Yao Tong

Orcid: 0000-0002-7885-3922

According to our database1, Yao Tong authored at least 47 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Mobile crowdsourced test report prioritization based on text and image understanding.
J. Softw. Evol. Process., March, 2024

Analytical Modeling of Multiple Co-Existing Inaccuracies in RF Controlling Circuits for Superconducting Quantum Computing.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., January, 2024

Semantic Segmentation of Remote Sensing Images by Interactive Representation Refinement and Geometric Prior-Guided Inference.
IEEE Trans. Geosci. Remote. Sens., 2024

PriGenX: Privacy-Preserving Query With Anonymous Access Control for Genomic Data.
IEEE Trans. Dependable Secur. Comput., 2024

The Stronger the Diffusion Model, the Easier the Backdoor: Data Poisoning to Induce Copyright Breaches Without Adjusting Finetuning Pipeline.
CoRR, 2024

2023
A robust document image watermarking scheme using deep neural network.
Multim. Tools Appl., October, 2023

Lattice-based autonomous path proxy re-encryption in the standard model.
Sci. China Inf. Sci., October, 2023

Concurrent and efficient IoT data trading based on probabilistic micropayments.
Wirel. Networks, February, 2023

A screen-shooting resilient document image watermarking scheme using deep neural network.
IET Image Process., February, 2023

A Blockchain-Based Copyright Protection Scheme With Proactive Defense.
IEEE Trans. Serv. Comput., 2023

A Synergistical Attention Model for Semantic Segmentation of Remote Sensing Images.
IEEE Trans. Geosci. Remote. Sens., 2023

PriRanGe: Privacy-Preserving Range-Constrained Intersection Query Over Genomic Data.
IEEE Trans. Cloud Comput., 2023

An evaluation model based on procedural behaviors for predicting MOOC learning performance: students' online learning behavior analytics and algorithms construction.
Interact. Technol. Smart Educ., 2023

Equivariant divergence formula for chaotic flows.
CoRR, 2023

Towards Regulatable AI Systems: Technical Gaps and Policy Opportunities.
CoRR, 2023

Fusion: Efficient and Secure Inference Resilient to Malicious Servers.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

2022
Vehicle Inertial Tracking via Mobile Crowdsensing: Experience and Enhancement.
IEEE Trans. Instrum. Meas., 2022

Simplified abstract syntax tree based semantic features learning for software change prediction.
J. Softw. Evol. Process., 2022

Hybridizing Euclidean and Hyperbolic Similarities for Attentively Refining Representations in Semantic Segmentation of Remote Sensing Images.
IEEE Geosci. Remote. Sens. Lett., 2022

A Multisignature-Based Secure and OBU-Friendly Emergency Reporting Scheme in VANET.
IEEE Internet Things J., 2022

Fusion: Efficient and Secure Inference Resilient to Malicious Server and Curious Clients.
CoRR, 2022

A Screen-Shooting Resilient Document Image Watermarking Scheme using Deep Neural Network.
CoRR, 2022

The effectiveness of gamification in programming education: Evidence from a meta-analysis.
Comput. Educ. Artif. Intell., 2022

A Reliability-constrained Association Rule Mining Method for Explaining Machine Learning Predictions on Continuity of Asthma Care.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2022

2021
Hybridizing Cross-Level Contextual and Attentive Representations for Remote Sensing Imagery Semantic Segmentation.
Remote. Sens., 2021

Crowdsourced test report prioritization considering bug severity.
Inf. Softw. Technol., 2021

Testing the Feasibility of a Multi-Model Fusion Method for Monitoring the Action of Rehabilitating Stroke Patients in Care Management.
IEEE Access, 2021

Hierarchical Self-Attention Embedded Neural Network With Dense Connection for Remote-Sensing Image Semantic Segmentation.
IEEE Access, 2021

Multi-view Analysis of Unregistered Medical Images Using Cross-View Transformers.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2021 - 24th International Conference, Strasbourg, France, September 27, 2021

Smartphone-based Vehicle Tracking without GPS: Experience and Improvements.
Proceedings of the 27th IEEE International Conference on Parallel and Distributed Systems, 2021

DCCP: Deep Convolutional Neural Networks for Cellular Network Positioning.
Proceedings of the IEEE Global Communications Conference, 2021

A Vulnerability of Dynamic Network Address Translation to Denial-of-Service Attacks.
Proceedings of the DSIT 2021: 4th International Conference on Data Science and Information Technology, Shanghai, China, July 23, 2021

On the Distributed DoS Attacks Targeting at the Bottlenecked Links: More Threatening DoS Attacks than Server Targeting DoS Attacks.
Proceedings of the CNIOT 2021: 2nd International Conference on Computing, 2021

2020
A Sensor of Blackbody Cavity With Transparent Wall for Rapidly Measuring the Liquid Temperature.
IEEE Trans. Instrum. Meas., 2020

SETE: Sequence-based Ensemble learning approach for TCR Epitope binding prediction.
Comput. Biol. Chem., 2020

Genome-wide detection of short tandem repeat expansions by long-read sequencing.
BMC Bioinform., 2020

Testing the Generalizability of an Automated Method for Explaining Machine Learning Predictions on Asthma Patients' Asthma Hospital Visits to an Academic Healthcare System.
IEEE Access, 2020

A Remote-Sensing Image Pan-Sharpening Method Based on Multi-Scale Channel Attention Residual Network.
IEEE Access, 2020

An Intelligent and Efficient Rehabilitation Status Evaluation Method: A Case Study on Stroke Patients.
Proceedings of the Heterogeneous Data Management, Polystores, and Analytics for Healthcare, 2020

Numerical Estimation of Network Traffic Failure Based on Probabilistic Approximation Methods: To what extent the network traffic failure can be predicted?
Proceedings of the CCRIS 2020: International Conference on Control, 2020

2019
An Object-Based River Extraction Method via Optimized Transductive Support Vector Machine for Multi-Spectral Remote-Sensing Images.
IEEE Access, 2019

A Feasible Method for Realizing Leakage of DHCP Transactions under the Implementation of DHCP Snooping: To what extent can DHCP snooping protect clients from the cyberattack based on DHCP spoofing.
Proceedings of the 2nd International Conference on Data Science and Information Technology, 2019

E-mail spoofing based on the datalink layers and its application to e-mail aggregation systems: is it possible to make good use of e-mail spoofing?
Proceedings of the AISS 2019: 2019 International Conference on Advanced Information Science and System, 2019

2018
NOSEP: Nonoverlapping Sequence Pattern Mining With Gap Constraints.
IEEE Trans. Cybern., 2018

High-Power DFB Diode Laser-Based CO-QEPAS Sensor: Optimization and Performance.
Sensors, 2018

Quartz-Enhanced Photoacoustic Spectroscopy Sensor with a Small-Gap Quartz Tuning Fork.
Sensors, 2018

2012
Providing Self-Healing Ability for Wireless Sensor Node by Using Reconfigurable Hardware.
Sensors, 2012


  Loading...