Yali Gao

Orcid: 0000-0003-0458-8481

According to our database1, Yali Gao authored at least 54 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
EMTD-SSC: An Enhanced Malicious Traffic Detection Model Using Transfer Learning Under Small Sample Conditions in IoT.
IEEE Internet Things J., October, 2024

Second-Order Decoupled Linear Energy-Law Preserving gPAV Numerical Schemes for Two-Phase Flows in Superposed Free Flow and Porous Media.
J. Sci. Comput., August, 2024

Adaptive discontinuous Galerkin finite element methods for the Allen-Cahn equation on polygonal meshes.
Numer. Algorithms, April, 2024

Distributed Practical Finite-Time Formation Control of Quadrotor UAVs Based on Finite-Time Event-Triggered Disturbance Observer.
IEEE Syst. J., March, 2024

A Stokes-Darcy-Darcy model and its discontinuous Galerkin method on polytopic grids.
J. Comput. Phys., March, 2024

A fully decoupled numerical method for Cahn-Hilliard-Navier-Stokes-Darcy equations based on auxiliary variable approaches.
J. Comput. Appl. Math., January, 2024

GMFITD: Graph Meta-Learning for Effective Few-Shot Insider Threat Detection.
IEEE Trans. Inf. Forensics Secur., 2024

A second-order, mass-conservative, unconditionally stable and bound-preserving finite element method for the quasi-incompressible Cahn-Hilliard-Darcy system.
J. Comput. Phys., 2024

A high-order accurate unconditionally stable bound-preserving numerical scheme for the Cahn-Hilliard-Navier-Stokes equations.
CoRR, 2024

A math-heuristic approach for scheduling the production and delivery of a mobile additive manufacturing hub.
Comput. Ind. Eng., 2024

2023
A High Accuracy and Adaptive Anomaly Detection Model With Dual-Domain Graph Convolutional Network for Insider Threat Detection.
IEEE Trans. Inf. Forensics Secur., 2023

Efficient Membership Inference Attacks against Federated Learning via Bias Differences.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

DACTI: a Generation-Based Data Augmentation Method for Cyber Threat Intelligence.
Proceedings of the 8th International Conference on Data Science in Cyberspace, 2023

2022
HinCTI: A Cyber Threat Intelligence Modeling and Identification System Based on Heterogeneous Information Network.
IEEE Trans. Knowl. Data Eng., 2022

Bi-TCCS: Trustworthy Cloud Collaboration Service Scheme Based on Bilateral Social Feedback.
IEEE Trans. Cloud Comput., 2022

Unconditionally stable numerical methods for Cahn-Hilliard-Navier-Stokes-Darcy system with different densities and viscosities.
J. Comput. Phys., 2022

A Reliable and Efficient Task Offloading Strategy Based on Multifeedback Trust Mechanism for IoT Edge Computing.
IEEE Internet Things J., 2022

Towards an Intrinsic Interpretability Approach for Multimodal Hate Speech Detection.
Int. J. Pattern Recognit. Artif. Intell., 2022

Disturbance observer-based backstepping formation control of multiple quadrotors with asymmetric output error constraints.
Appl. Math. Comput., 2022

Robust Spatio-Temporal Trajectory Modeling Based on Auto-Gated Recurrent Unit.
Proceedings of the IEEE Smartworld, 2022

Bi-attention Modal Separation Network for Multimodal Video Fusion.
Proceedings of the MultiMedia Modeling - 28th International Conference, 2022

2021
A decoupled numerical method for two-phase flows of different densities and viscosities in superposed fluid and porous layers.
CoRR, 2021

Time-splitting Galerkin method for spin-orbit-coupled Bose-Einstein condensates.
Comput. Math. Appl., 2021

An Improved Random Walk Algorithm for Resource Scheduling in Cloud Datacenter.
Proceedings of the ICCDE 2021: 7th International Conference on Computing and Data Engineering, Phuket, Thailand, January 15, 2021

2020
Numerical methods for Bogoliubov-de Gennes excitations of Bose-Einstein condensates.
J. Comput. Phys., 2020

Discontinuous finite volume element method for a coupled Navier-Stokes-Cahn-Hilliard phase field model.
Adv. Comput. Math., 2020

AITI: An Automatic Identification Model of Threat Intelligence Based on Convolutional Neural Network.
Proceedings of the ICIAI 2020: The 4th International Conference on Innovation in Artificial Intelligence, 2020

An Efficient Trust Inference Algorithm with Local Weighted Centrality for Social Recommendation.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

A Graph Convolution model considering label co-occurrence LC_GCN.
Proceedings of the ACAI 2020: 3rd International Conference on Algorithms, 2020

2019
A Crank-Nicolson discontinuous finite volume element method for a coupled non-stationary Stokes-Darcy problem.
J. Comput. Appl. Math., 2019

Distributed and Efficient Minimum-Latency Data Aggregation Scheduling for Multichannel Wireless Sensor Networks.
IEEE Internet Things J., 2019

Info-Trust: A Multi-Criteria and Adaptive Trustworthiness Calculation Mechanism for Information Sources.
IEEE Access, 2019

VulHunter: An Automated Vulnerability Detection System Based on Deep Learning and Bytecode.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

2018
Decoupled, Linear, and Energy Stable Finite Element Method for the Cahn-Hilliard-Navier-Stokes-Darcy Phase Field Model.
SIAM J. Sci. Comput., 2018

Discontinuous Finite Volume Element Method for a Coupled Non-stationary Stokes-Darcy Problem.
J. Sci. Comput., 2018

A weak Galerkin finite element method for a coupled Stokes-Darcy problem on general meshes.
J. Comput. Appl. Math., 2018

A decoupled scheme with leap-frog multi-time step for non-stationary Stokes-Darcy system.
Int. J. Comput. Math., 2018

A Redistributed Bundle Algorithm for Generalized Variational Inequality Problems in Hilbert Spaces.
Asia Pac. J. Oper. Res., 2018

Galerkin methods for the Davey-Stewartson equations.
Appl. Math. Comput., 2018

Construction of Optimal Trees for Maximizing Aggregation Information in Deadline- and Energy-Constrained Unreliable Wireless Sensor Networks.
IEEE Access, 2018

A Trustworthy Data Aggregation Model Based on Context and Data Density Correlation Degree.
Proceedings of the 21st ACM International Conference on Modeling, 2018

Graph Mining-based Trust Evaluation Mechanism with Multidimensional Features for Large-scale Heterogeneous Threat Intelligence.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

2017
Galerkin finite element methods for the generalized Klein-Gordon-Zakharov equations.
Comput. Math. Appl., 2017

Dynamic Cloudlet-Assisted Energy-Saving Routing Mechanism for Mobile Ad Hoc Networks.
IEEE Access, 2017

MTIV: A Trustworthiness Determination Approach for Threat Intelligence.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

DTRF: A dynamic-trust-based recruitment framework for Mobile Crowd Sensing system.
Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017

A dynamic-trust-based recruitment framework for mobile crowd sensing.
Proceedings of the IEEE International Conference on Communications, 2017

A Novel Semi-Automatic Vulnerability Detection System for Smart Home.
Proceedings of the International Conference on Big Data and Internet of Things, 2017

2016
A stabilized finite element method based on two local Gauss integrations for a coupled Stokes-Darcy problem.
J. Comput. Appl. Math., 2016

2015
A time-splitting Galerkin finite element method for the Davey-Stewartson equations.
Comput. Phys. Commun., 2015

Mixed Galerkin finite element methods for modified regularized long wave equation.
Appl. Math. Comput., 2015

2007
The Removal of Wall Components in Doppler Ultrasound Signals by Using the Empirical Mode Decomposition Algorithm.
IEEE Trans. Biomed. Eng., 2007

2006
Automatic De-noising of Doppler Ultrasound Signals Using Matching Pursuit Method.
Proceedings of the Independent Component Analysis and Blind Signal Separation, 2006

Application of Empirical Mode Decomposition to Remove the Wall Components in Doppler Ultrasound Signals: A Simulation Study.
Proceedings of the 28th International Conference of the IEEE Engineering in Medicine and Biology Society, 2006


  Loading...