Yong Gan
Orcid: 0000-0003-3231-5528
According to our database1,
Yong Gan
authored at least 70 papers
between 2006 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
J. Intell. Fuzzy Syst., October, 2023
Handwritten CAPTCHA recognizer: a text CAPTCHA breaking method based on style transfer network.
Multim. Tools Appl., April, 2023
2022
Verifier-local revocation group signatures with backward unlinkability from lattices.
Frontiers Inf. Technol. Electron. Eng., 2022
Inf., 2022
Chinese Named Entity Recognition Based on BERT and Lightweight Feature Extraction Model.
Inf., 2022
2021
A Novel Privacy-Preserving Authentication Protocol Using Bilinear Pairings for the VANET Environment.
Wirel. Commun. Mob. Comput., 2021
A Lightweight and Secure Anonymous User Authentication Protocol for Wireless Body Area Networks.
Secur. Commun. Networks, 2021
Secur. Commun. Networks, 2021
An asymmetric group key agreement protocol based on attribute threshold for Internet of Things.
Trans. Emerg. Telecommun. Technol., 2021
2020
IEEE Commun. Lett., 2020
Comput. Electr. Eng., 2020
Temperature Estimation of Lithium-Ion Battery Based on an Improved Magnetic Nanoparticle Thermometer.
IEEE Access, 2020
Proceedings of the CSAE 2020: The 4th International Conference on Computer Science and Application Engineering, 2020
2019
ACM Trans. Intell. Syst. Technol., 2019
Access Control Based on Ciphertext Attribute Authentication and Threshold Policy for the Internet of Things.
Sensors, 2019
计算机科学, 2019
带TTP的多所有者内部权重变化所有权转换协议 (Ownership Transfer Protocol for Multi-owners Internal Weight Changes with Trusted Third Party).
计算机科学, 2019
Efficient multiview video plus depth coding for 3D-HEVC based on complexity classification of the treeblock.
J. Real Time Image Process., 2019
Efficient fuzzy identity-based signature from lattices for identities in a small (or large) universe.
J. Inf. Secur. Appl., 2019
An authenticated hierarchical asymmetric group key agreement protocol based on identity.
Int. J. Embed. Syst., 2019
IP Geolocation based on identification routers and local delay distribution similarity.
Concurr. Comput. Pract. Exp., 2019
A localization and tracking scheme for target gangs based on big data of Wi-Fi locations.
Clust. Comput., 2019
Group Key Agreement Protocol Based on Privacy Protection and Attribute Authentication.
IEEE Access, 2019
Proceedings of the Security and Privacy in Social Networks and Big Data, 2019
Proceedings of the 2019 IEEE International Conference on Robotics and Biomimetics, 2019
2018
Wirel. Pers. Commun., 2018
J. Netw. Comput. Appl., 2018
Geolocating a WeChat user based on the relation between reported and actual distance.
Int. J. Distributed Sens. Networks, 2018
A Dynamic and Cross-Domain Authentication Asymmetric Group Key Agreement in Telemedicine Application.
IEEE Access, 2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
Proceedings of the Frontiers in Cyber Security - First International Conference, 2018
Proceedings of the 17th IEEE/ACIS International Conference on Computer and Information Science, 2018
2017
Signal Image Video Process., 2017
Multidimens. Syst. Signal Process., 2017
Fast depth map mode decision based on depth-texture correlation and edge classification for 3D-HEVC.
J. Vis. Commun. Image Represent., 2017
MultiP-Apo: A Multilabel Predictor for Identifying Subcellular Locations of Apoptosis Proteins.
Comput. Intell. Neurosci., 2017
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017
A WeChat User Geolocating Algorithm Based on the Relation Between Reported and Actual Distance.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017
2016
Multidimens. Syst. Signal Process., 2016
KSII Trans. Internet Inf. Syst., 2016
An efficient depth map filtering based on spatial and texture features for 3D video coding.
Neurocomputing, 2016
2015
Neurocomputing, 2015
Neurocomputing, 2015
EURASIP J. Image Video Process., 2015
Fast mode decision algorithm for 3D-HEVC encoding optimization based on depth information.
Digit. Signal Process., 2015
Proceedings of the Intelligent Computing Theories and Methodologies, 2015
Implementation of Plant Leaf Recognition System on ARM Tablet Based on Local Ternary Pattern.
Proceedings of the Intelligent Computing Theories and Methodologies, 2015
Proceedings of the Intelligent Computing Theories and Methodologies, 2015
Proceedings of the Intelligent Computing Theories and Methodologies, 2015
2014
Early SKIP mode decision for three-dimensional high efficiency video coding using spatial and interview correlations.
J. Electronic Imaging, 2014
IEEE Commun. Lett., 2014
Proceedings of the 2014 International Joint Conference on Neural Networks, 2014
Proceedings of the Intelligent Computing Theory - 10th International Conference, 2014
Proceedings of the Intelligent Computing Methodologies - 10th International Conference, 2014
Proceedings of the Intelligent Computing Theory - 10th International Conference, 2014
Proceedings of the Intelligent Computing in Bioinformatics - 10th International Conference, 2014
2013
IEEE Trans. Image Process., 2013
2012
A hybrid method for integrated atomistic-continuum simulation of ultrashort-pulsed laser interaction with semiconductors.
Comput. Phys. Commun., 2012
2011
A Novel PSO Algorithm Based on Local Chaos & Simplex Search Strategy and its Application.
J. Softw., 2011
2010
Motion Controller for Autonomous Underwater Vehicle Based on Parallel Neural Network.
J. Digit. Content Technol. its Appl., 2010
An Object Region Extraction Approach Based on Interest Pixel Detection and Inner Filling Strategy.
Proceedings of the 2010 International Conference on Machine Vision and Human-machine Interface, 2010
2009
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2009
Proceedings of the 2009 International Conference on Digital Image Processing, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
2006
Proceedings of the 2006 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2006