default search action
Yichuan Wang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j76]Chih Hao Ku, Yung-Chun Chang, Yichuan Wang:
How to strategically respond to online hotel reviews: A strategy-aware deep learning approach. Inf. Manag. 61(5): 103970 (2024) - [j75]Hanchi Ren, Jingjing Deng, Xianghua Xie, Xiaoke Ma, Yichuan Wang:
FedBoosting: Federated learning with gradient protected boosting for text recognition. Neurocomputing 569: 127126 (2024) - [j74]Bin Ren, Yunlong Tang, Huan Wang, Yichuan Wang, Jianxiong Liu, Ge Gao, Wei Wei:
A Multiagent Deep Reinforcement Learning Autonomous Security Management Approach for Internet of Things. IEEE Internet Things J. 11(15): 25600-25612 (2024) - [j73]Yichuan Wang, Yanhua Feng, Yeqiu Xiao, Xiaoxue Liu, Xinhong Hei:
Privacy Block-Streaming: A Novel DEX File Loading Scheme Based on Federated Learning. J. Inf. Sci. Eng. 40(1): 27-39 (2024) - [j72]Yichuan Wang, Chengcheng Zhao, Zhiguo Shi:
Adaptive Online Neural Predictive Control of Hydraulic Actuator Using FPGA Acceleration. IEEE Trans. Ind. Electron. 71(4): 3924-3934 (2024) - [c93]Kuan Cheng, Yichuan Wang:
BPL ⊆ L-AC¹. CCC 2024: 32:1-32:14 - [c92]Yichuan Wang, Yiran Su:
Introduction to the Minitrack on Generative AI and AI-generated Contents on Social Media. HICSS 2024: 2714-2715 - [c91]Yibai Li, Xuefei Deng, Yichuan Wang:
Introduction to the Minitrack on The Technical, Socio-Economic, and Ethical Aspects of AI. HICSS 2024: 5574-5575 - [i5]Renjie Liu, Yichuan Wang, Xiao Yan, Zhenkun Cai, Minjie Wang, Haitian Jiang, Bo Tang, Jinyang Li:
DiskGNN: Bridging I/O Efficiency and Model Accuracy for Out-of-Core GNN Training. CoRR abs/2405.05231 (2024) - [i4]Yichuan Wang, Yang Liu, Yu Yan, Qun Wang, Xucheng Huang, Ling Jiang:
Xmodel-LM Technical Report. CoRR abs/2406.02856 (2024) - [i3]Yichuan Wang:
Tight Streaming Lower Bounds for Deterministic Approximate Counting. CoRR abs/2406.12149 (2024) - [i2]Kuan Cheng, Yichuan Wang:
$BPL\subseteq L-AC^1$. Electron. Colloquium Comput. Complex. TR24 (2024) - [i1]Gil Cohen, Dean Doron, Tomer Manket, Edward Pyne, Yichuan Wang, Tal Yankovitz:
A Study of Error Reduction Polynomials. Electron. Colloquium Comput. Complex. TR24 (2024) - 2023
- [j71]Xiaoxue Liu, Yichuan Wang, Yanping Li, Hao Cao:
PTAP: A novel secure privacy-preserving & traceable authentication protocol in VANETs. Comput. Networks 226: 109643 (2023) - [j70]Wenhao Du, Zhigang Ren, An Chen, Hanqing Liu, Yichuan Wang, Haoxi Leng:
A multimodal evolutionary algorithm with multi-niche cooperation. Expert Syst. Appl. 219: 119668 (2023) - [j69]Wei Chen, Yichuan Wang, Yeqiu Xiao, Xinhong Hei:
Explore the potential of deep learning and hyperchaotic map in the meaningful visual image encryption scheme. IET Image Process. 17(11): 3235-3257 (2023) - [j68]Jun Zhang, Shuyang Li, Yichuan Wang:
Shaping a Smart Transportation System for Sustainable Value Co-Creation. Inf. Syst. Frontiers 25(1): 365-380 (2023) - [j67]Yogesh K. Dwivedi, Nir Kshetri, Laurie Hughes, Nripendra P. Rana, Abdullah M. Baabdullah, Arpan Kumar Kar, Alex Koohang, Samuel Ribeiro-Navarrete, Nina Belei, Janarthanan Balakrishnan, Sriparna Basu, Abhishek Behl, Gareth H. Davies, Vincent Dutot, Rohita Dwivedi, Leighton Evans, Reto Felix, Richard Foster-Fletcher, Mihalis Giannakis, Ashish Gupta, Chris Hinsch, Animesh Jain, Nina Jane Patel, Timothy Jung, Satinder Juneja, Qeis Kamran, Sanjar Mohamed AB, Neeraj Pandey, Savvas Papagiannidis, Ramakrishnan Raman, Philipp A. Rauschnabel, Preeti Tak, Alexandra Taylor, M. Claudia tom Dieck, Giampaolo Viglia, Yichuan Wang, Meiyi Yan:
Exploring the Darkverse: A Multi-Perspective Analysis of the Negative Societal Impacts of the Metaverse. Inf. Syst. Frontiers 25(5): 2071-2114 (2023) - [j66]Uthayasankar Sivarajah, Yichuan Wang, Hossein Olya, Sherin Mathew:
Responsible Artificial Intelligence (AI) for Digital Health and Medical Analytics. Inf. Syst. Frontiers 25(6): 2117-2122 (2023) - [j65]Wei Wang, Long Chen, Mengran Xiong, Yichuan Wang:
Accelerating AI Adoption with Responsible AI Signals and Employee Engagement Mechanisms in Health Care. Inf. Syst. Frontiers 25(6): 2239-2256 (2023) - [j64]Huimin Lu, Yichuan Wang, Yujie Li:
Introduction to meta learning for internet of multimedia things. Int. J. Mach. Learn. Cybern. 14(2): 361-362 (2023) - [j63]Yu Han, Liumei Zhang, Yichuan Wang, Xi Deng, Zhendong Gu, Xiaohui Zhang:
Research on the Security of IPv6 Communication Based on Petri Net under IoT. Sensors 23(11): 5192 (2023) - [j62]Dan Wang, Ju Ren, Zhibo Wang, Yichuan Wang, Yaoxue Zhang:
PrivAim: A Dual-Privacy Preserving and Quality-Aware Incentive Mechanism for Federated Learning. IEEE Trans. Computers 72(7): 1913-1927 (2023) - [j61]Mingyang Yuan, Yang Xu, Cheng Zhang, Yunlin Tan, Yichuan Wang, Ju Ren, Yaoxue Zhang:
TRUCON: Blockchain-Based Trusted Data Sharing With Congestion Control in Internet of Vehicles. IEEE Trans. Intell. Transp. Syst. 24(3): 3489-3500 (2023) - [c90]Yichuan Wang, Jingjing Zhao, Yaling Zhang, Xinhong Hei, Lei Zhu:
Smart Contract Symbol Execution Vulnerability Detection Method Based on CFG Path Pruning. BSCI 2023: 132-139 - [c89]Mingyuan Li, Yichuan Wang, Junfeng Huang, Erick Purwanto, Ka Lok Man:
Patch-Based Multi-Level Attention Mechanism for Few-Shot Multi-Label Medical Image Classification. CyberC 2023: 84-91 - [c88]Yichuan Wang, Yibai Li, Xuefei Deng:
Introduction to the Minitrack on The Technical, Socio-Economic, and Ethical Aspects of AI. HICSS 2023: 4921-4922 - [c87]Jianping Zhao, Huan Wang, Yichuan Wang, Hua Li, Yan Wang:
Cross-Level Network Security Element Fusion Extraction Method Based on Deep Learning. ICCSIE 2023: 247-254 - [c86]Changming Xu, Yichuan Wang, Qilei Zhou, Dongnian Wang, Hechao Dong, Junwei Wang:
Feature learning model based on Feature space constraints and Self-Attention learning. ICMLCA 2023: 950-954 - [c85]Tong Zhang, Wei Wei, Yichuan Wang, Xi Deng, Lei Zhu, Wenjiang Ji:
Formal Modeling and Defense Methods for 5G Network Endpoint Access Denial of Service Attacks. NaNA 2023: 72-77 - [c84]Weigang Ma, Yichuan Wang, Dengfang Hu, Zhoukai Wang:
E-PBFT: An Improved Consensus Mechanism Based on PBFT. NaNA 2023: 143-149 - [c83]Yaling Zhang, Jingjing Chen, Yichuan Wang, Yeqiu Xiao, Xiaoxue Liu:
A Novel On-Demand Service Architecture for Efficient Cloud-Edge Collaboration. NaNA 2023: 169-174 - [c82]Yichuan Wang, Jianhuan Tie, Xinhong Hei, Li Zhao, Xiaohui Zhang:
A Trusted Privacy-Preserving Model for Cross-Chain Transactions Based on zk_SNARKs. NaNA 2023: 187-192 - [c81]Weigang Ma, Yaping Yu, Yichuan Wang, Xiaoxue Liu, Zhoukai Wang:
A Pseudonym Exchange-Based Traceable Location Privacy Protection Scheme for IoV. NaNA 2023: 287-292 - [c80]Wenjiang Ji, Yixin Yang, Yaling Zhang, Yichuan Wang, Mengjie Tian, Yuan Qiu:
DDoS Attack Detection Based on Information Entropy Feature Extraction in Software Defined Networks. NaNA 2023: 459-464 - [c79]Lei Zhu, Miaoqing Wen, Tong Zhang, Yichuan Wang, Jing Wang, Mingsong Yang, Bing Ma:
A Text Classification Method of Network Public Opinion Based on Information Fusion. NaNA 2023: 484-489 - [c78]Weihao Cui, Zhenhua Han, Lingji Ouyang, Yichuan Wang, Ningxin Zheng, Lingxiao Ma, Yuqing Yang, Fan Yang, Jilong Xue, Lili Qiu, Lidong Zhou, Quan Chen, Haisheng Tan, Minyi Guo:
Optimizing Dynamic Neural Networks with Brainstorm. OSDI 2023: 797-815 - [c77]Yichuan Wang, Yibin Ma, Junxia Ding, Xiang Sun, Dan Wu, Xinhong Hei:
Hearing Cyber-Attacks: A Novel Model for Bridging Network Security Situation and Music. SSPS 2023: 63-70 - 2022
- [j60]Wei Lu, Zhan Meng, Yichuan Wang, Yu Wang, Yunkai Zhai:
Supply-demand matching in a complex telemedicine environment considering intermediary intervention. Comput. Ind. Eng. 169: 108194 (2022) - [j59]Shuai Luo, Yujie Li, Pengxiang Gao, Yichuan Wang, Seiichi Serikawa:
Meta-seg: A survey of meta-learning for image segmentation. Pattern Recognit. 126: 108586 (2022) - [j58]Xi Deng, Liumei Zhang, Yichuan Wang, Fanzhi Jiang:
Modeling Analysis of SM2 Construction Attacks in the Open Secure Sockets Layer Based on Petri Net. Sensors 22(4): 1398 (2022) - [j57]Yichuan Wang, Rui Fan, Xiaolong Liang, Pengge Li, Xinhong Hei:
Trusted Data Storage Architecture for National Infrastructure. Sensors 22(6): 2318 (2022) - [j56]Mengyang Li, Xinhong Hei, Wenjiang Ji, Lei Zhu, Yichuan Wang, Yuan Qiu:
A Fault-Diagnosis Method for Railway Turnout Systems Based on Improved Autoencoder and Data Augmentation. Sensors 22(23): 9438 (2022) - [j55]Mengxiao Song, Danfeng Zhou, Peichang Yu, Yukai Zhao, Yichuan Wang, Yiqiu Tan, Jie Li:
Analytical Calculation and Experimental Verification of Superconducting Electrodynamic Suspension System Using Null-Flux Ground Coils. IEEE Trans. Intell. Transp. Syst. 23(9): 14978-14989 (2022) - [c76]Yibai Li, Yichuan Wang, Xuefei Deng:
Introduction to the Minitrack on The Technical, Socio-Economic, and Ethical Aspects of AI. HICSS 2022: 1-2 - [c75]Yundi Guo, Qianyuan Tang, Yichuan Wang, Ju Ren:
FDQM: Four-Dimensional Quantitative Measure for Statistical Heterogeneity in Federated Learning. ICCC 2022: 956-961 - [c74]Hongjie You, Hu Chen, Yichuan Wang, Kai Cui, Eckehard G. Steinbach:
CNN-Based Local Tone Mapping in the Perceptual Quantization Domain. ICIP 2022: 1566-1570 - [c73]Yichuan Wang, Rui Fan, Xinyue Yin, Xinhong Hei:
Trusted Storage Architecture for Machine Reasoning based on Blockchain. INFOCOM Workshops 2022: 1-6 - [c72]Yichuan Wang, Yanhua Feng, Yanning Du, Xinhong Hei, Yuying Tian, Xiangjie Cui:
Block-Streaming Service Loading Optimization of Android Dalvik Executable File for Cloud-End Collaboration. NaNA 2022: 1-6 - [c71]Yeqiu Xiao, Yichuan Wang, Wenjiang Ji, Lei Zhu, Xinhong Hei:
Effective Secrecy Throughput Analysis for Communication Systems with a DF Satellite Relay. NaNA 2022: 1-5 - [c70]Tong Zhang, Xiangjie Cui, Yichuan Wang, Yanning Du, Wen Gao:
TCS Security Analysis in Intel SGX Enclave MultiThreading. NaNA 2022: 276-281 - [c69]Liumei Zhang, Yu Han, Yichuan Wang, Ruiqin Quan:
Petri Net Model of MITM Attack Based on NDP Protocol. NaNA 2022: 402-405 - 2021
- [j54]Mina Tajvidi, Yichuan Wang, Nick Hajli, Peter E. D. Love:
Brand value Co-creation in social commerce: The role of interactivity, social support, and relationship quality. Comput. Hum. Behav. 115: 105238 (2021) - [j53]Yusheng Cheng, Kai Ma, Haitao Li, Shilin Sun, Yichuan Wang:
Spectral line extraction based on ant-colony algorithm. EURASIP J. Adv. Signal Process. 2021(1): 113 (2021) - [j52]Yichuan Wang, Binbin Bai, Xinhong Hei, Lei Zhu, Wenjiang Ji:
An unknown protocol syntax analysis method based on convolutional neural network. Trans. Emerg. Telecommun. Technol. 32(5) (2021) - [j51]Yogesh K. Dwivedi, Elvira Ismagilova, David Laurie Hughes, Jamie Carlson, Raffaele Filieri, Jenna Jacobson, Varsha Jain, Heikki Karjaluoto, Hajer Kefi, Anjala S. Krishen, Vikram Kumar, Mohammad M. Rahman, Ramakrishnan Raman, Philipp A. Rauschnabel, Jennifer E. Rowley, Jari Salo, Gina A. Tran, Yichuan Wang:
Setting the future of digital and social media marketing research: Perspectives and research propositions. Int. J. Inf. Manag. 59: 102168 (2021) - [j50]Xuequn Wang, Yichuan Wang, Xiaolin Lin, Amjad Abdullat:
The dual concept of consumer value in social media brand community: A trust transfer perspective. Int. J. Inf. Manag. 59: 102319 (2021) - [j49]Runyue Han, Hugo K. S. Lam, Yuanzhu Zhan, Yichuan Wang, Yogesh K. Dwivedi, Kim Hua Tan:
Artificial intelligence in business-to-business marketing: a bibliometric analysis of current research status, development and future directions. Ind. Manag. Data Syst. 121(12): 2467-2497 (2021) - [j48]Nastaran Hajiheydari, Mohammad Soltani Delgosha, Yichuan Wang, Hossein Olya:
Exploring the paths to big data analytics implementation success in banking and financial service: an integrated approach. Ind. Manag. Data Syst. 121(12): 2498-2529 (2021) - [j47]Jun Zhang, Yichuan Wang, Shuyang Li, Shuaiyi Shi:
An Architecture for IoT-Enabled Smart Transportation Security System: A Geospatial Approach. IEEE Internet Things J. 8(8): 6205-6213 (2021) - [j46]Wenjiang Ji, Chen Cheng, Guo Xie, Lei Zhu, Yichuan Wang, Long Pan, Xinhong Hei:
An intelligent fault diagnosis method based on curve segmentation and SVM for rail transit turnout. J. Intell. Fuzzy Syst. 41(3): 4275-4285 (2021) - [j45]Yichuan Wang, Xiaolong Liang, Xinhong Hei, Wenjiang Ji, Lei Zhu:
Deep Learning Data Privacy Protection Based on Homomorphic Encryption in AIoT. Mob. Inf. Syst. 2021: 5510857:1-5510857:11 (2021) - [j44]Yunkai Zhai, Xing Xu, BaoZhan Chen, Huimin Lu, Yichuan Wang, Shuyang Li, Xiaobing Shi, Wenchao Wang, Lanlan Shang, Jie Zhao:
5G-Network-Enabled Smart Ambulance: Architecture, Application, and Evaluation. IEEE Netw. 35(1): 190-196 (2021) - [j43]Yichuan Wang, Han Yu, Xinhong Hei, Binbin Bai, Wenjiang Ji:
From Unknown to Similar: Unknown Protocol Syntax Analysis for Network Flows in IoT. Secur. Commun. Networks 2021: 9179286:1-9179286:13 (2021) - [j42]Xing Xu, Jingran Zhang, Yujie Li, Yichuan Wang, Yang Yang, Heng Tao Shen:
Adversarial Attack Against Urban Scene Segmentation for Autonomous Vehicles. IEEE Trans. Ind. Informatics 17(6): 4117-4126 (2021) - [j41]Yichuan Wang, Yuying Tian, Xinhong Hei, Lei Zhu, Wenjiang Ji:
A Novel IoV Block-Streaming Service Awareness and Trusted Verification Scheme in 6G. IEEE Trans. Veh. Technol. 70(6): 5197-5210 (2021) - [c68]Yichuan Wang, Yibai Li, Xuefei (Nancy) Deng:
Introduction to the Minitrack on The Technical, Socio-Economic and Ethical Aspects of AI. HICSS 2021: 1-2 - [c67]Yichuan Wang, He Wang, Xinhong Hei, Wenjiang Ji, Lei Zhu:
Petri net modeling and vulnerability analysis of the Heartbleed. NaNA 2021: 155-160 - [c66]Guiling Zhang, Yaling Zhang, Yichuan Wang, Lei Zhu, Wenjiang Ji:
A fine-grained petri model for SQL time-blind injection. NaNA 2021: 161-167 - [c65]Xin Song, Yichuan Wang, Lei Zhu, Wenjiang Ji, Yanning Du, Feixiong Hu:
A Method for Fast Outlier Detection in High Dimensional Database Log. NaNA 2021: 236-241 - [c64]Liumei Zhang, Xi Deng, Yichuan Wang:
Shellshock Bash Vulnerability Modeling Analysis Based on Petri Net. NaNA 2021: 242-247 - [c63]Jianxin Ji, Chunli Xia, Tong Zhang, Yichuan Wang, Sheng Liu:
Research on A Vulnerability Detection Technology for Network Topology Security. NaNA 2021: 334-337 - [c62]Xiaoyan Zhu, Yu Zhang, Lei Zhu, Xinhong Hei, Yichuan Wang, Feixiong Hu, Yanni Yao:
Chinese named entity recognition method for the field of network security based on RoBERTa. NaNA 2021: 420-425 - [c61]Yaling Zhang, Hongyun Wang, Yichuan Wang, Wenjiang Ji, Lei Zhu:
Signature Scheme Based on The SM2 Algorithm in Fabric. NaNA 2021: 443-448 - [c60]Lei Zhu, Ziheng Zhang, Xinhong Hei, Yichuan Wang, Ziliang Yang, Feixiong Hu, Ping He:
A permission generation and configuration method based on Rules and FP-Growth algorithm. NaNA 2021: 495-500 - [c59]Xinhong Hei, Hao Zhang, Wenjiang Ji, Yichuan Wang, Lei Zhu, Yuan Qiu:
ConvCatb: An Attention-based CNN-CATBOOST Risk Prediction Model for Driving Safety. NaNA 2021: 513-519 - [c58]Wenjiang Ji, Jiangcheng Yang, Yichuan Wang, Lei Zhu, Yuan Qiu, Xinhong Hei:
A Driving Risk Prediction Approach Based on Generative Adversarial Networks and VANET for Autonomous Trams. NaNA 2021: 520-526 - [c57]Yichuan Wang, Xiaolong Liang, Xinhong Hei, Lei Zhu, Wenjiang Ji:
A Heuristic SAT Problems Solving Method based on LSTM Network. PAAP 2021: 141-145 - 2020
- [j40]Yichuan Wang, Yuying Tian, Xinyue Yin, Xinhong Hei:
A trusted recommendation scheme for privacy protection based on federated learning. CCF Trans. Netw. 3(3-4): 218-228 (2020) - [j39]Chia-Hui Yu, Chia-Chang Tsai, Yichuan Wang, Kuei-Kuei Lai, Mina Tajvidi:
Towards building a value co-creation circle in social commerce. Comput. Hum. Behav. 108: 105476 (2020) - [j38]Yan Kong, Yichuan Wang, M. Sam Hajli, Mauricio Featherman:
In Sharing Economy We Trust: Examining the Effect of Social and Technical Enablers on Millennials' Trust in Sharing Commerce. Comput. Hum. Behav. 108: 105993 (2020) - [j37]Xinhong Hei, Xinyue Yin, Yichuan Wang, Ju Ren, Lei Zhu:
A trusted feature aggregator federated learning for distributed malicious attack detection. Comput. Secur. 99: 102033 (2020) - [j36]William Wang, Yichuan Wang:
Guest editorial. Inf. Technol. People 33(3): 829-839 (2020) - [j35]Yefei Zhang, Yichuan Wang:
A novel energy-aware bio-inspired clustering scheme for IoT communication. J. Ambient Intell. Humaniz. Comput. 11(10): 4239-4248 (2020) - [j34]Yichuan Wang, Binbin Bai, Xinhong Hei, Ju Ren, Wenjiang Ji:
Classification and Recognition of Unknown Network Protocol Characteristics. J. Inf. Sci. Eng. 36(4): 765-776 (2020) - [j33]Lei Zhu, Ping He, Xinhong Hei, Yanni Yao, Yichuan Wang, Wenjiang Ji, Qin Zhao, Long Pan:
Combined access control model embedding configurable policy for fine-grained data security. Microprocess. Microsystems 75: 103060 (2020) - [j32]Xinhong Hei, Wen Gao, Yichuan Wang, Lei Zhu, Wenjiang Ji:
From Hardware to Operating System: A Static Measurement Method of Android System Based on TrustZone. Wirel. Commun. Mob. Comput. 2020: 8816023:1-8816023:13 (2020) - [c56]Yibai Li, Xuefei (Nancy) Deng, Yichuan Wang:
Introduction to the Minitrack on The Technical, Socio-Economic and Ethical Aspects of AI. HICSS 2020: 1-2 - [c55]Yichuan Wang, Mengran Xiong, Hossein Olya:
Toward an Understanding of Responsible Artificial Intelligence Practices. HICSS 2020: 1-10 - [c54]Yichuan Wang, Xinyue Yin, He Zhu, Xinhong Hei:
A Blockchain Based Distributed Storage System for Knowledge Graph Security. ICAIS (2) 2020: 318-327 - [c53]Yichuan Wang, Wen Gao, Xinhong Hei, Irenee Mungwarama, Ju Ren:
Independent credible: Secure communication architecture of Android devices based on TrustZone. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2020: 85-92 - [c52]Xinhong Hei, Xiaolong Liang, Yichuan Wang, Wenjiang Ji, Lei Zhu:
Deep Learning as a Service Based on Encrypted Data. NaNA 2020: 53-58 - [c51]Irenee Mungwarakarama, Xinhong Hei, Yichuan Wang, Wenjiang Ji, Xinyu Jiang:
Network Flow Analytics: Multi-Class Classification of DDoS Attacks Based on OKNN. NaNA 2020: 271-276 - [c50]Yanning Du, Yichuan Wang, Lei Zhu, Wenjiang Ji, Xin Song, Yida Yang, Long Pan:
A Framework for Audit Analysis of Heterogeneous Logs from PaaS. NaNA 2020: 292-297 - [c49]Lei Zhu, Yaolin Liu, Xinhong Hei, Yichuan Wang, Haining Meng, Jiuyuan Jiao, Long Pan:
A study on exercise recommendation method using Knowledge Graph for computer network course. NaNA 2020: 436-442
2010 – 2019
- 2019
- [j31]Caifeng Zhang, Rui Ma, Shiwei Sun, Yujie Li, Yichuan Wang, Zhijun Yan:
Optimizing the Electronic Health Records Through Big Data Analytics: A Knowledge-Based View. IEEE Access 7: 136223-136231 (2019) - [j30]Yanxiao Liu, Qindong Sun, Yichuan Wang, Lei Zhu, Wenjiang Ji:
Efficient group authentication in RFID using secret sharing scheme. Clust. Comput. 22(Supplement): 8605-8611 (2019) - [j29]Yichuan Wang, He Zhu, Xinhong Hei, Yue Kong, Wenjiang Ji, Lei Zhu:
An energy saving based on task migration for mobile edge computing. EURASIP J. Wirel. Commun. Netw. 2019: 133 (2019) - [j28]Yichuan Wang, Carolina Herrando:
Does privacy assurance on social commerce sites matter to millennials? Int. J. Inf. Manag. 44: 164-177 (2019) - [j27]Si Li, Chia-Hui Yu, Yichuan Wang, Yedurag Babu:
Exploring adverse drug reactions of diabetes medicine using social media analytics and interactive visualizations. Int. J. Inf. Manag. 48: 228-237 (2019) - [j26]Zhen Xu, Yinyan Jiang, Yichuan Wang, Yicong Zhou, Weifeng Li, Qingmin Liao:
Local polynomial contrast binary patterns for face recognition. Neurocomputing 355: 1-12 (2019) - [j25]Wenjiang Ji, Lei Zhu, Yichuan Wang, Zheng Liu, Xinhong Hei:
RSU authentication in vehicular ad hoc networks base on verifiable secret sharing. J. Intell. Fuzzy Syst. 37(4): 4531-4536 (2019) - [j24]Lei Zhu, Yanni Yao, Yichuan Wang, Xinhong Hei, Qin Zhao, Wenjiang Ji, Quanzhu Yao:
A novel subgraph querying method based on paths and spectra. Neural Comput. Appl. 31(9): 5671-5678 (2019) - [c48]Jinhai Zhou, Yang Chang, Jingping Tong, Shiyi Zhou, Yichuan Wang, Hua Li, Yibiao Huang, Cheng Zhu, Xiangfei Wu:
Multi-Level Classification of Arteriovenous Graft Degree of Stenosis Based on SSA + Welch Multi-Position Sequence Feature Extraction. CISP-BMEI 2019: 1-7 - [c47]Jinhai Zhou, Jingping Tong, Yang Chang, Shiyi Zhou, Yichuan Wang, Hua Li, Yibiao Huang, Cheng Zhu, Xiangfei Wu:
Acoustic Detection of ArterioVenous Access Stenosis Based on MUSIC Power Spectral Features. CISP-BMEI 2019: 1-6 - [c46]Xinhong Hei, Wen Gao, Yichuan Wang, Zhongdi Liang, Wenjiang Ji, Xianzhi Hu:
Railway Key Exchange Scheme for Improving Communication Efficiency of RSSP-II Protocol. GLOBECOM Workshops 2019: 1-6 - [c45]Chih Hao Ku, Yung-Chun Chang, Yichuan Wang, Chien-Hung Chen, Shih-Hui Hsiao:
Artificial Intelligence and Visual Analytics: A Deep-Learning Approach to Analyze Hotel Reviews & Responses. HICSS 2019: 1-10 - [c44]Yibai Li, Xuefei (Nancy) Deng, Yichuan Wang:
Introduction to the Minitrack on Augmenting Human Intelligence: Artificially, Socially, and Ethically. HICSS 2019: 1-2 - [c43]Wei Wang, Binbin Bai, Yichuan Wang, Xinhong Hei, Li Zhang:
Bitstream Protocol Classification Mechanism Based on Feature Extraction. NaNA 2019: 241-246 - [c42]Xinhong Hei, Binbin Bai, Yichuan Wang, Li Zhang, Lei Zhu, Wenjiang Ji:
Feature Extraction Optimization for Bitstream Communication Protocol Format Reverse Analysis. TrustCom/BigDataSE 2019: 662-669 - 2018
- [j23]Liumei Zhang, Jianfeng Ma, Tianshi Liu, Yichuan Wang, Di Lu:
AHP Aided Decision-Making in Virtual Machine Migration for Green Cloud. Comput. Informatics 37(2): 291-310 (2018) - [j22]Yichuan Wang, LeeAnn Kung, William Yu Chung Wang, Casey G. Cegielski:
An integrated big data analytics-enabled transformation model: Application to health care. Inf. Manag. 55(1): 64-79 (2018) - [j21]Yichuan Wang, Yefei Zhang, Lei Zhu, Wenjiang Ji, Yanxiao Liu, Xinhong Hei:
A novel energy-aware trustworthy multi-hop routing model for Internet of things. Int. J. Distributed Sens. Networks 14(12) (2018) - [j20]Yanxiao Liu, Ching-Nung Yang, Yichuan Wang, Lei Zhu, Wenjiang Ji:
Cheating identifiable secret sharing scheme using symmetric bivariate polynomial. Inf. Sci. 453: 21-29 (2018) - [j19]Xiaoye Cheng, Yichuan Wang, Chetan S. Sankar:
Using Serious Games in Data Communications and Networking Management Course. J. Comput. Inf. Syst. 58(1): 39-48 (2018) - [j18]Wanping Zhang, Zhen Xu, Yichuan Wang, Zongqing Lu, Weifeng Li, Qingmin Liao:
Binarized features with discriminant manifold filters for robust single-sample face recognition. Signal Process. Image Commun. 65: 1-10 (2018) - [j17]Yichuan Wang, Yefei Zhang, Wenjiang Ji, Lei Zhu, Yanxiao Liu:
Gleer: A Novel Gini-Based Energy Balancing Scheme for Mobile Botnet Retopology. Wirel. Commun. Mob. Comput. 2018: 7805408:1-7805408:10 (2018) - [c41]Mina Tajvidi, Nick Hajli, Yichuan Wang:
Big Data Analytics for New Product Success (Product Innovation). AMCIS 2018 - [c40]Mina Tajvidi, Yichuan Wang, Nick Hajli:
Technological Advancement in Marketing: Co-creation of Value with Customers. AMCIS 2018 - [c39]Wei Wang, Yanni Yao, Lei Zhu, Xinhong Hei, Yichuan Wang:
A Novel Subgraph Querying Method on Directed Weighted Graphs. CIS 2018: 150-154 - [c38]Jie Zhang, Yi Chen, Xinhong Hei, Lei Zhu, Qin Zhao, Yichuan Wang:
A RMM Based Word Segmentation Method for Chinese Design Specifications of Building Stairs. CIS 2018: 277-280 - [c37]Yichuan Wang:
Leveraging Big Data Analytics to Improve Quality of Care In Health Care: A fsQCA Approach. HICSS 2018: 1-10 - [c36]Zhongdi Liang, Xinhong Hei, Yichuan Wang, Wenjiang Ji, Lei Zhu, Yefei Zhang:
Analysis and Protection of DDOS Attack Based on RSSP-II Protocol. NaNA 2018: 117-120 - [c35]He Zhu, Yichuan Wang, Xinhong Hei, Wenjiang Ji, Li Zhang:
A Blockchain-Based Decentralized Cloud Resource Scheduling Architecture. NaNA 2018: 324-329 - [c34]Yue Kong, Yikun Zhang, Yichuan Wang, Hao Chen, Xinhong Hei:
Energy Saving Strategy for Task Migration Based on Genetic Algorithm. NaNA 2018: 330-336 - 2017
- [j16]Yichuan Wang, Chiahui Yu:
Social interaction-based consumer decision-making model in social commerce: The role of word of mouth and observational learning. Int. J. Inf. Manag. 37(3): 179-189 (2017) - [j15]Weifeng Li, Yichuan Wang, Zhen Xu, Yinyan Jiang, Zongqing Lu, Qingmin Liao:
Weighted contourlet binary patterns and image-based fisher linear discriminant for face recognition. Neurocomputing 267: 436-446 (2017) - [j14]Yichuan Wang, Terry Anthony Byrd:
Business analytics-enabled decision-making effectiveness through knowledge absorptive capacity in health care. J. Knowl. Manag. 21(3): 517-539 (2017) - [j13]Nick Hajli, Yichuan Wang, Mina Tajvidi, M. Sam Hajli:
People, Technologies, and Organizations Interactions in a Social Commerce Era. IEEE Trans. Engineering Management 64(4): 594-604 (2017) - [j12]Yichuan Wang, Pramod Rajan, Chetan S. Sankar, P. K. Raju:
Let Them Play: The Impact of Mechanics and Dynamics of a Serious Game on Student Perceptions of Learning Engagement. IEEE Trans. Learn. Technol. 10(4): 514-525 (2017) - [c33]Yichuan Wang, Zhen Xu, Weifeng Li, Qingmin Liao:
Illumination-robust face recognition with Block-based Local Contrast Patterns. ICASSP 2017: 1418-1422 - [c32]Lei Zhu, Yanxiao Liu, Yichuan Wang, Wenjiang Ji, Xinhong Hei, Quanzhu Yao, Xiaoyan Zhu:
Efficient (k, n) Secret Sharing Scheme Secure against k - 2 Cheaters. NaNA 2017: 1-4 - 2016
- [j11]Yichuan Wang, Santosh Chandrasekhar, Mukesh Singhal, Jianfeng Ma:
A limited-trust capacity model for mitigating threats of internal malicious services in cloud computing. Clust. Comput. 19(2): 647-662 (2016) - [j10]Yichuan Wang, Jianfeng Ma, Xiang Lu, Di Lu, Liumei Zhang:
Efficiency optimisation signature scheme for time-critical multicast data origin authentication. Int. J. Grid Util. Comput. 7(1): 1-11 (2016) - [j9]Liumei Zhang, Yichuan Wang, Lei Zhu, Wenjiang Ji:
Towards energy efcient cloud: an optimized ant colony model for virtual machine placement. J. Commun. Inf. Networks 1(4): 116-132 (2016) - [j8]Yichuan Wang, Yefei Zhang, Xinhong Hei, Wenjiang Ji, Weigang Ma:
Game strategies for distributed denial of service defense in the Cloud of Things. J. Commun. Inf. Networks 1(4): 143-155 (2016) - [j7]Yichuan Wang, Jianfeng Ma, Liumei Zhang, Wenjiang Ji, Di Lu, Xinhong Hei:
Dynamic game model of botnet DDoS attack and defense. Secur. Commun. Networks 9(16): 3127-3140 (2016) - [j6]Yichuan Wang, Xin Liu, Cheng-Hsin Hsu:
UPDATE: User-Profile-Driven Adaptive TransfEr for Mobile Devices. ACM Trans. Embed. Comput. Syst. 15(3): 42:1-42:26 (2016) - [c31]Yichuan Wang, Shilian Yu, Weifeng Li, Longbiao Wang, Qingmin Liao:
Face recognition with local contourlet combined patterns. ICASSP 2016: 1273-1277 - [c30]LeeAnn Kung, Yichuan Wang, Hsiang-Jui Kung:
Exploring Configurations for Business Value from Event-Driven Architecture in Healthcare. ICIS 2016 - [c29]Wen Jiang Ji, Yichuan Wang, Yanxiao Liu, Lei Zhu, Weigang Ma, Li Yan:
A New Interference Aware Routing Metric for Multi-radio Multi-channel Wireless Mesh Networks. NaNA 2016: 135-140 - [c28]Yanxiao Liu, Yichuan Wang, Lei Zhu, Jiwen Jiang, Xinhong Hei:
(k, n) Secret Sharing Scheme against Two Types of Cheaters. NaNA 2016: 284-287 - 2015
- [c27]John R. Drake, Dianne J. Hall, Shiwei Sun, Yichuan Wang:
Job Applicants' Information Privacy-Protective Response: Exploring the Roles of Technology Readiness and Trust. AMCIS 2015 - [c26]Nick Hajli, Shih-Hui Hsiao, Yichuan Wang, Zhiguo Yang:
Leveraging Co-innovation Practices on Business-to-Business Virtual Communities. AMCIS 2015 - [c25]Shih-Hui Hsiao, Yichuan Wang:
The Effect of Social Factors on User-Generated Content Productivity: Evidence from Flickr.com. AMCIS 2015 - [c24]LeeAnn Kung, Hsiang-Jui Kung, L. Allison Jones-Farmer, Yichuan Wang:
Managing Big Data for Firm Performance: a Configurational Approach. AMCIS 2015 - [c23]Yichuan Wang:
Business Intelligence and Analytics Education: Hermeneutic Literature Review and Future Directions in IS Education. AMCIS 2015 - [c22]Shilian Yu, Zuodong Yang, Yichuan Wang, Weifeng Li, Qingmin Liao:
Multifarious distances, cameras and illuminations face database. APSIPA 2015: 873-876 - [c21]Yichuan Wang, LeeAnn Kung, Chaochi Ting, Terry Anthony Byrd:
Beyond a Technical Perspective: Understanding Big Data Capabilities in Health Care. HICSS 2015: 3044-3053 - [c20]Yichuan Wang, Xin Liu, David Chu, Yunxin Liu:
EarlyBird: Mobile Prefetching of Social Network Feeds via Content Preference Mining and Usage Pattern Analysis. MobiHoc 2015: 67-76 - 2014
- [j5]Yichuan Wang, Jianfeng Ma, Di Lu, Xiang Lu, Liumei Zhang:
From high-availability to collapse: quantitative analysis of "Cloud-Droplet-Freezing" attack threats to virtual machine migration in cloud computing. Clust. Comput. 17(4): 1369-1381 (2014) - [j4]Yichuan Wang, Xin Liu:
Alleviate Cellular Congestion Through Opportunistic Trough Filling. EAI Endorsed Trans. Wirel. Spectr. 1(1): e5 (2014) - [j3]Jun-Ing Ker, Yichuan Wang, Nick Hajli, Jiahe Song, Cappi W. Ker:
Deploying lean in healthcare: Evaluating information technology effectiveness in U.S. hospital pharmacies. Int. J. Inf. Manag. 34(4): 556-560 (2014) - [c19]Yichuan Wang, Mahmood Hajli:
Co-Creation in Branding through Social Commerce: The Role of Social Support, Relationship Quality and Privacy Concerns. AMCIS 2014 - [c18]Yichuan Wang, LeeAnn Kung, William Yu Chung Wang, Casey G. Cegielski:
Developing a Big Data-Enabled Transformation Model in Healthcare: A Practice Based View. ICIS 2014 - 2013
- [j2]Youliang Tian, Jianfeng Ma, Changgen Peng, Yichuan Wang, Liumei Zhang:
A rational framework for secure communication. Inf. Sci. 250: 215-226 (2013) - [j1]Yichuan Wang, Ting-An Lin, Cheng-Hsin Hsu, Xin Liu:
Region- and action-aware virtual world clients. ACM Trans. Multim. Comput. Commun. Appl. 9(1): 6:1-6:21 (2013) - [c17]Yichuan Wang, LeeAnn Kung, Terry Anthony Byrd:
Leveraging Event-driven IT Architecture Capability for Competitive Advantage in Healthcare Industry: a Mediated Model. ICIS 2013 - [c16]Yu-Sian Li, Chien-Chang Chen, Ting-An Lin, Cheng-Hsin Hsu, Yichuan Wang, Xin Liu:
An end-to-end testbed for scalable video streaming to mobile devices over HTTP. ICME 2013: 1-6 - [c15]Di Lu, Jianfeng Ma, Yichuan Wang, Ning Xi:
Highly Flexible and Extensible Storage Scheme for Virtualization Platforms under Cloud Computing. INCoS 2013: 1-8 - [c14]Liumei Zhang, Jianfeng Ma, Yichuan Wang:
Content Based Spam Text Classification: An Empirical Comparison between English and Chinese. INCoS 2013: 69-76 - [c13]Yichuan Wang, Jianfeng Ma, Di Lu, Liumei Zhang, Xiang Lu:
Game Optimization for Time-Critical Multicast Data Origin Authentication: Trade Off between Security and Efficiency. INCoS 2013: 85-92 - [c12]Ting-An Lin, Yichuan Wang, Cheng-Hsin Hsu, Xin Liu:
Mobile user clustering in large time-scale data transfer scheduling. MobiSys 2013: 523-524 - [c11]Shu-Ting Wang, Ting-An Lin, Yichuan Wang, Cheng-Hsin Hsu, Xin Liu:
Fusing prefetch and delay-tolerant transfer for mobile videos. MobiSys 2013: 525-526 - 2012
- [c10]Nam Tuan Nguyen, Yichuan Wang, Husheng Li, Xin Liu, Zhu Han:
Extracting typical users' moving patterns using deep learning. GLOBECOM 2012: 5410-5414 - [c9]Zhizhong Li, Qijun Liu, Lei Zheng, Yichuan Wang, Zhongliang Xu:
A New Optical Fiber Birefringence Measurement Method Based on Polarization Detection and Wavelength Scanning. ICDMA 2012: 102-104 - [c8]Yichuan Wang, Xin Liu, Angela Nicoara, Ting-An Lin, Cheng-Hsin Hsu:
SmartTransfer: transferring your mobile multimedia contents at the "right" time. NOSSDAV 2012: 71-76 - [c7]Nam Tuan Nguyen, Yichuan Wang, Xin Liu, Rong Zheng, Zhu Han:
A Nonparametric Bayesian Approach for Opportunistic Data Transfer in Cellular Networks. WASA 2012: 88-99 - 2011
- [c6]Liumei Zhang, Jianfeng Ma, Yichuan Wang, Shaowei Pan:
PSO-BP Neural Network in Reservoir Parameter Dynamic Prediction. CIS 2011: 123-126 - [c5]Yichuan Wang, Cheng-Hsin Hsu, Jatinder Pal Singh, Xin Liu:
Toward region- and action-aware second life clients: A parameterized second life traffic model. ICME 2011: 1-6 - [c4]Yichuan Wang, Cheng-Hsin Hsu, Jatinder Pal Singh, Xin Liu:
Network traces of virtual worlds: measurements and applications. MMSys 2011: 105-110
2000 – 2009
- 2009
- [c3]Xiaojun Cao, Yichuan Wang, Yang Wang, Chunsheng Xin:
Tree-based Burst Aggregation in Optical Burst Switching Networks. PDCCS 2009: 179-184 - [c2]Xiaojun Cao, Yichuan Wang, Alex Zelikovsky:
Scheduling Bursts Using Interval Graphs in Optical Burst Switching Networks. GLOBECOM 2009: 1-6 - [c1]Xiaojun Cao, Yang Wang, Adrian Caciula, Yichuan Wang:
Developing a multifunctional network laboratory for teaching and research. SIGITE Conference 2009: 155-160
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-10 01:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint