Yong Zeng

According to our database1, Yong Zeng authored at least 142 papers between 2002 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Cooperative Jamming for Secrecy of Wireless Communications.
J. Inf. Sci. Eng., 2019

Social Tie Based Cooperative Jamming for D2D Communications in the Internet of Things.
J. Inf. Sci. Eng., 2019

Hiding Communications in AWGN Channels and THz Band with Interference Uncertainty.
CoRR, 2019

Challenges in Covert Wireless Communications with Active Warden on AWGN channels.
CoRR, 2019

On computer virus spreading using node-based model with time-delayed intervention strategies.
SCIENCE CHINA Information Sciences, 2019

Fault diagnosis based on variable-weighted separability-oriented subclass discriminant analysis.
Computers & Chemical Engineering, 2019

Segmentation of design protocol using EEG.
AI EDAM, 2019

Analysis of the Impact of eMTC on Legacy LTE.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

Cooperative Jamming Strategy Based on Community Detection for Two-Hop Communication Networks.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Energy Consumption Tradeoff for Association-Free Fog-IoT.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

2018
Covert Wireless Communications in IoT Systems: Hiding Information in Interference.
IEEE Wireless Commun., 2018

Bayesian Inference via Filtering Equations for Ultrahigh Frequency Data (II): Model Selection.
SIAM/ASA J. Uncertain. Quantification, 2018

Bayesian Inference via Filtering Equations for Ultrahigh Frequency Data (I): Model and Estimation.
SIAM/ASA J. Uncertain. Quantification, 2018

Jensen-Shannon Divergence Based Secure Authentication Method on Smart Phones.
J. Inf. Sci. Eng., 2018

Spraying trajectory Planning for outer-Horn surface with two patches based on continuous varied Dip-angle.
I. J. Robotics and Automation, 2018

Covert Wireless Communications with Active Eavesdropper on AWGN Channels.
CoRR, 2018

True Random Number Generation Using Process Scheduling of Android Systems.
Proceedings of the International Conference on Networking and Network Applications, 2018

Cooperative Jamming for Secrecy of Wireless Communications.
Proceedings of the International Conference on Networking and Network Applications, 2018

Preserving Privacy for Hubs and Links in Social Networks.
Proceedings of the International Conference on Networking and Network Applications, 2018

Exploiting Social Tie and SIR Characteristic for Cooperative Jamming: A Game Model in a Two-layer Network.
Proceedings of the International Conference on Networking and Network Applications, 2018

On Covert Communication with Interference Uncertainty.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Delay-Oriented Spectrum Sharing and Traffic Offloading in Coexisting UAV-Enabled Cellular and WiFi Networks.
Proceedings of the 2018 IEEE International Symposium on Dynamic Spectrum Access Networks, 2018

2017
Effects of stress and effort on self-rated reports in experimental study of design activities.
J. Intelligent Manufacturing, 2017

Organizational Capability: Skills Related to Organizational Knowledge.
J. Integrated Design & Process Science, 2017

Organizational Capability Model: Toward Improving Organizational Performance.
J. Integrated Design & Process Science, 2017

Application of Design Methodologies to Web System Design: A Case Study of JIDPS Editorial System.
J. Integrated Design & Process Science, 2017

Chaotification of a class of linear switching systems based on a Shilnikov criterion.
J. Franklin Institute, 2017

The Sound and the Fury: Hiding Communications in Noisy Wireless Networks with Interference Uncertainty.
CoRR, 2017

A Secure Authentication Method of Intelligent Terminals Based on Jensen-Shannon Divergence.
Proceedings of the International Conference on Networking and Network Applications, 2017

Modeling Key Infection in Large-Scale Sensor Networks.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

Multi-hop Based Centrality of a Path in Complex Network.
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017

A Survey of Network Reconstruction on Social Network.
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017

Centrality Based Privacy Preserving for Weighted Social Networks.
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017

Analysis and Improvement of True Random Number Generator Based on Autonomous Boolean Network.
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017

2016
Cooperative Jammer Placement for Physical Layer Security Enhancement.
IEEE Network, 2016

One Thing is Certain in Design: Design is Uncertain.
J. Integrated Design & Process Science, 2016

Cross-Disciplinary Design Methodology.
J. Integrated Design & Process Science, 2016

Synchronization for time-varying complex networks based on control.
J. Computational Applied Mathematics, 2016

Spray Technology Planning of spray Painting robot for Complex Free surface.
I. J. Robotics and Automation, 2016

Interventional consensus for high-order multi-agent systems with unknown disturbances on coopetition networks.
Neurocomputing, 2016

Novel delay-dependent master-slave synchronization criteria of chaotic Lur'e systems with time-varying-delay feedback control.
Applied Mathematics and Computation, 2016

Automated transformation of design text ROM diagram into SysML models.
Advanced Engineering Informatics, 2016

2015
A general framework to resolve the MisMatch problem in XML keyword search.
VLDB J., 2015

An Integrated Prognostics Method Under Time-Varying Operating Conditions.
IEEE Trans. Reliability, 2015

Environment-Based Design (EBD): a Methodology for Transdisciplinary Design.
J. Integrated Design & Process Science, 2015

Aims and Scope of JIDPS: Coping with the Challenges in Transdisciplinary Design.
J. Integrated Design & Process Science, 2015

EBD Extended Analytic Hierarchy Process (AHP) Approach to Evaluating the Effectiveness of Engineering Projects.
J. Integrated Design & Process Science, 2015

Generating chaos for a class of linear switching control systems: A hybrid approach.
J. Franklin Institute, 2015

New stability analysis for neutral type neural networks with discrete and distributed delays using a multiple integral approach.
J. Franklin Institute, 2015

Further improvement in delay-dependent stability criteria for continuous-time systems with time-varying delays.
Neurocomputing, 2015

New delay-dependent stability criteria for neutral-type neural networks with mixed random time-varying delays.
Neurocomputing, 2015

On Key Evolution over Wireless Channels.
IJDSN, 2015

Genome-wide identification and predictive modeling of polyadenylation sites in eukaryotes.
Briefings in Bioinformatics, 2015

Performance assessment of real-time estimation of continuous-time stochastic volatility of financial data on GPUs.
Proceedings of the 2015 XSEDE Conference: Scientific Advancements Enabled by Enhanced Cyberinfrastructure, St. Louis, MO, USA, July 26, 2015

Exploratory Keyword Search with Interactive Input.
Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, Melbourne, Victoria, Australia, May 31, 2015

SAM: A Sorting Approach for Optimizing Multijoin Queries.
Proceedings of the Database and Expert Systems Applications, 2015

2014
Reliable Enhanced Secure Code Dissemination with Rateless Erasure Codes in WSNs.
JSW, 2014

Aims and Scope of JIDPS: Understanding, Improving, and Practicing of Design.
J. Integrated Design & Process Science, 2014

Environment Based Design of Services.
J. Integrated Design & Process Science, 2014

A Reference Model for Privacy Protection in Social Networking Service.
J. Integrated Design & Process Science, 2014

State Estimation for Discrete-Time Stochastic Neural Networks with Mixed Delays.
J. Applied Mathematics, 2014

Less conservative stability criteria for neural networks with discrete and distributed delays using a delay-partitioning approach.
Neurocomputing, 2014

Chaotification of a Class of Linear Switching Systems by Hybrid Driven Methods.
I. J. Bifurcation and Chaos, 2014

A physiological study of relationship between designer's mental effort and mental stress during conceptual design.
Computer-Aided Design, 2014

Breaking out of the MisMatch trap.
Proceedings of the IEEE 30th International Conference on Data Engineering, Chicago, 2014

Study on the Pass Rate of NIST SP800-22 Statistical Test Suite.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

Robust finite-time bounded H∞ control for a class of nonlinear quadratic Markovian jump systems.
Proceedings of the 53rd IEEE Conference on Decision and Control, 2014

2013
Uncertainty Quantification in Gear Remaining Useful Life Prediction Through an Integrated Prognostics Method.
IEEE Trans. Reliability, 2013

Formalization of design chain management using environment-based design (EBD) theory.
J. Intelligent Manufacturing, 2013

Humour and Creative Design: Twins or Partners?
J. Integrated Design & Process Science, 2013

Delay-Dependent Finite-Time H Filtering for Markovian Jump Systems with Different System Modes.
J. Applied Mathematics, 2013

Less Conservative Stability Criteria for Neutral Type Neural Networks with Mixed Time-Varying Delays.
J. Applied Mathematics, 2013

Less conservative stability criteria for stochastic discrete-time recurrent neural networks with the time-varying delay.
Neurocomputing, 2013

Online Engineering and Intelligent Automation.
Int. J. Online Eng., 2013

From the ASEI2013 Organizers.
iJET, 2013

H Filtering for Stochastic Systems with Markovian Switching and Partly Unknown Transition Probabilities.
CSSP, 2013

Finite-Time Stabilization of H Filtering for Switched Stochastic Systems.
CSSP, 2013

An algorithm for transforming design text ROM diagram into FBS model.
Computers in Industry, 2013

Modeling, extraction, and transformation of semantics in computer aided engineering systems.
Advanced Engineering Informatics, 2013

Removing the mismatch headache in XML keyword search.
Proceedings of the 36th International ACM SIGIR conference on research and development in Information Retrieval, 2013

Fault and Intrusion Tolerance of Complex Networks: A Controllability View.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Viewing YouTube from a metropolitan area: What do users accessing from residential ISPs experience?
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

H∞ filtering of discrete-time switched systems with average dwell time under asynchronous switching.
Proceedings of the 10th IEEE International Conference on Control and Automation, 2013

Supporting range queries in XML keyword search.
Proceedings of the Joint 2013 EDBT/ICDT Conferences, 2013

Efficient XML Keyword Search: From Graph Model to Tree Model.
Proceedings of the Database and Expert Systems Applications, 2013

Exploring XML data is as easy as using maps.
Proceedings of the 22nd ACM International Conference on Information and Knowledge Management, 2013

sonLP: social network link prediction by principal component regression.
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013

2012
Mitigating the risk of information leakage in a two-level supply chain through optimal supplier selection.
J. Intelligent Manufacturing, 2012

Editorial: Theories Of and About Design.
J. Integrated Design & Process Science, 2012

A Theoretical Model of Design Creativity: Nonlinear Design Dynamics and Mental Stress-Creativity Relation.
J. Integrated Design & Process Science, 2012

The Timing of portfolio Adjustments: a regime-Switching Approach.
International Journal of Information Technology and Decision Making, 2012

Secrecy Transfer.
IJDSN, 2012

Development of a web-based decision support system for supporting integrated water resources management in Daegu city, South Korea.
Expert Syst. Appl., 2012

Secure collaboration in global design and supply chain environment: Problem analysis and literature review.
Computers in Industry, 2012

Secure collaboration in design and supply chain management.
Computers in Industry, 2012

Fundamentals of next generation CAD/E systems.
Computer-Aided Design, 2012

Exponential mean-square stability of time-delay singular systems with Markovian switching and nonlinear perturbations.
Applied Mathematics and Computation, 2012

Modeling semantic information in engineering applications: a review.
Artif. Intell. Rev., 2012

MALEX: a MAp-like exploration model on XML database.
Proceedings of the Third International Workshop on Keyword Search on Structured Data, 2012

The Role of Product Lifecycle Management Systems in Organizational Innovation.
Proceedings of the Product Lifecycle Management. Towards Knowledge-Rich Enterprises, 2012

A Hybrid Approach for General XML Query Processing.
Proceedings of the Database and Expert Systems Applications, 2012

Out-of-Order-Delivery-Tolerant Secure Code Dissemination with Fountain Codes in Wireless Sensor Networks.
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012

2011
Design Conflict: Conceptual Structure and Mathematical Representation.
Transactions of the SDPS, 2011

Environment-Based Design (EBD) Approach to Developing Quality Management Systems: a Case Study.
Transactions of the SDPS, 2011

R&d Investment Decision on Emerging Technology.
International Journal of Information Technology and Decision Making, 2011

Modeling and evaluating information leakage caused by inferences in supply chains.
Computers in Industry, 2011

A security testing approach for WSN protocols based on object-oriented attack model.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

An Automated Black-box Testing Approach for WSN Security Protocols.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

2010
A Vision Based Graphical Password.
Transactions of the SDPS, 2010

Experimental Approach to Curve Reconstruction Based on Human Visual perception.
Transactions of the SDPS, 2010

Generalization of the FDTD algorithm for simulations of hydrodynamic nonlinear Drude model.
J. Comput. Physics, 2010

An Improvement on a Three-party Password-based Key Exchange Protocol Using Weil Pairing.
I. J. Network Security, 2010

Automatically extracting T-S fuzzy models using cooperative random learning particle swarm optimization.
Appl. Soft Comput., 2010

Efficient secure multicast route using genetic algorithms for wireless sensor and actor networks.
Proceedings of the 2010 International Conference on High Performance Computing & Simulation, 2010

Formal approach of chance discovery theory for agents' interaction.
Proceedings of the Sixth International Conference on Natural Computation, 2010

2009
Eliciting compact T-S fuzzy models using subtractive clustering and coevolutionary particle swarm optimization.
Neurocomputing, 2009

Asking the right questions to elicit product requirements.
Int. J. Computer Integrated Manufacturing, 2009

Nonparametric classification based on local mean and class statistics.
Expert Syst. Appl., 2009

Pseudo nearest neighbor rule for pattern classification.
Expert Syst. Appl., 2009

Understanding design activities through computer simulation.
Advanced Engineering Informatics, 2009

A novel LMI based swing-up robust controller for a serial double inverted pendulum.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2009

Multi-path Protocol for High Data Confidentiality and Reliability in Wireless Sensor Networks Using Non-dominated Dynamic Compensation.
Proceedings of the 10th International Symposium on Pervasive Systems, 2009

A Hardware-Oriented Fast Encryption Keystream Generator for Digital Rights Management.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

2008
Generalized Cost-Function-Based Forecasting for Periodically Measured Nonstationary Traffic.
IEEE Trans. Systems, Man, and Cybernetics, Part A, 2008

An Integrated Game-Theory Based Model for Trans-Boundary water Resources Management in North China: a Case Study in the Guanting Reservoir Basin (GRB), Beijing.
International Journal of Software Engineering and Knowledge Engineering, 2008

Recursive object model (ROM) - Modelling of linguistic information in engineering design.
Computers in Industry, 2008

A distance-based parameter free algorithm for curve reconstruction.
Computer-Aided Design, 2008

Adaptive Algorithms to Mitigate Inefficiency in Reliability Differentiation Mechanisms for Wireless Sensor Networks.
Proceedings of the MSN 2008, 2008

Cooperative Random Learning Particle Swarm Optimization.
Proceedings of the Fourth International Conference on Natural Computation, 2008

2007
ARCH-based traffic forecasting and dynamic bandwidth provisioning for periodically measured nonstationary traffic.
IEEE/ACM Trans. Netw., 2007

Formalisation of product requirements: from natural language descriptions to formal specifications.
IJMR, 2007

2006
Classification of Product Requirements Based on Product Environment.
Concurrent Engineering: R&A, 2006

A Web-Based Decision Support System for Evaluation of Benefits of Land Consolidation in China.
Proceedings of the 2006 International Conference on Semantics, 2006

Computing the k-Error N-Adic Complexity of a Sequence of Period pn.
Proceedings of the Sequences and Their Applications, 2006

An Integrated Approach to a Multi-Attribute Decision Problem Through a Case Study.
Proceedings of the Information Technology For Balanced Manufacturing Systems, 2006

2005
Analysis of Medical Devices Design Requirements.
Transactions of the SDPS, 2005

Residual Texture Based Fast Block-Size Selection for Inter-Frame Coding in H.264/AVC.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

Sampling Distance Analysis of Gigantic Data Mining for Intrusion Detection Systems.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

Stability of the Linear Complexity of the Generalized Self-shrinking Sequences.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

2004
Estimating stochastic volatility via filtering for the micromovement of asset prices.
IEEE Trans. Automat. Contr., 2004

Environment-Based formulation of Design Problem.
Transactions of the SDPS, 2004

2002
Axiomatic Theory of Design Modeling.
Transactions of the SDPS, 2002


  Loading...