Yixiang Wang

Orcid: 0000-0002-2393-4127

According to our database1, Yixiang Wang authored at least 46 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Transformable Inspection Robot Design and Implementation for Complex Pipeline Environment.
IEEE Robotics Autom. Lett., June, 2024

Vertex-degree function index for concave functions of graphs with a given clique number.
J. Appl. Math. Comput., June, 2024

BRT oil price combination forecasting based on the dispersion degree of triangular fuzzy numbers.
J. Intell. Fuzzy Syst., January, 2024

PASS: A Parameter Audit-Based Secure and Fair Federated Learning Scheme Against Free-Rider Attack.
IEEE Internet Things J., January, 2024

A combination prediction model based on Theil coefficient and induced continuous aggregation operator for the prediction of Shanghai composite index.
Expert Syst. Appl., 2024

Individual tree detection and segmentation from unmanned aerial vehicle-LiDAR data based on a trunk point distribution indicator.
Comput. Electron. Agric., 2024

TIFE: Tree-Structured Interactive Feature Enhancement for Multivariate Time Series Forecasting.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2024

2023
Continuous triangular fuzzy generalized OWA operator and its application to combined prediction.
Soft Comput., December, 2023

Improving session-based recommendation with contrastive learning.
User Model. User Adapt. Interact., March, 2023

2022
AB-FGSM: AdaBelief optimizer and FGSM-based approach to generate adversarial examples.
J. Inf. Secur. Appl., 2022

DI-AA: An interpretable white-box attack for fooling deep neural networks.
Inf. Sci., 2022

IWA: Integrated gradient-based white-box attacks for fooling deep neural networks.
Int. J. Intell. Syst., 2022

Automatic Reward Design via Learning Motivation-Consistent Intrinsic Rewards.
CoRR, 2022

Assessing Anonymous and Selfish Free-rider Attacks in Federated Learning.
Proceedings of the IEEE Symposium on Computers and Communications, 2022

2021
LSGAN-AT: enhancing malware detector robustness against adversarial examples.
Cybersecur., 2021

Foster Strengths and Circumvent Weaknesses: a Speech Enhancement Framework with Two-branch Collaborative Learning.
CoRR, 2021

Generalizing Adversarial Examples by AdaBelief Optimizer.
CoRR, 2021

Selective Kernel Network with Intermediate Supervision Loss for Monaural Speech Enhancement.
Proceedings of the 21st International Conference on Communication Technology, 2021

Mal-LSGAN: An Effective Adversarial Malware Example Generation Model.
Proceedings of the IEEE Global Communications Conference, 2021

2020
Exponentially incremental dissipativity for nonlinear stochastic switched systems.
Int. J. Control, 2020

On the combination of data augmentation method and gated convolution model for building effective and robust intrusion detection.
Cybersecur., 2020

A C-IFGSM Based Adversarial Approach for Deep Learning Based Intrusion Detection.
Proceedings of the Verification and Evaluation of Computer and Communication Systems, 2020

Policy Adaptive Multi-agent Deep Deterministic Policy Gradient.
Proceedings of the PRIMA 2020: Principles and Practice of Multi-Agent Systems, 2020

Learning to Utilize Shaping Rewards: A New Approach of Reward Shaping.
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020

Control and Management of Optical Inter-Satellite Network based on CCSDS Protocol (Invited).
Proceedings of the European Conference on Optical Communications, 2020

2019
Finite-region boundedness and stabilization for 2D continuous-discrete systems in Roesser model.
IMA J. Math. Control. Inf., 2019

Multi-Agent Deep Reinforcement Learning with Adaptive Policies.
CoRR, 2019

Assessing Optimizer Impact on DNN Model Sensitivity to Adversarial Examples.
IEEE Access, 2019

Perceptual Vibration Hashing by Sub-Band Coding: An Edge Computing Method for Condition Monitoring.
IEEE Access, 2019

Assessing transferability of adversarial examples against malware detection classifiers.
Proceedings of the 16th ACM International Conference on Computing Frontiers, 2019

2018
Incremental <i>H</i><sub>∞</sub> performance for a class of stochastic switched nonlinear systems.
J. Frankl. Inst., 2018

Incremental <i>H</i><sub>∞</sub> control for switched nonlinear systems.
Appl. Math. Comput., 2018

A Novel Electrode Design in DETF with Reducing Multimode Effect.
Proceedings of the 13th IEEE Annual International Conference on Nano/Micro Engineered and Molecular Systems, 2018

2017
Impairment- and Splitting-Aware Cloud-Ready Multicast Provisioning in Elastic Optical Networks.
IEEE/ACM Trans. Netw., 2017

Exponentially incremental (Q, S, R)-dissipativity and incremental stability for switched time-varying nonlinear systems.
Int. J. Syst. Sci., 2017

2016
Novel Location-Constrained Virtual Network Embedding (LC-VNE) Algorithms Towards Integrated Node and Link Mapping.
IEEE/ACM Trans. Netw., 2016

Adaptive shock filter for image super-resolution and enhancement.
J. Vis. Commun. Image Represent., 2016

A MEMS piezoelectric in-plane resonant accelerometer with two-stage micro-leverage mechanism.
Proceedings of the 11th IEEE Annual International Conference on Nano/Micro Engineered and Molecular Systems, 2016

Resonant frequency tunable silicon fishbone-shaped MEMS double ended tuning fork.
Proceedings of the 11th IEEE Annual International Conference on Nano/Micro Engineered and Molecular Systems, 2016

2015
Availability-Aware Survivable Virtual Network Embedding in Optical Datacenter Networks.
JOCN, 2015

2012
Systematic construction, verification and implementation methodology for LDPC codes.
EURASIP J. Wirel. Commun. Netw., 2012

Perfusion study on Modic changes of spine based on DCE-MRI.
Proceedings of 2012 IEEE-EMBS International Conference on Biomedical and Health Informatics, 2012

2011
Quasi-cyclic low-density parity-check convolutional code.
Proceedings of the IEEE 7th International Conference on Wireless and Mobile Computing, 2011

Systematic Construction and Verification Methodology for LDPC Codes.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2011

2008
Design of a new wind speed measuring installation.
Proceedings of the 10th International Conference on Control, 2008

2005
Planation surface extraction and quantitative analysis based on high-resolution digital elevation models.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2005


  Loading...