Ying Cai

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2024
Novel grey dynamic trend relational analysis models with different types of accumulation delay effects for time-delay systems.
Expert Syst. Appl., March, 2024

Robust Vascular Segmentation for Raw Complex Images of Laser Speckle Contrast Based on Weakly Supervised Learning.
IEEE Trans. Medical Imaging, January, 2024

Multigrid Algorithm for Immersed Finite Element Discretizations of Elliptic Interface Problems.
J. Sci. Comput., January, 2024

An Empirical Study on Personalized Product Recommendation Based on Cross-Border E-Commerce Customer Data Analysis.
J. Organ. End User Comput., 2024

Superconvergent postprocessing of C<sup>0</sup> interior penalty method.
CoRR, 2024

2023
Secure transmission performance analysis of multi-hop cognitive relay radio networks with energy harvesting and artificial noise aided.
Wirel. Networks, November, 2023

A two-level additive Schwarz preconditioner for the Nitsche extended finite element approximation of elliptic interface problems.
Comput. Math. Appl., October, 2023

Making FAQ Chatbots More Inclusive: An Examination of Non-Native English Users' Interactions with New Technology in Massive Open Online Courses.
Int. J. Artif. Intell. Educ., September, 2023

Regional autonomous security cooperative spectrum sensing method based on trust value.
IET Commun., August, 2023

A Nitsche mixed extended finite element method for the biharmonic interface problem.
Math. Comput. Simul., 2023

Verifying the Correctness of Analytic Query Results (Extended Abstract).
Proceedings of the 39th IEEE International Conference on Data Engineering, 2023

Predicting Road Traffic Risks with CNN-and-LSTM Learning Over Spatio-Temporal and Multi-Feature Traffic Data.
Proceedings of the IEEE International Conference on Software Services Engineering, 2023

2022
Understanding Student Navigation Patterns in Game-Based Learning.
J. Learn. Anal., December, 2022

Verifying the Correctness of Analytic Query Results.
IEEE Trans. Knowl. Data Eng., 2022

Automatic lipreading based on optimized OLSDA and HMM.
Soft Comput., 2022

Arbitrarily shaped scene text detection with dynamic convolution.
Pattern Recognit., 2022

The Neural Mechanism Underlying Visual Working Memory Training and Its Limited Transfer Effect.
J. Cogn. Neurosci., 2022

Parallel finite volume simulation of the spherical shell dynamo with pseudo-vacuum magnetic boundary conditions.
J. Comput. Phys., 2022

Augmented reality technology in language learning: A meta-analysis.
J. Comput. Assist. Learn., 2022

Carbon emission accounting and spatial distribution of industrial entities in Beijing - Combining nighttime light data and urban functional areas.
Ecol. Informatics, 2022

Making Images Resilient to Adversarial Example Attacks.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2022, 2022

2021
Optimizing IoT Energy Efficiency on Edge (EEE): A Cross-Layer Design in a Cognitive Mesh Network.
IEEE Trans. Wirel. Commun., 2021

Real-Time Detection for Wheat Head Applying Deep Neural Network.
Sensors, 2021

An Embeddable Algorithm for Automatic Garbage Detection Based on Complex Marine Environment.
Sensors, 2021

The Supply Chain Financial Supervision Mechanism of the Internet of Things Based on the Integration of RFID and Wireless Sensor Network.
J. Sensors, 2021

Self-adaptive trajectory prediction for improving traffic safety in cloud-edge based transportation systems.
J. Cloud Comput., 2021

A Conditional Privacy Protection Scheme Based on Ring Signcryption for Vehicular Ad Hoc Networks.
IEEE Internet Things J., 2021

Exploring the relationship between social presence and learners' prestige in MOOC discussion forums using automated content analysis and social network analysis.
Comput. Hum. Behav., 2021

A review of natural scene text detection methods.
Proceedings of the 8th International Conference on Information Technology and Quantitative Management, 2021

Prediction of loan default based on multi-model fusion.
Proceedings of the 8th International Conference on Information Technology and Quantitative Management, 2021

A Review of Yolo Algorithm Developments.
Proceedings of the 8th International Conference on Information Technology and Quantitative Management, 2021

A robust cross-ethnic digital handwriting recognition method based on deep learning.
Proceedings of the 8th International Conference on Information Technology and Quantitative Management, 2021

Text sentiment analysis of fusion model based on attention mechanism.
Proceedings of the 8th International Conference on Information Technology and Quantitative Management, 2021

Improvement of AnyNet-based end-to-end phased binocular stereo matching network.
Proceedings of the 8th International Conference on Information Technology and Quantitative Management, 2021

Efficient Example Mining for Anchor-Free Face Detection.
Proceedings of the Image and Graphics - 11th International Conference, 2021

A Survey on Content-Based Encrypted Image Retrieval in Cloud Computing.
Proceedings of the Big Data and Security - Third International Conference, 2021

A Survey on Privacy-Preserving Deep Learning with Differential Privacy.
Proceedings of the Big Data and Security - Third International Conference, 2021

A Survey on Service Migration Strategies for Vehicular Edge Computing.
Proceedings of the Big Data and Security - Third International Conference, 2021

A Survey on Task Scheduling Schemes in Mobile Edge Computing.
Proceedings of the Big Data and Security - Third International Conference, 2021

Balance Training for Anchor-Free Face Detection.
Proceedings of the Biometric Recognition - 15th Chinese Conference, 2021

Automated Robotic Assembly of 3D Mesostructure via Guided Mechanical Buckling.
Proceedings of the 17th IEEE International Conference on Automation Science and Engineering, 2021

2020
Inhibitor discovery for the E. coli meningitis virulence factor IbeA from homology modeling and virtual screening.
J. Comput. Aided Mol. Des., 2020

A Privacy-Preserving Scheme for Interactive Messaging Over Online Social Networks.
IEEE Internet Things J., 2020

Corrections to "Non-Stationary Representation for Continuity Aware Head Pose Estimation via Deep Neural Decision Trees".
IEEE Access, 2020

Survey on Computation Offloading Schemes in Resource-Constrained Mobile Edge Computing.
Proceedings of the Big Data and Security - Second International Conference, 2020

2019
Application of Universal Kriging for Calibrating Offline-Programming Industrial Robots.
J. Intell. Robotic Syst., 2019

A fast and robust 3D face recognition approach based on deeply learned face representation.
Neurocomputing, 2019

Non-Stationary Representation for Continuity Aware Head Pose Estimation Via Deep Neural Decision Trees.
IEEE Access, 2019

PSO-Based Agent Cooperative Spectrum Sensing in Cognitive Radio Networks.
IEEE Access, 2019

A New Approach to Process the Unknown Words in Financial Public Opinion.
Proceedings of the 7th International Conference on Information Technology and Quantitative Management, 2019

Document images classification based on deep learning.
Proceedings of the 7th International Conference on Information Technology and Quantitative Management, 2019

A Survey on Computation Offloading for Vehicular Edge Computing.
Proceedings of the ICIT 2019, 2019

A New Model for Predicting Node Type Based on Deep Learning.
Proceedings of the Data Science - 6th International Conference, 2019

2018
Smart Cities on Wheels: A Newly Emerging Vehicular Cognitive Capability Harvesting Network for Data Transportation.
IEEE Wirel. Commun., 2018

DPSAF: Forward Prediction Based Dynamic Packet Scheduling and Adjusting With Feedback for Multipath TCP in Lossy Heterogeneous Networks.
IEEE Trans. Veh. Technol., 2018

Intelligent Data Transportation in Smart Cities: A Spectrum-Aware Approach.
IEEE/ACM Trans. Netw., 2018

Querying a Collection of Continuous Functions.
IEEE Trans. Knowl. Data Eng., 2018

Extreme-Scale High-Order WENO Simulations of 3-D Detonation Wave with 10 Million Cores.
ACM Trans. Archit. Code Optim., 2018

A Normal Sensor Calibration Method Based on an Extended Kalman Filter for Robotic Drilling.
Sensors, 2018

Multiscale overlapping blocks binarized statistical image features descriptor with flip-free distance for face verification in the wild.
Neural Comput. Appl., 2018

HEDD: Human Enhancer Disease Database.
Nucleic Acids Res., 2018

云存储中高效密文检索的中文数据加密方案 (Chinese Data Encryption Scheme of Efficient Ciphertext Retrieving in Cloud Storage).
计算机科学, 2018

移动社交网中基于兴趣社区的消息传输方案 (Interest Community Based Message Transmission Scheme in Mobile Social Networks).
计算机科学, 2018

A flexible calibration method connecting the joint space and the working space of industrial robots.
Ind. Robot, 2018

PGA: post-GWAS analysis for disease gene identification.
Bioinform., 2018

Spatio-Temporal Check-in Time Prediction with Recurrent Neural Network based Survival Analysis.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

Research Hotspots Mining and Visualized Analysis Based on Linking Cluster and K-Core Decomposition.
Proceedings of the International Conference on Data Processing and Applications, 2018

Race Classification from Face using Deep Convolutional Neural Networks.
Proceedings of the 3rd International Conference on Advanced Robotics and Mechatronics, 2018

Recurrent Spatio-Temporal Point Process for Check-in Time Prediction.
Proceedings of the 27th ACM International Conference on Information and Knowledge Management, 2018

Extreme-Scale Realistic Stencil Computations on Sunway TaihuLight with Ten Million Cores.
Proceedings of the 18th IEEE/ACM International Symposium on Cluster, 2018

Detecting Adversarial Examples Through Image Transformation.
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, 2018

2017
Dissociated roles of the parietal and frontal cortices in the scope and control of attention during visual working memory.
NeuroImage, 2017

Full Location Privacy Protection Through Restricted Space Cloaking.
J. Inf. Process., 2017

Face attribute prediction with convolutional neural networks.
Proceedings of the 2017 IEEE International Conference on Robotics and Biomimetics, 2017

Fake Co-visitation Injection Attacks to Recommender Systems.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Message Transmission Scheme Based on the Detection of Interest Community in Mobile Social Networks.
Proceedings of the Mobile Ad-hoc and Sensor Networks - 13th International Conference, 2017

A privacy-preserving interactive messaging scheme based on users credibility over online social networks.
Proceedings of the 2017 IEEE/CIC International Conference on Communications in China, 2017

A calibration method of industrial robots based on ELM.
Proceedings of the 2nd International Conference on Advanced Robotics and Mechatronics, 2017

Querying Improvement Strategies.
Proceedings of the 20th International Conference on Extending Database Technology, 2017

Message from the NCIW Program Co-chairs.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

Visualizing Deep Neural Networks with Interaction of Super-pixels.
Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, 2017

2016
An Incentive-Compatible Routing Protocol for Two-Hop Delay-Tolerant Networks.
IEEE Trans. Veh. Technol., 2016

A Privacy-Preserving Scheme for Incentive-Based Demand Response in the Smart Grid.
IEEE Trans. Smart Grid, 2016

Dissociated neural substrates underlying impulsive choice and impulsive action.
NeuroImage, 2016

Discipline Hotspots Mining Based on Hierarchical Dirichlet Topic Clustering and Co-word Network.
J. Softw., 2016

An Energy-Efficient Strategy for Secondary Users in Cooperative Cognitive Radio Networks for Green Communications.
IEEE J. Sel. Areas Commun., 2016

The Role of the Frontal and Parietal Cortex in Proactive and Reactive Inhibitory Control: A Transcranial Direct Current Stimulation Study.
J. Cogn. Neurosci., 2016

Stereo matching based on classification of materials.
Neurocomputing, 2016

Prioritization of Schizophrenia Risk Genes by a Network-Regularized Logistic Regression Method.
Proceedings of the Bioinformatics and Biomedical Engineering, 2016

Authentication of function queries.
Proceedings of the 32nd IEEE International Conference on Data Engineering, 2016

A Parity-Based Data Outsourcing Model for Query Authentication and Correction.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016

Message from the WEDA 2016 Program Chairs.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

Message from the TAIN Program Co-chairs.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

2015
Packet Delivery Ratio/Cost in MANETs With Erasure Coding and Packet Replication.
IEEE Trans. Veh. Technol., 2015

Multiclass classification based on a deep convolutional network for head pose estimation.
Frontiers Inf. Technol. Electron. Eng., 2015

On the exact multicast delay in mobile ad hoc networks with f-cast relay.
Ad Hoc Networks, 2015

Message from TAIN Symposium Organizing Committee.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

2014
Delay and capacity in MANETs under random walk mobility model.
Wirel. Networks, 2014

A novel hybrid incentive mechanism for node cooperation in mobile cyber-physical systems.
Int. J. Parallel Emergent Distributed Syst., 2014

2013
Design of liveness-enforcing supervisors with simpler structures for deadlock-free operations in flexible manufacturing systems using necessary siphons.
J. Intell. Manuf., 2013

An Incentive Compatible Two-Hop Multi-copy Routing Protocol in DTNs.
Proceedings of the IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks, 2013

A hybrid approach for privacy-preserving processing of knn queries in mobile database systems.
Proceedings of the 22nd ACM International Conference on Information and Knowledge Management, 2013

Head Pose Estimation with Improved Random Regression Forests.
Proceedings of the Biometric Recognition - 8th Chinese Conference, 2013

2012
A Method for Application of Classification Tree Models to Map Aquatic Vegetation Using Remotely Sensed Images from Different Sensors and Dates.
Sensors, 2012

Efficient processing of location-cloaked queries.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

The Analysis of Mobility Models in MANETs with Two-Hop Relay Algorithm.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

Security Uniform Office Format Specification and API Design Based on the Java Platform.
Proceedings of the Information Computing and Applications - Third International Conference, 2012

Utilizing RNA-Seq data for cancer network inference.
Proceedings of the Proceedings 2012 IEEE International Workshop on Genomic Signal Processing and Statistics, 2012

Research on SDEM and Its Transformation in the Gateway Design.
Proceedings of the AsiaSim 2012, 2012

Scenario Driven Lifecycle Automation of Net-Centric Simulation.
Proceedings of the AsiaSim 2012, 2012

2011
ELIAS: An Efficient Storage Underlay for Mobile Peer-to-Peer Systems.
IEEE Trans. Parallel Distributed Syst., 2011

Recent Advances in Mobile Middleware for Wireless Systems and Services.
Mob. Networks Appl., 2011

Pattern detection in airborne LiDAR data using Laplacian of Gaussian filter.
Geo spatial Inf. Sci., 2011

Minimum-Energy Multicast Using Random Linear Network Coding.
Proceedings of the Seventh International Conference on Mobile Ad-hoc and Sensor Networks, 2011

A subscription overlay network for large-scale and cost-efficient any source multicast.
Proceedings of the 30th IEEE International Performance Computing and Communications Conference, 2011

The Analysis and Optimization of KNN Algorithm Space-Time Efficiency for Chinese Text Categorization.
Proceedings of the Advances in Computer Science, Environment, Ecoinformatics, and Education, 2011

2010
6<sup>th</sup> IEEE international workshop on mobile peer-to-peer computing MP2P 2010: Message from the workshop chairs.
Proceedings of the Eigth Annual IEEE International Conference on Pervasive Computing and Communications, 2010

A Generic Platform for Efficient Processing of Spatial Monitoring Queries in Mobile Peer-to-Peer Networks.
Proceedings of the Eleventh International Conference on Mobile Data Management, 2010

LSR: A location secure routing protocol for ad hoc networks.
Proceedings of the IEEE 7th International Conference on Mobile Adhoc and Sensor Systems, 2010

A Fine Grained RBAC Model Supporting Flexible Administrative Separation of Duty.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

Certificates Distributed Storage Scheme in the Trust Management System.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

2009
Binary sequences with optimal autocorrelation.
Theor. Comput. Sci., 2009

An enhanced client-centric approach for efficient video broadcast.
Multim. Tools Appl., 2009

Location safety protection in ad hoc networks.
Ad Hoc Networks, 2009

Query l-diversity in Location-Based Services.
Proceedings of the MDM 2009, 2009

Location Cloaking for Safety Protection of Ad Hoc Networks.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Feeling-based location privacy protection for location-based services.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
Caching collaboration and cache allocation in peer-to-peer video systems.
Multim. Tools Appl., 2008

Design, analysis, and implementation of a large-scale real-time location-based information sharing system.
Proceedings of the 6th International Conference on Mobile Systems, 2008

Safe-Time: Distributed Real-Time Monitoring of cKNN in Mobile Peer-to-Peer Networks.
Proceedings of the 9th International Conference on Mobile Data Management (MDM 2008), 2008

Exploring Historical Location Data for Anonymity Preservation in Location-Based Services.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

Anonymity-Preserving Location Data Publishing.
Proceedings of the 17th International Conference on Computer Communications and Networks, 2008

2007
A double patching technique for efficient bandwidth sharing in video-on-demand systems.
Multim. Tools Appl., 2007

On scheduling of peer-to-peer video services.
IEEE J. Sel. Areas Commun., 2007

ELIAS: Every Location Is A Storage.
Proceedings of the Global Communications Conference, 2007

Location anonymity in continuous location-based services.
Proceedings of the 15th ACM International Symposium on Geographic Information Systems, 2007

2006
Real-Time Processing of Range-Monitoring Queries in Heterogeneous Mobile Databases.
IEEE Trans. Mob. Comput., 2006

An Overlay Subscription Network for Live Internet TV Broadcast.
IEEE Trans. Knowl. Data Eng., 2006

Sharing Location Dependent Experiences in MANET.
Proceedings of the 7th International Conference on Mobile Data Management (MDM 2006), 2006

Detecting Malicious Peers in Overlay Multicast Streaming.
Proceedings of the LCN 2006, 2006

Binary Sequences with Three and Four Level Autocorrelation.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

2005
Multiuser detection using the Taguchi method for DS-CDMA systems.
IEEE Trans. Wirel. Commun., 2005

A generalized target-driven cache replacement policy for mobile environments.
J. Parallel Distributed Comput., 2005

Video Management in Peer-to-Peer Systems.
Proceedings of the Fifth IEEE International Conference on Peer-to-Peer Computing (P2P 2005), 31 August, 2005

Leveraging 1-hop neighborhood knowledge for efficient flooding in wireless ad hoc networks.
Proceedings of the 24th IEEE International Performance Computing and Communications Conference, 2005

A priority forwarding technique for efficient and fast flooding in wireless ad hoc networks.
Proceedings of the 14th International Conference On Computer Communications and Networks, 2005

Streaming over subscription overlay networks.
Proceedings of the 14th International Conference On Computer Communications and Networks, 2005

Shaking service requests in peer-to-peer video systems.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

An Orthogonal Array Optimization for the Economic Dispatch with Nonsmooth Cost Functions.
Proceedings of the 44th IEEE IEEE Conference on Decision and Control and 8th European Control Conference Control, 2005

2004
Leveraging Broadband Access for True On-Demand Delivery of Internet Videos.
Proceedings of the 2004 Symposium on Applications and the Internet (SAINT 2004), 2004

Processing Range-Monitoring Queries on Heterogeneous Mobile Objects.
Proceedings of the 5th IEEE International Conference on Mobile Data Management (MDM 2004), 2004

Improving server broadcast efficiency through better utilization of client receiving bandwidth.
Proceedings of the 23rd IEEE International Performance Computing and Communications Conference, 2004

Providing scalable on-demand video services for heterogeneous receivers.
Proceedings of the 2004 IEEE International Conference on Multimedia and Expo, 2004

FEC-based multiple description coding for heterogeneous client bandwidths.
Proceedings of the Third International Conference on Image and Graphics, 2004

A Reputation-based Trust Management in Peer-to-Peer Network Systems.
Proceedings of the ISCA 17th International Conference on Parallel and Distributed Computing Systems, 2004

2003
Sharing Multicast Videos Using Patching Streams.
Multim. Tools Appl., 2003

2002
Managing continuous range queries in mobile databases.
Proceedings of The Fourth IEEE Conference on Mobile and Wireless Communications Networks, 2002

2001
A heuristic approach for measurement-based admission control with variable-size window.
Proceedings of the Global Telecommunications Conference, 2001

2000
A Transformational Approach to Constraint Relaxation of a Time-driven Simulation Model.
Proceedings of the 13th International Symposium on System Synthesis, 2000

1999
An efficient bandwidth-sharing technique for true video on demand systems.
Proceedings of the 7th ACM International Conference on Multimedia '99, Orlando, FL, USA, October 30, 1999

1998
<i>Patching</i>: A Multicast Technique for True Video-on-Demand Services.
Proceedings of the 6th ACM International Conference on Multimedia '98, 1998

Exploiting Client Bandwidth for More Efficient Video Broadcast.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1998), 1998

1996
On the Optimality of Degree of Declustering.
Proceedings of the Database and Expert Systems Applications, 7th International Conference, 1996


  Loading...