default search action
Yuyu Yuan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c26]Yuang Cai, Yuyu Yuan:
CAR-Transformer: Cross-Attention Reinforcement Transformer for Cross-Lingual Summarization. AAAI 2024: 17718-17726 - 2023
- [c25]Yuyu Yuan, Jinsheng Shi, Jincui Yang, Chenlong Li, Yuang Cai, Baoyu Tang:
Conservative Q-Learning for Mechanical Ventilation Treatment Using Diagnose Transformer-Encoder. BIBM 2023: 2346-2351 - 2022
- [j11]Baoyu Tang, Yuyu Yuan, Jincui Yang, Lirong Qiu, Shasha Zhang, Jinsheng Shi:
Predicting Blood Glucose Concentration after Short-Acting Insulin Injection Using Discontinuous Injection Records. Sensors 22(21): 8454 (2022) - 2021
- [j10]Yanjun Li, Huan Huang, Xinwei Guo, Yuyu Yuan:
An Empirical Study on Group Fairness Metrics of Judicial Data. IEEE Access 9: 149043-149049 (2021) - [c24]Lei Chen, Yuyu Yuan, Hongpu Jiang, Ting Guo, Pengqian Zhao, Jinsheng Shi:
A Novel Trust-based Model for Collaborative Filtering Recommendation Systems using Entropy. DSA 2021: 184-188 - [c23]Qiucheng Sun, Yuyu Yuan, Ting Guo, Lei Chen:
A Trusted Solution to Hyperledger Fabric Reordering Problem. DSA 2021: 202-207 - [c22]Dingning Liu, Yuyu Yuan, Tengfei Xue, Lei Chen:
An Efficient Batch Verification Scheme for SM2 Signatures. DSA 2021: 208-212 - [c21]Hongpu Jiang, Yuyu Yuan, Ting Guo, Pengqian Zhao:
Measuring Trust and Automatic Verification in Multi-Agent Systems. DSA 2021: 271-277 - [c20]Haoran Jia, Yuyu Yuan, Qiang Han, Pengqian Zhao, Ting Guo:
Multi-Agent Trust Evaluation Model based on Reinforcement Learning. DSA 2021: 608-613 - 2020
- [j9]Ghazaros Barseghyan, Yuyu Yuan, Manawa Anakpa:
Model for Detection of Masquerade Attacks Based on Variable-Length Sequences. IEEE Access 8: 210140-210157 (2020) - [j8]Xu Chen, Yuyu Yuan, Mehmet Ali Orgun:
Using Bayesian networks with hidden variables for identifying trustworthy users in social networks. J. Inf. Sci. 46(5) (2020) - [j7]Xu Chen, Yuyu Yuan, Mehmet Ali Orgun, Lilei Lu:
A topic-sensitive trust evaluation approach for users in online communities. Knowl. Based Syst. 194: 105546 (2020)
2010 – 2019
- 2019
- [j6]Xu Chen, Yuyu Yuan, Lilei Lu, Jincui Yang:
A Multidimensional Trust Evaluation Framework for Online Social Networks Based on Machine Learning. IEEE Access 7: 175499-175513 (2019) - [j5]Ji Ma, Yuyu Yuan:
Dimension reduction of image deep feature using PCA. J. Vis. Commun. Image Represent. 63 (2019) - 2018
- [j4]Lilei Lu, Yuyu Yuan:
A novel TOPSIS evaluation scheme for cloud service trustworthiness combining objective and subjective aspects. J. Syst. Softw. 143: 71-86 (2018) - [c19]Wen Wen, Zhongju Yuan, Yuyu Yuan:
Improving RETECS method using FP-Growth in continuous integration. CCIS 2018: 636-639 - [c18]Tengfei Xue, Yuyu Yuan, Zahir Ahmed, Krishna Moniz, Ganyuan Cao, Cong Wang:
Proof of Contribution: A Modification of Proof of Work to Increase Mining Efficiency. COMPSAC (1) 2018: 636-644 - [c17]Tengfei Xue, Yuyu Yuan, Cong Wang:
An Approach for Evaluating User Participation in Bitcoin. DSC 2018: 858-864 - 2016
- [j3]Ji Ma, Wei Ni, Jie Yin, Ren Ping Liu, Yuyu Yuan, Bin Xing Fang:
