Yijun Mao

Orcid: 0000-0001-8123-2564

According to our database1, Yijun Mao authored at least 26 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
PmmNDD: Predicting the Pathogenicity of Missense Mutations in Neurodegenerative Diseases via Ensemble Learning.
Proceedings of the Bioinformatics Research and Applications - 20th International Symposium, 2024

Towards Optimal Lane-changing Coordination of CAVs in Multi-lane Mixed Traffic Scenarios.
Proceedings of the IEEE International Conference on Robotics and Automation, 2024

2023
Research on the Laws of Multimodal Perception and Cognition from a Cross-cultural Perspective - Taking Overseas Chinese Gardens as an Example.
CoRR, 2023

UCLF: An Uncertainty-Aware Cooperative Lane-Changing Framework for Connected Autonomous Vehicles in Mixed Traffic.
Proceedings of the IEEE Intelligent Vehicles Symposium, 2023

2022
An improved recommendation based on graph convolutional network.
J. Intell. Inf. Syst., 2022

2021
Adaptive Dropout Method Based on Biological Principles.
IEEE Trans. Neural Networks Learn. Syst., 2021

A defense method based on attention mechanism against traffic sign adversarial samples.
Inf. Fusion, 2021

Multi-factor Data Mining Analysis of Stock Index Volatility.
Proceedings of the ICAIIS 2021: 2021 2nd International Conference on Artificial Intelligence and Information Systems, Chongqing, China, May 28, 2021

Infectious Disease Prediction and Analysis Based on Parametric-nonparametric Hybrid Model.
Proceedings of the ICAIIS 2021: 2021 2nd International Conference on Artificial Intelligence and Information Systems, Chongqing, China, May 28, 2021

2020
Heuristic Monte Carlo Algorithm for Unmanned Ground Vehicles Realtime Localization and Mapping.
IEEE Trans. Veh. Technol., 2020

On the robustness of JPEG post-compression to resampling factor estimation.
Signal Process., 2020

Visual Semantic SLAM with Landmarks for Large-Scale Outdoor Environment.
CoRR, 2020

High Accuracy Thyroid Tumor Image Recognition Based on Hybrid Multiple Models Optimization.
IEEE Access, 2020

2019
A New Encrypted Data Switching Protocol: Bridging IBE and ABE Without Loss of Data Confidentiality.
IEEE Access, 2019

TruRec: An Improved Trust-Based Recommendation in Cross-Domain.
Proceedings of the Advances in Natural Computation, Fuzzy Systems and Knowledge Discovery - Proceedings of the 15th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD 2019), Kunming, China, July 20-22, 2019, 2019

Regularized Adversarial Training (RAT) for Robust Cellular Electron Cryo Tomograms Classification.
Proceedings of the 2019 IEEE International Conference on Bioinformatics and Biomedicine, 2019

2018
A New Varying-Parameter Recurrent Neural-Network for Online Solution of Time-Varying Sylvester Equation.
IEEE Trans. Cybern., 2018

Double JPEG compression detection based on block statistics.
Multim. Tools Appl., 2018

Optimization of Hypergraph Based News Recommendation by Binary Decision Tree.
Proceedings of the Intelligence Science and Big Data Engineering, 2018

2017
Anonymous identity-based broadcast encryption technology for smart city information system.
Pers. Ubiquitous Comput., 2017

Research and Analysis about the Length of Vertex-Degree Sequence of Complex Networks with Poisson Distribution.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

2016
Efficient Attribute-Based Encryption Schemes for Secure Communications in Cyber Defense.
Intell. Autom. Soft Comput., 2016

Fully secure fuzzy identity-based encryption for secure IoT communications.
Comput. Stand. Interfaces, 2016

Generic Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2014
Efficient hierarchical identity-based encryption for Mobile Ad hoc Networks.
Mob. Inf. Syst., 2014

2013
Constant Size Hierarchical Identity-Based Encryption Tightly Secure in the Full Model without Random Oracles.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013


  Loading...