Yong Ding

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2024
Improvement of Frequency Source Phase Noise Reduction Design under Vibration Condition.
CoRR, 2024

2023
MP-DPS: adaptive distributed training for deep learning based on node merging and path prediction.
CCF Trans. High Perform. Comput., December, 2023

An artificial immunity based intrusion detection system for unknown cyberattacks.
Appl. Soft Comput., November, 2023

A Unified NOMA Framework in Beam-Hopping Satellite Communication Systems.
IEEE Trans. Aerosp. Electron. Syst., October, 2023

Benchmarking state-of-the-art imbalanced data learning approaches for credit scoring.
Expert Syst. Appl., 2023

Robust and Accurate Multi-UAV Cooperative Semantic SLAM Leveraging Lightweight YOLO.
Proceedings of the 7th International Symposium on Computer Science and Intelligent Control, 2023

TextObfuscator: Making Pre-trained Language Model a Privacy Protector via Obfuscating Word Representations.
Proceedings of the Findings of the Association for Computational Linguistics: ACL 2023, 2023

2022
Study on the Practical Application of Surface Acoustic Wave Yarn Tension Sensor.
IEEE Trans. Ind. Electron., 2022

Sensitivity Optimization of Surface Acoustic Wave Yarn Tension Sensor Based on Elastic Beam Theory.
Sensors, 2022

TextFusion: Privacy-Preserving Pre-trained Model Inference via Token Fusion.
Proceedings of the 2022 Conference on Empirical Methods in Natural Language Processing, 2022

A Longitudinal Measurement and Analysis of Pink, a Hybrid P2P IoT Botnet.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2022

Message from the Program Co-Chairs: AsiaJCIS 2022.
Proceedings of the 17th Asia Joint Conference on Information Security, 2022

2021
Analysis of Glomerular Filtration Rate in Ischemic Cerebrovascular Diseases under the Magnetic Resonance Angiography Image Segmentation Algorithm.
Sci. Program., 2021

Acquisition and Analysis of Brainwave Signals in Autonomous Systems of Disabled Persons Under the Background of Cloud Technology and Internet of Things.
J. Medical Imaging Health Informatics, 2021

Multiset Canonical Correlations Analysis of Bidimensional Intrinsic Mode Functions for Automatic Target Recognition of SAR Images.
Comput. Intell. Neurosci., 2021

Attribute-Based Searchable Encryption Scheme Supporting Efficient Range Search in Cloud Computing.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021

2020
Mining Semantic Soft Factors for Credit Risk Evaluation in Peer-to-Peer Lending.
J. Manag. Inf. Syst., 2020

The Effects of Interactive Digital Exhibits (IDEs) on Children's Experience in Science Museums.
Proceedings of the Culture and Computing, 2020

Anomaly Detection for Consortium Blockchains Based on Machine Learning Classification Algorithm.
Proceedings of the Computational Data and Social Networks - 9th International Conference, 2020

Stereoscopic Image Quality Assessment
60, Springer, ISBN: 978-981-15-7763-5, 2020

2019
Multi-Objective Power Management for EV Fleet With MMC-Based Integration Into Smart Grid.
IEEE Trans. Smart Grid, 2019

Integrating geographical and temporal influences into location recommendation: a method based on check-ins.
Inf. Technol. Manag., 2019

2018
一种基于Hadoop的关联规则挖掘算法 (Association Rule Mining Algorithm Based on Hadoop).
计算机科学, 2018

A Novel behavioral scoring model for estimating probability of default over time in peer-to-peer lending.
Electron. Commer. Res. Appl., 2018

Loan default prediction by combining soft information extracted from descriptive text in online peer-to-peer lending.
Ann. Oper. Res., 2018

Pedestrian Re-identification Based on Image Enhancement and Over-fitting Solution Strategies.
Proceedings of the 5th International Conference on Systems and Informatics, 2018

AFCoin: A Framework for Digital Fiat Currency of Central Banks Based on Account Model.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

2017
A Lightweight Pseudonym Authentication and Key Agreement Protocol for Multi-medical Server Architecture in TMIS.
KSII Trans. Internet Inf. Syst., 2017

Capturing helpful reviews from social media for product quality improvement: a multi-class classification approach.
Int. J. Prod. Res., 2017

A Multi-Candidate Electronic Voting Scheme with Unlimited Participants.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

2016
NCLAS: a novel and efficient certificateless aggregate signature scheme.
Secur. Commun. Networks, 2016

基于Android平台的图书阅读推荐系统 (Books Recommended Reading System Based on Android).
计算机科学, 2016

遗传算法在公交调度中的应用 (Application of Genetic Algorithm in Public Transit Dispatchers).
计算机科学, 2016

A Joint Random Secret Sharing Scheme with Public Verifiability.
Int. J. Netw. Secur., 2016

Ultralow power processor employing block instruction for ECG applications.
IEICE Electron. Express, 2016

2015
Identifying effective influencers based on trust for electronic word-of-mouth marketing: A domain-aware approach.
Inf. Sci., 2015

2014
Energy-Efficient Locomotive Operation for Chinese Mainline Railways by Fuzzy Predictive Control.
IEEE Trans. Intell. Transp. Syst., 2014

Analyzing market performance via social media: a case study of a banking industry crisis.
Sci. China Inf. Sci., 2014

2011
Adaptive color image watermarking based on the just noticeable distortion model in balanced multiwavelet domain.
J. Electronic Imaging, 2011

Comprehensive Evaluation System and Selection Method of Tax Software.
Comput. Inf. Sci., 2011

On sampling signal strength for localization using a directional antenna.
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011

2010
Solving the minimum bisection problem using a biologically inspired computational model.
Theor. Comput. Sci., 2010

Locomotive Driving Simulator for Multi-objective Train Operation and Movement.
Proceedings of the Information and Automation - International Symposium, 2010

An Cross Layer Algorithm Based on Power Control for Wireless Sensor Networks.
Proceedings of the Information Computing and Applications - International Conference, 2010

2009
Analysis of Two Types Deniable Authentication Protocols.
Int. J. Netw. Secur., 2009

Simulation Algorithm for Energy-Efficient Train Control under Moving Block System.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

2008
Numerical analysis of ultrasonic wire bonding: Part 2. Effects of bonding parameters on temperature rise.
Microelectron. Reliab., 2008

Birkhoff Type 2-Periodic Trigonometric Interpolation in the Family of Trigonometric Polynomial.
Proceedings of the PACIIA 2008, 2008

Integration of Signature Encryption and Key Exchange.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

2007
Evolvable Face Recognition Based on Evolutionary Algorithm and Gabor Wavelet Networks.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

Research on the Evaluation of Enterprises Knowledge Chain Performance Based on D-S Theory.
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007

PLLSim - An Ultra Fast Bang-Bang Phase Locked Loop Simulation Tool.
Proceedings of the 12th Conference on Asia South Pacific Design Automation, 2007

2006
Effects of bonding force on contact pressure and frictional energy in wire bonding.
Microelectron. Reliab., 2006

Joint Sparse Form of Window Three for Koblitz Curve.
Int. J. Netw. Secur., 2006

2005
A two-weight estimate for a class of fractional integral operators with rough kernel.
Int. J. Math. Math. Sci., 2005

A w-NNAF method for the efficient computation of scalar multiplication in elliptic curve cryptography.
Appl. Math. Comput., 2005

2004
Research on automated rollbackability of intrusion response.
J. Comput. Secur., 2004

2003
Intrusion detection system based on fuzzy default logic.
Proceedings of the 12th IEEE International Conference on Fuzzy Systems, 2003


  Loading...