Name
Papers
Collaborators
YANG SUN
41
86
Citations 
PageRank 
Referers 
46
15.21
135
Referees 
References 
469
191
Search Limit
100469
Title
Citations
PageRank
Year
Patent Semantic Community Detection Based on Game Theory.00.342020
Energy-Efficient Multimedia Task Assignment and Computing Offloading for Mobile Edge Computing Networks.00.342020
Energy-Efficient Localization-Based Link Setup Scheme for Device-to-Device Communications00.342020
Discovering the Diverse Types of Multi-degree Valence Relations Combined with Their Context.00.342020
Medical Image Encryption Based on Stream Cipher Algorithm and Krill Group.00.342020
Multi-degree Valence Relation Based Topical Matching Model in Patent Trading.00.342020
ROI Extraction Based on Multiview Learning and Attention Mechanism for Unbalanced Remote Sensing Data Set10.352020
Mpg-Net: Multi-Prediction Guided Network For Segmentation Of Retinal Layers In Oct Images00.342020
Application research based on improved genetic algorithm in cloud task scheduling.10.342020
Fog-Based Distributed Networked Control for Connected Autonomous Vehicles10.342020
Single-Channel Speech Enhancement with Sequentially Trained DNN System00.342019
Deep Learning Based Mandarin Accent Identification for Accent Robust ASR10.362019
PSD and Signal Approximation-LSTM Based Speech Enhancement00.342019
Monaural Source Separation Based On Sequentially Trained Lstms In Real Room Environments00.342019
Research on Improved Pedestrian Detection Algorithm Based on Convolutional Neural Network00.342019
A Certificateless Group Authenticated Key Agreement Protocol Based on Dynamic Binary Tree.00.342019
Automated Retinal Layer Segmentation of OCT Images Using Two-Stage FCN and Decision Mask00.342019
Two-phase Commit with Security Services: Using Distinctive Proofs to Relieve Fragile Communications.00.342017
Provably Secure Multi-server Privacy-Protection System Based on Chebyshev Chaotic Maps without Using Symmetric Cryptography.20.352016
An Enhanced Dragonfly Key Exchange Protocol Using Chaotic Maps.00.342016
Remote sensing image segmentation using active contours based on intercorrelation of nonsubsampled contourlet coefficients.10.402016
The optimal error estimate and superconvergence of the local discontinuous Galerkin methods for one-dimensional linear fifth order time dependent equations.20.372016
Matrix Based Community Evolution Events Detection In Online Social Networks20.362015
Batch Attribute-Based Encryption For Secure Clouds20.392015
NFC mobile Intelligent Campus construction of Nanjing University of Finance and Economics00.342015
Elliptic Curve Isogenies-Based Three-party Password Authenticated Key Agreement Scheme towards Quantum-Resistant.00.342014
Optimal reserve prices in weighted GSP auctions.50.482014
On the convergence and robustness of reserve pricing in keyword auctions10.372012
Design and Implementation of an Improved Overlapped Cell Image Segmentation Method00.342011
A Morphological License Plate Locating Method in Complex Background00.342011
Cell Image Segmentation Based on an Improved Watershed Transformation20.452010
Membrane computing based particle swarm optimization algorithm and its application40.562010
Semiconductor lot allocation using robust optimization70.562010
Measuring the web crawler ethics40.472010
Mechanism design for multi-slot ads auction in sponsored search markets70.532010
Minimizing job completion time variance for service stability on identical parallel machines10.362010
An Integrated Decentralized Distributed Computing Platform For Java Program00.342007
Improving Interactive Experience of Thin Client Computing by Reducing Data Spikes10.362007
Spiral-based data dissemination in sensor networks00.342007
A Novel Performance Optimization Approach for Thin Client Computing00.342005
Distributed code generation using object level analysis10.372005