Yong Fang

According to our database1, Yong Fang authored at least 178 papers between 1997 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
A Switchable Deep Learning Approach for In-Loop Filtering in Video Coding.
IEEE Trans. Circuits Syst. Video Techn., 2020

Improper Gaussian Signaling for Integrated Data and Energy Networking.
IEEE Trans. Communications, 2020

Lie Symmetry Analysis of Burgers Equation and the Euler Equation on a Time Scale.
Symmetry, 2020

Special issue on dense surveillance systems for urban traffic.
J. Intell. Transp. Syst., 2020

GPU Accelerated Parallel Algorithm of Sliding-Window Belief Propagation for LDPC Codes.
Int. J. Parallel Program., 2020

Network attack detection and visual payload labeling technology based on Seq2Seq architecture with attention mechanism.
Int. J. Distributed Sens. Networks, 2020

A Cross Entropy Based Deep Neural Network Model for Road Extraction from Satellite Images.
Entropy, 2020

A deep learning-aided temporal spectral ChannelNet for IEEE 802.11p-based channel estimation in vehicular communications.
EURASIP J. Wireless Comm. and Networking, 2020

Performance analysis of a backlight dimming method using weighted mean-square-error based on joint edge-saliency characteristics.
Displays, 2020

Detecting malicious JavaScript code based on semantic analysis.
Comput. Secur., 2020

Symmetry Groups, Similarity Reductions, and Conservation Laws of the Time-Fractional Fujimoto-Watanabe Equation Using Lie Symmetry Analysis Method.
Complexity, 2020

A Machine Learning Based Framework for Identifying Influential Nodes in Complex Networks.
IEEE Access, 2020

Semi-Supervised Malware Clustering Based on the Weight of Bytecode and API.
IEEE Access, 2020

Android Malware Familial Classification Based on DEX File Section Features.
IEEE Access, 2020

A Multifactorial Short-Term Load Forecasting Model Combined With Periodic and Non-Periodic Features - A Case Study of Qingdao, China.
IEEE Access, 2020

MBPANet: Solving Multiple Power Allocation Optimization Problems by a Universal Neural Network Architecture.
Proceedings of the 2020 IEEE International Conference on Communications Workshops, 2020

Depth-First Decoding of Distributed Arithmetic Codes for Uniform Binary Sources.
Proceedings of the Data Compression Conference, 2020

2019
N-Soliton Solutions for the NLS-Like Equation and Perturbation Theory Based on the Riemann-Hilbert Problem.
Symmetry, 2019

Joint Optimization of Interference Coordination Parameters and Base-Station Density for Energy-Efficient Heterogeneous Networks.
Sensors, 2019

Network Attack and Defense Game Theory Based on Bayes-Nash Equilibrium.
KSII Trans. Internet Inf. Syst., 2019

Detection of Moldy Cores in Apples with Near-Infrared Transmission Spectroscopy Based on Wavelet and BP Network.
Int. J. Pattern Recognit. Artif. Intell., 2019

Design of High-Rate Polar-LDGM Codes for Relay Satellite Communications.
IEICE Trans. Commun., 2019

A compact dual-band bandpass filter for 2.4/5.2 GHz WLAN application.
IEICE Electronic Express, 2019

Portfolio selection under uncertainty by the ordered modular average operator.
Fuzzy Optim. Decis. Mak., 2019

RLXSS: Optimizing XSS Detection Model to Defend Against Adversarial Attacks Based on Reinforcement Learning.
Future Internet, 2019

Decoding Polar Codes via Weighted-Window Soft Cancellation for Slowly-Varying Channel.
CoRR, 2019

Lump Solutions and Interaction Solutions for the Dimensionally Reduced Nonlinear Evolution Equation.
Complexity, 2019

Capturing the symptoms of malicious code in electronic documents by file's entropy signal combined with machine learning.
Appl. Soft Comput., 2019

