default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Exact matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 31 matches
- 2024
- Yanjiang Liu, Tianyun Zhong, Yaojie Lu, Hongyu Lin, Ben He, Shuheng Zhou, Huijia Zhu, Weiqiang Wang, Zhongyi Liu, Xianpei Han, Le Sun:
XMC-Agent : Dynamic Navigation over Scalable Hierarchical Index for Incremental Extreme Multi-label Classification. ACL (Findings) 2024: 5659-5672 - 2023
- Yanjiang Zhou, Peisong He, Weichuang Li, Yun Cao, Xinghao Jiang:
Generalized Fake Image Detection Method Based on Gated Hierarchical Multi-Task Learning. IEEE Signal Process. Lett. 30: 1767-1771 (2023) - Shuai Shao, Lei Xing, Yanjiang Wang, Baodi Liu, Weifeng Liu, Yicong Zhou:
Attention-Based Multi-View Feature Collaboration for Decoupled Few-Shot Learning. IEEE Trans. Circuits Syst. Video Technol. 33(5): 2357-2369 (2023) - 2022
- Xingqi Zeng, Yang Zou, Zhixiang Zhou, Yanjiang Yu, Kun Yu, Hongbo Peng, Liwen Zhang:
On the deflection of composite reinforced steel truss-concrete beam under static and dynamic load. J. Comput. Methods Sci. Eng. 22(5): 1533-1544 (2022) - Shuai Shao, Baodi Liu, Lei Xing, Lifei Zhao, Yanjiang Wang, Weifeng Liu, Yicong Zhou:
CSN: Component-Supervised Network for Few-Shot Classification. CoRR abs/2203.07738 (2022) - 2021
- Shuai Shao, Lei Xing, Yixin Chen, Yanjiang Wang, Bao-Di Liu, Yicong Zhou:
CIM: Class-Irrelevant Mapping for Few-Shot Classification. CoRR abs/2109.02840 (2021) - 2018
- Jiannong Cao, Aniello Castiglione, Giovanni Motta, Florin Pop, Yanjiang Yang, Wanlei Zhou:
Human-Driven Edge Computing and Communication: Part 2. IEEE Commun. Mag. 56(2): 134-135 (2018) - Bin Zhou, Yanjiang Wang, Weifeng Liu, Bao-Di Liu:
Recognition of Working Condition in Sucker-Rod Pumping Wells Based on Multi-View Kernel Learning and Hessian-Regularized Logistic Regression. ICSPCC 2018: 1-5 - 2017
- Jiannong Cao, Aniello Castiglione, Giovanni Motta, Florin Pop, Yanjiang Yang, Wanlei Zhou:
Human-Driven Edge Computing and Communication: Part 1. IEEE Commun. Mag. 55(11): 70-71 (2017) - Rui Xu, Kirill Morozov, Yanjiang Yang, Jianying Zhou, Tsuyoshi Takagi:
Efficient outsourcing of secure k-nearest neighbour query over encrypted database. Comput. Secur. 69: 65-83 (2017) - Yanjiang Wang, Bin Zhou, Weifeng Liu, Huimin Zhang:
Sparse Canonicial Correlation Analysis for Mobile Media Recognition on the Cloud. J. Mobile Multimedia 12(3&4): 265-276 (2017) - Yanjiang Huang, Jie Xie, Haopeng Zhou, Yanglong Zheng, Xianmin Zhang:
A Robot Teaching Method Based on Motion Tracking with Particle Filter. ICIRA (2) 2017: 647-658 - Yanjiang Huang, H. Zhou, Y. Wang, Xianmin Zhang:
Position and orientation estimation of palm based on mark points. SII 2017: 956-961 - 2016
- Rui Xu, Kirill Morozov, Yanjiang Yang, Jianying Zhou, Tsuyoshi Takagi:
Privacy-Preserving k-Nearest Neighbour Query on Outsourced Database. ACISP (1) 2016: 181-197 - Yanjiang Yang, Haibing Lu, Joseph K. Liu, Jian Weng, Youcheng Zhang, Jianying Zhou:
Credential Wrapping: From Anonymous Password Authentication to Anonymous Biometric Authentication. AsiaCCS 2016: 141-151 - 2015
- Xiaoning Pan, Yang Li, Zhisheng Wu, Qiao Zhang, Zhou Zheng, Xinyuan Shi, Yanjiang Qiao:
A Online NIR Sensor for the Pilot-Scale Extraction Process in Fructus Aurantii Coupled with Single and Ensemble Methods. Sensors 15(4): 8749-8763 (2015) - Yanjiang Yang, Joseph K. Liu, Kaitai Liang, Kim-Kwang Raymond Choo, Jianying Zhou:
Extended Proxy-Assisted Approach: Achieving Revocable Fine-Grained Encryption of Cloud Data. ESORICS (2) 2015: 146-166 - Xianmin Zhang, Huiyu Zhou, H. Cheng, Yanjiang Huang:
Teaching-playback of robot manipulator based on human gesture recognition and motion tracking. ROBIO 2015: 1183-1188 - 2013
- Yanjiang Yang, Xuhua Ding, Haibing Lu, Jian Weng, Jianying Zhou:
Self-blindable Credential: Towards Anonymous Entity Authentication Upon Resource Constrained Devices. ISC 2013: 238-247 - Yanjiang Yang, Xuhua Ding, Haibing Lu, Zhiguo Wan, Jianying Zhou:
Achieving Revocable Fine-Grained Cryptographic Access Control over Cloud Data. ISC 2013: 293-308 - 2012
- Yanjiang Yang, Haibing Lu, Jian Weng, Xuhua Ding, Jianying Zhou:
A Generic Approach for Providing Revocation Support in Secret Handshake. ICICS 2012: 276-284 - 2011
- Yanjiang Yang, Jianying Zhou, Robert H. Deng, Feng Bao:
Better security enforcement in trusted computing enabled heterogeneous wireless sensor networks. Secur. Commun. Networks 4(1): 11-22 (2011) - 2010
- Joseph K. Liu, Joonsang Baek, Jianying Zhou, Yanjiang Yang, Jun Wen Wong:
Efficient online/offline identity-based signature for wireless sensor network. Int. J. Inf. Sec. 9(4): 287-296 (2010) - Yanjiang Yang, Jianying Zhou, Jun Wen Wong, Feng Bao:
Towards practical anonymous password authentication. ACSAC 2010: 59-68 - Joseph K. Liu, Joonsang Baek, Jianying Zhou, Yanjiang Yang, Jun Wen Wong:
Efficient Online/Offline Identity-Based Signature for Wireless Sensor Network. IACR Cryptol. ePrint Arch. 2010: 3 (2010) - 2009
- Yanjiang Yang, Jianying Zhou, Jian Weng, Feng Bao:
A New Approach for Anonymous Password Authentication. ACSAC 2009: 199-208 - Yanjiang Yang, Jian Weng, Jianying Zhou, Ying Qiu:
Optionally Identifiable Private Handshakes. Inscrypt 2009: 164-178 - Yanjiang Yang, Jianying Zhou, Robert H. Deng, Feng Bao:
Computationally Secure Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks. ICICS 2009: 135-149 - Yanjiang Yang, Robert H. Deng, Jianying Zhou, Ying Qiu:
Achieving Better Privacy Protection in Wireless Sensor Networks Using Trusted Computing. ISPEC 2009: 384-395 - Yanjiang Yang, Yingjiu Li, Jian Weng, Jianying Zhou, Feng Bao:
Self-enforcing Private Inference Control. ProvSec 2009: 260-274
skipping 1 more match
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-10-04 17:26 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint