Zheng Yan

According to our database1, Zheng Yan authored at least 112 papers between 1986 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
A Neurodynamic Approach to Distributed Optimization With Globally Coupled Constraints.
IEEE Trans. Cybernetics, 2018

General memristor with applications in multilayer neural networks.
Neural Networks, 2018

A survey on network data collection.
J. Network and Computer Applications, 2018

Big data fusion in Internet of Things.
Information Fusion, 2018

On 3-stable number conditions in n-connected claw-free graphs.
Discrete Mathematics, 2018

Towards a simplified ontology for better e-commerce search.
CoRR, 2018

Towards Practical Visual Search Engine within Elasticsearch.
CoRR, 2018

End-to-End Neural Ranking for eCommerce Product Search: an application of task models and textual embeddings.
CoRR, 2018

Revisiting Skip-Gram Negative Sampling Model with Regularization.
CoRR, 2018

Finding the weakest links in the weakest link: How well do undergraduate students make cybersecurity judgment?
Computers in Human Behavior, 2018

Is resilience a protective factor of internet addiction?
Computers in Human Behavior, 2018

Three-Stage Distributed State Estimation for AC-DC Hybrid Distribution Network Under Mixed Measurement Environment.
IEEE Access, 2018

IRTED-TL: An Inter-Region Tax Evasion Detection Method Based on Transfer Learning.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Explore Uncertainty in Residual Networks for Crowds Flow Prediction.
Proceedings of the 2018 International Joint Conference on Neural Networks, 2018

A Study and Simulation Research of Blackhole Attack on Mobile AdHoc Network.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
On fault tolerance of (n, k)-star networks.
Theor. Comput. Sci., 2017

A hybrid approach of mobile malware detection in Android.
J. Parallel Distrib. Comput., 2017

CloudFile: A cloud data access control system based on mobile social trust.
J. Network and Computer Applications, 2017

Special issue on pervasive social networking.
J. Network and Computer Applications, 2017

Cyber Attacks, Contributing Factors, and Tackling Strategies: The Current Status of the Science of Cybersecurity.
IJCBPL, 2017

Independence Number and k-Trees of Graphs.
Graphs and Combinatorics, 2017

Object detection among multimedia big data in the compressive measurement domain under mobile distributed architecture.
Future Generation Comp. Syst., 2017

Three different roles, five different aspects: Differences and similarities in viewing school mobile phone policies among teachers, parents, and students.
Computers & Education, 2017

Machine Learning-Based Malicious Application Detection of Android.
IEEE Access, 2017

TIM: A Trust Insurance Mechanism for Network Function Virtualization Based on Trusted Computing.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Mining Suspicious Tax Evasion Groups in a Corporate Governance Network.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2017

PerRec: A Permission Configuration Recommender System for Mobile Apps.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2017

Dynamic MAC Protocol for Tactical Data Links.
Proceedings of the 2017 IEEE International Conference on Computer and Information Technology, 2017

2016
A Tensor-Based Framework for Software-Defined Cloud Data Center.
TOMCCAP, 2016

Embedded connectivity of recursive networks.
Theor. Comput. Sci., 2016

SecIoT: a security framework for the Internet of Things.
Security and Communication Networks, 2016

Security protocols in body sensor networks using visible light communications.
Int. J. Communication Systems, 2016

(1, f)-Factors of Graphs with Odd Property.
Graphs and Combinatorics, 2016

Spanning trees whose stems have a bounded number of branch vertices.
Discussiones Mathematicae Graph Theory, 2016

Spanning trees with bounded degrees and leaves.
Discrete Mathematics, 2016

Mobile phone addiction levels and negative emotions among Chinese young adults: The mediating role of interpersonal problems.
Computers in Human Behavior, 2016

Corrigendum to "Does multitasking with mobile phones affect learning? A review" [Comput. Hum. Behav. 54 (2016) 34-42].
Computers in Human Behavior, 2016

Does multitasking with mobile phones affect learning? A review.
Computers in Human Behavior, 2016

Security in Software-Defined-Networking: A Survey.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016

Privacy Protection in Mobile Recommender Systems: A Survey.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016

UpBit: Scalable In-Memory Updatable Bitmap Indexing.
Proceedings of the 2016 International Conference on Management of Data, 2016

A Survey on Trust Evaluation in E-commerce.
Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications, 2016

Trust Evaluation in Social Networking: A Review.
Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications, 2016

A Survey on Trust Evaluation in Mobile Ad Hoc Networks.
Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications, 2016

Trust and Reputation Evaluation Mechanisms in Grid Computing: A Review.
Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications, 2016

A Usable Authentication System Based on Personal Voice Challenge.
Proceedings of the International Conference on Advanced Cloud and Big Data, 2016

2015
PSNController: An Unwanted Content Control System in Pervasive Social Networking Based on Trust Management.
TOMCCAP, 2015

Creating real body model of dressed human based on fat extent of body.
Multimedia Tools Appl., 2015

Characteristics of delivery pressure in the axial piston pump with combination of variable displacement and variable speed.
J. Systems & Control Engineering, 2015

A Weighted Semi-Distributed Routing Algorithm for LEO satellite networks.
J. Network and Computer Applications, 2015

An approach to rank reviews by fusing and mining opinions based on review pertinence.
Information Fusion, 2015

Fusion - An aide to data mining in Internet of Things.
Information Fusion, 2015

The study of brain networks driven by steady-state visual evoked potentials.
Int. J. Imaging Systems and Technology, 2015

Software Defined Intelligent Building.
IJISP, 2015

A Pilot Study of Comparing Social Network Behaviors between Onlies and Others.
IJCBPL, 2015

Spanning Trees Whose Stems are Spiders.
Graphs and Combinatorics, 2015

Strong f-star factors of graphs.
Discussiones Mathematicae Graph Theory, 2015

CloudRec: A Mobile Cloud Service Recommender System Based on Adaptive QoS Management.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

A Study of IEEE 802.15.6 Association Protocols.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Global Exponential Anti-synchronization of Coupled Memristive Chaotic Neural Networks with Time-Varying Delays.
Proceedings of the Advances in Neural Networks - ISNN 2015, 2015

Real-Time Robust Model Predictive Control of Mobile Robots Based on Recurrent Neural Networks.
Proceedings of the Neural Information Processing - 22nd International Conference, 2015

2014
PerContRep: a practical reputation system for pervasive content services.
The Journal of Supercomputing, 2014

Can the Virginia Internet Safety Program Improve Fourth Graders' Internet Safety Knowledge?
IJCBPL, 2014

Star-cycle factors of graphs.
Discussiones Mathematicae Graph Theory, 2014

Centralized and Decentralized Optimal Scheduling for Charging Electric Vehicles.
CoRR, 2014

Cyber Behavior of Microblog Users: Onlies Versus Others.
CoRR, 2014

To ban or not to ban: Differences in mobile phone policies at elementary, middle, and high schools.
Computers in Human Behavior, 2014

Spanning trees whose stems have at most k leaves.
Ars Comb., 2014

Security Related Data Mining.
Proceedings of the 14th IEEE International Conference on Computer and Information Technology, 2014

2013
A practical reputation system for pervasive social chatting.
J. Comput. Syst. Sci., 2013

Ant-Based Swarm Algorithm for Charging Coordination of Electric Vehicles.
IJDSN, 2013

The Science of Cell Phone Use: Its Past, Present, and Future.
IJCBPL, 2013

The Science of Cyber Behavior: An Emerged Field of Research.
IJCBPL, 2013

Mobile Phones in Data Collection: A Systematic Review.
IJCBPL, 2013

Self-Report Versus Web-Log: Which One is Better to Predict Personality of Website Users?
IJCBPL, 2013

New Evidence of Impacts of Cell Phone Use on Driving Performance: A Review.
IJCBPL, 2013

Human interactive secure key and identity exchange protocols in body sensor networks.
IET Information Security, 2013

2012
Internet vs. Matter: Differences in Students' Concept Development from Elementary through High School.
IJCBPL, 2012

Online Decision-Making in Receiving Spam Emails Among College Students.
IJCBPL, 2012

Prevalence and Correlates of Internet Addiction in Undergraduate Students: Assessing with Two Major Measures.
IJCBPL, 2012

Cell Phone Use Leads to Brain Tumors.
IJCBPL, 2012

Structure and function of maladaptive cognitions in Pathological Internet Use among Chinese adolescents.
Computers in Human Behavior, 2012

Gemini: A Handbag for Pervasive Social Communications.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Spanning Caterpillars Having at Most k Leaves.
Proceedings of the Computational Geometry and Graphs - Thailand-Japan Joint Conference, 2012

2011
Autonomic Trust Management for a Component-Based Software System.
IEEE Trans. Dependable Sec. Comput., 2011

Growing From Childhood into Adolescence: The Science of Cyber Behavior.
IJCBPL, 2011

Message Receiver Determination in Multiple Simultaneous IM Conversations.
IEEE Intelligent Systems, 2011

Right-and-left visual field stimulation: A frequency and space mixed coding method for SSVEP based brain-computer interface.
SCIENCE CHINA Information Sciences, 2011

2010
Intergenic and Repeat Transcription in Human, Chimpanzee and Macaque Brains Measured by RNA-Seq.
PLoS Computational Biology, 2010

An Efficient Lightweight Testbed for Networks Emulation.
JCIT, 2010

Factors affecting response rates of the web survey: A systematic review.
Computers in Human Behavior, 2010

A grid computing based approach for the power system dynamic security assessment.
Computers & Electrical Engineering, 2010

AdContRep: A Privacy Enhanced Reputation System for MANET Content Services.
Proceedings of the Ubiquitous Intelligence and Computing - 7th International Conference, 2010

A Methodology to Predicate Human-Being's Movement Based on Movement Group.
Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications, 2010

2009
Research of Welding Robot Controlled by PMAC and ARM Two Processors.
Proceedings of the 2009 International Asia Conference on Informatics in Control, 2009

Formalizing Trust Based on Usage Behaviours for Mobile Applications.
Proceedings of the Autonomic and Trusted Computing, 6th International Conference, 2009

2008
Computer Vision Syndrome: A widely spreading but largely unknown epidemic among computer users.
Computers in Human Behavior, 2008

Cracking the walnut: Using a computer game to impact cognition, emotion, and behavior of highly aggressive fifth grade students.
Computers in Human Behavior, 2008

Autonomic Trust Management for a Pervasive System.
Proceedings of the SECRYPT 2008, 2008

2007
Heavy-ion conformal irradiation in the shallow-seated tumor therapy terminal at HIRFL.
Med. Biol. Engineering and Computing, 2007

Predicting Trustworthiness for Component Software.
Proceedings of the Third International Workshop on Security, 2007

An Adaptive Trust Control Model for a Trustworthy Component Software Platform.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

2006
Different experiences, different effects: a longitudinal study of learning a computer program in a network environment.
Computers in Human Behavior, 2006

A Conceptual Architecture of a Trusted Mobile Environment.
Proceedings of the Second International Workshop on Security, 2006

Autonomic Trust Management in a Component Based Software System.
Proceedings of the Autonomic and Trusted Computing, Third International Conference, 2006

2004
A Mechanism for Trust Sustainability Among Trusted Computing Platforms.
Proceedings of the Trust and Privacy in Digital Business, First International Conference, 2004

Knowledge Sharing in Collaborative Commerce: Its Characteristics, Research Framework and Process.
Proceedings of the Pacific Asia Conference on Information Systems, 2004

A geometrical study on voltage collapse mechanisms of power systems.
Proceedings of the 2004 International Symposium on Circuits and Systems, 2004

2003
Methodology to Bridge Different Domains of Trust in Mobile Communications.
Proceedings of the Trust Management, First International Conference, 2003

1999
Defect detection using power supply transient signal analysis.
Proceedings of the Proceedings IEEE International Test Conference 1999, 1999

8-Bit Multiplier Simulation Experiments Investigating the Use of Power Supply Transient Signals for the Detection of CMOS Defects.
Proceedings of the 14th International Symposium on Defect and Fault-Tolerance in VLSI Systems (DFT '99), 1999

1986
Error analysis for piecewise quadratic curve fitting algorithms.
Computer Aided Geometric Design, 1986


  Loading...