default search action
Yuan Ping
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j58]Ben Pi, Chun Guo, Yunhe Cui, Guowei Shen, Jialong Yang, Yuan Ping:
Remote access trojan traffic early detection method based on Markov matrices and deep learning. Comput. Secur. 137: 103628 (2024) - [j57]Jiaxin Peng, Chun Guo, Yuan Ping, Yunhe Cui, Yi Chen, Guowei Shen:
SNDMI: Spyware network traffic detection method based on inducement operations. Comput. Secur. 140: 103806 (2024) - [j56]Yange Chen, Baocang Wang, Hang Jiang, Pu Duan, Yuan Ping, Zhiyong Hong:
PEPFL: A framework for a practical and efficient privacy-preserving federated learning. Digit. Commun. Networks 10(2): 355-368 (2024) - [j55]Yuan Ping, Binhua Wang:
Retranslated Chinese classical canon Journey to the West: a stylometric comparison between Julia Lovell's retranslation and Arthur Waley's translation. Digit. Scholarsh. Humanit. 39(1): 308-320 (2024) - [j54]Yuan Ping:
Literary Digital Stylistics in Translation Studies. Anna Maria Cipriani. Digit. Scholarsh. Humanit. 39(2): 807-809 (2024) - [j53]Yuan Ping, Huina Li, Bin Hao, Chun Guo, Baocang Wang:
Beyond k-Means++: Towards better cluster exploration with geometrical information. Pattern Recognit. 146: 110036 (2024) - [j52]Yuping Lai, Yiying Yu, Wenbo Guan, Lijuan Luo, Jing Fan, Nanrun Zhou, Yuan Ping:
A Lightweight Intrusion Detection System Using a Finite Dirichlet Mixture Model With Extended Stochastic Variational Inference. IEEE Trans. Netw. Serv. Manag. 21(4): 4701-4712 (2024) - [j51]Yange Chen, Lei Liu, Yuan Ping, Mohammed Atiquzzaman, Shahid Mumtaz, Zhili Zhang, Mohsen Guizani, Zhihong Tian:
A Privacy-Preserving Federated Learning Framework With Lightweight and Fair in IoT. IEEE Trans. Netw. Serv. Manag. 21(5): 5843-5858 (2024) - 2023
- [j50]Huaxin Deng, Chun Guo, Guowei Shen, Yunhe Cui, Yuan Ping:
MCTVD: A malware classification method based on three-channel visualization and deep learning. Comput. Secur. 126: 103084 (2023) - [j49]Weiping Peng, Jiabao Liu, Yuan Ping, Di Ma:
Model Protection Scheme Against Distillation Attack in Internet of Vehicles. EAI Endorsed Trans. e Learn. 8(3) (2023) - [j48]Fanxi Wei, Yuan Ping, Wenhong Wu, Danping Niu, Yan Cao:
Controllable Privacy-Preserving Online Diagnosis with Outsourced SVM over Encrypted Medical Data. EAI Endorsed Trans. e Learn. 9 (2023) - [c5]Yuan Ping, Mingming Wang, Juntong Qi, Chong Wu, Jinjin Guo:
Collaborative Control Based on Payload- leading for the Multi-quadrotor Transportation Systems. ICRA 2023: 5304-5309 - 2022
- [j47]Yan Cao, Yuan Ping, Shaohua Tao, YongGang Chen, YanXia Zhu:
Specification and adaptive verification of access control policy for cyber-physical-social spaces. Comput. Secur. 114: 102579 (2022) - [j46]Yuping Lai, Wenbo Guan, Lijuan Luo, Qiang Ruan, Yuan Ping, Heping Song, Hongying Meng, Yu Pan:
Extended variational inference for Dirichlet process mixture of Beta-Liouville distributions for proportional data modeling. Int. J. Intell. Syst. 37(7): 4277-4306 (2022) - [j45]Yange Chen, SuYu He, Baocang Wang, Pu Duan, Benyu Zhang, Zhiyong Hong, Yuan Ping:
Cryptanalysis and Improvement of DeepPAR: Privacy-Preserving and Asynchronous Deep Learning for Industrial IoT. IEEE Internet Things J. 9(21): 21958-21970 (2022) - [j44]Shaohua Tao, Runhe Qiu, Bo Xu, Yuan Ping:
Micro-behaviour with Reinforcement Knowledge-aware Reasoning for Explainable Recommendation. Knowl. Based Syst. 251: 109300 (2022) - [j43]Yuan Ping, Tyler J. Smart:
Author Correction: Computational design of quantum defects in two-dimensional materials. Nat. Comput. Sci. 2(11): 772 (2022) - 2021
- [j42]Hao Liu, Chun Guo, Yunhe Cui, Guowei Shen, Yuan Ping:
2-SPIFF: a 2-stage packer identification method based on function call graph and file attributes. Appl. Intell. 51(12): 9038-9053 (2021) - [j41]Junyi Li, Huinian Li, Xiao Ye, Li Zhang, Qingzhe Xu, Yuan Ping, Xiaozhu Jing, Wei Jiang, Qing Liao, Bo Liu, Yadong Wang:
IIMLP: integrated information-entropy-based method for LncRNA prediction. BMC Bioinform. 22-S(3): 243 (2021) - [j40]Yunzhen Zhang, Yuan Ping, Zhili Zhang, Guangzhe Zhao:
Recent Advances in Dimensionality Reduction Modeling and Multistability Reconstitution of Memristive Circuit. Complex. 2021: 2747174:1-2747174:18 (2021) - [j39]Jianyu Miao, Yuan Ping, Zhensong Chen, Xiao-Bo Jin, Peijia Li, Lingfeng Niu:
Unsupervised feature selection by non-convex regularized self-representation. Expert Syst. Appl. 173: 114643 (2021) - [j38]Dachao Wang, Baocang Wang, Yuan Ping:
Comment on 'Targeted Ciphers for Format-Preserving Encryption' from Selected Areas in Cryptography 2018. IET Inf. Secur. 15(5): 395-400 (2021) - [j37]Yuping Lai, Huirui Cao, Lijuan Luo, Yongmei Zhang, Fukun Bi, Xiaolin Gui, Yuan Ping:
Extended variational inference for gamma mixture model in positive vectors modeling. Neurocomputing 432: 145-158 (2021) - [j36]Yange Chen, Hequn Liu, Baocang Wang, Baljinnyam Sonompil, Yuan Ping, Zhili Zhang:
A threshold hybrid encryption method for integrity audit without trusted center. J. Cloud Comput. 10(1): 3 (2021) - [j35]Shaohua Tao, Runhe Qiu, Yuan Ping, Hui Ma:
Multi-modal Knowledge-aware Reinforcement Learning Network for Explainable Recommendation. Knowl. Based Syst. 227: 107217 (2021) - [j34]Yange Chen, Yuan Ping, Zhili Zhang, Baocang Wang, SuYu He:
Privacy-preserving image multi-classification deep learning model in robot system of industrial IoT. Neural Comput. Appl. 33(10): 4677-4694 (2021) - [j33]Yuan Ping, Tyler J. Smart:
Computational design of quantum defects in two-dimensional materials. Nat. Comput. Sci. 1(10): 646-654 (2021) - 2020
- [j32]Shaohua Tao, Runhe Qiu, Yuan Ping, Woping Xu, Hui Ma:
Making Explainable Friend Recommendations Based on Concept Similarity Measurements via a Knowledge Graph. IEEE Access 8: 146027-146038 (2020) - [j31]Junyi Li, Yuan Ping, Hong Li, Huinian Li, Ying Liu, Bo Liu, Yadong Wang:
Prognostic prediction of carcinoma by a differential-regulatory-network-embedded deep neural network. Comput. Biol. Chem. 88: 107317 (2020) - [j30]Yuan Ping, Xuyang Guo, Baocang Wang, Jingxian Zhou:
Secure outsourcing of modular inverses and scalar multiplications on elliptic curves. Int. J. Secur. Networks 15(2): 101-110 (2020) - [j29]Yuan Ping, Wei Song, Zhili Zhang, Weiping Wang, Baocang Wang:
A Multi-Keyword Searchable Encryption Scheme Based on Probability Trapdoor over Encryption Cloud Data. Inf. 11(8): 394 (2020) - [j28]Yuan Ping, Yu Zhan, Ke Lu, Baocang Wang:
Public Data Integrity Verification Scheme for Secure Cloud Storage. Inf. 11(9): 409 (2020) - [j27]Ying Zou, Zhen Zhao, Sha Shi, Lei Wang, Yunfeng Peng, Yuan Ping, Baocang Wang:
Highly Secure Privacy-Preserving Outsourced k-Means Clustering under Multiple Keys in Cloud Computing. Secur. Commun. Networks 2020: 1238505:1-1238505:11 (2020) - [j26]Ying Zou, Yanting Chai, Sha Shi, Lei Wang, Yunfeng Peng, Yuan Ping, Baocang Wang:
Improved Cloud-Assisted Privacy-Preserving Profile-Matching Scheme in Mobile Social Networks. Secur. Commun. Networks 2020: 4938736:1-4938736:12 (2020) - [j25]Chenyang Ma, Baocang Wang, Kyle Jooste, Zhili Zhang, Yuan Ping:
Practical Privacy-Preserving Frequent Itemset Mining on Supermarket Transactions. IEEE Syst. J. 14(2): 1992-2002 (2020) - [j24]Yanting Chai, Yu Zhan, Baocang Wang, Yuan Ping, Zhili Zhang:
Improvement on a privacy-preserving outsourced classification protocol over encrypted data. Wirel. Networks 26(6): 4363-4374 (2020)
2010 – 2019
- 2019
- [j23]Yuping Lai, Xiu Ma, Yanping Xu, Yongfa Ling, Chunlai Du, Jianhe Du, Yongmei Zhang, Yuan Ping:
Positive Data Modeling Using a Mixture of Mixtures of Inverted Beta Distributions. IEEE Access 7: 38146-38156 (2019) - [j22]Wenju Xu, Yu Zhan, Zheng Wang, Baocang Wang, Yuan Ping:
Attack and Improvement on a Symmetric Fully Homomorphic Encryption Scheme. IEEE Access 7: 68373-68379 (2019) - [j21]Yuan Ping, Bin Hao, Xiali Hei, Yazhou Tu, Xiaojiang Du, Jie Wu:
Feature Fusion and Voiceprint-Based Access Control for Wireless Insulin Pump Systems. IEEE Access 7: 121286-121302 (2019) - [j20]Yuan Ping, Bin Hao, Huina Li, Yuping Lai, Chun Guo, Hui Ma, Baocang Wang, Xiali Hei:
Efficient Training Support Vector Clustering With Appropriate Boundary Information. IEEE Access 7: 146964-146978 (2019) - [j19]Junyi Li, Li Zhang, Huinian Li, Yuan Ping, Qingzhe Xu, Rongjie Wang, Renjie Tan, Zhen Wang, Bo Liu, Yadong Wang:
Integrated entropy-based approach for analyzing exons and introns in DNA sequences. BMC Bioinform. 20-S(8): 283:1-283:7 (2019) - [j18]Yuan Ping, Baocang Wang, Shengli Tian, Jingxian Zhou, Hui Ma:
PKCHD: Towards a Probabilistic Knapsack Public-Key Cryptosystem with High Density. Inf. 10(2): 75 (2019) - [j17]Cheng Song, Xinan Gu, Lei Wang, Zhizhong Liu, Yuan Ping:
Research on Identity-based Batch Anonymous Authentication Scheme for VANET. KSII Trans. Internet Inf. Syst. 13(12): 6175-6189 (2019) - [j16]Quanbo Qu, Baocang Wang, Yuan Ping, Zhili Zhang:
Improved Cryptanalysis of a Fully Homomorphic Symmetric Encryption Scheme. Secur. Commun. Networks 2019: 8319508:1-8319508:6 (2019) - [c4]Junyi Li, Huinian Li, Li Zhang, Qingzhe Xu, Yuan Ping, Xiaozhu Jing, Wei Jiang, Bo Liu, Yadong Wang:
Prediction of Human LncRNAs Based on Integrated Information Entropy Features. ICIC (2) 2019: 333-343 - 2018
- [j15]Yuan Ping, Baocang Wang, Shengli Tian, Yuehua Yang, Genyuan Du:
Deterministic lattice reduction on knapsacks with collision-free properties. IET Inf. Secur. 12(4): 375-380 (2018) - [j14]Yu-Ping Lai, Yuan Ping, Ke Xiao, Bin Hao, Xiufeng Zhang:
Variational Bayesian inference for a Dirichlet process mixture of beta distributions and application. Neurocomputing 278: 23-33 (2018) - [j13]Yu-Ping Lai, Wenda He, Yuan Ping, Jinshuai Qu, Xiufeng Zhang:
Variational Bayesian Inference for Infinite Dirichlet Mixture Towards Accurate Data Categorization. Wirel. Pers. Commun. 102(3): 2307-2329 (2018) - [c3]Yuehua Yang, Yuan Ping:
An Ontology-Based Semantic Similarity Computation Model. BigComp 2018: 561-564 - 2017
- [j12]Jun Liao, Chaohui Jiang, Chun Guo, Yuan Ping:
一种基于权重属性熵的分类匿名算法 (Classification Anonymity Algorithm Based on Weight Attributes Entropy). 计算机科学 44(7): 42-46 (2017) - [j11]Yuan Ping, Yingjie Tian, Chun Guo, Baocang Wang, Yuehua Yang:
FRSVC: Towards making support vector clustering consume less. Pattern Recognit. 69: 286-298 (2017) - [j10]Yuan Ping, Baocang Wang, Yuehua Yang, Shengli Tian:
Building Secure Public Key Encryption Scheme from Hidden Field Equations. Secur. Commun. Networks 2017: 9289410:1-9289410:6 (2017) - 2016
- [j9]Chun Guo, Yuan Ping, Nian Liu, Shoushan Luo:
A two-level hybrid approach for intrusion detection. Neurocomputing 214: 391-400 (2016) - 2015
- [j8]Huina Li, Yuan Ping:
Recent Advances in Support Vector Clustering: Theory and Applications. Int. J. Pattern Recognit. Artif. Intell. 29(1): 1550002:1-1550002:27 (2015) - [j7]Yuan Ping, Yun Feng Chang, Yajian Zhou, Yingjie Tian, Yixian Yang, Zhili Zhang:
Fast and scalable support vector clustering for large-scale data analysis. Knowl. Inf. Syst. 43(2): 281-310 (2015) - 2014
- [j6]Chun Guo, Yajian Zhou, Yuan Ping, Zhongkun Zhang, Guole Liu, Yixian Yang:
A distance sum-based hybrid method for intrusion detection. Appl. Intell. 40(1): 178-188 (2014) - [j5]Yingjie Tian, Qin Zhang, Yuan Ping:
Large-scale linear nonparallel support vector machine solver. Neurocomputing 138: 114-119 (2014) - [j4]Yingjie Tian, Yuan Ping:
Large-scale linear nonparallel support vector machine solver. Neural Networks 50: 166-174 (2014) - 2013
- [j3]Chun Guo, Yajian Zhou, Yuan Ping, Shoushan Luo, Yu-Ping Lai, Zhongkun Zhang:
Efficient intrusion detection using representative instances. Comput. Secur. 39: 255-267 (2013) - [c2]Yuan Ping, Huina Li, Yong Zhang, Zhili Zhang:
A New Perspective of Support Vector Clustering with Boundary Patterns. MCS 2013: 224-235 - 2012
- [j2]Yuan Ping, Yajian Zhou, Yixian Yang:
A Novel Scheme for Accelerating Support Vector Clustering. Comput. Informatics 31(3): 613- (2012) - [j1]Yuan Ping, Yingjie Tian, Yajian Zhou, Yixian Yang:
Convex Decomposition Based Cluster Labeling Method for Support Vector Clustering. J. Comput. Sci. Technol. 27(2): 428-442 (2012)
2000 – 2009
- 2009
- [c1]Yuan Ping, Jiang Zhijun, Song Ming:
A Multiple-Landmark Multicast Protocol Based on Location Information in Ad Hoc Networks. ICNC (6) 2009: 501-504
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-22 20:38 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint