Yaling Zhang

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2024
Study on Soil Moisture Status of Soybean and Corn across the Whole Growth Period Based on UAV Multimodal Remote Sensing.
Remote. Sens., September, 2024

Enhancing Image Alignment in Time-Lapse-Ground-Penetrating Radar through Dynamic Time Warping.
Remote. Sens., March, 2024

Blockchain-based data security sharing and fair payment scheme in smart cities.
Proceedings of the International Conference on Networking and Network Applications, 2024

Research on Code Virtualization Methods for Cloud Applications.
Proceedings of the International Conference on Networking and Network Applications, 2024

2023
Response of Evapotranspiration (ET) to Climate Factors and Crop Planting Structures in the Shiyang River Basin, Northwestern China.
Remote. Sens., August, 2023

Construction of Customer Appeal Classification Model Based on Speech Recognition.
J. Inf. Process. Syst., April, 2023

Human-computer interaction based on the intelligent information retrieval method for customer satisfaction in power system service.
Int. J. Model. Simul. Sci. Comput., February, 2023

Detection and attribution of vegetation dynamics in the National Barrier Zone of China by considering climate temporal effects.
Int. J. Appl. Earth Obs. Geoinformation, February, 2023

Attribute Based Conjunctive Keywords Search With Verifiability and Fair Payment Using Blockchain.
IEEE Trans. Serv. Comput., 2023

Analysis of SQL Injection based on Petri Net in Wireless Network.
J. Inf. Sci. Eng., 2023

A Novel On-Demand Service Architecture for Efficient Cloud-Edge Collaboration.
Proceedings of the International Conference on Networking and Network Applications, 2023

DDoS Attack Detection Based on Information Entropy Feature Extraction in Software Defined Networks.
Proceedings of the International Conference on Networking and Network Applications, 2023

Reversible Data Hiding in Encrypted Images Based on a Multi-Granularity Adaptive Classification Mechanism.
Proceedings of the Knowledge Science, Engineering and Management, 2023

MA-TGNN: Multiple Aggregators Graph-Based Model for Text Classification.
Proceedings of the Knowledge Science, Engineering and Management, 2023

Reversible Data Hiding in Encrypted Images Based on Image Reprocessing and Polymorphic Compression.
Proceedings of the Neural Information Processing - 30th International Conference, 2023

Reversible Data Hiding Based on Adaptive Embedding with Local Complexity.
Proceedings of the Neural Information Processing - 30th International Conference, 2023

Smart Contract Symbol Execution Vulnerability Detection Method Based on CFG Path Pruning.
Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2023

2022
Probabilistic Inference and Trustworthiness Evaluation of Associative Links Toward Malicious Attack Detection for Online Recommendations.
IEEE Trans. Dependable Secur. Comput., 2022

Authorized Data Secure Access Scheme With Specified Time and Relevance Ranked Keyword Search for Industrial Cloud Platforms.
IEEE Syst. J., 2022

Intelligent Retrieval Method of Power System Service User Satisfaction Based on Human-Computer Interaction.
J. Interconnect. Networks, 2022

Rating behavior evaluation and abnormality forensics analysis for injection attack detection.
J. Intell. Inf. Syst., 2022

A new projection neural network for linear and convex quadratic second-order cone programming.
J. Intell. Fuzzy Syst., 2022

A Barzilai and Borwein regularization feasible direction algorithm for convex nonlinear SOC programming with linear constraints.
J. Comput. Appl. Math., 2022

Attribute-based access control scheme for data sharing on hyperledger fabric.
J. Inf. Secur. Appl., 2022

Application of Deep Convolution Network Algorithm in Sports Video Hot Spot Detection.
Frontiers Neurorobotics, 2022

A differential privacy federated learning framework for accelerating convergence.
Proceedings of the 18th International Conference on Computational Intelligence and Security, 2022

2021
Identification of Malicious Injection Attacks in Dense Rating and Co-Visitation Behaviors.
IEEE Trans. Inf. Forensics Secur., 2021

Mobility and Dependence-Aware QoS Monitoring in Mobile Edge Computing.
IEEE Trans. Cloud Comput., 2021

A fast and accurate GPU based method on simulating energy deposition for beam-target coupling with granular materials.
Comput. Phys. Commun., 2021

Random Forest Algorithm Based on Differential Privacy Protection.
Proceedings of the 20th IEEE International Conference on Trust, 2021

A fine-grained petri model for SQL time-blind injection.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021

Signature Scheme Based on The SM2 Algorithm in Fabric.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021

Research on Defect Location Method of C Language Code Based on Deep Learning.
Proceedings of the 16th International Conference on Computer Science & Education, 2021

An Improved LRP-Based Differential Privacy Preserving Deep Learning Framework.
Proceedings of the 17th International Conference on Computational Intelligence and Security CIS 2021, 2021

2020
Inference of Suspicious Co-Visitation and Co-Rating Behaviors and Abnormality Forensics for Recommender Systems.
IEEE Trans. Inf. Forensics Secur., 2020

Multivariate QoS Monitoring in Mobile Edge Computing based on Bayesian Classifier and Rough Set.
Proceedings of the 2020 IEEE International Conference on Web Services, 2020

Chinese Sentiment Classification Model of Neural Network Based on Particle Swarm Optimization.
Proceedings of the 16th International Conference on Computational Intelligence and Security, 2020

2019
Grasping Force Optimization for Multi-fingered Robotic Hands Using Projection and Contraction Methods.
J. Optim. Theory Appl., 2019

Time and Attribute Based Dual Access Control and Data Integrity Verifiable Scheme in Cloud Computing Applications.
IEEE Access, 2019

A Differential Privacy Support Vector Machine Classifier Based on Dual Variable Perturbation.
IEEE Access, 2019

Blockchain-Based Personal Health Records Sharing Scheme With Data Integrity Verifiable.
IEEE Access, 2019

KS-ABESwET: A Keyword Searchable Attribute-Based Encryption Scheme With Equality Test in the Internet of Things.
IEEE Access, 2019

Blockchain-Based Fair Payment Protocol for Deduplication Cloud Storage System.
IEEE Access, 2019

A Secure Cloud Storage Framework With Access Control Based on Blockchain.
IEEE Access, 2019

Auditable Protocols for Fair Payment and Physical Asset Delivery Based on Smart Contracts.
IEEE Access, 2019

EIDM: A Ethereum-Based Cloud User Identity Management Protocol.
IEEE Access, 2019

Smart Contract-Based Product Traceability System in the Supply Chain Scenario.
IEEE Access, 2019

Verifiable and Multi-Keyword Searchable Attribute-Based Encryption Scheme for Cloud Storage.
IEEE Access, 2019

Deep Spatial-Spectral Information Exploitation for Rapid Hyperspectral Image Super-Resolution.
Proceedings of the 2019 IEEE International Geoscience and Remote Sensing Symposium, 2019

An Improved Differential Privacy Algorithm Using Frequent Pattern Mining.
Proceedings of the 15th International Conference on Computational Intelligence and Security, 2019

Research and application of grade prediction model based on decision tree algorithm.
Proceedings of the ACM Turing Celebration Conference - China, 2019

2018
Uncovering anomalous rating behaviors for rating systems.
Neurocomputing, 2018

Lattice-based ring signature scheme under the random oracle model.
Int. J. High Perform. Comput. Netw., 2018

Efficient revocable and grantable attribute-based encryption from lattices with fine-grained access control.
IET Inf. Secur., 2018

Revocable Identity-Based Encryption Scheme Under LWE Assumption in the Standard Model.
IEEE Access, 2018

Efficiently Revocable and Searchable Attribute-Based Encryption Scheme for Mobile Cloud Storage.
IEEE Access, 2018

A Blockchain-Based Framework for Data Sharing With Fine-Grained Access Control in Decentralized Storage Systems.
IEEE Access, 2018

2017
A projected-based neural network method for second-order cone programming.
Int. J. Mach. Learn. Cybern., 2017

An efficient algorithm for frequent pattern mining based on privacy-preserving.
Proceedings of the 13th International Conference on Natural Computation, 2017

An improved sampling K-means clustering algorithm based on MapReduce.
Proceedings of the 13th International Conference on Natural Computation, 2017

2016
Multi-User and Keyword-Based Searchable Encryption Scheme.
Proceedings of the 12th International Conference on Computational Intelligence and Security, 2016

2015
Multi-party concurrent signatures scheme from lattice.
Int. J. Inf. Commun. Technol., 2015

An Efficient Identity-Based Signature Scheme for Vehicular Communications.
Proceedings of the 11th International Conference on Computational Intelligence and Security, 2015

2014
A Multi-users Searchable Encryption Scheme with Proxy Re-encryption.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

2013
A Continuous Relaxation Method for Multiuser Detection Problem.
Wirel. Pers. Commun., 2013

A Rank-Two Feasible Direction Algorithm for the Binary Quadratic Programming.
J. Appl. Math., 2013

An alternating direction method for second-order conic programming.
Comput. Oper. Res., 2013

A Multi-user Searchable Symmetric Encryption Scheme for Cloud Storage System.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Lattice-Based Multi-party Concurrent Signatures Scheme.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Evaluable Secure Ranked Keyword Search Scheme over Encrypted Cloud Data.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013

2012
A New Rank-two Semidefinite Programming Relaxation Method for Multiuser Detection Problem.
Wirel. Pers. Commun., 2012

2011
A Second-Order Cone Programming Method for Multiuser Detection Problem.
Wirel. Pers. Commun., 2011

An Authentication Protocol for RFID Tag and Its Simulation.
J. Networks, 2011

Ring signature scheme based on multivariate public key cryptosystems.
Comput. Math. Appl., 2011

2010
A New Two-Step Gradient-Based Backpropagation Training Method for Neural Networks.
Proceedings of the Advances in Neural Networks, 2010

2009
A modified gradient-based backpropagation training method for neural networks.
Proceedings of the 2009 IEEE International Conference on Granular Computing, 2009

2008
Multi-signers Strong Designated Verifier Signature Scheme.
Proceedings of the Ninth ACIS International Conference on Software Engineering, 2008

An Improved ID-based Restrictive Partially Blind Signature Scheme.
Proceedings of the Ninth ACIS International Conference on Software Engineering, 2008

Message Substitute Attack on Concurrent Signatures Protocol and its Improvement.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008

ID-Based Convertible Limited (Multi-)Verifier Signature Scheme.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

2007
A new branch and bound method with pretreatment for the binary quadratic programming.
Appl. Math. Comput., 2007

2005
A Neural Network Algorithm for Second-Order Conic Programming.
Proceedings of the Advances in Neural Networks - ISNN 2005, Second International Symposium on Neural Networks, Chongqing, China, May 30, 2005


  Loading...