Yong Tang

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2024
AllSpark: a multimodal spatiotemporal general model.
CoRR, 2024

2023
Can Video as a Service Paradigm Lead to the Future Internet of Video Things?
Computer, November, 2023

Multi-MEC collaboration for VR video transmission: Architecture and cache algorithm design.
Comput. Networks, October, 2023

Robust periodic blind watermarking based on sub-block mapping and block encryption.
Expert Syst. Appl., August, 2023

Collaborative Intelligent Confident Information Coverage Node Sleep Scheduling for 6G-Empowered Green IoT.
IEEE Trans. Green Commun. Netw., June, 2023

Road-Side Individual Tree Segmentation from Urban MLS Point Clouds Using Metric Learning.
Remote. Sens., April, 2023

A rapid diffusion simulation method of multiple-fluid coupling combined with MPM and PFM.
Comput. Animat. Virtual Worlds, 2023

Customer characteristics analysis method based on the selection of electricity consumption characteristics and behavioral portraits of different groups of people.
J. Intell. Fuzzy Syst., 2023

Improving diagnosis accuracy of non-small cell lung carcinoma on noisy data by adaptive group lasso regularized multinomial regression.
Biomed. Signal Process. Control., 2023

VulHawk: Cross-architecture Vulnerability Detection with Entropy-based Binary Code Search.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

A Convolutional Neural Network Based Calibration Scheme for Pipelined ADC.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2023

Applying Binary Code Similarity Detection on Acceleration Processor.
Proceedings of the 4th International Conference on Computer Engineering and Intelligent Control, 2023

Ultra Real-Time Portrait Matting via Parallel Semantic Guidance.
Proceedings of the IEEE International Conference on Acoustics, 2023

PFKMaster: A Knowledge-Driven Flow Control System for Large-Scale Power Grid.
Proceedings of the Database Systems for Advanced Applications, 2023

Cooperative Spectrum Sensing Method against Spectrum Sensing Data Falsification Attack.
Proceedings of the 24st Asia-Pacific Network Operations and Management Symposium, 2023

2022
Prior-Induced Information Alignment for Image Matting.
IEEE Trans. Multim., 2022

Particle-Based Calculation and Visualization of Protein Cavities Using SES Models.
IEEE J. Biomed. Health Informatics, 2022

Reducing power grid cascading failure propagation by minimizing algebraic connectivity in edge addition.
Frontiers Inf. Technol. Electron. Eng., 2022

Attention based gender and nationality information exploration for speaker identification.
Digit. Signal Process., 2022

Privileged Prior Information Distillation for Image Matting.
CoRR, 2022

Label Mask AutoEncoder(L-MAE): A Pure Transformer Method to Augment Semantic Segmentation Datasets.
CoRR, 2022

Crowdsourced Testing Task Assignment based on Knowledge Graphs.
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022

Multi-MEC Cooperation Based VR Video Transmission and Cache Using K-Shortest Paths Optimization.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking and Services, 2022

Situational Perception Guided Image Matting.
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022

Node Deployment and Confident Information Coverage for WSN-based Air Quality Monitoring.
Proceedings of the 2022 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2022

Balanced and Hierarchical Relation Learning for One-shot Object Detection.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

2021
A homogenization method for nonlinear inhomogeneous elastic materials.
Virtual Real. Intell. Hardw., 2021

A Study on Soft Material Parameter Determination by Iterative Force-Displacement Curve Fitting.
IEEE Robotics Autom. Lett., 2021

Compliant Fins for Locomotion in Granular Media.
IEEE Robotics Autom. Lett., 2021

Evaluation of an Information Flow Gain Algorithm for Microsensor Information Flow in Limber Motor Rehabilitation.
Complex., 2021

Sparse Subspace Clustering for Stream Data.
IEEE Access, 2021

HashMTI: Scalable Mutation-based Taint Inference with Hash Records.
Proceedings of the 28th IEEE International Conference on Software Analysis, 2021

XHunter: Understanding XXE Vulnerability via Automatic Analysis.
Proceedings of the Security and Privacy in Communication Networks, 2021

Acoustic Scene Classification Based on Sparse Coding and Convolutional Neural Networks.
Proceedings of the 7th IEEE International Conference on Network Intelligence and Digital Content, 2021

Tripartite Information Mining and Integration for Image Matting.
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021

Service Deployment and Service Request Optimization Scheduling in MEC enabled LEO Networks.
Proceedings of the 30th International Conference on Computer Communications and Networks, 2021

2020
Research on Optimization of Charging Strategy Control for Aged Batteries.
IEEE Trans. Veh. Technol., 2020

Real-time LCC-HVDC Maximum Emergency Power Capacity Estimation Based on Local PMU Measurements.
CoRR, 2020

An Adaptive MMC Synchronous Stability Control Method Based on Local PMU measurements.
CoRR, 2020

Effects of Friction Anisotropy on Upward Burrowing Behavior of Soft Robots in Granular Materials.
Adv. Intell. Syst., 2020

A Deep-Reinforcement-Learning-Based Optimization Approach for Real-Time Scheduling in Cloud Manufacturing.
IEEE Access, 2020

Identifying Potential miRNA-Disease Associations Based on an Improved Manifold Learning Framework.
IEEE Access, 2020

A fast capacity estimation method for lithium-ion battery based on ICA method.
Proceedings of the 46th Annual Conference of the IEEE Industrial Electronics Society, 2020

Remaining Discharge Capacity Online Estimation for Lithium-Ion Batteries Under Variable Load Current Conditions.
Proceedings of the 46th Annual Conference of the IEEE Industrial Electronics Society, 2020

Multi UAV Target Tracking Based on the Vision and Communication Information.
Proceedings of the Cognitive Systems and Signal Processing - 5th International Conference, 2020

Thermal Failure Analysis of IGBT Based on Collector Leakage Current.
Proceedings of the EITCE 2020: 4th International Conference on Electronic Information Technology and Computer Engineering, Xiamen, China, 6 November, 2020, 2020

Transient Characteristic Analysis of IGBT Voltage Breakdown Failure.
Proceedings of the EITCE 2020: 4th International Conference on Electronic Information Technology and Computer Engineering, Xiamen, China, 6 November, 2020, 2020

Mechanism Analysis and Experimental Verification of IGBT Avalanche Breakdown.
Proceedings of the EITCE 2020: 4th International Conference on Electronic Information Technology and Computer Engineering, Xiamen, China, 6 November, 2020, 2020

Deep Learning for IoT Intrusion Detection based on LSTMs-AE.
Proceedings of the AIAM2020: 2nd International Conference on Artificial Intelligence and Advanced Manufacture, 2020

2019
EasyStego: Robust Steganography Based on Quick-Response Barcodes for Crossing Domains.
Symmetry, 2019

Operational performance analysis of spiral capsule robot in multiphase fluid.
Robotica, 2019

CancerInSilico: An R/Bioconductor package for combining mathematical and statistical modeling to simulate time course bulk and single cell gene expression data in cancer.
PLoS Comput. Biol., 2019

Water molecules in protein-ligand interfaces. Evaluation of software tools and SAR comparison.
J. Comput. Aided Mol. Des., 2019

An Interactive Insight Identification and Annotation Framework for Power Grid Pixel Maps using DenseU-Hierarchical VAE.
CoRR, 2019

Toward efficient and accurate function-call graph matching of binary codes.
Concurr. Comput. Pract. Exp., 2019

Improvement of Optical and Thermal Properties for Quantum Dots WLEDs by Controlling Layer Location.
IEEE Access, 2019

Experimental Investigation on the Thermal Performance of a Sintered Flexible Woven Heat Sink.
IEEE Access, 2019

