Yao Cheng

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2024
Super-resolution reconstruction of single image for latent features.
Comput. Vis. Media, December, 2024

PeriodNet: Noise-Robust Fault Diagnosis Method Under Varying Speed Conditions.
IEEE Trans. Neural Networks Learn. Syst., October, 2024

HAMIATCM: high-availability membership inference attack against text classification models under little knowledge.
Appl. Intell., September, 2024

Transformer and Graph Convolution-Based Unsupervised Detection of Machine Anomalous Sound Under Domain Shifts.
IEEE Trans. Emerg. Top. Comput. Intell., August, 2024

Optimal Balanced-Norm Error Estimate of the LDG Method for Reaction-Diffusion Problems I: The One-Dimensional Case.
J. Sci. Comput., August, 2024

Precise Motion Compensation of Multi-Rotor UAV-Borne SAR Based on Improved PTA.
Remote. Sens., July, 2024

Two-Dimensional Autofocus for Ultra-High-Resolution Squint Spotlight Airborne SAR Based on Improved Spectrum Modification.
Remote. Sens., June, 2024

Dynamic bias alignment and discrimination enhancement for unsupervised domain adaptation.
Neural Comput. Appl., May, 2024

Local discontinuous Galerkin method for a singularly perturbed fourth-order problem of reaction-diffusion type.
J. Comput. Appl. Math., April, 2024

From Reliability to Resilience: More Than Just Taking One Step Further.
IEEE Trans. Reliab., March, 2024

Unmanned Airborne Bistatic Interferometric Synthetic Aperture Radar Data Processing Method Using Bi-Directional Synchronization Chain Signals.
Remote. Sens., March, 2024

Modeling mosquito control by an impulsive reaction-diffusion mosquito model with periodic evolution domain.
Commun. Nonlinear Sci. Numer. Simul., March, 2024

A Robust Track Estimation Method for Airborne SAR Based on Weak Navigation Information and Additional Envelope Errors.
Remote. Sens., February, 2024

Cooperative End-Edge-Cloud Computing and Resource Allocation for Digital Twin Enabled 6G Industrial IoT.
IEEE J. Sel. Top. Signal Process., January, 2024

Crowd-Aware Socially Compliant Robot Navigation via Deep Reinforcement Learning.
Int. J. Soc. Robotics, January, 2024

Unsupervised multi-source domain adaptation for person re-identification via feature fusion and pseudo-label refinement.
Comput. Electr. Eng., January, 2024

Transformer-Based High-Fidelity Facial Displacement Completion for Detailed 3D Face Reconstruction.
IEEE Trans. Multim., 2024

FaceRefiner: High-Fidelity Facial Texture Refinement With Differentiable Rendering-Based Style Transfer.
IEEE Trans. Multim., 2024

A Lightweight Network With Adaptive Input and Adaptive Channel Pruning Strategy for Bearing Fault Diagnosis.
IEEE Trans. Instrum. Meas., 2024

EdgePro: Edge Deep Learning Model Protection via Neuron Authorization.
IEEE Trans. Dependable Secur. Comput., 2024

Optimal resilience-based restoration of a system subject to recurrent dependent hazards.
Reliab. Eng. Syst. Saf., 2024

A Miss Is as Good as A Mile: Metamorphic Testing for Deep Learning Operators.
Proc. ACM Softw. Eng., 2024

A Geometric Auto-Calibration Method for Multiview UAV-Borne FMCW SAR Images.
IEEE Geosci. Remote. Sens. Lett., 2024

Rethinking the defense against free-rider attack from the perspective of model weight evolving frequency.
Inf. Sci., 2024

Unsupervised multi-source domain adaptation for person re-identification via sample weighting.
Intell. Data Anal., 2024

Optimized single-image super-resolution reconstruction: A multimodal approach based on reversible guidance and cyclical knowledge distillation.
Eng. Appl. Artif. Intell., 2024

Boosting Graph Foundation Model from Structural Perspective.
CoRR, 2024

Improving Graph Out-of-distribution Generalization on Real-world Data.
CoRR, 2024

Optimal balanced-norm error estimate of the LDG method for reaction-diffusion problems II: the two-dimensional case with layer-upwind flux.
CoRR, 2024

Learn2Talk: 3D Talking Face Learns from 2D Talking Face.
CoRR, 2024

Towards Learning from Graphs with Heterophily: Progress and Future.
CoRR, 2024

InfiAgent-DABench: Evaluating Agents on Data Analysis Tasks.
CoRR, 2024

Revisiting Anonymity in Post-quantum Public Key Encryption.
Proceedings of the Post-Quantum Cryptography - 15th International Workshop, 2024

