Yiming Chen

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.


Defect Width Assessment Based on the Near-Field Magnetic Flux Leakage Method.
Sensors, 2021

Optimal maintenance strategy for multi-state systems with single maintenance capacity and arbitrarily distributed maintenance time.
Reliab. Eng. Syst. Saf., 2021

A named entity recognition model based on ensemble learning.
J. Comput. Methods Sci. Eng., 2021

Cloud Computing for Malicious Encrypted Traffic Analysis and Collaboration.
Int. J. Grid High Perform. Comput., 2021

Investigating the Impact of Pre-trained Language Models on Dialog Evaluation.
CoRR, 2021

Revisiting Self-Training for Few-Shot Learning of Language Model.
CoRR, 2021

Bias Loss for Mobile Neural Networks.
CoRR, 2021

Learned Gradient Compression for Distributed Deep Learning.
CoRR, 2021

Hyperspectral Imaging Assessment of Systemic Sclerosis Using the Soft Abundance Score and Band Selection.
IEEE Access, 2021

A Compact Automated Tablet Dispensing & Packaging System for Community Healthcare Facilities to Provide Unit Dose Repackaging Service.
Proceedings of the Human Aspects of IT for the Aged Population. Supporting Everyday Life Activities, 2021

Capacitive Content-Addressable Memory: A Highly Reliable and Scalable Approach to Energy-Efficient Parallel Pattern Matching Applications.
Proceedings of the GLSVLSI '21: Great Lakes Symposium on VLSI 2021, 2021

Using Generative Adversarial Networks for Data Augmentation in Android Malware Detection.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021

Research on Design Program of Buffer Valve based on Python.
Proceedings of the CONF-CDS 2021: The 2nd International Conference on Computing and Data Science, 2021

DynaEval: Unifying Turn and Dialogue Level Evaluation.
Proceedings of the 59th Annual Meeting of the Association for Computational Linguistics and the 11th International Joint Conference on Natural Language Processing, 2021

MD-MinerP: Interaction Profiling Bipartite Graph Mining for Malware-Control Domain Detection.
Secur. Commun. Networks, 2020

Dynamics of Dalk Glacier in East Antarctica Derived from Multisource Satellite Observations Since 2000.
Remote. Sens., 2020

Random Forest Models for Accurate Identification of Coordination Environments from X-Ray Absorption Near-Edge Structure.
Patterns, 2020

Dynamic selective maintenance optimization for multi-state systems over a finite horizon: A deep reinforcement learning approach.
Eur. J. Oper. Res., 2020

A Survey of Privacy Protection and Network Security in User On-Demand Anonymous Communication.
IEEE Access, 2020

Android malware detection system integrating block feature extraction and multi-head attention mechanism.
Proceedings of the International Computer Symposium, 2020

A General Quantitative Expression for Optimal Segment Number of MV Feeder.
Proceedings of the ICITEE2020: The 3rd International Conference on Information Technologies and Electrical Engineering, 2020

Specific Emitter Identification Based on Square Integral Bispectrum Features.
Proceedings of the 20th IEEE International Conference on Communication Technology, 2020

Individual Identification Technology of Communication Radiation Sources Based on Deep Learning.
Proceedings of the 20th IEEE International Conference on Communication Technology, 2020

FoxNet: A Multi-face Alignment Method.
CoRR, 2019

Pollution Source Localization Based on Multi-UAV Cooperative Communication.
IEEE Access, 2019

Foxnet: A Multi-Face Alignment Method.
Proceedings of the 2019 IEEE International Conference on Image Processing, 2019

Model Analysis and Prediction of People's Travel Behaviors Under no Shared Bicycles.
Proceedings of the Intelligent Computing Theories and Application, 2019

Efficient Evolutionary Deep Neural Architecture Search (NAS) by Noisy Network Morphism Mutation.
Proceedings of the Bio-inspired Computing: Theories and Applications, 2019

A Heuristic Evolutionary Algorithm of UAV Path Planning.
Wirel. Commun. Mob. Comput., 2018

Using Airborne Laser Scanner and Path Length Distribution Model to Quantify Clumping Effect and Estimate Leaf Area Index.
IEEE Trans. Geosci. Remote. Sens., 2018

On sequence planning for selective maintenance of multi-state systems under stochastic maintenance durations.
Eur. J. Oper. Res., 2018

Medical Image Fusion Based on Sparse Representation and PCNN in NSCT Domain.
Comput. Math. Methods Medicine, 2018

