Yang Xiang

According to our database1, Yang Xiang authored at least 168 papers between 1993 and 2018.

Collaborative distances :

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Chinese Open Relation Extraction and Knowledge Base Establishment.
ACM Trans. Asian & Low-Resource Lang. Inf. Process., 2018

A Novel Secure Scheme for Supporting Complex SQL Queries over Encrypted Databases in Cloud Computing.
Security and Communication Networks, 2018

A general method of designing phase-shifting algorithms for grating lateral shearing interferometry.
Frontiers of IT & EE, 2018

Trajectory modes and wake patterns of freely falling plates.
J. Visualization, 2018

Lagrangian flow visualization of multiple co-axial co-rotating vortex rings.
J. Visualization, 2018

DedupDUM: Secure and scalable data deduplication with dynamic user management.
Inf. Sci., 2018

A survey on security control and attack detection for industrial cyber-physical systems.
Neurocomputing, 2018

A novel organizing scheme of single topic user group based on trust chain model in social network.
Int. J. Communication Systems, 2018

Task-specific word identification from short texts using a convolutional neural network.
Intell. Data Anal., 2018

Using AI to Hack IA: A New Stealthy Spyware Against Voice Assistance Functions in Smart Phones.
CoRR, 2018

DRN: A Deep Reinforcement Learning Framework for News Recommendation.
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018

Aspect-based Financial Sentiment Analysis with Deep Neural Networks.
Proceedings of the Companion of the The Web Conference 2018 on The Web Conference 2018, 2018

Incorporating Statistical Features in Convolutional Neural Networks for Question Answering with Financial Data.
Proceedings of the Companion of the The Web Conference 2018 on The Web Conference 2018, 2018

Term Standardization and Normalization for Research Domain Criteria (RDoC).
Proceedings of the IEEE International Conference on Healthcare Informatics Workshops, 2018

Who Spread to Whom? Inferring Online Social Networks with User Features.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

De-Causalizing NAT-Modeled Bayesian Networks for Inference Efficiency.
Proceedings of the Advances in Artificial Intelligence, 2018

Compressing Bayesian Networks: Swarm-Based Descent, Efficiency, and Posterior Accuracy.
Proceedings of the Advances in Artificial Intelligence, 2018

2017
Embedded Device Forensics and Security.
ACM Trans. Embedded Comput. Syst., 2017

Attribute-Based Access Control with Constant-Size Ciphertext in Cloud Computing.
IEEE Trans. Cloud Computing, 2017

Mapping Extent Dynamics of Small Lakes Using Downscaling MODIS Surface Reflectance.
Remote Sensing, 2017

Erratum to: A new lightweight RFID grouping authentication protocol for multiple tags in mobile environment.
Multimedia Tools Appl., 2017

A new lightweight RFID grouping authentication protocol for multiple tags in mobile environment.
Multimedia Tools Appl., 2017

Parallel compressive sampling matching pursuit algorithm for compressed sensing signal reconstruction with OpenCL.
Journal of Systems Architecture - Embedded Systems Design, 2017

A CPS framework based perturbation constrained buffer planning approach in VLSI design.
J. Parallel Distrib. Comput., 2017

Geographic spatiotemporal big data correlation analysis via the Hilbert-Huang transformation.
J. Comput. Syst. Sci., 2017

Associative retrieval in spatial big data based on spreading activation with semantic ontology.
Future Generation Comp. Syst., 2017

Wikipedia Vandal Early Detection: from User Behavior to User Embedding.
CoRR, 2017

Task-specific Word Identification from Short Texts Using a Convolutional Neural Network.
CoRR, 2017

SNE: Signed Network Embedding.
CoRR, 2017

A sliding window-based dynamic load balancing for heterogeneous Hadoop clusters.
Concurrency and Computation: Practice and Experience, 2017

Pseudo-Dynamic Testing of Realistic Edge-Fog Cloud Ecosystems.
IEEE Communications Magazine, 2017

Entity Search Based on the Representation Learning Model With Different Embedding Strategies.
IEEE Access, 2017

Wikipedia Vandal Early Detection: From User Behavior to User Embedding.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2017

SNE: Signed Network Embedding.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2017

Study on the Chinese Word Semantic Relation Classification with Word Embedding.
Proceedings of the Natural Language Processing and Chinese Computing, 2017

