Yuli Yang

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Known people with the same name:

Bibliography

2025
Causal Inference-Based Adversarial Domain Adaptation for Cross-Domain Industrial Intrusion Detection.
IEEE Trans. Ind. Informatics, January, 2025

A Self-Adaptive Mimic Scheduling Method Based on Fine-Grained Heterogeneity.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2025

Joint Task Offloading and Service Caching for Mobile Edge Computing in Failure-Prone Environment.
Proceedings of the Web Services - ICWS 2025, 2025

2024
Predicting invasion in early-stage ground-glass opacity pulmonary adenocarcinoma: a radiomics-based machine learning approach.
BMC Medical Imaging, December, 2024

Label-Only Membership Inference Attack Based on Model Explanation.
Neural Process. Lett., October, 2024

An n-Dimensional Chaotic Map with Application in Reversible Data Hiding for Medical Images.
Entropy, March, 2024

2023
Assessment of the Declining Degree of Farmland Shelterbelts in a Desert Oasis Based on LiDAR and Hyperspectral Imagery.
Remote. Sens., September, 2023

Analysis and optimization design of control signal line parasitic effects on streaking phenomenon in CMOS image sensor.
Microelectron. J., March, 2023

Secure and Timely Status Updates in the IoT using Short-Packet Permutation-Based Transmissions.
Proceedings of the 98th IEEE Vehicular Technology Conference, 2023

2022
Retransmission-Based TCP Fingerprints for Fine-Grain IoV Edge Device Identification.
IEEE Trans. Veh. Technol., 2022

2021
Application of Opportunistic Bit to Multilevel Codes.
CoRR, 2021

A Practical Consideration on Convex Mutual Information.
CoRR, 2021

2020
Location-Aware Wi-Fi Authentication Scheme Using Smart Contract.
Sensors, 2020

Three-Variable Chaotic Oscillatory System Based on DNA Chemical Reaction Networks.
Proceedings of the Bio-Inspired Computing: Theories and Applications, 2020

2019
A Signal Separation Method for Exceeding the Channel Capacity of BPSK Input.
CoRR, 2019

Beyond the Channel Capacity of BPSK Input.
CoRR, 2019

Cocktail Intra-Symbol-Codes: Exceeding the Channel Limit of QPSK Input.
CoRR, 2019

A Method Beyond Channel Capacity in the Low SNR Regime: Theoretical Proof and Numerical Confirmation.
CoRR, 2019

Cocktail BPSK: Achievable Data Rate beyond Channel Capacity.
CoRR, 2019

WiLabel: Behavior-Based Room Type Automatic Annotation for Indoor Floorplan.
IEEE Access, 2019

Reconstructing Cardiac Shape via Constrained Voronoi Diagram and Cyclic Dynamic Time Wrapping From CMR.
Proceedings of the 46th Computing in Cardiology, 2019

Classifying HCM Subtypes via Left Ventricular Two-Dimensional Curvature and Dynamic Time Wrapping.
Proceedings of the 46th Computing in Cardiology, 2019

Risk Prediction of Esophageal Cancer Using SOM Clustering, SVM and GA-SVM.
Proceedings of the Bio-inspired Computing: Theories and Applications, 2019

2018
Ghost City Extraction and Rate Estimation in China Based on NPP-VIIRS Night-Time Light Data.
ISPRS Int. J. Geo Inf., 2018

Cocktail BPSK: Energy Reused Scheme for High Achievable Data Rates.
CoRR, 2018

Cocktail BPSK: Cross Power Utilization for High Data Rates.
CoRR, 2018

Layered BPSK for High Data Rates.
CoRR, 2018

Normal Cloud Model-Based Algorithm for Multi-Attribute Trusted Cloud Service Selection.
IEEE Access, 2018

Localizing Access Point Through Simple Gesture.
IEEE Access, 2018

2017
Spatial Recognition of the Urban-Rural Fringe of Beijing Using DMSP/OLS Nighttime Light Data.
Remote. Sens., 2017

A framework of cloud service selection based on trust mechanism.
Int. J. Ad Hoc Ubiquitous Comput., 2017

2016
Unbalanced tree-formed verification data for trusted platforms.
Secur. Commun. Networks, 2016

2015
主观信任评估模型与决策方法的研究 (Research of Subjective Trust Evaluation Model and Decision-making).
计算机科学, 2015

Security-aware data replica selection strategy for Bag-of-Tasks application in cloud computing.
J. High Speed Networks, 2015

Trust-Based Scheduling Strategy for Cloud Workflow Applications.
Informatica, 2015

Trusted Validation for Geolocation of Cloud Data.
Comput. J., 2015

2013
Trust-Based Scheduling Strategy for Workflow Applications in Cloud Environment.
Proceedings of the Eighth International Conference on P2P, 2013

2011
A recursive branch-and-bound algorithm for constrained homogenous T-shape cutting patterns.
Math. Comput. Model., 2011

2010
A heuristic for the one-dimensional cutting stock problem with usable leftover.
Eur. J. Oper. Res., 2010

Common Information Multicast with Different Data Rates.
Proceedings of the 71st IEEE Vehicular Technology Conference, 2010

Optimization of parameters of the chemic kinetic model by improved genetic algorithms.
Proceedings of the Sixth International Conference on Natural Computation, 2010

2009
Optimization of Parameters of the Chemic Kinetic Model by Improved Genetic Algorithms.
Proceedings of the Second International Symposium on Intelligent Information Technology and Security Informatics, 2009

2008
A recursive branch-and-bound algorithm for the rectangular guillotine strip packing problem.
Comput. Oper. Res., 2008


  Loading...