An Accurate Filtenna Synthesis Approach Based on Load-Resistance Flattening and Impedance-Transforming Tapped-Feed Techniques.
IEEE Access, 2018

Non-invasive Assessment of Psoriasis from Snapshot Hyperspectral Imaging.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2018

A New Faraday Rotation Estimator Based on Polarimetric Coherency Matrix and its Effect on Sea Ice.
Proceedings of the 2018 IEEE International Geoscience and Remote Sensing Symposium, 2018

CC-Tracker: Interaction Profiling Bipartite Graph Mining for Malicious Network Activity Detection.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

Design and Application of a Visual System for the Supply Chain of Thermal Coal Based on Big Data.
Proceedings of the Big Data - BigData 2018, 2018

A Novel GPU-Based Efficient Approach for Convolutional Neural Networks with Small Filters.
J. Signal Process. Syst., 2017

Building thesaurus-based knowledge graph based on schema layer.
Clust. Comput., 2017

A Peak-Capacitor-Current Pulse-Train-Controlled Buck Converter With Fast Transient Response and a Wide Load Range.
IEEE Trans. Ind. Electron., 2016

Examining palpebral conjunctiva for anemia assessment with image processing methods.
Comput. Methods Programs Biomed., 2016

Predicting postoperative complications of head and neck squamous cell carcinoma in elderly patients using random forest algorithm model.
BMC Medical Informatics Decis. Mak., 2015

A Novel Fast Approach for Convolutional Networks with Small Filters Based on GPU.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Resource Allocation Algorithm Based on Fuzzy Cluster Grouping for Device-to-Device Communication.
Proceedings of the Bio-Inspired Computing - Theories and Applications, 2015

Non-time Synchronization and Localization Based on Seawater Movement.
Proceedings of the Bio-Inspired Computing - Theories and Applications, 2015

The Research of Experimental State Feedback Mechanism Based on Windows API - Take Cloud Security Experimental Platform for Instance.
Proceedings of the Intelligent Systems and Applications, 2014

Improving Recovery Rate for Packet Loss in Large-Scale Telecom Smart TV Systems.
IEICE Trans. Inf. Syst., 2013

Generation of pixel-level resolution lunar DEM based on Chang'E-1 three-line imagery and laser altimeter data.
Comput. Geosci., 2013

Error analysis for numerical solution of fractional differential equation by Haar wavelets method.
J. Comput. Sci., 2012

Predicting the effectiveness of queries for visual search.
Proceedings of the 2012 IEEE International Conference on Acoustics, 2012

Fast retargeting with adaptive grid optimization.
Proceedings of the 2011 IEEE International Conference on Multimedia and Expo, 2011

ULE Method for Elastic Conical Shell.
Proceedings of the Information Computing and Applications, 2011

Using Agent in Virtual Machine for Interactive Security Training.
Proceedings of the Security Technology, 2011

Reconstruction of intersecting curved solids from 2D orthographic views.
Comput. Aided Des., 2010

On the design of an global intrusion tolerance network architecture against the internet catastrophes.
J. Syst. Softw., 2009

A rough set approach for automatic key attributes identification of zero-day polymorphic worms.
Expert Syst. Appl., 2009

Combining incremental Hidden Markov Model and Adaboost algorithm for anomaly intrusion detection.
Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics, 2009

Idea and Practice for Paperless Education.
Proceedings of the Technologies for E-Learning and Digital Entertainment, 2008

Dynamic web page protection based on content integrity.
Int. J. Serv. Stand., 2007

Meeting QoS Requirements of Mobile Computing by Dual-Level Congestion Control.
Proceedings of the Advances in Grid and Pervasive Computing, 2007

Information Flow Query and Verification for Security Policy of Security-Enhanced Linux.
Proceedings of the Advances in Information and Computer Security, 2006

A New Program-Iteration Pattern IGMRES(m) Algorithm Based on the FM-BEM and its Application.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

Existence and Uniqueness Property of the Three-Dimensional Fast Multipole-BEM for Potential Problems.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

The Boundary Mixed Variational Inequality for Frictional Contact Problem in Elasticity.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

Demonstration of a SiGe RF LNA Design Using IBM Design Kits in 0.18um SiGe BiCMOS Technology.
Proceedings of the 2004 Design, 2004

Mobile location tracking with NLOS error mitigation.
Proceedings of the Global Telecommunications Conference, 2002