default search action
Yaling Zhang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j47]Jiahao Wen, Tianbao Huang, Xihong Cui, Yaling Zhang, Jinfeng Shi, Yanjia Jiang, Xiangjie Li, Li Guo:
Enhancing Image Alignment in Time-Lapse-Ground-Penetrating Radar through Dynamic Time Warping. Remote. Sens. 16(6): 1040 (2024) - [j46]Yaling Zhang, Xueyi Yang, Fei Tian:
Study on Soil Moisture Status of Soybean and Corn across the Whole Growth Period Based on UAV Multimodal Remote Sensing. Remote. Sens. 16(17): 3166 (2024) - 2023
- [j45]Cun Zhan, Chuan Liang, Lu Zhao, Shouzheng Jiang, Kaijie Niu, Yaling Zhang, Long Cheng:
Detection and attribution of vegetation dynamics in the National Barrier Zone of China by considering climate temporal effects. Int. J. Appl. Earth Obs. Geoinformation 116: 103140 (2023) - [j44]Xiaoxuan Qi, Yaling Zhang, Sheng Cao, Shengping Yan, Hongbang Su:
Human-computer interaction based on the intelligent information retrieval method for customer satisfaction in power system service. Int. J. Model. Simul. Sci. Comput. 14(1): 2341004:1-2341004:25 (2023) - [j43]Sheng Cao, Yaling Zhang, Shengping Yan, Xiaoxuan Qi, Yuling Li:
Construction of Customer Appeal Classification Model Based on Speech Recognition. J. Inf. Process. Syst. 19(2): 258-266 (2023) - [j42]Yi-Chuan Wang, Gui-Ling Zhang, Ya-Ling Zhang:
Analysis of SQL Injection based on Petri Net in Wireless Network. J. Inf. Sci. Eng. 39(1): 167-181 (2023) - [j41]Xueyi Yang, Xiaojing Shi, Yaling Zhang, Fei Tian, Samuel Ortega-Farías:
Response of Evapotranspiration (ET) to Climate Factors and Crop Planting Structures in the Shiyang River Basin, Northwestern China. Remote. Sens. 15(16): 3923 (2023) - [j40]Duo Zhang, Shangping Wang, Qian Zhang, Yaling Zhang:
Attribute Based Conjunctive Keywords Search With Verifiability and Fair Payment Using Blockchain. IEEE Trans. Serv. Comput. 16(6): 4168-4182 (2023) - [c33]Yichuan Wang, Jingjing Zhao, Yaling Zhang, Xinhong Hei, Lei Zhu:
Smart Contract Symbol Execution Vulnerability Detection Method Based on CFG Path Pruning. BSCI 2023: 132-139 - [c32]Yicheng Zou, Yaling Zhang, Chao Wang, Tao Zhang, Yu Zhang:
Reversible Data Hiding in Encrypted Images Based on Image Reprocessing and Polymorphic Compression. ICONIP (14) 2023: 230-243 - [c31]Chao Wang, Yicheng Zou, Yaling Zhang, Ju Zhang, Jichuan Chen, Bin Yang, Yu Zhang:
Reversible Data Hiding Based on Adaptive Embedding with Local Complexity. ICONIP (5) 2023: 522-534 - [c30]Chengcheng Huang, Shiqun Yin, Lei Li, Yaling Zhang:
MA-TGNN: Multiple Aggregators Graph-Based Model for Text Classification. KSEM (3) 2023: 66-77 - [c29]Yaling Zhang, Yicheng Zou, Chao Wang, Chengcheng Huang, Shiqun Yin:
Reversible Data Hiding in Encrypted Images Based on a Multi-Granularity Adaptive Classification Mechanism. KSEM (2) 2023: 201-213 - [c28]Yaling Zhang, Jingjing Chen, Yichuan Wang, Yeqiu Xiao, Xiaoxue Liu:
A Novel On-Demand Service Architecture for Efficient Cloud-Edge Collaboration. NaNA 2023: 169-174 - [c27]Wenjiang Ji, Yixin Yang, Yaling Zhang, Yichuan Wang, Mengjie Tian, Yuan Qiu:
DDoS Attack Detection Based on Information Entropy Feature Extraction in Software Defined Networks. NaNA 2023: 459-464 - 2022
- [j39]Yaling Zhang, Huan Tang, Fateh Zereg, Dekai Xu:
Application of Deep Convolution Network Algorithm in Sports Video Hot Spot Detection. Frontiers Neurorobotics 16: 829445 (2022) - [j38]Xiaojie Zhao, Shangping Wang, Yaling Zhang, Yu Wang:
Attribute-based access control scheme for data sharing on hyperledger fabric. J. Inf. Secur. Appl. 67: 103182 (2022) - [j37]Yaling Zhang, Hongwei Liu:
