Yiqiao Cai

Orcid: 0000-0003-4295-5633

According to our database1, Yiqiao Cai authored at least 93 papers between 2009 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Multi-Task Multi-Objective Evolutionary Search Based on Deep Reinforcement Learning for Multi-Objective Vehicle Routing Problems with Time Windows.
Symmetry, August, 2024

2022
Towards blind detection of steganography in low-bit-rate speech streams.
Int. J. Intell. Syst., December, 2022

A hybrid evolutionary multitask algorithm for the multiobjective vehicle routing problem with time windows.
Inf. Sci., 2022

Multiobjective memetic algorithm based on adaptive local search chains for vehicle routing problem with time windows.
Evol. Intell., 2022

An enhanced utilization mechanism of population information for Differential evolution.
Evol. Intell., 2022

2021
Evolutionary multi-task optimization with hybrid knowledge transfer strategy.
Inf. Sci., 2021

Self-regulated differential evolution for real parameter optimization.
Appl. Intell., 2021

2020
Self-organizing neighborhood-based differential evolution for global optimization.
Swarm Evol. Comput., 2020

A Decomposition-Based Local Search for Large-Scale Many-Objective Vehicle Routing Problems With Simultaneous Delivery and Pickup and Time Windows.
IEEE Syst. J., 2020

StegoNote: Steganography in Guitar Music Using Note Modulation.
Int. J. Netw. Secur., 2020

Data collection from WSNs to the cloud based on mobile Fog elements.
Future Gener. Comput. Syst., 2020

Detecting Steganography in Inactive Voice-Over-IP Frames Based on Statistic Characteristics of Fundamental Frequency.
IEEE Access, 2020

Enhancing Differential Evolution on Continuous Optimization Problems by Detecting Promising Leaders.
IEEE Access, 2020

2019
Public audit for operation behavior logs with error locating in cloud storage.
Soft Comput., 2019

Three Kinds of Network Security Situation Awareness Model Based on Big Data.
Int. J. Netw. Secur., 2019

A Secure and Reliable Data Transmission Scheme in Wireless Body Area Network.
Int. J. Netw. Secur., 2019

A collusion-resistant public auditing scheme for shared cloud data.
Int. J. Inf. Technol. Manag., 2019

Differential evolution with dynamic neighbourhood learning strategy-based mutation operators.
Int. J. Comput. Sci. Eng., 2019

Ensemble of multi-objective metaheuristic algorithms for multi-objective unconstrained binary quadratic programming problem.
Appl. Soft Comput., 2019

Differential Evolution With Adaptive Guiding Mechanism Based on Heuristic Rules.
IEEE Access, 2019

A Neighborhood-Assisted Framework for Differential Evolution.
IEEE Access, 2019

Multitasking differential evolution with difference vector sharing mechanism.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2019

Experimental Analysis of Selective Imitation for Multifactorial Differential Evolution.
Proceedings of the Bio-inspired Computing: Theories and Applications, 2019

2018
Steganalysis of Inactive Voice-Over-IP Frames Based on Poker Test.
Symmetry, 2018

A hierarchical representation for human action recognition in realistic scenes.
Multim. Tools Appl., 2018

StegTab: Steganography in Guitar Tablatures.
J. Inf. Hiding Multim. Signal Process., 2018

Differential evolution with individual-dependent topology adaptation.
Inf. Sci., 2018

Social learning differential evolution.
Inf. Sci., 2018

Intelligent selection of parents for mutation in differential evolution.
Int. J. Comput. Sci. Eng., 2018

Energy-efficient relay tracking with multiple mobile camera sensors.
Comput. Networks, 2018

Enhanced Differential Evolution with Self-organizing Map for Numerical Optimization.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

Differential Evolution with Proximity-Based Replacement Strategy and Elite Archive Mechanism for Global Optimization.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

Improving the Security of a Public Auditing Scheme for Multiple-Replica Dynamic Data.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

2017
Distributed steganalysis of compressed speech.
Soft Comput., 2017

Enabling public auditability for operation behaviors in cloud storage.
Soft Comput., 2017

Neighborhood guided differential evolution.
Soft Comput., 2017

Steganalysis of adaptive multi-rate speech using statistical characteristics of pulse pairs.
Signal Process., 2017

Propagation Modeling and Defending of a Mobile Sensor Worm in Wireless Sensor and Actuator Networks.
Sensors, 2017

Detecting Steganography of Adaptive Multirate Speech with Unknown Embedding Rate.
Mob. Inf. Syst., 2017

DIntrusion Detection in WSN with an Improved NSA Based on the DE-CMOP.
KSII Trans. Internet Inf. Syst., 2017

Reliable wireless connections for fast-moving rail users based on a chained fog structure.
Inf. Sci., 2017

Fog-Based Evaluation Approach for Trustworthy Communication in Sensor-Cloud System.
IEEE Commun. Lett., 2017

Interoperable localization for mobile group users.
Comput. Commun., 2017

A novel improved particle swarm optimization algorithm based on individual difference evolution.
Appl. Soft Comput., 2017

Neighborhood-adaptive differential evolution for global numerical optimization.
Appl. Soft Comput., 2017

The Chaotic Video Surveillance in Mobile Camera Sensor Networks: Improving the Efficiency and Security.
Ad Hoc Sens. Wirel. Networks, 2017

Improving charging capacity for wireless sensor networks by deploying one mobile vehicle with multiple removable chargers.
Ad Hoc Networks, 2017

Trajectory Privacy Preservation Based on a Fog Structure for Cloud Location Services.
IEEE Access, 2017

Improved Differential Evolution With a Modified Orthogonal Learning Strategy.
IEEE Access, 2017

A Novel Neighborhood-Dependent Mutation Operator for Differential Evolution.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

Adaptive Differential Evolution with Landscape Modality Detection for Global Optimization.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

Secure Logging and Public Audit for Operation Behavior in Cloud Storage.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

Secure Public Audit for Operation Behavior Logs in Shared Cloud Storage.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

Rumor restraining based on propagation prediction with limited observations in large-scale social networks.
Proceedings of the Australasian Computer Science Week Multiconference, 2017

2016
Following Targets for Mobile Tracking in Wireless Sensor Networks.
ACM Trans. Sens. Networks, 2016

Cellular direction information based differential evolution for numerical optimization: an empirical study.
Soft Comput., 2016

Adaptive direction information in differential evolution for numerical optimization.
Soft Comput., 2016

Steganalysis of analysis-by-synthesis speech exploiting pulse-position distribution characteristics.
Secur. Commun. Networks, 2016

两层无线传感网中节能的安全范围查询方法 (Privacy and Integrity Protection Range Query Processing in Two-tiered Wireless Sensor Networks).
计算机科学, 2016

一种可检测数据完整性的安全数据聚合协议 (Integrity-checking Security Data Aggregation Protocol).
计算机科学, 2016

Design and implementation of wireless monitoring network for temperature-humidity measurement.
J. Ambient Intell. Humaniz. Comput., 2016

Extracting Target Detection Knowledge Based on Spatiotemporal Information in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2016

A Novel Connection Correlation Scheme Based on Threshold Secret Sharing.
IEEE Commun. Lett., 2016

Improving differential evolution with a new selection method of parents for mutation.
Frontiers Comput. Sci., 2016

Differential evolution with guiding archive for global numerical optimization.
Appl. Soft Comput., 2016

Improving the Localization Probability and Decreasing Communication Cost for Mobile Users.
Proceedings of the Security, Privacy and Anonymity in Computation, Communication and Storage, 2016

A Novel Botnet Detection Method Based on Preprocessing Data Packet by Graph Structure Clustering.
Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2016

Operational-Behavior Auditing in Cloud Storage.
Proceedings of the Cloud Computing, Security, Privacy in New Computing Environments, 2016

2015
Multiobjective evolutionary algorithm for frequency assignment problem in satellite communications.
Soft Comput., 2015

Optimal matrix embedding for Voice-over-IP steganography.
Signal Process., 2015

Differential evolution with distributed direction information based mutation operators: an optimization technique for big data.
J. Ambient Intell. Humaniz. Comput., 2015

A method for Chinese text classification based on apparent semantics and latent aspects.
J. Ambient Intell. Humaniz. Comput., 2015

Differential evolution with hybrid linkage crossover.
Inf. Sci., 2015

A High-Capacity Covering Code for Voice-Over-IP Steganography.
Int. J. Inf. Technol. Web Eng., 2015

Improved adaptive partial-matching steganography for Voice over IP.
Comput. Commun., 2015

Maximizing real-time streaming services based on a multi-servers networking framework.
Comput. Networks, 2015

Adaptive differential evolution with directional strategy and cloud model.
Appl. Intell., 2015

Detecting Targets Based on a Realistic Detection and Decision Model in Wireless Sensor Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

Steganalysis of Low Bit-Rate Speech Based on Statistic Characteristics of Pulse Positions.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

An Efficient VoIP Steganography Based on Random Binary Matrix.
Proceedings of the 10th International Conference on P2P, 2015

2014
Differential Evolution Enhanced With Multiobjective Sorting-Based Mutation Operators.
IEEE Trans. Cybern., 2014

Enhancing the search ability of differential evolution through competent leader.
Int. J. High Perform. Syst. Archit., 2014

Continuous tracking for mobile targets with mobility nodes in WSNs.
Proceedings of the International Conference on Smart Computing, 2014

Enhanced differential evolution with adaptive direction information.
Proceedings of the IEEE Congress on Evolutionary Computation, 2014

Improving Differential Evolution with Ring Topology-Based Mutation Operators.
Proceedings of the 2014 Ninth International Conference on P2P, 2014

2013
Differential Evolution With Neighborhood and Direction Information for Numerical Optimization.
IEEE Trans. Cybern., 2013

Adaptive Differential Evolution with Competent Leaders.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

2012
Learnable tabu search guided by estimation of distribution for maximum diversity problems.
Soft Comput., 2012

Learning-enhanced differential evolution for numerical optimization.
Soft Comput., 2012

2011
Multi-start stochastic competitive Hopfield neural network for frequency assignment problem in satellite communications.
Expert Syst. Appl., 2011

Memetic clonal selection algorithm with EDA vaccination for unconstrained binary quadratic programming problems.
Expert Syst. Appl., 2011

Discrete particle swarm optimization based on estimation of distribution for terminal assignment problems.
Comput. Ind. Eng., 2011

2009
Multi-start Stochastic Competitive Hopfield Neural Network for p-Median Problem.
Proceedings of the Advances in Neural Networks, 2009


  Loading...