
Yang Xin
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j21]Haixia Hou, Yingying Xu
, Menghan Chen, Zhi Liu
, Wei Guo
, Mingcheng Gao, Yang Xin
, Lizhen Cui
:
Hierarchical Long Short-Term Memory Network for Cyberattack Detection. IEEE Access 8: 90907-90913 (2020) - [j20]Xuefeng Li
, Yang Xin
, Chensu Zhao
, Yixian Yang
, Shoushan Luo
, Yuling Chen
:
Using User Behavior to Measure Privacy on Online Social Networks. IEEE Access 8: 108387-108401 (2020)
2010 – 2019
- 2019
- [j19]Hongliang Zhu
, Ying Yuan
, Yuling Chen, Yaxing Zha
, Wanying Xi, Bin Jia, Yang Xin:
A Secure and Efficient Data Integrity Verification Scheme for Cloud-IoT Based on Short Signature. IEEE Access 7: 90036-90044 (2019) - [j18]Kai Zhang
, Fei Zhao
, Shoushan Luo, Yang Xin, Hongliang Zhu
:
An Intrusion Action-Based IDS Alert Correlation Analysis and Prediction Framework. IEEE Access 7: 150540-150551 (2019) - [j17]Guangcan Yang
, Shoushan Luo, Hongliang Zhu
, Yang Xin, Ke Xiao
, Yuling Chen
, Mingzhen Li
, Yunfeng Wang:
A Mechanism to Improve Effectiveness and Privacy Preservation for Review Publication in LBS. IEEE Access 7: 156659-156674 (2019) - [j16]Yunfeng Wang, Mingzhen Li, Shoushan Luo, Yang Xin
, Hongliang Zhu
, Yuling Chen
, Guangcan Yang
, Yixian Yang
:
LRM: A Location Recombination Mechanism for Achieving Trajectory k-Anonymity Privacy Protection. IEEE Access 7: 182886-182905 (2019) - [j15]Qiang Zhou
, Ping Yan
, Huayi Liu, Yang Xin:
A hybrid fault diagnosis method for mechanical components based on ontology and signal analysis. J. Intell. Manuf. 30(4): 1693-1715 (2019) - [c15]Yang Xin:
The Design of Automatic Correction System for Spoken English Pronunciation Errors Based on Phonemes. DSA 2019: 247-254 - [c14]Yingying Xu, Zhi Liu, Yan-Miao Li, Yushuo Zheng, Haixia Hou, Mingcheng Gao, Yongsheng Song, Yang Xin:
Intrusion Detection Based on Fusing Deep Neural Networks and Transfer Learning. IFTC 2019: 212-223 - [c13]Shuangshuang Xu, Yang Xin, Hongliang Zhu, Shoushan Luo, Yuling Chen:
A Authentication and Access Authorization Mechanism on the PaaS Platform. SSCI 2019: 893-900 - 2018
- [j14]Yang Xin, Lingshuang Kong, Zhi Liu
, Chunhua Wang, Hongliang Zhu, Mingcheng Gao, Chensu Zhao, Xiaoke Xu:
Multimodal Feature-Level Fusion for Biometrics Identification System on IoMT Platform. IEEE Access 6: 21418-21426 (2018) - [j13]Yang Xin, Lingshuang Kong, Zhi Liu
, Yuling Chen, Yan-Miao Li, Hongliang Zhu, Mingcheng Gao, Haixia Hou, Chunhua Wang:
Machine Learning and Deep Learning Methods for Cybersecurity. IEEE Access 6: 35365-35381 (2018) - [j12]Yang Xin, Yankun Cao, Zhi Liu
, Yuling Chen, Lizhen Cui, Yaowen Zhu, Haixia Hou, Guangzhe Zhao
, Mingyu Wang:
Automatic Tongue Verification Based on Appearance Manifold Learning in Image Sequences for the Internet of Medical Things Platform. IEEE Access 6: 43885-43891 (2018) - [j11]Hongliang Zhu, Zhihua Zhang
, Juan Du, Shoushan Luo, Yang Xin:
Detection of selective forwarding attacks based on adaptive learning automata and communication quality in wireless sensor networks. Int. J. Distributed Sens. Networks 14(11) (2018) - [j10]Zhihua Zhang
, Shoushan Luo, Hongliang Zhu
, Yang Xin:
A Clone Detection Algorithm with Low Resource Expenditure for Wireless Sensor Networks. J. Sensors 2018: 4396381:1-4396381:16 (2018) - 2017
- [j9]Zhihua Zhang
, Hongliang Zhu, Shoushan Luo, Yang Xin, Xiaoming Liu:
Intrusion Detection Based on State Context and Hierarchical Trust in Wireless Sensor Networks. IEEE Access 5: 12088-12102 (2017) - [j8]Qiang Zhou
, Ping Yan
, Yang Xin:
Research on a knowledge modelling methodology for fault diagnosis of machine tools based on formal semantics. Adv. Eng. Informatics 32: 92-112 (2017) - [j7]Hai Zhao, Deng Cai, Yang Xin, Yuzhu Wang, Zhongye Jia:
A Hybrid Model for Chinese Spelling Check. ACM Trans. Asian Low Resour. Lang. Inf. Process. 16(3): 21:1-21:22 (2017) - [c12]Lingyun Wu, Yang Xin, Shengli Li, Tianfu Wang
, Pheng-Ann Heng
, Dong Ni:
Cascaded Fully Convolutional Networks for automatic prenatal ultrasound image segmentation. ISBI 2017: 663-666 - 2016
- [c11]Hongliang Zhu, Wenhan Liu, Jing Wang, Yang Xin:
Based on the character of cloud storage string encryption and cipher text retrieval of string research. CCIS 2016: 409-413 - 2014
- [j6]Yang Xin, Jia Jun Guo, Guo Li Juan:
The study of the stability analysis of the string damped system by time delay. IMA J. Math. Control. Inf. 31(2): 183-194 (2014) - [j5]Yi Xu, Yixian Yang, Yang Xin, Hongliang Zhu:
An Improved Directed Diffusion Protocol based on Opportunistic Routing. J. Networks 9(5): 1163-1168 (2014) - [j4]Chao Feng, Yang Xin, Hongliang Zhu, Yixian Yang:
A Weakly Homomorphic Encryption with LDN. J. Networks 9(6): 1464-1470 (2014) - [c10]Yang Xin, Hai Zhao, Yuzhu Wang, Zhongye Jia:
An Improved Graph Model for Chinese Spell Checking. CIPS-SIGHAN 2014: 157-166 - 2013
- [j3]Ting Han, Shoushan Luo, Hongliang Zhu, Yang Xin, Yong Peng:
A Novel Trust Evaluation Model Based on Grey Clustering Theory for Routing Networks. J. Comput. 8(11): 2743-2749 (2013) - [c9]Chen Hang, Sun Yi, Yang Xin, Benfu Lv:
A Study on Construction of Inflation Index based on Web Search Data . DCNET/ICE-B/OPTICS 2013: 336-343 - 2012
- [j2]Udantha R. Abeyratne
, Yang Xin:
An inverse technique for excitation design in nerve fascicle activation: a theoretical study. Int. J. Medical Eng. Informatics 4(2): 184-195 (2012) - [j1]Jianyi Zhang, Yangxi Ou, Dan Li, Yang Xin:
A Prior-based Transfer Learning Method for the Phishing Detection. J. Networks 7(8): 1201-1207 (2012) - [c8]Yang Xin, Benfu Lv, Sun Yi, Geng Peng:
An Impact Analysis of Emergency Event on Stock Market Based on Web Search Data: A Case from 723 Yongwen Railway Accident. Web Intelligence/IAT Workshops 2012: 34-38 - 2011
- [c7]Bin Zhang, Yang Xin, Xinxin Niu, Kaiguo Yuan, Bin Zhang:
An Anti-JPEG Compression Image Perceptual Hashing Algorithm. ICAIC (2) 2011: 397-406 - [c6]Yang Xin, Fen Xu, Hongliang Zhu:
Some results on preserving K-member simply separable relations in partial K-valued logic. ICDIP 2011: 80091I - [c5]Tao Geng, Shoushan Luo, Yang Xin, Xiaofeng Du, Yixian Yang:
Research on Secure Multi-party Computational Geometry. ICICA (LNCS) 2011: 322-329 - 2010
- [c4]Bin Zhang, Yang Xin, Xinxin Niu, Kaiguo Yuan, Hui-Bai Jiang:
A near reversible image watermarking algorithm. ICMLC 2010: 2824-2828 - [c3]Yang Yi, Mengyin Fu, Yang Xin, Guangming Xiong, Jianwei Gong:
Autonomous ground vehicle navigation method in complex environment. Intelligent Vehicles Symposium 2010: 1060-1065
2000 – 2009
- 2009
- [c2]Wen Long, Yang Xin, Yixian Yang:
Vulnerabilities Analyzing Model for Alert Correlation in Distributed Environment. SSME 2009: 408-411 - 2002
- [c1]Udantha R. Abeyratne, Yang Xin:
Selective stimulation of nerve fascicles in neuroprosthetic systems. ICARCV 2002: 584-589
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2021-01-13 02:19 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint