Yingjie Wu

Orcid: 0000-0003-2622-1242

According to our database1, Yingjie Wu authored at least 60 papers between 2008 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
M-Sim: Multi-level Semantic Inference Model for Chinese short answer scoring in low-resource scenarios.
Comput. Speech Lang., March, 2024

CogNLG: Cognitive graph for KG-to-text generation.
Expert Syst. J. Knowl. Eng., January, 2024

Tacholess Order Tracking Method Based on STFrFT for Fault Diagnosis of Wind Turbine Gearbox Under Variable Operating Conditions.
IEEE Trans. Instrum. Meas., 2024

Empowering intelligent manufacturing with edge computing: A portable diagnosis and distance localization approach for bearing faults.
Adv. Eng. Informatics, 2024

2023
Window-Adjusted Common Spatial Pattern for Detecting Error-Related Potentials in P300 BCI.
Neural Process. Lett., December, 2023

Passive Secure Communications Based on Reconfigurable Intelligent Surface.
IEEE Commun. Lett., February, 2023

Formalization of Robot Collision Detection Method based on Conformal Geometric Algebra.
CoRR, 2023

2022
Passive Covert Communications Based on Reconfigurable Intelligent Surface.
IEEE Wirel. Commun. Lett., 2022

A Calibration-free Approach to Implementing P300-based Brain-computer Interface.
Cogn. Comput., 2022

Improved Differential Phase Detecting Optical Fiber Interferometer With a Low-Frequency Compensation Scheme.
IEEE Access, 2022

MIMO Secure Communication with Reconfigurable Intelligent Surface: Finite-Alphabet Inputs.
Proceedings of the 14th International Conference on Wireless Communications and Signal Processing, 2022

Transformer Recommendation Machine for Rate Prediction.
Proceedings of the 5th International Conference on Machine Learning and Machine Intelligence, 2022

PCBERT: Parent and Child BERT for Chinese Few-shot NER.
Proceedings of the 29th International Conference on Computational Linguistics, 2022

2021
Sensitivity reduction of degree histogram publication under node differential privacy via mean filtering.
Concurr. Comput. Pract. Exp., 2021

2020
Coexpression of PBX1 and EMP2 as Prognostic Biomarkers in Estrogen Receptor-Negative Breast Cancer via Data Mining.
J. Comput. Biol., 2020

Polar Code Design for Nakagami-m Channel.
KSII Trans. Internet Inf. Syst., 2020

Construction and Reasoning Approach of Belief Rule-Base for Classification Base on Decision Tree.
IEEE Access, 2020

A Balance Adjusting Approach of Extended Belief-Rule-Based System for Imbalanced Classification Problem.
IEEE Access, 2020

Statistical Method of Space Distribution for Riding Based on R-Tree Under Differential Privacy.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2020

Balanced Loss for Accurate Object Detection.
Proceedings of the Pattern Recognition and Computer Vision - Third Chinese Conference, 2020

MagnifierNet: Learning Efficient Small-scale Pedestrian Detector towards Multiple Dense Regions.
Proceedings of the 25th International Conference on Pattern Recognition, 2020

Fully Convolutional One-Stage Circular Object Detector on Medical Images.
Proceedings of the ICAIP 2020: 4th International Conference on Advances in Image Processing, 2020

Differential Privacy Trajectory Data Protection Algorithm Based on Polar Coordinate Transformation.
Proceedings of the Fuzzy Systems and Data Mining VI, 2020

Optimized Privacy Protection Method for Big Data Traffic.
Proceedings of the EITCE 2020: 4th International Conference on Electronic Information Technology and Computer Engineering, Xiamen, China, 6 November, 2020, 2020

Time-Division Multiplexing Based System-Level FPGA Routing for Logic Verification.
Proceedings of the 57th ACM/IEEE Design Automation Conference, 2020

SVM Learning for Default Prediction of Credit Card under Differential Privacy.
Proceedings of the PPMLP'20: Proceedings of the 2020 Workshop on Privacy-Preserving Machine Learning in Practice, 2020

2019
An On-Orbit Dynamic Calibration Method for an MHD Micro-Angular Vibration Sensor Using a Laser Interferometer.
Sensors, 2019

差分隐私流数据实时发布中的自适应参数优化 (Adaptive Parameter Optimization for Real-time Differential Privacy Streaming Data Publication).
计算机科学, 2019

Partial Discharge Fault Diagnosis Based on Multi-Scale Dispersion Entropy and a Hypersphere Multiclass Support Vector Machine.
Entropy, 2019

Automatic Diagnosis of Rolling Element Bearing Under Different Conditions Based on RVMD and Envelope Order Capture.
IEEE Access, 2019

Multi-modal Feature Fusion Based on Variational Autoencoder for Visual Question Answering.
Proceedings of the Pattern Recognition and Computer Vision - Second Chinese Conference, 2019

Counting Attention Based on Classification Confidence for Visual Question Answering.
Proceedings of the 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2019

An Effective Detailed Routing Algorithm Considering Advanced VLSI Technologies.
Proceedings of the 13th IEEE International Conference on ASIC, 2019

2017
MoZo: A Moving Zone Based Routing Protocol Using Pure V2V Communication in VANETs.
IEEE Trans. Mob. Comput., 2017

A note on the largest number of red nodes in red-black trees.
J. Discrete Algorithms, 2017

Using an Ontology-Based Approach to Handle Author Affiliations in a Large Biomedical Citation Database.
Proceedings of the MEDINFO 2017: Precision Healthcare through Informatics, 2017

2016
An Efficient Dynamic Programming Algorithm for STR-IC-STR-IC-LCS Problem.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2016

An Efficient Dynamic Programming Algorithm for STR-IC-STR-EC-LCS Problem.
Proceedings of the Green, Pervasive, and Cloud Computing - 11th International Conference, 2016

A Polynomial Time Algorithm for a Generalized Longest Common Subsequence Problem.
Proceedings of the Green, Pervasive, and Cloud Computing - 11th International Conference, 2016

An Efficient Algorithm for a New Constrained LCS Problem.
Proceedings of the Intelligent Information and Database Systems - 8th Asian Conference, 2016

2015
专家干预下置信规则库参数训练的差分进化算法 (Differential Evolutionary Algorithm for Parameter Training of Belief Rule Base under Expert Intervention).
计算机科学, 2015

A Practical O(R<i>log log</i> n+n) time Algorithm for Computing the Longest Common Subsequence.
CoRR, 2015

An Efficient Dynamic Programming Algorithm for STR-IC-SEQ-EC-LCS Problem.
CoRR, 2015

An efficient dynamic programming algorithm for the generalized LCS problem with multiple substring inclusive constraints.
CoRR, 2015

A Dynamic Programming Algorithm for a Generalized LCS Problem with Multiple Subsequence Inclusion Constraints.
Proceedings of the Internet of Vehicles - Safe and Intelligent Mobility, 2015

An Efficient Dynamic Programming Algorithm for SEQ-IC-SEQ-EC-LCS Problem.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

An Efficient Algorithm for a Generalized LCS Problem.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

2014
An efficient dynamic programming algorithm for the generalized LCS problem with multiple substring exclusive constraints.
J. Discrete Algorithms, 2014

2013
A dynamic programming solution to a generalized LCS problem.
Inf. Process. Lett., 2013

An Efficient Dynamic Programming Algorithm for the Generalized LCS Problem with Multiple Substring Exclusion Constrains
CoRR, 2013

Complete Solutions for a Combinatorial Puzzle in Linear Time.
CoRR, 2013

2012
Differential Privacy Data Release through Adding Noise on Average Value.
Proceedings of the Network and System Security - 6th International Conference, 2012

2010
Speeding up the Algorithms for the Subset-Sum Problem with the Bitset Class.
Proceedings of the 2010 International Conference on Software Engineering Research & Practice, 2010

Utility-based k-anonymization.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2010

2009
An Optimal Algorithm for Prufer Codes.
J. Softw. Eng. Appl., 2009

An Optimal Algorithm for Neville Codes of a Tree Network.
Proceedings of the MSN 2009, 2009

K-Anonymity Based on Sensitive Tuples.
Proceedings of the First International Workshop on Database Technology and Applications, 2009

Privacy Preserving k-Anonymity for Re-publication of Incremental Datasets.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

2008
A Linear Time Algorithm for Coding and Decoding Neville Codes.
Proceedings of the 2008 International Conference on Communications in Computing, 2008

An Efficient Algorithm for the Longest Pattern Subsequence Problem.
Proceedings of the International Conference on Bioinformatics & Computational Biology, 2008


  Loading...