Yao Cheng
This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.
Bibliography
2026
A multi-agent reinforcement learning (MARL) framework for designing an optimal state-specific hybrid maintenance policy for a series k-out-of-n load-sharing system.
Reliab. Eng. Syst. Saf., 2026
Urban waterlogging depth prediction model combining transformer and graph neural convolutional network.
Environ. Model. Softw., 2026
2025
Pointwise error estimate of the LDG method for 2D singularly perturbed reaction-diffusion problem.
Numer. Algorithms, September, 2025
Reconstructing Physics-Informed Machine Learning for Traffic Flow Modeling: a Multi-Gradient Descent and Pareto Learning Approach.
CoRR, May, 2025
Potential failures of physics-informed machine learning in traffic flow modeling: theoretical and experimental analysis.
CoRR, May, 2025
Intelligent Spatial Perception by Building Hierarchical 3D Scene Graphs for Indoor Scenarios with the Help of LLMs.
CoRR, March, 2025
CoRR, March, 2025
IEEE Trans. Instrum. Meas., 2025
Coupling Coordination and Decoupling Dynamics of Land Space Conflicts with Urbanization and Eco-Environment: A Case Study of Jiangsu Province, China.
Syst., 2025
Strongly concealed adversarial attack against text classification models with limited queries.
Neural Networks, 2025
Continuous theta-burst stimulation demonstrates language-network-specific causal effects on syntactic processing.
NeuroImage, 2025
Fairness-Aware Cooperative Caching in Vehicular Networks: An Asynchronous Federated Learning and Attention-Enhanced Multiagent DRL Approach.
IEEE Internet Things J., 2025
IACR Cryptol. ePrint Arch., 2025
Indifferentiability Separations in Ideal Public Key Encryption: Explicit vs. Implicit Rejection.
Proceedings of the Information Security and Privacy - 30th Australasian Conference, 2025
Proceedings of the Information Security and Privacy - 30th Australasian Conference, 2025
2024
Comput. Vis. Media, December, 2024
HAMIATCM: high-availability membership inference attack against text classification models under little knowledge.
Appl. Intell., September, 2024
Optimal Balanced-Norm Error Estimate of the LDG Method for Reaction-Diffusion Problems I: The One-Dimensional Case.
J. Sci. Comput., August, 2024
Dynamic bias alignment and discrimination enhancement for unsupervised domain adaptation.
Neural Comput. Appl., May, 2024
Modeling mosquito control by an impulsive reaction-diffusion mosquito model with periodic evolution domain.
Commun. Nonlinear Sci. Numer. Simul., March, 2024
Cooperative End-Edge-Cloud Computing and Resource Allocation for Digital Twin Enabled 6G Industrial IoT.
IEEE J. Sel. Top. Signal Process., January, 2024
Int. J. Soc. Robotics, January, 2024
Unsupervised multi-source domain adaptation for person re-identification via feature fusion and pseudo-label refinement.
Comput. Electr. Eng., January, 2024
Transformer-Based High-Fidelity Facial Displacement Completion for Detailed 3D Face Reconstruction.
IEEE Trans. Multim., 2024
Construction and Inference Method of Semantic-Driven, Spatio-Temporal Derivation Relationship Network for Place Names.
ISPRS Int. J. Geo Inf., 2024
Unsupervised multi-source domain adaptation for person re-identification via sample weighting.
Intell. Data Anal., 2024
Optimized single-image super-resolution reconstruction: A multimodal approach based on reversible guidance and cyclical knowledge distillation.
Eng. Appl. Artif. Intell., 2024
ROADFIRST: A Comprehensive Enhancement of the Systemic Approach to Safety for Improved Risk Factor Identification and Evaluation.
CoRR, 2024
Optimal balanced-norm error estimate of the LDG method for reaction-diffusion problems II: the two-dimensional case with layer-upwind flux.
CoRR, 2024
Proceedings of the Provable and Practical Security, 2024
Proceedings of the Provable and Practical Security, 2024
Proceedings of the Post-Quantum Cryptography - 15th International Workshop, 2024
G-SAP: Graph-based Structure-Aware Prompt Learning over Heterogeneous Knowledge for Commonsense Reasoning.
Proceedings of the 2024 International Conference on Multimedia Retrieval, 2024
ROADFIRST: An Enhanced Systemic Approach to Safety for Comprehensive Identification and Evaluation of Risk Factors.
Proceedings of the 27th IEEE International Conference on Intelligent Transportation Systems, 2024
UAV-Borne Bistatic Interferometric SAR Time-Phase Synchronization Technology Based on Bi-Directional Synchronization Chain.
Proceedings of the IGARSS 2024, 2024
Proceedings of the Forty-first International Conference on Machine Learning, 2024
Proceedings of the Information Security and Cryptology - 20th International Conference, 2024
2023
Supercloseness of the local discontinuous Galerkin method for a singularly perturbed convection-diffusion problem.
Math. Comput., April, 2023
FAFEnet: A fast and accurate model for automatic license plate detection and recognition.
IET Image Process., February, 2023
Deep Reinforcement Learning of UAV Tracking Control Under Wind Disturbances Environments.
IEEE Trans. Instrum. Meas., 2023
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023
2022
Frontiers Neurorobotics, September, 2022
Int. J. Embed. Syst., 2022
Local discontinuous Galerkin method for a third order singularly perturbed problem of convection-diffusion type.
CoRR, 2022
The local discontinuous Galerkin method for a singularly perturbed convection-diffusion problem with characteristic and exponential layers.
CoRR, 2022
Proceedings of the International Joint Conference on Neural Networks, 2022
Attention-based Neighbor Selective Aggregation Network for Camouflaged Object Detection.
Proceedings of the International Joint Conference on Neural Networks, 2022
FZC: An Unsupervised Method for 3D Fracture Representation and Recognition in Well Logging.
Proceedings of the IEEE International Geoscience and Remote Sensing Symposium, 2022
Exploration and Research on the Path of College Students' Values Education under the Background of New Media.
Proceedings of the 2022 6th International Conference on Education and Multimedia Technology, 2022
Intertwining History and Places: The Design of TongSEE Location-Based Augmented Reality Application for History Learning.
Proceedings of the Virtual, Augmented and Mixed Reality: Applications in Education, Aviation and Industry, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
Designing Leakage-Resilient Password Entry on Head-Mounted Smart Wearable Glass Devices.
IEEE Trans. Inf. Forensics Secur., 2021
Design of Attack and Defense Framework for 1553B-based Integrated Electronic Systems.
IEEE Netw., 2021
Differential Evolution Algorithm Based Self-adaptive Control Strategy for Fed-batch Cultivation of Yeast.
Comput. Syst. Sci. Eng., 2021
Local discontinuous Galerkin method on layer-adapted meshes for singularly perturbed reaction-diffusion problems in two dimensions.
CoRR, 2021
Research on Teaching Exploration Practice under the Background of Multimedia Information Fusion.
Proceedings of the ICBDE'21: 2021 4th International Conference on Big Data and Education, 2021
2020
Vulnerability Analysis and Security Compliance Testing for Networked Surveillance Cameras.
IEEE Netw., 2020
Frontiers Digit. Health, 2020
CoRR, 2020
Application of attitude tracking algorithm for face recognition based on OpenCV in the intelligent door lock.
Comput. Commun., 2020
Proceedings of the ICEMT 2020: The 4th International Conference on Education and Multimedia Technology, 2020
Where Does the Robustness Come from?: A Study of the Transformation-based Ensemble Defence.
Proceedings of the AISec@CCS 2020: Proceedings of the 13th ACM Workshop on Artificial Intelligence and Security, 2020
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
Proceedings of the IEEE International Conference on Blockchain, 2020
Composition and Function Analysis of Electroless Nickel Plating Solution Based on Intelligent Network.
Proceedings of the 2020 International Conference on Applications and Techniques in Cyber Intelligence, 2020
2019
IEEE Wirel. Commun., 2019
A scalable and extensible framework for android malware detection and family attribution.
Comput. Secur., 2019
Securing Intelligent Transportation System: A Blockchain-Based Approach with Attack Mitigation.
Proceedings of the Smart Blockchain - Second International Conference, 2019
Proceedings of the Network and System Security - 13th International Conference, 2019
Character-Based Deep Learning Approaches for Clinical Named Entity Recognition: A Comparative Study Using Chinese EHR Texts.
Proceedings of the Smart Health - International Conference, 2019
2018
IEEE Trans. Inf. Forensics Secur., 2018
Workload Management in Telemedical Physician Triage and Other Knowledge-Based Service Systems.
Manag. Sci., 2018
J. Intell. Transp. Syst., 2018
J. Comput. Inf. Sci. Eng., 2018
Towards quantitative evaluation of privacy protection schemes for electricity usage data sharing.
ICT Express, 2018
CAAI Trans. Intell. Technol., 2018
IEEE Access, 2018
Proceedings of the MultiMedia Modeling - 24th International Conference, 2018
Proceedings of the IEEE 4th International Conference on Identity, 2018
Proceedings of the 2018 IEEE International Conference on Prognostics and Health Management, 2018
An Improved Method and Implementation of Indoor Position Fingerprint Matching Localization Based on WLAN.
Proceedings of the Human Centered Computing - 4th International Conference, 2018
SCLib: A Practical and Lightweight Defense against Component Hijacking in Android Applications.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018
2017
Narrower System Reliability Bounds With Incomplete Component Information and Stochastic Process Loading.
J. Comput. Inf. Sci. Eng., 2017
Effective Music Feature NCP: Enhancing Cover Song Recognition with Music Transcription.
Proceedings of the 40th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2017
Proceedings of the Security and Privacy in Communication Networks, 2017
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2017
Proceedings of the 10th International Symposium on Image and Signal Processing and Analysis, 2017
Residual Recurrent Neural Network with Sparse Training for Offline Arabic Handwriting Recognition.
Proceedings of the 14th IAPR International Conference on Document Analysis and Recognition, 2017
Proceedings of the CoNLL 2017 Shared Task: Multilingual Parsing from Raw Text to Universal Dependencies, 2017
What You See is Not What You Get: Leakage-Resilient Password Entry Schemes for Smart Glasses.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
Proceedings of the Advanced Data Mining and Applications - 13th International Conference, 2017
2016
A Combined Model-Based and Intelligent Method for Small Fault Detection and Isolation of Actuators.
IEEE Trans. Ind. Electron., 2016
Cybern. Syst., 2016
Proceedings of the 2016 Text Analysis Conference, 2016
Proceedings of the Security and Privacy in Communication Networks, 2016
Semantics-Preserving Dissection of JavaScript Exploits via Dynamic JS-Binary Analysis.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
Analytical redundancy based fault diagnosis scheme for satellite attitude control systems.
J. Frankl. Inst., 2015
Proceedings of the Working Notes Proceedings of the MediaEval 2015 Workshop, 2015
Proceedings of the Information Security Practice and Experience, 2015
Objective assessment of perceived sharpness of projection displays with a calibrated camera.
Proceedings of the Colour and Visual Computing Symposium, 2015
2014
A generalized interval probability-based optimization method for training generalized hidden Markov model.
Signal Process., 2014
Proceedings of the 13th IEEE International Conference on Trust, 2014
Proceedings of the 2014 IEEE International Conference on Data Mining, 2014
2013
Temporal relation discovery between events and temporal expressions identified in clinical narrative.
J. Biomed. Informatics, 2013
Proceedings of the 2013 13th International Conference on Quality Software, 2013
Bind your phone number with caution: automated user profiling through address book matching on smartphone.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
2010
2008
Proceedings of the Fourth International Conference on Semantics, Knowledge and Grid, 2008