Yichuan Wang
Orcid: 0000-0001-6575-1954
According to our database1,
Yichuan Wang
authored at least 170 papers
between 2009 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Adaptive Online Neural Predictive Control of Hydraulic Actuator Using FPGA Acceleration.
IEEE Trans. Ind. Electron., April, 2024
FedBoosting: Federated learning with gradient protected boosting for text recognition.
Neurocomputing, February, 2024
Privacy Block-Streaming: A Novel DEX File Loading Scheme Based on Federated Learning.
J. Inf. Sci. Eng., January, 2024
A Multiagent Deep Reinforcement Learning Autonomous Security Management Approach for Internet of Things.
IEEE Internet Things J., 2024
How to strategically respond to online hotel reviews: A strategy-aware deep learning approach.
Inf. Manag., 2024
CoRR, 2024
Introduction to the Minitrack on Generative AI and AI-generated Contents on Social Media.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024
Introduction to the Minitrack on The Technical, Socio-Economic, and Ethical Aspects of AI.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024
2023
Accelerating AI Adoption with Responsible AI Signals and Employee Engagement Mechanisms in Health Care.
Inf. Syst. Frontiers, December, 2023
Inf. Syst. Frontiers, December, 2023
Exploring the Darkverse: A Multi-Perspective Analysis of the Negative Societal Impacts of the Metaverse.
Inf. Syst. Frontiers, October, 2023
PrivAim: A Dual-Privacy Preserving and Quality-Aware Incentive Mechanism for Federated Learning.
IEEE Trans. Computers, July, 2023
Expert Syst. Appl., June, 2023
PTAP: A novel secure privacy-preserving & traceable authentication protocol in VANETs.
Comput. Networks, May, 2023
TRUCON: Blockchain-Based Trusted Data Sharing With Congestion Control in Internet of Vehicles.
IEEE Trans. Intell. Transp. Syst., March, 2023
Int. J. Mach. Learn. Cybern., February, 2023
Inf. Syst. Frontiers, February, 2023
Sensors, 2023
Explore the potential of deep learning and hyperchaotic map in the meaningful visual image encryption scheme.
IET Image Process., 2023
Hearing Cyber-Attacks: A Novel Model for Bridging Network Security Situation and Music.
Proceedings of the 5th International Symposium on Signal Processing Systems, 2023
Proceedings of the 17th USENIX Symposium on Operating Systems Design and Implementation, 2023
Proceedings of the International Conference on Networking and Network Applications, 2023
Formal Modeling and Defense Methods for 5G Network Endpoint Access Denial of Service Attacks.
Proceedings of the International Conference on Networking and Network Applications, 2023
Proceedings of the International Conference on Networking and Network Applications, 2023
Proceedings of the International Conference on Networking and Network Applications, 2023
Proceedings of the International Conference on Networking and Network Applications, 2023
Proceedings of the International Conference on Networking and Network Applications, 2023
DDoS Attack Detection Based on Information Entropy Feature Extraction in Software Defined Networks.
Proceedings of the International Conference on Networking and Network Applications, 2023
Feature learning model based on Feature space constraints and Self-Attention learning.
Proceedings of the 4th International Conference on Machine Learning and Computer Application, 2023
Cross-Level Network Security Element Fusion Extraction Method Based on Deep Learning.
Proceedings of the 8th International Conference on Cyber Security and Information Engineering, 2023
Patch-Based Multi-Level Attention Mechanism for Few-Shot Multi-Label Medical Image Classification.
Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2023
Smart Contract Symbol Execution Vulnerability Detection Method Based on CFG Path Pruning.
Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2023
2022
Analytical Calculation and Experimental Verification of Superconducting Electrodynamic Suspension System Using Null-Flux Ground Coils.
IEEE Trans. Intell. Transp. Syst., 2022
A Fault-Diagnosis Method for Railway Turnout Systems Based on Improved Autoencoder and Data Augmentation.
Sensors, 2022
Modeling Analysis of SM2 Construction Attacks in the Open Secure Sockets Layer Based on Petri Net.
Sensors, 2022
Supply-demand matching in a complex telemedicine environment considering intermediary intervention.
Comput. Ind. Eng., 2022
Proceedings of the International Conference on Networking and Network Applications, 2022
Proceedings of the International Conference on Networking and Network Applications, 2022
Effective Secrecy Throughput Analysis for Communication Systems with a DF Satellite Relay.
Proceedings of the International Conference on Networking and Network Applications, 2022
Block-Streaming Service Loading Optimization of Android Dalvik Executable File for Cloud-End Collaboration.
Proceedings of the International Conference on Networking and Network Applications, 2022
Proceedings of the IEEE INFOCOM 2022, 2022
Proceedings of the 2022 IEEE International Conference on Image Processing, 2022
FDQM: Four-Dimensional Quantitative Measure for Statistical Heterogeneity in Federated Learning.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2022
2021
IEEE Trans. Veh. Technol., 2021
IEEE Trans. Ind. Informatics, 2021
Secur. Commun. Networks, 2021
IEEE Netw., 2021
Mob. Inf. Syst., 2021
An intelligent fault diagnosis method based on curve segmentation and SVM for rail transit turnout.
J. Intell. Fuzzy Syst., 2021
An Architecture for IoT-Enabled Smart Transportation Security System: A Geospatial Approach.
IEEE Internet Things J., 2021
Artificial intelligence in business-to-business marketing: a bibliometric analysis of current research status, development and future directions.
Ind. Manag. Data Syst., 2021
Exploring the paths to big data analytics implementation success in banking and financial service: an integrated approach.
Ind. Manag. Data Syst., 2021
The dual concept of consumer value in social media brand community: A trust transfer perspective.
Int. J. Inf. Manag., 2021
Setting the future of digital and social media marketing research: Perspectives and research propositions.
Int. J. Inf. Manag., 2021
Trans. Emerg. Telecommun. Technol., 2021
EURASIP J. Adv. Signal Process., 2021
Brand value Co-creation in social commerce: The role of interactivity, social support, and relationship quality.
Comput. Hum. Behav., 2021
Proceedings of the 12th International Symposium on Parallel Architectures, 2021
A permission generation and configuration method based on Rules and FP-Growth algorithm.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021
A Driving Risk Prediction Approach Based on Generative Adversarial Networks and VANET for Autonomous Trams.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021
Chinese named entity recognition method for the field of network security based on RoBERTa.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021
2020
From Hardware to Operating System: A Static Measurement Method of Android System Based on TrustZone.
Wirel. Commun. Mob. Comput., 2020
Combined access control model embedding configurable policy for fine-grained data security.
Microprocess. Microsystems, 2020
J. Inf. Sci. Eng., 2020
J. Ambient Intell. Humaniz. Comput., 2020
A trusted feature aggregator federated learning for distributed malicious attack detection.
Comput. Secur., 2020
Comput. Hum. Behav., 2020
In Sharing Economy We Trust: Examining the Effect of Social and Technical Enablers on Millennials' Trust in Sharing Commerce.
Comput. Hum. Behav., 2020
CCF Trans. Netw., 2020
A study on exercise recommendation method using Knowledge Graph for computer network course.
Proceedings of the International Conference on Networking and Network Applications, 2020
Proceedings of the International Conference on Networking and Network Applications, 2020
Proceedings of the International Conference on Networking and Network Applications, 2020
Proceedings of the International Conference on Networking and Network Applications, 2020
Independent credible: Secure communication architecture of Android devices based on TrustZone.
Proceedings of the 2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2020
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020
2019
Neural Comput. Appl., 2019
J. Intell. Fuzzy Syst., 2019
Int. J. Inf. Manag., 2019
Exploring adverse drug reactions of diabetes medicine using social media analytics and interactive visualizations.
Int. J. Inf. Manag., 2019
EURASIP J. Wirel. Commun. Netw., 2019
Clust. Comput., 2019
Optimizing the Electronic Health Records Through Big Data Analytics: A Knowledge-Based View.
IEEE Access, 2019
Feature Extraction Optimization for Bitstream Communication Protocol Format Reverse Analysis.
Proceedings of the 18th IEEE International Conference On Trust, 2019
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019
Introduction to the Minitrack on Augmenting Human Intelligence: Artificially, Socially, and Ethically.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019
Artificial Intelligence and Visual Analytics: A Deep-Learning Approach to Analyze Hotel Reviews & Responses.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019
Railway Key Exchange Scheme for Improving Communication Efficiency of RSSP-II Protocol.
Proceedings of the 2019 IEEE Globecom Workshops, Waikoloa, HI, USA, December 9-13, 2019, 2019
Acoustic Detection of ArterioVenous Access Stenosis Based on MUSIC Power Spectral Features.
Proceedings of the 12th International Congress on Image and Signal Processing, 2019
Multi-Level Classification of Arteriovenous Graft Degree of Stenosis Based on SSA + Welch Multi-Position Sequence Feature Extraction.
Proceedings of the 12th International Congress on Image and Signal Processing, 2019
2018
Wirel. Commun. Mob. Comput., 2018
Binarized features with discriminant manifold filters for robust single-sample face recognition.
Signal Process. Image Commun., 2018
J. Comput. Inf. Syst., 2018
Inf. Sci., 2018
Int. J. Distributed Sens. Networks, 2018
An integrated big data analytics-enabled transformation model: Application to health care.
Inf. Manag., 2018
Comput. Informatics, 2018
Proceedings of the International Conference on Networking and Network Applications, 2018
Proceedings of the International Conference on Networking and Network Applications, 2018
Proceedings of the International Conference on Networking and Network Applications, 2018
Leveraging Big Data Analytics to Improve Quality of Care In Health Care: A fsQCA Approach.
Proceedings of the 51st Hawaii International Conference on System Sciences, 2018
A RMM Based Word Segmentation Method for Chinese Design Specifications of Building Stairs.
