default search action
Yi Zhuang 0002
Person information
- affiliation: Nanjing University of Aeronautics and Astronautics, Department of Computer Science and Technology, China
Other persons with the same name
- Yi Zhuang — disambiguation page
- Yi Zhuang 0001 — Zhejiang Gongshang University, College of Computer and Information Engineering, China
- Yi Zhuang 0003 — Shandong University, School of Mathematics, Jinan, China (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j51]Gongzhe Qiao, Yi Zhuang, Tong Ye:
A method for analyzing the impact of SEUs on satellite networks from the perspective of distributed routing. Ad Hoc Networks 162: 103546 (2024) - [j50]Gongzhe Qiao, Yi Zhuang, Tong Ye, Yuan Qiao:
FRAMB: A man-machine cooperation risk assessment method for intelligent network information systems. J. Intell. Fuzzy Syst. 46(4): 10213-10229 (2024) - 2023
- [j49]Tong Ye, Yi Zhuang, Gongzhe Qiao:
MDSSED: A safety and security enhanced model-driven development approach for smart home apps. Inf. Softw. Technol. 163: 107287 (2023) - [j48]Tong Ye, Yi Zhuang, Gongzhe Qiao:
MBIPV: a model-based approach for identifying privacy violations from software requirements. Softw. Syst. Model. 22(4): 1251-1280 (2023) - [j47]Zujia Yan, Yi Zhuang, Weining Zheng, Jingjing Gu:
Multi-bit Data Flow Error Detection Method Based on SDC Vulnerability Analysis. ACM Trans. Embed. Comput. Syst. 22(3): 49:1-49:30 (2023) - [c17]Tao Chen, Yi Zhuang:
A Dynamic Hierarchical Single Link Fault Recovery Scheme for SDN Based on Dynamic Hierarchies. SPCNC 2023: 390-396 - 2021
- [j46]Xinwen Hu, Yi Zhuang, Shangwei Lin, Fuyuan Zhang, Shuanglong Kan, Zining Cao:
A security type verifier for smart contracts. Comput. Secur. 108: 102343 (2021) - 2020
- [j45]Jiaye Pan, Yi Zhuang, Xuejian Zhao, Binglin Sun:
Lightweight and Efficient Hypervisor-Based Dynamic Binary Instrumentation and Analysis Method. IEEE Access 8: 164593-164610 (2020) - [j44]Xinwen Hu, Yi Zhuang, Fuyuan Zhang:
A security modeling and verification method of embedded software based on Z and MARTE. Comput. Secur. 88 (2020) - [j43]Xinwen Hu, Yi Zhuang:
PHRiMA: A permission-based hybrid risk management framework for android apps. Comput. Secur. 94: 101791 (2020) - [j42]Ziwang Wang, Yi Zhuang:
Malicious Code Detection for Trusted Execution Environment Based on Paillier Homomorphic Encryption. IEICE Trans. Commun. 103-B(3): 155-166 (2020) - [j41]Ziwang Wang, Yi Zhuang, Qingxun Xia:
Mutual authentication-based RA scheme for embedded systems. IET Inf. Secur. 14(2): 232-240 (2020) - [j40]Jingjing Gu, Cheng Liu, Yi Zhuang, Xiaojiang Du, Fuzhen Zhuang, Haochao Ying, Yanchao Zhao, Mohsen Guizani:
Dynamic Measurement and Data Calibration for Aerial Mobile IoT. IEEE Internet Things J. 7(6): 5210-5219 (2020) - [j39]Qiang Zhou, Jingjing Gu, Chao Ling, Wen-Bo Li, Yi Zhuang, Jian Wang:
Exploiting Multiple Correlations Among Urban Regions for Crowd Flow Prediction. J. Comput. Sci. Technol. 35(2): 338-352 (2020) - [j38]Ziwang Wang, Yi Zhuang, Zujia Yan:
TZ-MRAS: A Remote Attestation Scheme for the Mobile Terminal Based on ARM TrustZone. Secur. Commun. Networks 2020: 1756130:1-1756130:16 (2020) - [j37]Jiaye Pan, Yi Zhuang, Binglin Sun:
BAHK: Flexible Automated Binary Analysis Method with the Assistance of Hardware and System Kernel. Secur. Commun. Networks 2020: 8702017:1-8702017:19 (2020) - [c16]Zhihong Sun, Tong Ye, Xiangying Kong, Yi Zhuang:
A Model-driven Collaborative Modeling Method for Software. ICMSS 2020: 11-15 - [c15]Tong Ye, Yi Zhuang:
SCPAC: An Access Control Framework for Diverse IoT Platforms Based on OAuth2.0. SpaCCS Workshops 2020: 146-157 - [c14]Gongzhe Qiao, Yi Zhuang:
A Blockchain-Based Reconstruction Framework for UAV Network. SpaCCS 2020: 301-311
2010 – 2019
- 2019
- [j36]Jingjing Gu, Weining Zheng, Yi Zhuang, Qianwen Zhang:
Vulnerability Analysis of Instructions for SDC-Causing Error Detection. IEEE Access 7: 168885-168898 (2019) - [j35]Wei Zhong, Yi Zhuang, Jian Sun, Jingjing Gu:
Load forecasting for cloud computing based on wavelet support vector machine. Int. J. High Perform. Comput. Netw. 14(3): 315-324 (2019) - [j34]Mi Li, Yi Zhuang, Xinwen Hu:
一种结合AADL与Z的嵌入式软件可靠性建模与评估方法 (Embedded Software Reliability Model and Evaluation Method Combining AADL and Z). 计算机科学 46(8): 217-223 (2019) - [j33]Jiaye Pan, Yi Zhuang, Binglin Sun:
Efficient and Transparent Method for Large-Scale TLS Traffic Analysis of Browsers and Analogous Programs. Secur. Commun. Networks 2019: 8467081:1-8467081:22 (2019) - [j32]Jie Hao, Jing Chen, Ran Wang, Yi Zhuang, Baoxian Zhang:
A Robust Transmission Scheduling Approach for Internet of Things Sensing Service with Energy Harvesting. Sensors 19(14): 3090 (2019) - [c13]Xiahao Zhang, Yi Zhuang:
A Fault Detection Algorithm for Cloud Computing Using QPSO-Based Weighted One-Class Support Vector Machine. ICA3PP (2) 2019: 286-304 - [c12]Zhenhua Zhang, Wei Zhu, Wei Zhong, Yi Zhuang:
Load Forecasting model of Mobile Cloud Computing Based on Glowworm Swarm Optimization LSTM Network. ICIT 2019: 113-119 - [c11]Haitao Huang, Jingjing Gu, Qiuhong Wang, Yi Zhuang:
An Autonomous UAV Navigation System for Unknown Flight Environment. MSN 2019: 63-68 - 2018
- [j31]Jingjing Gu, Binglin Sun, Xiaojiang Du, Jun Wang, Yi Zhuang, Ziwang Wang:
Consortium Blockchain-Based Malware Detection in Mobile Devices. IEEE Access 6: 12118-12128 (2018) - [j30]Jie Hao, Xiaoming Yuan, Yanbing Yang, Ran Wang, Yi Zhuang, Jun Luo:
Visible Light Based Occupancy Inference Using Ensemble Learning. IEEE Access 6: 16377-16385 (2018) - [j29]Fei Ding, Yi Zhuang:
Ego-network probabilistic graphical model for discovering on-line communities. Appl. Intell. 48(9): 3038-3052 (2018) - [j28]Wei Zhong, Yi Zhuang, Jian Sun, Jingjing Gu:
A load prediction model for cloud computing using PSO-based weighted wavelet support vector machine. Appl. Intell. 48(11): 4072-4083 (2018) - [j27]Qingxun Xia, Yi Zhuang:
一种基于局部性原理的远程验证机制 (Remote Attestation Mechanism Based on Locality Principle). 计算机科学 45(4): 148-151 (2018) - [j26]Jianwei Zheng, Jingjing Gu, Yi Zhuang:
基于生存分析的GPS轨迹缺失规律挖掘 (Pattern Mining of Missing GPS Trajectory Based on Survival Analysis). 计算机科学 45(5): 185-189 (2018) - [j25]Jie Hao, Ran Wang, Baoxian Zhang, Yi Zhuang, Bing Chen:
Compressed Sensing Based Joint Rate Allocation and Routing Design in Wireless Sensor Networks. Wirel. Commun. Mob. Comput. 2018 (2018) - [c10]Chao Wang, Jing Li, Kexin Li, Yi Zhuang:
A Sparse and Low-Rank Matrix Recovery Model for Saliency Detection. ADMA 2018: 129-139 - [c9]Yunfei Liu, Jing Li, Yi Zhuang:
Instruction SDC Vulnerability Prediction Using Long Short-Term Memory Neural Network. ADMA 2018: 140-149 - [c8]Jie Hao, Ran Wang, Yi Zhuang, Baoxian Zhang:
A Flexible Network Utility Optimization Approach for Energy Harvesting Sensor Networks. GLOBECOM 2018: 206-212 - [c7]Xiaoming Yuan, Ran Wang, Yi Zhuang, Kun Zhu, Jie Hao:
A Concept Drift Based Ensemble Incremental Learning Approach for Intrusion Detection. iThings/GreenCom/CPSCom/SmartData 2018: 350-357 - 2017
- [j24]Wei Zhu, Yi Zhuang, Long Zhang:
A three-dimensional virtual resource scheduling method for energy saving in cloud computing. Future Gener. Comput. Syst. 69: 66-74 (2017) - [j23]Hongfei Cui, Jia Liu, Jingjing Gu, Yi Zhuang:
基于局部保持典型相关分析的无线传感器网络三维定位算法 (3D Localization Estimation Algorithm Based on Locality Preserving Canonical Correlation Analysis in Wireless Sensor Networks). 计算机科学 44(9): 105-109 (2017) - [j22]Xiaodong Xia, Yi Zhuang, Jing Li, Jingjing Gu:
基于有效锚节点的多传感器测向测时协同定位算法 (Multi-sensors Direction-and-Time Co-localization Algorithm Based on Efficient Anchor-nodes). 计算机科学 44(Z6): 248-251 (2017) - [j21]Jiaye Pan, Yi Zhuang:
PMCAP: A Threat Model of Process Memory Data on the Windows Operating System. Secur. Commun. Networks 2017: 4621587:1-4621587:15 (2017) - [c6]Wei Zhong, Yi Zhuang, Jian Sun, Jingjing Gu:
The cloud computing load forecasting algorithm based on wavelet support vector machine. ACSW 2017: 38:1-38:5 - [c5]Li Jiang, Yi Zhuang:
Detect Storage Vulnerability of User-Input Privacy in Android Applications with Static and Dynamic Analysis. ICCCS (2) 2017: 280-291 - [c4]Fan Yang, Yi Zhuang, Jun Wang:
Android Malware Detection Using Hybrid Analysis and Machine Learning Technique. ICCCS (2) 2017: 565-575 - [c3]Xinwen Hu, Yi Zhuang, Zining Cao, Tong Ye, Mi Li:
Modeling and validation for embedded software confidentiality and integrity. ISKE 2017: 1-6 - 2016
- [j20]Xiangmao Chang, Jin Wang, Jianping Wang, Kejie Lu, Yi Zhuang:
On the optimal design of secure network coding against wiretapping attack. Comput. Networks 99: 82-98 (2016) - [j19]Siru Ni, Yi Zhuang, Jingjing Gu, Ying Huo:
A formal model and risk assessment method for security-critical real-time embedded systems. Comput. Secur. 58: 199-215 (2016) - [j18]Ningmin Shen, Jing Li, Peiyun Zhou, Ying Huo, Yi Zhuang:
BSFCoS: Block and Sparse Principal Component Analysis-Based Fast Co-Saliency Detection Method. Int. J. Pattern Recognit. Artif. Intell. 30(1): 1655003:1-1655003:21 (2016) - [j17]Jinhui Zhao, Yi Zhuang, Jingjing Gu, Yan Xu, Jian Sun:
Sensor Module Based on the Wireless Sensor Network for the Dynamic Stress on the Flexible Object with Large Deformation. J. Sensors 2016: 1368309:1-1368309:11 (2016) - [j16]Ningmin Shen, Jing Li, Haiyang Bai, Yi Zhuang:
基于Uppaal的实时系统AADL数据流模型的转换与验证 (Transformation and Verification Method of AADL Data Flows for Real-time System Using Uppaal). 计算机科学 43(1): 211-217 (2016) - [j15]Xiangmao Chang, Jun Huang, Shucheng Liu, Guoliang Xing, Hongwei Zhang, Jianping Wang, Liusheng Huang, Yi Zhuang:
Accuracy-Aware Interference Modeling and Measurement in Wireless Sensor Networks. IEEE Trans. Mob. Comput. 15(2): 278-291 (2016) - [c2]Yanqiu Lou, Yi Zhuang, Ying Huo:
Automatic Classification of Cloud Service Based on Weighted Euclidean Distance. ICCCS (1) 2016: 229-239 - 2015
- [j14]Ying Huo, Yi Zhuang, Jingjing Gu, Siru Ni, Yu Xue:
Discrete gbest-guided artificial bee colony algorithm for cloud service composition. Appl. Intell. 42(4): 661-678 (2015) - [j13]Fei Ding, Yi Zhuang:
Computing contingency tables from sparse ADtrees. Appl. Intell. 42(4): 777-789 (2015) - [j12]Ying Huo, Yi Zhuang, Jingjing Gu, Siru Ni:
Elite-guided multi-objective artificial bee colony algorithm. Appl. Soft Comput. 32: 199-210 (2015) - [j11]Yan Xu, Yi Zhuang, Jingjing Gu:
An Improved 3D Localization Algorithm for the Wireless Sensor Network. Int. J. Distributed Sens. Networks 11: 315714:1-315714:9 (2015) - [j10]Peiyun Zhou, Jing Li, Ningmin Shen, Yi Zhuang:
BSFCoS: 基于分块与稀疏主特征提取的快速协同显著性检测 (BSFCoS: Fast Co-saliency Detection Based on Block and Sparse Principal Feature Extraction). 计算机科学 42(8): 305-309 (2015) - [j9]Ningmin Shen, Jing Li, Peiyun Zhou, Yi Zhuang:
一种基于稀疏主成分的基因表达数据特征提取方法 (Feature Extraction Method Based on Sparse Principal Components for Gene Expression Data). 计算机科学 42(Z6): 453-458 (2015) - [j8]Ying Huo, Yi Zhuang, Siru Ni:
Fuzzy trust evaluation based on consistency intensity for cloud services. Kybernetes 44(1): 7-24 (2015) - [j7]Siru Ni, Yi Zhuang, Zining Cao, Xiangying Kong:
Modeling Dependability Features for Real-Time Embedded Systems. IEEE Trans. Dependable Secur. Comput. 12(2): 190-203 (2015) - [c1]Jun Wang, Yi Zhuang, Siru Ni:
The Design and Implementation of a Dynamic Verification System of Z. ICCCS 2015: 344-355 - 2014
- [j6]Yu Xue, Shuiming Zhong, Yi Zhuang, Bin Xu:
An ensemble algorithm with self-adaptive learning techniques for high-dimensional numerical optimization. Appl. Math. Comput. 231: 329-346 (2014) - [j5]Haibo Zhai, Yi Zhuang, Jing Li:
An improved DDS publish/subscribe automatic discovery algorithm. Int. J. High Perform. Comput. Netw. 7(4): 281-291 (2014) - [j4]Yating Yuan, Yi Zhuang, Ying Huo:
Research and Application of Data Integration in Aircraft Designing Based on SDO. J. Softw. 9(3): 689-696 (2014) - [j3]Haiyang Xu, Yi Zhuang:
A Formal Transformation Approach for Embedded Software Modeling. J. Softw. 9(4): 807-813 (2014) - [j2]Yu Xue, Xiangmao Chang, Shuiming Zhong, Yi Zhuang:
An efficient energy hole alleviating algorithm for wireless sensor networks. IEEE Trans. Consumer Electron. 60(3): 347-355 (2014) - 2012
- [j1]Hao Zhu, Yi Zhuang:
Flow-Sensitive Automaton-Based Monitoring of a Declassification Policy. J. Softw. 7(11): 2478-2487 (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-19 23:11 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint