Yichuan Wang

Orcid: 0000-0001-6575-1954

According to our database1, Yichuan Wang authored at least 162 papers between 2009 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Adaptive Online Neural Predictive Control of Hydraulic Actuator Using FPGA Acceleration.
IEEE Trans. Ind. Electron., April, 2024

FedBoosting: Federated learning with gradient protected boosting for text recognition.
Neurocomputing, February, 2024

Privacy Block-Streaming: A Novel DEX File Loading Scheme Based on Federated Learning.
J. Inf. Sci. Eng., January, 2024

$BPL\subseteq L-AC^1$.
Electron. Colloquium Comput. Complex., 2024

Introduction to the Minitrack on Generative AI and AI-generated Contents on Social Media.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

2023
Accelerating AI Adoption with Responsible AI Signals and Employee Engagement Mechanisms in Health Care.
Inf. Syst. Frontiers, December, 2023

Responsible Artificial Intelligence (AI) for Digital Health and Medical Analytics.
Inf. Syst. Frontiers, December, 2023

Exploring the Darkverse: A Multi-Perspective Analysis of the Negative Societal Impacts of the Metaverse.
Inf. Syst. Frontiers, October, 2023

PrivAim: A Dual-Privacy Preserving and Quality-Aware Incentive Mechanism for Federated Learning.
IEEE Trans. Computers, July, 2023

A multimodal evolutionary algorithm with multi-niche cooperation.
Expert Syst. Appl., June, 2023

PTAP: A novel secure privacy-preserving & traceable authentication protocol in VANETs.
Comput. Networks, May, 2023

TRUCON: Blockchain-Based Trusted Data Sharing With Congestion Control in Internet of Vehicles.
IEEE Trans. Intell. Transp. Syst., March, 2023

Introduction to meta learning for internet of multimedia things.
Int. J. Mach. Learn. Cybern., February, 2023

Shaping a Smart Transportation System for Sustainable Value Co-Creation.
Inf. Syst. Frontiers, February, 2023

Research on the Security of IPv6 Communication Based on Petri Net under IoT.
Sensors, 2023

Explore the potential of deep learning and hyperchaotic map in the meaningful visual image encryption scheme.
IET Image Process., 2023

Hearing Cyber-Attacks: A Novel Model for Bridging Network Security Situation and Music.
Proceedings of the 5th International Symposium on Signal Processing Systems, 2023

Optimizing Dynamic Neural Networks with Brainstorm.
Proceedings of the 17th USENIX Symposium on Operating Systems Design and Implementation, 2023

A Text Classification Method of Network Public Opinion Based on Information Fusion.
Proceedings of the International Conference on Networking and Network Applications, 2023

Formal Modeling and Defense Methods for 5G Network Endpoint Access Denial of Service Attacks.
Proceedings of the International Conference on Networking and Network Applications, 2023

A Novel On-Demand Service Architecture for Efficient Cloud-Edge Collaboration.
Proceedings of the International Conference on Networking and Network Applications, 2023

A Trusted Privacy-Preserving Model for Cross-Chain Transactions Based on zk_SNARKs.
Proceedings of the International Conference on Networking and Network Applications, 2023

A Pseudonym Exchange-Based Traceable Location Privacy Protection Scheme for IoV.
Proceedings of the International Conference on Networking and Network Applications, 2023

E-PBFT: An Improved Consensus Mechanism Based on PBFT.
Proceedings of the International Conference on Networking and Network Applications, 2023

DDoS Attack Detection Based on Information Entropy Feature Extraction in Software Defined Networks.
Proceedings of the International Conference on Networking and Network Applications, 2023

Cross-Level Network Security Element Fusion Extraction Method Based on Deep Learning.
Proceedings of the 8th International Conference on Cyber Security and Information Engineering, 2023

Patch-Based Multi-Level Attention Mechanism for Few-Shot Multi-Label Medical Image Classification.
Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2023

Smart Contract Symbol Execution Vulnerability Detection Method Based on CFG Path Pruning.
Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2023

2022
Analytical Calculation and Experimental Verification of Superconducting Electrodynamic Suspension System Using Null-Flux Ground Coils.
IEEE Trans. Intell. Transp. Syst., 2022

Trusted Data Storage Architecture for National Infrastructure.
Sensors, 2022

A Fault-Diagnosis Method for Railway Turnout Systems Based on Improved Autoencoder and Data Augmentation.
Sensors, 2022

Modeling Analysis of SM2 Construction Attacks in the Open Secure Sockets Layer Based on Petri Net.
Sensors, 2022

Meta-seg: A survey of meta-learning for image segmentation.
Pattern Recognit., 2022

Supply-demand matching in a complex telemedicine environment considering intermediary intervention.
Comput. Ind. Eng., 2022

Petri Net Model of MITM Attack Based on NDP Protocol.
Proceedings of the International Conference on Networking and Network Applications, 2022

TCS Security Analysis in Intel SGX Enclave MultiThreading.
Proceedings of the International Conference on Networking and Network Applications, 2022

Effective Secrecy Throughput Analysis for Communication Systems with a DF Satellite Relay.
Proceedings of the International Conference on Networking and Network Applications, 2022

Block-Streaming Service Loading Optimization of Android Dalvik Executable File for Cloud-End Collaboration.
Proceedings of the International Conference on Networking and Network Applications, 2022

Trusted Storage Architecture for Machine Reasoning based on Blockchain.
Proceedings of the IEEE INFOCOM 2022, 2022

CNN-Based Local Tone Mapping in the Perceptual Quantization Domain.
Proceedings of the 2022 IEEE International Conference on Image Processing, 2022

FDQM: Four-Dimensional Quantitative Measure for Statistical Heterogeneity in Federated Learning.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2022

Introduction to the Minitrack on The Technical, Socio-Economic, and Ethical Aspects of AI.
Proceedings of the 55th Hawaii International Conference on System Sciences, 2022

2021
A Novel IoV Block-Streaming Service Awareness and Trusted Verification Scheme in 6G.
IEEE Trans. Veh. Technol., 2021

Adversarial Attack Against Urban Scene Segmentation for Autonomous Vehicles.
IEEE Trans. Ind. Informatics, 2021

From Unknown to Similar: Unknown Protocol Syntax Analysis for Network Flows in IoT.
Secur. Commun. Networks, 2021

5G-Network-Enabled Smart Ambulance: Architecture, Application, and Evaluation.
IEEE Netw., 2021

Deep Learning Data Privacy Protection Based on Homomorphic Encryption in AIoT.
Mob. Inf. Syst., 2021

An intelligent fault diagnosis method based on curve segmentation and SVM for rail transit turnout.
J. Intell. Fuzzy Syst., 2021

An Architecture for IoT-Enabled Smart Transportation Security System: A Geospatial Approach.
IEEE Internet Things J., 2021

Artificial intelligence in business-to-business marketing: a bibliometric analysis of current research status, development and future directions.
Ind. Manag. Data Syst., 2021

Exploring the paths to big data analytics implementation success in banking and financial service: an integrated approach.
Ind. Manag. Data Syst., 2021

The dual concept of consumer value in social media brand community: A trust transfer perspective.
Int. J. Inf. Manag., 2021

Setting the future of digital and social media marketing research: Perspectives and research propositions.
Int. J. Inf. Manag., 2021

An unknown protocol syntax analysis method based on convolutional neural network.
Trans. Emerg. Telecommun. Technol., 2021

Spectral line extraction based on ant-colony algorithm.
EURASIP J. Adv. Signal Process., 2021

Brand value Co-creation in social commerce: The role of interactivity, social support, and relationship quality.
Comput. Hum. Behav., 2021

A Heuristic SAT Problems Solving Method based on LSTM Network.
Proceedings of the 12th International Symposium on Parallel Architectures, 2021

A permission generation and configuration method based on Rules and FP-Growth algorithm.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021

A fine-grained petri model for SQL time-blind injection.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021

Signature Scheme Based on The SM2 Algorithm in Fabric.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021

Shellshock Bash Vulnerability Modeling Analysis Based on Petri Net.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021

Petri net modeling and vulnerability analysis of the Heartbleed.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021

A Method for Fast Outlier Detection in High Dimensional Database Log.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021

A Driving Risk Prediction Approach Based on Generative Adversarial Networks and VANET for Autonomous Trams.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021

Research on A Vulnerability Detection Technology for Network Topology Security.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021

Chinese named entity recognition method for the field of network security based on RoBERTa.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021

ConvCatb: An Attention-based CNN-CATBOOST Risk Prediction Model for Driving Safety.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021

2020
From Hardware to Operating System: A Static Measurement Method of Android System Based on TrustZone.
Wirel. Commun. Mob. Comput., 2020

Combined access control model embedding configurable policy for fine-grained data security.
Microprocess. Microsystems, 2020

Classification and Recognition of Unknown Network Protocol Characteristics.
J. Inf. Sci. Eng., 2020

A novel energy-aware bio-inspired clustering scheme for IoT communication.
J. Ambient Intell. Humaniz. Comput., 2020

Guest editorial.
Inf. Technol. People, 2020

A trusted feature aggregator federated learning for distributed malicious attack detection.
Comput. Secur., 2020

Towards building a value co-creation circle in social commerce.
Comput. Hum. Behav., 2020

In Sharing Economy We Trust: Examining the Effect of Social and Technical Enablers on Millennials' Trust in Sharing Commerce.
Comput. Hum. Behav., 2020

A trusted recommendation scheme for privacy protection based on federated learning.
CCF Trans. Netw., 2020

A study on exercise recommendation method using Knowledge Graph for computer network course.
Proceedings of the International Conference on Networking and Network Applications, 2020

Network Flow Analytics: Multi-Class Classification of DDoS Attacks Based on OKNN.
Proceedings of the International Conference on Networking and Network Applications, 2020

A Framework for Audit Analysis of Heterogeneous Logs from PaaS.
Proceedings of the International Conference on Networking and Network Applications, 2020

Deep Learning as a Service Based on Encrypted Data.
Proceedings of the International Conference on Networking and Network Applications, 2020

Independent credible: Secure communication architecture of Android devices based on TrustZone.
Proceedings of the 2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2020

A Blockchain Based Distributed Storage System for Knowledge Graph Security.
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020

Toward an Understanding of Responsible Artificial Intelligence Practices.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020

2019
A novel subgraph querying method based on paths and spectra.
Neural Comput. Appl., 2019

RSU authentication in vehicular ad hoc networks base on verifiable secret sharing.
J. Intell. Fuzzy Syst., 2019

Local polynomial contrast binary patterns for face recognition.
Neurocomputing, 2019

Does privacy assurance on social commerce sites matter to millennials?
Int. J. Inf. Manag., 2019

Exploring adverse drug reactions of diabetes medicine using social media analytics and interactive visualizations.
Int. J. Inf. Manag., 2019

An energy saving based on task migration for mobile edge computing.
EURASIP J. Wirel. Commun. Netw., 2019

Efficient group authentication in RFID using secret sharing scheme.
Clust. Comput., 2019

Optimizing the Electronic Health Records Through Big Data Analytics: A Knowledge-Based View.
IEEE Access, 2019

Feature Extraction Optimization for Bitstream Communication Protocol Format Reverse Analysis.
Proceedings of the 18th IEEE International Conference On Trust, 2019

Bitstream Protocol Classification Mechanism Based on Feature Extraction.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

Introduction to the Minitrack on Augmenting Human Intelligence: Artificially, Socially, and Ethically.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

Artificial Intelligence and Visual Analytics: A Deep-Learning Approach to Analyze Hotel Reviews & Responses.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

Railway Key Exchange Scheme for Improving Communication Efficiency of RSSP-II Protocol.
Proceedings of the 2019 IEEE Globecom Workshops, Waikoloa, HI, USA, December 9-13, 2019, 2019

Acoustic Detection of ArterioVenous Access Stenosis Based on MUSIC Power Spectral Features.
Proceedings of the 12th International Congress on Image and Signal Processing, 2019

Multi-Level Classification of Arteriovenous Graft Degree of Stenosis Based on SSA + Welch Multi-Position Sequence Feature Extraction.
Proceedings of the 12th International Congress on Image and Signal Processing, 2019

2018
Gleer: A Novel Gini-Based Energy Balancing Scheme for Mobile Botnet Retopology.
Wirel. Commun. Mob. Comput., 2018

Binarized features with discriminant manifold filters for robust single-sample face recognition.
Signal Process. Image Commun., 2018

Using Serious Games in Data Communications and Networking Management Course.
J. Comput. Inf. Syst., 2018

Cheating identifiable secret sharing scheme using symmetric bivariate polynomial.
Inf. Sci., 2018

A novel energy-aware trustworthy multi-hop routing model for Internet of things.
Int. J. Distributed Sens. Networks, 2018

An integrated big data analytics-enabled transformation model: Application to health care.
Inf. Manag., 2018

AHP Aided Decision-Making in Virtual Machine Migration for Green Cloud.
Comput. Informatics, 2018

A Blockchain-Based Decentralized Cloud Resource Scheduling Architecture.
Proceedings of the International Conference on Networking and Network Applications, 2018

Analysis and Protection of DDOS Attack Based on RSSP-II Protocol.
Proceedings of the International Conference on Networking and Network Applications, 2018

Energy Saving Strategy for Task Migration Based on Genetic Algorithm.
Proceedings of the International Conference on Networking and Network Applications, 2018

Leveraging Big Data Analytics to Improve Quality of Care In Health Care: A fsQCA Approach.
Proceedings of the 51st Hawaii International Conference on System Sciences, 2018

A RMM Based Word Segmentation Method for Chinese Design Specifications of Building Stairs.
Proceedings of the 14th International Conference on Computational Intelligence and Security, 2018

A Novel Subgraph Querying Method on Directed Weighted Graphs.
Proceedings of the 14th International Conference on Computational Intelligence and Security, 2018

Technological Advancement in Marketing: Co-creation of Value with Customers.
Proceedings of the 24th Americas Conference on Information Systems, 2018

Big Data Analytics for New Product Success (Product Innovation).
Proceedings of the 24th Americas Conference on Information Systems, 2018

2017
Let Them Play: The Impact of Mechanics and Dynamics of a Serious Game on Student Perceptions of Learning Engagement.
IEEE Trans. Learn. Technol., 2017

People, Technologies, and Organizations Interactions in a Social Commerce Era.
IEEE Trans. Engineering Management, 2017

Business analytics-enabled decision-making effectiveness through knowledge absorptive capacity in health care.
J. Knowl. Manag., 2017

Weighted contourlet binary patterns and image-based fisher linear discriminant for face recognition.
Neurocomputing, 2017

Social interaction-based consumer decision-making model in social commerce: The role of word of mouth and observational learning.
Int. J. Inf. Manag., 2017

Efficient (k, n) Secret Sharing Scheme Secure against k - 2 Cheaters.
Proceedings of the International Conference on Networking and Network Applications, 2017

Illumination-robust face recognition with Block-based Local Contrast Patterns.
Proceedings of the 2017 IEEE International Conference on Acoustics, 2017

2016
UPDATE: User-Profile-Driven Adaptive TransfEr for Mobile Devices.
ACM Trans. Embed. Comput. Syst., 2016

Dynamic game model of botnet DDoS attack and defense.
Secur. Commun. Networks, 2016

Towards energy efcient cloud: an optimized ant colony model for virtual machine placement.
J. Commun. Inf. Networks, 2016

Game strategies for distributed denial of service defense in the Cloud of Things.
J. Commun. Inf. Networks, 2016

Efficiency optimisation signature scheme for time-critical multicast data origin authentication.
Int. J. Grid Util. Comput., 2016

A limited-trust capacity model for mitigating threats of internal malicious services in cloud computing.
Clust. Comput., 2016

(k, n) Secret Sharing Scheme against Two Types of Cheaters.
Proceedings of the International Conference on Networking and Network Applications, 2016

A New Interference Aware Routing Metric for Multi-radio Multi-channel Wireless Mesh Networks.
Proceedings of the International Conference on Networking and Network Applications, 2016

Exploring Configurations for Business Value from Event-Driven Architecture in Healthcare.
Proceedings of the International Conference on Information Systems, 2016

Face recognition with local contourlet combined patterns.
Proceedings of the 2016 IEEE International Conference on Acoustics, 2016

2015
EarlyBird: Mobile Prefetching of Social Network Feeds via Content Preference Mining and Usage Pattern Analysis.
Proceedings of the 16th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2015

Beyond a Technical Perspective: Understanding Big Data Capabilities in Health Care.
Proceedings of the 48th Hawaii International Conference on System Sciences, 2015

Multifarious distances, cameras and illuminations face database.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2015

Business Intelligence and Analytics Education: Hermeneutic Literature Review and Future Directions in IS Education.
Proceedings of the 21st Americas Conference on Information Systems, 2015

Managing Big Data for Firm Performance: a Configurational Approach.
Proceedings of the 21st Americas Conference on Information Systems, 2015

The Effect of Social Factors on User-Generated Content Productivity: Evidence from Flickr.com.
Proceedings of the 21st Americas Conference on Information Systems, 2015

Leveraging Co-innovation Practices on Business-to-Business Virtual Communities.
Proceedings of the 21st Americas Conference on Information Systems, 2015

Job Applicants' Information Privacy-Protective Response: Exploring the Roles of Technology Readiness and Trust.
Proceedings of the 21st Americas Conference on Information Systems, 2015

2014
Deploying lean in healthcare: Evaluating information technology effectiveness in U.S. hospital pharmacies.
Int. J. Inf. Manag., 2014

Alleviate Cellular Congestion Through Opportunistic Trough Filling.
EAI Endorsed Trans. Wirel. Spectr., 2014

From high-availability to collapse: quantitative analysis of "Cloud-Droplet-Freezing" attack threats to virtual machine migration in cloud computing.
Clust. Comput., 2014

Developing a Big Data-Enabled Transformation Model in Healthcare: A Practice Based View.
Proceedings of the International Conference on Information Systems, 2014

Co-Creation in Branding through Social Commerce: The Role of Social Support, Relationship Quality and Privacy Concerns.
Proceedings of the 20th Americas Conference on Information Systems, 2014

2013
Region- and action-aware virtual world clients.
ACM Trans. Multim. Comput. Commun. Appl., 2013

A rational framework for secure communication.
Inf. Sci., 2013

Fusing prefetch and delay-tolerant transfer for mobile videos.
Proceedings of the 11th Annual International Conference on Mobile Systems, 2013

Mobile user clustering in large time-scale data transfer scheduling.
Proceedings of the 11th Annual International Conference on Mobile Systems, 2013

Content Based Spam Text Classification: An Empirical Comparison between English and Chinese.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Game Optimization for Time-Critical Multicast Data Origin Authentication: Trade Off between Security and Efficiency.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Highly Flexible and Extensible Storage Scheme for Virtualization Platforms under Cloud Computing.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

An end-to-end testbed for scalable video streaming to mobile devices over HTTP.
Proceedings of the 2013 IEEE International Conference on Multimedia and Expo, 2013

Leveraging Event-driven IT Architecture Capability for Competitive Advantage in Healthcare Industry: a Mediated Model.
Proceedings of the International Conference on Information Systems, 2013

2012
A Nonparametric Bayesian Approach for Opportunistic Data Transfer in Cellular Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2012

SmartTransfer: transferring your mobile multimedia contents at the "right" time.
Proceedings of the Network and Operating System Support for Digital Audio and Video Workshop, 2012

A New Optical Fiber Birefringence Measurement Method Based on Polarization Detection and Wavelength Scanning.
Proceedings of the Third International Conference on Digital Manufacturing & Automation, 2012

Extracting typical users' moving patterns using deep learning.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

2011
Network traces of virtual worlds: measurements and applications.
Proceedings of the Second Annual ACM SIGMM Conference on Multimedia Systems, 2011

Toward region- and action-aware second life clients: A parameterized second life traffic model.
Proceedings of the 2011 IEEE International Conference on Multimedia and Expo, 2011

PSO-BP Neural Network in Reservoir Parameter Dynamic Prediction.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

2009
Developing a multifunctional network laboratory for teaching and research.
Proceedings of the 10th Conference on Information Technology Education, 2009

Scheduling Bursts Using Interval Graphs in Optical Burst Switching Networks.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

Tree-based Burst Aggregation in Optical Burst Switching Networks.
Proceedings of the 22nd International Conference on Parallel and Distributed Computing and Communication Systems, 2009


  Loading...