Junkai Yi

Orcid: 0000-0003-4771-250X

According to our database1, Junkai Yi authored at least 16 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Hybrid particle swarm optimisation approach for 3D path planning of UAV.
Int. J. Bio Inspired Comput., 2023

2021
Learning-Based Detection for Malicious Android Application Using Code Vectorization.
Secur. Commun. Networks, 2021

2020
A PSO-based Wavelet-core ELM for Abnormal Flow Detection.
Int. J. Netw. Secur., 2020

Newly Emerging Nature-Inspired Optimization - Algorithm Review, Unified Framework, Evaluation, and Behavioural Parameter Optimization.
IEEE Access, 2020

2019
Computational source term estimation of the Gaussian puff dispersion.
Soft Comput., 2019

2018
SIFT Feature-Based Second-Order Image Hash Retrieval Approach.
J. Softw., 2018

Securing Offline Delivery Services by Using Kerberos Authentication.
IEEE Access, 2018

Steganalysis Using Unsupervised End-to-End CNN Fused with Residual Image.
Proceedings of the 11th International Congress on Image and Signal Processing, 2018

2016
手机流量非侵入式监测的决策树算法 (Decision Tree Algorithm in Non-invasive Monitoring Cell Phone Traffic).
计算机科学, 2016

Category Discrimination Based Feature Selection Algorithm in Chinese Text Classification.
J. Inf. Sci. Eng., 2016

2015
Detecting spam webpages through topic and semantics analysis.
Proceedings of the Global Summit on Computer & Information Technology, 2015

2014
Designing a Multi-level Metadata Standard based on Dublin Core for Museum Data.
Proceedings of the 2014 International Conference on Dublin Core and Metadata Applications, 2014

2010
Data Recovery Based on Intelligent Pattern Matching.
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010

2009
Monitoring cumulated Anomaly in Databases.
Int. J. Softw. Eng. Knowl. Eng., 2009

2007
A dubiety-determining based model for database cumulated anomaly intrusion.
Proceedings of the 2nf International Conference on Scalable Information Systems, 2007

Statistical and Fuzzy Approach for Database Security.
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007


  Loading...