Efficient Representation of Head-Related Transfer Functions With Combination of Spherical Harmonics and Spherical Wavelets.
IEEE Access, 2019

A Bi-Layer Multi-Time Coordination Method for Optimal Generation and Reserve Schedule and Dispatch of a Grid-Connected Microgrid.
IEEE Access, 2019

Phishing Email Detection Using Improved RCNN Model With Multilevel Vectors and Attention Mechanism.
IEEE Access, 2019

Analyzing and Identifying Data Breaches in Underground Forums.
IEEE Access, 2019

Video-Based Vehicle Counting Framework.
IEEE Access, 2019

Energy Efficiency Analysis of FeICIC in Dense Heterogeneous Networks.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

Accelerating Q-ary Sliding-Window Belief Propagation Algorithm with GPU.
Proceedings of the IoT as a Service - 5th EAI International Conference, 2019

Wyner-Ziv Video Coding for Highway Traffic Surveillance Using LDPC Codes.
Proceedings of the IoT as a Service - 5th EAI International Conference, 2019

Unequally Weighted Sliding-Window Belief Propagation for Binary LDPC Codes.
Proceedings of the IoT as a Service - 5th EAI International Conference, 2019

Sliding-Window Belief Propagation with Unequal Window Size for Nonstationary Heterogeneous Source.
Proceedings of the IoT as a Service - 5th EAI International Conference, 2019

Against Malicious SSL/TLS Encryption: Identify Malicious Traffic Based on Random Forest.
Proceedings of the Fourth International Congress on Information and Communication Technology, 2019

Network Attack and Defense Effectiveness Evaluation Based on Dematel Method.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

An Effective Sparse Representation Approach for Wireless Channels Based on the Modified Takenaka-Malmquist Basis.
Proceedings of the 5th International Conference on Big Data Computing and Communications, 2019

2018
Low-Latency Multiuser Two-Way Wireless Relaying for Spectral and Energy Efficiencies.
IEEE Trans. Signal Process., 2018

Two-Step Spherical Harmonics ESPRIT-Type Algorithms and Performance Analysis.
IEEE ACM Trans. Audio Speech Lang. Process., 2018

Performance analysis of Low-complexity MVDR beamformer in spherical harmonics domain.
Signal Process., 2018

Indoor Positioning Based on Bluetooth Low-Energy Beacons Adopting Graph Optimization.
Sensors, 2018

Energy Efficient Pico Cell Range Expansion and Density Joint Optimization for Heterogeneous Networks with eICIC.
Sensors, 2018

MACSPMD: 基于恶意API调用序列模式挖掘的恶意代码检测 (MACSPMD: Malicious API Call Sequential Pattern Mining Based Malware Detection).
计算机科学, 2018

Fuzzy Views on Black-Litterman Portfolio Selection Model.
J. Syst. Sci. Complex., 2018

Energy Efficient Base Station Density Analysis for Heterogeneous Networks with eICIC.
J. Commun., 2018

Novel Discriminative Method for Illegal Parking and Abandoned Objects.
JACIII, 2018

Majorization-Minimization-Based Sparse Signal Recovery Method Using Prior Support and Amplitude Information for the Estimation of Time-varying Sparse Channels.
KSII Trans. Internet Inf. Syst., 2018

Graphene frequency tripler design using reflector networks.
IEICE Electronic Express, 2018

2-D DOA tracking using variational sparse Bayesian learning embedded with Kalman filter.
EURASIP J. Adv. Signal Process., 2018

A Weighted K-SVD-Based Double Sparse Representations Approach for Wireless Channels Using the Modified Takenaka-Malmquist Basis.
IEEE Access, 2018

Improving Decoupled Spherical Harmonics ESPRIT Using Structured Least Squares.
IEEE Access, 2018

Research on Malicious JavaScript Detection Technology Based on LSTM.
IEEE Access, 2018

A Deep Reinforcement Learning Method for Self-driving.
Proceedings of the Intelligent Computing Theories and Application, 2018

