Yong Ding

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2025
Forecasting time to risk based on multi-party data: An explainable privacy-preserving decentralized survival analysis method.
Inf. Process. Manag., 2025

Distributed continuous-time time-varying optimization for networked Lagrangian systems with quadratic cost functions.
Autom., 2025

2024
RGBTSDF: An Efficient and Simple Method for Color Truncated Signed Distance Field (TSDF) Volume Fusion Based on RGB-D Images.
Remote. Sens., September, 2024

CST Framework: A Robust and Portable Finger Motion Tracking Framework.
IEEE Trans. Hum. Mach. Syst., June, 2024

Time-Varying Channel Estimation Based on Distributed Compressed Sensing for OFDM Systems.
Sensors, June, 2024

Predicting financial distress using current reports: A novel deep learning method based on user-response-guided attention.
Decis. Support Syst., 2024

Privacy-preserving multi-party logistic regression in cloud computing.
Comput. Stand. Interfaces, 2024

Distilling High Diagnostic Value Patches for Whole Slide Image Classification Using Attention Mechanism.
CoRR, 2024

Establishing Truly Causal Relationship Between Whole Slide Image Predictions and Diagnostic Evidence Subregions in Deep Learning.
CoRR, 2024

A Novel Method Based on Particle Swarm Optimization Support Vector Neural Network for Transformer Fault Diagnosis.
Proceedings of the Advances in Neural Networks - ISNN 2024, 2024

Research on Fault Diagnosis of Surge Arresters Based on Support Vector Recurrent Neural Network.
Proceedings of the Advances in Neural Networks - ISNN 2024, 2024

Lightweight Decentralized Federated Learning Framework for Heterogeneous Edge Systems.
Proceedings of the IEEE International Conference on Web Services, 2024

Gradient Leakage Defense in Federated Learning Using Gradient Perturbation-based Dynamic Clipping.
Proceedings of the IEEE International Conference on Web Services, 2024

MTDM-MS: A Malicious Traffic Detection Model Based on Multi-Category Signals.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2024

MLMTD: A Multi-Layer Malicious Traffic Detection Model Based on Multi-Branch Octave Convolution and Attention Mechanism.
Proceedings of the IEEE International Conference on Acoustics, 2024

From Fingerprint to Footprint: Characterizing the Dependencies in Encrypted DNS Infrastructures.
Proceedings of the Computer Security - ESORICS 2024, 2024

A new SM2-based ring signature scheme with revocability and anonymity.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

Linear Retention Convolutional Network for Few-Shot Network Threat Detection.
Proceedings of the 19th Asia Joint Conference on Information Security, 2024

2023
MP-DPS: adaptive distributed training for deep learning based on node merging and path prediction.
CCF Trans. High Perform. Comput., December, 2023

An artificial immunity based intrusion detection system for unknown cyberattacks.
Appl. Soft Comput., November, 2023

A Unified NOMA Framework in Beam-Hopping Satellite Communication Systems.
IEEE Trans. Aerosp. Electron. Syst., October, 2023

Unmanned aerial vehicle visual scene understanding based on multitask learning network.
J. Electronic Imaging, 2023

Benchmarking state-of-the-art imbalanced data learning approaches for credit scoring.
Expert Syst. Appl., 2023

Robust and Accurate Multi-UAV Cooperative Semantic SLAM Leveraging Lightweight YOLO.
Proceedings of the 7th International Symposium on Computer Science and Intelligent Control, 2023

TextObfuscator: Making Pre-trained Language Model a Privacy Protector via Obfuscating Word Representations.
Proceedings of the Findings of the Association for Computational Linguistics: ACL 2023, 2023

2022
Study on the Practical Application of Surface Acoustic Wave Yarn Tension Sensor.
IEEE Trans. Ind. Electron., 2022

Sensitivity Optimization of Surface Acoustic Wave Yarn Tension Sensor Based on Elastic Beam Theory.
Sensors, 2022

TextFusion: Privacy-Preserving Pre-trained Model Inference via Token Fusion.
Proceedings of the 2022 Conference on Empirical Methods in Natural Language Processing, 2022

A Longitudinal Measurement and Analysis of Pink, a Hybrid P2P IoT Botnet.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2022

Message from the Program Co-Chairs: AsiaJCIS 2022.
Proceedings of the 17th Asia Joint Conference on Information Security, 2022

2021
Analysis of Glomerular Filtration Rate in Ischemic Cerebrovascular Diseases under the Magnetic Resonance Angiography Image Segmentation Algorithm.
Sci. Program., 2021

Acquisition and Analysis of Brainwave Signals in Autonomous Systems of Disabled Persons Under the Background of Cloud Technology and Internet of Things.
J. Medical Imaging Health Informatics, 2021

Multiset Canonical Correlations Analysis of Bidimensional Intrinsic Mode Functions for Automatic Target Recognition of SAR Images.
Comput. Intell. Neurosci., 2021

Attribute-Based Searchable Encryption Scheme Supporting Efficient Range Search in Cloud Computing.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021

2020
Mining Semantic Soft Factors for Credit Risk Evaluation in Peer-to-Peer Lending.
J. Manag. Inf. Syst., 2020

The Effects of Interactive Digital Exhibits (IDEs) on Children's Experience in Science Museums.
Proceedings of the Culture and Computing, 2020

Anomaly Detection for Consortium Blockchains Based on Machine Learning Classification Algorithm.
Proceedings of the Computational Data and Social Networks - 9th International Conference, 2020

Stereoscopic Image Quality Assessment
60, Springer, ISBN: 978-981-15-7763-5, 2020

2019
Multi-Objective Power Management for EV Fleet With MMC-Based Integration Into Smart Grid.
IEEE Trans. Smart Grid, 2019

Integrating geographical and temporal influences into location recommendation: a method based on check-ins.
Inf. Technol. Manag., 2019

2018
一种基于Hadoop的关联规则挖掘算法 (Association Rule Mining Algorithm Based on Hadoop).
计算机科学, 2018

A Novel behavioral scoring model for estimating probability of default over time in peer-to-peer lending.
Electron. Commer. Res. Appl., 2018

Loan default prediction by combining soft information extracted from descriptive text in online peer-to-peer lending.
Ann. Oper. Res., 2018

Pedestrian Re-identification Based on Image Enhancement and Over-fitting Solution Strategies.
Proceedings of the 5th International Conference on Systems and Informatics, 2018

2017
Capturing helpful reviews from social media for product quality improvement: a multi-class classification approach.
Int. J. Prod. Res., 2017

A Multi-Candidate Electronic Voting Scheme with Unlimited Participants.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

2016
基于Android平台的图书阅读推荐系统 (Books Recommended Reading System Based on Android).
计算机科学, 2016

遗传算法在公交调度中的应用 (Application of Genetic Algorithm in Public Transit Dispatchers).
计算机科学, 2016

A Joint Random Secret Sharing Scheme with Public Verifiability.
Int. J. Netw. Secur., 2016

2015
Identifying effective influencers based on trust for electronic word-of-mouth marketing: A domain-aware approach.
Inf. Sci., 2015

2014
Energy-Efficient Locomotive Operation for Chinese Mainline Railways by Fuzzy Predictive Control.
IEEE Trans. Intell. Transp. Syst., 2014

Analyzing market performance via social media: a case study of a banking industry crisis.
Sci. China Inf. Sci., 2014

2011
Adaptive color image watermarking based on the just noticeable distortion model in balanced multiwavelet domain.
J. Electronic Imaging, 2011

Comprehensive Evaluation System and Selection Method of Tax Software.
Comput. Inf. Sci., 2011

On sampling signal strength for localization using a directional antenna.
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011

2010
Solving the minimum bisection problem using a biologically inspired computational model.
Theor. Comput. Sci., 2010

Locomotive Driving Simulator for Multi-objective Train Operation and Movement.
Proceedings of the Information and Automation - International Symposium, 2010

An Cross Layer Algorithm Based on Power Control for Wireless Sensor Networks.
Proceedings of the Information Computing and Applications - International Conference, 2010

2009
Simulation Algorithm for Energy-Efficient Train Control under Moving Block System.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

2008
Numerical analysis of ultrasonic wire bonding: Part 2. Effects of bonding parameters on temperature rise.
Microelectron. Reliab., 2008

Birkhoff Type 2-Periodic Trigonometric Interpolation in the Family of Trigonometric Polynomial.
Proceedings of the PACIIA 2008, 2008

Integration of Signature Encryption and Key Exchange.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

2007
Evolvable Face Recognition Based on Evolutionary Algorithm and Gabor Wavelet Networks.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

Research on the Evaluation of Enterprises Knowledge Chain Performance Based on D-S Theory.
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007

PLLSim - An Ultra Fast Bang-Bang Phase Locked Loop Simulation Tool.
Proceedings of the 12th Conference on Asia South Pacific Design Automation, 2007

2006
Effects of bonding force on contact pressure and frictional energy in wire bonding.
Microelectron. Reliab., 2006

Joint Sparse Form of Window Three for Koblitz Curve.
Int. J. Netw. Secur., 2006

2005
A two-weight estimate for a class of fractional integral operators with rough kernel.
Int. J. Math. Math. Sci., 2005

A w-NNAF method for the efficient computation of scalar multiplication in elliptic curve cryptography.
Appl. Math. Comput., 2005

2004
Research on automated rollbackability of intrusion response.
J. Comput. Secur., 2004

2003
Intrusion detection system based on fuzzy default logic.
Proceedings of the 12th IEEE International Conference on Fuzzy Systems, 2003


  Loading...