Ye Du

Orcid: 0000-0002-3057-1862

According to our database1, Ye Du authored at least 66 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
UAV-Enabled IoT: Cascading Failure Model and Topology-Control-Based Recovery Scheme.
IEEE Internet Things J., June, 2024

A Dynamic Cascading Failure Model for LEO Satellite Networks.
IEEE Trans. Netw. Serv. Manag., April, 2024

Modeling and Analysis of Cascading Failures in LEO Satellite Networks.
IEEE Trans. Netw. Sci. Eng., 2024

Topological Building Extraction With Bidirectional Prediction From Remote Sensing Images.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2024

A software defect prediction method based on learnable three-line hybrid feature fusion.
Expert Syst. Appl., 2024

CMViM: Contrastive Masked Vim Autoencoder for 3D Multi-modal Representation Learning for AD classification.
CoRR, 2024

2023
Cascading failure model and resilience enhancement scheme of space information networks.
Reliab. Eng. Syst. Saf., September, 2023

PSEEMV: Provably secure and efficient emergency message verification scheme based on ECC and CRT for Space Information Network.
J. Inf. Secur. Appl., March, 2023

Resilience enhancement scheme for gateway placement in space information networks.
Comput. Networks, February, 2023

SRAKN: Secure Roaming Authentication and Key Negotiation protocol for Space Information Network.
Comput. Commun., 2023

BISVP: Building Footprint Extraction Via Bidirectional Serialized Vertex Prediction.
Proceedings of the IEEE International Conference on Acoustics, 2023

Tighter Robust Upper Bounds for Options via No-Regret Learning.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
Covering-based generalized variable precision fuzzy rough set.
J. Intell. Fuzzy Syst., 2022

PSAA: Provable Secure and Anti-Quantum Authentication Based on Randomized RLWE for Space Information Network.
CoRR, 2022

Resilience of space information network based on combination of complex networks and hypergraphs.
Comput. Commun., 2022

Learning from Future: A Novel Self-Training Framework for Semantic Segmentation.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

Visual Grounding with Transformers.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2022

The Performance and Comparision of Turbulence Compensation between Adaptive Optics with and without WFS under Dynamic Turbulence.
Proceedings of the 14th IEEE International Conference on Advanced Infocomm Technology, 2022

Weakly Supervised Semantic Segmentation by Pixel-to-Prototype Contrast.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

2021
A secure three-factor anonymous roaming authentication protocol using ECC for space information networks.
Peer-to-Peer Netw. Appl., 2021

A provably secure ECC-based access and handover authentication protocol for space information networks.
J. Netw. Comput. Appl., 2021

An Anti-Quantum Authentication Protocol for Space Information Networks Based on Ring Learning with Errors.
J. Commun. Inf. Networks, 2021

Entity Relation Fusion for Real-Time One-Stage Referring Expression Comprehension.
Proceedings of the MMAsia '21: ACM Multimedia Asia, Gold Coast, Australia, December 1, 2021

Industrial Intrusion Detection Technology Based on One-dimensional Multi-scale Residual Network.
Proceedings of the ICCAI '21: 2021 7th International Conference on Computing and Artificial Intelligence, Tianjin China, April 23, 2021

On the Renewal of Basketball Concepts Based on the Reform of Basketball Teaching in Colleges.
Proceedings of the CIPAE 2021: 2nd International Conference on Computers, 2021

2020
A Novel RLWE-Based Anonymous Mutual Authentication Protocol for Space Information Network.
Secur. Commun. Networks, 2020

Variance Loss: A Confidence-Based Reweighting Strategy for Coarse Semantic Segmentation.
CoRR, 2020

Fog Service in Space Information Network: Architecture, Use Case, Security and Challenges.
IEEE Access, 2020

Enhancing the Numeracy of Word Embeddings: A Linear Algebraic Perspective.
Proceedings of the Natural Language Processing and Chinese Computing, 2020

Attention-Based Knowledge Tracing with Heterogeneous Information Network Embedding.
Proceedings of the Knowledge Science, Engineering and Management, 2020

Pairwise-Based Hierarchical Gating Networks for Sequential Recommendation.
Proceedings of the Knowledge Science, Engineering and Management, 2020

Uniform and Non-uniform Sampling Methods for Sub-linear Time k-means Clustering.
Proceedings of the 25th International Conference on Pattern Recognition, 2020

Specializing Word Vectors by Spectral Decomposition on Heterogeneously Twisted Graphs.
Proceedings of the 28th International Conference on Computational Linguistics, 2020

2019
An improved method of k-induction combined with predicate abstraction and CEGAR for software model checking.
Clust. Comput., 2019

Accurate Prediction of Neoadjuvant Chemotherapy Pathological Complete Remission (pCR) for the Four Sub-Types of Breast Cancer.
IEEE Access, 2019

DST: A Deep Urban Traffic Flow Prediction Framework Based on Spatial-Temporal Features.
Proceedings of the Knowledge Science, Engineering and Management, 2019

Social-Aware and Sequential Embedding for Cold-Start Recommendation.
Proceedings of the Knowledge Science, Engineering and Management, 2019

2018
A Novel Small-World Immune Algorithm and It's Application to Robot Path Planning.
J. Comput., 2018

Hybrid Decision Based Chinese News Headline Classification.
Proceedings of the Web and Big Data, 2018

Tackling Adversarial Examples in QA via Answer Sentence Selection.
Proceedings of the Workshop on Machine Reading for Question Answering@ACL 2018, 2018

2015
The discrete sell or hold problem with constraints on asset values.
Theor. Comput. Sci., 2015

Competitive economy as a ranking device over networks.
Games Econ. Behav., 2015

On a doubly dynamically controlled supermarket model with impatient customers.
Comput. Oper. Res., 2015

2014
A SDKEY-Based Secure Storage and Transmission Approach for Android Phone.
Proceedings of the 2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2014

2013
Research on a security mechanism for cloud computing based on virtualization.
Telecommun. Syst., 2013

Design of a method for encrypted P2P traffic identification using K-means algorithm.
Telecommun. Syst., 2013

On the complexity of deciding degeneracy in a bimatrix game with sparse payoff matrix.
Theor. Comput. Sci., 2013

2011
A Dynamic Security Mechanism for Web Services Based on NDIS Intermediate Drivers.
J. Comput., 2011

2010
Path auctions with multiple edge ownership.
Theor. Comput. Sci., 2010

A Useful Anomaly Intrusion Detection Method Using Variable-length Patterns and Average Hamming Distance.
J. Comput., 2010

On the complexity of equilibria in markets with additively separable utilities.
Proceedings of the Behavioral and Quantitative Game Theory, 2010

2009
Essays on the Computation of Economic Equilibria and Its Applications.
PhD thesis, 2009

Ranking via Arrow-Debreu Equilibrium
CoRR, 2009

On the Complexity of Deciding Degeneracy in Games
CoRR, 2009

Settling the Complexity of Arrow-Debreu Equilibria in Markets with Additively Separable Utilities.
Proceedings of the 50th Annual IEEE Symposium on Foundations of Computer Science, 2009

2008
On the complexity of deciding bimatrix games similarity.
Theor. Comput. Sci., 2008

The computation of approximate competitive equilibrium is PPAD-hard.
Inf. Process. Lett., 2008

Context Active RBAC and its Applications.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008

Configuring RBAC to Simulate Bell Model.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

2007
A New Upper Bound On Forwarding Index of Graphs.
Ars Comb., 2007

Experiment of Event Injection Technology for Network Dependability Evaluation.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

Using Spam Farm to Boost PageRank.
Proceedings of the AIRWeb 2007, 2007

2006
Evaluation of Network Dependability Using Event Injection.
Proceedings of the Advanced Web and Network Technologies, and Applications, 2006

2004
IADIDF: A Framework for Intrusion Detection.
Proceedings of the Grid and Cooperative Computing, 2004

A Useful System Prototype for Intrusion Detection - Architecture and Experiments.
Proceedings of the Discovery Science, 7th International Conference, 2004

HMMs for Anomaly Intrusion Detection.
Proceedings of the Computational and Information Science, First International Symposium, 2004


  Loading...