Lifetime Enhancement of a Circulated Cooling Perovskite Quantum Dots Colloidal Solution System for Laser Illuminations.
IEEE Access, 2019

Investigation of Light-Extraction Mechanisms of Multiscale Patterned Arrays With Rough Morphology for GaN-Based Thin-Film LEDs.
IEEE Access, 2019

A New Quantitative Evaluation Method for Fuzzing.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

Crash Analysis Mechanisms in Vulnerability Mining Research.
Proceedings of the IEEE 4th International Conference on Computer and Communication Systems, 2019

An Improved Sequence Alignment Method for Fuzzing.
Proceedings of the IEEE 4th International Conference on Computer and Communication Systems, 2019

An Improved K-means Algorithm for Test Case Optimization.
Proceedings of the IEEE 4th International Conference on Computer and Communication Systems, 2019

2018
Fabrication of Composite Microneedle Array Electrode for Temperature and Bio-Signal Monitoring.
Sensors, 2018

Cloud manufacturing service composition with service cooperation level evaluation.
Int. J. Wirel. Mob. Comput., 2018

Pangr: A Behavior-Based Automatic Vulnerability Detection and Exploitation Framework.
Proceedings of the 17th IEEE International Conference On Trust, 2018

VMPBL: Identifying Vulnerable Functions Based on Machine Learning Combining Patched Information and Binary Comparison Technique by LCS.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Detecting Authentication-Bypass Flaws in a Large Scale of IoT Embedded Web Servers.
Proceedings of the 8th International Conference on Communication and Network Security, 2018

The New Progress in the Research of Binary Vulnerability Exploits.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

The New Progress in the Research of Binary Vulnerability Analysis.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
The Electrochemical Behavior of Carbon Fiber Microelectrodes Modified with Carbon Nanotubes Using a Two-Step Electroless Plating/Chemical Vapor Deposition Process.
Sensors, 2017

Vehicle detection and recognition for intelligent traffic surveillance system.
Multim. Tools Appl., 2017

A new validity index of feature subset for evaluating the dimensionality reduction algorithms.
Knowl. Based Syst., 2017

Dynamically Enriched MPM for Invertible Elasticity.
Comput. Graph. Forum, 2017

SemHunt: Identifying Vulnerability Type with Double Validation in Binary Code.
Proceedings of the 29th International Conference on Software Engineering and Knowledge Engineering, 2017

Vulnerability Detection in IoT Firmware: A Survey.
Proceedings of the 23rd IEEE International Conference on Parallel and Distributed Systems, 2017

Deja Q Encore RIBE: Anonymous Revocable Identity-Based Encryption with Short Parameters.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

2016
Preservation Mechanism of Chitosan-Based Coating with Cinnamon Oil for Fruits Storage Based on Sensor Data.
Sensors, 2016

A Portable Smart-Phone Readout Device for the Detection of Mercury Contamination Based on an Aptamer-Assay Nanosensor.
Sensors, 2016

Performance analysis and parameter optimization of an inner spiral in-pipe robot.
Robotica, 2016

Three-Dimensional Reconstruction of Building Roofs from Airborne LiDAR Data Based on a Layer Connection and Smoothness Strategy.
Remote. Sens., 2016

Dynamical Modelling and Structural parameter Optimization of a Novel Spiral in-pipe robot.
Int. J. Robotics Autom., 2016

Security of Web of Things: A Survey.
Proceedings of the Advances in Information and Computer Security, 2016

2015
Operational numerical simulation of a four-spiral in-pipe robot.
Simul., 2015

Failure-mechanism analysis for vertical high-power LEDs under external pressure.
Microelectron. Reliab., 2015

VEMBP: 支持更新的XML树编码方法 (VEMBP: A Novel Labeling Method for Updating on XML Data).
计算机科学, 2015

A layer-based algorithm for the construction of connected dominating set in WSNs.
Int. J. Auton. Adapt. Commun. Syst., 2015

A risk evaluation method for cascading failure considering transmission line icing.
Proceedings of the 2015 IEEE Innovative Smart Grid Technologies, 2015

Kernel Malware Core Implementation: A Survey.
Proceedings of the 2015 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2015

2014
Minimal role playing logic in Role-Based Collaboration.
Proceedings of the 2014 IEEE International Conference on Systems, Man, and Cybernetics, 2014

2013
Bilateral Teleoperation of Holonomic Constrained Robotic Systems With Time-Varying Delays.
IEEE Trans. Instrum. Meas., 2013

Pay-As-You-Go Software Artifacts Managemen.
Comput. Informatics, 2013

Interference Aware Adaptive Clear Channel Assessment for improving ZigBee packet transmission under Wi-Fi interference.
Proceedings of the 10th Annual IEEE International Conference on Sensing, 2013

Convergence regions of Newton method in power flow studies: Numerical studies.
Proceedings of the 2013 IEEE International Symposium on Circuits and Systems (ISCAS2013), 2013

Generating malware signature using transcoding from sequential data to amino acid sequence.
Proceedings of the International Conference on High Performance Computing & Simulation, 2013

A Concept Drifting Based Clustering Framework for Data Streams.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

Modeling MongoDB with Relational Model.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

Trust Management for IaaS with Group Signature.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

Study of clear channel assessment mechanism for ZigBee packet transmission under Wi-Fi interference.
Proceedings of the 10th IEEE Consumer Communications and Networking Conference, 2013

ACK with Interference Detection Technique for ZigBee Network under Wi-Fi Interference.
Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, 2013

Rank Aggregation via Low-Rank and Structured-Sparse Decomposition.
Proceedings of the Twenty-Seventh AAAI Conference on Artificial Intelligence, 2013

Resource Pool Oriented Trust Management for Cloud Infrastructure.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
Simulation model and parameter extraction of Field-Stop (FS) IGBT.
Microelectron. Reliab., 2012

<i>KNN</i>-<i>Q</i>(<i>λ</i>) algorithm-based line-grasping control of a de-icing robot.
J. Syst. Control. Eng., 2012

On parameter-dependent Lyapunov functions for robust fault detection filter design with application in power systems.
J. Frankl. Inst., 2012

Leveraging 1-hop Neighborhood Knowledge for Connected Dominating Set in Wireless Sensor Networks.
J. Comput., 2012

An Energy-Efficient Distributed Algorithm for Virtual Backbone Construction with Cellular Structure in WSN.
Int. J. Distributed Sens. Networks, 2012

A Distributed Algorithm for Virtual Backbone Construction with Cellular Structure in WSNs.
Int. J. Distributed Sens. Networks, 2012

A Stream Reassembly Mechanism Based on DPI.
Proceedings of the 26th IEEE International Parallel and Distributed Processing Symposium Workshops & PhD Forum, 2012

An adaptive emergency control method for interconnected power grids against frequency decline and system blackout.
Proceedings of the IEEE Asian Solid State Circuits Conference, 2012

Privacy Enhancing Framework on PaaS.
Proceedings of the 2012 International Conference on Cloud and Service Computing, 2012

2011
Signature Tree Generation for Polymorphic Worms.
IEEE Trans. Computers, 2011

Web Services Discovery in a Pay-As-You-Go Fashion.
J. Univers. Comput. Sci., 2011

Real time Virtual View Generation For Augmented Virtuality System.
J. Comput., 2011

Transductive learning to rank using association rules.
Expert Syst. Appl., 2011

Gregex: GPU Based High Speed Regular Expression Matching Engine.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

A pendulum-like system approach to the anticipating synchronization of RCL-shunted Josephson junctions.
Proceedings of the American Control Conference, 2011

2010
One-Hop Neighbor Transmission Coverage Information Based Distributed Algorithm for Connected Dominating Set.
Proceedings of the Third International Symposium on Parallel Architectures, 2010

A Specialized Particle Swarm Optimization for global path planning of mobile robots.
Proceedings of the Third International Workshop on Advanced Computational Intelligence, 2010

HAR Model and Long Memory in Financial Market.
Proceedings of the Second International Workshop on Database Technology and Applications, 2010

Fine-Grained Data Access Control Systems with User Accountability in Cloud Computing.
Proceedings of the Cloud Computing, Second International Conference, 2010

2009
CFD-based Study of Velocity Distribution among Multiple Parallel Microchannels.
J. Comput., 2009

An Efficient Certificateless Signature from Pairings.
Int. J. Netw. Secur., 2009

Concept, Characteristics and Defending Mechanism of Worms.
IEICE Trans. Inf. Syst., 2009

Using a bioinformatics approach to generate accurate exploit-based signatures for polymorphic worms.
Comput. Secur., 2009

Study of AD HOC Network Access Single-Channel MAC Protocol and Hidden/Exposed Terminal.
Proceedings of the 2009 Third International Conference on Genetic and Evolutionary Computing, 2009

2008
Validation and Understanding of Moderate Resolution Imaging Spectroradiometer (MODIS) C005 Aerosol Product using Aerosol Robotic Network (AERONET) Ground-Based Data in the North of China.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2008

2007
Fixturing model and analysis.
Int. J. Comput. Appl. Technol., 2007

Real-Time State Management in Mobile Peer-to-Peer File-Sharing Services.
Proceedings of the IEEE International Conference on Service-Oriented Computing and Applications, 2007

Improved Lempel-Ziv Algorithm Based on Complexity Measurement of Short Time Series.
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007

Generating Simplified Regular Expression Signatures for Polymorphic Worms.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

2006
HonIDS: Enhancing Honeypot System with Intrusion Detection Models.
Proceedings of the 4th IEEE International Workshop on Information Assurance (IWIA 2006), 2006

A Novel Broadcasting Algorithm for Wireless Sensor Networks.
Proceedings of the Parallel and Distributed Processing and Applications, 2006

Efficient Wireless Multicast Protocol with Orthogonal CTS Modulation Supporting Video Conferencing.
Proceedings of the 2006 IEEE International Conference on Multimedia and Expo, 2006

Efficient Retrieval of 3D Models Based on Integer Medial Axis Skeleton.
Proceedings of the Advances in Artificial Reality and Tele-Existence, 2006

2005
Compliant grasping with passive forces.
J. Field Robotics, 2005

A novel model on dynamic resource allocation in optical networks.
Sci. China Ser. F Inf. Sci., 2005

CLPM: A Cross-Linked Peptide Mapping Algorithm for Mass Spectrometric Analysis.
BMC Bioinform., 2005

The MODIS-based npp model and its validation.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2005

A parallel multiple dimensional view re-evaluation strategy.
Proceedings of the Ninth International Conference on Computer Supported Cooperative Work in Design, 2005

Research of temporal workflow process and resource modeling.
Proceedings of the Ninth International Conference on Computer Supported Cooperative Work in Design, 2005

Correction strategy for view maintenance anomaly after schema and data updating concurrently.
Proceedings of the Ninth International Conference on Computer Supported Cooperative Work in Design, 2005

A workflow model based on fuzzy-timing Petri nets.
Proceedings of the Ninth International Conference on Computer Supported Cooperative Work in Design, 2005

2004
Novel C-IPDM Signal Format for Suppression of Polarization Mode Dispersion.
Photonic Netw. Commun., 2004

BSCM: Proposed Security Collaboration Model Based on Blackboard.
Proceedings of the Grid and Cooperative Computing, 2004

2002
An Inference Model of Temporal Logic in an Intelligent Decision Support System of Salary.
Proceedings of the Seventh International Conference on CSCW in Design, 2002


  Loading...