WOVSQLI: Detection of SQL Injection Behaviors Using Word Vector and LSTM.
Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, 2018

DarkHunter: A Fingerprint Recognition Model for Web Automated Scanners Based on CNN.
Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, 2018

Detecting Webshell Based on Random Forest with FastText.
Proceedings of the 2018 International Conference on Computing and Artificial Intelligence, 2018

DeepXSS: Cross Site Scripting Detection Based on Deep Learning.
Proceedings of the 2018 International Conference on Computing and Artificial Intelligence, 2018

Webshell Detection Based on Random Forest-Gradient Boosting Decision Tree Algorithm.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

Secure Noise-and-Forward Relaying with Polar Codes.
Proceedings of the Communications, Signal Processing, and Systems, 2018

Optimal Design of S Band with Graphene Frequency Multiplier.
Proceedings of the Communications, Signal Processing, and Systems, 2018

2017
Pilot Optimization for Estimation of High-Mobility OFDM Channels.
IEEE Trans. Veh. Technol., 2017

Some New Results About Sufficient Conditions for Exact Support Recovery of Sparse Signals via Orthogonal Matching Pursuit.
IEEE Trans. Signal Process., 2017

Two-Stage Decoupled DOA Estimation Based on Real Spherical Harmonics for Spherical Arrays.
IEEE ACM Trans. Audio Speech Lang. Process., 2017

Unitary transformations for spherical harmonics MUSIC.
Signal Process., 2017

Joint Optimization of Parameters for Enhanced Inter-Cell Interference Coordination (eICIC) in LTE-A HetNets.
IEICE Trans. Commun., 2017

Energy-efficient precoding in multicell networks with full-duplex base stations.
EURASIP J. Wireless Comm. and Networking, 2017

EM-based parameter iterative approach for sparse Bayesian channel estimation of massive MIMO system.
EURASIP J. Wireless Comm. and Networking, 2017

Gossip: Automatically Identifying Malicious Domains from Mailing List Discussions.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
Graphics processing unit-accelerated joint-bitplane belief propagation algorithm in DSC.
J. Supercomput., 2016

Analysis on Tailed Distributed Arithmetic Codes for Uniform Binary Sources.
IEEE Trans. Communications, 2016

Hamming Distance Spectrum of DAC Codes for Equiprobable Binary Sources.
IEEE Trans. Communications, 2016

Real-valued DOA estimation for spherical arrays using sparse Bayesian learning.
Signal Process., 2016

3D sparse signal recovery via 3D orthogonal matching pursuit.
J. Syst. Archit., 2016

Estimation of NON-WSSUS Channel for OFDM System: Exploiting Support Correlations through a Novel Adaptive Weighted Predict-Re-Estimate L1 Minimization.
J. Commun., 2016

Real-valued MVDR beamforming using spherical arrays with frequency invariant characteristic.
Digit. Signal Process., 2016

A study on Web security incidents in China by analyzing vulnerability disclosure platforms.
Comput. Secur., 2016

2015
Road scene perception based on fisheye camera, LIDAR and GPS data combination. (Perception de la route par combinaison des données caméra fisheye, Lidar et GPS).
PhD thesis, 2015

The current status and systematic framework of talent programmes in basic research in China: a system theory perspective.
Techn. Analysis & Strat. Manag., 2015

Classification of Ultra-High Resolution Orthophotos Combined with DSM Using a Dual Morphological Top Hat Profile.
Remote. Sens., 2015

Analysis and design of rectangular waveguide to substrate integrated waveguide transition with voltage and current probe in W-band.
IEICE Electronic Express, 2015

Power allocation for OFDM system in a high-speed train environment.
Proceedings of the 26th IEEE Annual International Symposium on Personal, 2015

Video and LIDAR Based Object Tracking Using Small-Region Growth.
Proceedings of the IEEE 18th International Conference on Intelligent Transportation Systems, 2015

A New Static Detection Method of Malicious Document Based on Wavelet Package Analysis.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015

A framework for privacy information protection on Android.
Proceedings of the International Conference on Computing, Networking and Communications, 2015

Data rate maximization based power allocation for OFDM System in a high-speed train environment.
Proceedings of the 2015 IEEE Global Conference on Signal and Information Processing, 2015

Parallel Overlapping Mechanism Between Communication and Computation of the Lattice Boltzmann Method.
Proceedings of the High Performance Computing and Applications, 2015

Codebook Cardinality Spectrum of Distributed Arithmetic Codes for Nonuniform Binary Sources.
Proceedings of the Computer Vision - CCF Chinese Conference, 2015

2014
Accelerating 2D orthogonal matching pursuit algorithm on GPU.
J. Supercomput., 2014

Improved Binary DAC Codec with Spectrum for Equiprobable Sources.
IEEE Trans. Communications, 2014

Frobenius integrable decompositions of nonlinear evolution equations with modified term.
Appl. Math. Comput., 2014

Multisensor Based Obstacles Detection in Challenging Scenes.
Proceedings of the Human-Inspired Computing and Its Applications, 2014

Resource management with multilevel interference mitigation in heterogeneous network.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2014

Extrinsic Calibration between 2D Laser Range Finder and Fisheye Camera.
Proceedings of the Advances in Visual Computing - 10th International Symposium, 2014

Multi-agent Intrusion Detection System Using Feature Selection Approach.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

Road Detection Using Fisheye Camera and Laser Range Finder.
Proceedings of the Image and Signal Processing - 6th International Conference, 2014

Extraction of Product Information Object for Trustworthiness.
Proceedings of the 11th IEEE International Conference on e-Business Engineering, 2014

2013
Asymmetric Slepian-Wolf Coding of Nonstationarily-Correlated M-ary Sources with Sliding-Window Belief Propagation.
IEEE Trans. Communications, 2013

DAC Spectrum of Binary Sources with Equally-Likely Symbols.
IEEE Trans. Communications, 2013

Parallel design for error-resilient entropy coding algorithm on GPU.
J. Parallel Distributed Comput., 2013

Power Minimization for OFDM Transmission with Subcarrier-Pair Based Opportunistic DF Relaying.
IEEE Communications Letters, 2013

Novel subcarrier-pair based opportunistic DF protocol for cooperative downlink OFDMA.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

A method for pico-specific upper bound CRE bias setting in HetNet.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference Workshops, 2013

Can Representation Bias Help the Returns Forecast and Portfolio Selection?
Proceedings of the First International Conference on Information Technology and Quantitative Management, 2013

A BEM method of channel estimation for OFDM systems in high-speed train environment.
Proceedings of the International Workshop on High Mobility Wireless Communications, 2013

Website Regional Rapid Security Detection Method.
Proceedings of the Fifth International Conference on Computational Intelligence, 2013

2012
LDPC-Based Lossless Compression of Nonstationary Binary Sources Using Sliding-Window Belief Propagation.
IEEE Trans. Communications, 2012

Application for deinterlacing method using edge direction classification and fuzzy inference system.
Multim. Tools Appl., 2012

2D sparse signal recovery via 2D orthogonal matching pursuit.
Sci. China Inf. Sci., 2012

Personalized Travel Service Discovery and Usage in Cloud Environment.
Proceedings of the Ninth IEEE International Conference on e-Business Engineering, 2012

CloudExplorer: A User-Centered Cloud Browser for Cloud Services.
Proceedings of the Ninth IEEE International Conference on e-Business Engineering, 2012

Revenue Sharing Contract Based on Supply Chain Finance.
Proceedings of the Fifth International Conference on Business Intelligence and Financial Engineering, 2012

Impact of Administrative Appointment on the Executive's Management Capacity of Monopoly SOE.
Proceedings of the Fifth International Conference on Business Intelligence and Financial Engineering, 2012

2011
Influence of Perceived Risk and Service Recovery on On-Line Shopping: A Dynamic Game of Incomplete Information.
Proceedings of the Modeling Risk Management in Sustainable Construction, 2011

Sparse Matrix Recovery from Random Samples via 2D Orthogonal Matching Pursuit
CoRR, 2011

Analysis on crossover probability estimation using LDPC syndrome.
Sci. China Inf. Sci., 2011

GPU Implementation of Orthogonal Matching Pursuit for Compressive Sensing.
Proceedings of the 17th IEEE International Conference on Parallel and Distributed Systems, 2011

2010
EREC-Based Length Coding of Variable-Length Data Blocks.
IEEE Trans. Circuits Syst. Video Techn., 2010

Morphological dilation image coding with context weights prediction.
Signal Process. Image Commun., 2010

Joint Source-Channel Estimation Using Accumulated LDPC Syndrome.
IEEE Communications Letters, 2010

Application of DAC Codeword Spectrum: Expansion Factor
CoRR, 2010

Approximation of DAC Codeword Distribution for Equiprobable Binary Sources along Proper Decoding Paths
CoRR, 2010

A Multi-Descriptor, Multi-Nearest Neighbor Approach for Image Classification.
Proceedings of the Advanced Intelligent Computing Theories and Applications, 2010

2009
State-Information-Assisting EREC.
IEEE Signal Process. Lett., 2009

Distribution of Distributed Arithmetic Codewords for Equiprobable Binary Sources.
IEEE Signal Process. Lett., 2009

Correlation parameter estimation for LDPC-based slepian-wolf coding.
IEEE Communications Letters, 2009

Crossover probability estimation using mean-intrinsic-LLR of LDPC syndrome.
IEEE Communications Letters, 2009

Rate-adaptive compression of LDPC syndromes for Slepian-Wolf coding.
Proceedings of the 2009 Picture Coding Symposium, 2009

Video Deinterlacing Algorithm Based on Fuzzy Reasoning with Angle Extraction Approach.
Proceedings of the New Directions in Intelligent Interactive Multimedia Systems and Services, 2009

Blind Separation of Convolutive Mixed Source Signals by Using Robust Nonnegative Matrix Factorization.
Proceedings of the Fifth International Conference on Natural Computation, 2009

A Portfolio Optimization Model with Fuzzy Liquidity Constrains.
Proceedings of the Second International Joint Conference on Computational Sciences and Optimization, 2009

The Implementation of the Web Mining Based on XML Technology.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

An Improved Bytecode Verification Algorithm on Java Card.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

2008
A mixed R&D projects and securities portfolio selection model.
Eur. J. Oper. Res., 2008

Error detection based on MB types.
Sci. China Ser. F Inf. Sci., 2008

The Analysis of Propagation Model for Internet Worm Based on Active Vaccination.
Proceedings of the Fourth International Conference on Natural Computation, 2008

The relationships between two kinds of OWA operator determination methods.
Proceedings of the FUZZ-IEEE 2008, 2008

Fuzzy Multi-Objective Order Allocation Model for Risk Management in a Supply Chain.
Proceedings of the Second Asia International Conference on Modelling and Simulation, 2008

2007
Achieving Optimal Performance by Using the IEEE 802.11 MAC Protocol With Service Differentiation Enhancements.
IEEE Trans. Veh. Technol., 2007

Video transmission using advanced partial backward decodable bit stream (APBDBS).
J. Vis. Commun. Image Represent., 2007

A. Asonuma, Y. Fang and R. Rousseau, "Reflections on the age distribution of Japanese scientists". <i>Journal of the American Society for Information Science and Technology</i> 57(3) 2006, 342-346.
J. Assoc. Inf. Sci. Technol., 2007

An Feasible Key Management Scheme in Ad Hoc Network.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

Block-Interleaved Error-Resilient Entropy Coding.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2007), 2007

A Geometric Initialization Algorithm for Blind Separation of Speech Signals.
Proceedings of the Third International Conference on Natural Computation, 2007

VLR-Based Optimal Positioning of Resynchronization Markers.
Proceedings of the 2007 Data Compression Conference (DCC 2007), 2007

A Novel Authentication Scheme Based on Trust-value Updated Model in Adhoc Network.
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007

Spatio-temporal Information-Based Simple Deinterlacing Algorithm.
Proceedings of the Advanced Concepts for Intelligent Vision Systems, 2007

Improved Algorithm of Error-Resilient Entropy Coding Using State Information.
Proceedings of the Advanced Concepts for Intelligent Vision Systems, 2007

2006
Bi-directional error-resilient entropy coding (BEREC).
Signal Process. Image Commun., 2006

Reflections on the age distribution of Japanese scientists.
J. Assoc. Inf. Sci. Technol., 2006

Portfolio rebalancing model with transaction costs based on fuzzy decision theory.
Eur. J. Oper. Res., 2006

News video story segmentation.
Proceedings of the 12th International Conference on Multi Media Modeling (MMM 2006), 2006

Wavelets Based Neural Network for Function Approximation.
Proceedings of the Advances in Neural Networks - ISNN 2006, Third International Symposium on Neural Networks, Chengdu, China, May 28, 2006

A Contourlet Transform Based Fusion Algorithm for Nighttime Driving Image.
Proceedings of the Fuzzy Systems and Knowledge Discovery, Third International Conference, 2006

An Interval Semi-absolute Deviation Model For Portfolio Selection.
Proceedings of the Fuzzy Systems and Knowledge Discovery, Third International Conference, 2006

2005
Nonlinear dynamical systems control using a new RNN temporal learning strategy.
IEEE Trans. Circuits Syst. II Express Briefs, 2005

A new general framework for shot boundary detection and key-frame extraction.
Proceedings of the 7th ACM SIGMM International Workshop on Multimedia Information Retrieval, 2005

Individual Dimension Gaussian Mixture Model for Speaker Identification.
Proceedings of the Advances in Biometric Person Authentication, 2005

A Robust 3D Feature-Based People Stereo Tracking Algorithm.
Proceedings of the Advances in Intelligent Computing, 2005

A Fuzzy Index Tracking Portfolio Selection Model.
Proceedings of the Computational Science, 2005

A Fuzzy Mixed Projects and Securities Portfolio Selection Model.
Proceedings of the Fuzzy Systems and Knowledge Discovery, Second International Conference, 2005

Shot Boundary Detection Based on SVM and TMRA.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

Fast Mode Decision for H.264/AVC Based on Macroblock Correlation.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

2003
A Fuzzy Approach to Portfolio Rebalancing with Transaction Costs.
Proceedings of the Computational Science - ICCS 2003, 2003

2002
A class of linear interval programming problems and its application to portfolio selection.
IEEE Trans. Fuzzy Syst., 2002

2001
Lattices in citation networks: An investigation into the structure of citation graphs.
Scientometrics, 2001

2000
A real-time learning control approach for nonlinear continuous-time system using recurrent neural networks.
IEEE Trans. Ind. Electron., 2000

Synthesis of the sliding-mode neural network controller for unknown nonlinear discrete-time systems.
Int. J. Syst. Sci., 2000

Two-dimensional learning strategy for multilayer feedforward neural network.
Neurocomputing, 2000

1999
Blind equalization of a noisy channel by linear neural network.
IEEE Trans. Neural Networks, 1999

Linear neural network based blind equalization.
Signal Process., 1999

1998
A recurrent neural-network-based real-time learning control strategy applying to nonlinear systems with unknown dynamics.
IEEE Trans. Ind. Electron., 1998

Iterative Learning Control of Linear Discrete-Time Multivariable Systems.
Autom., 1998

Chattering free sliding mode control based on recurrent neural network.
Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, 1998

1997
Neural network adative wavelets for function approximation.
Proceedings of the ESANN 1997, 1997


  Loading...