Yuqing Zhang

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Known people with the same name:

Bibliography

2024
Sybil Attacks Detection and Traceability Mechanism Based on Beacon Packets in Connected Automobile Vehicles.
Sensors, April, 2024

Cross-modal fusion encoder via graph neural network for referring image segmentation.
IET Image Process., March, 2024

Semi-supervised Video Object Segmentation Via an Edge Attention Gated Graph Convolutional Network.
ACM Trans. Multim. Comput. Commun. Appl., January, 2024

Generating Chaos with Saddle-Focus Homoclinic Orbit.
Int. J. Bifurc. Chaos, January, 2024

Dynamic Trust-Based Redactable Blockchain Supporting Update and Traceability.
IEEE Trans. Inf. Forensics Secur., 2024

MLC30: A New 30 m Land Cover Dataset for Myanmar From 1990 to 2020 Using Training Sample Migration Framework.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2024

Unsupervised Semantic Segmentation of PolSAR Images Based on Multiview Similarity.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2024

Model-based event/self-triggered fixed-time consensus of nonlinear multi-agent systems.
J. Syst. Control. Eng., 2024

SDR-Former: A Siamese Dual-Resolution Transformer for Liver Lesion Classification Using 3D Multi-Phase Imaging.
CoRR, 2024

Communication-Efficient Personalized Federated Learning for Speech-to-Text Tasks.
CoRR, 2024

Security Evaluation of Emojis in NLP Tasks.
Proceedings of the IEEE International Conference on Big Data and Smart Computing, 2024

2023
ERF-RTMDet: An Improved Small Object Detection Method in Remote Sensing Images.
Remote. Sens., December, 2023

Capability-based remaining useful life prediction of machining tools considering non-geometry and tolerancing features with a hybrid model.
Int. J. Prod. Res., November, 2023

Substantial Reduction in Vegetation Photosynthesis Capacity during Compound Droughts in the Three-River Headwaters Region, China.
Remote. Sens., October, 2023

On the Normalized Laplacian Spectrum of the Linear Pentagonal Derivation Chain and Its Application.
Axioms, October, 2023

A systematic review of generative adversarial imputation network in missing data imputation.
Neural Comput. Appl., September, 2023

A dynamic resource-aware endorsement strategy for improving throughput in blockchain systems.
Expert Syst. Appl., September, 2023

Prediction of corn variety yield with attribute-missing data via graph neural network.
Comput. Electron. Agric., August, 2023

Health warning based on 3R ECG Sample's combined features and LSTM.
Comput. Biol. Medicine, August, 2023

Unified construction and L<sup>2</sup> analysis for the finite volume element method over tensorial meshes.
Adv. Comput. Math., February, 2023

CFRWD-GAN for SAR-to-Optical Image Translation.
Remote. Sens., 2023

Quantum thermometry in electromagnetic field of cosmic string spacetime.
Quantum Inf. Process., 2023

Fully homomorphic encryption-based privacy-preserving scheme for cross edge blockchain network.
J. Syst. Archit., 2023

DPF-S2S: A novel dual-pathway-fusion-based sequence-to-sequence text recognition model.
Neurocomputing, 2023

SoK: Comparing Different Membership Inference Attacks with a Comprehensive Benchmark.
CoRR, 2023

DBSDS: A dual-blockchain security data sharing model with supervision and privacy-protection.
Concurr. Comput. Pract. Exp., 2023

Reconnecting the Broken Civilization: Patchwork Integration of Fragments from Ancient Manuscripts.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

A Survey on the Security of the Metaverse.
Proceedings of the IEEE International Conference on Metaverse Computing, 2023

An Empirical Study on Fine-Tuning Large Language Models of Code for Automated Program Repair.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023

Dense Contrastive Learning Based Object Detection for Remote Sensing Images.
Proceedings of the IEEE International Geoscience and Remote Sensing Symposium, 2023

Virtual Kitakyushu Revitalization Design Based on the Case Study of Immersive Legacies Exhibition in Wellington Museum.
Proceedings of the 49th Annual Conference of the IEEE Industrial Electronics Society, 2023

Influence of Stressors on Adolescent Behavioral Problems: the Mediating effect of Psychological Resilience.
Proceedings of the 7th International Conference on Medical and Health Informatics, 2023

Influence of early skin-to-skin contact on mother-infant relationship -a qualitative study based on Nvivo12 software analysis.
Proceedings of the 7th International Conference on Medical and Health Informatics, 2023

Effect of Childhood Trauma on PTSD and PTG among College Students: The Mediating Role of Attachment.
Proceedings of the 7th International Conference on Medical and Health Informatics, 2023

The Relationship Between Self-concept Clarity and Procrastination among College Students: A Mediation Chain Model.
Proceedings of the 6th International Conference on Big Data and Education, 2023

Lullaland: A Multisensory Virtual Reality Experience to Reduce Stress.
Proceedings of the Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems, 2023

2022
Ultra High-Speed Polynomial Multiplications for Lattice-Based Cryptography on FPGAs.
IEEE Trans. Emerg. Top. Comput., 2022

Group Consensus in Finite Time for Fractional Multiagent Systems With Discontinuous Inherent Dynamics Subject to Hölder Growth.
IEEE Trans. Cybern., 2022

A Spectrally Accurate Numerical Method for Computing the Bogoliubov-de Gennes Excitations of Dipolar Bose-Einstein Condensates.
SIAM J. Sci. Comput., 2022

Damage Monitoring of Engineered Cementitious Composite Beams Reinforced with Hybrid Bars Using Piezoceramic-Based Smart Aggregates.
Sensors, 2022

Product quality monitoring approach considering non-geometric dimensioning data with rapid production process simulation.
Int. J. Prod. Res., 2022

Multiple Chronic Diseases Associated With Tooth Loss Among the US Adult Population.
Frontiers Big Data, 2022

A Secure Data Sharing Framework for Robot Operating Systems Leveraging Ethereum.
CoRR, 2022

On the Laplacian, the Kirchhoff Index, and the Number of Spanning Trees of the Linear Pentagonal Derivation Chain.
Axioms, 2022

Parental expectation, cognitive development, and family function: a moderating inverted-U model.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 26th International Conference KES-2022, 2022

Batch Adaptative Streaming for Video Analytics.
Proceedings of the IEEE INFOCOM 2022, 2022

Mechanism of action of cognitive behavioral therapy on pain in adult women with major TMJ disorders.
Proceedings of the 6th International Conference on Medical and Health Informatics, 2022

The relationship between fathers' rejection and adolescents' creativity and externalizing behavior: the moderating effect of sensation seeking.
Proceedings of the ICBDE'22: The 2022 5th International Conference on Big Data and Education, Shanghai, China, February 26, 2022

Revision of the child and adolescent COVID-19 stressors scale and Big Data-Based Analysis of Disparities in Urban and Rural Areas.
Proceedings of the ICBDE'22: The 2022 5th International Conference on Big Data and Education, Shanghai, China, February 26, 2022

CSL: A Large-scale Chinese Scientific Literature Dataset.
Proceedings of the 29th International Conference on Computational Linguistics, 2022

2021
Analysis and Evaluation of Ultrasound Imaging Features and Pathological Results of Ovarian Cancer.
J. Medical Imaging Health Informatics, 2021

Global Mittag-Leffler consensus for fractional singularly perturbed multi-agent systems with discontinuous inherent dynamics via event-triggered control strategy.
J. Frankl. Inst., 2021

The Development of an Evaluation Model to Assess the Effect of Online English Teaching Based on Fuzzy Mathematics.
Int. J. Emerg. Technol. Learn., 2021

Intelligent flow control algorithm for microservice system.
Cogn. Comput. Syst., 2021

Network pharmacology-based and molecular docking prediction of the active ingredients and mechanism of ZaoRenDiHuang capsules for application in insomnia treatment.
Comput. Biol. Medicine, 2021

Robustifying genomic classifiers to batch effects via ensemble learning.
Bioinform., 2021

Chinese parents' evaluation of children's temperament differences: Factor Analysis Based on PTQ Child Temperament Scale.
Proceedings of the ICETT 2021: 7th International Conference on Education and Training Technologies, Macau, China, April 14, 2021

A Review of Data Representation Methods for Vulnerability Mining Using Deep Learning.
Proceedings of the Frontiers in Cyber Security - 4th International Conference, 2021

2020
Statistical and computational methods for addressing heterogeneity in genomic data
PhD thesis, 2020

An Efficient and Parallel R-LWE Cryptoprocessor.
IEEE Trans. Circuits Syst. II Express Briefs, 2020

Energy-efficient sensory data gathering based on compressed sensing in IoT networks.
J. Cloud Comput., 2020

Perturbed Pricing.
CoRR, 2020

Robust Video Object Segmentation via Propagating Seams and Matching Superpixels.
IEEE Access, 2020

Pattern-Based Personalized Workflow Fragment Discovery.
Proceedings of the 2020 IEEE World Congress on Services, 2020

Service Availability Guarantee with Adaptive Automatic Flow Control.
Proceedings of the 2020 IEEE World Congress on Services, 2020

A Kernel Density Estimation-Based Variation Sampling for Class Imbalance in Defect Prediction.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2020

2019
Machine Learning Allows Calibration Models to Predict Trace Element Concentration in Soil with Generalized LIBS Spectra.
CoRR, 2019

Attack-Defense Quantification Based On Game-Theory.
CoRR, 2019

Towards the Detection of Inconsistencies in Public Security Vulnerability Reports.
Proceedings of the 28th USENIX Security Symposium, 2019

Resource Analysis and Cost Modeling for End-to-End 5G Mobile Networks.
Proceedings of the Optical Network Design and Modeling, 2019

2018
Alternative empirical Bayes models for adjusting for batch effects in genomic studies.
BMC Bioinform., 2018

A Real-Time Method for Marking the Extent of a Lipid Plaque Based on IV-OCT Imaging.
Proceedings of the Cognitive Systems and Signal Processing - 4th International Conference, 2018

2017
A Novel Approach for Security Situational Awareness in the Internet of Things.
CoRR, 2017

Adaptively Detecting Malicious Queries in Web Attacks.
CoRR, 2017

2016
Error estimates of two-level finite element method for Smagorinsky model.
Appl. Math. Comput., 2016

Security Analysis and Vulnerability Detection of Gesture-Based Lock in Android Applications.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

2015
Quantum controlled-not gate in the bad cavity regime.
Quantum Inf. Process., 2015

ASVC: An Automatic Security Vulnerability Categorization Framework Based on Novel Features of Vulnerability Data.
J. Commun., 2015

A Novel Automatic Severity Vulnerability Assessment Framework.
J. Commun., 2015

Hot Topics Extraction from Chinese Micro-blog Based on Sentence.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

A Microblog Data Acquisition Method Based on Follow-Group Mode.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

Repost Number Prediction of Micro-blog on Sina Weibo Using Time Series Fitting and Regression Analysis.
Proceedings of the International Conference on Identification, 2015

2014
Propagation regularity of hot topics in Sina Weibo based on SIR model - A simulation research.
Proceedings of the IEEE Computers, 2014

Hot topics detected from micro-bloggings based on word co-occurrence model.
Proceedings of the IEEE Computers, 2014

AraTRM: Attack Resistible Ant-based Trust and Reputation Model.
Proceedings of the 14th IEEE International Conference on Computer and Information Technology, 2014

2013
A new framework against privilege escalation attacks on android.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2010
The multi-class schedule-based transit assignment model under network uncertainties.
Public Transp., 2010

A Client-Based and Server-Enhanced Defense Mechanism for Cross-Site Request Forgery.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010

Secure and Efficient Generalized Signcryption Scheme Based on a Short ECDSA.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

Secure Signcryption Scheme Based on a Hybrid Encryption.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010

2009
An efficient and provable secure identity-based ring signcryption scheme.
Comput. Stand. Interfaces, 2009

A new provably secure authentication and key agreement protocol for SIP using ECC.
Comput. Stand. Interfaces, 2009

Provably Secure Password-Authenticated Group Key Exchange with Different Passwords under Standard Assumption.
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009

New ID-Based and Threshold Key Distribution Protocol in MANET Using a Multi-signcryption Scheme.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

An Integrated Approach to Worm Detection and Automatic Signature Generation.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

Automatic Vulnerability Locating in Binary Patches.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

2008
An Efficient Identity-based Ring Signcryption Scheme.
IACR Cryptol. ePrint Arch., 2008

Cryptanalysis of a client-to-client password-authenticated key agreement protocol.
IACR Cryptol. ePrint Arch., 2008

A new provably secure authentication and key agreement mechanism for SIP using certificateless public-key cryptography.
Comput. Commun., 2008

The Analysis of an Efficient and Provably Secure ID-Based Threshold Signcryption Scheme and Its Secure Version.
Proceedings of the Provable Security, Second International Conference, 2008

Secure and Efficient Key Management Protocol in Ad Hoc Networks.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

2007
Security Analysis of WAPI Authentication and Key Exchange Protocol.
IACR Cryptol. ePrint Arch., 2007

A New Security Model for Cross-Realm C2C-PAKE Protocol.
IACR Cryptol. ePrint Arch., 2007

Research on User Applying Mode for Video Conference System.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

A Provable Secure Key Management Program for Wireless Sensor Network.
Proceedings of the Computational Intelligence and Security, International Conference, 2007

2005
Deep into the Framework for Different Coarse-grained P2P Computing Based on JXTA.
Proceedings of the 2005 International Conference on Semantics, 2005

Short Threshold Signature Schemes Without Random Oracles.
Proceedings of the Progress in Cryptology, 2005

Running-mode Analysis of the SSL Protocol.
Proceedings of The 2005 International Conference on Internet Computing, 2005

Research of Security Architecture for P2P Network Based on Trust Management System.
Proceedings of the Grid and Cooperative Computing - GCC 2005, 4th International Conference, Beijing, China, November 30, 2005

The Analysis of Peer-to-Peer Network Security.
Proceedings of The 2005 International Conference on Grid Computing and Applications, 2005

Using SMV for Cryptographic Protocol Analysis: A Case Study.
Proceedings of The 2005 International Conference on Foundations of Computer Science, 2005

An approach to the formal verification of the three-principal security protocols.
Proceedings of The 2005 International Conference on Security and Management, 2005

Running-mode Analysis of the Lu-Smolka-SET protocol.
Proceedings of The 2005 International Conference on E-Business, 2005

The Running-Mode Analysis of Two-Party Optimistic Fair Exchange Protocols.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

2004
Running-mode analysis of the Security Socket Layer protocol.
ACM SIGOPS Oper. Syst. Rev., 2004

An approach to the formal verification of the three-principal cryptographic protocols.
ACM SIGOPS Oper. Syst. Rev., 2004

SAP2P: A P2P Network Security Architecture Based on Trust Management System.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2004

2003
Authentication and Access Control in P2P Network.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003

2001
Using SMV for Cryptographic Protocol Analysis: A Case Study.
ACM SIGOPS Oper. Syst. Rev., 2001


  Loading...