Yong Gan

Orcid: 0000-0003-3231-5528

According to our database1, Yong Gan authored at least 70 papers between 2006 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A survey of few-shot knowledge graph completion.
J. Intell. Fuzzy Syst., October, 2023

Handwritten CAPTCHA recognizer: a text CAPTCHA breaking method based on style transfer network.
Multim. Tools Appl., April, 2023

2022
Verifier-local revocation group signatures with backward unlinkability from lattices.
Frontiers Inf. Technol. Electron. Eng., 2022

Adaptive Propagation Graph Convolutional Networks Based on Attention Mechanism.
Inf., 2022

Chinese Named Entity Recognition Based on BERT and Lightweight Feature Extraction Model.
Inf., 2022

2021
A Novel Privacy-Preserving Authentication Protocol Using Bilinear Pairings for the VANET Environment.
Wirel. Commun. Mob. Comput., 2021

A Lightweight and Secure Anonymous User Authentication Protocol for Wireless Body Area Networks.
Secur. Commun. Networks, 2021

Research on Lightweight Mutual Authentication for the Product Authorization Chain.
Secur. Commun. Networks, 2021

An asymmetric group key agreement protocol based on attribute threshold for Internet of Things.
Trans. Emerg. Telecommun. Technol., 2021

2020
The Group Key Agreement Protocol Based on Multi-Dimensional Virtual Permutation.
IEEE Commun. Lett., 2020

Blockchain-based asymmetric group key agreement protocol for internet of vehicles.
Comput. Electr. Eng., 2020

Temperature Estimation of Lithium-Ion Battery Based on an Improved Magnetic Nanoparticle Thermometer.
IEEE Access, 2020

Research on Migration Risk of Island Countries Based on Neural Network.
Proceedings of the CSAE 2020: The 4th International Conference on Computer Science and Application Engineering, 2020

2019
Traffic Simulation and Visual Verification in Smog.
ACM Trans. Intell. Syst. Technol., 2019

Access Control Based on Ciphertext Attribute Authentication and Threshold Policy for the Internet of Things.
Sensors, 2019

非正面人脸表情识别方法综述 (Survey on Non-frontal Facial Expression Recognition Methods).
计算机科学, 2019

带TTP的多所有者内部权重变化所有权转换协议 (Ownership Transfer Protocol for Multi-owners Internal Weight Changes with Trusted Third Party).
计算机科学, 2019

Efficient multiview video plus depth coding for 3D-HEVC based on complexity classification of the treeblock.
J. Real Time Image Process., 2019

Efficient fuzzy identity-based signature from lattices for identities in a small (or large) universe.
J. Inf. Secur. Appl., 2019

A Complexity Reduction Scheme for Depth Coding in 3D-HEVC.
Inf., 2019

An authenticated hierarchical asymmetric group key agreement protocol based on identity.
Int. J. Embed. Syst., 2019

IP Geolocation based on identification routers and local delay distribution similarity.
Concurr. Comput. Pract. Exp., 2019

A localization and tracking scheme for target gangs based on big data of Wi-Fi locations.
Clust. Comput., 2019

Group Key Agreement Protocol Based on Privacy Protection and Attribute Authentication.
IEEE Access, 2019

Blockchain-Based Asymmetric Group Key Agreement Protocol for Mobile Ad Hoc Network.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2019

Wind Power Curve Data Cleaning Algorithm via Image Thresholding<sup>∗</sup>.
Proceedings of the 2019 IEEE International Conference on Robotics and Biomimetics, 2019

2018
An Authentication Key Establish Protocol for WSNs Based on Combined Key.
Wirel. Pers. Commun., 2018

一种全新的RFID标签所有权转移协议 (New Ownership Transfer Protocol of RFID Tag).
计算机科学, 2018

An authenticated asymmetric group key agreement based on attribute encryption.
J. Netw. Comput. Appl., 2018

Geolocating a WeChat user based on the relation between reported and actual distance.
Int. J. Distributed Sens. Networks, 2018

A Dynamic and Cross-Domain Authentication Asymmetric Group Key Agreement in Telemedicine Application.
IEEE Access, 2018

Fuzzy Identity-Based Signature from Lattices for Identities in a Large Universe.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Attribute-Based VLR Group Signature Scheme from Lattices.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

Efficient Lattice FIBS for Identities in a Small Universe.
Proceedings of the Frontiers in Cyber Security - First International Conference, 2018

An Improved Distributed File System Based on GPU Acceleration.
Proceedings of the 17th IEEE/ACIS International Conference on Computer and Information Science, 2018

2017
Fast inter-prediction mode decision algorithm for HEVC.
Signal Image Video Process., 2017

Fast intra mode decision for depth coding in 3D-HEVC.
Multidimens. Syst. Signal Process., 2017

Fast depth map mode decision based on depth-texture correlation and edge classification for 3D-HEVC.
J. Vis. Commun. Image Represent., 2017

MultiP-Apo: A Multilabel Predictor for Identifying Subcellular Locations of Apoptosis Proteins.
Comput. Intell. Neurosci., 2017

IP Geolocation Base on Local Delay Distribution Similarity.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

A WeChat User Geolocating Algorithm Based on the Relation Between Reported and Actual Distance.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

2016
Fast motion and disparity estimation for HEVC based 3D video coding.
Multidimens. Syst. Signal Process., 2016

Pseudonym-based Privacy Protection Scheme for Participatory Sensing with Incentives.
KSII Trans. Internet Inf. Syst., 2016

An efficient depth map filtering based on spatial and texture features for 3D video coding.
Neurocomputing, 2016

2015
An active contour model based on fused texture features for image segmentation.
Neurocomputing, 2015

Perceptual image quality assessment by independent feature detector.
Neurocomputing, 2015

Low-complexity depth map compression in HEVC-based 3D video coding.
EURASIP J. Image Video Process., 2015

Fast mode decision algorithm for 3D-HEVC encoding optimization based on depth information.
Digit. Signal Process., 2015

Implementation of Leaf Image Recognition System Based on LBP and B/S Framework.
Proceedings of the Intelligent Computing Theories and Methodologies, 2015

Implementation of Plant Leaf Recognition System on ARM Tablet Based on Local Ternary Pattern.
Proceedings of the Intelligent Computing Theories and Methodologies, 2015

Hybrid Deep Learning for Plant Leaves Classification.
Proceedings of the Intelligent Computing Theories and Methodologies, 2015

Plant Leaf Recognition Based on Contourlet Transform and Support Vector Machine.
Proceedings of the Intelligent Computing Theories and Methodologies, 2015

2014
Intra Mode Selection for Depth Map Coding in 3D-HEVC.
Smart Comput. Rev., 2014

Early SKIP mode decision for three-dimensional high efficiency video coding using spatial and interview correlations.
J. Electronic Imaging, 2014

Energy Efficiency of Hybrid Cellular With Heterogeneous QoS Provisions.
IEEE Commun. Lett., 2014

Completed hybrid local binary pattern for texture classification.
Proceedings of the 2014 International Joint Conference on Neural Networks, 2014

Enhanced Local Ternary Pattern for Texture Classification.
Proceedings of the Intelligent Computing Theory - 10th International Conference, 2014

Plant Leaf Recognition Using Histograms of Oriented Gradients.
Proceedings of the Intelligent Computing Methodologies - 10th International Conference, 2014

A New Local Binary Pattern in Texture Classification.
Proceedings of the Intelligent Computing Theory - 10th International Conference, 2014

Extract Features Using Stacked Denoised Autoencoder.
Proceedings of the Intelligent Computing in Bioinformatics - 10th International Conference, 2014

2013
Sparse Feature Fidelity for Perceptual Image Quality Assessment.
IEEE Trans. Image Process., 2013

2012
A hybrid method for integrated atomistic-continuum simulation of ultrashort-pulsed laser interaction with semiconductors.
Comput. Phys. Commun., 2012

2011
A Novel PSO Algorithm Based on Local Chaos & Simplex Search Strategy and its Application.
J. Softw., 2011

2010
Web Services Security Based on XML Signature and XML Encryption.
J. Networks, 2010

Motion Controller for Autonomous Underwater Vehicle Based on Parallel Neural Network.
J. Digit. Content Technol. its Appl., 2010

An Object Region Extraction Approach Based on Interest Pixel Detection and Inner Filling Strategy.
Proceedings of the 2010 International Conference on Machine Vision and Human-machine Interface, 2010

2009
A Method of In-Depth-Defense for Network Security Based on Immunity Principles.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2009

A Simple Vehicle Segmentation Approach for Intelligent Transportation System.
Proceedings of the 2009 International Conference on Digital Image Processing, 2009

A Model of Intrusion Prevention Base on Immune.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2006
Motion Control System of Underwater Robot without Rudder and Wing.
Proceedings of the 2006 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2006


  Loading...