A Barzilai and Borwein regularization feasible direction algorithm for convex nonlinear SOC programming with linear constraints. J. Comput. Appl. Math. 401: 113781 (2022) - [j36]Yaling Zhang, Hongwei Liu:
A new projection neural network for linear and convex quadratic second-order cone programming. J. Intell. Fuzzy Syst. 42(4): 2925-2937 (2022) - [j35]Zhihai Yang, Qindong Sun, Zhaoli Liu, Jinpei Yan, Yaling Zhang:
Rating behavior evaluation and abnormality forensics analysis for injection attack detection. J. Intell. Inf. Syst. 59(1): 93-119 (2022) - [j34]Xiaoxuan Qi, Yaling Zhang, Sheng Cao, Shengping Yan, Hongbang Su:
Intelligent Retrieval Method of Power System Service User Satisfaction Based on Human-Computer Interaction. J. Interconnect. Networks 22(Supp-05): 2147012:1-2147012:25 (2022) - [j33]Qian Zhang, Shangping Wang, Duo Zhang, Jin Sun, Yaling Zhang:
Authorized Data Secure Access Scheme With Specified Time and Relevance Ranked Keyword Search for Industrial Cloud Platforms. IEEE Syst. J. 16(2): 2879-2890 (2022) - [j32]Zhihai Yang, Qindong Sun, Yaling Zhang:
Probabilistic Inference and Trustworthiness Evaluation of Associative Links Toward Malicious Attack Detection for Online Recommendations. IEEE Trans. Dependable Secur. Comput. 19(2): 879-896 (2022) - [c26]Yaling Zhang, Dongtai Tang:
A differential privacy federated learning framework for accelerating convergence. CIS 2022: 122-126 - 2021
- [j31]Yuan Tian, Ping Lin, Hanjie Cai, Yaling Zhang, Qiong Yang, Meiling Qi, Guanghui Yang, Xiaofei Gao, Xiaolong Chen, Lei Yang, Qingguo Zhou:
A fast and accurate GPU based method on simulating energy deposition for beam-target coupling with granular materials. Comput. Phys. Commun. 269: 108104 (2021) - [j30]Pengcheng Zhang, Yaling Zhang, Hai Dong, Huiying Jin:
Mobility and Dependence-Aware QoS Monitoring in Mobile Edge Computing. IEEE Trans. Cloud Comput. 9(3): 1143-1157 (2021) - [j29]Zhihai Yang, Qindong Sun, Yaling Zhang, Wei Wang:
Identification of Malicious Injection Attacks in Dense Rating and Co-Visitation Behaviors. IEEE Trans. Inf. Forensics Secur. 16: 537-552 (2021) - [c25]Yaling Zhang, Shibo Bai:
An Improved LRP-Based Differential Privacy Preserving Deep Learning Framework. CIS 2021: 484-488 - [c24]Yaling Zhang, Jie Zhou, Jing Hu:
Research on Defect Location Method of C Language Code Based on Deep Learning. ICCSE 2021: 360-365 - [c23]Guiling Zhang, Yaling Zhang, Yichuan Wang, Lei Zhu, Wenjiang Ji:
A fine-grained petri model for SQL time-blind injection. NaNA 2021: 161-167 - [c22]Yaling Zhang, Hongyun Wang, Yichuan Wang, Wenjiang Ji, Lei Zhu:
Signature Scheme Based on The SM2 Algorithm in Fabric. NaNA 2021: 443-448 - [c21]Yaling Zhang, Pengfei Feng, Yao Ning:
Random Forest Algorithm Based on Differential Privacy Protection. TrustCom 2021: 1259-1264 - 2020
- [j28]Zhihai Yang, Qindong Sun, Yaling Zhang, Lei Zhu, Wenjiang Ji:
Inference of Suspicious Co-Visitation and Co-Rating Behaviors and Abnormality Forensics for Recommender Systems. IEEE Trans. Inf. Forensics Secur. 15: 2766-2781 (2020) - [c20]Yaling Zhang, Jiale Li, Shibo Bai:
Chinese Sentiment Classification Model of Neural Network Based on Particle Swarm Optimization. CIS 2020: 338-341 - [c19]Pengcheng Zhang, Yaling Zhang, Hai Dong, Huiying Jin:
Multivariate QoS Monitoring in Mobile Edge Computing based on Bayesian Classifier and Rough Set. ICWS 2020: 189-196
2010 – 2019
- 2019
- [j27]Shangping Wang, Shasha Jia, Yaling Zhang:
Verifiable and Multi-Keyword Searchable Attribute-Based Encryption Scheme for Cloud Storage. IEEE Access 7: 50136-50147 (2019) - [j26]Shangping Wang, Lisha Yao, Juanjuan Chen, Yaling Zhang:
KS-ABESwET: A Keyword Searchable Attribute-Based Encryption Scheme With Equality Test in the Internet of Things. IEEE Access 7: 80675-80696 (2019) - [j25]Yaling Zhang, Zhifeng Hao, Shangping Wang:
A Differential Privacy Support Vector Machine Classifier Based on Dual Variable Perturbation. IEEE Access 7: 98238-98251 (2019) - [j24]Shangping Wang, Dan Zhang, Yaling Zhang:
Blockchain-Based Personal Health Records Sharing Scheme With Data Integrity Verifiable. IEEE Access 7: 102887-102901 (2019) - [j23]Shangping Wang, Xixi Tang, Yaling Zhang, Juanjuan Chen:
Auditable Protocols for Fair Payment and Physical Asset Delivery Based on Smart Contracts. IEEE Access 7: 109439-109453 (2019) - [j22]Shangping Wang, Xu Wang, Yaling Zhang:
A Secure Cloud Storage Framework With Access Control Based on Blockchain. IEEE Access 7: 112713-112725 (2019) - [j21]Shangping Wang, Dongyi Li, Yaling Zhang, Juanjuan Chen:
Smart Contract-Based Product Traceability System in the Supply Chain Scenario. IEEE Access 7: 115122-115133 (2019) - [j20]Shangping Wang, Ru Pei, Yaling Zhang:
EIDM: A Ethereum-Based Cloud User Identity Management Protocol. IEEE Access 7: 115281-115291 (2019) - [j19]Shangping Wang, Yuying Wang, Yaling Zhang:
Blockchain-Based Fair Payment Protocol for Deduplication Cloud Storage System. IEEE Access 7: 127652-127668 (2019) - [j18]Qian Zhang, Shangping Wang, Duo Zhang, Jifang Wang, Yaling Zhang:
Time and Attribute Based Dual Access Control and Data Integrity Verifiable Scheme in Cloud Computing Applications. IEEE Access 7: 137594-137607 (2019) - [j17]Xuewen Mu, Yaling Zhang:
Grasping Force Optimization for Multi-fingered Robotic Hands Using Projection and Contraction Methods. J. Optim. Theory Appl. 183(2): 592-608 (2019) - [c18]Yaling Zhang, Bei Wu:
Research and application of grade prediction model based on decision tree algorithm. ACM TUR-C 2019: 80:1-80:6 - [c17]Yaling Zhang, Pei Luo, Lingyu Qu:
An Improved Differential Privacy Algorithm Using Frequent Pattern Mining. CIS 2019: 419-423 - [c16]Jing Hu, Yunsong Li, Minghua Zhao, Yaling Zhang:
Deep Spatial-Spectral Information Exploitation for Rapid Hyperspectral Image Super-Resolution. IGARSS 2019: 3109-3112 - 2018
- [j16]Shangping Wang, Duo Zhang, Yaling Zhang, Lihua Liu:
Efficiently Revocable and Searchable Attribute-Based Encryption Scheme for Mobile Cloud Storage. IEEE Access 6: 30444-30457 (2018) - [j15]Shangping Wang, Yinglong Zhang, Yaling Zhang:
A Blockchain-Based Framework for Data Sharing With Fine-Grained Access Control in Decentralized Storage Systems. IEEE Access 6: 38437-38450 (2018) - [j14]Yaling Zhang, Shangping Wang, Qing Du:
Revocable Identity-Based Encryption Scheme Under LWE Assumption in the Standard Model. IEEE Access 6: 65298-65307 (2018) - [j13]Shangping Wang, Xia Zhang, Yaling Zhang:
Efficient revocable and grantable attribute-based encryption from lattices with fine-grained access control. IET Inf. Secur. 12(2): 141-149 (2018) - [j12]Shangping Wang, Ru Zhao, Yaling Zhang:
Lattice-based ring signature scheme under the random oracle model. Int. J. High Perform. Comput. Netw. 11(4): 332-341 (2018) - [j11]Zhihai Yang, Qindong Sun, Yaling Zhang, Beibei Zhang:
Uncovering anomalous rating behaviors for rating systems. Neurocomputing 308: 205-226 (2018) - 2017
- [j10]Yaling Zhang:
A projected-based neural network method for second-order cone programming. Int. J. Mach. Learn. Cybern. 8(6): 1907-1914 (2017) - [c15]Yaling Zhang, Ting Wang, Shangping Wang:
An efficient algorithm for frequent pattern mining based on privacy-preserving. ICNC-FSKD 2017: 1694-1699 - [c14]Ya-Ling Zhang, Ya-Nan Wang:
An improved sampling K-means clustering algorithm based on MapReduce. ICNC-FSKD 2017: 1934-1939 - 2016
- [c13]Yaling Zhang, Lijun Liu, Shangping Wang:
Multi-User and Keyword-Based Searchable Encryption Scheme. CIS 2016: 223-227 - 2015
- [j9]Shangping Wang, Lihua Liu, Jin Sun, Yaling Zhang:
Multi-party concurrent signatures scheme from lattice. Int. J. Inf. Commun. Technol. 7(2/3): 247-262 (2015) - [c12]Yaling Zhang, Liang Yang, Shangping Wang:
An Efficient Identity-Based Signature Scheme for Vehicular Communications. CIS 2015: 326-330 - 2014
- [c11]Ya-Ling Zhang, Kai Liu, Shang-Ping Wang, Qin-Dong Sun:
A Multi-users Searchable Encryption Scheme with Proxy Re-encryption. CIS 2014: 563-567 - 2013
- [j8]Xuewen Mu, Yaling Zhang:
An alternating direction method for second-order conic programming. Comput. Oper. Res. 40(7): 1752-1757 (2013) - [j7]Xuewen Mu, Yaling Zhang:
A Rank-Two Feasible Direction Algorithm for the Binary Quadratic Programming. J. Appl. Math. 2013: 963563:1-963563:7 (2013) - [j6]Xuewen Mu, Yaling Zhang:
A Continuous Relaxation Method for Multiuser Detection Problem. Wirel. Pers. Commun. 71(3): 2067-2077 (2013) - [c10]Zhipeng Jia, Ya-Ling Zhang, Shang-Ping Wang, Qin-Dong Sun:
Evaluable Secure Ranked Keyword Search Scheme over Encrypted Cloud Data. CIS 2013: 697-701 - [c9]Shangping Wang, Lihua Liu, Juanjuan Chen, Jin Sun, Xinwen Zhang, Yaling Zhang:
Lattice-Based Multi-party Concurrent Signatures Scheme. INCoS 2013: 568-572 - [c8]Yaling Zhang, Zhipeng Jia, Shangping Wang:
A Multi-user Searchable Symmetric Encryption Scheme for Cloud Storage System. INCoS 2013: 815-820 - 2012
- [j5]Xuewen Mu, Yaling Zhang:
A New Rank-two Semidefinite Programming Relaxation Method for Multiuser Detection Problem. Wirel. Pers. Commun. 65(1): 223-233 (2012) - 2011
- [j4]Shangping Wang, Rui Ma, Yaling Zhang, Xiaofeng Wang:
Ring signature scheme based on multivariate public key cryptosystems. Comput. Math. Appl. 62(10): 3973-3979 (2011) - [j3]Shang-Ping Wang, Qiao-Mei Ma, Ya-Ling Zhang, You-Sheng Li:
An Authentication Protocol for RFID Tag and Its Simulation. J. Networks 6(3): 446-453 (2011) - [j2]Xuewen Mu, Yaling Zhang:
A Second-Order Cone Programming Method for Multiuser Detection Problem. Wirel. Pers. Commun. 60(2): 335-344 (2011) - 2010
- [c7]Xuewen Mu, Yaling Zhang:
A New Two-Step Gradient-Based Backpropagation Training Method for Neural Networks. ISNN (1) 2010: 95-101
2000 – 2009
- 2009
- [c6]Xuewen Mu, Yaling Zhang:
A modified gradient-based backpropagation training method for neural networks. GrC 2009: 450-453 - 2008
- [c5]Xiaofeng Wang, Liang Cao, Shangping Wang, Yaling Zhang:
ID-Based Convertible Limited (Multi-)Verifier Signature Scheme. CSSE (3) 2008: 774-777 - [c4]Yaling Zhang, Xiaofeng Wang:
Message Substitute Attack on Concurrent Signatures Protocol and its Improvement. ISECS 2008: 497-501 - [c3]Shangping Wang, Pei Han, Yaling Zhang, Xiaofeng Wang:
An Improved ID-based Restrictive Partially Blind Signature Scheme. SNPD 2008: 295-300 - [c2]Yaling Zhang, Jing Zhang, Yikun Zhang:
Multi-signers Strong Designated Verifier Signature Scheme. SNPD 2008: 324-328 - 2007
- [j1]Xuewen Mu, Yaling Zhang, Sanyang Liu:
A new branch and bound method with pretreatment for the binary quadratic programming. Appl. Math. Comput. 192(1): 252-259 (2007) - 2005
- [c1]Xuewen Mu, Sanyang Liu, Yaling Zhang:
A Neural Network Algorithm for Second-Order Conic Programming. ISNN (1) 2005: 718-724
Coauthor Index
aka: Shang-Ping Wang
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint