Zheng Yuan

According to our database1, Zheng Yuan authored at least 69 papers between 2002 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Simple hash function using discrete-time quantum walks.
Quantum Information Processing, 2018

Construction of the Literature Graph in Semantic Scholar.
CoRR, 2018

Construction of the Literature Graph in Semantic Scholar.
Proceedings of the 2018 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, 2018

Neural sequence modelling for learner error prediction.
Proceedings of the Thirteenth Workshop on Innovative Use of NLP for Building Educational Applications@NAACL-HLT 2018, 2018

OTyper: A Neural Architecture for Open Named Entity Typing.
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, 2018

2017
Parallel Implementation of Lossy Data Compression for Temporal Data Sets.
CoRR, 2017

Artificial Error Generation with Machine Translation and Syntactic Patterns.
CoRR, 2017

Neural Sequence-Labelling Models for Grammatical Error Correction.
Proceedings of the 2017 Conference on Empirical Methods in Natural Language Processing, 2017

Artificial Error Generation with Machine Translation and Syntactic Patterns.
Proceedings of the 12th Workshop on Innovative Use of NLP for Building Educational Applications, 2017

2016
Grammatical error correction using neural machine translation.
Proceedings of the NAACL HLT 2016, 2016

Parallel Implementation of Lossy Data Compression for Temporal Data Sets.
Proceedings of the 23rd IEEE International Conference on High Performance Computing, 2016

Candidate re-ranking for SMT-based grammatical error correction.
Proceedings of the 11th Workshop on Innovative Use of NLP for Building Educational Applications, 2016

2015
Predicting Emotion Labels for Chinese Microblog Texts.
Proceedings of the Advances in Social Media Analysis, 2015

Two Kinds of Biclique Attacks on Lightweight Block Cipher PRINCE.
IACR Cryptology ePrint Archive, 2015

A Star-based Independent Biclique Attack on Full Rounds SQUARE.
IACR Cryptology ePrint Archive, 2015

A Secure Oblivious Transfer Protocol from Indistinguishing Obfuscation.
IACR Cryptology ePrint Archive, 2015

Simplify the Basic Artificial Bee Colony Algorithm.
Proceedings of the 2015 IEEE International Conference on Systems, 2015

Artificial Bee Group Colony Algorithm for Numerical Function Optimization.
Proceedings of the 2015 IEEE International Conference on Systems, 2015

A motion-texture aware denoising for economic hardware design.
Proceedings of the 2015 IEEE International Conference on Image Processing, 2015

2014
To err is human, to correct is divine.
ACM Crossroads, 2014

A Secure Obfuscator for Encrypted Blind Signature Functionality.
Proceedings of the Network and System Security - 8th International Conference, 2014

Generating artificial errors for grammatical error correction.
Proceedings of the 14th Conference of the European Chapter of the Association for Computational Linguistics, 2014

Grammatical error correction using hybrid systems and type filtering.
Proceedings of the Eighteenth Conference on Computational Natural Language Learning: Shared Task, 2014

2013
Quantum private comparison against decoherence noise.
Quantum Information Processing, 2013

Impossible Differential-Linear Cryptanalysis of Full-Round CLEFIA-128.
IACR Cryptology ePrint Archive, 2013

A Secure Obfuscator for Encrypted Blind Signature Functionality.
IACR Cryptology ePrint Archive, 2013

Soil organic matter content GM(0, N) estimation model based on hyper-spectral technique.
Grey Systems: T&A, 2013

Model GM(1, 1, ß) and its applicable region.
Grey Systems: T&A, 2013

A perceptual rate-distortion optimization approach based on piecewise linear approximation for video coding.
Proceedings of the 2013 IEEE International Conference on Multimedia and Expo Workshops, 2013

Constrained Grammatical Error Correction using Statistical Machine Translation.
Proceedings of the Seventeenth Conference on Computational Natural Language Learning: Shared Task, 2013

Secure Obfuscation for Tightly Structure-Preserving Encrypted Proxy Signatures.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013

The Homomorphic Encryption Scheme of Security Obfuscation.
Proceedings of The Eighth International Conference on Bio-Inspired Computing: Theories and Applications, 2013

MEFTTD: A Parallel Awareness Scheduler.
Proceedings of the 2013 International Conference on Cloud and Service Computing, 2013

2012
Addressing Visual Consistency in Video Retargeting: A Refined Homogeneous Approach.
IEEE Trans. Circuits Syst. Video Techn., 2012

Splitting a quantum secret without the assistance of entanglements.
Quantum Information Processing, 2012

The pattern of grey fuzzy forecasting with feedback.
Kybernetes, 2012

User-adaptive mobile video streaming.
Proceedings of the 2012 Visual Communications and Image Processing, 2012

Predicting Emotion Labels for Chinese Microblog Texts.
Proceedings of the 1st International Workshop on Sentiment Discovery from Affective Data, 2012

LPFSC: A Light Weight Parallel Framework for Super Computing.
Proceedings of the 13th International Conference on Parallel and Distributed Computing, 2012

2011
A robust fault-tolerant control strategy for networked control systems.
J. Network and Computer Applications, 2011

The soil organic matter content grey relationship inversion pattern based on hyper-spectral technique.
Grey Systems: T&A, 2011

Features-Based Deisotoping Method for Tandem Mass Spectra.
Adv. Bioinformatics, 2011

Simulation and experiments of intrinsic bending of multilayer microcantilever for maskless scanning plasma etching.
Proceedings of the 6th IEEE International Conference on Nano/Micro Engineered and Molecular Systems, 2011

Video summarization with semantic concept preservation.
Proceedings of the 10th International Conference on Mobile and Ubiquitous Multimedia, 2011

Reduced Order Computational Continua.
Proceedings of the 25th European Conference on Modelling and Simulation, 2011

2010
Distinguishing Attacks on MAC/HMAC Based on A New Dedicated Compression Function Framework.
IACR Cryptology ePrint Archive, 2010

New Impossible Di®erential Attacks on AES.
IACR Cryptology ePrint Archive, 2010

A Flaw in The Internal State Recovery Attack on ALPHA-MAC.
IACR Cryptology ePrint Archive, 2010

Video retargeting: A visual-friendly dynamic programming approach.
Proceedings of the International Conference on Image Processing, 2010

Video retargeting with nonlinear spatial-temporal saliency fusion.
Proceedings of the International Conference on Image Processing, 2010

2009
Exploiting structural and topological information to improve prediction of RNA-protein binding sites.
BMC Bioinformatics, 2009

New Birthday Attacks on Some MACs Based on Block Ciphers.
Proceedings of the Advances in Cryptology, 2009

Distinguishing and Second-Preimage Attacks on CBC-Like MACs.
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009

A New Algorithm Combining Self Organizing Map with Simulated Annealing Used in Intrusion Detection.
Proceedings of the 2nd International Conference on BioMedical Engineering and Informatics, 2009

2008
Distinguishing and Forgery Attacks on Alred and Its AES-based Instance Alpha-MAC.
IACR Cryptology ePrint Archive, 2008

Distinguishing Attack and Second-Preimage Attack on the CBC-like MACs.
IACR Cryptology ePrint Archive, 2008

Robust image restoration for rotary motion degradations and the motion parameter identification.
Proceedings of the International Conference on Image Processing, 2008

Research of Stock Index Futures Prediction Model based on Rough Set and Support Vector Machine.
Proceedings of the 2008 IEEE International Conference on Granular Computing, 2008

2007
Predicting disulfide connectivity from protein sequence using multiple sequence feature vectors and secondary structure.
Bioinformatics, 2007

Mining Stock Market Tendency by RS-Based Support Vector Machines.
Proceedings of the 2007 IEEE International Conference on Granular Computing, 2007

A Novel Authentication Scheme Based on Trust-value Updated Model in Adhoc Network.
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007

2006
MemO: A Consensus Approach to the Annotation of a Protein's Membrane Organization.
In Silico Biology, 2006

Prediction of cis/trans isomerization in proteins using PSI-BLAST profiles and secondary structure information.
BMC Bioinformatics, 2006

Prediction of protein continuum secondary structure with probabilistic models based on NMR solved structures.
BMC Bioinformatics, 2006

An ID-Based Watermarking Scheme for Java Programs.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006

2005
Better prediction of protein contact number using a support vector regression analysis of amino acid sequence.
BMC Bioinformatics, 2005

Predicting Structural Disruption of Proteins Caused by Crossover (based on Amino Acid Sequence).
Proceedings of the 2005 IEEE Symposium on Computational Intelligence in Bioinformatics and Computational Biology, 2005

2004
SVMtm: Support vector machines to predict transmembrane segments.
Journal of Computational Chemistry, 2004

2002
Prediction of Golgi Type II membrane proteins based on their transmembrane domains.
Bioinformatics, 2002


  Loading...