Yaling Zhang
This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.
Bibliography
2024
Study on Soil Moisture Status of Soybean and Corn across the Whole Growth Period Based on UAV Multimodal Remote Sensing.
Remote. Sens., September, 2024
Enhancing Image Alignment in Time-Lapse-Ground-Penetrating Radar through Dynamic Time Warping.
Remote. Sens., March, 2024
Proceedings of the International Conference on Networking and Network Applications, 2024
Proceedings of the International Conference on Networking and Network Applications, 2024
2023
Response of Evapotranspiration (ET) to Climate Factors and Crop Planting Structures in the Shiyang River Basin, Northwestern China.
Remote. Sens., August, 2023
J. Inf. Process. Syst., April, 2023
Human-computer interaction based on the intelligent information retrieval method for customer satisfaction in power system service.
Int. J. Model. Simul. Sci. Comput., February, 2023
Detection and attribution of vegetation dynamics in the National Barrier Zone of China by considering climate temporal effects.
Int. J. Appl. Earth Obs. Geoinformation, February, 2023
Attribute Based Conjunctive Keywords Search With Verifiability and Fair Payment Using Blockchain.
IEEE Trans. Serv. Comput., 2023
J. Inf. Sci. Eng., 2023
Proceedings of the International Conference on Networking and Network Applications, 2023
DDoS Attack Detection Based on Information Entropy Feature Extraction in Software Defined Networks.
Proceedings of the International Conference on Networking and Network Applications, 2023
Reversible Data Hiding in Encrypted Images Based on a Multi-Granularity Adaptive Classification Mechanism.
Proceedings of the Knowledge Science, Engineering and Management, 2023
Proceedings of the Knowledge Science, Engineering and Management, 2023
Reversible Data Hiding in Encrypted Images Based on Image Reprocessing and Polymorphic Compression.
Proceedings of the Neural Information Processing - 30th International Conference, 2023
Proceedings of the Neural Information Processing - 30th International Conference, 2023
Smart Contract Symbol Execution Vulnerability Detection Method Based on CFG Path Pruning.
Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2023
2022
Probabilistic Inference and Trustworthiness Evaluation of Associative Links Toward Malicious Attack Detection for Online Recommendations.
IEEE Trans. Dependable Secur. Comput., 2022
Authorized Data Secure Access Scheme With Specified Time and Relevance Ranked Keyword Search for Industrial Cloud Platforms.
IEEE Syst. J., 2022
Intelligent Retrieval Method of Power System Service User Satisfaction Based on Human-Computer Interaction.
J. Interconnect. Networks, 2022
Rating behavior evaluation and abnormality forensics analysis for injection attack detection.
J. Intell. Inf. Syst., 2022
A new projection neural network for linear and convex quadratic second-order cone programming.
J. Intell. Fuzzy Syst., 2022
A Barzilai and Borwein regularization feasible direction algorithm for convex nonlinear SOC programming with linear constraints.
J. Comput. Appl. Math., 2022
J. Inf. Secur. Appl., 2022
Application of Deep Convolution Network Algorithm in Sports Video Hot Spot Detection.
Frontiers Neurorobotics, 2022
Proceedings of the 18th International Conference on Computational Intelligence and Security, 2022
2021
Identification of Malicious Injection Attacks in Dense Rating and Co-Visitation Behaviors.
IEEE Trans. Inf. Forensics Secur., 2021
IEEE Trans. Cloud Comput., 2021
A fast and accurate GPU based method on simulating energy deposition for beam-target coupling with granular materials.
Comput. Phys. Commun., 2021
Proceedings of the 20th IEEE International Conference on Trust, 2021
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021
Proceedings of the 16th International Conference on Computer Science & Education, 2021
Proceedings of the 17th International Conference on Computational Intelligence and Security CIS 2021, 2021
2020
Inference of Suspicious Co-Visitation and Co-Rating Behaviors and Abnormality Forensics for Recommender Systems.
IEEE Trans. Inf. Forensics Secur., 2020
Multivariate QoS Monitoring in Mobile Edge Computing based on Bayesian Classifier and Rough Set.
Proceedings of the 2020 IEEE International Conference on Web Services, 2020
Chinese Sentiment Classification Model of Neural Network Based on Particle Swarm Optimization.
Proceedings of the 16th International Conference on Computational Intelligence and Security, 2020
2019
Grasping Force Optimization for Multi-fingered Robotic Hands Using Projection and Contraction Methods.
J. Optim. Theory Appl., 2019
Time and Attribute Based Dual Access Control and Data Integrity Verifiable Scheme in Cloud Computing Applications.
IEEE Access, 2019
A Differential Privacy Support Vector Machine Classifier Based on Dual Variable Perturbation.
IEEE Access, 2019
Blockchain-Based Personal Health Records Sharing Scheme With Data Integrity Verifiable.
IEEE Access, 2019
KS-ABESwET: A Keyword Searchable Attribute-Based Encryption Scheme With Equality Test in the Internet of Things.
IEEE Access, 2019
IEEE Access, 2019
IEEE Access, 2019
Auditable Protocols for Fair Payment and Physical Asset Delivery Based on Smart Contracts.
IEEE Access, 2019
IEEE Access, 2019
Verifiable and Multi-Keyword Searchable Attribute-Based Encryption Scheme for Cloud Storage.
IEEE Access, 2019
Deep Spatial-Spectral Information Exploitation for Rapid Hyperspectral Image Super-Resolution.
Proceedings of the 2019 IEEE International Geoscience and Remote Sensing Symposium, 2019
Proceedings of the 15th International Conference on Computational Intelligence and Security, 2019
Proceedings of the ACM Turing Celebration Conference - China, 2019
2018
Int. J. High Perform. Comput. Netw., 2018
Efficient revocable and grantable attribute-based encryption from lattices with fine-grained access control.
IET Inf. Secur., 2018
Revocable Identity-Based Encryption Scheme Under LWE Assumption in the Standard Model.
IEEE Access, 2018
Efficiently Revocable and Searchable Attribute-Based Encryption Scheme for Mobile Cloud Storage.
IEEE Access, 2018
A Blockchain-Based Framework for Data Sharing With Fine-Grained Access Control in Decentralized Storage Systems.
IEEE Access, 2018
2017
Int. J. Mach. Learn. Cybern., 2017
Proceedings of the 13th International Conference on Natural Computation, 2017
Proceedings of the 13th International Conference on Natural Computation, 2017
2016
Proceedings of the 12th International Conference on Computational Intelligence and Security, 2016
2015
Int. J. Inf. Commun. Technol., 2015
Proceedings of the 11th International Conference on Computational Intelligence and Security, 2015
2014
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014
2013
Wirel. Pers. Commun., 2013
J. Appl. Math., 2013
Comput. Oper. Res., 2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013
2012
A New Rank-two Semidefinite Programming Relaxation Method for Multiuser Detection Problem.
Wirel. Pers. Commun., 2012
2011
Wirel. Pers. Commun., 2011
Comput. Math. Appl., 2011
2010
Proceedings of the Advances in Neural Networks, 2010
2009
Proceedings of the 2009 IEEE International Conference on Granular Computing, 2009
2008
Proceedings of the Ninth ACIS International Conference on Software Engineering, 2008
Proceedings of the Ninth ACIS International Conference on Software Engineering, 2008
Proceedings of The International Symposium on Electronic Commerce and Security, 2008
Proceedings of the International Conference on Computer Science and Software Engineering, 2008
2007
A new branch and bound method with pretreatment for the binary quadratic programming.
Appl. Math. Comput., 2007
2005
Proceedings of the Advances in Neural Networks - ISNN 2005, Second International Symposium on Neural Networks, Chongqing, China, May 30, 2005