Yang Su

According to our database1, Yang Su authored at least 47 papers between 2003 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Lightweight (Reverse) Fuzzy Extractor With Multiple Reference PUF Responses.
IEEE Trans. Information Forensics and Security, 2019

Communication-efficient revocable identity-based signature from multilinear maps.
J. Ambient Intelligence and Humanized Computing, 2019

A high security and efficiency protection of confidentiality and integrity for off-chip memory.
J. Ambient Intelligence and Humanized Computing, 2019

Automated calculation of heart girth measurement in pigs using body surface point clouds.
Computers and Electronics in Agriculture, 2019

Hash Functions and Benchmarks for Resource Constrained Passive Devices: A Preliminary Study.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops, 2019

Building Secure SRAM PUF Key Generators on Resource Constrained Devices.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops, 2019

Key Technologies of Anomaly Detection Using PCA-LSTM.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2019

2018
Phishing Detection Research Based on LSTM Recurrent Neural Network.
Proceedings of the Data Science, 2018

An Enhanced Lowrank Algorithm for Image Denoising.
Proceedings of the 5th International Conference on Systems and Informatics, 2018

Spatio-Temporal Large Margin Nearest Neighbor (ST-LMNN) Based on Riemannian Features for Individual Identification.
Proceedings of the 2018 IEEE International Conference on Multimedia and Expo, 2018

Power Network Vulnerability Detection Based on Improved Adaboost Algorithm.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

A Network Illegal Access Detection Method Based on PSO-SVM Algorithm in Power Monitoring System.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Double window spectrogram difference method: A blind estimation of frequency-hopping signal for battlefield communication environment.
Proceedings of the 24th Asia-Pacific Conference on Communications, 2018

2017
Online evolution reconstruction from a single measurement record with random time intervals for quantum communication.
Quantum Information Processing, 2017

An Optimization Strategy for Weighted Extreme Learning Machine based on PSO.
IJPRAI, 2017

USB Snooping Made Easy: Crosstalk Leakage Attacks on USB Hubs.
Proceedings of the 26th USENIX Security Symposium, 2017

Role-Oriented Designing: A Methodology to Designing for Appearance and Interaction Ways of Customized Professional Social Robots.
Proceedings of the Social Robotics - 9th International Conference, 2017

Estimation of area-averaged evapotranspiration in ejina oasis base on EC matrix flux measurements and footprint analysis.
Proceedings of the 2017 IEEE International Geoscience and Remote Sensing Symposium, 2017

Cyber-Attack Risks Analysis Based on Attack-Defense Trees.
Proceedings of the Advances in Internetworking, 2017

2016
Representing expectation values of projectors as series for evolution reconstruction.
Quantum Information Processing, 2016

HoTAAL: Home of social things meet ambient assisted living.
Proceedings of the 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, 2016

Research and Design of Dedicated Instruction for Reconfigurable Matrix Multiplication of VLIW Processor.
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016

2015
Quantum key distribution with silent active polarization compensation without a reference optical beam.
Proceedings of the International Conference on Wireless Communications & Signal Processing, 2015

Investigating sensor data retrieval schemes for multi-sensor passive RFID tags.
Proceedings of the 2015 IEEE International Conference on RFID, 2015

Privacy-preserving friendship establishment based on blind signature and bloom filter in mobile social networks.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015

Protecting router cache privacy in named data networking.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015

Token based scheduling of HVAC Services in commercial buildings.
Proceedings of the American Control Conference, 2015

2014
Servo Model predictive Control for Offset-Free setpoint Tracking.
Control and Intelligent Systems, 2014

2013
Convergence Analysis of EFOP Estimate Based on Frequency Domain Smoothing.
J. Applied Mathematics, 2013

2012
Comments on "Output feedback model predictive control for LPV systems based on quasi-min-max algorithm".
Automatica, 2012

Computation delay compensation for real time implementation of robust model predictive control.
Proceedings of the IEEE 10th International Conference on Industrial Informatics, 2012

2011
Comments on "Model predictive control for systems with stochastic multiplicative uncertainty and probabilistic constraints" [Automatica 45 (2009) 167-172].
Automatica, 2011

Research on reconfigurable multiplier unit based on GF[(28)]4 field of symmetric cryptography.
Proceedings of the 2011 IEEE 9th International Conference on ASIC, 2011

2010
Parallel implementation of wavelet-based image denoising on programmable PC-grade graphics hardware.
Signal Processing, 2010

Approach on modeling crosscutting features in concurrent system.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2010

Understanding crosscutting concerns from various perspectives in software reverse engineering.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2010

Extracting traversing features at requirements level from software legacy system.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2010

2009
Further Study on Proxy Authorization and Its Scheme.
Proceedings of the Complex Sciences, 2009

2008
Modeling and Throughput Analysis for Wireless Ad Hoc Networks.
Proceedings of the 67th IEEE Vehicular Technology Conference, 2008

Validation of a miniaturized wireless network testbed.
Proceedings of the Third ACM Workshop on Wireless Network Testbeds, 2008

Performance of TCP in Multi-Hop Access Networks.
Proceedings of the 16th International Workshop on Quality of Service, 2008

GPGPU-based Gaussian Filtering for Surface Metrological Data Processing.
Proceedings of the 12th International Conference on Information Visualisation, 2008

Approach on Aspect-Oriented Software Reverse Engineering at Requirements Level.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

Research on Modeling Traversing Features in Concurrent Software System.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

2005
An On-line Integrated Routing Algorithm in IP/MPLS over WDM Networks.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

WXCP: Explicit Congestion Control for Wireless Multi-hop Networks.
Proceedings of the Quality of Service - IWQoS 2005: 13th International Workshop, 2005

2003
RankGene: identification of diagnostic genes based on expression data.
Bioinformatics, 2003


  Loading...