A Hierarchical VDB Scheme with Scalable Verification and Tampered Record Localization.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

Towards Uncertain QoS-Aware Service Composition via Multi-Objective Optimization.
Proceedings of the 2017 IEEE International Conference on Web Services, 2017

Learning Discriminative Convolutional Features for Skeletal Action Recognition.
Proceedings of the Neural Information Processing - 24th International Conference, 2017

PRACE: A Taxi Recommender for Finding Passengers with Deep Learning Approaches.
Proceedings of the Intelligent Computing Methodologies - 13th International Conference, 2017

Chinese Named Entity Recognition with Character-Word Mixed Embedding.
Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, 2017

Modeling User Preferences on Spatiotemporal Topics for Point-of-Interest Recommendation.
Proceedings of the 2017 IEEE International Conference on Services Computing, 2017

2016
Hadoop Performance Modeling for Job Estimation and Resource Provisioning.
IEEE Trans. Parallel Distrib. Syst., 2016

Efficient Network Security Policy Enforcement With Policy Space Analysis.
IEEE/ACM Trans. Netw., 2016

Long-Time-Series Global Land Surface Satellite Leaf Area Index Product Derived From MODIS and AVHRR Surface Reflectance.
IEEE Trans. Geoscience and Remote Sensing, 2016

A trust evaluation scheme for complex links in a social network: a link strength perspective.
Appl. Intell., 2016

Leveraging a Graph-Powered, Real-Time Recommendation Engine to Create Rapid Business Value.
Proceedings of the 10th ACM Conference on Recommender Systems, 2016

Incorporating Pre-Training in Long Short-Term Memory Networks for Tweets Classification.
Proceedings of the IEEE 16th International Conference on Data Mining, 2016

A Two Phase Deep Learning Model for Identifying Discrimination from Tweets.
Proceedings of the 19th International Conference on Extending Database Technology, 2016

Product Prediction with Deep Neural Networks.
Proceedings of the Knowledge Graph and Semantic Computing: Semantic, Knowledge, and Linked Big Data, 2016

Knowledge Graph Embedding for Link Prediction and Triplet Classification.
Proceedings of the Knowledge Graph and Semantic Computing: Semantic, Knowledge, and Linked Big Data, 2016

2015
A Sentiment Delivering Estimate Scheme Based on Trust Chain in Mobile Social Network.
Mobile Information Systems, 2015

Enhanced Twitter Sentiment Analysis by Using Feature Selection and Combination.
Proceedings of the International Symposium on Security and Privacy in Social Networks and Big Data, 2015

FLAX: A Flexible Architecture for Large Scale Cloud Fabric.
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom 2015, 2015

Discriminative Dictionary Learning for Skeletal Action Recognition.
Proceedings of the Neural Information Processing - 22nd International Conference, 2015

A Knowledge Resources Based Neural Network for Learning Word and Relation Representations.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

A Bayesian Treatment for Singular Value Decomposition.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

2014
Answering exact distance queries on real-world graphs with bounded performance guarantees.
VLDB J., 2014

QoS-Aware Dynamic Composition of Web Services Using Numerical Temporal Planning.
IEEE Trans. Services Computing, 2014

Acquisition of Causal Models for Local Distributions in Bayesian Networks.
IEEE Trans. Cybernetics, 2014

Trust computation for multiple routes recommendation in social network sites.
Security and Communication Networks, 2014

Simple linear algorithms for mining graph cores.
CoRR, 2014

A novel multiple-level trust management framework for wireless sensor networks.
Computer Networks, 2014

Quantification of biological network perturbations for mechanistic insight and diagnostics using two-layer causal models.
BMC Bioinformatics, 2014

Towards automated choreography of Web services using planning in large scale service repositories.
Appl. Intell., 2014

Compression of Bayesian Networks with NIN-AND Tree Modeling.
Proceedings of the Probabilistic Graphical Models - 7th European Workshop, 2014

Mining massive SNP data for identifying associated SNPs and uncovering gene relationships.
Proceedings of the 5th ACM Conference on Bioinformatics, 2014

2013
On learning cluster coefficient of private networks.
Social Netw. Analys. Mining, 2013

LDA-based online topic detection using tensor factorization.
J. Information Science, 2013

Gene co-expression analysis predicts genetic aberration loci associated with colon cancer metastasis.
I. J. Computational Biology and Drug Design, 2013

A Method for Implementing a Probabilistic Model as a Relational Database
CoRR, 2013

Critical Remarks on Single Link Search in Learning Belief Networks
CoRR, 2013

Learning Belief Networks in Domains with Recursively Embedded Pseudo Independent Submodels
CoRR, 2013

Sign what you really care about - Secure BGP AS-paths efficiently.
Computer Networks, 2013

Strengths and limitations of microarray-based phenotype prediction: lessons learned from the IMPROVER Diagnostic Signature Challenge.
Bioinformatics, 2013

How to Use Spanning Trees to Navigate in Graphs.
Algorithmica, 2013

A novel algebra to articulate feature in text dimension reduction.
Proceedings of the 2013 IEEE International Conference on Granular Computing, 2013

2012
Transactional Database Transformation and Its Application in Prioritizing Human Disease Genes.
IEEE/ACM Trans. Comput. Biology Bioinform., 2012

Weighted Frequent Gene Co-expression Network Mining to Identify Genes Involved in Genome Stability.
PLoS Computational Biology, 2012

Merging network patterns: a general framework to summarize biomedical network data.
NetMAHIB, 2012

k-Neighborhood decentralization: A comprehensive solution to index the UMLS for large scale knowledge discovery.
Journal of Biomedical Informatics, 2012

A Novel Reliability Assurance Method for Cyberphysical System Components Substitution.
IJDSN, 2012

Collective additive tree spanners for circle graphs and polygonal graphs.
Discrete Applied Mathematics, 2012

Compact and low delay routing labeling scheme for Unit Disk Graphs.
Comput. Geom., 2012

A dynamic time order network for time-series gene expression data analysis.
BMC Systems Biology, 2012

Predicting glioblastoma prognosis networks using weighted gene co-expression network analysis on TCGA data.
BMC Bioinformatics, 2012

Additive Spanners and Distance and Routing Labeling Schemes for Hyperbolic Graphs.
Algorithmica, 2012

A highway-centric labeling approach for answering distance queries on large sparse graphs.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2012

Visualizing Clusters in Parallel Coordinates for Visual Knowledge Discovery.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2012

A Proposal of An Article Network Analysis Approach to Reduce Systematic Review Workload.
Proceedings of the Nursing Informatics 2014 - East Meets West eSMART+, 2012

Sign What You Really Care about - Secure BGP AS Paths Efficiently.
Proceedings of the NETWORKING 2012, 2012

Detecting prefix hijackings in the internet with argus.
Proceedings of the 12th ACM SIGCOMM Internet Measurement Conference, 2012

Cyber-Physical System Components Composition Analysis and Formal Verification Based on Service-Oriented Architecture.
Proceedings of the Ninth IEEE International Conference on e-Business Engineering, 2012

The use of curvature in gravity and magnetic anomalies analysis.
Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery, 2012

A Comparison of different methods for choosing regularization parameter in regularized MT inversion.
Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery, 2012

Simulation and inversion of electrical conductivity distribution using the finite functions method.
Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery, 2012

On Learning Cluster Coefficient of Private Networks.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2012

Towards Automated Choreographing of Web Services Using Planning.
Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence, 2012

A Reliable Workflow for Cyber-Physical System Components Substitution.
Proceedings of the 12th IEEE International Conference on Computer and Information Technology, 2012

2011
Path-tree: An efficient reachability indexing scheme for large directed graphs.
ACM Trans. Database Syst., 2011

A novel approach to annotating web service based on interface concept mapping and semantic expansion.
Soft Comput., 2011

Bound on genuine multipartite correlations from the principle of information causality.
Quantum Information & Computation, 2011

Low temperature dynamics of netral atoms for quantum logic.
Quantum Information & Computation, 2011

A clustering based approach for skyline diversity.
Expert Syst. Appl., 2011

Summarizing transactional databases with overlapped hyperrectangles.
Data Min. Knowl. Discov., 2011

A novel capacity and trust based service selection mechanism for collaborative decision making in CPS.
Comput. Sci. Inf. Syst., 2011

Evaluating Quality of Chinese Product Reviews Based on Fuzzy Logic.
Proceedings of the Emerging Research in Web Information Systems and Mining, 2011

