Yijing Wang

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Known people with the same name:

Bibliography

2024
LESM-YOLO: An Improved Aircraft Ducts Defect Detection Model.
Sensors, July, 2024

BotRGA: Neighborhood-Aware Twitter Bot Detection with Relational Graph Aggregation.
Proceedings of the Computational Science - ICCS 2024, 2024

LightPool: A NVMe-oF-based High-performance and Lightweight Storage Pool Architecture for Cloud-Native Distributed Database.
Proceedings of the IEEE International Symposium on High-Performance Computer Architecture, 2024

2023
Fisher-Information-Matrix-Based USBL Cooperative Location in USV-AUV Networks.
Sensors, September, 2023

Computational Study of the Fe(II) and α-Ketoglutarate-Dependent Aryloxyalkanoate Dioxygenase (AAD-1) in the Degradation of the Herbicide 2,4-Dichlorophenoxyacetic Acid.
J. Chem. Inf. Model., May, 2023

Coarray Polarization Smoothing for DOA Estimation with Coprime Vector Sensor Arrays.
Circuits Syst. Signal Process., May, 2023

Beyond top-k: knowledge reasoning for multi-answer temporal questions based on revalidation framework.
PeerJ Comput. Sci., 2023

High-performance and Scalable Software-based NVMe Virtualization Mechanism with I/O Queues Passthrough.
CoRR, 2023

BM-Store: A Transparent and High-performance Local Storage Architecture for Bare-metal Clouds Enabling Large-scale Deployment.
Proceedings of the IEEE International Symposium on High-Performance Computer Architecture, 2023

HyQ: Hybrid I/O Queue Architecture for NVMe over Fabrics to Enable High- Performance Hardware Offloading.
Proceedings of the 23rd IEEE/ACM International Symposium on Cluster, 2023

2022
Polarization, Angle, and Delay Estimation for Tri-Polarized Systems in Multipath Environments.
IEEE Trans. Wirel. Commun., 2022

Bicriteria streaming algorithms to balance gain and cost with cardinality constraint.
J. Comb. Optim., 2022

Mechanism of Sugar Ring Contraction and Closure Catalyzed by UDP-d-apiose/UDP-d-xylose Synthase (UAXS).
J. Chem. Inf. Model., 2022

TERQA: Question answering over knowledge graph considering precise dependencies of temporal information on vectors.
Displays, 2022

Weakly k-submodular Maximization Under Matroid Constraint.
Proceedings of the Theory and Applications of Models of Computation, 2022

Maximizing Approximately Non-k-Submodular Monotone Set Function with Matroid Constraint.
Proceedings of the Theory and Applications of Models of Computation, 2022

Cooperative guidance for speed-varying vehicle against moving target.
Proceedings of the 13th Asian Control Conference, 2022

2021
Bicriteria algorithms to balance coverage and cost in team formation under online model.
Theor. Comput. Sci., 2021

Intelligent Intrusion Detection Based on Federated Learning for Edge-Assisted Internet of Things.
Secur. Commun. Networks, 2021

Establishment of a Key Hidden Danger Factor System for Electric Power Personal Casualty Accidents Based on Text Mining.
Inf., 2021

Improved few-shot learning method for transformer fault diagnosis based on approximation space and belief functions.
Expert Syst. Appl., 2021

Prediction on transaction amounts of China's CBEC with improved GM (1, 1) models based on the principle of new information priority.
Electron. Commer. Res., 2021

Non-Submodular Maximization with Matroid and Knapsack Constraints.
Asia Pac. J. Oper. Res., 2021

Analysis on the Transmission of International Oil Price to China's Price Index-Based on Granger Causality Network.
Proceedings of the 8th International Conference on Information Technology and Quantitative Management, 2021

Space-Time-Polarization Channel Estimation With a Single Tripole in Multipath Environments.
Proceedings of the 21st International Conference on Communication Technology, 2021

On Maximizing the Difference Between an Approximately Submodular Function and a Linear Function Subject to a Matroid Constraint.
Proceedings of the Combinatorial Optimization and Applications, 2021

2020
Non-submodular maximization on massive data streams.
J. Glob. Optim., 2020

An Image Hashing Algorithm for Authentication with Multi-Attack Reference Generation and Adaptive Thresholding.
Algorithms, 2020

Toward Automatic Mobile Application Fingerprint Extraction from Non-encrypted HTTP Traffic.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2020

A High-Efficiency and Comprehensive Dynamic Behavior Analysis System for Malware based on Hardware Virtualization.
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020

POLARDB Meets Computational Storage: Efficiently Support Analytical Workloads in Cloud-Native Relational Database.
Proceedings of the 18th USENIX Conference on File and Storage Technologies, 2020

Online Bicriteria Algorithms to Balance Coverage and Cost in Team Formation.
Proceedings of the Algorithmic Aspects in Information and Management, 2020

2019
Multi-attack Reference Hashing Generation for Image Authentication.
Proceedings of the Digital Forensics and Watermarking - 18th International Workshop, 2019

The dynamical relationship between capital market and macroeconomy: based on dynamic Bayesian network.
Proceedings of the 7th International Conference on Information Technology and Quantitative Management, 2019

Can stock markets lead the macroeconomic variables? Dynamic analysis based on TOP method.
Proceedings of the 7th International Conference on Information Technology and Quantitative Management, 2019

CrowDIY: How to Design and Adapt Collaborative Crowdsourcing Workflows Under Budget Constraints.
Proceedings of the Web Engineering - 19th International Conference, 2019

A Fast Optimization Method for Automatic Train Stop Control.
Proceedings of the 15th IEEE International Conference on Control and Automation, 2019

Comparative Genome Analysis of Aspergillus Oryzae and Aspergillus Flavus.
Proceedings of the ICBBS 2019: 8th International Conference on Bioinformatics and Biomedical Science, 2019

2018
Information Propagation Prediction Based on Key Users Authentication in Microblogging.
Secur. Commun. Networks, 2018

2003
Reachability and controllability of switched linear systems with state jumps.
Proceedings of the IEEE International Conference on Systems, 2003

Reachability of a class of hybrid systems.
Proceedings of the IEEE International Conference on Systems, 2003

Controllability of switched linear discrete-time systemswith multiple time delays.
Proceedings of the 7th European Control Conference, 2003

Reachability of switched discrete-time systems under constrained switching.
Proceedings of the 42nd IEEE Conference on Decision and Control, 2003


  Loading...