Folgen
Yanyong Zhang
Yanyong Zhang
University of Science and Technology of China ; Rutgers University (Adjunct Visiting Professor)
Bestätigte E-Mail-Adresse bei ustc.edu.cn - Startseite
Titel
Zitiert von
Zitiert von
Jahr
The feasibility of launching and detecting jamming attacks in wireless networks
W Xu, W Trappe, Y Zhang, T Wood
Proceedings of the 6th ACM international symposium on Mobile ad hoc …, 2005
17482005
Jamming Sensor Networks: Attack and defense strategies
W Xu, K Ma, W Trappe, Y Zhang
IEEE Network 20 (3), 41-47, 2006
8582006
IoT security techniques based on machine learning: How do IoT devices use AI to enhance security?
L Xiao, X Wan, X Lu, Y Zhang, D Wu
IEEE Signal Processing Magazine 35 (5), 41-49, 2018
8362018
Voxel r-cnn: Towards high performance voxel-based 3d object detection
J Deng, S Shi, P Li, W Zhou, Y Zhang, H Li
Proceedings of the AAAI conference on artificial intelligence 35 (2), 1201-1209, 2021
8192021
Enhancing source-location privacy in sensor network routing
P Kamat, Y Zhang, W Trappe, C Ozturk
25th IEEE international conference on distributed computing systems (ICDCS …, 2005
7882005
Robust statistical methods for securing wireless localization in sensor networks
Z Li, W Trappe, Y Zhang, B Nath
Information Processing in Sensor Networks, 2005. IPSN 2005. Fourth …, 2005
6432005
Source-location privacy in energy-constrained sensor network routing
C Ozturk, Y Zhang, W Trappe
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor …, 2004
5462004
Channel surfing and spatial retreats: defenses against wireless denial of service
W Xu, T Wood, W Trappe, Y Zhang
Proceedings of the 3rd ACM workshop on Wireless security, 80-89, 2004
5012004
Speech emotion recognition using Fourier parameters
K Wang, N An, BN Li, Y Zhang, L Li
IEEE Transactions on affective computing 6 (1), 69-75, 2015
4542015
BlueGene/L Failure Analysis and Prediction Models
Y Liang, Y Zhang, A Sivasubramaniam, RK Sahoo, M Jette
Proceedings of the 2006 International Conference on Dependable Systems and …, 2006
4072006
Failure prediction in ibm bluegene/l event logs
Y Liang, Y Zhang, H Xiong, R Sahoo
Seventh IEEE International Conference on Data Mining (ICDM 2007), 583-588, 2007
3512007
Failure data analysis of a large-scale heterogeneous server environment
RK Sahoo, MS Squillante, A Sivasubramaniam, Y Zhang
International Conference on Dependable Systems and Networks, 2004, 772-781, 2004
3362004
SCPL: Indoor device-free multi-subject counting and localization using radio signal strength
C Xu, B Firner, RS Moore, Y Zhang, W Trappe, R Howard, F Zhang, N An
Proceedings of the 12th international conference on Information Processing …, 2013
3092013
Channel surfing: defending wireless sensor networks from interference
W Xu, Y Zhang, W Trappe
Information Processing in Sensor Networks, 2007. IPSN 2007. 6th …, 2007
2782007
Mobile edge cloud system: Architectures, challenges, and approaches
H Liu, F Eldarrat, H Alqahtani, A Reznik, X De Foy, Y Zhang
IEEE Systems Journal 12 (3), 2495-2508, 2017
2422017
TARA: topology-aware resource adaptation to alleviate congestion in sensor networks
J Kang, Y Zhang, B Nath
IEEE Transactions on Parallel and Distributed Systems 18 (7), 919-931, 2007
2122007
Filtering failure logs for a bluegene/l prototype
Y Liang, Y Zhang, A Sivasubramaniam, RK Sahoo, J Moreira, M Gupta
2005 International Conference on Dependable Systems and Networks (DSN'05 …, 2005
2002005
Performance implications of failures in large-scale cluster scheduling
Y Zhang, M Squillante, A Sivasubramaniam, R Sahoo
Job Scheduling Strategies for Parallel Processing, 23-38, 2005
1792005
Popularity-driven coordinated caching in named data networking
J Li, H Wu, B Liu, J Lu, Y Wang, X Wang, Y Zhang, L Dong
Proceedings of the eighth ACM/IEEE symposium on Architectures for networking …, 2012
1772012
Crowd++ unsupervised speaker count with smartphones
C Xu, S Li, G Liu, Y Zhang, E Miluzzo, YF Chen, J Li, B Firner
Proceedings of the 2013 ACM international joint conference on Pervasive and …, 2013
1752013
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20