default search action
Yining Yang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j10]Penghe Zhang, Yining Yang, Runan Song, Bicheng Wang, Jinhao Sheng, Bo Zhao:
Line Loss Anomaly Perception Method Based on MIC-IF Algorithm for Photovoltaic Low-Voltage Transformer Area. IEEE Access 12: 108145-108153 (2024) - [j9]Yan Wang, Yining Yang, Jinfeng Wang, Hong Li, Yang Liu:
Unconditional analysis of the linearized second-order time-stepping scheme combined with a mixed element method for a nonlinear time fractional fourth-order wave equation. Comput. Math. Appl. 157: 74-91 (2024) - [j8]Yining Yang, Xiang Su, Nan Li:
Data Augmented of Mechanical Fault Sound Signal based on Generative Adversarial Networks. Period. Polytech. Electr. Eng. Comput. Sci. 68(1): 74-93 (2024) - [j7]Yining Yang, Ke Xu, Ying Tang:
GAN-based self-supervised message passing graph representation learning. Expert Syst. Appl. 251: 124012 (2024) - [j6]Yining Yang, Xin Shen, Lin Cao:
Estimation of the Living Vegetation Volume (LVV) for Individual Urban Street Trees Based on Vehicle-Mounted LiDAR Data. Remote. Sens. 16(10): 1662 (2024) - 2023
- [j5]Yining Yang, Ziyu Sun, Yang Liu, Hong Li:
Structure-preserving BDF2 FE method for the coupled Schrödinger-Boussinesq equations. Numer. Algorithms 93(3): 1243-1267 (2023) - [j4]Wenkai Liu, Yang Liu, Hong Li, Yining Yang:
Multi-output physics-informed neural network for one- and two-dimensional nonlinear time distributed-order models. Networks Heterog. Media 18(4): 1899-1918 (2023) - 2022
- [j3]Yining Yang, Runan Song, Yang Xue, Penghe Zhang, Yuejie Xu, Jinping Kang, Haisen Zhao:
A Detection Method for Group Fixed Ratio Electricity Thieves Based on Correlation Analysis of Non-Technical Loss. IEEE Access 10: 5608-5619 (2022) - [j2]Min Wang, Peng Yang, Yining Yang:
Carlitz's Equations on Generalized Fibonacci Numbers. Symmetry 14(4): 764 (2022) - 2021
- [j1]Yanlin Peng, Yining Yang, Yuejie Xu, Yang Xue, Runan Song, Jinping Kang, Haisen Zhao:
Electricity Theft Detection in AMI Based on Clustering and Local Outlier Factor. IEEE Access 9: 107250-107259 (2021)
Conference and Workshop Papers
- 2023
- [c5]Yining Yang, Jialiang Lu:
Spectral Privacy Detection on Black-box Graph Neural Networks. VTC Fall 2023: 1-6 - 2022
- [c4]Runan Song, Yang Xue, Penghe Zhang, Yining Yang, Cong Wang:
Multi-label co-occurrence network for stealing electricity type detection and research on forensics sequence rules. ACAI 2022: 103:1-103:9 - 2021
- [c3]Yining Yang, Runan Song, Yang Xue, Yalong Wu:
Detection of Electric Power Theft Behavior Based on BP Neural Network Optimized by L-M Algorithm. CSIA (1) 2021: 733-739 - 2020
- [c2]Yining Yang, Branislav Vuksanovic, Hongjie Ma:
Effects of Region Features on the Accuracy of Cross-database Facial Expression Recognition. ICAART (2) 2020: 610-617 - [c1]Sha Liu, Yining Yang, Yang Xue, Zilong Wang, Heng Yang, Yinghui Xu, Cong Wang, Liu Yang:
Characteristics of Electricity Consumption of Typical Industrial Loads Based on Power Data Analysis. IWCMC 2020: 103-106
Informal and Other Publications
- 2024
- [i3]Houze Liu, Iris Li, Yaxin Liang, Dan Sun, Yining Yang, Haowei Yang:
Research on Deep Learning Model of Feature Extraction Based on Convolutional Neural Network. CoRR abs/2406.08837 (2024) - [i2]Dan Sun, Yaxin Liang, Yining Yang, Yuhan Ma, Qishi Zhan, Erdi Gao:
Research on Optimization of Natural Language Processing Model Based on Multimodal Deep Learning. CoRR abs/2406.08838 (2024) - [i1]Qi Huang, Yanjun Li, Bo Yin, Yaoguo Wang, Yujuan Yuan, Yanying Guo, Kuiying Gu, Yining Yang, Qian Di:
Cohort profile: the Northwest China Real-world and Population-based Cohort. CoRR abs/2411.18628 (2024)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 22:47 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint