Jianhua Yang
This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.
Bibliography
2024
In Situ Growth of COF/PVA-Carrageenan Hydrogel Using the Impregnation Method for the Purpose of Highly Sensitive Ammonia Detection.
Sensors, July, 2024
ActionMixer: Temporal action detection with Optimal Action Segment Assignment and mixers.
Expert Syst. Appl., March, 2024
Highway Ecological Environmental Assessment Based on Modified Remote Sensing Index - Taking the Lhasa-Nyingchi Motorway as an Example.
Remote. Sens., January, 2024
Near-Infrared Radiance of Vegetation is More Sensitive Than Vegetation Indices for Monitoring NPP of Winter Wheat Under Water Stress.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2024
Kybernetes, 2024
SPK: Semantic and Positional Knowledge for Zero-Shot Referring Expression Comprehension.
Proceedings of the Pattern Recognition - 27th International Conference, 2024
2023
Toward high imperceptibility deep JPEG steganography based on sparse adversarial attack.
J. Vis. Commun. Image Represent., December, 2023
Mach. Vis. Appl., November, 2023
Actions as points: a simple and efficient detector for skeleton-based temporal action detection.
Mach. Vis. Appl., March, 2023
Neural Networks, 2023
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2023
YOWOv2: A Stronger yet Efficient Multi-level Detection Framework for Real-time Spatio-temporal Action Detection.
CoRR, 2023
Joint Optimization of Condition-Based Maintenance and Spare Ordering Strategy for a Multistate Competing Failure System.
IEEE Access, 2023
A Novel Approach to Air Quality Monitoring: Towards Miniature, Self-organized, and Low-power Device.
Proceedings of the 2023 IEEE SENSORS, Vienna, Austria, October 29 - Nov. 1, 2023, 2023
Proceedings of the 2023 IEEE SENSORS, Vienna, Austria, October 29 - Nov. 1, 2023, 2023
Proceedings of the Data Science, 2023
Optimizing Supply Chain Performance of SMEs through Big Data Analytic and IT-enabled Capabilities.
Proceedings of the 7th International Conference on Management Engineering, 2023
Research on the Design Narrative for Medical Popular Science Serious Games: A Case Study of AIDS Prevention Game "Bluebridge Cafe".
Proceedings of the Universal Access in Human-Computer Interaction, 2023
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023
2022
Exploring the Ability of Solar-Induced Chlorophyll Fluorescence for Drought Monitoring Based on an Intelligent Irrigation Control System.
Remote. Sens., December, 2022
Int. J. Emerg. Technol. Learn., May, 2022
IEEE Trans. Image Process., 2022
Long-Term Frequency Stability Analysis for RRFM and Power-Law Noise Determination of the BeiDou-3 Satellite On-Board Atomic Clocks.
IEEE Trans. Instrum. Meas., 2022
IEEE Trans. Instrum. Meas., 2022
Exploring the Potential of Spatially Downscaled Solar-Induced Chlorophyll Fluorescence to Monitor Drought Effects on Gross Primary Production in Winter Wheat.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2022
Sensors, 2022
Improving Soil Moisture Estimation via Assimilation of Remote Sensing Product into the DSSAT Crop Model and Its Effect on Agricultural Drought Monitoring.
Remote. Sens., 2022
High-Accuracy Clock Offsets Estimation Strategy of BDS-3 Using Multi-Source Observations.
Remote. Sens., 2022
A Study on Pseudorange Biases in BDS B1I/B3I Signals and the Impacts on Beidou Wide Area Differential Services.
Remote. Sens., 2022
Remote. Sens., 2022
Pol3Base: a resource for decoding the interactome, expression, evolution, epitranscriptome and disease variations of Pol III-transcribed ncRNAs.
Nucleic Acids Res., 2022
Stepping-Stone Intrusion Detection via Estimating Numbers of Upstream and Downstream Connections using Packet Crossover.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2022
Modelling Network Traffic and Exploiting Encrypted Packets to Detect Stepping-stone Intrusions.
J. Internet Serv. Inf. Secur., 2022
A novel fast combine-and-conquer object detector based on only one-level feature map.
Comput. Vis. Image Underst., 2022
Adaptive Dark Channel Prior Enhancement Algorithm for Different Source Night Vision Halation Images.
IEEE Access, 2022
Proceedings of the Information Security Applications - 23rd International Conference, 2022
Proceedings of the IEEE International Conference on e-Business Engineering, 2022
Modeling Network Traffic via Identifying Encrypted Packets to Detect Stepping-Stone Intrusion Under the Framework of Heterogonous Packet Encryption.
Proceedings of the Advanced Information Networking and Applications, 2022
2021
Mining Network Traffic with the k -Means Clustering Algorithm for Stepping-Stone Intrusion Detection.
Wirel. Commun. Mob. Comput., 2021
A Framework to Test Resistency of Detection Algorithms for Stepping-Stone Intrusion on Time-Jittering Manipulation.
Wirel. Commun. Mob. Comput., 2021
Applying MMD Data Mining to Match Network Traffic for Stepping-Stone Intrusion Detection.
Sensors, 2021
Sensors, 2021
deepBase v3.0: expression atlas and interactive analysis of ncRNAs from thousands of deep-sequencing data.
Nucleic Acids Res., 2021
A framework of generative adversarial networks with novel loss for JPEG restoration and anti-forensics.
Multim. Syst., 2021
Development of the Interactive Rehabilitation Game System for Children with Autism Based on Game Psychology.
Mob. Inf. Syst., 2021
Int. J. Bioinform. Res. Appl., 2021
CoRR, 2021
Optimal Condition-Based Maintenance Strategy via an Availability-Cost Hybrid Factor for a Single-Unit System During a Two-Stage Failure Process.
IEEE Access, 2021
The Programming Model of Air-Ground Cooperative Patrol Between Multi-UAV and Police Car.
IEEE Access, 2021
Landmark-RxR: Solving Vision-and-Language Navigation with Fine-Grained Alignment Supervision.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021
Proceedings of the 2021 IEEE International Conference on Image Processing, 2021
Proceedings of the Advanced Information Networking and Applications, 2021
2020
IEEE Trans. Inf. Forensics Secur., 2020
Exceptional Drought across Southeastern Australia Caused by Extreme Lack of Precipitation and Its Impacts on NDVI and SIF in 2018.
Remote. Sens., 2020
Nonlinear Relationship Between the Yield of Solar-Induced Chlorophyll Fluorescence and Photosynthetic Efficiency in Senescent Crops.
Remote. Sens., 2020
An Integrated Approach for Detection and Prediction of Greening Situation in a Typical Desert Area in China and Its Human and Climatic Factors Analysis.
ISPRS Int. J. Geo Inf., 2020
Int. J. Distributed Sens. Networks, 2020
Identification of novel flowering genes using RNA-Seq pipeline employing combinatorial approach in Arabidopsis thaliana time-series apical shoot meristem data.
Int. J. Bioinform. Res. Appl., 2020
Proceedings of the 3rd International Conference on Smart BlockChain, 2020
Proceedings of the Pattern Recognition and Computer Vision, Third Chinese Conference, 2020
Proceedings of the 39th IEEE International Performance Computing and Communications Conference, 2020
Reinforcement Learning Aided Network Architecture Generation for JPEG Image Steganalysis.
Proceedings of the IH&MMSec '20: ACM Workshop on Information Hiding and Multimedia Security, 2020
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020
Proceedings of the Web, Artificial Intelligence and Network Applications, 2020
Blended Learning Course Design from the Perspective of Learning Powered by Technology-A Case Study on Computer Networking.
Proceedings of the Advanced Information Networking and Applications, 2020
2019
The Impacts of Growth and Environmental Parameters on Solar-Induced Chlorophyll Fluorescence at Seasonal and Diurnal Scales.
Remote. Sens., 2019
Multim. Tools Appl., 2019
PLIT: An alignment-free computational tool for identification of long non-coding RNAs in plant transcriptomic datasets.
Comput. Biol. Medicine, 2019
Minimum-Latency Data Gathering Scheduling in Multi-Channel Wireless Sensor Networks Using Only Secure Links.
Proceedings of the 15th International Conference on Mobile Ad-Hoc and Sensor Networks, 2019
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019
Proceedings of the Smart Health - International Conference, 2019
Effect of Supply Chain Agility Dimensions on Supply Chain Performance: A Case of Iranian SMEs.
Proceedings of the 2nd International Conference on Big Data Technologies, 2019
Proceedings of the 12th Asian Control Conference, 2019
2018
Internet Things, 2018
The impact of mobile marketing on online consumer buying behaviour: empirical evidence from Pakistan.
Int. J. Mob. Commun., 2018
An Empirical Study to Understand the Effect of Supply Chain Agility on Organizational Operational Performance: SC Agility and Organizational Performance.
Int. J. Inf. Syst. Supply Chain Manag., 2018
Applying improved particle swarm optimization for dynamic service composition focusing on quality of service evaluations under hybrid networks.
Int. J. Distributed Sens. Networks, 2018
Realising the decomposition of a multi-frequency signal under the coloured noise background by the adaptive stochastic resonance in the non-linear system with periodic potential.
IET Signal Process., 2018
EURASIP J. Wirel. Commun. Netw., 2018
Proceedings of the 15th IEEE International Symposium on Biomedical Imaging, 2018
Proceedings of the 2018 International Conference on Internet and e-Business, 2018
Steganography with Convincing Normal Image from A Joint Generative Adversarial Framework.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018
Proceedings of the 32nd International Conference on Advanced Information Networking and Applications Workshops, 2018
Proceedings of the 32nd International Conference on Advanced Information Networking and Applications Workshops, 2018
2017
A Parallel Strategy for Convolutional Neural Network Based on Heterogeneous Cluster for Mobile Information System.
Mob. Inf. Syst., 2017
The Effect of Mobile Marketing and Email Marketing on Exploratory Information Seeking (EIS) Behavior of the Consumers: Communication Through Wireless Technologies.
Int. J. Enterp. Inf. Syst., 2017
Proceedings of the International Conference on Systems, Signals and Image Processing, 2017
Proceedings of the Digital Forensics and Watermarking - 16th International Workshop, 2017
Proceedings of the 2017 International Conference on Management Engineering, 2017
An RNA-Seq Bioinformatics Pipeline for Data Processing of Arabidopsis Thaliana Datasets.
Proceedings of the International Conference on Bioinformatics Research and Applications 2017, 2017
Proceedings of the 25th European Signal Processing Conference, 2017
Integrate Stepping-Stone Intrusion Detection Technique into Cybersecurity Curriculum.
Proceedings of the 31st International Conference on Advanced Information Networking and Applications Workshops, 2017
Ethical Hacking and Network Defense: Choose Your Best Network Vulnerability Scanning Tool.
Proceedings of the 31st International Conference on Advanced Information Networking and Applications Workshops, 2017
Proceedings of the 31st International Conference on Advanced Information Networking and Applications Workshops, 2017
2016
A Multi-purpose Image Counter-anti-forensic Method Using Convolutional Neural Networks.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016
Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops, 2016
Resistance to Chaff Attack through TCP/IP Packet Cross-Matching and RTT-Based Random Walk.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016
2015
A Multi-Constrained Routing Algorithm for Software Defined Network Based on Nonlinear Annealing.
J. Networks, 2015
Proceedings of the 2015 Information Security Curriculum Development Conference, 2015
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015
2014
Comput. Math. Methods Medicine, 2014
Enhance learning through developing network security hands-on lab for online students.
Proceedings of the 2014 Information Security Curriculum Development Conference, 2014
2013
IEEE Geosci. Remote. Sens. Lett., 2013
Proceedings of the Advanced Data Mining and Applications, 9th International Conference, 2013
2012
Study on the Education Investment Risk of Enterprise Human Capital Based on Monte Carlo Simulation Method.
J. Comput., 2012
Sci. China Inf. Sci., 2012
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012
Proceedings of the IEEE 26th International Conference on Advanced Information Networking and Applications, 2012
2011
Simul. Model. Pract. Theory, 2011
Comput. Secur., 2011
Proceedings of the IEEE 10th International Conference on Trust, 2011
Proceedings of the 2011 Information Security Curriculum Development Conference, 2011
A new algorithm of image denoising based on stationary wavelet multi-scale adaptive threshold.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011
Detect Stepping-Stone Insider Attacks by Network Traffic Mining and Dynamic Programming.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications, 2011
2010
A Colorimetric Sensor for Qualitative Discrimination and Quantitative Detection of Volatile Amines.
Sensors, 2010
Proceedings of the Fourth IEEE International Conference on Research Challenges in Information Science, 2010
Proceedings of the Computer and Computing Technologies in Agriculture IV, 2010
On the construction and implementation methods for performance measurement of reverse supply chain.
Proceedings of the Seventh International Conference on Fuzzy Systems and Knowledge Discovery, 2010
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010
Using Dynamic Programming Techniques to Detect Multi-hop Stepping-Stone Pairs in a Connection Chain.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010
2009
Integrative performance evaluation for supply chain system based on logarithm triangular fuzzy number-AHP method.
Kybernetes, 2009
A context quality management infrastructure for complex ubiquitous environment.
Comput. Syst. Sci. Eng., 2009
Research on Multi-Agent Parallel Computing Model of Hydrothermal Economic Dispatch in Power System.
Proceedings of the Advances in Neural Networks, 2009
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009
Proceedings of the Business Intelligence: Artificial Intelligence in Business, 2009
Correlating TCP/IP Interactive Sessions with Correlation Coefficient to Detect Stepping-Stone Intrusion.
Proceedings of the IEEE 23rd International Conference on Advanced Information Networking and Applications, 2009
2008
Proceedings of the LCN 2008, 2008
Proceedings of the 2008 International Conference on Telecommunications, 2008
Integrative Performance Evaluation for Strategic Supplier's under Supply Chain Management Based on Logarithm Triangular Fuzzy Number- AHP Method.
Proceedings of the Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008
Proceedings of the 5th IEEE Consumer Communications and Networking Conference, 2008
Detecting Stepping-Stone Intrusion and Resisting Evasion through TCP/IP Packets Cross-Matching.
Proceedings of the Autonomic and Trusted Computing, 5th International Conference, 2008
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008
2007
Probabilistic analysis of an algorithm to compute TCP packet round-trip time for intrusion detection.
Comput. Secur., 2007
Proceedings of the Managing Traffic Performance in Converged Networks, 2007
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007
Proceedings of the 15th IEEE Workshop on Local & Metropolitan Area Networks, 2007
An Accurate and Efficient 3-Phase Measurement Method for IP Traffic Flow on High Speed Link.
Proceedings of the Sixth International Conference on Networking (ICN 2007), 2007
Proceedings of the Global Communications Conference, 2007
Proceedings of the Global Communications Conference, 2007
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007
Hybrid Clustering for Large Sequential Data.
Proceedings of the International Conference on Artificial Intelligence and Pattern Recognition, 2007
2006
Simul. Model. Pract. Theory, 2006
A Secure Threshold Proxy Signature Scheme for Mobile Agent-Based Electronic Commerce Transactions.
Proceedings of the Seventh International Conference on Parallel and Distributed Computing, 2006
Proceedings of the Information Security, 9th International Conference, 2006
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006
Proceedings of the Cryptology and Network Security, 5th International Conference, 2006
Proceedings of the AI 2006: Advances in Artificial Intelligence, 2006
Resistance Analysis to Intruders' Evasion of a Novel Algorithm to Detect Stepping-Stone.
Proceedings of the Autonomic and Trusted Computing, Third International Conference, 2006
A Clustering-Partitioning Algorithm to Find TCP Packet Round-Trip Time for Intrusion Detection.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006
Probabilistic Proof of an Algorithm to Compute TCP Packet Round-Trip Time for Intrusion Detection.
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006
2005
Proceedings of the Parallel and Distributed Processing and Applications, 2005
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005
Voronoi-based Topological Information for Combining Partitioning and Hierarchical Clustering.
Proceedings of the 2005 International Conference on Computational Intelligence for Modelling Control and Automation (CIMCA 2005), 2005
Hybrid Agglomerative Clustering for Large Databases: An Efficient Interactivity Approach.
Proceedings of the AI 2005: Advances in Artificial Intelligence, 2005
Matching TCP Packets and Its Application to the Detection of Long Connection Chains on the Internet.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005
2004
Data Min. Knowl. Discov., 2004
A real-time algorithm to detect long connection chains of interactive terminal sessions.
Proceedings of the 3rd International Conference on Information Security, 2004
Cluster Validity Through Graph-based Boundary Analysis.
Proceedings of the International Conference on Information and Knowledge Engineering. IKE'04, 2004
Proceedings of the Grid and Cooperative Computing, 2004
Proceedings of the 2004 IEEE International Conference on Services Computing (SCC 2004), 2004
2003
Modeling, Implementation and simulation of virtual factory based on colored timed Petri net.
Proceedings of 9th IEEE International Conference on Emerging Technologies and Factory Automation, 2003
Proceedings of the Data Warehousing and Knowledge Discovery, 5th International Conference, 2003
Proceedings of the 12th Asian Test Symposium (ATS 2003), 17-19 November 2003, Xian, China, 2003
2002
Int. J. Found. Comput. Sci., 2002
Proceedings of the Knowledge and Skill Chains in Engineering and Manufacturing, 2002
2001
Proceedings of the Web Intelligence: Research and Development, 2001
Proceedings of the Principles of Data Mining and Knowledge Discovery, 2001