Följ
Yantao Li
Yantao Li
College of Computer Science, Chongqing University
Verifierad e-postadress på cqu.edu.cn - Startsida
Titel
Citeras av
Citeras av
År
A distributed spatial–temporal weighted model on MapReduce for short-term traffic flow forecasting
D Xia, B Wang, H Li, Y Li, Z Zhang
Neurocomputing 179, 246-263, 2016
2112016
A novel Hash algorithm construction based on chaotic neural network
Y Li, S Deng, D Xiao
Neural Computing & Applications 20 (1), 133-141, 2011
1482011
Using Data Augmentation in Continuous Authentication on Smartphones
Y Li, H Hu, G Zhou
IEEE Internet of Things Journal 6 (1), 628-640, 2019
1152019
Analysis and improvement of a chaos-based Hash function construction
S Deng, Y Li, D Xiao
Communications in Nonlinear Science and Numerical Simulation 15 (5), 1338-1347, 2010
952010
SCANet: Sensor-based Continuous Authentication with Two-stream Convolutional Neural Networks
Y Li, H Hu, Z Zhu, G Zhou
ACM Transactions on Sensor Networks 16 (3), 1-27, 2020
892020
AdaSense: Adapting sampling rates for activity recognition in body sensor networks
X Qi, M Keally, G Zhou, Y Li, Z Ren
2013 IEEE 19th Real-Time and Embedded Technology and Applications Symposium …, 2013
882013
A map reduce-based nearest neighbor approach for big-data-driven traffic flow prediction
D Xia, H Li, B Wang, Y Li, Z Zhang
IEEE access 4, 2920-2934, 2016
742016
A distributed WND-LSTM model on MapReduce for short-term traffic flow prediction
D Xia, M Zhang, X Yan, Y Bai, Y Zheng, Y Li, H Li
Neural Computing and Applications 33 (7), 2393–2410, 2021
662021
Using Feature Fusion Strategies in Continuous Authentication on Smartphones
Y Li, B Zou, S Deng, G Zhou
IEEE Internet Computing 24 (2), 49-56, 2020
632020
Multi-Scale and Multi-Direction GAN for CNN-Based Single Palm-Vein Identification
H Qin, MA El-Yacoubi, Y Li, C Liu
IEEE Transactions on Information Forensics and Security 16, 2652-2666, 2021
612021
Communication Energy Modeling and Optimization through Joint Packet Size Analysis of BSN and WiFi Networks
Y Li, X Qi, M Keally, Z Ren, G Zhou, D Xiao, S Deng
IEEE Transactions on Parallel and Distributed Systems 24 (9), 1741-1751, 2013
512013
Chaotic hash function based on the dynamic S-Box with variable parameters
Y Li, G Ge, D Xia
Nonlinear Dynamics 84 (4), 2387-2402, 2016
502016
Parallel Hash function construction based on chaotic maps with changeable parameters
Y Li, D Xiao, S Deng, Q Han, G Zhou
Neural Computing & Applications 20 (8), 1305-1312, 2011
492011
Sensor-Based Continuous Authentication Using Cost-Effective Kernel Ridge Regression
Y Li, H Hu, G Zhou, S Deng
IEEE Access 6, 32554-32565, 2018
482018
Radiosense: Exploiting wireless communication patterns for body sensor network activity recognition
X Qi, G Zhou, Y Li, G Peng
2012 IEEE 33rd Real-Time Systems Symposium, 95-104, 2012
482012
Analysis and improvement of a hash-based image encryption algorithm
S Deng, Y Zhan, D Xiao, Y Li
Communications in Nonlinear Science and Numerical Simulation 16 (8), 3269–3278, 2011
472011
Cryptographic and parallel hash function based on cross coupled map lattices suitable for multimedia communication security
Y Li, G Ge
Multimedia Tools and Applications 78 (13), 17973–17994, 2019
442019
A driving behavior detection system based on a smartphone's built‐in sensor
Y Li, F Xue, L Feng, Z Qu
International Journal of Communication Systems 30 (8), 1-13, 2017
412017
DeFFusion: CNN-based Continuous Authentication Using Deep Feature Fusion
Y Li, P Tao, S Deng, G Zhou
ACM Transactions on Sensor Networks 18 (2), 1-20, 2022
382022
A fast and efficient hash function based on generalized chaotic mapping with variable parameters
Y Li, X Li, X Liu
Neural Computing and Applications 28 (6), 1405–1415, 2017
372017
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20