


Остановите войну!
for scientists:


default search action
Jinyan Wang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j44]Chang Liu, Jinyan Wang, Rui Xia
:
Node importance evaluation in multi-platform avionics architecture based on TOPSIS and PageRank. EURASIP J. Adv. Signal Process. 2023(1): 27 (2023) - [j43]Quanmin Wei, Jinyan Wang
, Xingcheng Fu, Jun Hu, Xianxian Li:
AIC-GNN: Adversarial information completion for graph neural networks. Inf. Sci. 626: 166-179 (2023) - [j42]Jinyan Wang, Fangjing Wu:
New hybrid support vector regression methods for predicting fresh and hardened properties of self-compacting concrete. J. Intell. Fuzzy Syst. 44(1): 283-297 (2023) - 2022
- [j41]Jingli Wu
, Kai Zhu, Gaoshi Li, Jinyan Wang, Qirong Cai:
A model and algorithm for identifying driver pathways based on weighted non-binary mutation matrix. Appl. Intell. 52(1): 127-140 (2022) - [j40]Jiawen Qin, Jinyan Wang
, Qiyu Li, Shijian Fang, Xianxian Li, Lei Lei
:
Differentially private frequent episode mining over event streams. Eng. Appl. Artif. Intell. 110: 104681 (2022) - [j39]Mingjun Li, Zhihao Cai, Jiang Zhao
, Jinyan Wang, Yingxun Wang:
Disturbance rejection and high dynamic quadrotor control based on reinforcement learning and supervised learning. Neural Comput. Appl. 34(13): 11141-11161 (2022) - [j38]Quanmin Wei, Jinyan Wang
, Jun Hu, Xianxian Li, Tong Yi:
OGT: optimize graph then training GNNs for node classification. Neural Comput. Appl. 34(24): 22209-22222 (2022) - [j37]De Li, Jinyan Wang
, Qiyu Li, Yuhang Hu, Xianxian Li:
A privacy preservation framework for feedforward-designed convolutional neural networks. Neural Networks 155: 14-27 (2022) - [j36]Shuchang Guo
, Jinyan Wang
, Ruhui Gan
, Zhida Yang, Yi Yang
:
Experimental Study of Cloud-to-Ground Lightning Nowcasting with Multisource Data Based on a Video Prediction Method. Remote. Sens. 14(3): 604 (2022) - [j35]Jinyan Wang
, Shixiang Su
, Zelun Yin, Caixia Sun
, Xiangshan Xie
, Tianyu Wang, Dilinuer Yasheng, Jinche Chen, Xin Zhang, Yi Yang
:
Quantitatively Assessing the Contributions of Dust Aerosols to Direct Radiative Forcing Based on Remote Sensing and Numerical Simulation. Remote. Sens. 14(3): 660 (2022) - [j34]Jinyan Wang
, Guangquan Xu
, Wenqing Lei
, Lixiao Gong
, Xi Zheng
, Shaoying Liu
:
CPFL: An Effective Secure Cognitive Personalized Federated Learning Mechanism for Industry 4.0. IEEE Trans. Ind. Informatics 18(10): 7186-7195 (2022) - [c20]Yuecen Wei, Xingcheng Fu
, Qingyun Sun, Hao Peng, Jia Wu, Jinyan Wang, Xianxian Li:
Heterogeneous Graph Neural Network for Privacy-Preserving Recommendation. ICDM 2022: 528-537 - [c19]De Li, Hongyan Zheng, Zeming Gan, Xianxian Li, Jinyan Wang:
A Green Neural Network with Privacy Preservation and Interpretability. TrustCom 2022: 606-614 - [i2]Yuecen Wei, Xingcheng Fu, Qingyun Sun, Hao Peng, Jia Wu, Jinyan Wang, Xianxian Li:
Heterogeneous Graph Neural Network for Privacy-Preserving Recommendation. CoRR abs/2210.00538 (2022) - 2021
- [j33]Chenhui Xiao, Zhenzhou Li, Jianfeng Lu, Jinyan Wang, Haoteng Zheng, Zuyue Bi, Mengyang Chen, Rui Mao, Minhua Lu:
A new deep learning method for displacement tracking from ultrasound RF signals of vascular walls. Comput. Medical Imaging Graph. 87: 101819 (2021) - [j32]Jingli Wu, Jifan Yang, Gaoshi Li, Jinyan Wang
:
IDM-SPS: Identifying driver module with somatic mutation, PPI network and subcellular localization. Eng. Appl. Artif. Intell. 106: 104482 (2021) - [j31]Xianxian Li, Jing Liu, Songfeng Liu, Jinyan Wang:
Differentially private ensemble learning for classification. Neurocomputing 430: 34-46 (2021) - [j30]Jinhuan Duan, Xianxian Li
, Shiqi Gao, Zili Zhong, Jinyan Wang
:
SSGD: A Safe and Efficient Method of Gradient Descent. Secur. Commun. Networks 2021: 5404061:1-5404061:11 (2021) - [j29]Yiming Zhang
, Dong Sheng Li, Chengfei Zhang, Jinyan Wang, Ling Liu:
GraphA: Efficient Partitioning and Storage for Distributed Graph Computation. IEEE Trans. Serv. Comput. 14(1): 155-166 (2021) - [c18]Lishuai Zong, Xiuli Liu, Bo Yuan, Haoran Liu, Jinyan Wang, Xigao Jian:
Synthesis and Properties of Multi-fluorated Polyaryl Ether Dielectric Inks for 3D Printing. AIAM (ACM) 2021: 672-677 - [c17]Xiaohong Liu, Hanbo Cai, De Li, Xianxian Li, Jinyan Wang:
Differential Privacy Preservation in Adaptive K-Nets Clustering. TrustCom 2021: 405-412 - [c16]Yuhang Hu, De Li, Zhou Tan, Xianxian Li, Jinyan Wang:
Adaptive Clipping Bound of Deep Learning with Differential Privacy. TrustCom 2021: 428-435 - 2020
- [j28]Qing Zhou, Jinyan Wang
, Guoquan Zhang, Keqing Guo, Xinye Cai
, Lisong Wang
, Yuhua Huang:
A Two-Phase Multiobjective Local Search for the Device Allocation in the Distributed Integrated Modular Avionics. IEEE Access 8: 1-10 (2020) - [j27]Bin Du, Jinyan Wang, Haoteng Zheng, Chenhui Xiao, Siyuan Fang, Minhua Lu, Rui Mao:
A novel transcranial ultrasound imaging method with diverging wave transmission and deep learning approach. Comput. Methods Programs Biomed. 186: 105308 (2020) - [j26]Jian Gao
, Jinyan Wang, Kuixian Wu, Rong Chen:
Solving quantified constraint satisfaction problems with value selection rules. Frontiers Comput. Sci. 14(5): 145317 (2020) - [j25]Jinyan Wang, Shijian Fang, Chen Liu, Jiawen Qin, Xianxian Li, Zhenkui Shi:
Top-k closed co-occurrence patterns mining with differential privacy over multiple streams. Future Gener. Comput. Syst. 111: 339-351 (2020) - [j24]Peiju Chang, Jiangshe Zhang, Jinyan Wang, Rongrong Fei:
ELMAENet: A Simple, Effective and Fast Deep Architecture for Image Classification. Neural Process. Lett. 51(1): 129-146 (2020) - [j23]Yiming Zhang
, Haonan Wang, Menghan Jia, Jinyan Wang, Dong Sheng Li, Guangtao Xue, Kian-Lee Tan
:
TopoX: Topology Refactorization for Minimizing Network Communication in Graph Computations. IEEE/ACM Trans. Netw. 28(6): 2768-2782 (2020) - [c15]Hanbo Cai, Jinyan Wang, Xiaohong Liu, Xianxian Li:
DP-AP: Differential Privacy-Preserving Affinity Propagation Clustering. BigDataSE 2020: 73-79 - [c14]De Li, Yuhang Hu, Jinyan Wang:
SLFB-CNN: An interpretable neural network privacy protection framework. CIS 2020: 298-302 - [c13]De Li, Jinyan Wang, Zhou Tan, Xianxian Li, Yuhang Hu:
Differential Privacy Preservation in Interpretable Feedforward-Designed Convolutional Neural Networks. TrustCom 2020: 631-638 - [i1]Jinhuan Duan, Xianxian Li, Shiqi Gao, Jinyan Wang, Zili Zhong:
SSGD: A safe and efficient method of gradient descent. CoRR abs/2012.02076 (2020)
2010 – 2019
- 2019
- [j22]Jingli Wu, Qirong Cai, Jinyan Wang, Yuanxiu Liao:
Identifying mutated driver pathways in cancer by integrating multi-omics data. Comput. Biol. Chem. 80: 159-167 (2019) - [j21]Jinyan Wang, Chen Liu, Xingcheng Fu
, Xudong Luo, Xianxian Li:
A three-phase approach to differentially private crucial patterns mining over data streams. Comput. Secur. 82: 30-48 (2019) - [j20]Zhenjun Tang
, Shijie Xu
, Dengpan Ye, Jinyan Wang, Xianquan Zhang, Chuanqiang Yu:
Real-time reversible data hiding with shifting block histogram of pixel differences in encrypted image. J. Real Time Image Process. 16(3): 709-724 (2019) - [j19]Jiaqi Tang, Jingli Wu, Yuanxiu Liao, Jinyan Wang:
基于双加权投票的蛋白质功能预测 (Prediction of Protein Functions Based on Bi-weighted Vote). 计算机科学 46(4): 222-227 (2019) - [j18]Jinyan Wang, Kai Du, Xudong Luo, Xianxian Li:
Two privacy-preserving approaches for data publishing with identity reservation. Knowl. Inf. Syst. 60(2): 1039-1080 (2019) - [j17]Dongsheng Li, Yiming Zhang, Jinyan Wang, Kian-Lee Tan
:
TopoX: Topology Refactorization for Efficient Graph Partitioning and Processing. Proc. VLDB Endow. 12(8): 891-905 (2019) - [c12]Jinyan Wang, Bo Chen:
A Multi-agent Simulation for the Research on the Market Equilibrium Phenomena Using Q-Network Algorithm. ICCT 2019: 356-361 - 2018
- [j16]Jinyan Wang
, Chaoji Deng, Xianxian Li:
Two Privacy-Preserving Approaches for Publishing Transactional Data Streams. IEEE Access 6: 23648-23658 (2018) - [j15]Shanliang Zhong, Jinyan Wang, Qian Zhang, Hanzi Xu, Jifeng Feng
:
CircPrimer: a software for annotating circRNAs and determining the specificity of circRNA primers. BMC Bioinform. 19(1): 292:1-292:5 (2018) - [j14]Christian Chiarcos
, Ilya Khait, Émilie Pagé-Perron
, Niko Schenk, Jayanth, Christian Fäth, Julius Steuer, William McGrath, Jinyan Wang:
Annotating a Low-Resource Language with LLOD Technology: Sumerian Morphology and Syntax. Inf. 9(11): 290 (2018) - [j13]Jinyan Wang
, Guoqing Cai, Chen Liu, Jingli Wu, Xianxian Li:
A Multi-Level Privacy-Preserving Approach to Hierarchical Data Based on Fuzzy Set Theory. Symmetry 10(8): 333 (2018) - [c11]Xiaomei Liu, Suqin Tang, Jinyan Wang:
Generative Adversarial Graph Representation Learning in Hyperbolic Space. CCIR 2018: 119-131 - [c10]Jingli Wu, Yong Wu, Jinyan Wang, Yutong Ye:
A Parthenogenetic Algorithm for Deploying the Roadside Units in Vehicle Networks. KSEM (2) 2018: 78-85 - 2017
- [j12]Jinyan Wang, Minghao Yin, Jingli Wu:
Two approximate algorithms for model counting. Theor. Comput. Sci. 657: 28-37 (2017) - [c9]Dongsheng Li, Chengfei Zhang, Jinyan Wang, Zhaoning Zhang, Yiming Zhang:
GraphA: Adaptive Partitioning for Natural Graphs. ICDCS 2017: 2358-2365 - [c8]Jinyan Wang, Chengfei Zhang:
Analysis and Evaluation of the GAS Model for Distributed Graph Computation. ICDCS Workshops 2017: 283-285 - [c7]Hangyu Guo, Jinyan Wang, Minyang Kang, Guojing Xu:
A method of distributed avionics data processing based on SVM classifier. MIPPR 2017: 106110V - 2016
- [j11]Jinyan Wang, Yanni Xiao, Zhihang Peng:
Modelling seasonal HFMD infections with the effects of contaminated environments in mainland China. Appl. Math. Comput. 274: 615-627 (2016) - [j10]Jinyan Wang, Yanni Xiao, Robert A. Cheke
:
Modelling the effects of contaminated environments on HFMD infections in mainland China. Biosyst. 140: 1-7 (2016) - 2015
- [c6]Jinyan Wang, Minghao Yin, Jingli Wu:
Approximate Model Counting via Extension Rule. FAW 2015: 229-240 - 2013
- [j9]Jinyan Wang:
Corrigendum to "Notes on: 'Interval-valued intuitionistic fuzzy soft sets and their properties' [Comput. Math. Appl. 60(2010) 906-918]" [Comput. Math. Appl. 64 (2012) 2954-2960]. Comput. Math. Appl. 65(4): 745-746 (2013) - [j8]Jinyan Wang, Minghao Yin
, Wenxiang Gu:
Fuzzy multiset finite automata and their languages. Soft Comput. 17(3): 381-390 (2013) - 2012
- [j7]Jinyan Wang, Jianming Zhan, Wenxiang Gu:
Some new results on soft hypermodules. Ars Comb. 104: 289-306 (2012) - [j6]Jinyan Wang, Minghao Yin
, Wenxiang Gu:
Notes on: "Interval-valued intuitionistic fuzzy soft sets and their properties" [Comput. Math. Applications 60 (2010) 906-918]. Comput. Math. Appl. 64(9): 2954-2960 (2012) - [j5]Junping Zhou, Minghao Yin
, Xiangtao Li, Jinyan Wang:
Phase Transitions of EXPSPACE-Complete Problems: a Further Step. Int. J. Found. Comput. Sci. 23(1): 173-184 (2012) - [j4]Zhihua Dong, Jinyan Wang, Cheng P. Wen, Shenghou Liu, Rumin Gong, Min Yu, Yilong Hao, Fujun Xu, Bo Shen, Yangyuan Wang:
High temperature induced failure in Ti/Al/Ni/Au Ohmic contacts on AlGaN/GaN heterostructure. Microelectron. Reliab. 52(2): 434-438 (2012) - [c5]Jinyan Wang:
The Existence of Nonoscillatory of a Third-Order Quasilinear Ordinary Differential Equation. ICSI (2) 2012: 482-488 - 2011
- [j3]Xiangtao Li, Jinyan Wang, Junping Zhou, Minghao Yin
:
A perturb biogeography based optimization with mutation for global numerical optimization. Appl. Math. Comput. 218(2): 598-609 (2011) - [j2]Jinyan Wang, Minghao Yin
, Wenxiang Gu:
Soft polygroups. Comput. Math. Appl. 62(9): 3529-3537 (2011) - 2010
- [c4]Wei Wang, Jinyan Wang, Chengxi Wang, Dongbing Pu:
A Novel Watermarking Algorithm Based on Phase Congruency Corner Detection and SVD. FCST 2010: 527-531 - [c3]Chongchong Yu, Jia Zhang, Li Tan, Jinyan Wang:
Distortion data research of bridge structure health monitoring based on LS-SVM classification. ICIS 2010: 118-123 - [c2]Ying Li, Shenglin Ma, Yufeng Jin, Min Yu, Lu Zhang, Jinyan Wang:
Fabrication and characterization of ultra-thin PIN detector. NEMS 2010: 513-517
2000 – 2009
- 2007
- [c1]Ji-Li Yin, Ying Liu, Jinyan Wang, Wenxiang Gu, Yin-Ping Zhang:
A Recognition Approach for Adversarial Planning Based on Complete Goal Graph. CIS 2007: 286-290 - 2003
- [j1]Ru Huang, Jinyan Wang, Jin He, Min Yu, Xing Zhang, Yangyuan Wang:
Hot carrier degradation behavior in SOI dynamic-threshold-voltage nMOSFET's (n-DTMOSFET) measured by gated-diode configuration. Microelectron. Reliab. 43(5): 707-711 (2003)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2023-03-30 01:42 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint