Yuyu Yuan

Orcid: 0000-0003-3943-4853

According to our database1, Yuyu Yuan authored at least 37 papers between 2006 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
CAR-Transformer: Cross-Attention Reinforcement Transformer for Cross-Lingual Summarization.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Conservative Q-Learning for Mechanical Ventilation Treatment Using Diagnose Transformer-Encoder.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2023

2022
Predicting Blood Glucose Concentration after Short-Acting Insulin Injection Using Discontinuous Injection Records.
Sensors, 2022

2021
An Empirical Study on Group Fairness Metrics of Judicial Data.
IEEE Access, 2021

A Trusted Solution to Hyperledger Fabric Reordering Problem.
Proceedings of the 8th International Conference on Dependable Systems and Their Applications, 2021

An Efficient Batch Verification Scheme for SM2 Signatures.
Proceedings of the 8th International Conference on Dependable Systems and Their Applications, 2021

Measuring Trust and Automatic Verification in Multi-Agent Systems.
Proceedings of the 8th International Conference on Dependable Systems and Their Applications, 2021

Multi-Agent Trust Evaluation Model based on Reinforcement Learning.
Proceedings of the 8th International Conference on Dependable Systems and Their Applications, 2021

A Novel Trust-based Model for Collaborative Filtering Recommendation Systems using Entropy.
Proceedings of the 8th International Conference on Dependable Systems and Their Applications, 2021

2020
A topic-sensitive trust evaluation approach for users in online communities.
Knowl. Based Syst., 2020

Using Bayesian networks with hidden variables for identifying trustworthy users in social networks.
J. Inf. Sci., 2020

Model for Detection of Masquerade Attacks Based on Variable-Length Sequences.
IEEE Access, 2020

2019
Dimension reduction of image deep feature using PCA.
J. Vis. Commun. Image Represent., 2019

A Multidimensional Trust Evaluation Framework for Online Social Networks Based on Machine Learning.
IEEE Access, 2019

2018
A novel TOPSIS evaluation scheme for cloud service trustworthiness combining objective and subjective aspects.
J. Syst. Softw., 2018

An Approach for Evaluating User Participation in Bitcoin.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

Proof of Contribution: A Modification of Proof of Work to Increase Mining Efficiency.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

Improving RETECS method using FP-Growth in continuous integration.
Proceedings of the 5th IEEE International Conference on Cloud Computing and Intelligence Systems, 2018

2016
Modeling Mobile Cellular Networks Based on Social Characteristics.
Int. J. Comput. Commun. Control, 2016

2014
Human Mobility Simulation in Smart Energy Grid.
Proceedings of the Trustworthy Computing and Services - International Conference, 2014

Research on Modeling of Software Automatic Test.
Proceedings of the Trustworthy Computing and Services - International Conference, 2014

Reaching Critical Mass: The Effect of Adding New Content on Website Visitors and User Registration.
Proceedings of the Trustworthy Computing and Services - International Conference, 2014

The application of text similarity computing in the Clinical Decision Support System.
Proceedings of the IEEE 3rd International Conference on Cloud Computing and Intelligence Systems, 2014

2013
Filtering Training Data When Training Feed-Forward Artificial Neural Network.
Proceedings of the Trustworthy Computing and Services, 2013

Concept of Service Trustworthiness Management System (STMS).
Proceedings of the Trustworthy Computing and Services, 2013

Multidisciplinary Trust Conceptualization: A General Model for Customer Trust Building in e-Commerce.
Proceedings of the Trustworthy Computing and Services, 2013

2012
DISWOP: A Novel Scheduling Algorithm for Data-Intensive Workflow Optimizations.
IEICE Trans. Inf. Syst., 2012

A New Manipulation Based Mobility Model for Vehicular Delay Tolerant Networks.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

Service Behavior Trustworthiness Management.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

A New Measurement Method for Software Trustworthiness Based on Rough Sets.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

Research on Simulation and Real-Time Evaluation Method of IoT-Oriented Complex System.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

A Pervasive Technology Approach to Social Trustworthiness.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

Towards a standard for Service Behavior Trustworthiness Management.
Proceedings of the 2012 Second International Conference on Digital Information and Communication Technology and it's Applications (DICTAP), 2012

2011
A Software Behavior Trustworthiness Measurement Method based on Data Mining.
Int. J. Comput. Intell. Syst., 2011

2006
Research and Establishment of Quality Cost Oriented Software Testing Model.
Proceedings of the Canadian Conference on Electrical and Computer Engineering, 2006

The Formal Economic Model of Software Engineering.
Proceedings of the Canadian Conference on Electrical and Computer Engineering, 2006

Theoretical Study of the Personal Capability Improvement in Unit Test.
Proceedings of the Firth IEEE International Conference on Cognitive Informatics, 2006


  Loading...