Yajuan Tang

Orcid: 0000-0002-8741-2934

According to our database1, Yajuan Tang authored at least 22 papers between 2005 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Indoor human detection based on micro-Doppler features in the presence of interference from moving clutter sources.
Phys. Commun., June, 2023

Intelligent Reflecting Surface Aided Secure Communication with Federated Learning.
EAI Endorsed Trans. Mob. Commun. Appl., 2023

Deep Model Training and Deployment in Heterogeneous IoT Networks.
EAI Endorsed Trans. Mob. Commun. Appl., 2023

Intelligent Reflecting Surface Aided Cloud Access Networks with Federated Learning.
EAI Endorsed Trans. Mob. Commun. Appl., 2023

Intelligent resource allocation scheme for cloud-edge-end framework aided multi-source data stream.
EURASIP J. Adv. Signal Process., 2023

2022
An Overview on Active Transmission Techniques for Wireless Scalable Networks.
EAI Endorsed Trans. Scalable Inf. Syst., 2022

Energy-efficient and high-spectrum-efficiency wireless transmission.
EAI Endorsed Trans. Mob. Commun. Appl., 2022

Intelligent Distributed Data Storage for Wireless Communications in B5G Networks.
EAI Endorsed Trans. Mob. Commun. Appl., 2022

Intelligent Bi-directional Relaying Communication for Edge Intelligence based Industrial IoT Networks.
EAI Endorsed Trans. Ind. Networks Intell. Syst., 2022

2021
Inaccurate Prediction Is Not Always Bad: Open-World Driver Recognition via Error Analysis.
Proceedings of the 93rd IEEE Vehicular Technology Conference, 2021

An Improved Epsilon Method with M2M for Solving Imbalanced CMOPs with Simultaneous Convergence-Hard and Diversity-Hard Constraints.
Proceedings of the Evolutionary Multi-Criterion Optimization, 2021

2019
Protecting internet infrastructure against link flooding attacks: A techno-economic perspective.
Inf. Sci., 2019

2017
CloudBot: Advanced mobile botnets using ubiquitous cloud technologies.
Pervasive Mob. Comput., 2017

2016
On Measuring Cloud-Based Push Services.
Int. J. Web Serv. Res., 2016

PAR-MAC: Reliable MAC Broadcast for Ad Hoc Networks with High Dynamicity.
Ad Hoc Sens. Wirel. Networks, 2016

MUSE: Towards Robust and Stealthy Mobile Botnets via Multiple Message Push Services.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2014
Modeling the Vulnerability of Feedback-Control Based Internet Services to Low-Rate DoS Attacks.
IEEE Trans. Inf. Forensics Secur., 2014

Speeding Up Multi-level Route Analysis Through Improved Multi-LCS Algorithm.
Proceedings of the Testbeds and Research Infrastructure: Development of Networks and Communities, 2014

2012
Countermeasures on Application Level Low-Rate Denial-of-Service Attack.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

2009
On generalized low-rate denial-of-quality attack against Internet services.
Proceedings of the 17th International Workshop on Quality of Service, 2009

2007
Protecting Internet Services from Low-Rate DoS Attacks.
Proceedings of the Critical Infrastructure Protection, 2007

2005
One-Class Classifier for HFGWR Ship Detection Using Similarity-Dissimilarity Representation.
Proceedings of the Innovations in Applied Artificial Intelligence, 2005


  Loading...