Ying Cai

According to our database1, Ying Cai authored at least 108 papers between 1996 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Application of Universal Kriging for Calibrating Offline-Programming Industrial Robots.
Journal of Intelligent and Robotic Systems, 2019

2018
Smart Cities on Wheels: A Newly Emerging Vehicular Cognitive Capability Harvesting Network for Data Transportation.
IEEE Wireless Commun., 2018

DPSAF: Forward Prediction Based Dynamic Packet Scheduling and Adjusting With Feedback for Multipath TCP in Lossy Heterogeneous Networks.
IEEE Trans. Vehicular Technology, 2018

Intelligent Data Transportation in Smart Cities: A Spectrum-Aware Approach.
IEEE/ACM Trans. Netw., 2018

Querying a Collection of Continuous Functions.
IEEE Trans. Knowl. Data Eng., 2018

Extreme-Scale High-Order WENO Simulations of 3-D Detonation Wave with 10 Million Cores.
TACO, 2018

A Normal Sensor Calibration Method Based on an Extended Kalman Filter for Robotic Drilling.
Sensors, 2018

Multiscale overlapping blocks binarized statistical image features descriptor with flip-free distance for face verification in the wild.
Neural Computing and Applications, 2018

HEDD: Human Enhancer Disease Database.
Nucleic Acids Research, 2018

A flexible calibration method connecting the joint space and the working space of industrial robots.
Industrial Robot, 2018

PGA: post-GWAS analysis for disease gene identification.
Bioinformatics, 2018

Spatio-Temporal Check-in Time Prediction with Recurrent Neural Network based Survival Analysis.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

Research Hotspots Mining and Visualized Analysis Based on Linking Cluster and K-Core Decomposition.
Proceedings of the International Conference on Data Processing and Applications, 2018

Race Classification from Face using Deep Convolutional Neural Networks.
Proceedings of the 3rd International Conference on Advanced Robotics and Mechatronics, 2018

Recurrent Spatio-Temporal Point Process for Check-in Time Prediction.
Proceedings of the 27th ACM International Conference on Information and Knowledge Management, 2018

Extreme-Scale Realistic Stencil Computations on Sunway TaihuLight with Ten Million Cores.
Proceedings of the 18th IEEE/ACM International Symposium on Cluster, 2018

Detecting Adversarial Examples Through Image Transformation.
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, 2018

2017
Dissociated roles of the parietal and frontal cortices in the scope and control of attention during visual working memory.
NeuroImage, 2017

Full Location Privacy Protection Through Restricted Space Cloaking.
JIP, 2017

Face attribute prediction with convolutional neural networks.
Proceedings of the 2017 IEEE International Conference on Robotics and Biomimetics, 2017

Fake Co-visitation Injection Attacks to Recommender Systems.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Message Transmission Scheme Based on the Detection of Interest Community in Mobile Social Networks.
Proceedings of the Mobile Ad-hoc and Sensor Networks - 13th International Conference, 2017

A privacy-preserving interactive messaging scheme based on users credibility over online social networks.
Proceedings of the 2017 IEEE/CIC International Conference on Communications in China, 2017

A calibration method of industrial robots based on ELM.
Proceedings of the 2nd International Conference on Advanced Robotics and Mechatronics, 2017

Querying Improvement Strategies.
Proceedings of the 20th International Conference on Extending Database Technology, 2017

Message from the NCIW Program Co-chairs.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

Visualizing Deep Neural Networks with Interaction of Super-pixels.
Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, 2017

2016
An Incentive-Compatible Routing Protocol for Two-Hop Delay-Tolerant Networks.
IEEE Trans. Vehicular Technology, 2016

A Privacy-Preserving Scheme for Incentive-Based Demand Response in the Smart Grid.
IEEE Trans. Smart Grid, 2016

Dissociated neural substrates underlying impulsive choice and impulsive action.
NeuroImage, 2016

Discipline Hotspots Mining Based on Hierarchical Dirichlet Topic Clustering and Co-word Network.
JSW, 2016

An Energy-Efficient Strategy for Secondary Users in Cooperative Cognitive Radio Networks for Green Communications.
IEEE Journal on Selected Areas in Communications, 2016

The Role of the Frontal and Parietal Cortex in Proactive and Reactive Inhibitory Control: A Transcranial Direct Current Stimulation Study.
J. Cognitive Neuroscience, 2016

Stereo matching based on classification of materials.
Neurocomputing, 2016

Prioritization of Schizophrenia Risk Genes by a Network-Regularized Logistic Regression Method.
Proceedings of the Bioinformatics and Biomedical Engineering, 2016

Authentication of function queries.
Proceedings of the 32nd IEEE International Conference on Data Engineering, 2016

A Parity-Based Data Outsourcing Model for Query Authentication and Correction.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016

Message from the WEDA 2016 Program Chairs.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

Message from the TAIN Program Co-chairs.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

2015
Packet Delivery Ratio/Cost in MANETs With Erasure Coding and Packet Replication.
IEEE Trans. Vehicular Technology, 2015

Multiclass classification based on a deep convolutional network for head pose estimation.
Frontiers of IT & EE, 2015

On the exact multicast delay in mobile ad hoc networks with f-cast relay.
Ad Hoc Networks, 2015

Message from TAIN Symposium Organizing Committee.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

2014
Delay and capacity in MANETs under random walk mobility model.
Wireless Networks, 2014

A novel hybrid incentive mechanism for node cooperation in mobile cyber-physical systems.
IJPEDS, 2014

2013
Design of liveness-enforcing supervisors with simpler structures for deadlock-free operations in flexible manufacturing systems using necessary siphons.
J. Intelligent Manufacturing, 2013

An Incentive Compatible Two-Hop Multi-copy Routing Protocol in DTNs.
Proceedings of the IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks, 2013

A hybrid approach for privacy-preserving processing of knn queries in mobile database systems.
Proceedings of the 22nd ACM International Conference on Information and Knowledge Management, 2013

Head Pose Estimation with Improved Random Regression Forests.
Proceedings of the Biometric Recognition - 8th Chinese Conference, 2013

2012
A Method for Application of Classification Tree Models to Map Aquatic Vegetation Using Remotely Sensed Images from Different Sensors and Dates.
Sensors, 2012

Efficient processing of location-cloaked queries.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

The Analysis of Mobility Models in MANETs with Two-Hop Relay Algorithm.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

Security Uniform Office Format Specification and API Design Based on the Java Platform.
Proceedings of the Information Computing and Applications - Third International Conference, 2012

Utilizing RNA-Seq data for cancer network inference.
Proceedings of the Proceedings 2012 IEEE International Workshop on Genomic Signal Processing and Statistics, 2012

Research on SDEM and Its Transformation in the Gateway Design.
Proceedings of the AsiaSim 2012, 2012

Scenario Driven Lifecycle Automation of Net-Centric Simulation.
Proceedings of the AsiaSim 2012, 2012

2011
ELIAS: An Efficient Storage Underlay for Mobile Peer-to-Peer Systems.
IEEE Trans. Parallel Distrib. Syst., 2011

Recent Advances in Mobile Middleware for Wireless Systems and Services.
MONET, 2011

Pattern detection in airborne LiDAR data using Laplacian of Gaussian filter.
Geo-spatial Information Science, 2011

Minimum-Energy Multicast Using Random Linear Network Coding.
Proceedings of the Seventh International Conference on Mobile Ad-hoc and Sensor Networks, 2011

A subscription overlay network for large-scale and cost-efficient any source multicast.
Proceedings of the 30th IEEE International Performance Computing and Communications Conference, 2011

The Analysis and Optimization of KNN Algorithm Space-Time Efficiency for Chinese Text Categorization.
Proceedings of the Advances in Computer Science, Environment, Ecoinformatics, and Education, 2011

2010
6th IEEE international workshop on mobile peer-to-peer computing MP2P 2010: Message from the workshop chairs.
Proceedings of the Eigth Annual IEEE International Conference on Pervasive Computing and Communications, 2010

A Generic Platform for Efficient Processing of Spatial Monitoring Queries in Mobile Peer-to-Peer Networks.
Proceedings of the Eleventh International Conference on Mobile Data Management, 2010

LSR: A location secure routing protocol for ad hoc networks.
Proceedings of the IEEE 7th International Conference on Mobile Adhoc and Sensor Systems, 2010

A Fine Grained RBAC Model Supporting Flexible Administrative Separation of Duty.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

Certificates Distributed Storage Scheme in the Trust Management System.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

2009
Binary sequences with optimal autocorrelation.
Theor. Comput. Sci., 2009

An enhanced client-centric approach for efficient video broadcast.
Multimedia Tools Appl., 2009

Location safety protection in ad hoc networks.
Ad Hoc Networks, 2009

Query l-diversity in Location-Based Services.
Proceedings of the MDM 2009, 2009

Location Cloaking for Safety Protection of Ad Hoc Networks.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Feeling-based location privacy protection for location-based services.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
Caching collaboration and cache allocation in peer-to-peer video systems.
Multimedia Tools Appl., 2008

Design, analysis, and implementation of a large-scale real-time location-based information sharing system.
Proceedings of the 6th International Conference on Mobile Systems, 2008

Safe-Time: Distributed Real-Time Monitoring of cKNN in Mobile Peer-to-Peer Networks.
Proceedings of the 9th International Conference on Mobile Data Management (MDM 2008), 2008

Exploring Historical Location Data for Anonymity Preservation in Location-Based Services.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

Anonymity-Preserving Location Data Publishing.
Proceedings of the 17th International Conference on Computer Communications and Networks, 2008

2007
A double patching technique for efficient bandwidth sharing in video-on-demand systems.
Multimedia Tools Appl., 2007

On scheduling of peer-to-peer video services.
IEEE Journal on Selected Areas in Communications, 2007

ELIAS: Every Location Is A Storage.
Proceedings of the Global Communications Conference, 2007

Location anonymity in continuous location-based services.
Proceedings of the 15th ACM International Symposium on Geographic Information Systems, 2007

2006
Real-Time Processing of Range-Monitoring Queries in Heterogeneous Mobile Databases.
IEEE Trans. Mob. Comput., 2006

An Overlay Subscription Network for Live Internet TV Broadcast.
IEEE Trans. Knowl. Data Eng., 2006

Sharing Location Dependent Experiences in MANET.
Proceedings of the 7th International Conference on Mobile Data Management (MDM 2006), 2006

Detecting Malicious Peers in Overlay Multicast Streaming.
Proceedings of the LCN 2006, 2006

Binary Sequences with Three and Four Level Autocorrelation.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

2005
Multiuser detection using the Taguchi method for DS-CDMA systems.
IEEE Trans. Wireless Communications, 2005

Video Management in Peer-to-Peer Systems.
Proceedings of the Fifth IEEE International Conference on Peer-to-Peer Computing (P2P 2005), 31 August, 2005

Leveraging 1-hop neighborhood knowledge for efficient flooding in wireless ad hoc networks.
Proceedings of the 24th IEEE International Performance Computing and Communications Conference, 2005

A priority forwarding technique for efficient and fast flooding in wireless ad hoc networks.
Proceedings of the 14th International Conference On Computer Communications and Networks, 2005

Streaming over subscription overlay networks.
Proceedings of the 14th International Conference On Computer Communications and Networks, 2005

Shaking service requests in peer-to-peer video systems.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

2004
Leveraging Broadband Access for True On-Demand Delivery of Internet Videos.
Proceedings of the 2004 Symposium on Applications and the Internet (SAINT 2004), 2004

Processing Range-Monitoring Queries on Heterogeneous Mobile Objects.
Proceedings of the 5th IEEE International Conference on Mobile Data Management (MDM 2004), 2004

Improving server broadcast efficiency through better utilization of client receiving bandwidth.
Proceedings of the 23rd IEEE International Performance Computing and Communications Conference, 2004

Providing scalable on-demand video services for heterogeneous receivers.
Proceedings of the 2004 IEEE International Conference on Multimedia and Expo, 2004

FEC-based multiple description coding for heterogeneous client bandwidths.
Proceedings of the Third International Conference on Image and Graphics, 2004

A Reputation-based Trust Management in Peer-to-Peer Network Systems.
Proceedings of the ISCA 17th International Conference on Parallel and Distributed Computing Systems, 2004

2003
Sharing Multicast Videos Using Patching Streams.
Multimedia Tools Appl., 2003

A Generalized Target-Driven Cache Replacement Policy for Mobile Environments.
Proceedings of the 2003 Symposium on Applications and the Internet (SAINT 2003), 27-31 January 2003, 2003

2002
Managing continuous range queries in mobile databases.
Proceedings of The Fourth IEEE Conference on Mobile and Wireless Communications Networks, 2002

2001
A heuristic approach for measurement-based admission control with variable-size window.
Proceedings of the Global Telecommunications Conference, 2001

2000
A Transformational Approach to Constraint Relaxation of a Time-driven Simulation Model.
Proceedings of the 13th International Symposium on System Synthesis, 2000

1999
An efficient bandwidth-sharing technique for true video on demand systems.
Proceedings of the 7th ACM International Conference on Multimedia '99, Orlando, FL, USA, October 30, 1999

1998
Patching: A Multicast Technique for True Video-on-Demand Services.
Proceedings of the 6th ACM International Conference on Multimedia '98, 1998

Exploiting Client Bandwidth for More Efficient Video Broadcast.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1998), 1998

1996
On the Optimality of Degree of Declustering.
Proceedings of the Database and Expert Systems Applications, 7th International Conference, 1996


  Loading...