Yichuan Wang

According to our database1, Yichuan Wang authored at least 127 papers between 2009 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2022
Trusted Data Storage Architecture for National Infrastructure.
Sensors, 2022

Modeling Analysis of SM2 Construction Attacks in the Open Secure Sockets Layer Based on Petri Net.
Sensors, 2022

Meta-seg: A survey of meta-learning for image segmentation.
Pattern Recognit., 2022

Supply-demand matching in a complex telemedicine environment considering intermediary intervention.
Comput. Ind. Eng., 2022

Trusted Storage Architecture for Machine Reasoning based on Blockchain.
Proceedings of the IEEE INFOCOM 2022, 2022

Introduction to the Minitrack on The Technical, Socio-Economic, and Ethical Aspects of AI.
Proceedings of the 55th Hawaii International Conference on System Sciences, 2022

2021
A Novel IoV Block-Streaming Service Awareness and Trusted Verification Scheme in 6G.
IEEE Trans. Veh. Technol., 2021

Adversarial Attack Against Urban Scene Segmentation for Autonomous Vehicles.
IEEE Trans. Ind. Informatics, 2021

From Unknown to Similar: Unknown Protocol Syntax Analysis for Network Flows in IoT.
Secur. Commun. Networks, 2021

5G-Network-Enabled Smart Ambulance: Architecture, Application, and Evaluation.
IEEE Netw., 2021

Deep Learning Data Privacy Protection Based on Homomorphic Encryption in AIoT.
Mob. Inf. Syst., 2021

An intelligent fault diagnosis method based on curve segmentation and SVM for rail transit turnout.
J. Intell. Fuzzy Syst., 2021

An Architecture for IoT-Enabled Smart Transportation Security System: A Geospatial Approach.
IEEE Internet Things J., 2021

Artificial intelligence in business-to-business marketing: a bibliometric analysis of current research status, development and future directions.
Ind. Manag. Data Syst., 2021

Exploring the paths to big data analytics implementation success in banking and financial service: an integrated approach.
Ind. Manag. Data Syst., 2021

The dual concept of consumer value in social media brand community: A trust transfer perspective.
Int. J. Inf. Manag., 2021

Setting the future of digital and social media marketing research: Perspectives and research propositions.
Int. J. Inf. Manag., 2021

An unknown protocol syntax analysis method based on convolutional neural network.
Trans. Emerg. Telecommun. Technol., 2021

Spectral line extraction based on ant-colony algorithm.
EURASIP J. Adv. Signal Process., 2021

Brand value Co-creation in social commerce: The role of interactivity, social support, and relationship quality.
Comput. Hum. Behav., 2021

A Heuristic SAT Problems Solving Method based on LSTM Network.
Proceedings of the 12th International Symposium on Parallel Architectures, 2021

A permission generation and configuration method based on Rules and FP-Growth algorithm.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021

A fine-grained petri model for SQL time-blind injection.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021

Signature Scheme Based on The SM2 Algorithm in Fabric.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021

Shellshock Bash Vulnerability Modeling Analysis Based on Petri Net.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021

Petri net modeling and vulnerability analysis of the Heartbleed.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021

A Method for Fast Outlier Detection in High Dimensional Database Log.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021

A Driving Risk Prediction Approach Based on Generative Adversarial Networks and VANET for Autonomous Trams.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021

Research on A Vulnerability Detection Technology for Network Topology Security.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021

Chinese named entity recognition method for the field of network security based on RoBERTa.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021

ConvCatb: An Attention-based CNN-CATBOOST Risk Prediction Model for Driving Safety.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021

2020
From Hardware to Operating System: A Static Measurement Method of Android System Based on TrustZone.
Wirel. Commun. Mob. Comput., 2020

Combined access control model embedding configurable policy for fine-grained data security.
Microprocess. Microsystems, 2020

Classification and Recognition of Unknown Network Protocol Characteristics.
J. Inf. Sci. Eng., 2020

A novel energy-aware bio-inspired clustering scheme for IoT communication.
J. Ambient Intell. Humaniz. Comput., 2020

Guest editorial.
Inf. Technol. People, 2020

A trusted feature aggregator federated learning for distributed malicious attack detection.
Comput. Secur., 2020

Towards building a value co-creation circle in social commerce.
Comput. Hum. Behav., 2020

In Sharing Economy We Trust: Examining the Effect of Social and Technical Enablers on Millennials' Trust in Sharing Commerce.
Comput. Hum. Behav., 2020

A trusted recommendation scheme for privacy protection based on federated learning.
CCF Trans. Netw., 2020

A study on exercise recommendation method using Knowledge Graph for computer network course.
Proceedings of the International Conference on Networking and Network Applications, 2020

Network Flow Analytics: Multi-Class Classification of DDoS Attacks Based on OKNN.
Proceedings of the International Conference on Networking and Network Applications, 2020

A Framework for Audit Analysis of Heterogeneous Logs from PaaS.
Proceedings of the International Conference on Networking and Network Applications, 2020

Deep Learning as a Service Based on Encrypted Data.
Proceedings of the International Conference on Networking and Network Applications, 2020

Independent credible: Secure communication architecture of Android devices based on TrustZone.
Proceedings of the 2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2020

A Blockchain Based Distributed Storage System for Knowledge Graph Security.
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020

Toward an Understanding of Responsible Artificial Intelligence Practices.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020

Introduction to the Minitrack on The Technical, Socio-Economic and Ethical Aspects of AI.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020

2019
A novel subgraph querying method based on paths and spectra.
Neural Comput. Appl., 2019

RSU authentication in vehicular ad hoc networks base on verifiable secret sharing.
J. Intell. Fuzzy Syst., 2019

Local polynomial contrast binary patterns for face recognition.
Neurocomputing, 2019

Does privacy assurance on social commerce sites matter to millennials?
Int. J. Inf. Manag., 2019

Exploring adverse drug reactions of diabetes medicine using social media analytics and interactive visualizations.
Int. J. Inf. Manag., 2019

An energy saving based on task migration for mobile edge computing.
EURASIP J. Wirel. Commun. Netw., 2019

Efficient group authentication in RFID using secret sharing scheme.
Clust. Comput., 2019

Optimizing the Electronic Health Records Through Big Data Analytics: A Knowledge-Based View.
IEEE Access, 2019

Feature Extraction Optimization for Bitstream Communication Protocol Format Reverse Analysis.
Proceedings of the 18th IEEE International Conference On Trust, 2019

Bitstream Protocol Classification Mechanism Based on Feature Extraction.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

Introduction to the Minitrack on Augmenting Human Intelligence: Artificially, Socially, and Ethically.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

Artificial Intelligence and Visual Analytics: A Deep-Learning Approach to Analyze Hotel Reviews & Responses.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

Railway Key Exchange Scheme for Improving Communication Efficiency of RSSP-II Protocol.
Proceedings of the 2019 IEEE Globecom Workshops, Waikoloa, HI, USA, December 9-13, 2019, 2019

Acoustic Detection of ArterioVenous Access Stenosis Based on MUSIC Power Spectral Features.
Proceedings of the 12th International Congress on Image and Signal Processing, 2019

Multi-Level Classification of Arteriovenous Graft Degree of Stenosis Based on SSA + Welch Multi-Position Sequence Feature Extraction.
Proceedings of the 12th International Congress on Image and Signal Processing, 2019

2018
Gleer: A Novel Gini-Based Energy Balancing Scheme for Mobile Botnet Retopology.
Wirel. Commun. Mob. Comput., 2018

Binarized features with discriminant manifold filters for robust single-sample face recognition.
Signal Process. Image Commun., 2018

Using Serious Games in Data Communications and Networking Management Course.
J. Comput. Inf. Syst., 2018

Cheating identifiable secret sharing scheme using symmetric bivariate polynomial.
Inf. Sci., 2018

A novel energy-aware trustworthy multi-hop routing model for Internet of things.
Int. J. Distributed Sens. Networks, 2018

An integrated big data analytics-enabled transformation model: Application to health care.
Inf. Manag., 2018

AHP Aided Decision-Making in Virtual Machine Migration for Green Cloud.
Comput. Informatics, 2018

A Blockchain-Based Decentralized Cloud Resource Scheduling Architecture.
Proceedings of the International Conference on Networking and Network Applications, 2018

Analysis and Protection of DDOS Attack Based on RSSP-II Protocol.
Proceedings of the International Conference on Networking and Network Applications, 2018

Energy Saving Strategy for Task Migration Based on Genetic Algorithm.
Proceedings of the International Conference on Networking and Network Applications, 2018

Leveraging Big Data Analytics to Improve Quality of Care In Health Care: A fsQCA Approach.
Proceedings of the 51st Hawaii International Conference on System Sciences, 2018

A RMM Based Word Segmentation Method for Chinese Design Specifications of Building Stairs.
Proceedings of the 14th International Conference on Computational Intelligence and Security, 2018

A Novel Subgraph Querying Method on Directed Weighted Graphs.
Proceedings of the 14th International Conference on Computational Intelligence and Security, 2018

Technological Advancement in Marketing: Co-creation of Value with Customers.
Proceedings of the 24th Americas Conference on Information Systems, 2018

Big Data Analytics for New Product Success (Product Innovation).
Proceedings of the 24th Americas Conference on Information Systems, 2018

2017
Let Them Play: The Impact of Mechanics and Dynamics of a Serious Game on Student Perceptions of Learning Engagement.
IEEE Trans. Learn. Technol., 2017

People, Technologies, and Organizations Interactions in a Social Commerce Era.
IEEE Trans. Engineering Management, 2017

Business analytics-enabled decision-making effectiveness through knowledge absorptive capacity in health care.
J. Knowl. Manag., 2017

Weighted contourlet binary patterns and image-based fisher linear discriminant for face recognition.
Neurocomputing, 2017

Social interaction-based consumer decision-making model in social commerce: The role of word of mouth and observational learning.
Int. J. Inf. Manag., 2017

Efficient (k, n) Secret Sharing Scheme Secure against k - 2 Cheaters.
Proceedings of the International Conference on Networking and Network Applications, 2017

Illumination-robust face recognition with Block-based Local Contrast Patterns.
Proceedings of the 2017 IEEE International Conference on Acoustics, 2017

2016
UPDATE: User-Profile-Driven Adaptive TransfEr for Mobile Devices.
ACM Trans. Embed. Comput. Syst., 2016

Dynamic game model of botnet DDoS attack and defense.
Secur. Commun. Networks, 2016

Towards energy efcient cloud: an optimized ant colony model for virtual machine placement.
J. Commun. Inf. Networks, 2016

Game strategies for distributed denial of service defense in the Cloud of Things.
J. Commun. Inf. Networks, 2016

Efficiency optimisation signature scheme for time-critical multicast data origin authentication.
Int. J. Grid Util. Comput., 2016

A limited-trust capacity model for mitigating threats of internal malicious services in cloud computing.
Clust. Comput., 2016

(k, n) Secret Sharing Scheme against Two Types of Cheaters.
Proceedings of the International Conference on Networking and Network Applications, 2016

A New Interference Aware Routing Metric for Multi-radio Multi-channel Wireless Mesh Networks.
Proceedings of the International Conference on Networking and Network Applications, 2016

Exploring Configurations for Business Value from Event-Driven Architecture in Healthcare.
Proceedings of the International Conference on Information Systems, 2016

Face recognition with local contourlet combined patterns.
Proceedings of the 2016 IEEE International Conference on Acoustics, 2016

2015
EarlyBird: Mobile Prefetching of Social Network Feeds via Content Preference Mining and Usage Pattern Analysis.
Proceedings of the 16th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2015

Beyond a Technical Perspective: Understanding Big Data Capabilities in Health Care.
Proceedings of the 48th Hawaii International Conference on System Sciences, 2015

Multifarious distances, cameras and illuminations face database.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2015

Business Intelligence and Analytics Education: Hermeneutic Literature Review and Future Directions in IS Education.
Proceedings of the 21st Americas Conference on Information Systems, 2015

Managing Big Data for Firm Performance: a Configurational Approach.
Proceedings of the 21st Americas Conference on Information Systems, 2015

The Effect of Social Factors on User-Generated Content Productivity: Evidence from Flickr.com.
Proceedings of the 21st Americas Conference on Information Systems, 2015

Leveraging Co-innovation Practices on Business-to-Business Virtual Communities.
Proceedings of the 21st Americas Conference on Information Systems, 2015

Job Applicants' Information Privacy-Protective Response: Exploring the Roles of Technology Readiness and Trust.
Proceedings of the 21st Americas Conference on Information Systems, 2015

2014
Deploying lean in healthcare: Evaluating information technology effectiveness in U.S. hospital pharmacies.
Int. J. Inf. Manag., 2014

Alleviate Cellular Congestion Through Opportunistic Trough Filling.
EAI Endorsed Trans. Wirel. Spectr., 2014

From high-availability to collapse: quantitative analysis of "Cloud-Droplet-Freezing" attack threats to virtual machine migration in cloud computing.
Clust. Comput., 2014

Developing a Big Data-Enabled Transformation Model in Healthcare: A Practice Based View.
Proceedings of the International Conference on Information Systems, 2014

Co-Creation in Branding through Social Commerce: The Role of Social Support, Relationship Quality and Privacy Concerns.
Proceedings of the 20th Americas Conference on Information Systems, 2014

2013
Region- and action-aware virtual world clients.
ACM Trans. Multim. Comput. Commun. Appl., 2013

A rational framework for secure communication.
Inf. Sci., 2013

Fusing prefetch and delay-tolerant transfer for mobile videos.
Proceedings of the 11th Annual International Conference on Mobile Systems, 2013

Mobile user clustering in large time-scale data transfer scheduling.
Proceedings of the 11th Annual International Conference on Mobile Systems, 2013

Content Based Spam Text Classification: An Empirical Comparison between English and Chinese.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Game Optimization for Time-Critical Multicast Data Origin Authentication: Trade Off between Security and Efficiency.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Highly Flexible and Extensible Storage Scheme for Virtualization Platforms under Cloud Computing.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

An end-to-end testbed for scalable video streaming to mobile devices over HTTP.
Proceedings of the 2013 IEEE International Conference on Multimedia and Expo, 2013

Leveraging Event-driven IT Architecture Capability for Competitive Advantage in Healthcare Industry: a Mediated Model.
Proceedings of the International Conference on Information Systems, 2013

2012
A Nonparametric Bayesian Approach for Opportunistic Data Transfer in Cellular Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2012

SmartTransfer: transferring your mobile multimedia contents at the "right" time.
Proceedings of the Network and Operating System Support for Digital Audio and Video Workshop, 2012

A New Optical Fiber Birefringence Measurement Method Based on Polarization Detection and Wavelength Scanning.
Proceedings of the Third International Conference on Digital Manufacturing & Automation, 2012

Extracting typical users' moving patterns using deep learning.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

2011
Network traces of virtual worlds: measurements and applications.
Proceedings of the Second Annual ACM SIGMM Conference on Multimedia Systems, 2011

Toward region- and action-aware second life clients: A parameterized second life traffic model.
Proceedings of the 2011 IEEE International Conference on Multimedia and Expo, 2011

PSO-BP Neural Network in Reservoir Parameter Dynamic Prediction.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

2009
Developing a multifunctional network laboratory for teaching and research.
Proceedings of the 10th Conference on Information Technology Education, 2009

Scheduling Bursts Using Interval Graphs in Optical Burst Switching Networks.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

Tree-based Burst Aggregation in Optical Burst Switching Networks.
Proceedings of the 22nd International Conference on Parallel and Distributed Computing and Communication Systems, 2009


  Loading...