Name
Papers
Collaborators
LI YANG
42
91
Citations 
PageRank 
Referers 
38
15.40
131
Referees 
References 
368
142
Search Limit
100368
Title
Citations
PageRank
Year
AUGER: automatically generating review comments with pre-training models.00.342022
Case Base Construction and Blended Teaching Practice of Professional Master's Degree- Intellectual Property and Patent Literature Writing.00.342021
Target detection of remote sensing images based on deep learning method and system.00.342021
Lijie at ImageCLEFmed Tuberculosis 2021 - EfficientNet Simplified Tuberculosis Case Classification.00.342021
Artificial synaptic behavior and its improvement of RRAM device with stacked solution-processed MXene layers.00.342021
Spatial Attention-Based Non-Reference Perceptual Quality Prediction Network for Omnidirectional Images.00.342021
Protecting the Data Plane of SDN From Malicious Flow Entries Based on P4.00.342020
异构无线网络中动态优先级接纳控制算法研究 (Study on Dynamic Priority Admission Control Algorithm in Heterogeneous Wireless Networks).00.342020
一种基于卫星网络的虚拟网络功能快速映射算法 (Virtual Network Function Fast Mapping Algorithm over Satellite Network).00.342020
Fall detection and recognition based on GCN and 2D Pose.00.342019
Engineering the Black-Box Meta Model of Data Exploration.00.342019
Data-Driven Load Forecasting of Air Conditioners for Demand Response Using Levenberg-Marquardt Algorithm-Based ANN.00.342019
Design of Simple Resistance Automatic Tester Based on STC89C52.00.342019
代价敏感深度学习方法研究综述 (Survey on Cost-sensitive Deep Learning Methods).00.342019
一种具有精确位姿的飞机CAD模型投影图像库设计方法 (Projection Image Library Design Method for Aircraft CAD Model with Accurate Pose).00.342018
Computer-Aided Annotation for Video Tampering Dataset of Forensic Research.00.342018
Toward better data veracity in mobile cloud computing: A context-aware and incentive-based reputation mechanism.00.342017
Quantum impossible differential and truncated differential cryptanalysis.00.342017
Quantum Bit Commitment Protocol Based on Counterfactual Quantum Cryptography.00.342017
Practical Signature Scheme from \varGamma Γ -Protocol.00.342016
Bit-oriented quantum public-key encryption.00.342015
Quantum McEliece public-key encryption scheme.10.362015
A quantum algorithm for approximating the influences of Boolean functions.00.342014
Auditory Context Recognition Combining Discriminative and Generative Models.00.342013
Post-quantum security of encrypted key exchange protocol00.342013
A note on quantum McEliece public-key cryptosystem10.382012
Research on Milling Globoidal Indexing Cam Based on Pro / NC00.342011
Attacker behavior analysis in multi-stage attack detection system50.392011
Camera Resectioning from Image Edges with the $L_\infty$-Norm Using Linear Programming.00.342011
Network covert channels on the Android platform80.692011
Application of ETSIAT to the toxicity prediction of aliphatic alcohols00.342010
Two-phase biomedical named entity recognition based on semi-CRFs50.442010
Alerts Analysis and Visualization in Network-based Intrusion Detection Systems40.392010
Generalizable Features Help Semantic Role Labeling.00.342009
Integrating Trust Management into Usage Control in P2P Multimedia Delivery20.382008
Fine-Grained Reputation-based Routing in Wireless Ad Hoc Networks80.652007
New invariant of DNA sequence based on 3DD-curves and its application on phylogeny.20.392007
Formal Representation and Transformation of DTDs to Sem-ODM Semantic Schemas00.342006
Formal Aspect-Oriented Modeling and Analysis by Aspect10.462005
Dynamic Integration Strategy for Mediation Framework00.342005
Design of enhancement current-balanced logic for mixed-signal ICs10.382003
n23Tool: a Tool for Exploring Large Relational Data Sets Through 3D Dynamic Projections.00.342000