


default search action
Yu-an Tan
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Yu-an Tan 0001
(aka: Yu-An Tan 0001) — Beijing Institute of Technology, School of Computer Science and Technology, China
- Yuan Tan 0002
— Sichuan University, Chengdu, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j18]Zheng Lu, Yu-an Tan, Xiaochun Cheng, Zhihan Zheng, Ning Shi, Yuanzhang Li:
An automated framework for detecting and mitigating memory safety vulnerabilities in UEFI firmware. Comput. Electr. Eng. 122: 109945 (2025) - [j17]Ming Yang, Yu-an Tan, Ning Shi, Yajie Wang, Ziqi Wang, Qi Liang:
A privacy-preserving standardized model for large-scale source code fingerprint extraction and clone detection. Comput. Stand. Interfaces 94: 103998 (2025) - [j16]Jiaxing Li, Yu-an Tan, Runke Liu, Weizhi Meng, Yuanzhang Li:
FeatureBA: Hard label black box attack based on internal layer features of surrogate model. Expert Syst. Appl. 276: 127082 (2025) - 2024
- [j15]Shifen Shao
, Fuqiang Qin, Xiaolin Zhang, Hui Wu, Yuan Tan, Liantao Cui, Shan Gao:
Improved Funnel Control for Waterwheel Handling Robot Manipulators With Unknown Dead Zone. IEEE Access 12: 192894-192902 (2024) - [j14]Jiakang Li
, Songning Lai, Zhihao Shuai, Yuan Tan, Yifan Jia, Mianyang Yu
, Zichen Song
, Xiaokang Peng, Ziyang Xu
, Yongxin Ni
, Haifeng Qiu, Jiayu Yang, Yutong Liu, Yonggang Lu
:
A comprehensive review of community detection in graphs. Neurocomputing 600: 128169 (2024) - [j13]Zhen Cai, Fanhang Zhang, Yuan Tan
, Stephan Kessler, Johannes Fottner
:
Integration of an IoT sensor with angle-of-arrival-based angle measurement in AGV navigation: A reliability study. J. Ind. Inf. Integr. 42: 100707 (2024) - [c26]Yanqiu Zhang, Xiao Yu, Jinzhao Liu, Li Zhang, Yuanzhang Li, Yuan Tan:
CCE&D: A Configuration Failure Prevention Method for Autonomous Driving Systems. ACISP (3) 2024: 288-302 - [c25]Fan Qin, Nan Ji, Zeping Ye, Ning Shi, Yu-an Tan:
Enhancing Adversarial Robustness in Object Detection via Multi-task Learning and Class-Aware Adversarial Training. AIS&P 2024: 89-104 - [c24]Han Liu, Yue Li, Yuan Tan, Menghang Zhang, Hongfei Da:
AUGME: Trust-Minimized Bitcoin Layer2. BRAINS 2024: 1-2 - [c23]Xuan Hai, Xin Liu, Zhaorun Chen, Yuan Tan, Song Li, Weina Niu, Gang Liu, Rui Zhou, Qingguo Zhou:
Ghost-in-Wave: How Speaker-Irrelative Features Interfere DeepFake Voice Detectors. ICME 2024: 1-6 - [c22]Songning Lai, Jiakang Li, Guinan Guo, Xifeng Hu, Yulong Li, Yuan Tan, Zichen Song
, Yutong Liu, Zhaoxia Ren, Chun Wang, Danmin Miao, Zhi Liu:
Shared and Private Information Learning in Multimodal Sentiment Analysis with Deep Modal Alignment and Self-supervised Multi-Task Learning. IJCNN 2024: 1-8 - [c21]Xuan Hai
, Xin Liu
, Yuan Tan
, Gang Liu
, Song Li
, Weina Niu
, Rui Zhou
, Xiaokang Zhou
:
What's the Real: A Novel Design Philosophy for Robust AI-Synthesized Voice Detection. ACM Multimedia 2024: 6900-6909 - 2023
- [j12]Qing-Jing Sheng, Yuan Tan, Liyuan Zhang, Zhiping Wu, Beiying Wang, Xiao-Ying He:
Heterogeneous graph framework for predicting the association between lncRNA and disease and case on uterine fibroid. Comput. Biol. Medicine 165: 107331 (2023) - [j11]Guodong Ye, Xin Liu
, Siqi Fan, Yuan Tan
, Qingguo Zhou, Rui Zhou, Xiaokang Zhou:
Novel supply chain vulnerability detection based on heterogeneous-graph-driven hash similarity in IoT. Future Gener. Comput. Syst. 148: 201-210 (2023) - [c20]Xin Liu, Yuan Tan, Zhenghang Xiao, Jianwei Zhuge, Rui Zhou:
Not The End of Story: An Evaluation of ChatGPT-Driven Vulnerability Description Mappings. ACL (Findings) 2023: 3724-3731 - [c19]Tong Tang, Yuan Tan, Shihang Ding, Zhidu Li:
Structural Quality Assured Global Optimization for CTU-Level Rate Control of Screen Content Coding. APSIPA ASC 2023: 1479-1483 - [c18]Zhiyuan Hu
, Yuan Tan
, Anchao Cheng
, Guangjun Zeng
:
Research on Network Dynamic Security Policy Model Based on Neural Network. BDIOT 2023: 135-141 - [c17]Zhiyuan Hu
, Yuan Tan
, Anchao Cheng
, Guangjun Zeng
:
Research on Network Abnormal Behavior Recognition Model Based on Parallel Decision Tree Algorithm. ICCDA 2023: 69-74 - [c16]Xin Liu, Yuan Tan, Xuan Hai, Qingchen Yu, Qingguo Zhou:
Hidden-in-Wave: A Novel Idea to Camouflage AI-Synthesized Voices Based on Speaker-Irrelative Features. ISSRE 2023: 786-794 - [c15]Xuan Hai
, Xin Liu
, Yuan Tan
, Qingguo Zhou
:
SiFDetectCracker: An Adversarial Attack Against Fake Voice Detection Based on Speaker-Irrelative Features. ACM Multimedia 2023: 8552-8560 - 2022
- [c14]Yue Li, Han Liu, Yuan Tan:
POLYBRIDGE: A Crosschain Bridge For Heterogeneous Blockchains. ICBC 2022: 1-2 - 2021
- [j10]Jing Li, Xiangyan Tang, Zhijun Wei, Yu Wang, Wenbin Chen
, Yu-an Tan:
Identity-based Multi-Recipient Public Key Encryption Scheme and Its Application in IoT. Mob. Networks Appl. 26(4): 1543-1550 (2021) - [j9]Jing Li, Xiangyan Tang, Zhijun Wei, Yu Wang, Wenbin Chen
, Yu-an Tan:
Correction to: Identity-based Multi-Recipient Public Key Encryption Scheme and Its Application in IoT. Mob. Networks Appl. 26(4): 1551 (2021) - [c13]Yanfeng Wang, Weiping Wang, Mu Lin, Tao Wang, Yifan Zhu, Yingying Zhu, Yuan Tan, Ping Liu, Xiaowei Wang:
Research on the Analysis Method of Combat Test System of Systems for Capability Generation. ICISCAE (IEEE) 2021: 162-167 - [c12]Yuan Tan, Jinsong Gui, Kun Wang, Zhigang Chen:
DWAFE: Achieve Accurate AIOps Fault Early Warning. NCTCS 2021: 154-173 - 2020
- [j8]Jie Sun, Bin Wang
, Yan Niu, Yuan Tan, Chanjuan Fan, Nan Zhang, Jiayue Xue, Jing Wei, Jie Xiang:
Complexity Analysis of EEG, MEG, and fMRI in Mild Cognitive Impairment and Alzheimer's Disease: A Review. Entropy 22(2): 239 (2020) - [j7]Ruijin Zhu
, Baofeng Zhang, Yu-an Tan, Jinmiao Wang
, Yueliang Wan:
Determining the Image Base of Smart Device Firmware for Security Analysis. Wirel. Commun. Mob. Comput. 2020: 8899193:1-8899193:12 (2020)
2010 – 2019
- 2019
- [j6]Xin Huang
, Guangrui Wen, Lin Liang, Zhifen Zhang, Yuan Tan:
Frequency Phase Space Empirical Wavelet Transform for Rolling Bearings Fault Diagnosis. IEEE Access 7: 86306-86318 (2019) - [c11]Boyu Zhang, Kai Yang, Lianfang Wang, Yu-an Tan, Sikang Hu:
Tracing Android Kernel Codes at Early Stage without Extra Hardware Components. DSC 2019: 210-216 - 2018
- [j5]Chong Wang, Changyou Zhang, Bin Wu, Yu-an Tan, Yongji Wang:
A novel anti-detection criterion for covert storage channel threat estimation. Sci. China Inf. Sci. 61(4): 048101:1-048101:3 (2018) - 2017
- [c10]FanJiao Meng, Jiamin Zheng, Xiao Yu, Changyou Zhang, Yu-an Tan:
A High Efficiency Encryption Scheme of Dual Data Partitions for Android Devices. CSE/EUC (1) 2017: 823-828 - [c9]Xu Han, Yuan Tan, Hao Ma:
The switching frequency optimization of dual phase shift control for dual active bridge DC-DC converter. IECON 2017: 1610-1615 - [c8]Hao Ma, Yuan Tan, Li Du, Xu Han, Jing Ji:
An integrated design of power converters for electric vehicles. ISIE 2017: 600-605 - 2015
- [j4]Peili Wu, Kuien Liu, Kai Zheng, Zhiming Ding, Yuan Tan:
A road network modeling method for map matching on lightweight mobile devices. Distributed Parallel Databases 33(2): 145-164 (2015) - 2013
- [j3]Yuan Tan, Zhifa Liu:
Feature selection and prediction with a Markov blanket structure learning algorithm. BMC Bioinform. 14(S-17): A3 (2013) - 2011
- [j2]Hao Xu, Changhai Zhang, Yu-An Tan, Jun Lu:
An improved evolutionary approach to the Extended Capacitated Arc Routing Problem. Expert Syst. Appl. 38(4): 4637-4641 (2011) - [c7]Xiao Li, Yu-an Tan, Zhizhuo Sun:
Semi-RAID: A reliable energy-aware RAID data layout for sequential data access. MSST 2011: 1-11 - 2010
- [j1]Jun Zheng, Yu-an Tan, Xuelan Zhang, Jun Lu:
An improved dynamic structure-based neural networks determination approaches to simulation optimization problems. Neural Comput. Appl. 19(6): 883-901 (2010)
2000 – 2009
- 2009
- [c6]Xiao Li, Yu-an Tan:
TPL: A Data Layout Method for Reducing Rotational Latency of Modern Hard Disk Drive. CSIE (7) 2009: 336-340 - 2006
- [c5]Xiao-Xiong Weng, Yu-An Tan, Gao-Li Du, Qin-Ming Hong:
Prediction and Identification of Urban Traffic Flow Based on Features. ICARCV 2006: 1-6 - 2005
- [c4]Yu-an Tan, Guo-min Lin, Hong Deng, Xuelan Zhang:
A WBEM Based Disk Array Management Provider. CW 2005: 510-514 - [c3]Yu-an Tan, Ji-yan Zheng, Yuan-Da Cao:
A Segment-based Approach of Defending Against Buffer Overflow Attacks. PDCAT 2005: 430-433 - [c2]Yu-an Tan, Hong Deng, Guo-min Lin, Xuelan Zhang:
Design and Implementation of a WBEM Disk Array Provider. PDCAT 2005: 861-865 - [c1]Yu-an Tan, Jing Jin, Yuan-Da Cao, Ligu Zhu:
A High-Throughput Fibre Channel Data Communication Service. PDCAT 2005: 975-978
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-04-27 18:05 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint