Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Yaling Zhang
@article{DBLP:journals/aeog/ZhanLZJNZC23, author = {Cun Zhan and Chuan Liang and Lu Zhao and Shouzheng Jiang and Kaijie Niu and Yaling Zhang and Long Cheng}, title = {Detection and attribution of vegetation dynamics in the National Barrier Zone of China by considering climate temporal effects}, journal = {Int. J. Appl. Earth Obs. Geoinformation}, volume = {116}, pages = {103140}, year = {2023}, url = {https://doi.org/10.1016/j.jag.2022.103140}, doi = {10.1016/J.JAG.2022.103140}, timestamp = {Wed, 01 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/aeog/ZhanLZJNZC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmssc/QiZCYS23, author = {Xiaoxuan Qi and Yaling Zhang and Sheng Cao and Shengping Yan and Hongbang Su}, title = {Human-computer interaction based on the intelligent information retrieval method for customer satisfaction in power system service}, journal = {Int. J. Model. Simul. Sci. Comput.}, volume = {14}, number = {1}, pages = {2341004:1--2341004:25}, year = {2023}, url = {https://doi.org/10.1142/S1793962323410040}, doi = {10.1142/S1793962323410040}, timestamp = {Fri, 21 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijmssc/QiZCYS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jips/CaoZYQL23, author = {Sheng Cao and Yaling Zhang and Shengping Yan and Xiaoxuan Qi and Yuling Li}, title = {Construction of Customer Appeal Classification Model Based on Speech Recognition}, journal = {J. Inf. Process. Syst.}, volume = {19}, number = {2}, pages = {258--266}, year = {2023}, url = {https://doi.org/10.3745/JIPS.04.0272}, doi = {10.3745/JIPS.04.0272}, timestamp = {Mon, 05 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jips/CaoZYQL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/WangZZ23, author = {Yi{-}Chuan Wang and Gui{-}Ling Zhang and Ya{-}Ling Zhang}, title = {Analysis of {SQL} Injection based on Petri Net in Wireless Network}, journal = {J. Inf. Sci. Eng.}, volume = {39}, number = {1}, pages = {167--181}, year = {2023}, url = {http://jise.iis.sinica.edu.tw/JISESearch/pages/View/PaperView.jsf?keyId=191\_2579}, timestamp = {Tue, 24 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jise/WangZZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/remotesensing/YangSZTO23, author = {Xueyi Yang and Xiaojing Shi and Yaling Zhang and Fei Tian and Samuel Ortega{-}Far{\'{\i}}as}, title = {Response of Evapotranspiration {(ET)} to Climate Factors and Crop Planting Structures in the Shiyang River Basin, Northwestern China}, journal = {Remote. Sens.}, volume = {15}, number = {16}, pages = {3923}, year = {2023}, url = {https://doi.org/10.3390/rs15163923}, doi = {10.3390/RS15163923}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/remotesensing/YangSZTO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/ZhangWZZ23, author = {Duo Zhang and Shangping Wang and Qian Zhang and Yaling Zhang}, title = {Attribute Based Conjunctive Keywords Search With Verifiability and Fair Payment Using Blockchain}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {16}, number = {6}, pages = {4168--4182}, year = {2023}, url = {https://doi.org/10.1109/TSC.2023.3311877}, doi = {10.1109/TSC.2023.3311877}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tsc/ZhangWZZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bsci/WangZZ0023, author = {Yichuan Wang and Jingjing Zhao and Yaling Zhang and Xinhong Hei and Lei Zhu}, editor = {Keke Gai and Kim{-}Kwang Raymond Choo}, title = {Smart Contract Symbol Execution Vulnerability Detection Method Based on {CFG} Path Pruning}, booktitle = {Proceedings of the 5th {ACM} International Symposium on Blockchain and Secure Critical Infrastructure, {BSCI} 2023, Melbourne, VIC, Australia, July 10-14, 2023}, pages = {132--139}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3594556.3594618}, doi = {10.1145/3594556.3594618}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bsci/WangZZ0023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iconip/ZouZWZZ23, author = {Yicheng Zou and Yaling Zhang and Chao Wang and Tao Zhang and Yu Zhang}, editor = {Biao Luo and Long Cheng and Zheng{-}Guang Wu and Hongyi Li and Chaojie Li}, title = {Reversible Data Hiding in Encrypted Images Based on Image Reprocessing and Polymorphic Compression}, booktitle = {Neural Information Processing - 30th International Conference, {ICONIP} 2023, Changsha, China, November 20-23, 2023, Proceedings, Part {XIV}}, series = {Communications in Computer and Information Science}, volume = {1968}, pages = {230--243}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-8181-6\_18}, doi = {10.1007/978-981-99-8181-6\_18}, timestamp = {Tue, 28 Nov 2023 09:37:47 +0100}, biburl = {https://dblp.org/rec/conf/iconip/ZouZWZZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iconip/WangZZZCYZ23, author = {Chao Wang and Yicheng Zou and Yaling Zhang and Ju Zhang and Jichuan Chen and Bin Yang and Yu Zhang}, editor = {Biao Luo and Long Cheng and Zheng{-}Guang Wu and Hongyi Li and Chaojie Li}, title = {Reversible Data Hiding Based on Adaptive Embedding with Local Complexity}, booktitle = {Neural Information Processing - 30th International Conference, {ICONIP} 2023, Changsha, China, November 20-23, 2023, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14451}, pages = {522--534}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-8073-4\_40}, doi = {10.1007/978-981-99-8073-4\_40}, timestamp = {Fri, 24 Nov 2023 20:33:25 +0100}, biburl = {https://dblp.org/rec/conf/iconip/WangZZZCYZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ksem/HuangYLZ23, author = {Chengcheng Huang and Shiqun Yin and Lei Li and Yaling Zhang}, editor = {Zhi Jin and Yuncheng Jiang and Robert Andrei Buchmann and Yaxin Bi and Ana{-}Maria Ghiran and Wenjun Ma}, title = {{MA-TGNN:} Multiple Aggregators Graph-Based Model for Text Classification}, booktitle = {Knowledge Science, Engineering and Management - 16th International Conference, {KSEM} 2023, Guangzhou, China, August 16-18, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14119}, pages = {66--77}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-40289-0\_6}, doi = {10.1007/978-3-031-40289-0\_6}, timestamp = {Mon, 14 Aug 2023 16:42:47 +0200}, biburl = {https://dblp.org/rec/conf/ksem/HuangYLZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ksem/ZhangZWHY23, author = {Yaling Zhang and Yicheng Zou and Chao Wang and Chengcheng Huang and Shiqun Yin}, editor = {Zhi Jin and Yuncheng Jiang and Robert Andrei Buchmann and Yaxin Bi and Ana{-}Maria Ghiran and Wenjun Ma}, title = {Reversible Data Hiding in Encrypted Images Based on a Multi-Granularity Adaptive Classification Mechanism}, booktitle = {Knowledge Science, Engineering and Management - 16th International Conference, {KSEM} 2023, Guangzhou, China, August 16-18, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14118}, pages = {201--213}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-40286-9\_17}, doi = {10.1007/978-3-031-40286-9\_17}, timestamp = {Mon, 14 Aug 2023 16:42:47 +0200}, biburl = {https://dblp.org/rec/conf/ksem/ZhangZWHY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nana/ZhangCWXL23, author = {Yaling Zhang and Jingjing Chen and Yichuan Wang and Yeqiu Xiao and Xiaoxue Liu}, title = {A Novel On-Demand Service Architecture for Efficient Cloud-Edge Collaboration}, booktitle = {International Conference on Networking and Network Applications, NaNA 2023, Qingdao, China, August 18-21, 2023}, pages = {169--174}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/NaNA60121.2023.00036}, doi = {10.1109/NANA60121.2023.00036}, timestamp = {Thu, 09 Nov 2023 15:01:13 +0100}, biburl = {https://dblp.org/rec/conf/nana/ZhangCWXL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nana/JiYZWTQ23, author = {Wenjiang Ji and Yixin Yang and Yaling Zhang and Yichuan Wang and Mengjie Tian and Yuan Qiu}, title = {DDoS Attack Detection Based on Information Entropy Feature Extraction in Software Defined Networks}, booktitle = {International Conference on Networking and Network Applications, NaNA 2023, Qingdao, China, August 18-21, 2023}, pages = {459--464}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/NaNA60121.2023.00082}, doi = {10.1109/NANA60121.2023.00082}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nana/JiYZWTQ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/finr/ZhangTZX22, author = {Yaling Zhang and Huan Tang and Fateh Zereg and Dekai Xu}, title = {Application of Deep Convolution Network Algorithm in Sports Video Hot Spot Detection}, journal = {Frontiers Neurorobotics}, volume = {16}, pages = {829445}, year = {2022}, url = {https://doi.org/10.3389/fnbot.2022.829445}, doi = {10.3389/FNBOT.2022.829445}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/finr/ZhangTZX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ZhaoWZW22, author = {Xiaojie Zhao and Shangping Wang and Yaling Zhang and Yu Wang}, title = {Attribute-based access control scheme for data sharing on hyperledger fabric}, journal = {J. Inf. Secur. Appl.}, volume = {67}, pages = {103182}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103182}, doi = {10.1016/J.JISA.2022.103182}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ZhaoWZW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcam/ZhangL22, author = {Yaling Zhang and Hongwei Liu}, title = {A Barzilai and Borwein regularization feasible direction algorithm for convex nonlinear {SOC} programming with linear constraints}, journal = {J. Comput. Appl. Math.}, volume = {401}, pages = {113781}, year = {2022}, url = {https://doi.org/10.1016/j.cam.2021.113781}, doi = {10.1016/J.CAM.2021.113781}, timestamp = {Thu, 16 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcam/ZhangL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jifs/ZhangL22, author = {Yaling Zhang and Hongwei Liu}, title = {A new projection neural network for linear and convex quadratic second-order cone programming}, journal = {J. Intell. Fuzzy Syst.}, volume = {42}, number = {4}, pages = {2925--2937}, year = {2022}, url = {https://doi.org/10.3233/JIFS-210164}, doi = {10.3233/JIFS-210164}, timestamp = {Thu, 16 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jifs/ZhangL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jiis/YangSLYZ22, author = {Zhihai Yang and Qindong Sun and Zhaoli Liu and Jinpei Yan and Yaling Zhang}, title = {Rating behavior evaluation and abnormality forensics analysis for injection attack detection}, journal = {J. Intell. Inf. Syst.}, volume = {59}, number = {1}, pages = {93--119}, year = {2022}, url = {https://doi.org/10.1007/s10844-021-00689-y}, doi = {10.1007/S10844-021-00689-Y}, timestamp = {Thu, 25 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jiis/YangSLYZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/join/QiZCYS22, author = {Xiaoxuan Qi and Yaling Zhang and Sheng Cao and Shengping Yan and Hongbang Su}, title = {Intelligent Retrieval Method of Power System Service User Satisfaction Based on Human-Computer Interaction}, journal = {J. Interconnect. Networks}, volume = {22}, number = {Supp-05}, pages = {2147012:1--2147012:25}, year = {2022}, url = {https://doi.org/10.1142/S0219265921470125}, doi = {10.1142/S0219265921470125}, timestamp = {Mon, 19 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/join/QiZCYS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/ZhangWZSZ22, author = {Qian Zhang and Shangping Wang and Duo Zhang and Jin Sun and Yaling Zhang}, title = {Authorized Data Secure Access Scheme With Specified Time and Relevance Ranked Keyword Search for Industrial Cloud Platforms}, journal = {{IEEE} Syst. J.}, volume = {16}, number = {2}, pages = {2879--2890}, year = {2022}, url = {https://doi.org/10.1109/JSYST.2021.3093623}, doi = {10.1109/JSYST.2021.3093623}, timestamp = {Tue, 28 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sj/ZhangWZSZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/YangSZ22, author = {Zhihai Yang and Qindong Sun and Yaling Zhang}, title = {Probabilistic Inference and Trustworthiness Evaluation of Associative Links Toward Malicious Attack Detection for Online Recommendations}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {2}, pages = {879--896}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2020.3023114}, doi = {10.1109/TDSC.2020.3023114}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/YangSZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhangT22, author = {Yaling Zhang and Dongtai Tang}, title = {A differential privacy federated learning framework for accelerating convergence}, booktitle = {18th International Conference on Computational Intelligence and Security, {CIS} 2022, Chengdu, China, December 16-18, 2022}, pages = {122--126}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CIS58238.2022.00033}, doi = {10.1109/CIS58238.2022.00033}, timestamp = {Sat, 22 Apr 2023 16:25:52 +0200}, biburl = {https://dblp.org/rec/conf/cis/ZhangT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cphysics/TianLCZYQYGCYZ21, author = {Yuan Tian and Ping Lin and Hanjie Cai and Yaling Zhang and Qiong Yang and Meiling Qi and Guanghui Yang and Xiaofei Gao and Xiaolong Chen and Lei Yang and Qingguo Zhou}, title = {A fast and accurate {GPU} based method on simulating energy deposition for beam-target coupling with granular materials}, journal = {Comput. Phys. Commun.}, volume = {269}, pages = {108104}, year = {2021}, url = {https://doi.org/10.1016/j.cpc.2021.108104}, doi = {10.1016/J.CPC.2021.108104}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cphysics/TianLCZYQYGCYZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/ZhangZDJ21, author = {Pengcheng Zhang and Yaling Zhang and Hai Dong and Huiying Jin}, title = {Mobility and Dependence-Aware QoS Monitoring in Mobile Edge Computing}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {9}, number = {3}, pages = {1143--1157}, year = {2021}, url = {https://doi.org/10.1109/TCC.2021.3063050}, doi = {10.1109/TCC.2021.3063050}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcc/ZhangZDJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YangSZW21, author = {Zhihai Yang and Qindong Sun and Yaling Zhang and Wei Wang}, title = {Identification of Malicious Injection Attacks in Dense Rating and Co-Visitation Behaviors}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {16}, pages = {537--552}, year = {2021}, url = {https://doi.org/10.1109/TIFS.2020.3016827}, doi = {10.1109/TIFS.2020.3016827}, timestamp = {Thu, 12 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YangSZW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhangB21, author = {Yaling Zhang and Shibo Bai}, title = {An Improved LRP-Based Differential Privacy Preserving Deep Learning Framework}, booktitle = {17th International Conference on Computational Intelligence and Security {CIS} 2021, Chengdu, China, November 19-22, 2021}, pages = {484--488}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CIS54983.2021.00106}, doi = {10.1109/CIS54983.2021.00106}, timestamp = {Wed, 16 Feb 2022 17:26:48 +0100}, biburl = {https://dblp.org/rec/conf/cis/ZhangB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccse2/ZhangZH21, author = {Yaling Zhang and Jie Zhou and Jing Hu}, title = {Research on Defect Location Method of {C} Language Code Based on Deep Learning}, booktitle = {16th International Conference on Computer Science {\&} Education, {ICCSE} 2021, Lancaster, United Kingdom, August 17-21, 2021}, pages = {360--365}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICCSE51940.2021.9569383}, doi = {10.1109/ICCSE51940.2021.9569383}, timestamp = {Thu, 06 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccse2/ZhangZH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nana/ZhangZWZJ21, author = {Guiling Zhang and Yaling Zhang and Yichuan Wang and Lei Zhu and Wenjiang Ji}, title = {A fine-grained petri model for {SQL} time-blind injection}, booktitle = {2021 International Conference on Networking and Network Applications, NaNA 2021, Lijiang City, China, October 29 - Nov. 1, 2021}, pages = {161--167}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/NaNA53684.2021.00035}, doi = {10.1109/NANA53684.2021.00035}, timestamp = {Fri, 29 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nana/ZhangZWZJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nana/ZhangWWJZ21, author = {Yaling Zhang and Hongyun Wang and Yichuan Wang and Wenjiang Ji and Lei Zhu}, title = {Signature Scheme Based on The {SM2} Algorithm in Fabric}, booktitle = {2021 International Conference on Networking and Network Applications, NaNA 2021, Lijiang City, China, October 29 - Nov. 1, 2021}, pages = {443--448}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/NaNA53684.2021.00083}, doi = {10.1109/NANA53684.2021.00083}, timestamp = {Fri, 29 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nana/ZhangWWJZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangFN21, author = {Yaling Zhang and Pengfei Feng and Yao Ning}, title = {Random Forest Algorithm Based on Differential Privacy Protection}, booktitle = {20th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2021, Shenyang, China, October 20-22, 2021}, pages = {1259--1264}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00172}, doi = {10.1109/TRUSTCOM53373.2021.00172}, timestamp = {Sun, 13 Mar 2022 10:52:35 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangFN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YangSZZJ20, author = {Zhihai Yang and Qindong Sun and Yaling Zhang and Lei Zhu and Wenjiang Ji}, title = {Inference of Suspicious Co-Visitation and Co-Rating Behaviors and Abnormality Forensics for Recommender Systems}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2766--2781}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2977023}, doi = {10.1109/TIFS.2020.2977023}, timestamp = {Fri, 29 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YangSZZJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhangLB20, author = {Yaling Zhang and Jiale Li and Shibo Bai}, title = {Chinese Sentiment Classification Model of Neural Network Based on Particle Swarm Optimization}, booktitle = {16th International Conference on Computational Intelligence and Security, {CIS} 2020, Nanning, China, November 27-30, 2020}, pages = {338--341}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CIS52066.2020.00078}, doi = {10.1109/CIS52066.2020.00078}, timestamp = {Wed, 05 May 2021 14:53:25 +0200}, biburl = {https://dblp.org/rec/conf/cis/ZhangLB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icws/ZhangZDJ20, author = {Pengcheng Zhang and Yaling Zhang and Hai Dong and Huiying Jin}, title = {Multivariate QoS Monitoring in Mobile Edge Computing based on Bayesian Classifier and Rough Set}, booktitle = {2020 {IEEE} International Conference on Web Services, {ICWS} 2020, Beijing, China, October 19-23, 2020}, pages = {189--196}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICWS49710.2020.00032}, doi = {10.1109/ICWS49710.2020.00032}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icws/ZhangZDJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/WangJZ19, author = {Shangping Wang and Shasha Jia and Yaling Zhang}, title = {Verifiable and Multi-Keyword Searchable Attribute-Based Encryption Scheme for Cloud Storage}, journal = {{IEEE} Access}, volume = {7}, pages = {50136--50147}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2910828}, doi = {10.1109/ACCESS.2019.2910828}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/WangJZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/WangYCZ19, author = {Shangping Wang and Lisha Yao and Juanjuan Chen and Yaling Zhang}, title = {KS-ABESwET: {A} Keyword Searchable Attribute-Based Encryption Scheme With Equality Test in the Internet of Things}, journal = {{IEEE} Access}, volume = {7}, pages = {80675--80696}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2922646}, doi = {10.1109/ACCESS.2019.2922646}, timestamp = {Thu, 08 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/WangYCZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZhangHW19, author = {Yaling Zhang and Zhifeng Hao and Shangping Wang}, title = {A Differential Privacy Support Vector Machine Classifier Based on Dual Variable Perturbation}, journal = {{IEEE} Access}, volume = {7}, pages = {98238--98251}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2929680}, doi = {10.1109/ACCESS.2019.2929680}, timestamp = {Wed, 21 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ZhangHW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/WangZZ19, author = {Shangping Wang and Dan Zhang and Yaling Zhang}, title = {Blockchain-Based Personal Health Records Sharing Scheme With Data Integrity Verifiable}, journal = {{IEEE} Access}, volume = {7}, pages = {102887--102901}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2931531}, doi = {10.1109/ACCESS.2019.2931531}, timestamp = {Fri, 24 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/WangZZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/WangTZC19, author = {Shangping Wang and Xixi Tang and Yaling Zhang and Juanjuan Chen}, title = {Auditable Protocols for Fair Payment and Physical Asset Delivery Based on Smart Contracts}, journal = {{IEEE} Access}, volume = {7}, pages = {109439--109453}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2933860}, doi = {10.1109/ACCESS.2019.2933860}, timestamp = {Thu, 05 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/WangTZC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/WangWZ19, author = {Shangping Wang and Xu Wang and Yaling Zhang}, title = {A Secure Cloud Storage Framework With Access Control Based on Blockchain}, journal = {{IEEE} Access}, volume = {7}, pages = {112713--112725}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2929205}, doi = {10.1109/ACCESS.2019.2929205}, timestamp = {Fri, 18 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/WangWZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/WangLZC19, author = {Shangping Wang and Dongyi Li and Yaling Zhang and Juanjuan Chen}, title = {Smart Contract-Based Product Traceability System in the Supply Chain Scenario}, journal = {{IEEE} Access}, volume = {7}, pages = {115122--115133}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2935873}, doi = {10.1109/ACCESS.2019.2935873}, timestamp = {Sat, 12 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/WangLZC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/WangPZ19, author = {Shangping Wang and Ru Pei and Yaling Zhang}, title = {{EIDM:} {A} Ethereum-Based Cloud User Identity Management Protocol}, journal = {{IEEE} Access}, volume = {7}, pages = {115281--115291}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2933989}, doi = {10.1109/ACCESS.2019.2933989}, timestamp = {Sat, 12 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/WangPZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/WangWZ19a, author = {Shangping Wang and Yuying Wang and Yaling Zhang}, title = {Blockchain-Based Fair Payment Protocol for Deduplication Cloud Storage System}, journal = {{IEEE} Access}, volume = {7}, pages = {127652--127668}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2939492}, doi = {10.1109/ACCESS.2019.2939492}, timestamp = {Sat, 12 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/WangWZ19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZhangWZWZ19, author = {Qian Zhang and Shangping Wang and Duo Zhang and Jifang Wang and Yaling Zhang}, title = {Time and Attribute Based Dual Access Control and Data Integrity Verifiable Scheme in Cloud Computing Applications}, journal = {{IEEE} Access}, volume = {7}, pages = {137594--137607}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2942649}, doi = {10.1109/ACCESS.2019.2942649}, timestamp = {Thu, 21 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/ZhangWZWZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jota/MuZ19, author = {Xuewen Mu and Yaling Zhang}, title = {Grasping Force Optimization for Multi-fingered Robotic Hands Using Projection and Contraction Methods}, journal = {J. Optim. Theory Appl.}, volume = {183}, number = {2}, pages = {592--608}, year = {2019}, url = {https://doi.org/10.1007/s10957-019-01540-9}, doi = {10.1007/S10957-019-01540-9}, timestamp = {Tue, 07 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jota/MuZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acmturc/ZhangW19, author = {Yaling Zhang and Bei Wu}, title = {Research and application of grade prediction model based on decision tree algorithm}, booktitle = {Proceedings of the {ACM} Turing Celebration Conference - China, {ACM} {TUR-C} 2019, Chengdu, China, May 17-19, 2019}, pages = {80:1--80:6}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321408.3322857}, doi = {10.1145/3321408.3322857}, timestamp = {Thu, 11 Mar 2021 17:04:51 +0100}, biburl = {https://dblp.org/rec/conf/acmturc/ZhangW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhangLQ19, author = {Yaling Zhang and Pei Luo and Lingyu Qu}, title = {An Improved Differential Privacy Algorithm Using Frequent Pattern Mining}, booktitle = {15th International Conference on Computational Intelligence and Security, {CIS} 2019, Macao, SAR, China, December 13-16, 2019}, pages = {419--423}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CIS.2019.00098}, doi = {10.1109/CIS.2019.00098}, timestamp = {Wed, 18 Mar 2020 18:15:29 +0100}, biburl = {https://dblp.org/rec/conf/cis/ZhangLQ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/igarss/HuLZZ19, author = {Jing Hu and Yunsong Li and Minghua Zhao and Yaling Zhang}, title = {Deep Spatial-Spectral Information Exploitation for Rapid Hyperspectral Image Super-Resolution}, booktitle = {2019 {IEEE} International Geoscience and Remote Sensing Symposium, {IGARSS} 2019, Yokohama, Japan, July 28 - August 2, 2019}, pages = {3109--3112}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/IGARSS.2019.8899111}, doi = {10.1109/IGARSS.2019.8899111}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/igarss/HuLZZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/WangZZL18, author = {Shangping Wang and Duo Zhang and Yaling Zhang and Lihua Liu}, title = {Efficiently Revocable and Searchable Attribute-Based Encryption Scheme for Mobile Cloud Storage}, journal = {{IEEE} Access}, volume = {6}, pages = {30444--30457}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2846037}, doi = {10.1109/ACCESS.2018.2846037}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/WangZZL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/WangZZ18a, author = {Shangping Wang and Yinglong Zhang and Yaling Zhang}, title = {A Blockchain-Based Framework for Data Sharing With Fine-Grained Access Control in Decentralized Storage Systems}, journal = {{IEEE} Access}, volume = {6}, pages = {38437--38450}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2851611}, doi = {10.1109/ACCESS.2018.2851611}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/WangZZ18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZhangWD18, author = {Yaling Zhang and Shangping Wang and Qing Du}, title = {Revocable Identity-Based Encryption Scheme Under {LWE} Assumption in the Standard Model}, journal = {{IEEE} Access}, volume = {6}, pages = {65298--65307}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2855734}, doi = {10.1109/ACCESS.2018.2855734}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ZhangWD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/WangZZ18, author = {Shangping Wang and Xia Zhang and Yaling Zhang}, title = {Efficient revocable and grantable attribute-based encryption from lattices with fine-grained access control}, journal = {{IET} Inf. Secur.}, volume = {12}, number = {2}, pages = {141--149}, year = {2018}, url = {https://doi.org/10.1049/iet-ifs.2017.0225}, doi = {10.1049/IET-IFS.2017.0225}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/WangZZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijhpcn/WangZZ18, author = {Shangping Wang and Ru Zhao and Yaling Zhang}, title = {Lattice-based ring signature scheme under the random oracle model}, journal = {Int. J. High Perform. Comput. Netw.}, volume = {11}, number = {4}, pages = {332--341}, year = {2018}, url = {https://doi.org/10.1504/IJHPCN.2018.10014445}, doi = {10.1504/IJHPCN.2018.10014445}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijhpcn/WangZZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijon/YangSZZ18, author = {Zhihai Yang and Qindong Sun and Yaling Zhang and Beibei Zhang}, title = {Uncovering anomalous rating behaviors for rating systems}, journal = {Neurocomputing}, volume = {308}, pages = {205--226}, year = {2018}, url = {https://doi.org/10.1016/j.neucom.2018.05.001}, doi = {10.1016/J.NEUCOM.2018.05.001}, timestamp = {Thu, 21 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijon/YangSZZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mlc/Zhang17, author = {Yaling Zhang}, title = {A projected-based neural network method for second-order cone programming}, journal = {Int. J. Mach. Learn. Cybern.}, volume = {8}, number = {6}, pages = {1907--1914}, year = {2017}, url = {https://doi.org/10.1007/s13042-016-0569-0}, doi = {10.1007/S13042-016-0569-0}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mlc/Zhang17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnc/ZhangWW17, author = {Yaling Zhang and Ting Wang and Shangping Wang}, editor = {Yong Liu and Liang Zhao and Guoyong Cai and Guoqing Xiao and Kenli Li and Lipo Wang}, title = {An efficient algorithm for frequent pattern mining based on privacy-preserving}, booktitle = {13th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery, {ICNC-FSKD} 2017, Guilin, China, July 29-31, 2017}, pages = {1694--1699}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/FSKD.2017.8393021}, doi = {10.1109/FSKD.2017.8393021}, timestamp = {Mon, 08 Mar 2021 17:45:50 +0100}, biburl = {https://dblp.org/rec/conf/icnc/ZhangWW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnc/ZhangW17a, author = {Ya{-}Ling Zhang and Ya{-}Nan Wang}, editor = {Yong Liu and Liang Zhao and Guoyong Cai and Guoqing Xiao and Kenli Li and Lipo Wang}, title = {An improved sampling K-means clustering algorithm based on MapReduce}, booktitle = {13th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery, {ICNC-FSKD} 2017, Guilin, China, July 29-31, 2017}, pages = {1934--1939}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/FSKD.2017.8393064}, doi = {10.1109/FSKD.2017.8393064}, timestamp = {Wed, 27 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icnc/ZhangW17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhangLW16, author = {Yaling Zhang and Lijun Liu and Shangping Wang}, title = {Multi-User and Keyword-Based Searchable Encryption Scheme}, booktitle = {12th International Conference on Computational Intelligence and Security, {CIS} 2016, Wuxi, China, December 16-19, 2016}, pages = {223--227}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CIS.2016.0059}, doi = {10.1109/CIS.2016.0059}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ZhangLW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijict/WangLSZ15, author = {Shangping Wang and Lihua Liu and Jin Sun and Yaling Zhang}, title = {Multi-party concurrent signatures scheme from lattice}, journal = {Int. J. Inf. Commun. Technol.}, volume = {7}, number = {2/3}, pages = {247--262}, year = {2015}, url = {https://doi.org/10.1504/IJICT.2015.068389}, doi = {10.1504/IJICT.2015.068389}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijict/WangLSZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhangYW15, author = {Yaling Zhang and Liang Yang and Shangping Wang}, title = {An Efficient Identity-Based Signature Scheme for Vehicular Communications}, booktitle = {11th International Conference on Computational Intelligence and Security, {CIS} 2015, Shenzhen, China, December 19-20, 2015}, pages = {326--330}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CIS.2015.86}, doi = {10.1109/CIS.2015.86}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ZhangYW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhangLWS14, author = {Ya{-}Ling Zhang and Kai Liu and Shang{-}Ping Wang and Qin{-}Dong Sun}, title = {A Multi-users Searchable Encryption Scheme with Proxy Re-encryption}, booktitle = {Tenth International Conference on Computational Intelligence and Security, {CIS} 2014, Kunming, Yunnan, China, November 15-16, 2014}, pages = {563--567}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CIS.2014.167}, doi = {10.1109/CIS.2014.167}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ZhangLWS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cor/MuZ13, author = {Xuewen Mu and Yaling Zhang}, title = {An alternating direction method for second-order conic programming}, journal = {Comput. Oper. Res.}, volume = {40}, number = {7}, pages = {1752--1757}, year = {2013}, url = {https://doi.org/10.1016/j.cor.2013.01.010}, doi = {10.1016/J.COR.2013.01.010}, timestamp = {Tue, 18 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cor/MuZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jam/MuZ13, author = {Xuewen Mu and Yaling Zhang}, title = {A Rank-Two Feasible Direction Algorithm for the Binary Quadratic Programming}, journal = {J. Appl. Math.}, volume = {2013}, pages = {963563:1--963563:7}, year = {2013}, url = {https://doi.org/10.1155/2013/963563}, doi = {10.1155/2013/963563}, timestamp = {Thu, 16 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jam/MuZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/MuZ13, author = {Xuewen Mu and Yaling Zhang}, title = {A Continuous Relaxation Method for Multiuser Detection Problem}, journal = {Wirel. Pers. Commun.}, volume = {71}, number = {3}, pages = {2067--2077}, year = {2013}, url = {https://doi.org/10.1007/s11277-012-0923-9}, doi = {10.1007/S11277-012-0923-9}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/MuZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/JiaZWS13, author = {Zhipeng Jia and Ya{-}Ling Zhang and Shang{-}Ping Wang and Qin{-}Dong Sun}, title = {Evaluable Secure Ranked Keyword Search Scheme over Encrypted Cloud Data}, booktitle = {Ninth International Conference on Computational Intelligence and Security, {CIS} 2013, Emei Mountain, Sichan Province, China, December 14-15, 2013}, pages = {697--701}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/CIS.2013.152}, doi = {10.1109/CIS.2013.152}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/JiaZWS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/incos/WangLCSZZ13, author = {Shangping Wang and Lihua Liu and Juanjuan Chen and Jin Sun and Xinwen Zhang and Yaling Zhang}, title = {Lattice-Based Multi-party Concurrent Signatures Scheme}, booktitle = {2013 5th International Conference on Intelligent Networking and Collaborative Systems, Xi'an city, Shaanxi province, China, September 9-11, 2013}, pages = {568--572}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/INCoS.2013.105}, doi = {10.1109/INCOS.2013.105}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/incos/WangLCSZZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/incos/YalingJW13, author = {Yaling Zhang and Zhipeng Jia and Shangping Wang}, title = {A Multi-user Searchable Symmetric Encryption Scheme for Cloud Storage System}, booktitle = {2013 5th International Conference on Intelligent Networking and Collaborative Systems, Xi'an city, Shaanxi province, China, September 9-11, 2013}, pages = {815--820}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/INCoS.2013.155}, doi = {10.1109/INCOS.2013.155}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/incos/YalingJW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/MuZ12, author = {Xuewen Mu and Yaling Zhang}, title = {A New Rank-two Semidefinite Programming Relaxation Method for Multiuser Detection Problem}, journal = {Wirel. Pers. Commun.}, volume = {65}, number = {1}, pages = {223--233}, year = {2012}, url = {https://doi.org/10.1007/s11277-011-0246-2}, doi = {10.1007/S11277-011-0246-2}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/MuZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cma/WangMZW11, author = {Shangping Wang and Rui Ma and Yaling Zhang and Xiaofeng Wang}, title = {Ring signature scheme based on multivariate public key cryptosystems}, journal = {Comput. Math. Appl.}, volume = {62}, number = {10}, pages = {3973--3979}, year = {2011}, url = {https://doi.org/10.1016/j.camwa.2011.09.052}, doi = {10.1016/J.CAMWA.2011.09.052}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cma/WangMZW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/WangMZL11, author = {Shang{-}Ping Wang and Qiao{-}Mei Ma and Ya{-}Ling Zhang and You{-}Sheng Li}, title = {An Authentication Protocol for {RFID} Tag and Its Simulation}, journal = {J. Networks}, volume = {6}, number = {3}, pages = {446--453}, year = {2011}, url = {https://doi.org/10.4304/jnw.6.3.446-453}, doi = {10.4304/JNW.6.3.446-453}, timestamp = {Tue, 07 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnw/WangMZL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/MuZ11, author = {Xuewen Mu and Yaling Zhang}, title = {A Second-Order Cone Programming Method for Multiuser Detection Problem}, journal = {Wirel. Pers. Commun.}, volume = {60}, number = {2}, pages = {335--344}, year = {2011}, url = {https://doi.org/10.1007/s11277-010-9947-1}, doi = {10.1007/S11277-010-9947-1}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/MuZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isnn/MuZ10, author = {Xuewen Mu and Yaling Zhang}, editor = {Liqing Zhang and Bao{-}Liang Lu and James Tin{-}Yau Kwok}, title = {A New Two-Step Gradient-Based Backpropagation Training Method for Neural Networks}, booktitle = {Advances in Neural Networks - {ISNN} 2010, 7th International Symposium on Neural Networks, {ISNN} 2010, Shanghai, China, June 6-9, 2010, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {6063}, pages = {95--101}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13278-0\_13}, doi = {10.1007/978-3-642-13278-0\_13}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/isnn/MuZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/grc/MuZ09, author = {Xuewen Mu and Yaling Zhang}, title = {A modified gradient-based backpropagation training method for neural networks}, booktitle = {The 2009 {IEEE} International Conference on Granular Computing, GrC 2009, Lushan Mountain, Nanchang, China, 17-19 August 2009}, pages = {450--453}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/GRC.2009.5255081}, doi = {10.1109/GRC.2009.5255081}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/grc/MuZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csse/WangCWZ08, author = {Xiaofeng Wang and Liang Cao and Shangping Wang and Yaling Zhang}, title = {ID-Based Convertible Limited (Multi-)Verifier Signature Scheme}, booktitle = {International Conference on Computer Science and Software Engineering, {CSSE} 2008, Volume 3: Grid Computing / Distributed and Parallel Computing / Information Security, December 12-14, 2008, Wuhan, China}, pages = {774--777}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CSSE.2008.1566}, doi = {10.1109/CSSE.2008.1566}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csse/WangCWZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isecs/ZhangW08a, author = {Yaling Zhang and Xiaofeng Wang}, editor = {Fei Yu and Qi Luo and Yongjun Chen and Zhigang Chen}, title = {Message Substitute Attack on Concurrent Signatures Protocol and its Improvement}, booktitle = {Proceedings of The International Symposium on Electronic Commerce and Security, {ISECS} 2008, August 3-5, 2008, Guangzhou, China}, pages = {497--501}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ISECS.2008.214}, doi = {10.1109/ISECS.2008.214}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isecs/ZhangW08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/snpd/WangHZW08, author = {Shangping Wang and Pei Han and Yaling Zhang and Xiaofeng Wang}, title = {An Improved ID-based Restrictive Partially Blind Signature Scheme}, booktitle = {Ninth {ACIS} International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, {SNPD} 2008, In conjunction with Second International Workshop on Advanced Internet Technology and Applications, August 6-8, 2008, Phuket, Thailand}, pages = {295--300}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/SNPD.2008.88}, doi = {10.1109/SNPD.2008.88}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/snpd/WangHZW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/snpd/ZhangZZ08, author = {Yaling Zhang and Jing Zhang and Yikun Zhang}, title = {Multi-signers Strong Designated Verifier Signature Scheme}, booktitle = {Ninth {ACIS} International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, {SNPD} 2008, In conjunction with Second International Workshop on Advanced Internet Technology and Applications, August 6-8, 2008, Phuket, Thailand}, pages = {324--328}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/SNPD.2008.68}, doi = {10.1109/SNPD.2008.68}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/snpd/ZhangZZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amc/MuZL07, author = {Xuewen Mu and Yaling Zhang and Sanyang Liu}, title = {A new branch and bound method with pretreatment for the binary quadratic programming}, journal = {Appl. Math. Comput.}, volume = {192}, number = {1}, pages = {252--259}, year = {2007}, url = {https://doi.org/10.1016/j.amc.2007.03.006}, doi = {10.1016/J.AMC.2007.03.006}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/amc/MuZL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isnn/MuLZ05, author = {Xuewen Mu and Sanyang Liu and Yaling Zhang}, editor = {Jun Wang and Xiaofeng Liao and Zhang Yi}, title = {A Neural Network Algorithm for Second-Order Conic Programming}, booktitle = {Advances in Neural Networks - {ISNN} 2005, Second International Symposium on Neural Networks, Chongqing, China, May 30 - June 1, 2005, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {3496}, pages = {718--724}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11427391\_115}, doi = {10.1007/11427391\_115}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/isnn/MuLZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.