Proceedings of the 14th International Conference on Computational Intelligence and Security, 2018
Proceedings of the 14th International Conference on Computational Intelligence and Security, 2018
Proceedings of the 24th Americas Conference on Information Systems, 2018
Proceedings of the 24th Americas Conference on Information Systems, 2018
2017
Let Them Play: The Impact of Mechanics and Dynamics of a Serious Game on Student Perceptions of Learning Engagement.
IEEE Trans. Learn. Technol., 2017
IEEE Trans. Engineering Management, 2017
Business analytics-enabled decision-making effectiveness through knowledge absorptive capacity in health care.
J. Knowl. Manag., 2017
Weighted contourlet binary patterns and image-based fisher linear discriminant for face recognition.
Neurocomputing, 2017
Social interaction-based consumer decision-making model in social commerce: The role of word of mouth and observational learning.
Int. J. Inf. Manag., 2017
Proceedings of the International Conference on Networking and Network Applications, 2017
Proceedings of the 2017 IEEE International Conference on Acoustics, 2017
2016
ACM Trans. Embed. Comput. Syst., 2016
Towards energy efcient cloud: an optimized ant colony model for virtual machine placement.
J. Commun. Inf. Networks, 2016
J. Commun. Inf. Networks, 2016
Efficiency optimisation signature scheme for time-critical multicast data origin authentication.
Int. J. Grid Util. Comput., 2016
A limited-trust capacity model for mitigating threats of internal malicious services in cloud computing.
Clust. Comput., 2016
Proceedings of the International Conference on Networking and Network Applications, 2016
A New Interference Aware Routing Metric for Multi-radio Multi-channel Wireless Mesh Networks.
Proceedings of the International Conference on Networking and Network Applications, 2016
Exploring Configurations for Business Value from Event-Driven Architecture in Healthcare.
Proceedings of the International Conference on Information Systems, 2016
Proceedings of the 2016 IEEE International Conference on Acoustics, 2016
2015
EarlyBird: Mobile Prefetching of Social Network Feeds via Content Preference Mining and Usage Pattern Analysis.
Proceedings of the 16th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2015
Proceedings of the 48th Hawaii International Conference on System Sciences, 2015
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2015
Business Intelligence and Analytics Education: Hermeneutic Literature Review and Future Directions in IS Education.
Proceedings of the 21st Americas Conference on Information Systems, 2015
Proceedings of the 21st Americas Conference on Information Systems, 2015
The Effect of Social Factors on User-Generated Content Productivity: Evidence from Flickr.com.
Proceedings of the 21st Americas Conference on Information Systems, 2015
Proceedings of the 21st Americas Conference on Information Systems, 2015
Job Applicants' Information Privacy-Protective Response: Exploring the Roles of Technology Readiness and Trust.
Proceedings of the 21st Americas Conference on Information Systems, 2015
2014
Deploying lean in healthcare: Evaluating information technology effectiveness in U.S. hospital pharmacies.
Int. J. Inf. Manag., 2014
EAI Endorsed Trans. Wirel. Spectr., 2014
From high-availability to collapse: quantitative analysis of "Cloud-Droplet-Freezing" attack threats to virtual machine migration in cloud computing.
Clust. Comput., 2014
Developing a Big Data-Enabled Transformation Model in Healthcare: A Practice Based View.
Proceedings of the International Conference on Information Systems, 2014
Co-Creation in Branding through Social Commerce: The Role of Social Support, Relationship Quality and Privacy Concerns.
Proceedings of the 20th Americas Conference on Information Systems, 2014
2013
ACM Trans. Multim. Comput. Commun. Appl., 2013
Proceedings of the 11th Annual International Conference on Mobile Systems, 2013
Proceedings of the 11th Annual International Conference on Mobile Systems, 2013
Content Based Spam Text Classification: An Empirical Comparison between English and Chinese.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Game Optimization for Time-Critical Multicast Data Origin Authentication: Trade Off between Security and Efficiency.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Highly Flexible and Extensible Storage Scheme for Virtualization Platforms under Cloud Computing.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Proceedings of the 2013 IEEE International Conference on Multimedia and Expo, 2013
Leveraging Event-driven IT Architecture Capability for Competitive Advantage in Healthcare Industry: a Mediated Model.
Proceedings of the International Conference on Information Systems, 2013
2012
A Nonparametric Bayesian Approach for Opportunistic Data Transfer in Cellular Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2012
Proceedings of the Network and Operating System Support for Digital Audio and Video Workshop, 2012
A New Optical Fiber Birefringence Measurement Method Based on Polarization Detection and Wavelength Scanning.
Proceedings of the Third International Conference on Digital Manufacturing & Automation, 2012
Proceedings of the 2012 IEEE Global Communications Conference, 2012
2011
Proceedings of the Second Annual ACM SIGMM Conference on Multimedia Systems, 2011
Toward region- and action-aware second life clients: A parameterized second life traffic model.
Proceedings of the 2011 IEEE International Conference on Multimedia and Expo, 2011
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011
2009
Proceedings of the 10th Conference on Information Technology Education, 2009
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009
Tree-based Burst Aggregation in Optical Burst Switching Networks.
Proceedings of the 22nd International Conference on Parallel and Distributed Computing and Communication Systems, 2009