Yao Cheng

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2026
A multi-agent reinforcement learning (MARL) framework for designing an optimal state-specific hybrid maintenance policy for a series k-out-of-n load-sharing system.
Reliab. Eng. Syst. Saf., 2026

Urban waterlogging depth prediction model combining transformer and graph neural convolutional network.
Environ. Model. Softw., 2026

2025
Pointwise error estimate of the LDG method for 2D singularly perturbed reaction-diffusion problem.
Numer. Algorithms, September, 2025

Reconstructing Physics-Informed Machine Learning for Traffic Flow Modeling: a Multi-Gradient Descent and Pareto Learning Approach.
CoRR, May, 2025

Potential failures of physics-informed machine learning in traffic flow modeling: theoretical and experimental analysis.
CoRR, May, 2025

Intelligent Spatial Perception by Building Hierarchical 3D Scene Graphs for Indoor Scenarios with the Help of LLMs.
CoRR, March, 2025

Aesthetics of Connectivity: Envisioning Empowerment Through Smart Clothing.
CoRR, March, 2025

Multimodal Imitation Learning for Arc Detection in Complex Railway Environments.
IEEE Trans. Instrum. Meas., 2025

Coupling Coordination and Decoupling Dynamics of Land Space Conflicts with Urbanization and Eco-Environment: A Case Study of Jiangsu Province, China.
Syst., 2025

Strongly concealed adversarial attack against text classification models with limited queries.
Neural Networks, 2025

Continuous theta-burst stimulation demonstrates language-network-specific causal effects on syntactic processing.
NeuroImage, 2025

Fairness-Aware Cooperative Caching in Vehicular Networks: An Asynchronous Federated Learning and Attention-Enhanced Multiagent DRL Approach.
IEEE Internet Things J., 2025

DAWN: Smaller and Faster NTRU Encryption via Double Encoding.
IACR Cryptol. ePrint Arch., 2025

Indifferentiability Separations in Ideal Public Key Encryption: Explicit vs. Implicit Rejection.
Proceedings of the Information Security and Privacy - 30th Australasian Conference, 2025

Ideal Transformations for Public Key Encryption.
Proceedings of the Information Security and Privacy - 30th Australasian Conference, 2025

2024
Super-resolution reconstruction of single image for latent features.
Comput. Vis. Media, December, 2024

HAMIATCM: high-availability membership inference attack against text classification models under little knowledge.
Appl. Intell., September, 2024

Optimal Balanced-Norm Error Estimate of the LDG Method for Reaction-Diffusion Problems I: The One-Dimensional Case.
J. Sci. Comput., August, 2024

Dynamic bias alignment and discrimination enhancement for unsupervised domain adaptation.
Neural Comput. Appl., May, 2024

Modeling mosquito control by an impulsive reaction-diffusion mosquito model with periodic evolution domain.
Commun. Nonlinear Sci. Numer. Simul., March, 2024

Cooperative End-Edge-Cloud Computing and Resource Allocation for Digital Twin Enabled 6G Industrial IoT.
IEEE J. Sel. Top. Signal Process., January, 2024

Crowd-Aware Socially Compliant Robot Navigation via Deep Reinforcement Learning.
Int. J. Soc. Robotics, January, 2024

Unsupervised multi-source domain adaptation for person re-identification via feature fusion and pseudo-label refinement.
Comput. Electr. Eng., January, 2024

Transformer-Based High-Fidelity Facial Displacement Completion for Detailed 3D Face Reconstruction.
IEEE Trans. Multim., 2024

Construction and Inference Method of Semantic-Driven, Spatio-Temporal Derivation Relationship Network for Place Names.
ISPRS Int. J. Geo Inf., 2024

Unsupervised multi-source domain adaptation for person re-identification via sample weighting.
Intell. Data Anal., 2024

Optimized single-image super-resolution reconstruction: A multimodal approach based on reversible guidance and cyclical knowledge distillation.
Eng. Appl. Artif. Intell., 2024

FullStack Bench: Evaluating LLMs as Full Stack Coders.
CoRR, 2024

ROADFIRST: A Comprehensive Enhancement of the Systemic Approach to Safety for Improved Risk Factor Identification and Evaluation.
CoRR, 2024

Optimal balanced-norm error estimate of the LDG method for reaction-diffusion problems II: the two-dimensional case with layer-upwind flux.
CoRR, 2024

InfiAgent-DABench: Evaluating Agents on Data Analysis Tasks.
CoRR, 2024

ROM Reduction Failures: Reasons and Solutions.
Proceedings of the Provable and Practical Security, 2024

Ideal Public Key Encryption, Revisited.
Proceedings of the Provable and Practical Security, 2024

Revisiting Anonymity in Post-quantum Public Key Encryption.
Proceedings of the Post-Quantum Cryptography - 15th International Workshop, 2024

G-SAP: Graph-based Structure-Aware Prompt Learning over Heterogeneous Knowledge for Commonsense Reasoning.
Proceedings of the 2024 International Conference on Multimedia Retrieval, 2024

ROADFIRST: An Enhanced Systemic Approach to Safety for Comprehensive Identification and Evaluation of Risk Factors.
Proceedings of the 27th IEEE International Conference on Intelligent Transportation Systems, 2024

UAV-Borne Bistatic Interferometric SAR Time-Phase Synchronization Technology Based on Bi-Directional Synchronization Chain.
Proceedings of the IGARSS 2024, 2024

InfiAgent-DABench: Evaluating Agents on Data Analysis Tasks.
Proceedings of the Forty-first International Conference on Machine Learning, 2024

From Signature with Re-randomizable Keys: Generic Construction of PDPKS.
Proceedings of the Information Security and Cryptology - 20th International Conference, 2024

2023
Supercloseness of the local discontinuous Galerkin method for a singularly perturbed convection-diffusion problem.
Math. Comput., April, 2023

FAFEnet: A fast and accurate model for automatic license plate detection and recognition.
IET Image Process., February, 2023

Deep Reinforcement Learning of UAV Tracking Control Under Wind Disturbances Environments.
IEEE Trans. Instrum. Meas., 2023

Power of Randomness Recovery: Tighter CCA-Secure KEM in the QROM.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023

2022
Artificial Intelligence Technology in Basketball Training Action Recognition.
Frontiers Neurorobotics, September, 2022

Digital medical instrument based on embedded computer system.
Int. J. Embed. Syst., 2022

Superresolution Reconstruction of Single Image for Latent features.
CoRR, 2022

Local discontinuous Galerkin method for a third order singularly perturbed problem of convection-diffusion type.
CoRR, 2022

The local discontinuous Galerkin method for a singularly perturbed convection-diffusion problem with characteristic and exponential layers.
CoRR, 2022

Multi-enhanced Adaptive Attention Network for RGB- T Salient Object Detection.
Proceedings of the International Joint Conference on Neural Networks, 2022

Attention-based Neighbor Selective Aggregation Network for Camouflaged Object Detection.
Proceedings of the International Joint Conference on Neural Networks, 2022

FZC: An Unsupervised Method for 3D Fracture Representation and Recognition in Well Logging.
Proceedings of the IEEE International Geoscience and Remote Sensing Symposium, 2022

Exploration and Research on the Path of College Students' Values Education under the Background of New Media.
Proceedings of the 2022 6th International Conference on Education and Multimedia Technology, 2022

Intertwining History and Places: The Design of TongSEE Location-Based Augmented Reality Application for History Learning.
Proceedings of the Virtual, Augmented and Mixed Reality: Applications in Education, Aviation and Industry, 2022

Understanding Real-world Threats to Deep Learning Models in Android Apps.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Designing Leakage-Resilient Password Entry on Head-Mounted Smart Wearable Glass Devices.
IEEE Trans. Inf. Forensics Secur., 2021

Group-based Password Characteristics Analysis.
IEEE Netw., 2021

An Effective Countermeasure Against UAV Swarm Attack.
IEEE Netw., 2021

Design of Attack and Defense Framework for 1553B-based Integrated Electronic Systems.
IEEE Netw., 2021

Differential Evolution Algorithm Based Self-adaptive Control Strategy for Fed-batch Cultivation of Yeast.
Comput. Syst. Sci. Eng., 2021

Local discontinuous Galerkin method on layer-adapted meshes for singularly perturbed reaction-diffusion problems in two dimensions.
CoRR, 2021

Research on Teaching Exploration Practice under the Background of Multimedia Information Fusion.
Proceedings of the ICBDE'21: 2021 4th International Conference on Big Data and Education, 2021

2020
Group Password Strength Meter Based on Attention Mechanism.
IEEE Netw., 2020

Vulnerability Analysis and Security Compliance Testing for Networked Surveillance Cameras.
IEEE Netw., 2020

Password Enhancement Based on Semantic Transformation.
IEEE Netw., 2020

Fake Review Detection Based on PU Learning and Behavior Density.
IEEE Netw., 2020

Smart Contract Vulnerability Analysis and Security Audit.
IEEE Netw., 2020

Computer Audition for Healthcare: Opportunities and Challenges.
Frontiers Digit. Health, 2020

DeepMnemonic: Password Mnemonic Generation via Deep Attentive Encoder-Decoder Model.
CoRR, 2020

Application of attitude tracking algorithm for face recognition based on OpenCV in the intelligent door lock.
Comput. Commun., 2020

Research on the Application of Modern Information Technology in Higher Education.
Proceedings of the ICEMT 2020: The 4th International Conference on Education and Multimedia Technology, 2020

Where Does the Robustness Come from?: A Study of the Transformation-based Ensemble Defence.
Proceedings of the AISec@CCS 2020: Proceedings of the 13th ACM Workshop on Artificial Intelligence and Security, 2020

NativeX: Native Executioner Freezes Android.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

Android-based Cryptocurrency Wallets: Attacks and Countermeasures.
Proceedings of the IEEE International Conference on Blockchain, 2020

Composition and Function Analysis of Electroless Nickel Plating Solution Based on Intelligent Network.
Proceedings of the 2020 International Conference on Applications and Techniques in Cyber Intelligence, 2020

2019
Detecting Promotion Attacks in the App Market Using Neural Networks.
IEEE Wirel. Commun., 2019

PowerNet: Neural Power Demand Forecasting in Smart Grid.
CoRR, 2019

A scalable and extensible framework for android malware detection and family attribution.
Comput. Secur., 2019

Securing Intelligent Transportation System: A Blockchain-Based Approach with Attack Mitigation.
Proceedings of the Smart Blockchain - Second International Conference, 2019

Keyed Non-parametric Hypothesis Tests.
Proceedings of the Network and System Security - 13th International Conference, 2019

Character-Based Deep Learning Approaches for Clinical Named Entity Recognition: A Comparative Study Using Chinese EHR Texts.
Proceedings of the Smart Health - International Conference, 2019

2018
Attack and Countermeasure on Interlock-Based Device Pairing Schemes.
IEEE Trans. Inf. Forensics Secur., 2018

Workload Management in Telemedical Physician Triage and Other Knowledge-Based Service Systems.
Manag. Sci., 2018

Signal coordination model for local arterial with heavy bus flows.
J. Intell. Transp. Syst., 2018

Toward the Effect of Dependent Distribution Parameters on Reliability Prediction.
J. Comput. Inf. Sci. Eng., 2018

Towards quantitative evaluation of privacy protection schemes for electricity usage data sharing.
ICT Express, 2018

A survey of Android exploits in the wild.
Comput. Secur., 2018

User-friendly deniable storage for mobile devices.
Comput. Secur., 2018

Fast feature matching based onr-nearestk-means searching.
CAAI Trans. Intell. Technol., 2018

Signal Progression Model for Long Arterial: Intersection Grouping and Coordination.
IEEE Access, 2018

Efficient Two-Layer Model Towards Cover Song Identification.
Proceedings of the MultiMedia Modeling - 24th International Conference, 2018

Secure smart metering based on LoRa technology.
Proceedings of the IEEE 4th International Conference on Identity, 2018

