default search action
Chi Yang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j34]Chi Yang, Lei Wang, Cong Peng, Shuhao Zhang, Yonglin Cui, Chaofei Ma:
A Robust Time-Frequency Synchronization Method for Underwater Acoustic OFDM Communication Systems. IEEE Access 12: 21908-21920 (2024) - [c27]Ziyi Tan, Sitong Fang, Haoran Zhu, Chi Yang:
Contrastive Sensor Excitation for Generalizable Cross-Person Activity Recognition. IJCNN 2024: 1-8 - [c26]Haoran Zhu, Ziyi Tan, Sitong Fang, Chi Yang:
Time Series Domain Adaptation via Multiscale Feature Extraction and Mix-up. IJCNN 2024: 1-8 - 2023
- [j33]Xuyun Zhang, Deepak Puthal, Chi Yang:
Special issue on privacy, security, and trust in computational intelligence. Comput. Intell. 39(1): 2-3 (2023) - [j32]Guo Bai, Zhiyuan Qu, Qianyang Xie, Hongyi Jing, Shihui Chen, Leilei Yu, Zhiyuan Zhang, Chi Yang:
Automatic temporomandibular disc displacement diagnosis via deep learning. Displays 77: 102394 (2023) - [j31]Shengze Fu, Xiaoli Zhao, Chi Yang, Zhijun Fang:
Data heterogeneous federated learning algorithm for industrial entity extraction. Displays 80: 102504 (2023) - [j30]Liming Han, Chi Yang, Qing Li, Bin Yao, Zixian Jiao, Qianyang Xie:
Dynamic deformable transformer for end-to-end face alignment. IET Comput. Vis. 17(8): 948-961 (2023) - [j29]Zhiyuan Qu, Hongyi Jing, Guo Bai, Zhongpai Gao, Leilei Yu, Zhiyuan Zhang, Guangtao Zhai, Chi Yang:
Computed Tomography and 3-D Face Scan Fusion for IoT-Based Diagnostic Solutions. IEEE Internet Things J. 10(13): 11605-11618 (2023) - [j28]Chi Yang, Xiaomin Yang, Feng Yang:
Correction to: A system based on Hadoop for radar data analysis. J. Ambient Intell. Humaniz. Comput. 14(10): 14365 (2023) - [c25]Cong Peng, Lei Wang, Haoran Ji, Shuhao Zhang, Chi Yang:
Multi-Resampling Equalizer for Underwater Acoustic Single Carrier Communication. ICSPCC 2023: 1-4 - [c24]Chi Yang, Fang Yang:
Communication Interruption Analysis for Air-water Wireless Optical Communication. IWCMC 2023: 1022-1027 - 2022
- [j27]Bo Zhou, Jianying Chen, Qianhua Cai, Yun Xue, Chi Yang, Jing He:
Cross-domain sequence labelling using language modelling and parameter generating. CAAI Trans. Intell. Technol. 7(4): 710-720 (2022) - [j26]Lingtong Bu, Xiang Wei, Jisi Zheng, Yating Qiu, Chi Yang:
Evaluation of internal fixation techniques for extracapsular fracture: A finite element analysis and comparison. Comput. Methods Programs Biomed. 225: 107072 (2022) - [j25]Luming Yang, Shaojing Fu, Xuyun Zhang, Shize Guo, Yongjun Wang, Chi Yang:
FlowSpectrum: a concrete characterization scheme of network traffic behavior for anomaly detection. World Wide Web 25(5): 2139-2161 (2022) - [c23]Shengze Fu, Xiaoli Zhao, Chi Yang:
Federated Learning for Industrial Entity Extraction. IFTC 2022: 490-501 - 2021
- [j24]Donghong Gu, Jiaqian Wang, Shaohua Cai, Chi Yang, Zhengxin Song, Haoliang Zhao, Luwei Xiao, Hua Wang:
Targeted Aspect-Based Multimodal Sentiment Analysis: An Attention Capsule Extraction and Multi-Head Fusion Network. IEEE Access 9: 157329-157336 (2021) - [j23]Meng Liu, Hongsheng Hu, Haolong Xiang, Chi Yang, Lingjuan Lyu, Xuyun Zhang:
Clustering-based Efficient Privacy-preserving Face Recognition Scheme without Compromising Accuracy. ACM Trans. Sens. Networks 17(3): 31:1-31:27 (2021) - [c22]Xuyun Zhang, Deepak Puthal, Chi Yang, Guanfeng Liu, Kim-Kwang Raymond Choo, Hongzhi Yin:
International Workshop on Privacy, Security and Trust in Computational Intelligence (PSTCI2021). CIKM 2021: 4886-4887 - [c21]Chi Yang, Bo Zhou, Xiaohui Hu, Jianying Chen, Qianhua Cai, Yun Xue:
Dual-Channel Domain Adaptation Model. WI/IAT (Workshop/Special Session) 2021: 387-392 - [i3]Jiaqian Wang, Donghong Gu, Chi Yang, Yun Xue, Zhengxin Song, Haoliang Zhao, Luwei Xiao:
Targeted aspect based multimodal sentiment analysis: an attention capsule extraction and multi-head fusion network. CoRR abs/2103.07659 (2021) - 2020
- [j22]Meng Liu, Yun Luo, Chi Yang, Shaoning Pang, Deepak Puthal, Kaijun Ren, Xuyun Zhang:
Privacy-preserving matrix product based static mutual exclusive roles constraints violation detection in interoperable role-based access control. Future Gener. Comput. Syst. 109: 457-468 (2020) - [j21]Chi Yang, Xianghua Xu, Kotagiri Ramamohanarao, Jinjun Chen:
A Scalable Multi-Data Sources Based Recursive Approximation Approach for Fast Error Recovery in Big Sensing Data on Cloud. IEEE Trans. Knowl. Data Eng. 32(5): 841-854 (2020)
2010 – 2019
- 2019
- [j20]Chi Yang, Xiaomin Yang, Feng Yang:
A system based on Hadoop for radar data analysis. J. Ambient Intell. Humaniz. Comput. 10(10): 3899-3913 (2019) - 2018
- [j19]Deepak Puthal, Nisha Malik, Saraju P. Mohanty, Elias Kougianos, Chi Yang:
The Blockchain as a Decentralized Security Framework [Future Directions]. IEEE Consumer Electron. Mag. 7(2): 18-21 (2018) - [j18]Chi Yang, Chun-Hui Jen, Chun-Yen Chang, Ting-Kuang Yeh:
Comparison of Animation and Static-picture based Instruction: Effects on Performance and Cognitive Load for Learning Genetics. J. Educ. Technol. Soc. 21(4): 1-11 (2018) - [j17]Lianyong Qi, Xuyun Zhang, Wanchun Dou, Chunhua Hu, Chi Yang, Jinjun Chen:
A two-stage locality-sensitive hashing based approach for privacy-preserving mobile service recommendation in cross-platform edge environment. Future Gener. Comput. Syst. 88: 636-643 (2018) - [j16]Meng Liu, Xuyun Zhang, Chi Yang, Qiang He, Jianbing Zhang:
Curve fitting based efficient parameter selection for robust provable data possession. J. Parallel Distributed Comput. 120: 62-76 (2018) - [c20]Man Li, Chi Yang, Jin Zhang, Deepak Puthal, Yun Luo, Jianxin Li:
Stock market analysis using social networks. ACSW 2018: 19:1-19:10 - [c19]Xiaodong Hao, Yan Bian, Zihao Yin, Shun Wang, Chi Yang:
Study of Robotic System Design in Iron and Steel Enterprises. CRC 2018: 53-56 - [c18]Meng Liu, Priyadarsi Nanda, Xuyun Zhang, Chi Yang, Shui Yu, Jianxin Li:
Asymmetric Commutative Encryption Scheme Based Efficient Solution to the Millionaires' Problem. TrustCom/BigDataSE 2018: 990-995 - 2017
- [j15]Chi Yang, Deepak Puthal, Saraju P. Mohanty, Elias Kougianos:
Big-Sensing-Data Curation for the Cloud is Coming: A Promise of Scalable Cloud-Data-Center Mitigation for Next-Generation IoT and Wireless Sensor Networks. IEEE Consumer Electron. Mag. 6(4): 48-56 (2017) - [j14]Meng Liu, Xuan Wang, Chi Yang, Zoe Lin Jiang, Ye Li:
An efficient secure Internet of things data storage auditing protocol with adjustable parameter in cloud computing. Int. J. Distributed Sens. Networks 13(1) (2017) - [j13]Chi Yang, Jinjun Chen:
A Scalable Data Chunk Similarity Based Compression Approach for Efficient Big Sensing Data Processing on Cloud. IEEE Trans. Knowl. Data Eng. 29(6): 1144-1157 (2017) - [c17]Ruibin Zhang, Chi Yang, Shaoning Pang, Hossein Sarrafzadeh:
UnitecDEAMP: Flow Feature Profiling for Malicious Events Identification in Darknet Space. ATIS 2017: 157-168 - [c16]Lianyong Qi, Haolong Xiang, Wanchun Dou, Chi Yang, Yongrui Qin, Xuyun Zhang:
Privacy-Preserving Distributed Service Recommendation Based on Locality-Sensitive Hashing. ICWS 2017: 49-56 - [c15]Meng Liu, Xuyun Zhang, Chi Yang, Shaoning Pang, Deepak Puthal, Kaijun Ren:
Privacy-Preserving Detection of Statically Mutually Exclusive Roles Constraints Violation in Interoperable Role-Based Access Control. TrustCom/BigDataSE/ICESS 2017: 502-509 - 2016
- [j12]Chang Liu, Nick Beaugeard, Chi Yang, Xuyun Zhang, Jinjun Chen:
HKE-BC: hierarchical key exchange for secure scheduling and auditing of big data in cloud computing. Concurr. Comput. Pract. Exp. 28(3): 646-660 (2016) - [c14]Kun-Lin Tsai, Fang-Yie Leu, Yi-Fung Huang, Chi Yang, Cheng-Hsin Chang, King-Shing Yip, Yuchen Xue, Guan-Chi Lai:
Cloud Encryption Using Distributed Environmental Keys. IMIS 2016: 476-481 - 2015
- [j11]Chang Liu, Chi Yang, Xuyun Zhang, Jinjun Chen:
External integrity verification for outsourced big data in cloud and IoT: A big picture. Future Gener. Comput. Syst. 49: 58-67 (2015) - [j10]Xuyun Zhang, Wan-Chun Dou, Jian Pei, Surya Nepal, Chi Yang, Chang Liu, Jinjun Chen:
Proximity-Aware Local-Recoding Anonymization with MapReduce for Scalable Big Data Privacy Preservation in Cloud. IEEE Trans. Computers 64(8): 2293-2307 (2015) - [j9]Chang Liu, Rajiv Ranjan, Chi Yang, Xuyun Zhang, Lizhe Wang, Jinjun Chen:
MuR-DPA: Top-Down Levelled Multi-Replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud. IEEE Trans. Computers 64(9): 2609-2622 (2015) - [j8]Chi Yang, Chang Liu, Xuyun Zhang, Surya Nepal, Jinjun Chen:
A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud. IEEE Trans. Parallel Distributed Syst. 26(2): 329-339 (2015) - [r1]Chang Liu, Rajiv Ranjan, Xuyun Zhang, Chi Yang, Jinjun Chen:
A Big Picture of Integrity Verification of Big Data in Cloud Computing. Handbook on Data Centers 2015: 631-645 - 2014
- [j7]Xuyun Zhang, Chang Liu, Surya Nepal, Chi Yang, Wanchun Dou, Jinjun Chen:
A hybrid approach for scalable sub-tree anonymization over big data using MapReduce on cloud. J. Comput. Syst. Sci. 80(5): 1008-1020 (2014) - [j6]Chi Yang, Xuyun Zhang, Changmin Zhong, Chang Liu, Jian Pei, Kotagiri Ramamohanarao, Jinjun Chen:
A spatiotemporal compression based approach for efficient big data processing on Cloud. J. Comput. Syst. Sci. 80(8): 1563-1583 (2014) - [j5]Chang Liu, Jinjun Chen, Laurence T. Yang, Xuyun Zhang, Chi Yang, Rajiv Ranjan, Kotagiri Ramamohanarao:
Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-Grained Updates. IEEE Trans. Parallel Distributed Syst. 25(9): 2234-2244 (2014) - [i2]Chang Liu, Rajiv Ranjan, Chi Yang, Xuyun Zhang, Lizhe Wang, Jinjun Chen:
MuR-DPA: Top-down Levelled Multi-replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud. IACR Cryptol. ePrint Arch. 2014: 391 (2014) - 2013
- [j4]Xuyun Zhang, Chang Liu, Surya Nepal, Chi Yang, Wanchun Dou, Jinjun Chen:
SaC-FRAPP: a scalable and cost-effective framework for privacy preservation over big data on cloud. Concurr. Comput. Pract. Exp. 25(18): 2561-2576 (2013) - [j3]Chang Liu, Xuyun Zhang, Chi Yang, Jinjun Chen:
CCBKE - Session key negotiation for fast and secure scheduling of scientific applications in cloud computing. Future Gener. Comput. Syst. 29(5): 1300-1308 (2013) - [c13]Xuyun Zhang, Chi Yang, Surya Nepal, Chang Liu, Wanchun Dou, Jinjun Chen:
A MapReduce Based Approach of Scalable Multidimensional Anonymization for Big Data Privacy Preservation on Cloud. CGC 2013: 105-112 - [c12]Chi Yang, Chang Liu, Xuyun Zhang, Surya Nepal, Jinjun Chen:
Querying Streaming XML Big Data with Multiple Filters on Cloud. CSE 2013: 1121-1127 - [c11]Chang Liu, Rajiv Ranjan, Xuyun Zhang, Chi Yang, Dimitrios Georgakopoulos, Jinjun Chen:
Public Auditing for Big Data Storage in Cloud Computing - A Survey. CSE 2013: 1128-1135 - [c10]Xuyun Zhang, Chang Liu, Surya Nepal, Chi Yang, Wanchun Dou, Jinjun Chen:
Combining Top-Down and Bottom-Up: Scalable Sub-tree Anonymization over Big Data Using MapReduce on Cloud. TrustCom/ISPA/IUCC 2013: 501-508 - 2012
- [i1]Chang Liu, Xuyun Zhang, Chi Yang, Jinjun Chen:
CCBKE - Session Key Negotiation for Fast and Secure Scheduling of Scientific Applications in Cloud Computing. IACR Cryptol. ePrint Arch. 2012: 385 (2012) - 2011
- [c9]Chi Yang, Kaijun Ren, Zhimin Yang, Peng Gong, Chang Liu:
A CSMA-based approach for detecting composite data aggregate events with collaborative sensors in WSN. CSCWD 2011: 489-496 - [c8]Chang Liu, Xuyun Zhang, Jinjun Chen, Chi Yang:
An Authenticated Key Exchange Scheme for Efficient Security-Aware Scheduling of Scientific Applications in Cloud Computing. DASC 2011: 372-379 - 2010
- [j2]Chi Yang, Chengfei Liu, Jianxin Li, Jeffrey Xu Yu, Junhu Wang:
A Query System for XML Data Stream and its Semanticsbased Buffer Reduction. J. Res. Pract. Inf. Technol. 42(2): 111-128 (2010) - [c7]Zhimin Yang, Lixiang Qiao, Chang Liu, Chi Yang, Guangming Wan:
A collaborative trust model of firewall-through based on Cloud Computing. CSCWD 2010: 329-334
2000 – 2009
- 2009
- [c6]Kaijun Ren, Nong Xiao, Junqiang Song, Chi Yang, Min Zhu, Jinjun Chen:
Gradual Removal of QoS Constraint Violations by Employing Recursive Bargaining Strategy for Optimizing Service Composition Execution Path. ICWS 2009: 485-492 - 2008
- [c5]Chi Yang, Chengfei Liu, Jianxin Li, Jeffrey Xu Yu, Junhu Wang:
Semantics based Buffer Reduction for Queries over XML Data Streams. ADC 2008: 145-153 - [c4]Jianxin Li, Chengfei Liu, Jeffrey Xu Yu, Jixue Liu, Guoren Wang, Chi Yang:
Computing Structural Similarity of Source XML Schemas against Domain XML Schema. ADC 2008: 155-164 - [c3]Zhimin Yang, Jing Wang, Chi Yang:
Multi-filters collaboration for querying XML data streams. CSCWD 2008: 165-170 - 2007
- [c2]Peng Gong, Chi Yang, Dongping Shi, Zengguang Zhang, Yunlei Chen:
Heterogeneous Information Processing and Integration in Enterprise Management Information Systems. CSCWD (Selected Papers) 2007: 215-226 - [c1]Peng Gong, Chi Yang, Dongping Shi:
Heterogeneous information processing and integration method research in Enterprise Management Information Systems. CSCWD 2007: 951-955 - 2004
- [j1]Rainald Löhner, Juan R. Cebral, Chi Yang, Joseph D. Baum, Eric L. Mestreau, Charles Charman, Daniele Pelessone:
Large-scale fluid-structure interaction simulations. Comput. Sci. Eng. 6(3): 27-37 (2004)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-05 20:57 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint