default search action
Yahui Tang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j12]Fei Wang, Zhanqing Li, Qi Jiang, Xinrong Ren, Hao He, Yahui Tang, Xiaobo Dong, Yele Sun, Russell R. Dickerson:
Comparative Analysis of Aerosol Vertical Characteristics over the North China Plain Based on Multi-Source Observation Data. Remote. Sens. 16(4): 609 (2024) - [c6]Yahui Tang, Chen Wang, Hui Ye, Xiaoming Chen, Vera Yuk Ying Chung:
SISAd: Advertisement Implantation in VR Video with Saliency-constrained Instance Segmentation. ICCE 2024: 1-5 - 2023
- [j11]Yubin Ma, Xuan Zhang, Chen Gao, Yahui Tang, LinYu Li, Rui Zhu, Chunlin Yin:
Enhancing recommendations with contrastive learning from collaborative knowledge graph. Neurocomputing 523: 103-115 (2023) - [j10]Yahui Tang, Kan Chang, Mengyuan Huang, Baoxin Li:
BMISP: Bidirectional mapping of image signal processing pipeline. Signal Process. 212: 109135 (2023) - [j9]Wenlin Xu, Tong Li, Jinsong Wang, Yahui Tang:
Detecting vulnerable software functions via text and dependency features. Soft Comput. 27(9): 5425-5435 (2023) - [j8]Jishu Wang, Chao Zhu, Chen Miao, Rui Zhu, Xuan Zhang, Yahui Tang, Hexiang Huang, Chen Gao:
BPR: Blockchain-Enabled Efficient and Secure Parking Reservation Framework With Block Size Dynamic Adjustment Method. IEEE Trans. Intell. Transp. Syst. 24(3): 3555-3570 (2023) - [c5]Wenlin Xu, Tong Li, Jinsong Wang, Tao Fu, Yahui Tang:
Detecting Software Vulnerabilities Based on Hierarchical Graph Attention Network. CICAI (2) 2023: 113-124 - [c4]Yahui Tang, Mengqi Rao, Qingjie Wei, Feng Chen, Xin Liu:
A Software Execution Data Component Identification Algorithm Based on Spectral Clustering. DSA 2023: 360-368 - [c3]Hongwei Zhang, Yahui Tang, Xiaoming Chen, Chen Wang, Vera Yuk Ying Chung:
Intelligent Candidate Space Identification and Optimization for Video Advertisement Implant. ICCE 2023: 1-6 - [c2]Duanling Guo, Kan Chang, Yahui Tang, Mingyang Ling, Minghong Li:
CInvISP: Conditional Invertible Image Signal Processing Pipeline. ICONIP (5) 2023: 548-562 - [c1]Wenlin Xu, Tong Li, Jinsong Wang, Haibo Duan, Yahui Tang:
Software Vulnerabilities Detection Based on a Pre-trained Language Model. TrustCom 2023: 904-911 - 2022
- [j7]Yahui Tang, Tong Li, Rui Zhu, Cong Liu, Shuaipeng Zhang:
A Hybrid Genetic Service Mining Method Based on Trace Clustering Population. IEICE Trans. Inf. Syst. 105-D(8): 1443-1455 (2022) - [j6]Yahui Tang, Tong Li, Rui Zhu, Cong Liu, Shuaipeng Zhang:
Erratum: A Hybrid Genetic Service Mining Method Based on Trace Clustering Population [IEICE Transactions on Information and Systems Vol.E105.D (2022), No.8 pp.1443-1455]. IEICE Trans. Inf. Syst. 105-D(9): 1656 (2022) - 2021
- [j5]Fengtao Nan, Yahui Tang, Po Yang, Zhenli He, Yun Yang:
A novel sub-Kmeans based on co-training approach by transforming single-view into multi-view. Future Gener. Comput. Syst. 125: 831-843 (2021) - [j4]Yahui Tang, Tong Li, Rui Zhu, Fei Du, Jishu Wang, Zifei Ma:
A Discovery Method for Hierarchical Software Execution Behavior Models Based on Components. Sci. Program. 2021: 4788357:1-4788357:22 (2021) - [j3]Mingjing Tang, Tong Li, Wei Wang, Rui Zhu, Zifei Ma, Yahui Tang:
Software Knowledge Entity Relation Extraction with Entity-Aware and Syntactic Dependency Structure Information. Sci. Program. 2021: 7466114:1-7466114:13 (2021) - 2020
- [j2]Ming Zheng, Tong Li, Rui Zhu, Yahui Tang, Mingjing Tang, Leilei Lin, Zifei Ma:
Conditional Wasserstein generative adversarial network-gradient penalty-based approach to alleviating imbalanced data classification. Inf. Sci. 512: 1009-1023 (2020)
2010 – 2019
- 2019
- [j1]Rui Zhu, Yichao Dai, Tong Li, Zifei Ma, Ming Zheng, Yahui Tang, Jiayi Yuan, Yue Huang:
Automatic Real-Time Mining Software Process Activities From SVN Logs Using a Naive Bayes Classifier. IEEE Access 7: 146403-146415 (2019)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-16 00:41 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint