Yu-an Tan

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2023
Novel supply chain vulnerability detection based on heterogeneous-graph-driven hash similarity in IoT.
Future Gener. Comput. Syst., November, 2023

Heterogeneous graph framework for predicting the association between lncRNA and disease and case on uterine fibroid.
Comput. Biol. Medicine, October, 2023

SiFDetectCracker: An Adversarial Attack Against Fake Voice Detection Based on Speaker-Irrelative Features.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

Hidden-in-Wave: A Novel Idea to Camouflage AI-Synthesized Voices Based on Speaker-Irrelative Features.
Proceedings of the 34th IEEE International Symposium on Software Reliability Engineering, 2023

Research on Network Abnormal Behavior Recognition Model Based on Parallel Decision Tree Algorithm.
Proceedings of the 7th International Conference on Computing and Data Analysis, 2023

Research on Network Dynamic Security Policy Model Based on Neural Network.
Proceedings of the 7th International Conference on Big Data and Internet of Things, 2023

Structural Quality Assured Global Optimization for CTU-Level Rate Control of Screen Content Coding.
Proceedings of the Asia Pacific Signal and Information Processing Association Annual Summit and Conference, 2023

Not The End of Story: An Evaluation of ChatGPT-Driven Vulnerability Description Mappings.
Proceedings of the Findings of the Association for Computational Linguistics: ACL 2023, 2023

2022
A distributionally robust optimization approach to two-sided chance constrained stochastic model predictive control with unknown noise distribution.
CoRR, 2022

Multi-step dual control for exploration and exploitation in autonomous search with convergence guarantee.
CoRR, 2022

POLYBRIDGE: A Crosschain Bridge For Heterogeneous Blockchains.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2022

2021
Correction to: Identity-based Multi-Recipient Public Key Encryption Scheme and Its Application in IoT.
Mob. Networks Appl., 2021

Identity-based Multi-Recipient Public Key Encryption Scheme and Its Application in IoT.
Mob. Networks Appl., 2021

DWAFE: Achieve Accurate AIOps Fault Early Warning.
Proceedings of the Theoretical Computer Science, 2021

Research on the Analysis Method of Combat Test System of Systems for Capability Generation.
Proceedings of the 4th International Conference on Information Systems and Computer Aided Education, 2021

2020
Determining the Image Base of Smart Device Firmware for Security Analysis.
Wirel. Commun. Mob. Comput., 2020

Complexity Analysis of EEG, MEG, and fMRI in Mild Cognitive Impairment and Alzheimer's Disease: A Review.
Entropy, 2020

2019
Frequency Phase Space Empirical Wavelet Transform for Rolling Bearings Fault Diagnosis.
IEEE Access, 2019

Tracing Android Kernel Codes at Early Stage without Extra Hardware Components.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

2018
A novel anti-detection criterion for covert storage channel threat estimation.
Sci. China Inf. Sci., 2018

A Java Code Protection Scheme via Dynamic Recovering Runtime Instructions.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

2017
An integrated design of power converters for electric vehicles.
Proceedings of the 26th IEEE International Symposium on Industrial Electronics, 2017

The switching frequency optimization of dual phase shift control for dual active bridge DC-DC converter.
Proceedings of the IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, China, October 29, 2017

A High Efficiency Encryption Scheme of Dual Data Partitions for Android Devices.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

2015
Scalable protocol for cross-domain group password-based authenticated key exchange.
Frontiers Comput. Sci., 2015

A road network modeling method for map matching on lightweight mobile devices.
Distributed Parallel Databases, 2015

2014
Search pattern leakage in searchable encryption: Attacks and new construction.
Inf. Sci., 2014

2013
Search Pattern Leakage in Searchable Encryption: Attacks and New Constructions.
IACR Cryptol. ePrint Arch., 2013

Feature selection and prediction with a Markov blanket structure learning algorithm.
BMC Bioinform., 2013

Enhanced Privacy Preserving Pattern-Code Based Data Aggregation in Wireless Sensor Networks.
Proceedings of the IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks, 2013

2012
Design and Implementation of a Fine-Grained NAND Flash Programmer.
Proceedings of the 13th International Conference on Parallel and Distributed Computing, 2012

2011
An improved evolutionary approach to the Extended Capacitated Arc Routing Problem.
Expert Syst. Appl., 2011

Semi-RAID: A reliable energy-aware RAID data layout for sequential data access.
Proceedings of the IEEE 27th Symposium on Mass Storage Systems and Technologies, 2011

Fuzzy keyword search on encrypted cloud storage data with small index.
Proceedings of the 2011 IEEE International Conference on Cloud Computing and Intelligence Systems, 2011

2010
An improved dynamic structure-based neural networks determination approaches to simulation optimization problems.
Neural Comput. Appl., 2010

2009
TPL: A Data Layout Method for Reducing Rotational Latency of Modern Hard Disk Drive.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

2006
Prediction and Identification of Urban Traffic Flow Based on Features.
Proceedings of the Ninth International Conference on Control, 2006

2005
A Segment-based Approach of Defending Against Buffer Overflow Attacks.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

A High-Throughput Fibre Channel Data Communication Service.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

Design and Implementation of a WBEM Disk Array Provider.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

A WBEM Based Disk Array Management Provider.
Proceedings of the 4th International Conference on Cyberworlds (CW 2005), 2005


  Loading...