Nianmin Yao

Orcid: 0000-0001-9705-6649

According to our database1, Nianmin Yao authored at least 81 papers between 2002 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Entity and relationship extraction based on span contribution evaluation and focusing framework.
Comput. Speech Lang., 2025

2024
CDGAN-BERT: Adversarial constraint and diversity discriminator for semi-supervised text classification.
Knowl. Based Syst., 2024

Alignment and fusion for adaptive domain nighttime semantic segmentation.
Image Vis. Comput., 2024

2023
An Adaptive MAC Protocol Based on Time-Domain Interference Alignment for UWANs.
Comput. J., December, 2023

A Joint Entity and Relation Extraction Model based on Efficient Sampling and Explicit Interaction.
ACM Trans. Intell. Syst. Technol., October, 2023

A generalized decoding method for neural text generation.
Comput. Speech Lang., June, 2023

Multi-MCCR: Multiple models regularization for semi-supervised text classification with few labels.
Knowl. Based Syst., 2023

2022
Seeds: Sampling-Enhanced Embeddings.
IEEE Trans. Neural Networks Learn. Syst., 2022

Rule-based adversarial sample generation for text classification.
Neural Comput. Appl., 2022

Self attention mechanism of bidirectional information enhancement.
Appl. Intell., 2022

GeSe: Generalized static embedding.
Appl. Intell., 2022

2021
Source Routing for Distributed Big Data-Based Cognitive Internet of Things (CIoT).
Wirel. Commun. Mob. Comput., 2021

Tracking Based Mix-Zone Location Privacy Evaluation in VANET.
IEEE Trans. Veh. Technol., 2021

Document Vector Extension for Documents Classification.
IEEE Trans. Knowl. Data Eng., 2021

Anonymous Data Reporting Strategy with Dynamic Incentive Mechanism for Participatory Sensing.
Secur. Commun. Networks, 2021

A message transmission scheduling algorithm based on time-domain interference alignment in UWANs.
Peer-to-Peer Netw. Appl., 2021

Spatiotemporal chaos in improved cross coupled map lattice and its application in a bit-level image encryption scheme.
Inf. Sci., 2021

An SDN-IoT-based secure simulation system for smart cities.
Int. J. Ad Hoc Ubiquitous Comput., 2021

Evolutionary selection for regression test cases based on diversity.
Frontiers Comput. Sci., 2021

GEPC: Global embeddings with PID control.
Comput. Speech Lang., 2021

An Evolutionary Generation Method of Test Data for Multiple Paths Based on Coverage Balance.
IEEE Access, 2021

A Proactive Joint Strategy on Trajectory and Caching for UAV-Assisted Networks: A Data-Driven Distributionally Robust Approach.
Proceedings of the 10th IEEE/CIC International Conference on Communications in China, 2021

A Joint Strategy for CUAV-based Traffic Offloading via Deep Reinforcement Learning.
Proceedings of the IEEE Global Communications Conference, 2021

2020
Generating word and document matrix representations for document classification.
Neural Comput. Appl., 2020

Efficient data transfer in clustered IoT network with cooperative member nodes.
Multim. Tools Appl., 2020

Polyseme-Aware Vector Representation for Text Classification.
IEEE Access, 2020

2019
Efficient key generation leveraging channel reciprocity and balanced gray code.
Wirel. Networks, 2019

A RSU-aided distributed trust framework for pseudonym-enabled privacy preservation in VANETs.
Wirel. Networks, 2019

IoT enabled adaptive clustering based energy efficient routing protocol for wireless sensor networks.
Int. J. Ad Hoc Ubiquitous Comput., 2019

Big Data Analytics, Text Mining and Modern English Language.
J. Grid Comput., 2019

On the using of Rényi's quadratic entropy for physical layer key generation.
Comput. Commun., 2019

The impact of preprocessing steps on the accuracy of machine learning algorithms in sentiment analysis.
Comput. Math. Organ. Theory, 2019

Research Challenges in the Internet of Things (IoTs).
Proceedings of the Recent Trends and Advances in Wireless and IoT-enabled Networks, 2019

2018
A Novel Problem Model and Solution Scheme for Roadside Unit Deployment Problem in VANETs.
Wirel. Pers. Commun., 2018

A trigger-based pseudonym exchange scheme for location privacy preserving in VANETs.
Peer-to-Peer Netw. Appl., 2018

Efficient key generation leveraging wireless channel reciprocity for MANETs.
J. Netw. Comput. Appl., 2018

An anonymous data reporting strategy with ensuring incentives for mobile crowd-sensing.
J. Ambient Intell. Humaniz. Comput., 2018

Visual Saliency Detection Based on color Frequency Features under Bayesian framework.
KSII Trans. Internet Inf. Syst., 2018

Memory Confidentiality and Integrity Protection Technology.
Proceedings of the Communications, Signal Processing, and Systems, 2018

2017
Outage Probability of Cognitive Selective DF Relay Networks with Multiple Primary Nodes and Heterogenous Non-Identical Constraints.
Wirel. Pers. Commun., 2017

基于文本分类方法识别《史记》的伪作 (Fake Chapters Recognition in Shiji Based on Text Classiffication Methods).
计算机科学, 2017

一种层次式远程数据持有检测方法 (Hierarchical Remote Data Possession Checking Method).
计算机科学, 2017

A novel key generation method for wireless sensor networks based on system of equations.
J. Netw. Comput. Appl., 2017

Efficient key generation leveraging wireless channel reciprocity and discrete cosine transform.
KSII Trans. Internet Inf. Syst., 2017

LIAP: A local identity-based anonymous message authentication protocol in VANETs.
Comput. Commun., 2017

On the using of discrete wavelet transform for physical layer key generation.
Ad Hoc Networks, 2017

EFAV-MERD: Expected Forwarding Area Volume and Residual Distance Mathematic Expectation Routing Protocol for UASNs.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

2016
A collusion-resistant dynamic key management scheme for WSNs.
Secur. Commun. Networks, 2016

基于Sun SPOT平台的无线传感器网络多跳路由协议设计 (Design of Multi-hop Routing Protocol in WSN Based on Sun SPOT).
计算机科学, 2016

WDFAD-DBR: Weighting depth and forwarding area division DBR routing protocol for UASNs.
Ad Hoc Networks, 2016

2015
Outage Probability Equivalency of Three Typical Relay Selection Schemes for Selective DF Relay Networks with Selection Combining.
Wirel. Pers. Commun., 2015

A reliable data transfer protocol based on twin paths and network coding for underwater acoustic sensor network.
EURASIP J. Wirel. Commun. Netw., 2015

An adaptive routing protocol in underwater sparse acoustic sensor networks.
Ad Hoc Networks, 2015

2014
Outage Analysis of Cognitive AF Relay Networks with Multiple Primary Users and Heterogeneous Non-identical Parameters.
Wirel. Pers. Commun., 2014

Relative Distance Based Forwarding Protocol for Underwater Wireless Networks.
Int. J. Distributed Sens. Networks, 2014

An enhanced XOR-based scheme for wireless packet retransmission problem.
Int. J. Commun. Syst., 2014

Research of localization algorithm based on weighted Voronoi diagrams for wireless sensor network.
EURASIP J. Wirel. Commun. Netw., 2014

2013
A Non-partitioning File Assignment Scheme with Approximating Average Waiting Time in Parallel I/O System.
J. Softw., 2013

Analyzing the performance of Aloha in string multi-hop underwater acoustic sensor networks.
EURASIP J. Wirel. Commun. Netw., 2013

A network coding based protocol for reliable data transfer in underwater acoustic sensor.
Ad Hoc Networks, 2013

2012
Performance Analysis of Aloha for String Multi-hop Underwater Acoustic Sensor Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2012

The Node Movement Models Based on Lagrange Motion for 3-D Underwater Acoustic Sensor Network.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2012

Study on the Data Flow Balance in NFS Server with iSCSI.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2012

2011
Improving aloha via backoff tuning in underwater sensor networks.
Proceedings of the 6th International ICST Conference on Communications and Networking in China, 2011

2009
A New Method to Protect Software from Cracking.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

NSM: A Security Mechanism for Object-Based Storage System.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

2008
Modified Improved Alternating Combination Trilateration Algorithm with a Variable m.
Proceedings of the International Multisymposiums on Computer and Computational Sciences, 2008

2007
A New Method of Performance Test for Network Storage.
Proceedings of the Proceeding of the Second International Multi-Symposium of Computer and Computational Sciences (IMSCCS 2007), 2007

Fault-Tolerance CMP Architecture based on SMT Technology.
Proceedings of the Proceeding of the Second International Multi-Symposium of Computer and Computational Sciences (IMSCCS 2007), 2007

Performance Analysis Group-Based Key Management.
Proceedings of the Proceeding of the Second International Multi-Symposium of Computer and Computational Sciences (IMSCCS 2007), 2007

Optimization of the Switches in Storage Networks.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

Analysis of Local Route Maintenance for Ad Hoc Network.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

Group-Based Key Management for Multicast of Ad Hoc Sensor Network.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

2006
Multipath passive data acknowledgement on-demand multicast protocol.
Comput. Commun., 2006

Internet Accessing for IPv6 MANETs.
Proceedings of the Third International Conference on Information Technology: New Generations (ITNG 2006), 2006

Verification Environment for a SCMP Architecture.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

A New Scheduling Algorithm for Servers.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

MPoolODMRP: An Extended PoolODMRP based on Multi-path Policy.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

2005
Study Queuing Networks Using CART.
Proceedings of The 2005 International Conference on Modeling, 2005

Improving the Data Placement Algorithm of Randomization in SAN.
Proceedings of the Computational Science, 2005

2002
Pipeline: a new architecture of high performance servers.
ACM SIGOPS Oper. Syst. Rev., 2002


  Loading...