default search action
Jianhua Yang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Jianhua Yang 0001 — Dalian University of Technology, Faculty of Electronic Information and Electrical Engineering, School of Control Science and Engineering, China
- Jianhua Yang 0002 — China University of Mining and Technology, School of Mechatronic Engineering, Xuzhou, China (and 2 more)
- Jianhua Yang 0003 — University of Birmingham, School of Biosciences, UK
- Jianhua Yang 0004 — Zhejiang University, College of Computer Science and Technology / Sci-Tech Academy, Hangzhou, China
- Jianhua Yang 0005 — Northwestern Polytechnical University, School of Automation, Xi'an, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j76]Jianhua Yang, Ke Wang, Lijun Zhao, Zhiqiang Jiang, Ruifeng Li:
ActionMixer: Temporal action detection with Optimal Action Segment Assignment and mixers. Expert Syst. Appl. 237(Part B): 121330 (2024) - [j75]Jianhua Yang, Yuying Liu, Moustafa Mohamed Nazief Haggag Kotb Kholaif:
The impact of relationship management on manufacturer resilience in emergencies. Kybernetes 53(3): 960-989 (2024) - [j74]Xinghan Wang, Qi Liu, Pengfei Jia, Xifeng Huang, Jianhua Yang, Zhengjun Mao, Shengyu Shen:
Highway Ecological Environmental Assessment Based on Modified Remote Sensing Index - Taking the Lhasa-Nyingchi Motorway as an Example. Remote. Sens. 16(2): 265 (2024) - [j73]Xiyu Chen, Min Zeng, Tao Wang, Wangze Ni, Jianhua Yang, Nantao Hu, Tong Zhang, Zhi Yang:
In Situ Growth of COF/PVA-Carrageenan Hydrogel Using the Impregnation Method for the Purpose of Highly Sensitive Ammonia Detection. Sensors 24(13): 4324 (2024) - [j72]Wenhui Zhao, Leizhen Liu, Qiu Shen, Jingyu Lin, Jianhua Yang, Jianjun Wu:
Near-Infrared Radiance of Vegetation is More Sensitive Than Vegetation Indices for Monitoring NPP of Winter Wheat Under Water Stress. IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. 17: 10648-10659 (2024) - [c100]Zetao Du, Jianhua Yang, Junbo Wang, Yan Huang, Liang Wang:
SPK: Semantic and Positional Knowledge for Zero-Shot Referring Expression Comprehension. ICPR (30) 2024: 280-295 - 2023
- [j71]Mengying Han, Zhichao Ma, Shugang Ma, Wei Li, Jianhua Yang:
Joint Optimization of Condition-Based Maintenance and Spare Ordering Strategy for a Multistate Competing Failure System. IEEE Access 11: 37006-37020 (2023) - [j70]Lixin Wang, Jianhua Yang, Maochang Qin:
Analyzing Distribution of Packet Round-Trip Times using Fast Fourier Transformation. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 14(2): 137-149 (2023) - [j69]Beijing Chen, Yuxin Nie, Jianhua Yang:
Toward high imperceptibility deep JPEG steganography based on sparse adversarial attack. J. Vis. Commun. Image Represent. 97: 103977 (2023) - [j68]Jianhua Yang, Ke Wang, Ruifeng Li:
Actions as points: a simple and efficient detector for skeleton-based temporal action detection. Mach. Vis. Appl. 34(2): 35 (2023) - [j67]Jianhua Yang, Ke Wang, Ruifeng Li, Petra Perner:
Cascading spatio-temporal attention network for real-time action detection. Mach. Vis. Appl. 34(6): 110 (2023) - [j66]Fei Shang, Yuhang Lan, Jianhua Yang, Enping Li, Xiangui Kang:
Robust data hiding for JPEG images with invertible neural network. Neural Networks 163: 219-232 (2023) - [c99]Yuhang Lan, Fei Shang, Jianhua Yang, Xiangui Kang, Enping Li:
Robust Image Steganography: Hiding Messages in Frequency Coefficients. AAAI 2023: 14955-14963 - [c98]Xu Yang, Xin Sun, Jianhua Yang:
Research on the Design Narrative for Medical Popular Science Serious Games: A Case Study of AIDS Prevention Game "Bluebridge Cafe". HCI (11) 2023: 620-631 - [c97]Fazila Jalil, Jianhua Yang, Muhammad Irbaz Siddique:
Optimizing Supply Chain Performance of SMEs through Big Data Analytic and IT-enabled Capabilities. ICMSS 2023: 172-176 - [c96]Ye Wang, Jianhua Yang, Lijie Li, Jian Yao:
Multitask Graph Neural Network for Knowledge Graph Link Prediction. ICPCSEE (2) 2023: 318-329 - [c95]Wangze Ni, Tao Wang, Yu Wu, Jianbo Zhu, Yongwei Zhang, Min Zeng, Jianhua Yang, Nantao Hu, Zhi Yang:
Universal Data Acquisition System for Flexible and MEMS-Based Gas Sensors. SENSORS 2023: 1-4 - [c94]Tao Wang, Yu Wu, Wangze Ni, Jianhua Yang, Yimin Wang, Jiaqing Zhu, Ming Zeng, Nantao Hu, Zhi Yang:
A Novel Approach to Air Quality Monitoring: Towards Miniature, Self-organized, and Low-power Device. SENSORS 2023: 1-4 - [i8]Jianhua Yang, Kun Dai:
YOWOv2: A Stronger yet Efficient Multi-level Detection Framework for Real-time Spatio-temporal Action Detection. CoRR abs/2302.06848 (2023) - 2022
- [j65]Quanmin Guo, Hanlei Wang, Jianhua Yang:
Adaptive Dark Channel Prior Enhancement Algorithm for Different Source Night Vision Halation Images. IEEE Access 10: 92726-92739 (2022) - [j64]Jianhua Yang, Ke Wang, Ruifeng Li, Zhonghao Qin, Petra Perner:
A novel fast combine-and-conquer object detector based on only one-level feature map. Comput. Vis. Image Underst. 224: 103561 (2022) - [j63]Jianhua Yang, Chen Jiang:
Intersubjectivity and Virtual Practice in Courses Teaching. Int. J. Emerg. Technol. Learn. 17(10): 4-15 (2022) - [j62]Jianhua Yang, Lixin Wang, Suhev Shakya:
Modelling Network Traffic and Exploiting Encrypted Packets to Detect Stepping-stone Intrusions. J. Internet Serv. Inf. Secur. 12(1): 2-25 (2022) - [j61]Jianhua Yang, Lixin Wang, Austin Lee, Peng-Jun Wan:
Stepping-Stone Intrusion Detection via Estimating Numbers of Upstream and Downstream Connections using Packet Crossover. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 13(4): 24-39 (2022) - [j60]Li Cai, Jia-Jia Xuan, Qiao Lin, Junhao Wang, Shurong Liu, Fangzhou Xie, Ling-Ling Zheng, Bin Li, Liang-Hu Qu, Jianhua Yang:
Pol3Base: a resource for decoding the interactome, expression, evolution, epitranscriptome and disease variations of Pol III-transcribed ncRNAs. Nucleic Acids Res. 50(D1): 279-286 (2022) - [j59]Qiuning Tian, Yueling Cao, Xiaogong Hu, Chengpan Tang, Shanshi Zhou, Rui Guo, Xiaojie Li, Yijun Tian, Yufei Yang, Jianhua Yang:
A Study on Pseudorange Biases in BDS B1I/B3I Signals and the Impacts on Beidou Wide Area Differential Services. Remote. Sens. 14(3): 432 (2022) - [j58]Hongkui Zhou, Guangpo Geng, Jianhua Yang, Hao Hu, Li Sheng, Weidong Lou:
Improving Soil Moisture Estimation via Assimilation of Remote Sensing Product into the DSSAT Crop Model and Its Effect on Agricultural Drought Monitoring. Remote. Sens. 14(13): 3187 (2022) - [j57]Jinhuo Liu, Chengpan Tang, Shanshi Zhou, Xiaogong Hu, Yufei Yang, Jianhua Yang, Yuchen Liu:
The Bias in PPP-B2b Real-Time Clock Offset and the Strategy to Reduce It. Remote. Sens. 14(18): 4569 (2022) - [j56]Jianhua Yang, Chengpan Tang, Sanshi Zhou, Yezhi Song, Jinhuo Liu, Yu Xiang, Yuchen Liu, Qiuning Tian, Yufei Yang, Zuo Yang, Xiaogong Hu:
High-Accuracy Clock Offsets Estimation Strategy of BDS-3 Using Multi-Source Observations. Remote. Sens. 14(18): 4674 (2022) - [j55]Wenhui Zhao, Jianjun Wu, Qiu Shen, Jianhua Yang, Xinyi Han:
Exploring the Ability of Solar-Induced Chlorophyll Fluorescence for Drought Monitoring Based on an Intelligent Irrigation Control System. Remote. Sens. 14(23): 6157 (2022) - [j54]Quanmin Guo, Hanlei Wang, Jianhua Yang:
Night Vision Anti-Halation Method Based on Infrared and Visible Video Fusion. Sensors 22(19): 7494 (2022) - [j53]Qiu Shen, Jingyu Lin, Jianhua Yang, Wenhui Zhao, Jianjun Wu:
Exploring the Potential of Spatially Downscaled Solar-Induced Chlorophyll Fluorescence to Monitor Drought Effects on Gross Primary Production in Winter Wheat. IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. 15: 2012-2022 (2022) - [j52]Yuexin Ma, Chengpan Tang, Xiaogong Hu, Zhiqiao Chang, Yufei Yang, Jianhua Yang:
Discussions of a2-Drift Variations of BeiDou-3 Satellite Rubidium Atomic Clocks. IEEE Trans. Instrum. Meas. 71: 1-13 (2022) - [j51]Yuexin Ma, Chengpan Tang, Xiaogong Hu, Xiangwei Zhu, Leyuan Sun, Yufei Yang, Zhiqiao Chang, Jianhua Yang:
Long-Term Frequency Stability Analysis for RRFM and Power-Law Noise Determination of the BeiDou-3 Satellite On-Board Atomic Clocks. IEEE Trans. Instrum. Meas. 71: 1-15 (2022) - [j50]Jianhua Yang, Yan Huang, Kai Niu, Linjiang Huang, Zhanyu Ma, Liang Wang:
Actor and Action Modular Network for Text-Based Video Segmentation. IEEE Trans. Image Process. 31: 4474-4489 (2022) - [c93]Noah Neundorfer, Jianhua Yang, Lixin Wang:
Modeling Network Traffic via Identifying Encrypted Packets to Detect Stepping-Stone Intrusion Under the Framework of Heterogonous Packet Encryption. AINA (2) 2022: 516-527 - [c92]Yijie Geng, Jianhua Yang, Mir Seyedebrahimi:
Using VR in Science Subjects: Popularity and Public Attitudes on Twitter. ICEBE 2022: 154-158 - [c91]Lixin Wang, Jianhua Yang, Austin Lee:
An Effective Approach for Stepping-Stone Intrusion Detection Using Packet Crossover. WISA 2022: 77-88 - [i7]Jianhua Yang:
YOWO-Plus: An Incremental Improvement. CoRR abs/2210.11219 (2022) - 2021
- [j49]Xiao Zhao, Jianhua Yang, Yue Qin:
Optimal Condition-Based Maintenance Strategy via an Availability-Cost Hybrid Factor for a Single-Unit System During a Two-Stage Failure Process. IEEE Access 9: 45968-45977 (2021) - [j48]Jianhua Yang, Zhaowei Ding, Lei Wang:
The Programming Model of Air-Ground Cooperative Patrol Between Multi-UAV and Police Car. IEEE Access 9: 134503-134517 (2021) - [j47]Sumukh Deshpande, James Shuttleworth, Jianhua Yang, Sandy Taramonli, Matthew England:
LIFT: lncRNA identification and function-prediction tool. Int. J. Bioinform. Res. Appl. 17(6): 512-536 (2021) - [j46]Xufeng Ma, Jianhua Yang:
Development of the Interactive Rehabilitation Game System for Children with Autism Based on Game Psychology. Mob. Inf. Syst. 2021: 6020208:1-6020208:9 (2021) - [j45]Jianyuan Wu, Xiangui Kang, Jianhua Yang, Wei Sun:
A framework of generative adversarial networks with novel loss for JPEG restoration and anti-forensics. Multim. Syst. 27(6): 1075-1089 (2021) - [j44]Fangzhou Xie, Shurong Liu, Junhao Wang, Jia-Jia Xuan, Xiaoqin Zhang, Liang-Hu Qu, Ling-Ling Zheng, Jianhua Yang:
deepBase v3.0: expression atlas and interactive analysis of ncRNAs from thousands of deep-sequencing data. Nucleic Acids Res. 49(Database-Issue): D877-D883 (2021) - [j43]Xianfan Wang, Jianhua Yang, Meng Chen, Lijun Miao, Tengchao Huang:
Sinusoidal Phase-Modulated Angle Interferometer for Angular Vibration Measurement. Sensors 21(18): 6295 (2021) - [j42]Jianhua Yang, Lixin Wang:
Applying MMD Data Mining to Match Network Traffic for Stepping-Stone Intrusion Detection. Sensors 21(22): 7464 (2021) - [j41]Lixin Wang, Jianhua Yang, Michael Workman, Peng-Jun Wan:
A Framework to Test Resistency of Detection Algorithms for Stepping-Stone Intrusion on Time-Jittering Manipulation. Wirel. Commun. Mob. Comput. 2021: 1807509:1-1807509:8 (2021) - [j40]Lixin Wang, Jianhua Yang, XiaoHua Xu, Peng-Jun Wan:
Mining Network Traffic with the k -Means Clustering Algorithm for Stepping-Stone Intrusion Detection. Wirel. Commun. Mob. Comput. 2021: 6632671:1-6632671:9 (2021) - [c90]Jianhua Yang, Lixin Wang, Suhev Shakya, Michael Workman:
Identify Encrypted Packets to Detect Stepping-Stone Intrusion. AINA (2) 2021: 536-547 - [c89]Jianhua Yang, Yan Huang, Zhanyu Ma, Liang Wang:
CMF: Cascaded Multi-Model Fusion For Referring Image Segmentation. ICIP 2021: 2289-2293 - [c88]Keji He, Yan Huang, Qi Wu, Jianhua Yang, Dong An, Shuanglin Sima, Liang Wang:
Landmark-RxR: Solving Vision-and-Language Navigation with Fine-Grained Alignment Supervision. NeurIPS 2021: 652-663 - [i6]Jianhua Yang, Yan Huang, Zhanyu Ma, Liang Wang:
CMF: Cascaded Multi-model Fusion for Referring Image Segmentation. CoRR abs/2106.08617 (2021) - [i5]Jianhua Yang, Yi Liao, Fei Shang, Xiangui Kang, Yun Qing Shi:
JPEG Steganography with Embedding Cost Learning and Side-Information Estimation. CoRR abs/2107.13151 (2021) - 2020
- [j39]Sumukh Deshpande, Anne E. James, Chris Franklin, Lindsey J. Leach, Jianhua Yang:
Identification of novel flowering genes using RNA-Seq pipeline employing combinatorial approach in Arabidopsis thaliana time-series apical shoot meristem data. Int. J. Bioinform. Res. Appl. 16(1): 25-58 (2020) - [j38]Lixin Wang, Jianhua Yang, Peng-Jun Wan:
Educational modules and research surveys on critical cybersecurity topics. Int. J. Distributed Sens. Networks 16(9): 155014772095467 (2020) - [j37]Lei Zhou, Siyu Wang, Mingyi Du, Jianhua Yang, Yinuo Zhu, Jianjun Wu:
An Integrated Approach for Detection and Prediction of Greening Situation in a Typical Desert Area in China and Its Human and Climatic Factors Analysis. ISPRS Int. J. Geo Inf. 9(6): 364 (2020) - [j36]Feng Tian, Jianjun Wu, Leizhen Liu, Song Leng, Jianhua Yang, Wenhui Zhao, Qiu Shen:
Exceptional Drought across Southeastern Australia Caused by Extreme Lack of Precipitation and Its Impacts on NDVI and SIF in 2018. Remote. Sens. 12(1): 54 (2020) - [j35]Leizhen Liu, Wenhui Zhao, Qiu Shen, Jianjun Wu, Yanguo Teng, Jianhua Yang, Xinyi Han, Feng Tian:
Nonlinear Relationship Between the Yield of Solar-Induced Chlorophyll Fluorescence and Photosynthetic Efficiency in Senescent Crops. Remote. Sens. 12(9): 1518 (2020) - [j34]Jianhua Yang, Danyang Ruan, Jiwu Huang, Xiangui Kang, Yun-Qing Shi:
An Embedding Cost Learning Framework Using GAN. IEEE Trans. Inf. Forensics Secur. 15: 839-851 (2020) - [c87]James Robertson, Jianhua Yang, W. Scott Gunter, Peter Keres, Thomas Wingate, Anthony Obando:
Educational Microclimate Mesonet System Design. AINA Workshops 2020: 24-33 - [c86]Yuanyi Qi, Jianhua Yang, Yongzhong Zhang:
Blended Learning Course Design from the Perspective of Learning Powered by Technology-A Case Study on Computer Networking. AINA 2020: 980-993 - [c85]Jianhua Yang, Huilin Zheng, Xiangui Kang, Yun-Qing Shi:
Approaching Optimal Embedding In Audio Steganography With GAN. ICASSP 2020: 2827-2831 - [c84]Jianhua Yang, Beiling Lu, Liang Xiao, Xiangui Kang, Yunqing Shi:
Reinforcement Learning Aided Network Architecture Generation for JPEG Image Steganalysis. IH&MMSec 2020: 23-32 - [c83]Lixin Wang, Jianhua Yang, Mary McCormick, Peng-Jun Wan, XiaoHua Xu:
Detect Stepping-stone Intrusion by Mining Network Traffic using k-Means Clustering. IPCCC 2020: 1-8 - [c82]Jianhua Yang, Yan Huang, Linjiang Huang, Yunbo Wang, Zhanyu Ma, Liang Wang:
Global Context Enhanced Multi-modal Fusion for Referring Image Segmentation. PRCV (1) 2020: 434-446 - [c81]Zhengwei Jiang, Jianhua Yang, Xueqi Jin, Qunchao Bi, Jiajia Huang, Fan Chen, Huanhuan Lai, Weiwei Chen:
An Automatic Asset Life-Cycle Monitoring System Based on RFID Radio Frequency. SmartBlock 2020: 180-184 - [i4]Jianhua Yang, Yan Huang, Kai Niu, Zhanyu Ma, Liang Wang:
Actor and Action Modular Network for Text-based Video Segmentation. CoRR abs/2011.00786 (2020)
2010 – 2019
- 2019
- [j33]Sumukh Deshpande, James Shuttleworth, Jianhua Yang, Sandy Taramonli, Matthew England:
PLIT: An alignment-free computational tool for identification of long non-coding RNAs in plant transcriptomic datasets. Comput. Biol. Medicine 105: 169-181 (2019) - [j32]Jianhua Yang, Xiangui Kang, Edward K. Wong, Yun-Qing Shi:
JPEG steganalysis with combined dense connected CNNs and SCA-GFR. Multim. Tools Appl. 78(7): 8481-8495 (2019) - [j31]Leizhen Liu, Wenhui Zhao, Jianjun Wu, Shasha Liu, Yanguo Teng, Jianhua Yang, Xinyi Han:
The Impacts of Growth and Environmental Parameters on Solar-Induced Chlorophyll Fluorescence at Seasonal and Diurnal Scales. Remote. Sens. 11(17): 2002 (2019) - [c80]Jing Shi, H. Hou, Jianhua Yang:
Positioning and Orientation by the Integrated System for Underwater Acoustic Arrays. ASCC 2019: 348-352 - [c79]Rayhaneh Nazempour, Jianhua Yang, Zahara Javaid:
Effect of Supply Chain Agility Dimensions on Supply Chain Performance: A Case of Iranian SMEs. ICBDT 2019: 344-348 - [c78]Qiong Liu, Jianhua Yang:
Application of Hidden Markov Model on the Prediction of Hepatitis B Incidences. ICSH 2019: 209-221 - [c77]Jianhua Yang, Danyang Ruan, Xiangui Kang, Yun-Qing Shi:
Towards Automatic Embedding Cost Learning for JPEG Steganography. IH&MMSec 2019: 37-46 - [c76]Lixin Wang, Jianhua Yang, Hanyu Liangz, Peng-Jun Wan:
Minimum-Latency Data Gathering Scheduling in Multi-Channel Wireless Sensor Networks Using Only Secure Links. MSN 2019: 170-175 - [i3]Sumukh Deshpande, James Shuttleworth, Jianhua Yang, Sandy Taramonli, Matthew England:
PLIT: An alignment-free computational tool for identification of long non-coding RNAs in plant transcriptomic datasets. CoRR abs/1902.05064 (2019) - 2018
- [j30]Lixin Wang, Jianhua Yang:
A research survey in stepping-stone intrusion detection. EURASIP J. Wirel. Commun. Netw. 2018: 276 (2018) - [j29]Xiaogang Huang, Jingling Zhang, Meilei Lv, Gang Shen, Jianhua Yang:
Realising the decomposition of a multi-frequency signal under the coloured noise background by the adaptive stochastic resonance in the non-linear system with periodic potential. IET Signal Process. 12(7): 930-936 (2018) - [j28]Honghao Gao, Kang Zhang, Jianhua Yang, Fangguo Wu, Hongsheng Liu:
Applying improved particle swarm optimization for dynamic service composition focusing on quality of service evaluations under hybrid networks. Int. J. Distributed Sens. Networks 14(2) (2018) - [j27]Rayhaneh Nazempour, Jianhua Yang, Abdul Waheed:
An Empirical Study to Understand the Effect of Supply Chain Agility on Organizational Operational Performance: SC Agility and Organizational Performance. Int. J. Inf. Syst. Supply Chain Manag. 11(4): 1-20 (2018) - [j26]Abdul Waheed, Jianhua Yang:
The impact of mobile marketing on online consumer buying behaviour: empirical evidence from Pakistan. Int. J. Mob. Commun. 16(6): 624-643 (2018) - [j25]Jianhua Yang, Lixin Wang, Andrew Lesh, Brian Lockerbie:
Manipulating network traffic to evade stepping-stone intrusion detection. Internet Things 3-4: 34-45 (2018) - [c75]Jianhua Yang, Yongzhong Zhang:
Using Postal Mail System to Teach Packet Switching in Computer Networks. AINA Workshops 2018: 1-5 - [c74]Jianhua Yang, Yongzhong Zhang, Robert King, Tim Tolbert:
Sniffing and Chaffing Network Traffic in Stepping-Stone Intrusion Detection. AINA Workshops 2018: 515-520 - [c73]Hanqi Zi, Qiong Zhang, Jianhua Yang, Xiangui Kang:
Steganography with Convincing Normal Image from A Joint Generative Adversarial Framework. APSIPA 2018: 526-532 - [c72]Jianhua Yang, Xiangui Kang, Edward K. Wong, Yun-Qing Shi:
Deep Learning with Feature Reuse for JPEG Image Steganalysis. APSIPA 2018: 533-538 - [c71]Xiao Zhang, Jianhua Yang:
Research on Low Carbon Logistics Network in Highway Port Mode. ICIEB 2018: 313-318 - [c70]Ibrahim Almakky, Vasile Palade, Yih-Ling Hedley, Jianhua Yang:
A stacked deep autoencoder model for biomedical figure classification. ISBI 2018: 1134-1138 - [i2]Jianhua Yang, Kai Liu, Xiangui Kang, Edward K. Wong, Yun-Qing Shi:
Spatial Image Steganography Based on Generative Adversarial Network. CoRR abs/1804.07939 (2018) - 2017
- [j24]Tianqi Wu, Min Yao, Jianhua Yang:
Dolphin Swarm Extreme Learning Machine. Cogn. Comput. 9(2): 275-284 (2017) - [j23]Abdul Waheed, Jianhua Yang:
The Effect of Mobile Marketing and Email Marketing on Exploratory Information Seeking (EIS) Behavior of the Consumers: Communication Through Wireless Technologies. Int. J. Enterp. Inf. Syst. 13(4): 76-89 (2017) - [j22]Jilin Zhang, Junfeng Xiao, Jian Wan, Jianhua Yang, Yong-Jian Ren, Huayou Si, Li Zhou, Hangdi Tu:
A Parallel Strategy for Convolutional Neural Network Based on Heterogeneous Cluster for Mobile Information System. Mob. Inf. Syst. 2017: 3824765:1-3824765:12 (2017) - [c69]Jianhua Yang, Yongzhong Zhang, Guoqing Zhao:
Integrate Stepping-Stone Intrusion Detection Technique into Cybersecurity Curriculum. AINA Workshops 2017: 1-6 - [c68]Dianyuan Han, Jianhua Yang, Wayne Summers:
Inject Stenography into Cybersecurity Education. AINA Workshops 2017: 50-55 - [c67]Yien Wang, Jianhua Yang:
Ethical Hacking and Network Defense: Choose Your Best Network Vulnerability Scanning Tool. AINA Workshops 2017: 110-113 - [c66]Jian Ou, Feng Zhao, Xiaofeng Ai, Jianhua Yang, Yongguang Chen:
Data-driven method of reverse modelling for multi-function radar. EUSIPCO 2017: 1947-1951 - [c65]Sumukh Deshpande, Anne E. James, Chris H. Franklin, Lindsey J. Leach, Sandy Taramonli, Jianhua Yang:
An RNA-Seq Bioinformatics Pipeline for Data Processing of Arabidopsis Thaliana Datasets. ICBRA 2017: 1-8 - [c64]Abdul Waheed, Jianhua Yang, Kalsoom Rafique:
Understanding the effect of E-marketing (eM) on online consumer buying behavior. ICMSS 2017: 163-167 - [c63]Jianhua Yang, Kai Liu, Xiangui Kang, Edward K. Wong, Yunqing Shi:
Steganalysis Based on Awareness of Selection-Channel and Deep Learning. IWDW 2017: 263-272 - [c62]Kai Liu, Jianhua Yang, Xiangui Kang:
Ensemble of CNN and rich model for steganalysis. IWSSIP 2017: 1-5 - [i1]Jianhua Yang, Yun-Qing Shi, Edward K. Wong, Xiangui Kang:
JPEG Steganalysis Based on DenseNet. CoRR abs/1711.09335 (2017) - 2016
- [j21]Tianqi Wu, Min Yao, Jianhua Yang:
Dolphin swarm algorithm. Frontiers Inf. Technol. Electron. Eng. 17(8): 717-729 (2016) - [c61]Jianhua Yang, Yien Wang, Thomas Reddington:
Integrate Hacking Technique into Information Assurance Education. AINA Workshops 2016: 381-387 - [c60]Jianhua Yang:
Resistance to Chaff Attack through TCP/IP Packet Cross-Matching and RTT-Based Random Walk. AINA 2016: 784-789 - [c59]Jingjing Yu, Yifeng Zhan, Jianhua Yang, Xiangui Kang:
A Multi-purpose Image Counter-anti-forensic Method Using Convolutional Neural Networks. IWDW 2016: 3-15 - 2015
- [j20]Lijie Sheng, Zhikun Song, Jianhua Yang:
A Multi-Constrained Routing Algorithm for Software Defined Network Based on Nonlinear Annealing. J. Networks 10(6): 376-384 (2015) - [c58]Jianhua Yang, Yongzhong Zhang:
RTT-Based Random Walk Approach to Detect Stepping-Stone Intrusion. AINA 2015: 558-563 - [c57]Jianhua Yang, Yien Wang:
Denial of service hands-on lab for information assurance education: a case study. InfoSecCD 2015: 2:1 - 2014
- [j19]Yiwen Wang, Min Yao, Jianhua Yang:
NIM: A Node Influence Based Method for Cancer Classification. Comput. Math. Methods Medicine 2014: 826373:1-826373:10 (2014) - [j18]Xiaowei Xue, Min Yao, Zhaohui Wu, Jianhua Yang:
Genetic ensemble of extreme learning machine. Neurocomputing 129: 175-184 (2014) - [c56]Jianhua Yang, Thomas Reddington:
Enhance learning through developing network security hands-on lab for online students. InfoSecCD 2014: 11:1 - 2013
- [j17]Xiaofeng Ai, Yan Huang, Feng Zhao, Jianhua Yang, Yongzhen Li, Shunping Xiao:
Imaging of Spinning Targets via Narrow-Band T/R-R Bistatic Radars. IEEE Geosci. Remote. Sens. Lett. 10(2): 362-366 (2013) - [c55]Rong Zhu, Jianhua Yang, Yonggang Li, Jie Xu:
Constructing a Novel Pos-neg Manifold for Global-Based Image Classification. ADMA (1) 2013: 217-228 - 2012
- [j16]Xiaofeng Ai, Xiaohai Zou, Yongzhen Li, Jianhua Yang, Shunping Xiao:
Bistatic scattering centres of cone-shaped targets and target length estimation. Sci. China Inf. Sci. 55(12): 2888-2898 (2012) - [j15]Jianhua Yang, Zhaojin Gao:
Study on the Education Investment Risk of Enterprise Human Capital Based on Monte Carlo Simulation Method. J. Comput. 7(3): 779-784 (2012) - [c54]Yingjie Sheng, Yongzhong Zhang, Jianhua Yang:
Mining Network Traffic Efficiently to Detect Stepping-Stone Intrusion. AINA 2012: 862-867 - [c53]Qinghua Wu, Zhenyu Li, Jianhua Yang, Gaogang Xie, Kavé Salamatian:
Efficient traffic flow measurement for ISP networks. LCN 2012: 348-351 - 2011
- [j14]Jianhua Yang, David Woolbright:
Correlating TCP/IP Packet contexts to detect stepping-stone intrusion. Comput. Secur. 30(6-7): 538-546 (2011) - [j13]Wenbo Lu, Jianhua Yang, Ming Chen, Chuangbing Zhou:
An equivalent method for blasting vibration simulation. Simul. Model. Pract. Theory 19(9): 2050-2062 (2011) - [c52]Jianhua Yang, Lydia Ray, Guoqing Zhao:
Detect Stepping-Stone Insider Attacks by Network Traffic Mining and Dynamic Programming. AINA 2011: 151-158 - [c51]Jianhua Yang, Rong Feng, Wei Deng:
A new algorithm of image denoising based on stationary wavelet multi-scale adaptive threshold. EMEIT 2011: 4550-4553 - [c50]Charles Yates, Lydia Ray, Jianhua Yang:
An investigation into iPod Touch generation 2. InfoSecCD 2011: 94-98 - [c49]Haiyang Jiang, Jianhua Yang, Gaogang Xie:
Exploring and Enhancing the Performance of Parallel IDS on Multi-core Processors. TrustCom 2011: 673-680 - 2010
- [j12]Yong Liu, Yunliang Jiang, Jianhua Yang:
Feature Reduction with Inconsistency. Int. J. Cogn. Informatics Nat. Intell. 4(2): 77-87 (2010) - [j11]Zhonglin Tang, Jianhua Yang, Junyun Yu, Bo Cui:
A Colorimetric Sensor for Qualitative Discrimination and Quantitative Detection of Volatile Amines. Sensors 10(7): 6463-6476 (2010) - [c48]Ying-Wei Kuo, Shou-Hsuan Stephen Huang, Wei Ding, Rebecca Kern, Jianhua Yang:
Using Dynamic Programming Techniques to Detect Multi-hop Stepping-Stone Pairs in a Connection Chain. AINA 2010: 198-205 - [c47]Yongzhong Zhang, Jianhua Yang, Santhoshkumar Bediga, Stephen S. H. Huang:
Resist Intruders' Manipulation via Context-Based TCP/IP Packet Matching. AINA 2010: 1101-1107 - [c46]Jianhua Yang:
On the construction and implementation methods for performance measurement of reverse supply chain. FSKD 2010: 899-903 - [c45]Yu Fu, Jianhua Yang, Tingting Zuo:
Optimal Sizing Design for Hybrid Renewable Energy Systems in Rural Areas. CCTA (2) 2010: 131-138 - [c44]Jianhua Yang, Bhuvan Unhelkar:
Iterative class diagram construction in consideration of modeling granularity. RCIS 2010: 101-108
2000 – 2009
- 2009
- [j10]Siliang Tang, Jianhua Yang, Zhaohui Wu:
A context quality management infrastructure for complex ubiquitous environment. Comput. Syst. Sci. Eng. 24(3) (2009) - [j9]Jianhua Yang:
Integrative performance evaluation for supply chain system based on logarithm triangular fuzzy number-AHP method. Kybernetes 38(10): 1760-1770 (2009) - [c43]Guoqing Zhao, Jianhua Yang, Gurdeep S. Hura, Long Ni, Shou-Hsuan Stephen Huang:
Correlating TCP/IP Interactive Sessions with Correlation Coefficient to Detect Stepping-Stone Intrusion. AINA 2009: 546-551 - [c42]Jianhua Yang:
A Balanced Performance Measurement Scorecard Approach for Product Service Systems. BIFE 2009: 548-551 - [c41]Wenqi Liu, Jianhua Yang, Zhixin Li:
Fairness Analysis of Electronic Commerce Protocol Based on Strand Space. IIH-MSP 2009: 714-717 - [c40]Bu-han Zhang, Junfang Li, Yan Li, Chengxiong Mao, Xin-bo Ruan, Jianhua Yang:
Research on Multi-Agent Parallel Computing Model of Hydrothermal Economic Dispatch in Power System. ISNN (3) 2009: 1160-1170 - [e1]Jianhua Yang, Athula Ginige, Heinrich C. Mayr, Ralf-Detlef Kutsche:
Information Systems: Modeling, Development, and Integration, Third International United Information Systems Conference, UNISCON 2009, Sydney, Australia, April 21-24, 2009. Proceedings. Lecture Notes in Business Information Processing 20, Springer 2009, ISBN 978-3-642-01111-5 [contents] - 2008
- [c39]Jianhua Yang, Byong Lee, Stephen S. H. Huang:
Monitoring Network Traffic to Detect Stepping-Stone Intrusion. AINA Workshops 2008: 56-61 - [c38]Jianhua Yang, Byong Lee:
Detecting Stepping-Stone Intrusion and Resisting Evasion through TCP/IP Packets Cross-Matching. ATC 2008: 2-12 - [c37]Guangxing Zhang, Gaogang Xie, Jianhua Yang, Yinghua Min, Zhaomin Zhou, Xiaodong Duan:
Accurate Online Traffic Classification with Multi-Phases Identification Methodology. CCNC 2008: 141-146 - [c36]Jianhua Yang:
Integrative Performance Evaluation for Strategic Supplier's under Supply Chain Management Based on Logarithm Triangular Fuzzy Number- AHP Method. FSKD (1) 2008: 311-315 - [c35]Liang Shuai, Gaogang Xie, Jianhua Yang:
Characterization of HTTP behavior on access networks in Web 2.0. ICT 2008: 1-6 - [c34]Xi Chen, Gaogang Xie, Jianhua Yang:
Mitigate DDoS attack using TTL buckets and host threatening index. LCN 2008: 525-526 - 2007
- [j8]Jianhua Yang:
Schwarz type algorithms for parabolic problems. Appl. Math. Comput. 188(1): 206-213 (2007) - [j7]Jianhua Yang, Shou-Hsuan Stephen Huang:
Probabilistic analysis of an algorithm to compute TCP packet round-trip time for intrusion detection. Comput. Secur. 26(2): 137-144 (2007) - [j6]Jianhua Yang, Shou-Hsuan Stephen Huang:
Mining TCP/IP packets to detect stepping-stone intrusion. Comput. Secur. 26(7-8): 479-484 (2007) - [c33]Jianhua Yang, Ickjai Lee:
Hybrid Clustering for Large Sequential Data. Artificial Intelligence and Pattern Recognition 2007: 76-81 - [c32]Shou-Hsuan Stephen Huang, Robert Lychev, Jianhua Yang:
Stepping-Stone Detection Via Request-Response Traffic Analysis. ATC 2007: 276-285 - [c31]Gaogang Xie, Ji Chen, Hongxia Zheng, Jianhua Yang, Yu Zhang:
Handover Latency of MIPv6 Implementation in Linux. GLOBECOM 2007: 1780-1785 - [c30]Dan Wang, Gaogang Xie, Jianhua Yang, Zhenyu Li, Wenjian Jiang:
Feedback and Resources Guided Mechanism for Adaptive Packet Sampling. GLOBECOM 2007: 2586-2590 - [c29]Gaogang Xie, Jianhua Yang, Valérie Issarny, Alberto Conte:
An Accurate and Efficient 3-Phase Measurement Method for IP Traffic Flow on High Speed Link. ICN 2007: 46 - [c28]Guangxing Zhang, Gaogang Xie, Jianhua Yang, Dunxing Zhang, Dafang Zhang:
Self-Similar Characteristic of Traffic in Current Metro Area Network. LANMAN 2007: 176-181 - [c27]Jianhua Yang:
Fuzzy Integrative Performance Evaluation for Supply Chain System. SNPD (2) 2007: 47-52 - [c26]Gaogang Xie, Guangxing Zhang, Jianhua Yang, Yinghua Min, Valérie Issarny, Alberto Conte:
Survey on Traffic of Metro Area Network with Measurement On-Line. ITC 2007: 666-677 - 2006
- [j5]Jianhua Yang, Di Jin, Ye Li, Kai-Steffen Hielscher, Reinhard German:
Modeling and simulation of performance analysis for a cluster-based Web server. Simul. Model. Pract. Theory 14(2): 188-200 (2006) - [c25]Jianhua Yang, Yongzhong Zhang:
Probabilistic Proof of an Algorithm to Compute TCP Packet Round-Trip Time for Intrusion Detection. ACNS 2006: 18-32 - [c24]Jianhua Yang, Shou-Hsuan Stephen Huang, Ming Dong Wan:
A Clustering-Partitioning Algorithm to Find TCP Packet Round-Trip Time for Intrusion Detection. AINA (1) 2006: 231-236 - [c23]Ming Dong Wan, Shou-Hsuan Stephen Huang, Jianhua Yang:
Finding the Longest Similar Subsequence of Thumbprints for Intrusion Detection. AINA (1) 2006: 255-262 - [c22]Yongzhong Zhang, Jianhua Yang, Chunming Ye:
Resistance Analysis to Intruders' Evasion of a Novel Algorithm to Detect Stepping-Stone. ATC 2006: 477-486 - [c21]Jianhua Yang, Ickjai Lee:
Hybrid O(n Ön) Clustering for Sequential Web Usage Mining. Australian Conference on Artificial Intelligence 2006: 1022-1026 - [c20]Jianhua Yang, Byong Lee, Yongzhong Zhang:
Finding TCP Packet Round-Trip Time for Intrusion Detection: Algorithm and Analysis. CANS 2006: 303-317 - [c19]Yiyou Dong, Jianhua Yang, Zhaohui Wu:
ODSG: An Architecture of Ontology-based Distributed Simulation on Grid. IMSCCS (1) 2006: 759-765 - [c18]Jianhua Yang, Yongzhong Zhang, Shou-Hsuan Stephen Huang:
Resistance Analysis to Intruders' Evasion of Detecting Intrusion. ISC 2006: 383-397 - [c17]Wenqi Liu, Jianhua Yang, Lei Wei:
A Secure Threshold Proxy Signature Scheme for Mobile Agent-Based Electronic Commerce Transactions. PDCAT 2006: 454-459 - 2005
- [j4]Jianhua Yang, Danping Yang:
Additive Schwarz methods for parabolic problems. Appl. Math. Comput. 163(1): 17-28 (2005) - [j3]Qinglin Zhao, Li Feng, Zhongcheng Li, Jianhua Yang:
Movement detection delay analysis in mobile IP. Comput. Commun. 28(5): 550-556 (2005) - [c16]Jianhua Yang, Shou-Hsuan Stephen Huang:
Matching TCP Packets and Its Application to the Detection of Long Connection Chains on the Internet. AINA 2005: 1005-1010 - [c15]Ickjai Lee, Jianhua Yang:
Hybrid Agglomerative Clustering for Large Databases: An Efficient Interactivity Approach. Australian Conference on Artificial Intelligence 2005: 938-941 - [c14]Ickjai Lee, Jianhua Yang:
Voronoi-based Topological Information for Combining Partitioning and Hierarchical Clustering. CIMCA/IAWTIC 2005: 484-489 - [c13]Jianhua Yang, Shou-Hsuan Stephen Huang:
Improved Thumbprint and Its Application for Intrusion Detection. ICCNMC 2005: 433-442 - [c12]Xiangguo Li, Jianhua Yang, Zhaohui Wu:
An NFSv4-Based Security Scheme for NAS. ISPA Workshops 2005: 130-139 - 2004
- [j2]Vladimir Estivill-Castro, Jianhua Yang:
Fast and Robust General Purpose Clustering Algorithms. Data Min. Knowl. Discov. 8(2): 127-150 (2004) - [c11]Junrang Li, Zhaohui Wu, Jianhua Yang, Mingwang Xia:
A Secure Model for Network-Attached Storage on the Grid. IEEE SCC 2004: 604-608 - [c10]Jianhua Yang, Zhaohui Wu, Siliang Tang, Xiaosheng Guo:
Virtual Battlefield Attack-Defense Countermeasure Simulation on the Grid. GCC Workshops 2004: 164-172 - [c9]Jianhua Yang, Ickjai Lee:
Cluster Validity Through Graph-based Boundary Analysis. IKE 2004: 204-210 - [c8]Jianhua Yang, Shou-Hsuan Stephen Huang:
A real-time algorithm to detect long connection chains of interactive terminal sessions. InfoSecu 2004: 198-203 - 2003
- [c7]Junfeng Wang, Jianhua Yang, Gaogang Xie, Mingtian Zhou, Zhongcheng Li:
Measurement-Based Modeling with Adaptive Sampling. Asian Test Symposium 2003: 340-347 - [c6]Vladimir Estivill-Castro, Jianhua Yang:
Cluster Validity Using Support Vector Machines. DaWaK 2003: 244-256 - [c5]Jianhua Yang, Yasutaka Fujimoto:
Modeling, Implementation and simulation of virtual factory based on colored timed Petri net. ETFA (1) 2003: 574-579 - 2002
- [j1]Vladimir Estivill-Castro, Jianhua Yang:
Clustering Web Visitors by Fast, Robust and Convergent Algorithms. Int. J. Found. Comput. Sci. 13(4): 497-520 (2002) - [c4]Jianhua Yang, Yasutaka Fujimoto:
Human Factor and Its Identification in Manufacturing Prediction. DIISM 2002: 367-374 - 2001
- [c3]Vladimir Estivill-Castro, Jianhua Yang:
Non-crisp Clustering by Fast, Convergent, and Robust Algorithms. PKDD 2001: 103-114 - [c2]Vladimir Estivill-Castro, Jianhua Yang:
Categorizing Visitors Dynamically by Fast and Robust Clustering of Access Logs. Web Intelligence 2001: 498-507 - 2000
- [c1]Vladimir Estivill-Castro, Jianhua Yang:
Fast and Robust General Purpose Clustering Algorithms. PRICAI 2000: 208-218
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 20:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint