Baijian Justin Yang

Orcid: 0000-0003-4440-3701

Affiliations:
  • Purdue University, USA


According to our database1, Baijian Justin Yang authored at least 89 papers between 2002 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Cybersecurity Education in the Age of Artificial Intelligence: A Novel Proactive and Collaborative Learning Paradigm.
IEEE Trans. Educ., June, 2024

Hyper-STTN: Social Group-aware Spatial-Temporal Transformer Network for Human Trajectory Prediction with Hypergraph Reasoning.
CoRR, 2024

2023
SpaRx: elucidate single-cell spatial heterogeneity of drug responses for personalized treatment.
Briefings Bioinform., September, 2023

spaCI: deciphering spatial cellular communications through adaptive graph model.
Briefings Bioinform., January, 2023

Affective Workload Allocation for Multi-human Multi-robot Teams.
CoRR, 2023

Making Autonomous Stores Smarter (MASS): A Practical Solution to Improve Product Detection Performance Using Synthetic Dataset at Scale.
Proceedings of the 8th IEEE International Conference on Smart Cloud, 2023

Feature Selection for Unsupervised Machine Learning.
Proceedings of the 8th IEEE International Conference on Smart Cloud, 2023

ARDaC Common Data Model Facilitates Data Dissemination and Enables Data Commons for Modern Clinical Studies.
Proceedings of the MEDINFO 2023 - The Future Is Accessible, 2023

Improved Clustering Using Nice Initialization.
Proceedings of the IEEE Global Communications Conference, 2023

PINet: Privileged Information Improve the Interpretablity and generalization of structural MRI in Alzheimer's Disease.
Proceedings of the 14th ACM International Conference on Bioinformatics, 2023

2022
Uncovering Brain Differences in Preschoolers and Young Adolescents with Autism Spectrum Disorder Using Deep Learning.
Int. J. Neural Syst., 2022

A Triangulation-Based Visual Localization for Field Robots.
IEEE CAA J. Autom. Sinica, 2022

Managing Controlled Unclassified Information in Research Institutions.
CoRR, 2022

Husformer: A Multi-Modal Transformer for Multi-Modal Human State Recognition.
CoRR, 2022

Cybersecurity Education in the Age of Artificial Intelligence: A Novel Proactive and Collaborative Learning Paradigm.
Proceedings of the IEEE Frontiers in Education Conference, 2022

SemiCon: A Semi-supervised Learning for Industrial Image Inspection.
Proceedings of the 9th IEEE International Conference on Cyber Security and Cloud Computing, 2022

The Alcoholic Hepatitis Network Research Data Commons (ARDaC): Design and Development.
Proceedings of the AMIA 2022, 2022

2021
Anomaly detection of core failures in die casting X-ray inspection images using a convolutional autoencoder.
Mach. Vis. Appl., 2021

Securing CHEESEHub: A Cloud-based, Containerized Cybersecurity Education Platform.
Proceedings of the PEARC '21: Practice and Experience in Advanced Research Computing, 2021

ADNet: Identify biomarkers of Alzheimer Disease with MRI and EMR data using Deep Neural Networks.
Proceedings of the AMIA 2021, American Medical Informatics Association Annual Symposium, San Diego, CA, USA, October 30, 2021, 2021

PASC CKD: revealing the progression trajectories of sustained COVID-19-related renal injury using real-world evidence.
Proceedings of the AMIA 2021, American Medical Informatics Association Annual Symposium, San Diego, CA, USA, October 30, 2021, 2021

DenserNet: Weakly Supervised Visual Localization Using Multi-Scale Feature Aggregation.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
PENet: Object Detection using Points Estimation in Aerial Images.
CoRR, 2020

HOOD: High-Order Orthogonal Decomposition for Tensors.
Proceedings of the Smart Computing and Communication - 5th International Conference, 2020

Managing Controlled Unclassified Information (CUI) in Research Institutions.
Proceedings of the SIGITE '20: The 21st Annual Conference on Information Technology Education, 2020

Visual Localization for Autonomous Driving: Mapping the Accurate Location in the City Maze.
Proceedings of the 25th International Conference on Pattern Recognition, 2020

PENet: Object Detection Using Points Estimation in High Definition Aerial Images.
Proceedings of the 19th IEEE International Conference on Machine Learning and Applications, 2020

Low-Rank Sparse Tensor Approximations for Large High-Resolution Videos.
Proceedings of the 19th IEEE International Conference on Machine Learning and Applications, 2020

Regression PCA for Moving Objects Separation.
Proceedings of the IEEE Global Communications Conference, 2020

CHEESE: Cyber Human Ecosystem of Engaged Security Education.
Proceedings of the IEEE Frontiers in Education Conference, 2020

2019
A Performance Evaluation of CAN Encryption.
Proceedings of the First IEEE International Conference on Trust, 2019

Computer Vision-based Algae Removal Planner for Multi-robot Teams.
Proceedings of the 2019 IEEE International Conference on Systems, Man and Cybernetics, 2019

The Role of Multiple Representations and Representational Fluency in Cryptography Education.
Proceedings of the 20th Annual SIG Conference on Information Technology Education, 2019

Multiple Learning for Regression in Big Data.
Proceedings of the 18th IEEE International Conference On Machine Learning And Applications, 2019

Security Vulnerabilities in Consumer IoT Applications.
Proceedings of the 5th IEEE International Conference on Big Data Security on Cloud, 2019

Predicting Network Attacks with CNN by Constructing Images from NetFlow Data.
Proceedings of the 5th IEEE International Conference on Big Data Security on Cloud, 2019

Sparse Block Regression (SBR) for Big Data with Categorical Variables.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

2018
Internet of things: Survey on security.
Inf. Secur. J. A Glob. Perspect., 2018

Algae Detection Using Computer Vision and Deep Learning.
CoRR, 2018

The Process of Reverse Engineering GPU Malware and Provide Protection to GPUS.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Representational Fluency in Cryptography: An Eye-Tracking Study.
Proceedings of the 19th Annual SIG Conference on Information Technology Education, 2018

Blockchain-Based Whitelisting for Consumer IoT Devices and Home Networks.
Proceedings of the 19th Annual SIG Conference on Information Technology Education, 2018

RFID Security, Verification, and Blockchain: Vulnerabilities within the Supply Chain for Food Security.
Proceedings of the 19th Annual SIG Conference on Information Technology Education, 2018

Phoenixmap: Spatio-Temporal Distribution Analysis With Deep Learning Classifications.
Proceedings of the 13th IEEE Conference on Visual Analytics Science and Technology, 2018

Deep CNN-Based Methods to Evaluate Neighborhood-Scale Urban Valuation Through Street Scenes Perception.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

Streaming Algorithm for Big Data Logistic Regression.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

File Toolkit for Selective Analysis & Reconstruction (FileTSAR) for Large-Scale Networks.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

A Study of Exact Ridge Regression for Big Data.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

2017
Box-Cox Transformation in Big Data.
Technometrics, 2017

NetFlowMatrix: a visual approach for analysing large NetFlow data.
Int. J. Secur. Networks, 2017

An exact approach to ridge regression for big data.
Comput. Stat., 2017

Internet of Things: Survey on Security and Privacy.
CoRR, 2017

Try-CybSI: An Extensible Cybersecurity Learning and Demonstration Platform.
Proceedings of the 18th Annual Conference on Information Technology Education and the 6th Annual Conference on Research in Information Technology, 2017

Indexing Architecture for File Extraction from Network Traffic.
Proceedings of the 6th Annual Conference on Research in Information Technology, 2017

A countermeasure against relay attack in NFC payment.
Proceedings of the Second International Conference on Internet of things and Cloud Computing, 2017

Multichannel key exchange.
Proceedings of the Second International Conference on Internet of things and Cloud Computing, 2017

Finding the Best Box-Cox Transformation in Big Data with Meta-Model Learning: A Case Study on QCT Developer Cloud.
Proceedings of the 4th IEEE International Conference on Cyber Security and Cloud Computing, 2017

Vulnerabilities in hub architecture IoT devices.
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017

Finding the best box-cox transformation from massive datasets on spark.
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017

2016
Try-CybSI: A Platform for Trying Out Cybersecurity.
IEEE Secur. Priv., 2016

Big Data Dimension Reduction Using PCA.
Proceedings of the 2016 IEEE International Conference on Smart Cloud, 2016

A Scalable Feature Selection and Model Updating Approach for Big Data Machine Learning.
Proceedings of the 2016 IEEE International Conference on Smart Cloud, 2016

Predicting network attack patterns in SDN using machine learning approach.
Proceedings of the 2016 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), 2016

A Scalable Meta-Model for Big Data Security Analyses.
Proceedings of the 2nd IEEE International Conference on Big Data Security on Cloud, 2016

A Black-Box Self-Learning Scheduler for Cloud Block Storage Systems.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016

2015
A Study on Botnets Utilizing DNS.
Proceedings of the 4th Annual ACM Conference on Research in Information Technology, 2015

A Man-in-the-Middle attack against OpenDayLight SDN controller.
Proceedings of the 4th Annual ACM Conference on Research in Information Technology, 2015

A visual analytics approach to detecting server redirections and data exfiltration.
Proceedings of the 2015 IEEE International Conference on Intelligence and Security Informatics, 2015

Forensically Sound Retrieval and Recovery of Images from GPU Memory.
Proceedings of the Digital Forensics and Cyber Crime - 7th International Conference, 2015

2014
A D-S evidence theory based fuzzy trust model in file-sharing P2P networks.
Peer-to-Peer Netw. Appl., 2014

Securing Virtualized Datacenters.
CoRR, 2014

Trust-based incentive mechanism to motivate cooperation in hybrid P2P networks.
Comput. Networks, 2014

Detecting subtle port scans through characteristics based on interactive visualization.
Proceedings of the 3rd annual conference on Research in information technology, 2014

A taxonomy of privacy-protecting tools to browse the world wide web.
Proceedings of the 3rd annual conference on Research in information technology, 2014

2012
Cable-Based Moving Reachability with Mobile Sensors.
Ad Hoc Sens. Wirel. Networks, 2012

2011
R<sup>2</sup> Trust, a reputation and risk based trust management framework for large-scale, fully decentralized overlay networks.
Future Gener. Comput. Syst., 2011

2009
On the reliability of large-scale distributed systems - A topological view.
Comput. Networks, 2009

LORP: a load-balancing based optimal routing protocol for sensor networks with bottlenecks.
Proceedings of the 2009 IEEE Wireless Communications and Networking Conference, 2009

tk-coverage: Time-Based K-Coverage for Energy Efficient Monitoring.
Proceedings of the 15th IEEE International Conference on Parallel and Distributed Systems, 2009

2008
PAS: Prediction-based Adaptive Sleeping for Diffusion Stimulus Monitoring Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2008

2007
Design a Building Intelligence Management System with SOA and RFID Technology.
Proceedings of the 2007 International Conference on Software Engineering Research & Practice, 2007

2006
A Survey on Topology issues in Wireless Sensor Network.
Proceedings of the 2006 International Conference on Wireless Networks, 2006

A Framework to Provide Trust and Incentive in CROWN Grid for Dynamic Resource Management.
Proceedings of the 15th International Conference On Computer Communications and Networks, 2006

2004
DiffServ-Aware Multicasting.
J. High Speed Networks, 2004

Multicasting in MPLS domains.
Comput. Commun., 2004

Efficient Gnutella-like P2P Overlay Construction.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2004

2003
A Tree Building Technique for Overlay Multicasting in DiffServ Domains.
Proceedings of the International Conference on Internet Computing, 2003

2002
Edge router multicasting with MPLS traffic engineering.
Proceedings of the Proceedings 10th IEEE International Conference on Networks: Towards Network Superiority, 2002

Multicasting in differentiated service domains.
Proceedings of the Global Telecommunications Conference, 2002


  Loading...