
Yang Luo
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j18]Siyuan Zhou
, Ju Tang, Cheng Pan
, Yang Luo, Kailai Yan:
Partial Discharge Signal Denoising Based on Wavelet Pair and Block Thresholding. IEEE Access 8: 119688-119696 (2020) - [j17]Zheng Huang
, Yiwen Zhao, Xin Li, Xingang Zhao
, Yunhui Liu, Guoli Song, Yang Luo:
Application of innovative image processing methods and AdaBound-SE-DenseNet to optimize the diagnosis performance of meningiomas and gliomas. Biomed. Signal Process. Control. 59: 101926 (2020) - [j16]Zheng Huang, Han Xu, Shun Su, Tianyu Wang, Yang Luo, Xingang Zhao, Yunhui Liu, Guoli Song, Yiwen Zhao:
A computer-aided diagnosis system for brain magnetic resonance imaging images using a novel differential feature neural network. Comput. Biol. Medicine 121: 103818 (2020) - [j15]Jialang Xu
, Chunbo Luo
, Gerard Parr, Yang Luo:
A Spatiotemporal Multi-Channel Learning Framework for Automatic Modulation Recognition. IEEE Wirel. Commun. Lett. 9(10): 1629-1632 (2020)
2010 – 2019
- 2019
- [j14]Danyang Qu
, He Zhang, Guoli Song, Yiwen Zhao, Xingang Zhao
, Jianda Han, Yang Luo, Min Bao:
Novel Parallelogram Set-Membership Estimation Dynamic Navigation Method for Osteotomy Surgical Robot. IEEE Access 7: 104143-104154 (2019) - [j13]Zeyan Wu, Jianjuan Li, Shuying Liu, Liuting Zhou, Yang Luo:
A spatial predator-prey system with non-renewable resources. Appl. Math. Comput. 347: 381-391 (2019) - [j12]Shengxiang Gao, Dewei Kong, Zhengtao Yu, Yang Luo, Jianyi Guo, Yantuan Xian:
Chinese question speech recognition integrated with domain characteristics. Int. J. Comput. Sci. Eng. 19(3): 325-333 (2019) - [j11]Yan-Ming Li, Xiao-Li Xi
, Hao Zhang, Zhong-Hui Chen, Jian Sun, Yang Luo, Hai-Qin Jin, Zan Zhang:
A Digital-Controlled Soft-Start Circuit for Negative Output DC-DC Converter. J. Circuits Syst. Comput. 28(4): 1950067:1-1950067:10 (2019) - [j10]Jun Wang, Yang Luo, Jin-Xing Hao, Liting Ding, Ruilin Zhang:
Who are influential in Q&A communities? A measure of V-Constraint based on knowledge diffusion capability. J. Inf. Sci. 45(4) (2019) - [c33]Yang Luo, Ruixuan Qu, Quan Chai, Jianzhong Zhang, Jun Yang, Libo Yuan:
Optical Blade Tip-timing System Based on the Micro-structured Surface Using Phase Demodulation Algorithm. I2MTC 2019: 1-5 - [c32]Yuxin Zhang, Huan Wang, Yang Luo, Lu Yu, Haoji Hu, Hangguan Shan, Tony Q. S. Quek:
Three-Dimensional Convolutional Neural Network Pruning with Regularization-Based Method. ICIP 2019: 4270-4274 - [c31]Zhandong Li, Jingkui Li, Jianguo Tao, Wei Wang, Yang Luo:
Analysis of Disturbance Effect of a Cable on Underwater Vehicle. ICIRA (2) 2019: 755-764 - [c30]Ming Meng, Yahui Su, Yang Luo:
Analysis of Fault Blocking Ability of a MMC Improved Double Half Bridge Sub-module. ISGT Europe 2019: 1-6 - [i4]Yang Luo, Guozhen She, Peng Cheng, Yongqiang Xiong:
BotGraph: Web Bot Detection Based on Sitemap. CoRR abs/1903.08074 (2019) - [i3]Yang Luo, Qingni Shen, Zhonghai Wu:
PML: An Interpreter-Based Access Control Policy Language for Web Services. CoRR abs/1903.09756 (2019) - 2018
- [j9]Yang Bo, Chunhe Xia, Yang Luo, Qing Tang:
Static compliance checking beyond separation of duty constraints. Int. J. Embed. Syst. 10(5): 423-436 (2018) - [j8]Yang Luo, Benqiang Yang, Lisheng Xu
, Liling Hao, Jun Liu, Yang Yao, Frans N. van de Vosse:
Segmentation of the left ventricle in cardiac MRI using a hierarchical extreme learning machine model. Int. J. Mach. Learn. Cybern. 9(10): 1741-1751 (2018) - [j7]Jiajun Li
, Jianguo Tao, Liang Ding, Haibo Gao, Zongquan Deng, Yang Luo, Zhandong Li:
A new iterative synthetic data generation method for CNN based stroke gesture recognition. Multim. Tools Appl. 77(13): 17181-17205 (2018) - [c29]Yang Luo, Jianguo Tao, Qingjie Sun, Liping Deng, Zongquan Deng:
A New Underwater Robot for Crack Welding in Nuclear Power Plants. ROBIO 2018: 77-82 - [c28]Yang Luo, Wanwangying Ma, Yanhui Li, Zhifei Chen, Lin Chen:
Recognizing Potential Runtime Types from Python Docstrings. SATE 2018: 68-84 - [i2]Yuxin Zhang, Huan Wang, Yang Luo, Roland Hu:
Three Dimensional Convolutional Neural Network Pruning with Regularization-Based Method. CoRR abs/1811.07555 (2018) - 2017
- [j6]Boyi Xu, Lida Xu, Hongming Cai, Lihong Jiang, Yang Luo, Yizhi Gu:
The design of an m-Health monitoring system based on a cloud computing platform. Enterp. Inf. Syst. 11(1) (2017) - [j5]Jiajun Li, Jianguo Tao, Liang Ding, Haibo Gao, Zongquan Deng, Yang Luo, Zhandong Li:
Human robot interaction for manipulation tasks based on stroke gesture recognition. Ind. Robot 44(6): 700-710 (2017) - [c27]Yang Luo, Yangyang Zhao, Wanwangying Ma, Lin Chen:
What are the Factors Impacting Build Breakage? WISA 2017: 139-142 - [c26]Zhandong Li, Jianguo Tao, Yang Luo, Hao Sun, Liang Ding, Zongquan Deng:
Hydrodynamic coefficients calculation of a complex-shaped underwater robot by simulation and prototype testing. ICARM 2017: 474-478 - [c25]Tian Puyang, Qingni Shen, Yang Luo, Wu Luo, Zhonghai Wu:
Making least privilege the low-hanging fruit in clouds. ICC 2017: 1-7 - [c24]Yang Luo, Tian Puyang, Xiaoning Sun, Qingni Shen, Yahui Yang, Anbang Ruan, Zhonghai Wu:
RestSep: Towards a Test-Oriented Privilege Partitioning Approach for RESTful APIs. ICWS 2017: 548-555 - [c23]Yi Gao, Yang Luo, Daqing Chen, Haocheng Huang, Wei Dong, Mingyuan Xia, Xue Liu, Jiajun Bu:
Every pixel counts: Fine-grained UI rendering analysis for mobile applications. INFOCOM 2017: 1-9 - [c22]Yang Luo, Jianguo Tao, Zhandong Li, Liang Ding, Zongquan Deng, Hao Sun, Xingguo Song:
An accurate cavitation prediction thruster model based on Gaussian process regression. ROBIO 2017: 575-580 - [c21]Yuqin Qiu, Qingni Shen, Yang Luo, Cong Li, Zhonghai Wu:
A Secure Virtual Machine Deployment Strategy to Reduce Co-residency in Cloud. TrustCom/BigDataSE/ICESS 2017: 347-354 - [i1]Yang Luo, Qixun Zhang, Qingni Shen, Hongzhi Liu, Zhonghai Wu:
Android Multi-Level System Permission Management Approach. CoRR abs/1712.02217 (2017) - 2016
- [c20]Yang Luo, Wu Luo, Tian Puyang, Qingni Shen, Anbang Ruan, Zhonghai Wu:
OpenStack Security Modules: A Least-Invasive Access Control Framework for the Cloud. CLOUD 2016: 51-58 - [c19]Zhixin Fu, Min Zhao, Yang Luo, Yue Yuan:
Self-healing strategy for wind turbine condition monitoring system based on wireless sensor networks. ICCSE 2016: 544-549 - [c18]Yang Luo, Tian Puyang, Wu Luo, Qingni Shen, Anbang Ruan, Zhonghai Wu:
MultiPol: Towards a Multi-policy Authorization Framework for RESTful Interfaces in the Cloud. ICICS 2016: 214-226 - [c17]Kang Chen, Qingni Shen, Cong Li, Yang Luo, Yahui Yang, Zhonghai Wu:
Sift - An Efficient Method for Co-residency Detection on Amazon EC2. ICISSP 2016: 423-431 - [c16]Yang Luo, Hongbo Zhou, Qingni Shen, Anbang Ruan, Zhonghai Wu:
RestPL: Towards a Request-Oriented Policy Language for Arbitrary RESTful APIs. ICWS 2016: 666-671 - [c15]Wu Luo, Wei Liu, Yang Luo, Anbang Ruan, Qingni Shen, Zhonghai Wu:
Partial Attestation: Towards Cost-Effective and Privacy-Preserving Remote Attestations. Trustcom/BigDataSE/ISPA 2016: 152-159 - [c14]Yang Luo, Wu Luo, Xiaoning Sun, Qingni Shen, Anbang Ruan, Zhonghai Wu:
Whispers between the Containers: High-Capacity Covert Channel Attacks in Docker. Trustcom/BigDataSE/ISPA 2016: 630-637 - 2015
- [j4]Yang Luo, Chunhe Xia, Liangshuang Lv, Zhao Wei, Yazhuo Li:
Modeling, conflict detection, and verification of a new virtualization role-based access control framework. Secur. Commun. Networks 8(10): 1904-1925 (2015) - [c13]Yang Luo, Qingni Shen, Cong Li, Kang Chen, Zhonghai Wu:
Probing the Scheduling Algorithms in the Cloud Based on OpenStack. ICCCS 2015: 510-520 - 2014
- [j3]Zhao Wei, Chunhe Xia, Yang Luo, Xiaochen Liu, Weikang Wu:
An Approach for Description of Computer Network Defense Scheme and Its Simulation Verification. J. Comput. 9(2): 388-395 (2014) - [c12]Yang Bo, Chunhe Xia, Yang Luo, Qing Tang:
Static Compliance Checking beyond Separation of Duty Constraints. 3PGCIC 2014: 171-178 - [c11]Yang Luo, Boyi Xu, Hongming Cai, Fenglin Bu:
A Hybrid User Profile Model for Personalized Recommender System with Linked Open Data. ES 2014: 243-248 - 2013
- [c10]Yazhuo Li, Yang Luo, Zhao Wei, Chunhe Xia, Xiaoyan Liang:
A Verification Method of Enterprise Network Reachability Based on Topology Path. CIS 2013: 624-629 - [c9]Zhao Wei, Yanli Lv, Chunhe Xia, Yang Luo, Qing Wei:
A Computer Network Defense Policy Refinement Method. ICoC 2013: 122-133 - [c8]Xiaoyan Liang, Liangshuang Lv, Chunhe Xia, Yang Luo, Yazhuo Li:
A Conflict-Related Rules Detection Tool for Access Control Policy. ICoC 2013: 158-169 - [c7]Yang Luo, Yazhuo Li, Qing Tang, Zhao Wei, Chunhe Xia:
VRBAC: An Extended RBAC Model for Virtualized Environment and Its Conflict Checking Approach. ICoC 2013: 194-205 - 2011
- [j2]Huiyan Zhu, Yang Luo, Meiling Chen:
Stability and Hopf bifurcation of a HIV infection model with CTL-response delay. Comput. Math. Appl. 62(8): 3091-3102 (2011) - 2010
- [c6]King Tin Lam, Yang Luo, Cho-Li Wang:
Adaptive sampling-based profiling techniques for optimizing the distributed JVM runtime. IPDPS 2010: 1-11 - [c5]Guiping Zhang, Yang Luo, Duo Ji:
A method of mining bilingual resources from Web Based on Maximum Frequent Sequential Pattern. NLPKE 2010: 1-8
2000 – 2009
- 2009
- [c4]Xueliang Li, Yang Luo:
Weighted Lee Algorithm on Rectilinear Steiner Tree with Obstacles and Boundary. CSIE (3) 2009: 369-374 - [c3]Yang Luo, King Tin Lam, Cho-Li Wang:
Path-Analytic Distributed Object Prefetching. ISPAN 2009: 98-103 - 2008
- [c2]King Tin Lam, Yang Luo, Cho-Li Wang:
A Performance Study of Clustering Web Application Servers with Distributed JVM. ICPADS 2008: 328-335 - 2005
- [j1]Changjun Jiang, Zhaohui Zhang, Guosun Zeng, Hongzhong Chen, Duoqian Miao, Yu Fang, Xiaofeng Tao, Qing Zhi, Feng Yue, Yang Luo, Anqing Zhou, Lin Chen, Lei Liu:
Urban Traffic Information Service Application Grid. J. Comput. Sci. Technol. 20(1): 134-140 (2005) - 2004
- [c1]Huagen Wan, Yang Luo, Shuming Gao, Qunsheng Peng:
Realistic virtual hand modeling with applications for virtual grasping. VRCAI 2004: 81-87
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2021-02-28 00:27 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint