Yitao Yang

According to our database1, Yitao Yang authored at least 31 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Accuracy analysis for machine tool spindles considering full parallel connections and form errors based on skin model shapes.
J. Comput. Des. Eng., September, 2023

Self-Organizing Network and Adaptive Scheduling Mechanism in 5G Wireless Networks.
Proceedings of the 2023 International Conference on Power, 2023

A Lightweight and Efficient Model for Audio Anti-Spoofing.
Proceedings of the ACM Multimedia Asia 2023, 2023

Adaptive Gating in Mixture-of-Experts based Language Models.
Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing, 2023

2022
ConvNext Based Neural Network for Anti-Spoofing.
CoRR, 2022

Towards Dual-Modal Crowd Density Forecasting in Transportation Building.
Proceedings of the International Joint Conference on Neural Networks, 2022

Multi-View Federated Learning with Data Collaboration.
Proceedings of the ICMLC 2022: 14th International Conference on Machine Learning and Computing, Guangzhou, China, February 18, 2022

2021
Analysis of the Current Situation and Characteristics of College Student "Online Fraud Cases".
Int. J. Mob. Comput. Multim. Commun., 2021

Identifying intracity freight trip ends from heavy truck GPS trajectories.
CoRR, 2021

2020
Collective transfer learning for defect prediction.
Neurocomputing, 2020

Trusted Records Scheme in Scene Investigation.
Proceedings of the Advances in Networked-Based Information Systems, 2020

Design of In-depth Security Protection System of Integrated Intelligent Police Cloud.
Proceedings of the Advances on P2P, Parallel, Grid, Cloud and Internet Computing, 2020

2019
Multiview Transfer Learning for Software Defect Prediction.
IEEE Access, 2019

DAD-MCNN: DDoS Attack Detection via Multi-channel CNN.
Proceedings of the 2019 11th International Conference on Machine Learning and Computing, 2019

Chinese Spam Data Filter Model in Mobile Internet.
Proceedings of the 21st International Conference on Advanced Communication Technology, 2019

2017
Exit times for the diffusion risk model with debit interest.
Int. J. Syst. Assur. Eng. Manag., 2017

A security carving approach for AVI video based on frame size and index.
Multim. Tools Appl., 2017

A Spam Message Detection Model Based on Bayesian Classification.
Proceedings of the Advances in Internetworking, 2017

Spam Mail Filtering Method Based on Suffix Tree.
Proceedings of the Advances in Internetworking, 2017

2016
LIPPS: Logistics Information Privacy Protection System Based on Encrypted QR Code.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

A Security Proxy Scheme Based on Attribute Node Mapping for Cloud Storage.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016

DFIPS: Toward Distributed Flexible Intrusion Prevention System in Software Defined Network.
Proceedings of the 28th International Conference on Software Engineering and Knowledge Engineering, 2016

A Demonstration of Encrypted Logistics Information System.
Proceedings of the Web Technologies and Applications - 18th Asia-Pacific Web Conference, 2016

2015
Dump and analysis of Android volatile memory on Wechat.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

2014
A privacy protection policy combined with privacy homomorphism in the Internet of Things.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014

Topic Detection from Microblog Based on Text Clustering and Topic Model Analysis.
Proceedings of the 2014 Asia-Pacific Services Computing Conference, 2014

2013
Data Deduplication in Wireless Multimedia Monitoring Network.
Int. J. Distributed Sens. Networks, 2013

2010
Positive solutions of the singular semipositone boundary value problem on time scales.
Math. Comput. Model., 2010

2009
Robust mixed H2/H∞ Control for uncertain Systems with Time delay.
Control. Intell. Syst., 2009

2008
Triple positive pseudo-symmetric solutions to a four-point boundary value problem with p-Laplacian.
Appl. Math. Lett., 2008

2007
The existence of symmetric positive solutions for Sturm-Liouville-like four-point boundary value problem with a p-Laplacian operator.
Appl. Math. Comput., 2007


  Loading...