Indirect Elicitation of NIN-AND Trees in Causal Model Acquisition.
Proceedings of the Scalable Uncertainty Management - 5th International Conference, 2011

Argus: An accurate and agile system to detecting IP prefix hijacking.
Proceedings of the 19th annual IEEE International Conference on Network Protocols, 2011

Retinal image registration using bifurcation structures.
Proceedings of the 18th IEEE International Conference on Image Processing, 2011

Operational Hazard Risk Assessment using Bayesian Networks.
Proceedings of the ICEIS 2011, 2011

Internet Flattening: Monitoring and Analysis of Inter-Domain Routing.
Proceedings of IEEE International Conference on Communications, 2011

A vector space model approach to social relation extraction from text corpus.
Proceedings of the Eighth International Conference on Fuzzy Systems and Knowledge Discovery, 2011

Zugang zu Föderationen aus Speicher-Clouds mit Hilfe von Shibboleth und WebDAV.
Proceedings of the 4. DFN-Forum Kommunikationstechnologien, 2011

2010
l-SkyDiv query: Effectively improve the usefulness of skylines.
SCIENCE CHINA Information Sciences, 2010

Using gene co-expression network analysis to predict biomarkers for chronic lymphocytic leukemia.
BMC Bioinformatics, 2010

Computing label-constraint reachability in graph databases.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2010

A neutral layered mapping system with two-stage cache for a scalable Internet.
Proceedings of the 6th International Conference on Network and Service Management, 2010

Predicting prognostic markers for glioma using gene co-expression network analysis.
Proceedings of the First ACM International Conference on Bioinformatics and Computational Biology, 2010

2009
Collective Tree Spanners for Unit Disk Graphs with Applications.
Electronic Notes in Discrete Mathematics, 2009

Compact and Low Delay Routing Labeling Scheme for Unit Disk Graphs.
Proceedings of the Algorithms and Data Structures, 11th International Symposium, 2009

Towards Effective Elicitation of NIN-AND Tree Causal Models.
Proceedings of the Scalable Uncertainty Management, Third International Conference, 2009

3-HOP: a high-compression indexing scheme for reachability query.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2009

TTCN-3 Based Conformance Testing of Mobile Broadcast Business Management System in 3G Networks.
Proceedings of the Testing of Software and Communication Systems, 2009

Identifying Dynamic Network Modules with Temporal and Spatial Constraints.
Proceedings of the Biocomputing 2009: Proceedings of the Pacific Symposium, 2009

How to Use Spanning Trees to Navigate in Graphs.
Proceedings of the Mathematical Foundations of Computer Science 2009, 2009

Cartesian contour: a concise representation for a collection of frequent sets.
Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Paris, France, June 28, 2009

Research on Fuzzy Control Methods for Suspension Density and Liquid Levels in Dense-Medium Separation.
Proceedings of the Advances in Neural Networks, 2009

Improve the Usefulness of Skyline Analysis in Cloud Computing Environments.
Proceedings of the 2009 Second International Symposium on Computational Intelligence and Design, 2009

Using Frequent Co-expression Network to Identify Gene Clusters for Breast Cancer Prognosis.
Proceedings of the International Joint Conferences on Bioinformatics, 2009

An Efficient Web Service Annotation Method Utilizing Concept Mapping and Interface Expansion.
Proceedings of the Sixth International Conference on Fuzzy Systems and Knowledge Discovery, 2009

SIP Robustness Testing Based on TTCN-3.
Proceedings of the 23rd International Conference on Advanced Information Networking and Applications, 2009

Enumerating Unlabeled and Root Labeled Trees for Causal Model Acquisition.
Proceedings of the Advances in Artificial Intelligence, 2009

2008
Dynamic multiagent probabilistic inference.
Int. J. Approx. Reasoning, 2008

Additive Spanners for Circle Graphs and Polygonal Graphs.
Proceedings of the Graph-Theoretic Concepts in Computer Science, 2008

Efficiently answering reachability queries on very large directed graphs.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2008

Online Accumulation: Reconstruction of Worm Propagation Path.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2008

Collective Additive Tree Spanners of Homogeneously Orderable Graphs.
Proceedings of the LATIN 2008: Theoretical Informatics, 2008

Succinct summarization of transactional databases: an overlapped hyperrectangle scheme.
Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2008

Effective and efficient itemset pattern summarization: regression-based approaches.
Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2008

Research of Multi-Path Routing Protocol Based on Parallel Ant Colony Algorithm Optimization in Mobile Ad Hoc Networks.
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008

Overlapping Matrix Pattern Visualization: A Hypergraph Approach.
Proceedings of the 8th IEEE International Conference on Data Mining (ICDM 2008), 2008

Data Mining Approach for Ship Virtual Assembly Based on Rough Set Theory.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

2007
Modeling Causal Reinforcement and Undermining for Efficient CPT Elicitation.
IEEE Trans. Knowl. Data Eng., 2007

Online Tracing Scanning Worm with Sliding Window.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

2006
Generalized Powers of Graphs and Their Algorithmic Use.
Proceedings of the Algorithm Theory, 2006

An Entropy-Based Stability QoS Multicast Routing Protocol in Ad Hoc Network.
Proceedings of the Advances in Grid and Pervasive Computing, 2006

Agent interface enhancement: making multiagent graphical models accessible.
Proceedings of the 5th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2006), 2006

2005
Visualizing criminal relationships: comparison of a hyperbolic tree and a hierarchical list.
Decision Support Systems, 2005

Model Complexity of Pseudo-independent Models.
Proceedings of the Eighteenth International Florida Artificial Intelligence Research Society Conference, 2005

2004
Toward better scoring metrics for pseudo-independent models.
Int. J. Intell. Syst., 2004

Probabilistic reasoning in dynamic multiagent systems.
Proceedings of the 10th International Workshop on Non-Monotonic Reasoning (NMR 2004), 2004

Revising Markov Boundary for Multiagent Probabilistic Inference.
Proceedings of the 2004 IEEE/WIC/ACM International Conference on Intelligent Agent Technology (IAT 2004), 2004

2003
Simulation of Graphical Models for Multiagent Probabilistic Inference.
Simulation, 2003

A Distributed Framework of Web-Based Telemedicine System.
Proceedings of the 16th IEEE Symposium on Computer-Based Medical Systems (CBMS 2003), 2003

2002
COPLINK: Visualization and Collaboration for Law Enforcement.
Proceedings of the 2002 Annual National Conference on Digital Government Research, 2002

Probabilistic reasoning in multiagent systems - a graphical models approach.
Cambridge University Press, ISBN: 978-0-521-81308-2, 2002

2000
Distributed Multi-Agent MSBN: Implementing Verification.
Proceedings of the Thirteenth International Florida Artificial Intelligence Research Society Conference, 2000

Learning Pseudo-independent Models: Analytical and Experimental Results.
Proceedings of the Advances in Artificial Intelligence, 2000

1999
Specifying Constraints with Message Sequence Specifications.
Proceedings of the 6th Asia-Pacific Software Engineering Conference (APSEC '99), 1999

1998
Automated Database Schema Design Using Mined Data Dependencies.
JASIS, 1998

1997
A "Microscopic" Study of Minimum Entropy Search in Learning Decomposable Markov Networks.
Machine Learning, 1997

Learning Belief Networks in Domains with Recursively Embedded Pseudo Independent Submodels.
Proceedings of the UAI '97: Proceedings of the Thirteenth Conference on Uncertainty in Artificial Intelligence, 1997

1996
Critical Remarks on Single Link Search in Learning Belief Networks.
Proceedings of the UAI '96: Proceedings of the Twelfth Annual Conference on Uncertainty in Artificial Intelligence, 1996

1995
Quantification of Unvertainty in Classification Rules Discovered from Databases.
Computational Intelligence, 1995

A Method for Implementing a Probabilistic Model as a Relational Database.
Proceedings of the UAI '95: Proceedings of the Eleventh Annual Conference on Uncertainty in Artificial Intelligence, 1995

1994
Distributed Multi-Agent Probabilistic Reasoning With Bayesian Networks.
Proceedings of the Methodologies for Intelligent Systems, 8th International Symposium, 1994

Representation of Bayesian Networks as Relational Databases.
Proceedings of the Advances in Intelligent Computing, 1994

1993
Quantifying Uncertainty of Knowledge Discovered From Databases.
Proceedings of the Rough Sets, 1993


  Loading...