Yuanyuan Zhang

According to our database1, Yuanyuan Zhang
  • authored at least 170 papers between 2002 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Hypergraph dominant set based multi-video summarization.
Signal Processing, 2018

AppSpear: Automating the hidden-code extraction and reassembling of packed android malware.
Journal of Systems and Software, 2018

Predicting pilot behavior during midair encounters using recognition primed decision model.
Inf. Sci., 2018

Stochastic leader-following consensus of multi-agent systems with measurement noises and communication time-delays.
Neurocomputing, 2018

NDDVD: an integrated and manually curated Neurodegenerative Diseases Variation Database.
Database, 2018

2017
A Survey of App Store Analysis for Software Engineering.
IEEE Trans. Software Eng., 2017

The Value of Exact Analysis in Requirements Selection.
IEEE Trans. Software Eng., 2017

Why Data Deletion Fails? A Study on Deletion Flaws and Data Remanence in Android Systems.
ACM Trans. Embedded Comput. Syst., 2017

Architectures of nano-biointerfaces: relevance to future biosensing, environment and energy applications.
IJPEDS, 2017

Investigating the relationship between price, rating, and popularity in the Blackberry World App Store.
Information & Software Technology, 2017

Message Passing localisation algorithm combining BP with VMP for mobile wireless sensor networks.
IET Communications, 2017

Low Complexity Message Passing-Based Receiver Design for Wiener Phase-Noise Channels.
IEEE Communications Letters, 2017

E-learning recommendation framework based on deep learning.
Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics, 2017

Show Me the Money! Finding Flawed Implementations of Third-party In-app Payment in Android Apps.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Binary code clone detection across architectures and compiling configurations.
Proceedings of the 25th International Conference on Program Comprehension, 2017

Nightingale: Translating Embedded VM Code in x86 Binary Executables.
Proceedings of the Information Security - 20th International Conference, 2017

A Preliminary Study of Prosodic Disambiguation by Chinese EFL Learners.
Proceedings of the Interspeech 2017, 2017

A Preliminary Phonetic Investigation of Alphabetic Words in Mandarin Chinese.
Proceedings of the Interspeech 2017, 2017

Embroidery: Patching Vulnerable Binary Code of Fragmentized Android Devices.
Proceedings of the 2017 IEEE International Conference on Software Maintenance and Evolution, 2017

Achieving Proof of Shared Ownership for the Shared File in Collaborative Cloud Applications.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

Trajectory-Matching Prediction for Friend Recommendation in Anonymous Social Networks.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

MIRAGE: Randomizing large chunk allocation via dynamic binary instrumentation.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017

A Study on Smart Monitoring and Management of Track Running Self-Testing System Based on Internet of Things.
Proceedings of the 2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2017

Analysis of the Approach to Predict Different Routing Protocols in WSNs.
Proceedings of the 2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2017

Wireless Sensor Routing Protocol Research Based on Forest Fire Protection.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

Analysis of Clustering Routing Protocols and Evaluation Methods in Wireless Sensor Networks.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

The Electronic Commerce in the Era of Internet of Things and Big Data.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

The Comparisons of Different Location-Based Routing Protocols in Wireless Sensor Networks.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

NativeSpeaker: Identifying Crypto Misuses in Android Native Code Libraries.
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017

Smart Solution, Poor Protection: An Empirical Study of Security and Privacy Issues in Developing and Deploying Smart Home Devices.
Proceedings of the 2017 Workshop on Internet of Things Security and Privacy, 2017

2016
A secure energy-efficient access control scheme for wireless sensor networks based on elliptic curve cryptography.
Security and Communication Networks, 2016

Adaptive Convolutional Neural Network and Its Application in Face Recognition.
Neural Processing Letters, 2016

Privacy-preserving data sharing scheme over cloud for social applications.
J. Network and Computer Applications, 2016

Identification of Novel Disruptor of Telomeric Silencing 1-like (DOT1L) Inhibitors through Structure-Based Virtual Screening and Biological Assays.
Journal of Chemical Information and Modeling, 2016

Quantized DCT Coefficient Category Address Encryption for JPEG Image.
TIIS, 2016

An analysis of the stability and chattering reduction of high-order sliding mode tracking control for a hypersonic vehicle.
Inf. Sci., 2016

Adaptive event-triggered H∞ filtering for T-S fuzzy system with time delay.
Neurocomputing, 2016

A secure access and associate deleting scheme for multi-replica in multi-cloud environment.
IJHPSA, 2016

Vibration control for a nonlinear three-dimensional flexible manipulator trajectory tracking.
Int. J. Control, 2016

Compressing IP Forwarding Tables with Small Bounded Update Time.
Computer Networks, 2016

Cross-Architecture Binary Semantics Understanding via Similar Code Comparison.
Proceedings of the IEEE 23rd International Conference on Software Analysis, 2016

New Exploit Methods against Ptmalloc of GLIBC.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Security Analysis of Vendor Customized Code in Firmware of Embedded Device.
Proceedings of the Security and Privacy in Communication Networks, 2016

IP lookup using Minimal Perfect Hashing.
Proceedings of the 24th IEEE/ACM International Symposium on Quality of Service, 2016

Estimate PM2.5 concentration in 500m resolution from satellite data and ground observation.
Proceedings of the 2016 IEEE International Geoscience and Remote Sensing Symposium, 2016

Mobile app and app store analysis, testing and optimisation.
Proceedings of the International Conference on Mobile Software Engineering and Systems, 2016

Adaptive and compressive target tracking based on feature point matching.
Proceedings of the 23rd International Conference on Pattern Recognition, 2016

A Secure Data Deduplication Scheme Based on Differential Privacy.
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016

Clustering Mobile Apps Based on Mined Textual Features.
Proceedings of the 10th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, 2016

Semantic Graph based Pseudo Relevance Feedback for Biomedical Information Retrieval.
Proceedings of the 7th International Conference on Computational Systems-Biology and Bioinformatics, 2016

Security Testing of Software on Embedded Devices Using x86 Platform.
Proceedings of the Collaborate Computing: Networking, Applications and Worksharing, 2016

A Multi-replica Associated Deleting Scheme in Cloud.
Proceedings of the 10th International Conference on Complex, 2016

Open Sesame! Web Authentication Cracking via Mobile App Analysis.
Proceedings of the Web Technologies and Applications - 18th Asia-Pacific Web Conference, 2016

The Achilles heel of OAuth: a multi-platform study of OAuth-based authentication.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
An Improved Two-Party Authentication Key Exchange Protocol for Mobile Environment.
Wireless Personal Communications, 2015

A construction of higher-order finite volume methods.
Math. Comput., 2015

Introduction to special section on Search Based Software Engineering.
Information & Software Technology, 2015

An improved authentication scheme for mobile satellite communication systems.
Int. J. Satellite Communications Networking, 2015

CR-MDC: A Method of Constrained Route for Avoiding Congestion of the Satellite Sensor Network for Agriculture.
IJDSN, 2015

Towards Efficient, Secure, and Fine-Grained Access Control System in MSNs with Flexible Revocations.
IJDSN, 2015

A robust baseline elimination method based on community information.
Digital Signal Processing, 2015

SGOR: Secure and scalable geographic opportunistic routing with received signal strength in WSNs.
Computer Communications, 2015

Uniform boundedness and pattern formation for Keller-Segel systems with two competing species.
Applied Mathematics and Computation, 2015

Robust Biometric-Based User Authentication Scheme for Wireless Sensor Networks.
Ad Hoc & Sensor Wireless Networks, 2015

Inferring Test Models from Kate's Bug Reports Using Multi-objective Search.
Proceedings of the Search-Based Software Engineering - 7th International Symposium, 2015

Multi-objective Module Clustering for Kate.
Proceedings of the Search-Based Software Engineering - 7th International Symposium, 2015

SBSelector: Search Based Component Selection for Budget Hardware.
Proceedings of the Search-Based Software Engineering - 7th International Symposium, 2015

App store mining and analysis.
Proceedings of the 3rd International Workshop on Software Development Lifecycle for Mobile, 2015

Feature lifecycles as they spread, migrate, remain, and die in App Stores.
Proceedings of the 23rd IEEE International Requirements Engineering Conference, 2015

AppSpear: Bytecode Decrypting and DEX Reassembling for Packed Android Malware.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015

The App Sampling Problem for App Store Mining.
Proceedings of the 12th IEEE/ACM Working Conference on Mining Software Repositories, 2015

Compressing IP forwarding tables with fast and bounded update.
Proceedings of the 23rd IEEE International Symposium on Quality of Service, 2015

Scalability of Global 0.25° Ocean Simulations Using MOM.
Proceedings of the Environmental Software Systems. Infrastructures, Services and Applications, 2015

Application of Spatial Reasoning in Predicting Rainfall Situation for Two Disjoint Areas.
Proceedings of the Computer and Computing Technologies in Agriculture IX, 2015

Achievements, Open Problems and Challenges for Search Based Software Testing.
Proceedings of the 8th IEEE International Conference on Software Testing, 2015

SSG: Sensor Security Guard for Android Smartphones.
Proceedings of the Collaborative Computing: Networking, Applications, and Worksharing, 2015

Robust beamforming for multiuser MISO interference channel with energy harvesting constraint.
Proceedings of the 10th International Conference on Communications and Networking in China, 2015

From Collision To Exploitation: Unleashing Use-After-Free Vulnerabilities in Linux Kernel.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

A measurement study of a campus Wi-Fi network with mixed handheld and non-handheld traffic.
Proceedings of the IEEE 28th Canadian Conference on Electrical and Computer Engineering, 2015

Vulnerability Assessment of OAuth Implementations in Android Applications.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

A Novel QoS Routing Method for LEO Rosette Constellation Network.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

2014
Cryptanalysis and Improvement of an Anonymous Authentication Protocol for Wireless Access Networks.
Wireless Personal Communications, 2014

A DOM-based Anchor-Hop-T Method for Web Application Information Extraction.
JSW, 2014

Higher-order finite volume methods II: Inf-sup condition and uniform local ellipticity.
J. Computational Applied Mathematics, 2014

An Efficient Password Authentication Scheme Using Smart Card Based on Elliptic Curve Cryptography.
ITC, 2014

Cryptanalysis of a Three-party Password-based Authenticated Key Exchange Protocol.
I. J. Network Security, 2014

Security analysis of an authentication and key agreement protocol for satellite communications.
Int. J. Communication Systems, 2014

Sentence-Level Combination of Machine Translation Outputs with Syntactically Hybridized Translations.
IEICE Transactions, 2014

G-Bean: an ontology-graph based web tool for biomedical literature retrieval.
BMC Bioinformatics, 2014

Search based software engineering for software product line engineering: a survey and directions for future work.
Proceedings of the 18th International Software Product Line Conference, 2014

iCryptoTracer: Dynamic Analysis on Misuse of Cryptography Functions in iOS Applications.
Proceedings of the Network and System Security - 8th International Conference, 2014

TagDroid: Hybrid SSL Certificate Verification in Android.
Proceedings of the Information and Communications Security - 16th International Conference, 2014

Robust next release problem: handling uncertainty during optimization.
Proceedings of the Genetic and Evolutionary Computation Conference, 2014

Academic co-author networks based on the self-organizing feature map.
Proceedings of the 11th International Conference on Fuzzy Systems and Knowledge Discovery, 2014

Android App Protection via Interpretation Obfuscation.
Proceedings of the IEEE 12th International Conference on Dependable, 2014

APKLancet: tumor payload diagnosis and purification for android applications.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

Real Time Gait Recognition System Based on Kinect Skeleton Feature.
Proceedings of the Computer Vision - ACCV 2014 Workshops, 2014

DIAS: Automated Online Analysis for Android Applications.
Proceedings of the 14th IEEE International Conference on Computer and Information Technology, 2014

2013
Digital subcarrier optical networks and cross-connects.
J. High Speed Networks, 2013

Empirical evaluation of search based requirements interaction management.
Information & Software Technology, 2013

Unsupervised Natural Image Segmentation via Bayesian Ying-Yang Harmony Learning Theory.
Neurocomputing, 2013

How network coding system constrains packet pollution attacks in wireless sensor networks.
IJGUC, 2013

Towards Efficient and Secure Geographic Routing Protocol for Hostile Wireless Sensor Networks.
IJDSN, 2013

Gatewaying the Wireless Sensor Networks.
Proceedings of the IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks, 2013

A score level fusion framework for gait-based human recognition.
Proceedings of the 15th IEEE International Workshop on Multimedia Signal Processing, 2013

Automatic Detection and Analysis of Encrypted Messages in Malware.
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013

A Novel Coupled Metric Learning Method and Its Application in Degraded Face Recognition.
Proceedings of the Biometric Recognition - 8th Chinese Conference, 2013

G-Bean: An ontology-graph based web tool for biomedical literature retrieval.
Proceedings of the 2013 IEEE International Conference on Bioinformatics and Biomedicine, 2013

2012
Spectrally Efficient multicarrier Systems for Fiber-Optic Transmission.
PhD thesis, 2012

Selective Forwarding Attacks against Data and ACK Flows in Network Coding and Countermeasures.
Journal Comp. Netw. and Communic., 2012

Search-based software engineering: Trends, techniques and applications.
ACM Comput. Surv., 2012

App store mining and analysis: MSR for app stores.
Proceedings of the 9th IEEE Working Conference of Mining Software Repositories, 2012

Fingerprint image enhancement based on elliptical shape Gabor filter.
Proceedings of the 6th IEEE International Conference on Intelligent Systems, 2012

Human instance segmentation from video using locally competing 1SVMs with shape prior.
Proceedings of the Eighth International Conference on Natural Computation, 2012

Facial feature extraction with a depth AAM algorithm.
Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery, 2012

2011
Adaptive Modulation for Opportunistic Decode-and-Forward Relaying.
IEEE Trans. Wireless Communications, 2011

A New Region Growing Algorithm for Triangular Mesh Recovery from Scattered 3D Points.
Trans. Edutainment, 2011

Comparing the performance of metaheuristics for the analysis of multi-stakeholder tradeoffs in requirements optimisation.
Information & Software Technology, 2011

Performance-Aware Hybrid Algorithm for Mapping IPs onto Mesh-Based Network on Chip.
IEICE Transactions, 2011

A study of the bi-objective next release problem.
Empirical Software Engineering, 2011

Flooding attacks against network coding and countermeasures.
Proceedings of the 5th International Conference on Network and System Security, 2011

Research and Development of Anycast Communication Service.
Proceedings of the Applied Informatics and Communication - International Conference, 2011

The Design of Supermarket Electronic Shopping Guide System Based on ZigBee Communication.
Proceedings of the Advances in Computer Science, Environment, Ecoinformatics, and Education, 2011

Optimal Control of Mixed-state Quantum Systems based on Lyapunov Method.
Proceedings of the BIOSIGNALS 2011, 2011

2010
Distance Measurement Model Based on RSSI in WSN.
Wireless Sensor Network, 2010

Constrained Surface Recovery Using RBF and Its Efficiency Improvements.
Journal of Multimedia, 2010

Real-time Simulation for 3D Tissue Deformation with CUDA Based GPU Computing.
JCIT, 2010

An automatic method of measuring foot girths for custom footwear using local RBF implicit surfaces.
Int. J. Computer Integrated Manufacturing, 2010

A Dual-Port Access Structure of 3D Mesh-Based NoC.
IEICE Transactions, 2010

Power allocation for bidirectional AF relaying over rayleigh fading channels.
IEEE Communications Letters, 2010

Convex-Based DOR Routing for Virtualization of NoC.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2010

Data Fusion-Based Extraction Method of Energy Consumption Index for the Ethylene Industry.
Proceedings of the Life System Modeling and Intelligent Computing, 2010

Hybrid Parallel Programming on SMP Clusters Using XPFortran and OpenMP.
Proceedings of the Beyond Loop Level Parallelism in OpenMP: Accelerators, 2010

Modulation-adaptive cooperation in Rayleigh fading channels with imperfect CSI.
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, 2010

Application of fuzzy logic and support vector machine to the control of exploration vehicle.
Proceedings of the Sixth International Conference on Natural Computation, 2010

Today/future importance analysis.
Proceedings of the Genetic and Evolutionary Computation Conference, 2010

Experiences from implementing an educational MMORPG.
Proceedings of the 2010 International IEEE Consumer Electronics Society's Games Innovations Conference, 2010

2009
A search based approach to fairness analysis in requirement assignments to aid negotiation, mediation and decision making.
Requir. Eng., 2009

Research on Error's Distribution in Triangle Location Algorithm.
IJCNS, 2009

Discovering Compatible Top-K Theme Patterns from Text Based on Users' Preferences.
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2009

Design and Implementation of Self-securing Disk.
Proceedings of the International Conference on Networking, Architecture, and Storage, 2009

A Novel Adaptive Reclosure Criterion for HV Transmission Lines Based on Wavelet Packet Energy Entropy.
Proceedings of the Advances in Neural Networks, 2009

Research on Method of Double-Layers BP Neural Network in Prediction of Crossroads' Traffic Volume.
Proceedings of the Advances in Neural Networks, 2009

Exact Solutions for the Generalized Derivative Schrodinger Equation.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009

Generalized Wronskian Solutions for a Non-isospectral KdV Equation.
Proceedings of the Second International Joint Conference on Computational Sciences and Optimization, 2009

Gait Recognition Using Procrustes Shape Analysis and Shape Context.
Proceedings of the Computer Vision, 2009

2008
Predict task running time in grid environments based on CPU load predictions.
Future Generation Comp. Syst., 2008

Exploiting unidirectional links for key establishment protocols in heterogeneous sensor networks.
Computer Communications, 2008

Improved coded cooperation schemes for wireless communications.
Proceedings of the 6th International Symposium on Modeling and Optimization in Mobile, 2008

Modulation-Adaptive Cooperation Schemes for Wireless Networks.
Proceedings of the 67th IEEE Vehicular Technology Conference, 2008

Search Based Requirements Optimisation: Existing Work and Challenges.
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2008

"Fairness Analysis" in Requirements Assignments.
Proceedings of the 16th IEEE International Requirements Engineering Conference, 2008

Efficient Authenticated Encryption for Hybrid Hard Drives Based on GCM.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications, 2008

Study on the model of grey matrix game based on grey mixed strategy - solution of grey linear program model on grey matrix game.
Proceedings of the FUZZ-IEEE 2008, 2008

Reliable Key Establishment Scheme Exploiting Unidirectional Links in Wireless Sensor Networks.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

2007
CPU Load Predictions on the Computational Grid.
IEICE Transactions, 2007

Dynamic Task Flow Scheduling for Heterogeneous Distributed Computing: Algorithm and Strategy.
IEICE Transactions, 2007

Generalized Riccati equation rational expansion method and its application.
Applied Mathematics and Computation, 2007

Hybrid Overloading and Stochastic Analysis for Redundant Real-time Multiprocessor Systems.
Proceedings of the 26th IEEE Symposium on Reliable Distributed Systems (SRDS 2007), 2007

Tighter Bounds of Symbol Error Probability for Amplify-and-Forward Cooperative Protocol over Rayleigh Fading Channels.
Proceedings of the IEEE 18th International Symposium on Personal, 2007

The multi-objective next release problem.
Proceedings of the Genetic and Evolutionary Computation Conference, 2007

Real-time Task Scheduling Using Extended Overloading Technique for Multiprocessor Systems.
Proceedings of the 11th IEEE International Symposium on Distributed Simulation and Real-Time Applications, 2007

2006
Influence of Inaccurate Performance Prediction on Task Scheduling in a Grid Environment.
IEICE Transactions, 2006

A Scheduler for Local Grid Resource Domain in High Throughput Environment.
Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, 2006

Practical Task Flow Scheduling for High Throughput Computational Grid.
Proceedings of the 2006 International Conference on Parallel Processing Workshops (ICPP Workshops 2006), 2006

Predicting Running Time of Grid Tasks based on CPU Load Predictions.
Proceedings of the 7th IEEE/ACM International Conference on Grid Computing (GRID 2006), 2006

CPU Load Predictions on the Computational Grid.
Proceedings of the Sixth IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2006), 2006

2005
Influence of Performance Prediction Inaccuracy on Task Scheduling in Grid Environment.
Proceedings of the Web Technologies Research and Development - APWeb 2005, 7th Asia-Pacific Web Conference, Shanghai, China, March 29, 2005

2004
A Dynamic Task Scheduling Algorithm for Grid Computing System.
Proceedings of the Parallel and Distributed Processing and Applications, 2004

2002
A simplistic Mereological System for Relations.
Proceedings of the International Conference on Artificial Intelligence, 2002


  Loading...