Yanyan Yang

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Known people with the same name:

Bibliography

2024
Computer vision-based driver fatigue detection framework with personalization threshold and multi-feature fusion.
Signal Image Video Process., February, 2024

Guided Diffusion for Fast Inverse Design of Density-based Mechanical Metamaterials.
CoRR, 2024

2023
Blind super-resolution model based on unsupervised degenerate indication learning.
Comput. Electr. Eng., November, 2023

An Improved In-Flight Calibration Scheme for CSES Magnetic Field Data.
Remote. Sens., September, 2023

Instance and Feature Selection Using Fuzzy Rough Sets: A Bi-Selection Approach for Data Reduction.
IEEE Trans. Fuzzy Syst., June, 2023

URS: A Light-Weight Segmentation Model for Train Wheelset Monitoring.
IEEE Trans. Intell. Transp. Syst., 2023

Data Poisoning Attacks With Hybrid Particle Swarm Optimization Algorithms Against Federated Learning in Connected and Autonomous Vehicles.
IEEE Access, 2023

2022
The Hybrid Similar Neighborhood Robust Factorization Machine Model for Can Bus Intrusion Detection in the In-Vehicle Network.
IEEE Trans. Intell. Transp. Syst., 2022

The Possible Seismo-Ionospheric Perturbations Recorded by the China-Seismo-Electromagnetic Satellite.
Remote. Sens., 2022

UA-HGAT: Uncertainty-aware Heterogeneous Graph Attention Network for Short Text Classification.
Proceedings of the 2022 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2022

Improving Chinese Spelling Check by Character Pronunciation Prediction: The Effects of Adaptivity and Granularity.
Proceedings of the 2022 Conference on Empirical Methods in Natural Language Processing, 2022

2021
Practical Deanonymization Attack in Ethereum Based on P2P Network Analysis.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

Towards Comprehensive Analysis of Tor Hidden Service Access Behavior Identification Under Obfs4 Scenario.
Proceedings of the ACM ICEA '21: 2021 ACM International Conference on Intelligent Computing and its Emerging Applications, Jinan, China, December 28, 2021

2020
Keyword Searchable Encryption Scheme based on Blockchain in Cloud Environment.
Proceedings of the 3rd International Conference on Smart BlockChain, 2020

A linkable Ring Signature Electronic Cash Scheme Based on Blockchain.
Proceedings of the 3rd International Conference on Smart BlockChain, 2020

A Cloud Data Access Authorization Update Scheme Based on Blockchain.
Proceedings of the 3rd International Conference on Smart BlockChain, 2020

2019
Research on distribution route with time window and on-board constraint based on tabu search algorithm.
EURASIP J. Wirel. Commun. Netw., 2019

An Authentication Scheme in VANETs Based on Group Signature.
Proceedings of the Intelligent Computing Theories and Application, 2019

2018
CFD Simulation of Airflow Dynamics During Cough Based on CT-Scanned Respiratory Airway Geometries.
Symmetry, 2018

2017
Mitigating supply chain disruptions through interconnected logistics services in the Physical Internet.
Int. J. Prod. Res., 2017

Innovative vendor-managed inventory strategy exploiting interconnected logistics services in the Physical Internet.
Int. J. Prod. Res., 2017

2016
Supply chain scheduling with batching, production and distribution.
Int. J. Comput. Integr. Manuf., 2016

2015
Perspectives of inventory control models in the Physical Internet: A simulation study.
Comput. Ind. Eng., 2015

2014
Iterated Local Search for a Vehicle Routing Problem with Synchronization Constraints.
Proceedings of the ICORES 2014, 2014

2013
On a New-Member-Joining-Protocol Design Using Bivariate Polynomials Based DKG Algorithms.
Proceedings of the Advances in Brain Inspired Cognitive Systems, 2013

Contourlet transform based digital watermarking resisting 2D-3D conversion.
Proceedings of the 3DTV-Conference 2013: The True Vision, 2013

2010
First Smart Spaces
CoRR, 2010

Level the buffer wall: Fair channel assignment in wireless sensor networks.
Comput. Commun., 2010

Cooperative Boundary Detection for Spectrum Sensing Using Dedicated Wireless Sensor Networks.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

COCKTAIL: An RF-Based Hybrid Approach for Indoor Localization.
Proceedings of IEEE International Conference on Communications, 2010

2007
CLID: A general approach to validate security policies in a dynamic network.
Proceedings of the Integrated Network Management, 2007

2006
IPsec/VPN security policy correctness and assurance.
J. High Speed Networks, 2006

2005
An agent infrastructure for on-demand processing of remote-sensing archives.
Int. J. Digit. Libr., 2005

Isochronus Distributed Multimedia Synchronization.
Proceedings of the Encyclopedia of Information Science and Technology (5 Volumes), 2005

Integrated-Services Architecture for Building Internet Multimedia Applications.
Proceedings of the Encyclopedia of Information Science and Technology (5 Volumes), 2005

2004
On building the minimum number of tunnels: an ordered-split approach to manage IPSec/VPN policies.
Proceedings of the Managing Next Generation Convergence Networks and Services, 2004

Policy management for network-based intrusion detection and prevention.
Proceedings of the Managing Next Generation Convergence Networks and Services, 2004

2003
Architectural Support for Global Smart Spaces.
Proceedings of the Mobile Data Management, 4th International Conference, MDM 2003, 2003

BANDS: An Inter-domain Internet Security Policy Management System for IPSec/VPN.
Proceedings of the Integrated Network Management VII, Managing It All, 2003

2002
Agent based data management in digital libraries.
Parallel Comput., 2002

2000
Guaranteed Mutually Consistent Checkpointing in Distributed Computations.
Int. J. Found. Comput. Sci., 2000

Mobile Agents and the SARA Digital Library.
Proceedings of IEEE Advances in Digital Libraries 2000 (ADL 2000), 2000

1999
A New Look At Multimedia Synchronization in Distributed Environments.
Proceedings of the 1999 International Symposium on Parallel Architectures, 1999

1998
Guaranteed Mutually Consistent Checkpointing in Distributed Computations.
Proceedings of the Advances in Computing Science, 1998


  Loading...