Name
Affiliation
Papers
YANPING XIANG
University of Electronic Science and Technology of China(University of Electronic Science and Technology of China),Chengdu,China
52
Collaborators
Citations 
PageRank 
60
157
21.73
Referers 
Referees 
References 
458
966
462
Search Limit
100966
Title
Citations
PageRank
Year
<p>chi(2)-BidLSTM: A Feature Driven Intrusion Detection System Based on chi(2) Statistical Model and Bidirectional LSTM</p>00.342022
Slither: finding local dense subgraphs measured by average degree00.342022
Co-Residence Data Theft Attacks on <italic>N</italic>-Version Programming-Based Cloud Services With Task Cancelation00.342022
Reliability versus Vulnerability of <italic>N</italic>-Version Programming Cloud Service Component With Dynamic Decision Time Under Co-Resident Attacks00.342022
Optimal Preventive Replacement for Cold Standby Systems With Elements Exposed to Shocks During Operation and Task Transfers00.342022
Cryptanalysis and improvement of a reversible data-hiding scheme in encrypted images by redundant space transfer00.342021
Optimizing preventive replacement schedule in standby systems with time consuming task transfers.00.342021
Optimal abort rules for additive multi-attempt missions.10.352021
Optimal abort rules and subtask distribution in missions performed by multiple independent heterogeneous units00.342020
Optimal multi-attempt missions with cumulative effect00.342020
Series phased-mission systems with heterogeneous warm standby components.00.342020
Optimal aborting rule in multi-attempt missions performed by multicomponent systems20.362020
Cost minimization of real-time mission for software systems with rejuvenation00.342020
Optimal early warning defense of N-version programming service against co-resident attacks in cloud system10.352020
Optimal Replacement And Reactivation In Warm Standby Systems Performing Random Duration Missions00.342020
Optimization of time constrained N-version programming service components with competing task execution and version corruption processes10.352020
Privacy-Aware Controllable Compressed Data Publishing Against Sparse Estimation Attack In Iot00.342019
Feature selection based on feature interactions with application to text categorization.40.372019
A Secure Image Tampering Detection and Self-recovery Scheme Using POB Number System over Cloud20.422019
Quantum Image Encryption Using Intra and Inter Bit Permutation Based on Logistic Map.00.342019
A visually secure image encryption scheme based on parallel compressive sensing.10.352019
A Qos-Driven Approach to the Cloud Service Addressing Attributes of Security.00.342018
An Interaction-Enhanced Feature Selection Algorithm.00.342018
Structured Memetic Automation for Online Human-Like Social Behavior Learning.70.492017
Separable reversible data hiding in encrypted image based on pixel value ordering and additive homomorphism.150.542017
Maximizing influence under influence loss constraint in social networks.50.392016
A Hierarchical Correlation Model for Evaluating Reliability, Performance, and Power Consumption of a Cloud Service130.662016
On Information Coverage For Location Category Based Point-Of-Interest Recommendation160.612015
Optimal route search with the coverage of users' preferences60.472015
Time-critical interactive dynamic influence diagram.20.512015
A study on like-attracts-like versus elitist selection criterion for human-like social behavior of memetic mulitagent systems20.382013
Optimal Allocation of Multistate Components in Consecutive Sliding Window Systems20.412013
Maximal profit service task partition and distribution in computer grid00.342013
Time-critical dynamic decision making50.462013
Linear Multistate Consecutively-Connected Systems With Gap Constraints60.552012
Linear -Gap Sliding Window Systems10.372012
Combined m-consecutive and k-out-of-n sliding window systems.50.442012
Dynamic ordering-based search algorithm for markov blanket discovery10.352011
Service task partition and distribution in star topology computer grid subject to data security constraints.10.342011
Consequence Oriented Self-Healing and Autonomous Diagnosis for Highly Reliable Systems and Software.90.582011
An influence diagram approach for multiagent time-critical dynamic decision modeling30.492010
Time-Critical Decision Making in Interactive Dynamic Influence Diagram30.492010
Self-healing and Hybrid Diagnosis in Cloud Computing220.952009
Learning Local Components to Understand Large Bayesian Networks10.362009
An intelligent design system for military situation assessment00.342008
Refinement of Bayesian network structures upon new data10.372008
Multiple Approximate Dynamic Programming Controllers for Congestion Control00.342007
Time based congestion control (TBCC) for high speed high delay networks00.342006
A knowledge-based modeling system for time-critical dynamic decision-making00.342006
Constructing Bayesian Network in a Changing World.40.462005
  • 1
  • 2