Yuan Niu

Orcid: 0000-0002-9174-3867

According to our database1, Yuan Niu authored at least 21 papers between 2006 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Multi-UAV Cooperative Trajectory Planning Based on Many-Objective Evolutionary Algorithm.
Complex Syst. Model. Simul., 2022

The First IEEE UV2022 Mathematical Modelling Competition: Backgrounds and Problems.
CoRR, 2022

Research on PCB Defect Detection Algorithm Based on Improved YOLOv5.
Proceedings of the 4th International Conference on Robotics, 2022

Deep Spatio-Temporal Method for ADHD Classification Using Resting-State fMRI.
Proceedings of the 34th IEEE International Conference on Tools with Artificial Intelligence, 2022

2021
Genetic Algorithm-Based Computed Tomography Image Analysis for the Diagnosis and Mental Health of COVID-19 Patients in Early Low-Incidence Areas.
Sci. Program., 2021

2019
The Role of Knowledge Management in the Relationship between IT Capability and Interorganizational Performance: An Empirical Investigation.
Commun. Assoc. Inf. Syst., 2019


Dynamic Pricing for Autonomous Vehicle E-hailing Services Reliability and Performance Improvement.
Proceedings of the 15th IEEE International Conference on Automation Science and Engineering, 2019

2018
Message Passing Algorithm for GFDM-IM Detection.
Proceedings of the 23rd IEEE International Conference on Digital Signal Processing, 2018

2016
Remedying Web Hijacking: Notification Effectiveness and Webmaster Comprehension.
Proceedings of the 25th International Conference on World Wide Web, 2016

2015
Information technology and interorganizational learning: An investigation of knowledge exploration and exploitation processes.
Inf. Manag., 2015

2011
Gesture Authentication with Touch Input for Mobile Devices.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2011

2010
Implicit Authentication through Learning User Behavior.
Proceedings of the Information Security - 13th International Conference, 2010

Authentication in the clouds: a framework and its application to mobile users.
Proceedings of the 2nd ACM Cloud Computing Security Workshop, 2010

2009
Bridging Gaps in Organizational Knowledge - The Role of IT-Enabled Organizational Learning in Supply Chain Partnerships.
Proceedings of the International Conference on Information Systems, 2009

2008
Information Technology Portfolio Management: Literature Review, Framework, and Research Issues.
Inf. Resour. Manag. J., 2008

iPhish: Phishing Vulnerabilities on Consumer Electronics.
Proceedings of the Usability, Psychology, and Security, 2008

Blowing the Whistle on Unethical Information Techmology Practices: The Role of Machiavellianism, Gender and Computer Liteacy.
Proceedings of the Learning from the past & charting the future of the discipline. 14th Americas Conference on Information Systems, 2008

2007
Spam double-funnel: connecting web spammers with advertisers.
Proceedings of the 16th International Conference on World Wide Web, 2007

A Quantitative Study of Forum Spamming Using Context-based Analysis.
Proceedings of the Network and Distributed System Security Symposium, 2007

2006
The Effect of Task Type and Information Format on Web Searching Performance.
Proceedings of the International Conference on Information Systems, 2006


  Loading...