Zeming Yang

Orcid: 0000-0003-0009-5401

According to our database1, Zeming Yang authored at least 13 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A General Multilayer Analytical Radiative Transfer-Based Model for Reflectance Over Shallow Water.
IEEE Trans. Geosci. Remote. Sens., 2024

Frequency-agile OFDM Backscatter.
Proceedings of the 22nd Annual International Conference on Mobile Systems, 2024

2023
Study of the Profile Distribution of the Diffuse Attenuation Coefficient and Secchi Disk Depth in the Northwestern South China Sea.
Remote. Sens., March, 2023

2022
Sub-Nyquist Sampling of ECG Signals Based on the Extension of Variable Pulsewidth Model.
IEEE Trans. Instrum. Meas., 2022

2021
Particle filter based optimization scheme for trajectory design and resource allocation of UAV-enabled WPCN system.
Phys. Commun., 2021

Solving Portfolio Optimization Problems with Particle Filter.
Proceedings of the 6GN for Future Wireless Networks - 4th EAI International Conference, 2021

2020
Development of an In Situ Analyzer Based on Sequential Injection Analysis and Liquid Waveguide Capillary Flow Cell for the Determination of Dissolved Reactive Phosphorus in Natural Waters.
Sensors, 2020

2018
Exploiting Proximity-Based Mobile Apps for Large-Scale Location Privacy Probing.
Secur. Commun. Networks, 2018

A Quality Evaluation Method of Cyber Threat Intelligence in User Perspective.
Proceedings of the 17th IEEE International Conference On Trust, 2018

2017
Based on Multi-features and Clustering Ensemble Method for Automatic Malware Categorization.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

An Improved Method to Unveil Malware's Hidden Behavior.
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017

2016
Using Multi-features and Ensemble Learning Method for Imbalanced Malware Classification.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Framework of Cyber Attack Attribution Based on Threat Intelligence.
Proceedings of the Interoperability, Safety and Security in IoT, 2016


  Loading...