Improving the classification effectiveness of intrusion detection by using improved conditional variational autoencoder and deep neural network Y Yang, K Zheng, C Wu, Y Yang Sensors 19 (11), 2528, 2019 | 314 | 2019 |
Cryptographic primitives in blockchains L Wang, X Shen, J Li, J Shao, Y Yang Journal of Network and Computer Applications 127, 43-58, 2019 | 264 | 2019 |
Optimum design of fractional order PIλDμ controller for AVR system using chaotic ant swarm Y Tang, M Cui, C Hua, L Li, Y Yang Expert Systems with Applications 39 (8), 6887-6896, 2012 | 261 | 2012 |
An efficient protocol for the private comparison of equal information based on the triplet entangled state and single-particle measurement XB Chen, G Xu, XX Niu, QY Wen, YX Yang Optics communications 283 (7), 1561-1565, 2010 | 250 | 2010 |
A secure cryptocurrency scheme based on post-quantum blockchain YL Gao, XB Chen, YL Chen, Y Sun, XX Niu, YX Yang Ieee Access 6, 27205-27213, 2018 | 226 | 2018 |
A new fixed-time stability theorem and its application to the fixed-time synchronization of neural networks C Chen, L Li, H Peng, Y Yang, L Mi, H Zhao Neural networks 123, 412-419, 2020 | 204 | 2020 |
Network intrusion detection based on supervised adversarial variational auto-encoder with regularization Y Yang, K Zheng, B Wu, Y Yang, X Wang IEEE access 8, 42169-42184, 2020 | 174 | 2020 |
Building an effective intrusion detection system using the modified density peak clustering algorithm and deep belief networks Y Yang, K Zheng, C Wu, X Niu, Y Yang Applied Sciences 9 (2), 238, 2019 | 174 | 2019 |
Parameters identification of chaotic systems via chaotic ant swarm L Li, Y Yang, H Peng, X Wang Chaos, Solitons & Fractals 28 (5), 1204-1211, 2006 | 166 | 2006 |
A hybrid CPSO–SQP method for economic dispatch considering the valve-point effects J Cai, Q Li, L Li, H Peng, Y Yang Energy Conversion and Management 53 (1), 175-181, 2012 | 165 | 2012 |
Secure data access control with ciphertext update and computation outsourcing in fog computing for Internet of Things Q Huang, Y Yang, L Wang IEEe Access 5, 12941-12950, 2017 | 163 | 2017 |
An enhanced biometric-based authentication scheme for telecare medicine information systems using elliptic curve cryptosystem Y Lu, L Li, H Peng, Y Yang Journal of medical systems 39, 1-8, 2015 | 159 | 2015 |
Quantum-secret-sharing scheme based on local distinguishability of orthogonal multiqudit entangled states J Wang, L Li, H Peng, Y Yang Physical Review A 95 (2), 022320, 2017 | 157 | 2017 |
Secure and energy-efficient data transmission system based on chaotic compressive sensing in body-to-body networks H Peng, Y Tian, J Kurths, L Li, Y Yang, D Wang IEEE transactions on biomedical circuits and systems 11 (3), 558-573, 2017 | 150 | 2017 |
Multiple routes transmitted epidemics on multiplex networks D Zhao, L Li, H Peng, Q Luo, Y Yang Physics Letters A 378 (10), 770-776, 2014 | 149 | 2014 |
Chaotic ant swarm optimization to economic dispatch J Cai, X Ma, L Li, Y Yang, H Peng, X Wang Electric Power Systems Research 77 (10), 1373-1380, 2007 | 147 | 2007 |
Particle swarm optimizer with crossover operation Y Chen, L Li, J Xiao, Y Yang, J Liang, T Li Engineering Applications of Artificial Intelligence 70, 159-169, 2018 | 141 | 2018 |
Finite-time stability and synchronization of memristor-based fractional-order fuzzy cellular neural networks M Zheng, L Li, H Peng, J Xiao, Y Yang, Y Zhang, H Zhao Communications in Nonlinear Science and Numerical Simulation 59, 272-291, 2018 | 137 | 2018 |
Fixed-time synchronization of inertial memristor-based neural networks with discrete delay C Chen, L Li, H Peng, Y Yang Neural Networks 109, 81-89, 2019 | 136 | 2019 |
Joint remote preparation of an arbitrary three-qubit state MX Luo, XB Chen, SY Ma, XX Niu, YX Yang Optics communications 283 (23), 4796-4801, 2010 | 136 | 2010 |