Self-pro: A Self-prompt and Tuning Framework for Graph Neural Networks.
Proceedings of the Machine Learning and Knowledge Discovery in Databases. Research Track, 2024

G-SAP: Graph-based Structure-Aware Prompt Learning over Heterogeneous Knowledge for Commonsense Reasoning.
Proceedings of the 2024 International Conference on Multimedia Retrieval, 2024

Resurrecting Label Propagation for Graphs with Heterophily and Label Noise.
Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2024

UAV-Borne Bistatic Interferometric SAR Time-Phase Synchronization Technology Based on Bi-Directional Synchronization Chain.
Proceedings of the IGARSS 2024, 2024

A Systematical Error Compensation Method for an Ultra-Wideband Microwave Photonic SAR System.
Proceedings of the IGARSS 2024, 2024

InfiAgent-DABench: Evaluating Agents on Data Analysis Tasks.
Proceedings of the Forty-first International Conference on Machine Learning, 2024

2023
Critical Department Analysis for Large-Scale Outpatient Systems.
IEEE Trans. Comput. Soc. Syst., December, 2023

FedRight: An effective model copyright protection for federated learning.
Comput. Secur., December, 2023

Excitement surfeited turns to errors: Deep learning testing framework based on excitable neurons.
Inf. Sci., August, 2023

Local Discontinuous Galerkin Method for a Third-Order Singularly Perturbed Problem of Convection-Diffusion Type.
Comput. Methods Appl. Math., July, 2023

The local discontinuous Galerkin method for a singularly perturbed convection-diffusion problem with characteristic and exponential layers.
Numerische Mathematik, June, 2023

Optimal pointwise convergence of the LDG method for singularly perturbed convection-diffusion problem.
Appl. Math. Lett., June, 2023

Supercloseness of the local discontinuous Galerkin method for a singularly perturbed convection-diffusion problem.
Math. Comput., April, 2023

Incorporating bus delay minimization in design of signal progression for arterials accommodating heavy mixed-traffic flows.
J. Intell. Transp. Syst., March, 2023

FAFEnet: A fast and accurate model for automatic license plate detection and recognition.
IET Image Process., February, 2023

Raceway Defect Features of a High-Speed Train Axle Box Bearing in the Vehicle-Track Coupled System.
IEEE Trans. Instrum. Meas., 2023

Deep Reinforcement Learning of UAV Tracking Control Under Wind Disturbances Environments.
IEEE Trans. Instrum. Meas., 2023

CFFsBD: A Candidate Fault Frequencies-Based Blind Deconvolution for Rolling Element Bearings Fault Feature Enhancement.
IEEE Trans. Instrum. Meas., 2023

The Impact of the Variability of Patient Flow and Service Time on the Efficiency of Large-Scale Outpatient Systems.
IEEE Trans. Comput. Soc. Syst., 2023

Self-supervised Heterogeneous Graph Variational Autoencoders.
CoRR, 2023

Prioritized Propagation in Graph Neural Networks.
CoRR, 2023

Label Propagation for Graph Label Noise.
CoRR, 2023

Edge Deep Learning Model Protection via Neuron Authorization.
CoRR, 2023

Graph Self-Contrast Representation Learning.
Proceedings of the IEEE International Conference on Data Mining, 2023

The Construction and Application of an Intelligent Prediction Model for University Research Funding.
Proceedings of the 6th International Conference on E-Business, 2023

Power of Randomness Recovery: Tighter CCA-Secure KEM in the QROM.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023

2022
Artificial Intelligence Technology in Basketball Training Action Recognition.
Frontiers Neurorobotics, September, 2022

On Time-Dependent Critical Platforms and Tracks in Metro Systems.
Transp. Sci., 2022

DeepMnemonic: Password Mnemonic Generation via Deep Attentive Encoder-Decoder Model.
IEEE Trans. Dependable Secur. Comput., 2022

Optimal sampling-based sequential inspection and maintenance plans for a heterogeneous product with competing failure modes.
Reliab. Eng. Syst. Saf., 2022

Multi-Rotor UAV-Borne PolInSAR Data Processing and Preliminary Analysis of Height Inversion in Urban Area.
Remote. Sens., 2022

A Robust Track Error Estimation Method for Airborne SAR Based on Accuracy Analysis Model.
Remote. Sens., 2022

Balanced-norm error estimate of the local discontinuous Galerkin method on layer-adapted meshes for reaction-diffusion problems.
Numer. Algorithms, 2022

A novel tracking control method for the distributed-drive and active-steering articulated virtual rail train.
J. Syst. Control. Eng., 2022

Systems resilience assessments: a review, framework and metrics.
Int. J. Prod. Res., 2022

Digital medical instrument based on embedded computer system.
Int. J. Embed. Syst., 2022

Superresolution Reconstruction of Single Image for Latent features.
CoRR, 2022

Rethinking the Defense Against Free-rider Attack From the Perspective of Model Weight Evolving Frequency.
CoRR, 2022

DeepSensor: Deep Learning Testing Framework Based on Neuron Sensitivity.
CoRR, 2022

The local discontinuous Galerkin method on layer-adapted meshes for time-dependent singularly perturbed convection-diffusion problems.
Comput. Math. Appl., 2022

Optimal maximum-norm estimate of the LDG method for singularly perturbed convection-diffusion problem.
Appl. Math. Lett., 2022

Multi-enhanced Adaptive Attention Network for RGB- T Salient Object Detection.
Proceedings of the International Joint Conference on Neural Networks, 2022

Attention-based Neighbor Selective Aggregation Network for Camouflaged Object Detection.
Proceedings of the International Joint Conference on Neural Networks, 2022

FZC: An Unsupervised Method for 3D Fracture Representation and Recognition in Well Logging.
Proceedings of the IEEE International Geoscience and Remote Sensing Symposium, 2022

NeuronFair: Interpretable White-Box Fairness Testing through Biased Neuron Identification.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

Finding Global Homophily in Graph Neural Networks When Meeting Heterophily.
Proceedings of the International Conference on Machine Learning, 2022

Exploration and Research on the Path of College Students' Values Education under the Background of New Media.
Proceedings of the 2022 6th International Conference on Education and Multimedia Technology, 2022

Intertwining History and Places: The Design of TongSEE Location-Based Augmented Reality Application for History Learning.
Proceedings of the Virtual, Augmented and Mixed Reality: Applications in Education, Aviation and Industry, 2022

Understanding Real-world Threats to Deep Learning Models in Android Apps.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
An Integrated Robust Design and Robust Control Strategy Using the Genetic Algorithm.
IEEE Trans. Ind. Informatics, 2021

Designing Leakage-Resilient Password Entry on Head-Mounted Smart Wearable Glass Devices.
IEEE Trans. Inf. Forensics Secur., 2021

Convergence Analysis of the LDG Method for Singularly Perturbed Reaction-Diffusion Problems.
Symmetry, 2021

Optimal degradation-based hybrid double-stage acceptance sampling plan for a heterogeneous product.
Reliab. Eng. Syst. Saf., 2021

Random Multi Hazard Resilience Modeling of Engineered Systems and Critical Infrastructure.
Reliab. Eng. Syst. Saf., 2021

Group-based Password Characteristics Analysis.
IEEE Netw., 2021

An Effective Countermeasure Against UAV Swarm Attack.
IEEE Netw., 2021

Design of Attack and Defense Framework for 1553B-based Integrated Electronic Systems.
IEEE Netw., 2021

On the local discontinuous Galerkin method for singularly perturbed problem with two parameters.
J. Comput. Appl. Math., 2021

Design of optimal sequential hybrid testing plans.
IISE Trans., 2021

Differential Evolution Algorithm Based Self-adaptive Control Strategy for Fed-batch Cultivation of Yeast.
Comput. Syst. Sci. Eng., 2021

Local discontinuous Galerkin method on layer-adapted meshes for singularly perturbed reaction-diffusion problems in two dimensions.
CoRR, 2021

Local Discontinuous Galerkin Method for Time-Dependent Singularly Perturbed Semilinear Reaction-Diffusion Problems.
Comput. Methods Appl. Math., 2021

Research on Teaching Exploration Practice under the Background of Multimedia Information Fusion.
Proceedings of the ICBDE'21: 2021 4th International Conference on Big Data and Education, 2021

2020
Group Password Strength Meter Based on Attention Mechanism.
IEEE Netw., 2020

Vulnerability Analysis and Security Compliance Testing for Networked Surveillance Cameras.
IEEE Netw., 2020

Password Enhancement Based on Semantic Transformation.
IEEE Netw., 2020

Fake Review Detection Based on PU Learning and Behavior Density.
IEEE Netw., 2020

Smart Contract Vulnerability Analysis and Security Audit.
IEEE Netw., 2020

Computer Audition for Healthcare: Opportunities and Challenges.
Frontiers Digit. Health, 2020

Application of attitude tracking algorithm for face recognition based on OpenCV in the intelligent door lock.
Comput. Commun., 2020

Noether's theorems for nonshifted dynamic systems on time scales.
Appl. Math. Comput., 2020

Research on the Application of Modern Information Technology in Higher Education.
Proceedings of the ICEMT 2020: The 4th International Conference on Education and Multimedia Technology, 2020

Where Does the Robustness Come from?: A Study of the Transformation-based Ensemble Defence.
Proceedings of the AISec@CCS 2020: Proceedings of the 13th ACM Workshop on Artificial Intelligence and Security, 2020

NativeX: Native Executioner Freezes Android.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

Android-based Cryptocurrency Wallets: Attacks and Countermeasures.
Proceedings of the IEEE International Conference on Blockchain, 2020

Composition and Function Analysis of Electroless Nickel Plating Solution Based on Intelligent Network.
Proceedings of the 2020 International Conference on Applications and Techniques in Cyber Intelligence, 2020

2019
Detecting Promotion Attacks in the App Market Using Neural Networks.
IEEE Wirel. Commun., 2019

Variable Signal Progression Bands for Transit Vehicles Under Dwell Time Uncertainty and Traffic Queues.
IEEE Trans. Intell. Transp. Syst., 2019

Conserved Quantity and Adiabatic Invariant for Hamiltonian System with Variable Order.
Symmetry, 2019

Optimal error estimate of the local discontinuous Galerkin methods based on the generalized alternating numerical fluxes for nonlinear convection-diffusion equations.
Numer. Algorithms, 2019

A Hybrid Time-Frequency Analysis Method for Railway Rolling-Element Bearing Fault Diagnosis.
J. Sensors, 2019

PowerNet: Neural Power Demand Forecasting in Smart Grid.
CoRR, 2019

A scalable and extensible framework for android malware detection and family attribution.
Comput. Secur., 2019

Securing Intelligent Transportation System: A Blockchain-Based Approach with Attack Mitigation.
Proceedings of the Smart Blockchain - Second International Conference, 2019

Keyed Non-parametric Hypothesis Tests.
Proceedings of the Network and System Security - 13th International Conference, 2019

Character-Based Deep Learning Approaches for Clinical Named Entity Recognition: A Comparative Study Using Chinese EHR Texts.
Proceedings of the Smart Health - International Conference, 2019

2018
Attack and Countermeasure on Interlock-Based Device Pairing Schemes.
IEEE Trans. Inf. Forensics Secur., 2018

Reliability modeling and optimization of operational use of one-shot units.
Reliab. Eng. Syst. Saf., 2018

Workload Management in Telemedical Physician Triage and Other Knowledge-Based Service Systems.
Manag. Sci., 2018

Signal coordination model for local arterial with heavy bus flows.
J. Intell. Transp. Syst., 2018

Toward the Effect of Dependent Distribution Parameters on Reliability Prediction.
J. Comput. Inf. Sci. Eng., 2018

Towards quantitative evaluation of privacy protection schemes for electricity usage data sharing.
ICT Express, 2018

A survey of Android exploits in the wild.
Comput. Secur., 2018

User-friendly deniable storage for mobile devices.
Comput. Secur., 2018

Fast feature matching based onr-nearestk-means searching.
CAAI Trans. Intell. Technol., 2018

Signal Progression Model for Long Arterial: Intersection Grouping and Coordination.
IEEE Access, 2018

Efficient Two-Layer Model Towards Cover Song Identification.
Proceedings of the MultiMedia Modeling - 24th International Conference, 2018

Secure smart metering based on LoRa technology.
Proceedings of the IEEE 4th International Conference on Identity, 2018

Hybrid Architecture for Spacecraft Diagnosis and its Application.
Proceedings of the 2018 IEEE International Conference on Prognostics and Health Management, 2018

An Improved Method and Implementation of Indoor Position Fingerprint Matching Localization Based on WLAN.
Proceedings of the Human Centered Computing - 4th International Conference, 2018

SCLib: A Practical and Lightweight Defense against Component Hijacking in Android Applications.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

2017
Optimal Sequential ALT Plans for Systems With Mixture of One-Shot Units.
IEEE Trans. Reliab., 2017

Reliability modeling of mixtures of one-shot units under thermal cyclic stresses.
Reliab. Eng. Syst. Saf., 2017

Application of generalized Gauss-Radau projections for the local discontinuous Galerkin method for linear convection-diffusion equations.
Math. Comput., 2017

Local Analysis of the Local Discontinuous Galerkin Method with Generalized Alternating Numerical Flux for One-Dimensional Singularly Perturbed Problem.
J. Sci. Comput., 2017

A study on a feasible no-root approach on Android.
J. Comput. Secur., 2017

Narrower System Reliability Bounds With Incomplete Component Information and Stochastic Process Loading.
J. Comput. Inf. Sci. Eng., 2017

Effective Music Feature NCP: Enhancing Cover Song Recognition with Music Transcription.
Proceedings of the 40th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2017

JSForce: A Forced Execution Engine for Malicious JavaScript Detection.
Proceedings of the Security and Privacy in Communication Networks, 2017

PURE: A Novel Tripartite Model for Review Sentiment Analysis and Recommendation.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2017

Evaluation of image quality metrics for sharpness enhancement.
Proceedings of the 10th International Symposium on Image and Signal Processing and Analysis, 2017

Residual Recurrent Neural Network with Sparse Training for Offline Arabic Handwriting Recognition.
Proceedings of the 14th IAPR International Conference on Document Analysis and Recognition, 2017

Combining Global Models for Parsing Universal Dependencies.
Proceedings of the CoNLL 2017 Shared Task: Multilingual Parsing from Raw Text to Universal Dependencies, 2017

What You See is Not What You Get: Leakage-Resilient Password Entry Schemes for Smart Glasses.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

PowerLSTM: Power Demand Forecasting Using Long Short-Term Memory Neural Network.
Proceedings of the Advanced Data Mining and Applications - 13th International Conference, 2017

2016
Reliability Modeling and Prediction of Systems With Mixture of Units.
IEEE Trans. Reliab., 2016

A Combined Model-Based and Intelligent Method for Small Fault Detection and Isolation of Actuators.
IEEE Trans. Ind. Electron., 2016

Implementation of Real-Time Vehicle Tracking in City-Scale Video Network.
Cybern. Syst., 2016

Cornell Belief and Sentiment System at TAC 2016.
Proceedings of the 2016 Text Analysis Conference, 2016

Exploiting Android System Services Through Bypassing Service Helpers.
Proceedings of the Security and Privacy in Communication Networks, 2016

Semantics-Preserving Dissection of JavaScript Exploits via Dynamic JS-Binary Analysis.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016

Attacks and Defence on Android Free Floating Windows.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Scalable Graph-based Bug Search for Firmware Images.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

A Feasible No-Root Approach on Android.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Local Analysis of Local Discontinuous Galerkin Method for the Time-Dependent Singularly Perturbed Problem.
J. Sci. Comput., 2015

Analytical redundancy based fault diagnosis scheme for satellite attitude control systems.
J. Frankl. Inst., 2015

PKU-AIPL' Solution for MediaEval 2015 Emotion in Music Task.
Proceedings of the Working Notes Proceedings of the MediaEval 2015 Workshop, 2015

A Rapid and Scalable Method for Android Application Repackaging Detection.
Proceedings of the Information Security Practice and Experience, 2015

Objective assessment of perceived sharpness of projection displays with a calibrated camera.
Proceedings of the Colour and Visual Computing Symposium, 2015

2014
A generalized interval probability-based optimization method for training generalized hidden Markov model.
Signal Process., 2014

Automated User Profiling in Location-Based Mobile Messaging Applications.
Proceedings of the 13th IEEE International Conference on Trust, 2014

LorSLIM: Low Rank Sparse Linear Methods for Top-N Recommendations.
Proceedings of the 2014 IEEE International Conference on Data Mining, 2014

2013
Temporal relation discovery between events and temporal expressions identified in clinical narrative.
J. Biomed. Informatics, 2013

On Schedulability Analysis for Embedded Systems with AADL Model.
Proceedings of the 2013 13th International Conference on Quality Software, 2013

Bind your phone number with caution: automated user profiling through address book matching on smartphone.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2010
Implementing the Compiler of UDLC.
Proceedings of the GCC 2010, 2010

2008
Traffic Engineering-based Load Balancing Algorithm in GMPLS Networks.
Proceedings of the Fourth International Conference on Semantics, Knowledge and Grid, 2008


  Loading...