Yongji Wang

According to our database1, Yongji Wang authored at least 81 papers between 1994 and 2021.

Collaborative distances:



In proceedings 
PhD thesis 


On csauthors.net:


Double-Variance Measures: A Potential Approach to Parameter Optimization of Remote Sensing Image Segmentation.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2021

Hybrid Remote Sensing Image Segmentation Considering Intrasegment Homogeneity and Intersegment Heterogeneity.
IEEE Geosci. Remote. Sens. Lett., 2020

Ant Collaborative Filtering Addressing Sparsity and Temporal Effects.
IEEE Access, 2020

Aerosol Inversion for Landsat 8 Oli Data Using Deep Learning Algorithm.
Proceedings of the IEEE International Geoscience and Remote Sensing Symposium, 2020

Remote Sensing-Guided Sampling Design with Both Good Spatial Coverage and Feature Space Coverage for Accurate Farm Field-Level Soil Mapping.
Remote. Sens., 2019

An Efficient Approach for Mitigating Covert Storage Channel Attacks in Virtual Machines by the Anti-Detection Criterion.
J. Comput. Sci. Technol., 2019

An Improved Hybrid Segmentation Method for Remote Sensing Images.
ISPRS Int. J. Geo Inf., 2019

Unsupervised segmentation parameter selection using the local spatial statistics for remote sensing image segmentation.
Int. J. Appl. Earth Obs. Geoinformation, 2019

Unsupervised Segmentation Evaluation Using Area-Weighted Variance and Jeffries-Matusita Distance for Remote Sensing Images.
Remote. Sens., 2018

Region Merging Considering Within- and Between-Segment Heterogeneity: An Improved Hybrid Remote-Sensing Image Segmentation Method.
Remote. Sens., 2018

机器学习算法在中医诊疗中的研究综述 (Review of Machine Learning Algorithms in Traditional Chinese Medicine).
计算机科学, 2018

An interleaved depth-first search method for the linear optimization problem with disjunctive constraints.
J. Glob. Optim., 2018

Nonlinear identification of one-stage spur gearbox based on pseudo-linear neural network.
Neurocomputing, 2018

A novel anti-detection criterion for covert storage channel threat estimation.
Sci. China Inf. Sci., 2018

MAD-API: Detection, Correction and Explanation of API Misuses in Distributed Android Applications.
Proceedings of the Artificial Intelligence and Mobile Services - AIMS 2018, 2018

Solving linear optimization over arithmetic constraint formula.
J. Glob. Optim., 2017

Exception beyond Exception: Crashing Android System by Trapping in "Uncaught Exception".
Proceedings of the 39th IEEE/ACM International Conference on Software Engineering: Software Engineering in Practice Track, 2017

Designing and Modeling of Covert Channels in Operating Systems.
IEEE Trans. Computers, 2016

C2Hunter: Detection and Mitigation of Covert Channels in Data Centers.
Proceedings of the Handbook on Data Centers, 2015

POSTER: biTheft: Stealing Your Secrets by Bidirectional Covert Channel Communication with Zero-Permission Android Application.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

CIVSched: A Communication-Aware Inter-VM Scheduling Technique for Decreased Network Latency between Co-Located VMs.
IEEE Trans. Cloud Comput., 2014

C<sup>2</sup>Detector: a covert channel detection framework in cloud computing.
Secur. Commun. Networks, 2014

Mobile robots' modular navigation controller using spiking neural networks.
Neurocomputing, 2014

Hippo: An enhancement of pipeline-aware in-memory caching for HDFS.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014

A survey on resource allocation in high performance distributed computing systems.
Parallel Comput., 2013

Hybrid algorithms for hardware/software partitioning and scheduling on reconfigurable devices.
Math. Comput. Model., 2013

Ascent trajectory planning on-board based on direct optimisation method.
Int. J. Model. Identif. Control., 2013

Vulcloud: Scalable and Hybrid Vulnerability Detection in Cloud Computing.
Proceedings of the Seventh International Conference on Software Security and Reliability, 2013

Robust and Efficient Covert Channel Communications in Operating Systems: Design, Implementation and Evaluation.
Proceedings of the Seventh International Conference on Software Security and Reliability, 2013

CIVSched: Communication-aware Inter-VM Scheduling in Virtual Machine Monitor Based on the Process.
Proceedings of the 13th IEEE/ACM International Symposium on Cluster, 2013

Vulnerability Detection of Android System in Fuzzing Cloud.
Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, June 28, 2013

Optimal task execution times for periodic tasks using nonlinear constrained optimization.
J. Supercomput., 2012

Improving performance of network covert timing channel through Huffman coding.
Math. Comput. Model., 2012

Reconfiguration of shipboard power system using discrete particle swarm optimisation.
Int. J. Model. Identif. Control., 2012

Incremental Collaborative Filtering Considering Temporal Effects
CoRR, 2012

A Novel Security Scheme for Online Banking Based on Virtual Machine.
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012

Integrated Heuristic for Hardware/Software Co-design on Reconfigurable Devices.
Proceedings of the 13th International Conference on Parallel and Distributed Computing, 2012

A Target-Reaching Controller for Mobile Robots Using Spiking Neural Networks.
Proceedings of the Neural Information Processing - 19th International Conference, 2012

Improved Linear Analysis on Block Cipher MULTI2.
Proceedings of the Cryptology and Network Security, 11th International Conference, 2012

Simulated phosphene model for visual prosthesis.
Proceedings of the 5th International Conference on BioMedical Engineering and Informatics, 2012

XenPump: A New Method to Mitigate Timing Channel in Cloud Computing.
Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing, 2012

Extended Probabilistic Latent Semantic Analysis Model For Topics In Time-Stamped Images.
Intell. Autom. Soft Comput., 2011

A Practical Covert Channel Identification Approach in Source Code Based on Directed Information Flow Graph.
Proceedings of the Fifth International Conference on Secure Software Integration and Reliability Improvement, 2011

Secure Machine Learning, a Brief Overview.
Proceedings of the Fifth International Conference on Secure Software Integration and Reliability Improvement, 2011

Sliding Mode Control Algorithm Design for a Class of Unmatched Uncertain System.
Proceedings of the Fourth International Symposium on Parallel Architectures, 2011

A drum-buffer-rope based scheduling method for semiconductor manufacturing system.
Proceedings of the IEEE Conference on Automation Science and Engineering, 2011

Improved mobile robot's Corridor-Scene Classifier based on probabilistic Spiking Neuron Model.
Proceedings of the 10th IEEE International Conference on Cognitive Informatics and Cognitive Computing, 2011

Identification and Evaluation of Sharing Memory Covert Timing Channel in Xen Virtual Machines.
Proceedings of the IEEE International Conference on Cloud Computing, 2011

Research on Programming Algorithm of Trajectory for Hypersonic Vehicles Based on Particle Swarm Optimization.
J. Comput., 2010

An improved optimal guidance law with impact angle constraints based on genetic algorithms.
Int. J. Model. Identif. Control., 2010

Visual tracking by particle filtering in a dynamic environment.
Int. J. Model. Identif. Control., 2010

Utilization bound for periodic task set with composite deadline.
Comput. Electr. Eng., 2010

Analysis of Telephone Call Detail Records Based on Fuzzy Decision Tree.
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010

Self-tuning control of dead time compensation strategy for PMSM control.
Int. J. Model. Identif. Control., 2009

Robust non-linear feedback control for BTT missile with NN-based uncertainty estimation.
Int. J. Model. Identif. Control., 2009

FCMAC Based Guidance Law for Lifting Reentry Vehicles.
Proceedings of the Advances in Neural Networks, 2009

Multi-swarm Particle Swarm Optimizer with Cauchy Mutation for Dynamic Optimization Problems.
Proceedings of the Advances in Computation and Intelligence, 4th International Symposium, 2009

Incremental Learning of Triadic PLSA for Collaborative Filtering.
Proceedings of the Active Media Technology, 5th International Conference, 2009

Coordinated Collective Motion of Groups of Autonomous Mobile Robots with Directed Interconnected Topology.
J. Intell. Robotic Syst., 2008

Design of a networked control system with random transmission delay and uncertain process parameters.
Int. J. Syst. Sci., 2008

Basic research in computer science and software engineering at SKLCS.
Frontiers Comput. Sci. China, 2008

Incremental probabilistic latent semantic analysis for automatic question recommendation.
Proceedings of the 2008 ACM Conference on Recommender Systems, 2008

Corridor-Scene Classification for Mobile Robot Using Spiking Neurons.
Proceedings of the Fourth International Conference on Natural Computation, 2008

Flocking Motion of Mobile Agents with a Leader Based on Distance-Dependent Adjacency Matrix.
Proceedings of the Intelligent Robotics and Applications, First International Conference, 2008

Design of a PSO Based Fuzzy Logic Controller for Vessel Mooring Shifting System.
Proceedings of the Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008

Multi-sensor moving target tracking using particle filter.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2007

AttributeNets: An Incremental Learning Method for Interpretable Classification.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2007

Autonomous Robot Path Planning Based on Swarm Intelligence and Stream Functions.
Proceedings of the Evolvable Systems: From Biology to Hardware, 2007

Revisiting Fixed Priority Techniques.
Proceedings of the Embedded and Ubiquitous Computing, International Conference, 2007

A Game Model Based Co-evolutionary Algorithms for Multiobjective Optimization Problems.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

Evaluation of the Capability of Personal Software Process Based on Data Envelopment Analysis.
Proceedings of the Unifying the Software Process Spectrum, 2005

A robot path planning approach based on generalized semi-infinite optimization.
Proceedings of the 2004 IEEE Conference on Robotics, Automation and Mechatronics, 2004

Generalized Semi-Infinite Optimization and its Application in Robotics' Path Planning Problem.
Proceedings of the International Conference on Artificial Intelligence, 2004

Solving a generalized constrained optimization problem with both logic AND and OR relationships by a mathematical transformation and its application to robot motion planning.
IEEE Trans. Syst. Man Cybern. Part C, 2000

Two novel approaches for unmanned underwater vehicle path planning: constrained optimisation and semi-infinite constrained optimisation.
Robotica, 2000

A note on "Solving the find-path problem by good representation of free space".
IEEE Trans. Syst. Man Cybern. Part B, 1997

A unified approach to inverse and direct kinematics for four kinds of wheeled mobile robots and its applications.
Proceedings of the 1996 IEEE International Conference on Robotics and Automation, 1996

Nonholonomic motion planning: a polynomial fitting approach.
Proceedings of the 1996 IEEE International Conference on Robotics and Automation, 1996

Kinematics, kinematic constraints and path planning for wheeled mobile robots.
Robotica, 1994

Motion feasibility of a wheeled vehicle with a steering angle limit.
Robotica, 1994