Zhimin Yang

Orcid: 0009-0000-8149-5743

According to our database1, Zhimin Yang authored at least 52 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Expanding the clinical application of OPM-MEG using an effective automatic suppression method for the dental brace metal artifact.
NeuroImage, 2024

Human Activity Recognition Based on Self-Attention Mechanism in WiFi Environment.
IEEE Access, 2024

SeWi: A Framework Enhancing CSI-Based Human Activity Recognition.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2024

2023
Sequential Condition Evolved Interaction Knowledge Graph for Traditional Chinese Medicine Recommendation.
CoRR, 2023

2022
Exponential-Alpha Safety Criteria of a Class of Dynamic Systems With Barrier Functions.
IEEE CAA J. Autom. Sinica, 2022

Safety criteria based on barrier function under the framework of boundedness for some dynamic systems.
Sci. China Inf. Sci., 2022

2021
A novel kind of sufficient conditions for safety judgement based on control barrier function.
Sci. China Inf. Sci., 2021

2019
Design and Implementation of Energy Saving Monitoring and Management System on Campus Based on Internet of Things Technology.
Proceedings of the Human Centered Computing - 5th International Conference, 2019

2017
Smoothed ℓ<sub>1</sub>-regularization-based line search for sparse signal recovery.
Soft Comput., 2017

Iterative Learning Fault Estimation Design for Nonlinear System with Random Trial Length.
Complex., 2017

2016
Visualized analysis of incomplete TCM meridian conductance data.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2016

Comparing of feature selection and classification methods on report-based subhealth data.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2016

2014
Incentive-Driven and Privacy-Preserving Message Dissemination in Large-Scale Mobile Networks.
IEEE Trans. Parallel Distributed Syst., 2014

The Paradigm of Big Data for Augmenting Internet of Vehicle into the Intelligent Cloud Computing Systems.
Proceedings of the Internet of Vehicles - Technologies and Services, 2014

Analysis of dialectical thinking about different treatments for the same disease based on decision tree model.
Proceedings of the 2014 IEEE International Conference on Bioinformatics and Biomedicine, 2014

2013
E-SmallTalker: A Distributed Mobile System for Social Networking in Physical Proximity.
IEEE Trans. Parallel Distributed Syst., 2013

Statistical Analysis of Tongue Images for Feature Extraction and Diagnostics.
IEEE Trans. Image Process., 2013

Computerized facial diagnosis using both color and texture features.
Inf. Sci., 2013

An Online Trend Analysis Method for Measuring Data Based on Historical Data Clustering.
Proceedings of the Advances in Swarm Intelligence, 4th International Conference, 2013

Research and Application of Arbitration Digital Signature Scheme Based on Hybrid Cryptosystem in e-Government.
Proceedings of the Pervasive Computing and the Networked World, 2013

Research on the drugs of addition and subtraction of empirical formula of traditional Chinese medicine based on association rules.
Proceedings of the 2013 IEEE International Conference on Bioinformatics and Biomedicine, 2013

2012
Efficient Data Collection with Spatial Clustering in Time Constraint WSN Applications.
Proceedings of the Pervasive Computing and the Networked World, 2012

A Variable Granularity User Classification Algorithm Based on Multi-dimensional Features of Users.
Proceedings of the Ninth Web Information Systems and Applications Conference, 2012

2011
P<sup>3</sup>-coupon: A probabilistic system for Prompt and Privacy-preserving electronic coupon distribution.
Proceedings of the Ninth Annual IEEE International Conference on Pervasive Computing and Communications, 2011

A CSMA-based approach for detecting composite data aggregate events with collaborative sensors in WSN.
Proceedings of the 2011 15th International Conference on Computer Supported Cooperative Work in Design, 2011

Analysis of the indications of empirical prescription in TCM based on association rules.
Proceedings of the 2011 IEEE International Conference on Bioinformatics and Biomedicine Workshops, 2011

A data mining research method based on the concept of evidence based TCM inheritance in famous veteran TCM doctors' personal medical records.
Proceedings of the 2011 IEEE International Conference on Bioinformatics and Biomedicine Workshops, 2011

2010
Null Data Frame: A Double-Edged Sword in IEEE 802.11 WLANs.
IEEE Trans. Parallel Distributed Syst., 2010

Mobile phone-based pervasive fall detection.
Pers. Ubiquitous Comput., 2010

A Fuzzy Optimization Method for Data Mining.
J. Convergence Inf. Technol., 2010

Fuzzy Support Vector Machine Method for Evaluating Innovation Sources in Service Firms.
J. Convergence Inf. Technol., 2010

SVC Method for Textile Weave Recognizing.
J. Convergence Inf. Technol., 2010

Attribute Extraction System for Agricultural SEM.
J. Convergence Inf. Technol., 2010

PerFallD: A pervasive fall detection system using mobile phones.
Proceedings of the Eigth Annual IEEE International Conference on Pervasive Computing and Communications, 2010

Malicious Shellcode Detection with Virtual Memory Snapshots.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

A fuzzy optimization method for support vector classification.
Proceedings of the Seventh International Conference on Fuzzy Systems and Knowledge Discovery, 2010

A collaborative trust model of firewall-through based on Cloud Computing.
Proceedings of the 2010 14th International Conference on Computer Supported Cooperative Work in Design, 2010

Research on library management system for CDs attached to books based on Cloud Computing.
Proceedings of the 2010 14th International Conference on Computer Supported Cooperative Work in Design, 2010

2009
Link-layer protection in 802.11i WLANS with dummy authentication.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009

Cross-layer iterative decoding of irregular LDPC codes using cyclic redundancy check codes.
Proceedings of the 2009 IEEE Wireless Communications and Networking Conference, 2009

DiffUser: Differentiated User Access Control on Smartphone.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

Exploring an Improved Decision Tree Based Weights.
Proceedings of the Fifth International Conference on Natural Computation, 2009

Fuzzy Support Vector Classification Based on Fuzzy Optimization.
Proceedings of the Emerging Intelligent Computing Technology and Applications. With Aspects of Artificial Intelligence, 2009

2008
Research on Acceleration and Deceleration Control Algorithm of NC Instruction Interpretations with High-Order Smooth.
Proceedings of the Intelligent Robotics and Applications, First International Conference, 2008

On Security Vulnerabilities of Null Data Frames in IEEE 802.11 Based WLANs.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 2008

The Research on the Algorithm of Approximately Linearly Dividable Support Vector Classification Machine Based on Fuzzy Theory.
Proceedings of the Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008

The Research on the Algorithm of Nonlinear Support Vector Classification Machine Based on Fuzzy Theory.
Proceedings of the Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008

Multi-filters collaboration for querying XML data streams.
Proceedings of the 12th International Conference on CSCW in Design, 2008

2007
A Localization-Based Anti-Sensor Network System.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

P2P Cooperation based on Strong Migration in CSCW.
Proceedings of the 11th International Conference on Computer Supported Cooperative Work in Design, 2007

2006
Intelligent Agents in Intrusion Detection of CSCW Systems.
Proceedings of the 10th International Conference on CSCW in Design, 2006

2005
An intrusion detection system based on RBF neural network.
Proceedings of the Ninth International Conference on Computer Supported Cooperative Work in Design, 2005


  Loading...