th International Conference on Information Visualisation, 2008

Approach on Aspect-Oriented Software Reverse Engineering at Requirements Level.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

Research on Modeling Traversing Features in Concurrent Software System.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

2005
An On-line Integrated Routing Algorithm in IP/MPLS over WDM Networks.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

WXCP: Explicit Congestion Control for Wireless Multi-hop Networks.
Proceedings of the Quality of Service - IWQoS 2005: 13th International Workshop, 2005

2003
RankGene: identification of diagnostic genes based on expression data.
Bioinform., 2003


  Loading...