


Остановите войну!
for scientists:


default search action
Zhen Yang 0004
Person information

- affiliation: Beijing University of Technology, College of Computer Science, China
- affiliation (former): Beijing University of Posts and Telecommunications, China
Other persons with the same name
- Zhen Yang — disambiguation page
- Zhen Yang 0001
— Nanjing University of Posts and Telecommunications, Key Laboratory of Broadband Wireless Communication and Sensor Network Technology, China (and 1 more)
- Zhen Yang 0002 — The Johns Hopkins University, Department of Electrical and Computer Engineering, Baltimore, MD, USA
- Zhen Yang 0003
— Beijing Institute of Technology, School of Computer Science and Technology, China
- Zhen Yang 0005
— Xinyang Normal University, School of Physics and Electronic Engineering / Key Laboratory of Microelectronics and Energy of Henan Province, China
- Zhen Yang 0006 — University of Waterloo, Ontario, Canada (and 1 more)
- Zhen Yang 0007 — University of Chinese Academy of Sciences, China (and 1 more)
- Zhen Yang 0008 — Huawei, Shanghai, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j25]Shuang Zheng, Zhengwen He, Zhen Yang, Chengbin Chu, Nengmin Wang:
Effective upper and lower bounds for a two-stage reentrant flexible flow shop scheduling problem. Comput. Oper. Res. 153: 106183 (2023) - [j24]Zhen Yang
, Ming Zhou, Haiyang Yu
, Richard O. Sinnott
, Huan Liu
:
Efficient and Secure Federated Learning With Verifiable Weighted Average Aggregation. IEEE Trans. Netw. Sci. Eng. 10(1): 205-222 (2023) - 2022
- [j23]Yongheng Liu, Zhen Yang, Tong Li
, Di Wu:
A novel POI recommendation model based on joint spatiotemporal effects and four-way interaction. Appl. Intell. 52(5): 5310-5324 (2022) - [j22]Yu Du, Tong Li
, Muhammad Salman Pathan
, Hailay Kidu Teklehaimanot, Zhen Yang:
An Effective Sarcasm Detection Approach Based on Sentimental Context and Individual Expression Habits. Cogn. Comput. 14(1): 78-90 (2022) - [j21]Zhen Yang, Xiaodong Liu, Tong Li
, Di Wu, Jinjiang Wang, Yunwei Zhao, Han Han:
A systematic literature review of methods and datasets for anomaly-based network intrusion detection. Comput. Secur. 116: 102675 (2022) - [j20]Junrui Liu
, Zhen Yang, Tong Li
, Di Wu, Ruiyi Wang:
SPR: Similarity pairwise ranking for personalized recommendation. Knowl. Based Syst. 239: 107828 (2022) - [j19]Haiyang Yu
, Zhen Yang
, Shanshan Tu
, Muhammad Waqas, Huan Liu
:
Blockchain-Based Offline Auditing for the Cloud in Vehicular Networks. IEEE Trans. Netw. Serv. Manag. 19(3): 2944-2956 (2022) - [c40]Zhanshi Li, Tong Li, Runzi Zhang, Di Wu, Zhen Yang:
A Novel Network Alert Classification Model based on Behavior Semantic. SEKE 2022: 553-558 - [c39]Weite Feng, Tong Li, Zhen Yang:
COAT: A Music Recommendation Model based on Chord Progression and Attention Mechanisms. SEKE 2022: 616-621 - 2021
- [j18]Haiyang Yu
, Shuai Ma, Qi Hu, Zhen Yang
:
Blockchain-Based Continuous Auditing for Dynamic Data Sharing in Autonomous Vehicular Networks. Computer 54(8): 33-45 (2021) - [j17]Haiyang Yu
, Zhen Yang, Muhammad Waqas, Shanshan Tu, Zhu Han, Zahid Halim, Richard O. Sinnott, Udaya Parampalli:
Efficient dynamic multi-replica auditing for the cloud with geographic location. Future Gener. Comput. Syst. 125: 285-298 (2021) - [j16]Yuwen Chen
, José-Fernán Martínez-Ortega, Lourdes López-Santidrián
, Haiyang Yu
, Zhen Yang
:
A Dynamic Membership Group-Based Multiple-Data Aggregation Scheme for Smart Grid. IEEE Internet Things J. 8(15): 12360-12374 (2021) - [j15]Xiaodong Liu
, Tong Li, Runzi Zhang, Di Wu, Yongheng Liu, Zhen Yang:
A GAN and Feature Selection-Based Oversampling Technique for Intrusion Detection. Secur. Commun. Networks 2021: 9947059:1-9947059:15 (2021) - [j14]Haiyang Yu
, Qi Hu, Zhen Yang
, Huan Liu
:
Efficient Continuous Big Data Integrity Checking for Decentralized Storage. IEEE Trans. Netw. Sci. Eng. 8(2): 1658-1673 (2021) - [c38]Guodi Wang, Tong Li, Hao Yue, Zhen Yang, Runzi Zhang:
Integrating Heterogeneous Security Knowledge Sources for Comprehensive Security Analysis. COMPSAC 2021: 714-724 - [c37]Hailay Kidu, Haile Misgna, Tong Li, Zhen Yang:
User Response-Based Fake News Detection on Social Media. ICAI 2021: 173-187 - [c36]Hongao Zhang, Zhen Yang, Haiyang Yu:
Lightweight and Privacy-preserving Search over Encryption Blockchain. IC-NIDC 2021: 423-427 - [c35]Ming Zhou, Zhen Yang, Haiyang Yu, Yingxu Lai, Zhanyu Ma:
Privacy-Preserving Verifiable Collaborative Learning with Chain Aggregation. IC-NIDC 2021: 428-433 - [c34]Jian Wu, Haiyang Yu, Zhen Yang, Ruiping Yin:
Disk Failure Prediction with Multiple Channel Convolutional Neural Network. IJCNN 2021: 1-8 - [c33]Weite Feng, Tong Li, Haiyang Yu, Zhen Yang:
A Hybrid Music Recommendation Algorithm Based on Attention Mechanism. MMM (1) 2021: 328-339 - [c32]Yinghao Zhi, Tong Li, Zhen Yang:
Extracting features from app descriptions based on POS and dependency. SAC 2021: 1354-1358 - 2020
- [j13]Shuang Zheng, Zhen Yang, Zhengwen He, Nengmin Wang, Chengbin Chu, Haiyang Yu:
Hybrid simulated annealing and reduced variable neighbourhood search for an aircraft scheduling and parking problem. Int. J. Prod. Res. 58(9): 2626-2646 (2020) - [c31]Guoshuai Zhao, Tong Li, Zhen Yang:
An Extended Knowledge Representation Learning Approach for Context-Based Traceability Link Recovery: Extended Abstract. AIRE@RE 2020: 22 - [c30]Ruiyi Wang, Tong Li, Zhen Yang, Haiyang Yu:
Predicting Polypharmacy Side Effects Based on an Enhanced Domain Knowledge Graph. ICAI 2020: 89-103 - [c29]Guoshuai Zhao, Tong Li, Zhen Yang:
An Extended Knowledge Representation Learning Approach for Context-based Traceability Link Recovery. SEKE 2020: 77-82 - [c28]Hesong Wang, Zhen Yang:
BJUT at TREC 2020 Incident Streams Track. TREC 2020
2010 – 2019
- 2019
- [j12]Haiyang Yu
, Zhen Yang
, Richard O. Sinnott
:
Decentralized Big Data Auditing for Smart City Environments Leveraging Blockchain Technology. IEEE Access 7: 6288-6296 (2019) - [j11]Haiyang Yu
, Yongquan Cai, Richard O. Sinnott, Zhen Yang:
ID-based dynamic replicated data auditing for the cloud. Concurr. Comput. Pract. Exp. 31(11) (2019) - [j10]Zhen Yang
, Haiyang Yu
, Jiliang Tang, Huan Liu:
Toward Keyword Extraction in Constrained Information Retrieval in Vehicle Social Network. IEEE Trans. Veh. Technol. 68(5): 4285-4294 (2019) - [c27]Shiheng Wang, Tong Li, Zhen Yang:
Exploring Semantics of Software Artifacts to Improve Requirements Traceability Recovery: A Hybrid Approach. APSEC 2019: 39-46 - [c26]Shiheng Wang, Tong Li
, Zhen Yang:
Using Graph Embedding to Improve Requirements Traceability Recovery. ICAI 2019: 533-545 - 2018
- [j9]Zhen Yang
, Jiliang Tang, Huan Liu:
Cloud Information Retrieval: Model Description and Scheme Design. IEEE Access 6: 15420-15430 (2018) - [j8]Zhen Yang
, Weitong Chen, Jian Huang:
Enhancing recommendation on extremely sparse data with blocks-coupled non-negative matrix factorization. Neurocomputing 278: 126-133 (2018) - [j7]Zhen Yang
, Kaiming Gao, Jian Huang:
External Expansion Risk Management: Enhancing Microblogging Filtering Using Implicit Query. Wirel. Pers. Commun. 102(3): 2199-2209 (2018) - [c25]Ning Lu, Hesong Wang, Zhen Yang:
BJUT at TREC 2018: Incident Streams Track. TREC 2018 - 2017
- [c24]Lupu Li, Guangyuan Zhang, Zhen Yang:
BJUT at TREC 2017: Tasks Track. TREC 2017 - [c23]Qingwei Meng, Kai Wang, Zhen Yang:
BJUT at TREC 2017: Real-Time Summarization Track. TREC 2017 - 2016
- [c22]Youjun E, Weitong Chen, Zhen Yang:
BJUT at TREC 2016: LiveQA Track. TREC 2016 - [c21]Cheng Li, Zhen Yang, David Lillis:
BJUT at TREC 2016 OpenSearch Track: Search Ranking Based on Clickthrough Data. TREC 2016 - [c20]Kai Wang, Zhen Yang:
BJUT at TREC 2016: Real-Time Summarization Track. TREC 2016 - 2015
- [j6]Zhen Yang, Kaiming Gao, Kefeng Fan, Yingxu Lai:
Sensational Headline Identification By Normalized Cross Entropy-Based Metric. Comput. J. 58(4): 644-655 (2015) - [j5]Yingxu Lai, Wenwen Zhang, Zhen Yang:
Software Abnormal Behavior Detection Based on Function Semantic Tree. IEICE Trans. Inf. Syst. 98-D(10): 1777-1787 (2015) - [j4]Yingxu Lai, Yinong Chen
, Zenghui Liu, Zhen Yang, Xiulong Li:
On monitoring and predicting mobile network traffic abnormality. Simul. Model. Pract. Theory 50: 176-188 (2015) - [j3]Yingxu Lai, Yinong Chen
, Qichen Zou, Zenghui Liu, Zhen Yang:
Design and analysis on trusted network equipment access authentication protocol. Simul. Model. Pract. Theory 51: 157-169 (2015) - [c19]Zhen Yang, Isaac Jones, Xia Hu, Huan Liu:
Finding the Right Social Media Site for Questions. ASONAM 2015: 639-644 - [c18]Weitong Chen, Hanchen Li, Zhen Yang:
BJUT at TREC 2015 Contextual Suggestion Track. TREC 2015 - [c17]Chaoyang Li, Zhen Yang, Kefeng Fan:
BJUT at TREC 2015 Microblog Track: Real-Time Filtering Using Non-negative Matrix Factorization. TREC 2015 - [c16]Luyang Liu, Zhen Yang:
BJUT at TREC 2015 Microblog Track: Real-Time Filtering Using Knowledge Base. TREC 2015 - [c15]Yingzhe Yao, Zhen Yang, Kefeng Fan:
BJUT at TREC 2015 Temporal Summarization Track. TREC 2015 - 2014
- [j2]Lijuan Duan, Hongyan Zhong, Jun Miao, Zhen Yang, Wei Ma, Xuan Zhang:
A Voting Optimized Strategy Based on ELM for Improving Classification of Motor Imagery BCI Data. Cogn. Comput. 6(3): 477-483 (2014) - [j1]Yingxu Lai, Wenwen Zhang, Zhen Yang:
Research on Software Trust Analysis Based on Behavior. IEICE Trans. Inf. Syst. 97-D(3): 488-496 (2014) - [c14]Lijuan Duan, Zeming Zhao, Wei Ma, Jili Gu, Zhen Yang, Yuanhua Qiao:
A combined model for scan path in pedestrian searching. IJCNN 2014: 2156-2161 - [c13]Hanchen Li, Zhen Yang, Yingxu Lai, Lijuan Duan, Kefeng Fan:
BJUT at TREC 2014 Contextual Suggestion Track: Hybrid Recommendation Based on Open-web Information. TREC 2014 - [c12]Guangyuan Zhang, Zhen Yang, Shuyong Si:
BJUT at TREC 2014 Microblog Track. TREC 2014 - [c11]Yun Zhao, Fei Yao, Huayang Sun, Zhen Yang:
BJUT at TREC 2014 Temporal Summarization Track. TREC 2014 - 2013
- [c10]Lijuan Duan, Haitao Qiao, Chunpeng Wu, Zhen Yang, Wei Ma:
Modeling of Human Saccadic Scanpaths Based on Visual Saliency. ICGEC 2013: 267-274 - [c9]Lijuan Duan, Jili Gu, Zhen Yang, Jun Miao, Wei Ma, Chunpeng Wu:
Bio-inspired Visual Attention Model and Saliency Guided Object Segmentation. ICGEC 2013: 291-298 - [c8]Zhen Yang, Fei Yao, Huayang Sun, Yun Zhao, Yingxu Lai, Kefeng Fan:
BJUT at TREC 2013 Temporal Summarization Track. TREC 2013 - [c7]Zhen Yang, Guangyuan Zhang, Shuyong Si, Yingxu Lai, Kefeng Fan:
BJUT at TREC 2013 Microblog Track. TREC 2013 - 2011
- [c6]Lijuan Duan, Chunpeng Wu, Haitao Qiao, Jili Gu, Jun Miao, Laiyun Qing, Zhen Yang:
Bio-inspired Visual Saliency Detection and Its Application on Image Retargeting. ICONIP (1) 2011: 182-189 - [c5]Lijuan Duan, Xuebin Wang, Zhen Yang, Haiyan Zhou, Chunpeng Wu, Qi Zhang, Jun Miao:
An Emotional Face Evoked EEG Signal Recognition Method Based on Optimal EEG Feature and Electrodes Selection. ICONIP (1) 2011: 296-305 - [c4]Kefeng Fan, Subing Zhang, Yinghua Huang, Zhen Yang:
A risk assessment model for the operating system of the DTV. HPCS 2011: 621-625 - 2010
- [c3]Yingxu Lai, Qian Ma, Zhen Yang, Jing Liu:
Framework of Web content filtering for IPv6. HPCS 2010: 686-690 - [c2]Lijuan Duan, Jicai Ma, Zhen Yang, Jun Miao:
An Approach to Texture Segmentation Analysis Based on Sparse Coding Model and EM Algorithm. ISNN (2) 2010: 128-135
2000 – 2009
- 2009
- [c1]Zhen Yang, Kefeng Fan, Yingxu Lai:
Trusted Computing Based Mobile DRM Authentication Scheme. IAS 2009: 7-10
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2023-03-31 23:53 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint