Jiawei Yuan
Orcid: 0000-0001-5440-3794
According to our database1,
Jiawei Yuan
authored at least 76 papers
between 2012 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Comput. Speech Lang., 2025
2024
An adaptive parental guidance strategy and its derived indicator-based evolutionary algorithm for multi- and many-objective optimization.
Swarm Evol. Comput., February, 2024
Inf. Sci., January, 2024
Noninvasive Stress Detection Based on Piezoelectric Micromachined Ultrasonic Transducers for Bolt Loosening Warning.
IEEE Trans. Instrum. Meas., 2024
Appl. Soft Comput., 2024
Proceedings of the IEEE INFOCOM 2024, 2024
Proceedings of the 2024 Joint International Conference on Computational Linguistics, 2024
2023
Faulty-Feeder Detection for Single Phase-to-Ground Faults in Distribution Networks Based on Waveform Encoding and Waveform Segmentation.
IEEE Trans. Smart Grid, September, 2023
EvaGoNet: An integrated network of variational autoencoder and Wasserstein generative adversarial network with gradient penalty for binary classification tasks.
Inf. Sci., June, 2023
A Kalman filter-based prediction strategy for multiobjective multitasking optimization.
Expert Syst. Appl., 2023
Virtual Curtain: A Communicative Fine-grained Privacy Control Framework for Augmented Reality.
Proceedings of the International Conference on Computing, Networking and Communications, 2023
Proceedings of the International Conference on Computing, Networking and Communications, 2023
Proceedings of the IEEE International Conference on Communications, 2023
2022
Pedestrian Collision Risk Assessment Based on State Estimation and Motion Prediction.
IEEE Trans. Veh. Technol., 2022
Indicator-Based Evolutionary Algorithm for Solving Constrained Multiobjective Optimization Problems.
IEEE Trans. Evol. Comput., 2022
A constrained multi-objective evolutionary algorithm using valuable infeasible solutions.
Swarm Evol. Comput., 2022
Automated Braking Decision and Control for Pedestrian Collision Avoidance Based on Risk Assessment.
IEEE Intell. Transp. Syst. Mag., 2022
IEEE Internet Things J., 2022
Integrated optimization of train timetable, rolling stock assignment and short-turning strategy for a metro line.
Eur. J. Oper. Res., 2022
Faulty feeder detection based on image recognition of current waveform superposition in distribution networks.
Appl. Soft Comput., 2022
Proceedings of the IEEE Smartworld, 2022
Generative Data Augmentation with Contrastive Learning for Zero-Shot Stance Detection.
Proceedings of the 2022 Conference on Empirical Methods in Natural Language Processing, 2022
Study on Dynamic Characteristics of Sliding Friction Interfaces in Feed System During Non-stable Starting Stage.
Proceedings of the 8th International Conference on Control, 2022
2021
Investigating the Properties of Indicators and an Evolutionary Many-Objective Algorithm Using Promising Regions.
IEEE Trans. Evol. Comput., 2021
Memetic Comput., 2021
Dynamic grid-based uniform search for solving constrained multiobjective optimization problems.
Memetic Comput., 2021
IEEE Internet Things J., 2021
Neurocomputing, 2021
Blockchain enabled verification for cellular-connected unmanned aircraft system networking.
Future Gener. Comput. Syst., 2021
Self-learning soft computing algorithms for prediction machines of estimating crowd density.
Appl. Soft Comput., 2021
Proceedings of the SIGITE '21: The 22nd Annual Conference on Information Technology Education, SnowBird, UT, USA, October 6, 2021
Design and Simulation of a Wide-Bandwidth CMUTs Array with Dual-Mixed radii and Multi Operating Modes.
Proceedings of the 16th IEEE International Conference on Nano/Micro Engineered and Molecular Systems, 2021
Proceedings of the 2021 IEEE Military Communications Conference, 2021
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021
Proceedings of the 33rd IEEE International Conference on Tools with Artificial Intelligence, 2021
Proceedings of the ICC 2021, 2021
Proceedings of the e-Learning, e-Education, and Online Training, 2021
2020
EAI Endorsed Trans. Security Safety, 2020
2019
Practical Privacy-Preserving MapReduce Based K-Means Clustering Over Large-Scale Dataset.
IEEE Trans. Cloud Comput., 2019
Efficient privacy-preserving authentication framework for edge-assisted Internet of Drones.
J. Inf. Secur. Appl., 2019
Optimizing the energy-spectrum efficiency of cellular systems by evolutionary multi-objective algorithm.
Integr. Comput. Aided Eng., 2019
LEP-CNN: A Lightweight Edge Device Assisted Privacy-preserving CNN Inference Solution for IoT.
CoRR, 2019
Proceedings of the Security and Privacy in Communication Networks, 2019
Proceedings of the 16th Annual IEEE International Conference on Sensing, 2019
Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2019
Edge-Assisted Image Processing with Joint Optimization of Responding and Placement Strategy.
Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2019
Proceedings of the IEEE International Conference on Industrial Internet, 2019
Proceedings of the IEEE International Conference on Industrial Internet, 2019
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019
2018
A multi-point parameterized model reduction for large parametric systems by using Krylov-subspace techniques.
Trans. Inst. Meas. Control, 2018
A parameterised model order reduction method for parametric systems based on Laguerre polynomials.
Int. J. Control, 2018
CoRR, 2018
Proceedings of the 37th IEEE International Performance Computing and Communications Conference, 2018
A Cost Value Based Evolutionary Many-Objective Optimization Algorithm with Neighbor Selection Strategy.
Proceedings of the 2018 IEEE Congress on Evolutionary Computation, 2018
2017
Towards a privacy preserving cohort discovery framework for clinical research networks.
J. Biomed. Informatics, 2017
Population Decomposition-Based Greedy Approach Algorithm for the Multi-Objective Knapsack Problems.
Int. J. Pattern Recognit. Artif. Intell., 2017
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017
2016
Examining Healthcare Utilization Patterns of Elderly and Middle-Aged Adults in the United States.
Proceedings of the Twenty-Ninth International Florida Artificial Intelligence Research Society Conference, 2016
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016
Proceedings of the 12th International Conference on Computational Intelligence and Security, 2016
2015
IEEE Trans. Inf. Forensics Secur., 2015
Structure-preserving model order reduction by general orthogonal polynomials for integral-differential systems.
J. Frankl. Inst., 2015
J. Comput. Secur., 2015
MASK-BAN: Movement-Aided Authenticated Secret Key Extraction Utilizing Channel Characteristics in Body Area Networks.
IEEE Internet Things J., 2015
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015
2014
Privacy Preserving Back-Propagation Neural Network Learning Made Practical with Cloud Computing.
IEEE Trans. Parallel Distributed Syst., 2014
Efficient public integrity checking for cloud data sharing with multi-user modification.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014
2013
IEEE J. Sel. Areas Commun., 2013
Flexible and Publicly Verifiable Aggregation Query for Outsourced Databases in Cloud.
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
ASK-BAN: authenticated secret key extraction utilizing channel characteristics for body area networks.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
2012
Proofs of Retrievability with Public Verifiability and Constant Communication Cost in Cloud.
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Security and Privacy in Communication Networks, 2012
Authenticated secret key extraction using channel characteristics for body area networks.
Proceedings of the ACM Conference on Computer and Communications Security, 2012