Hybrid Architecture for Spacecraft Diagnosis and its Application.
Proceedings of the 2018 IEEE International Conference on Prognostics and Health Management, 2018

An Improved Method and Implementation of Indoor Position Fingerprint Matching Localization Based on WLAN.
Proceedings of the Human Centered Computing - 4th International Conference, 2018

SCLib: A Practical and Lightweight Defense against Component Hijacking in Android Applications.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

2017
A study on a feasible no-root approach on Android.
J. Comput. Secur., 2017

Narrower System Reliability Bounds With Incomplete Component Information and Stochastic Process Loading.
J. Comput. Inf. Sci. Eng., 2017

Effective Music Feature NCP: Enhancing Cover Song Recognition with Music Transcription.
Proceedings of the 40th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2017

JSForce: A Forced Execution Engine for Malicious JavaScript Detection.
Proceedings of the Security and Privacy in Communication Networks, 2017

PURE: A Novel Tripartite Model for Review Sentiment Analysis and Recommendation.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2017

Evaluation of image quality metrics for sharpness enhancement.
Proceedings of the 10th International Symposium on Image and Signal Processing and Analysis, 2017

Residual Recurrent Neural Network with Sparse Training for Offline Arabic Handwriting Recognition.
Proceedings of the 14th IAPR International Conference on Document Analysis and Recognition, 2017

Combining Global Models for Parsing Universal Dependencies.
Proceedings of the CoNLL 2017 Shared Task: Multilingual Parsing from Raw Text to Universal Dependencies, 2017

What You See is Not What You Get: Leakage-Resilient Password Entry Schemes for Smart Glasses.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

PowerLSTM: Power Demand Forecasting Using Long Short-Term Memory Neural Network.
Proceedings of the Advanced Data Mining and Applications - 13th International Conference, 2017

2016
A Combined Model-Based and Intelligent Method for Small Fault Detection and Isolation of Actuators.
IEEE Trans. Ind. Electron., 2016

Implementation of Real-Time Vehicle Tracking in City-Scale Video Network.
Cybern. Syst., 2016

Cornell Belief and Sentiment System at TAC 2016.
Proceedings of the 2016 Text Analysis Conference, 2016

Exploiting Android System Services Through Bypassing Service Helpers.
Proceedings of the Security and Privacy in Communication Networks, 2016

Semantics-Preserving Dissection of JavaScript Exploits via Dynamic JS-Binary Analysis.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016

Attacks and Defence on Android Free Floating Windows.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Scalable Graph-based Bug Search for Firmware Images.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

A Feasible No-Root Approach on Android.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Analytical redundancy based fault diagnosis scheme for satellite attitude control systems.
J. Frankl. Inst., 2015

PKU-AIPL' Solution for MediaEval 2015 Emotion in Music Task.
Proceedings of the Working Notes Proceedings of the MediaEval 2015 Workshop, 2015

A Rapid and Scalable Method for Android Application Repackaging Detection.
Proceedings of the Information Security Practice and Experience, 2015

Objective assessment of perceived sharpness of projection displays with a calibrated camera.
Proceedings of the Colour and Visual Computing Symposium, 2015

2014
A generalized interval probability-based optimization method for training generalized hidden Markov model.
Signal Process., 2014

Automated User Profiling in Location-Based Mobile Messaging Applications.
Proceedings of the 13th IEEE International Conference on Trust, 2014

LorSLIM: Low Rank Sparse Linear Methods for Top-N Recommendations.
Proceedings of the 2014 IEEE International Conference on Data Mining, 2014

2013
Temporal relation discovery between events and temporal expressions identified in clinical narrative.
J. Biomed. Informatics, 2013

On Schedulability Analysis for Embedded Systems with AADL Model.
Proceedings of the 2013 13th International Conference on Quality Software, 2013

Bind your phone number with caution: automated user profiling through address book matching on smartphone.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2010
Implementing the Compiler of UDLC.
Proceedings of the GCC 2010, 2010

2008
Traffic Engineering-based Load Balancing Algorithm in GMPLS Networks.
Proceedings of the Fourth International Conference on Semantics, Knowledge and Grid, 2008


  Loading...