Yuan Ping

Orcid: 0000-0001-7703-4637

According to our database1, Yuan Ping authored at least 63 papers between 2009 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Privacy-Preserving Federated Learning Framework With Lightweight and Fair in IoT.
IEEE Trans. Netw. Serv. Manag., October, 2024

A Lightweight Intrusion Detection System Using a Finite Dirichlet Mixture Model With Extended Stochastic Variational Inference.
IEEE Trans. Netw. Serv. Manag., August, 2024

Beyond k-Means++: Towards better cluster exploration with geometrical information.
Pattern Recognit., February, 2024

Remote access trojan traffic early detection method based on Markov matrices and deep learning.
Comput. Secur., February, 2024

Retranslated Chinese classical canon <i>Journey to the West</i>: a stylometric comparison between Julia Lovell's retranslation and Arthur Waley's translation.
Digit. Scholarsh. Humanit., 2024

Literary Digital Stylistics in Translation Studies. Anna Maria Cipriani.
Digit. Scholarsh. Humanit., 2024

PEPFL: A framework for a practical and efficient privacy-preserving federated learning.
Digit. Commun. Networks, 2024

SNDMI: Spyware network traffic detection method based on inducement operations.
Comput. Secur., 2024

2023
MCTVD: A malware classification method based on three-channel visualization and deep learning.
Comput. Secur., March, 2023

Controllable Privacy-Preserving Online Diagnosis with Outsourced SVM over Encrypted Medical Data.
EAI Endorsed Trans. e Learn., 2023

Model Protection Scheme Against Distillation Attack in Internet of Vehicles.
EAI Endorsed Trans. e Learn., 2023

Collaborative Control Based on Payload- leading for the Multi-quadrotor Transportation Systems.
Proceedings of the IEEE International Conference on Robotics and Automation, 2023

2022
Author Correction: Computational design of quantum defects in two-dimensional materials.
Nat. Comput. Sci., 2022

Micro-behaviour with Reinforcement Knowledge-aware Reasoning for Explainable Recommendation.
Knowl. Based Syst., 2022

Cryptanalysis and Improvement of DeepPAR: Privacy-Preserving and Asynchronous Deep Learning for Industrial IoT.
IEEE Internet Things J., 2022

Extended variational inference for Dirichlet process mixture of Beta-Liouville distributions for proportional data modeling.
Int. J. Intell. Syst., 2022

Specification and adaptive verification of access control policy for cyber-physical-social spaces.
Comput. Secur., 2022

2021
Computational design of quantum defects in two-dimensional materials.
Nat. Comput. Sci., 2021

Privacy-preserving image multi-classification deep learning model in robot system of industrial IoT.
Neural Comput. Appl., 2021

Multi-modal Knowledge-aware Reinforcement Learning Network for Explainable Recommendation.
Knowl. Based Syst., 2021

A threshold hybrid encryption method for integrity audit without trusted center.
J. Cloud Comput., 2021

Extended variational inference for gamma mixture model in positive vectors modeling.
Neurocomputing, 2021

Comment on 'Targeted Ciphers for Format-Preserving Encryption' from Selected Areas in Cryptography 2018.
IET Inf. Secur., 2021

Unsupervised feature selection by non-convex regularized self-representation.
Expert Syst. Appl., 2021

Recent Advances in Dimensionality Reduction Modeling and Multistability Reconstitution of Memristive Circuit.
Complex., 2021

IIMLP: integrated information-entropy-based method for LncRNA prediction.
BMC Bioinform., 2021

2-SPIFF: a 2-stage packer identification method based on function call graph and file attributes.
Appl. Intell., 2021

2020
Improvement on a privacy-preserving outsourced classification protocol over encrypted data.
Wirel. Networks, 2020

Practical Privacy-Preserving Frequent Itemset Mining on Supermarket Transactions.
IEEE Syst. J., 2020

Highly Secure Privacy-Preserving Outsourced k-Means Clustering under Multiple Keys in Cloud Computing.
Secur. Commun. Networks, 2020

Improved Cloud-Assisted Privacy-Preserving Profile-Matching Scheme in Mobile Social Networks.
Secur. Commun. Networks, 2020

Public Data Integrity Verification Scheme for Secure Cloud Storage.
Inf., 2020

A Multi-Keyword Searchable Encryption Scheme Based on Probability Trapdoor over Encryption Cloud Data.
Inf., 2020

Secure outsourcing of modular inverses and scalar multiplications on elliptic curves.
Int. J. Secur. Networks, 2020

Prognostic prediction of carcinoma by a differential-regulatory-network-embedded deep neural network.
Comput. Biol. Chem., 2020

Making Explainable Friend Recommendations Based on Concept Similarity Measurements via a Knowledge Graph.
IEEE Access, 2020

2019
Improved Cryptanalysis of a Fully Homomorphic Symmetric Encryption Scheme.
Secur. Commun. Networks, 2019

Research on Identity-based Batch Anonymous Authentication Scheme for VANET.
KSII Trans. Internet Inf. Syst., 2019

PKCHD: Towards a Probabilistic Knapsack Public-Key Cryptosystem with High Density.
Inf., 2019

Integrated entropy-based approach for analyzing exons and introns in DNA sequences.
BMC Bioinform., 2019

Attack and Improvement on a Symmetric Fully Homomorphic Encryption Scheme.
IEEE Access, 2019

Efficient Training Support Vector Clustering With Appropriate Boundary Information.
IEEE Access, 2019

Feature Fusion and Voiceprint-Based Access Control for Wireless Insulin Pump Systems.
IEEE Access, 2019

Positive Data Modeling Using a Mixture of Mixtures of Inverted Beta Distributions.
IEEE Access, 2019

Prediction of Human LncRNAs Based on Integrated Information Entropy Features.
Proceedings of the Intelligent Computing Theories and Application, 2019

2018
Variational Bayesian Inference for Infinite Dirichlet Mixture Towards Accurate Data Categorization.
Wirel. Pers. Commun., 2018

Variational Bayesian inference for a Dirichlet process mixture of beta distributions and application.
Neurocomputing, 2018

Deterministic lattice reduction on knapsacks with collision-free properties.
IET Inf. Secur., 2018

An Ontology-Based Semantic Similarity Computation Model.
Proceedings of the 2018 IEEE International Conference on Big Data and Smart Computing, 2018

2017
Building Secure Public Key Encryption Scheme from Hidden Field Equations.
Secur. Commun. Networks, 2017

FRSVC: Towards making support vector clustering consume less.
Pattern Recognit., 2017

一种基于权重属性熵的分类匿名算法 (Classification Anonymity Algorithm Based on Weight Attributes Entropy).
计算机科学, 2017

2016
A two-level hybrid approach for intrusion detection.
Neurocomputing, 2016

2015
Fast and scalable support vector clustering for large-scale data analysis.
Knowl. Inf. Syst., 2015

Recent Advances in Support Vector Clustering: Theory and Applications.
Int. J. Pattern Recognit. Artif. Intell., 2015

2014
Large-scale linear nonparallel support vector machine solver.
Neural Networks, 2014

Large-scale linear nonparallel support vector machine solver.
Neurocomputing, 2014

A distance sum-based hybrid method for intrusion detection.
Appl. Intell., 2014

2013
Efficient intrusion detection using representative instances.
Comput. Secur., 2013

A New Perspective of Support Vector Clustering with Boundary Patterns.
Proceedings of the Multiple Classifier Systems, 11th International Workshop, 2013

2012
Convex Decomposition Based Cluster Labeling Method for Support Vector Clustering.
J. Comput. Sci. Technol., 2012

A Novel Scheme for Accelerating Support Vector Clustering.
Comput. Informatics, 2012

2009
A Multiple-Landmark Multicast Protocol Based on Location Information in Ad Hoc Networks.
Proceedings of the Fifth International Conference on Natural Computation, 2009


  Loading...