Modeling Mobile Cellular Networks Based on Social Characteristics. Int. J. Comput. Commun. Control 11(4): 480-492 (2016) - 2014
- [c16]Tengfei Xue, Yuyu Yuan, Qunchao Fu, Heng Gu, Siyue Zhang, Cong Wang:
The application of text similarity computing in the Clinical Decision Support System. CCIS 2014: 357-361 - [c15]Tianle Zhang, Lixin Liu, Shouyou Song, Yuyu Yuan:
Human Mobility Simulation in Smart Energy Grid. ISCTCS 2014: 229-237 - [c14]Krishna Moniz, Yuyu Yuan:
Reaching Critical Mass: The Effect of Adding New Content on Website Visitors and User Registration. ISCTCS 2014: 359-369 - [c13]Jincui Yang, Yuyu Yuan, Tianle Zhang:
Research on Modeling of Software Automatic Test. ISCTCS 2014: 382-388 - [e2]Yuyu Yuan, Xu Wu, Yueming Lu:
Trustworthy Computing and Services - International Conference, ISCTCS 2013, Beijing, China, November 2013, Revised Selected Papers. Communications in Computer and Information Science 426, Springer 2014, ISBN 978-3-662-43907-4 [contents] - 2013
- [c12]Krishna Moniz, Yuyu Yuan:
Filtering Training Data When Training Feed-Forward Artificial Neural Network. ISCTCS 2013: 212-218 - [c11]Manawa Anakpa, Yuyu Yuan:
Multidisciplinary Trust Conceptualization: A General Model for Customer Trust Building in e-Commerce. ISCTCS 2013: 366-373 - [c10]Miandrilala, Yuyu Yuan:
Concept of Service Trustworthiness Management System (STMS). ISCTCS 2013: 374-381 - [e1]Yuyu Yuan, Xu Wu, Yueming Lu:
Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28 - June 2, 2012, Revised Selected Papers. Communications in Computer and Information Science 320, Springer 2013, ISBN 978-3-642-35794-7 [contents] - 2012
- [j2]Yuyu Yuan, Chuanyi Liu, Jie Cheng, Xiaoliang Wang:
DISWOP: A Novel Scheduling Algorithm for Data-Intensive Workflow Optimizations. IEICE Trans. Inf. Syst. 95-D(7): 1839-1846 (2012) - [c9]Jørgen Bøegh, Yuyu Yuan:
Towards a standard for Service Behavior Trustworthiness Management. DICTAP 2012: 189-194 - [c8]Yuyu Yuan, Qiang Han, Sun Qi:
A New Measurement Method for Software Trustworthiness Based on Rough Sets. ISCTCS 2012: 13-19 - [c7]Yuyu Yuan, Yangyang Zhang, Jing Liu:
Service Behavior Trustworthiness Management. ISCTCS 2012: 20-25 - [c6]Jincui Yang, Bin-Xing Fang, Yuyu Yuan, Meng-Xiao Zhai:
Research on Simulation and Real-Time Evaluation Method of IoT-Oriented Complex System. ISCTCS 2012: 227-235 - [c5]Tianle Zhang, Yuyu Yuan, Jørgen Bøegh, Xu Wu:
A New Manipulation Based Mobility Model for Vehicular Delay Tolerant Networks. ISCTCS 2012: 236-241 - [c4]Hongqi Wang, Zongwei Luo, Tianle Zhang, Yuyu Yuan, Xu Wu:
A Pervasive Technology Approach to Social Trustworthiness. ISCTCS 2012: 242-249 - 2011
- [j1]Yuyu Yuan, Qiang Han:
A Software Behavior Trustworthiness Measurement Method based on Data Mining. Int. J. Comput. Intell. Syst. 4(5): 817-825 (2011)
2000 – 2009
- 2006
- [c3]Yuyu Yuan, Pingping Qu:
Theoretical Study of the Personal Capability Improvement in Unit Test. IEEE ICCI 2006: 155-162 - [c2]Yingxu Wang, Yuyu Yuan:
The Formal Economic Model of Software Engineering. CCECE 2006: 2385-2388 - [c1]Yuyu Yuan, Shen Gu:
Research and Establishment of Quality Cost Oriented Software Testing Model. CCECE 2006: 2410-2415
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint