Yantao Li

Orcid: 0000-0001-7648-5671

Affiliations:
  • Chongqing University, Chongqing, China


According to our database1, Yantao Li authored at least 94 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Unsupervised Sensor-Based Continuous Authentication With Low-Rank Transformer Using Learning-to-Rank Algorithms.
IEEE Trans. Mob. Comput., September, 2024

Spatiotemporal synchronous dynamic graph attention network for traffic flow forecasting.
Neural Comput. Appl., August, 2024

Attention Label Learning to Enhance Interactive Vein Transformer for Palm-Vein Recognition.
IEEE Trans. Biom. Behav. Identity Sci., July, 2024

Adversarial Learning-Based Data Augmentation for Palm-Vein Identification.
IEEE Trans. Circuits Syst. Video Technol., June, 2024

Memory-Augmented Autoencoder Based Continuous Authentication on Smartphones With Conditional Transformer GANs.
IEEE Trans. Mob. Comput., May, 2024

SNNAuth: Sensor-Based Continuous Authentication on Smartphones Using Spiking Neural Networks.
IEEE Internet Things J., May, 2024

An Approximation Algorithm for Joint Data Uploading and Task Offloading in IoV.
IEEE Trans. Consumer Electron., February, 2024

A projected decentralized variance-reduction algorithm for constrained optimization problems.
Neural Comput. Appl., January, 2024

Mixed Automatic Adversarial Augmentation Network for Finger-Vein Recognition.
IEEE Trans. Instrum. Meas., 2024

LSFM: Light Style and Feature Matching for Efficient Cross-Domain Palmprint Recognition.
IEEE Trans. Inf. Forensics Secur., 2024

Attention BLSTM-Based Temporal-Spatial Vein Transformer for Multi-View Finger-Vein Recognition.
IEEE Trans. Inf. Forensics Secur., 2024

AG-NAS: An Attention GRU-Based Neural Architecture Search for Finger-Vein Recognition.
IEEE Trans. Inf. Forensics Secur., 2024

RSAB-ConvGRU: A hybrid deep-learning method for traffic flow prediction.
Multim. Tools Appl., 2024

AEGANAuth: Autoencoder GAN-Based Continuous Authentication With Conditional Variational Autoencoder Generative Adversarial Network.
IEEE Internet Things J., 2024

FuMeAuth: Sensor-Based Continuous Authentication Using Fused Memory-Augmented Transformer Autoencoder.
IEEE Internet Things J., 2024

2023
An A<sup>2</sup>-Gurobi algorithm for route recommendation with big taxi trajectory data.
Multim. Tools Appl., December, 2023

Spatial-temporal graph neural network based on gated convolution and topological attention for traffic flow prediction.
Appl. Intell., December, 2023

SearchAuth: Neural Architecture Search-based Continuous Authentication Using Auto Augmentation Search.
ACM Trans. Sens. Networks, November, 2023

Adaptive Deep Feature Fusion for Continuous Authentication With Data Augmentation.
IEEE Trans. Mob. Comput., October, 2023

A distributed EEMDN-SABiGRU model on Spark for passenger hotspot prediction.
Frontiers Inf. Technol. Electron. Eng., September, 2023

An event-triggering algorithm for decentralized stochastic optimization over networks.
J. Frankl. Inst., September, 2023

Attention-based spatial-temporal adaptive dual-graph convolutional network for traffic flow forecasting.
Neural Comput. Appl., August, 2023

Local Attention Transformer-Based Full-View Finger-Vein Identification.
IEEE Trans. Circuits Syst. Video Technol., June, 2023

TS-GAN: Time-series GAN for Sensor-based Health Data Augmentation.
ACM Trans. Comput. Heal., April, 2023

A Memetic Algorithm for Cooperative Complex Task Offloading in Heterogeneous Vehicular Networks.
IEEE Trans. Netw. Sci. Eng., 2023

Label Enhancement-Based Multiscale Transformer for Palm-Vein Recognition.
IEEE Trans. Instrum. Meas., 2023

Transformer Based Defense GAN Against Palm-Vein Adversarial Attacks.
IEEE Trans. Inf. Forensics Secur., 2023

Cooperative Data Uploading and Task Offloading via Markov-Approximation in Heterogeneous Vehicular Networks.
Proceedings of the 25th IEEE International Conference on Intelligent Transportation Systems, 2023

Towards Inference of Original Graph Data Information from Graph Embeddings.
Proceedings of the International Joint Conference on Neural Networks, 2023

Privacy-Preserving Travel Time Prediction for Internet of Vehicles: A Crowdsensing and Federated Learning Approach.
Proceedings of the Neural Information Processing - 30th International Conference, 2023

Contrastive Learning-Based Finger-Vein Recognition with Automatic Adversarial Augmentation.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2023

2022
DeFFusion: CNN-based Continuous Authentication Using Deep Feature Fusion.
ACM Trans. Sens. Networks, 2022

A parallel NAW-DBLSTM algorithm on Spark for traffic flow forecasting.
Neural Comput. Appl., 2022

A distributed EMDN-GRU model on Spark for passenger waiting time forecasting.
Neural Comput. Appl., 2022

A parallel grid-search-based SVM optimization algorithm on Spark for passenger hotspot prediction.
Multim. Tools Appl., 2022

A parallel SP-DBSCAN algorithm on spark for waiting spot recommendation.
Multim. Tools Appl., 2022

APFD: an effective approach to taxi route recommendation with mobile trajectory big data.
Frontiers Inf. Technol. Electron. Eng., 2022

CNN-Based Continuous Authentication on Smartphones With Conditional Wasserstein Generative Adversarial Network.
IEEE Internet Things J., 2022

Dependency-aware Task Offloading via End-Edge-Cloud Cooperation in Heterogeneous Vehicular Networks.
Proceedings of the 25th IEEE International Conference on Intelligent Transportation Systems, 2022

2021
Multi-Scale and Multi-Direction GAN for CNN-Based Single Palm-Vein Identification.
IEEE Trans. Inf. Forensics Secur., 2021

A distributed WND-LSTM model on MapReduce for short-term traffic flow prediction.
Neural Comput. Appl., 2021

IM-LDP: Incentive Mechanism for Mobile Crowd-Sensing Based on Local Differential Privacy.
IEEE Commun. Lett., 2021

Find and Dig: A Privacy-Preserving Image Processing Mechanism in Deep Neural Networks for Mobile Computation.
Proceedings of the International Joint Conference on Neural Networks, 2021

CNN-Based Continuous Authentication on Smartphones with Auto Augmentation Search.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

$\mathbb {PSG}$: Local Privacy Preserving Synthetic Social Graph Generation.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2021

Multi-truth Discovery with Correlations of Candidates in Crowdsourcing Systems.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2021

2020
SCANet: Sensor-based Continuous Authentication with Two-stream Convolutional Neural Networks.
ACM Trans. Sens. Networks, 2020

A Dynamic Programming Framework for Large-Scale Online Clustering on Graphs.
Neural Process. Lett., 2020

Using Feature Fusion Strategies in Continuous Authentication on Smartphones.
IEEE Internet Comput., 2020

SmartJump: A Continuous Jump Detection Framework on Smartphones.
IEEE Internet Comput., 2020

A Real-Time Data Collection Mechanism With Trajectory Privacy in Mobile Crowd-Sensing.
IEEE Commun. Lett., 2020

Adaptive Task Scheduling via End-Edge-Cloud Cooperation in Vehicular Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2020

Structural Text Steganography Using Unseen Tag Attribute Values.
Proceedings of the Neural Information Processing - 27th International Conference, 2020

2019
MEG: Memory and Energy Efficient Garbled Circuit Evaluation on Smartphones.
IEEE Trans. Inf. Forensics Secur., 2019

Cryptographic and parallel hash function based on cross coupled map lattices suitable for multimedia communication security.
Multim. Tools Appl., 2019

Using Data Augmentation in Continuous Authentication on Smartphones.
IEEE Internet Things J., 2019

Adding Gaussian Noise to DeepFool for Robustness based on Perturbation Directionality.
Aust. J. Intell. Inf. Process. Syst., 2019

A Gradient-Based Algorithm to Deceive Deep Neural Networks.
Proceedings of the Neural Information Processing - 26th International Conference, 2019

Text Cover Steganography Using Font Color of the Invisible Characters and Optimized Primary Color-intensities.
Proceedings of the 19th IEEE International Conference on Communication Technology, 2019

2018
Pedestrian walking safety system based on smartphone built-in sensors.
IET Commun., 2018

A MapReduce-Based Parallel Frequent Pattern Growth Algorithm for Spatiotemporal Association Analysis of Mobile Trajectory Big Data.
Complex., 2018

USB side-channel attack on Tor.
Comput. Networks, 2018

Sensor-Based Continuous Authentication Using Cost-Effective Kernel Ridge Regression.
IEEE Access, 2018

CNNAuth: Continuous Authentication via Two-Stream Convolutional Neural Networks.
Proceedings of the 2018 IEEE International Conference on Networking, 2018

Efficient Integer Vector Homomorphic Encryption Using Deep Learning for Neural Networks.
Proceedings of the Neural Information Processing - 25th International Conference, 2018

Touch-based Smartphone Authentication Using Import Vector Domain Description.
Proceedings of the 29th IEEE International Conference on Application-specific Systems, 2018

2017
Improving Web Performance in Home Broadband Access Networks.
Wirel. Pers. Commun., 2017

A fast and efficient hash function based on generalized chaotic mapping with variable parameters.
Neural Comput. Appl., 2017

Energy optimization for mobile video streaming via an aggregate model.
Multim. Tools Appl., 2017

A driving behavior detection system based on a smartphone's built-in sensor.
Int. J. Commun. Syst., 2017

2016
A Context-Aware Framework for Reducing Bandwidth Usage of Mobile Video Chats.
IEEE Trans. Multim., 2016

Determining driver phone use leveraging smartphone sensors.
Multim. Tools Appl., 2016

Towards an EEG-based brain-computer interface for online robot control.
Multim. Tools Appl., 2016

A distributed spatial-temporal weighted model on MapReduce for short-term traffic flow forecasting.
Neurocomputing, 2016

An energy-efficient framework for ubiquitous phone access.
Int. J. Commun. Syst., 2016

Energy Modeling and Optimization for BSN and WiFi Networks Using Joint Data Rate Adaptation.
Ad Hoc Sens. Wirel. Networks, 2016

A Map Reduce-Based Nearest Neighbor Approach for Big-Data-Driven Traffic Flow Prediction.
IEEE Access, 2016

2014
A Measurement-Based Prioritization Scheme for Smartphone Applications.
Wirel. Pers. Commun., 2014

An adaptive backoff algorithm for multi-channel CSMA in wireless sensor networks.
Neural Comput. Appl., 2014

2013
A Self-Adaptive Spectrum Management Middleware for Wireless Sensor Networks.
Wirel. Pers. Commun., 2013

Discrete-time Markov Model for Wireless Link Burstiness Simulations.
Wirel. Pers. Commun., 2013

Communication Energy Modeling and Optimization through Joint Packet Size Analysis of BSN and WiFi Networks.
IEEE Trans. Parallel Distributed Syst., 2013

Improvement and performance analysis of a novel hash function based on chaotic neural network.
Neural Comput. Appl., 2013

AdaSense: Adapting sampling rates for activity recognition in Body Sensor Networks.
Proceedings of the 19th IEEE Real-Time and Embedded Technology and Applications Symposium, 2013

Discovery and Analysis of Usage Data Based on Hadoop for Personalized Information Access.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013

2012
A Kernel Gabor-Based Weighted Region Covariance Matrix for Face Recognition.
Sensors, 2012

Parallel chaotic Hash function construction based on cellular neural network.
Neural Comput. Appl., 2012

Keyed hash function based on a dynamic lookup table of functions.
Inf. Sci., 2012

RadioSense: Exploiting Wireless Communication Patterns for Body Sensor Network Activity Recognition.
Proceedings of the 33rd IEEE Real-Time Systems Symposium, 2012

Towards Energy Optimization Using Joint Data Rate Adaptation for BSN and WiFi Networks.
Proceedings of the Seventh IEEE International Conference on Networking, 2012

2011
A comment on: "Fast and numerically stable methods for the computation of Zernike moments" by Singh et al. [Pattern Recognition, 43(2010), Pages 2497-2506].
Pattern Recognit., 2011

Parallel Hash function construction based on chaotic maps with changeable parameters.
Neural Comput. Appl., 2011

A novel Hash algorithm construction based on chaotic neural network.
Neural Comput. Appl., 2011

Energy modeling and optimization through joint packet size analysis of BSN and WiFi networks.
Proceedings of the 30th IEEE International Performance Computing and Communications Conference, 2011


  Loading...