default search action
Yahui Yang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c43]Yutang Xia, Yang Luo, Wu Luo, Qingni Shen, Yahui Yang, Zhonghai Wu:
A Role Engineering Approach Based on Spectral Clustering Analysis for Restful Permissions in Cloud. ICASSP 2023: 1-5 - [c42]Yahui Yang, Yanxia Gao, Ling Peng, Yingxi Xiang, Huan He, Yiwen Liu:
Propelling Pedagogical Paradigms: A Study of Advanced Human-Computer Interaction Learning in Data Structure and Algorithms Based on Virtual Reality Technology. ICCSE (3) 2023: 220-233 - [c41]Yiwen Liu, Yahui Yang, Jinrong Fu, Tao Feng, Ting Yin, Yingxi Xiang, Yanxia Gao, Taiguo Qu, Xian Zhang:
Human-AI Collaboration: A Study on Anti-ChatGPT Strategies Employed in Innovative Practical Homework Towards "One-Click-Answer" Issue in AIGC. ICCSE (3) 2023: 343-353 - [c40]Yiwen Liu, Jinrong Fu, Zikai Zhao, Yahui Yang, Ling Peng, Taiguo Qu, Tao Feng:
Intelligent Logistics Service Quality Assurance Mechanism Based on Federated Collaborative Cache in 5G+ Edge Computing Environment. WiCON 2023: 157-169 - [c39]Jinrong Fu, Yiwen Liu, Haobo Yan, Yahui Yang, Ling Peng, Yuanquan Shi, Tao Feng:
Research on Highly Secure Metaverse Based on Extended Reality Under Edge Computing. WiCON 2023: 173-186 - 2021
- [c38]Hengrui Wang, Yahui Yang, Hongzhang Yang:
Hard Disk Failure Prediction Based on Lightgbm with CID. ISCC 2021: 1-7 - 2020
- [c37]Hongzhang Yang, Zongzhao Li, Huiyuan Qiang, Zhongliang Li, Yaofeng Tu, Yahui Yang:
ZTE-Predictor: Disk Failure Prediction System Based on LSTM. DSN (Supplements) 2020: 17-20 - [c36]Hongzhang Yang, Yahui Yang, Zhengguang Chen, Zongzhao Li, Yaofeng Tu:
ADF2T: an Active Disk Failure Forecasting and Tolerance Software. ISSRE Workshops 2020: 13-18 - [c35]Bi Li, Boyu Chen, Yan Wu, Juan Wang, Xueming Yan, Yahui Yang:
Identifying the Motives of Using Weibo from Digital Traces. NLPIR 2020: 169-172
2010 – 2019
- 2019
- [c34]Hongzhang Yang, Yahui Yang, Yaofeng Tu, Ping Wang:
uSendfile: A User-Space Sendfile Verb Based on Flash and RDMA. CLOUD 2019: 465-469 - [c33]Hongzhang Yang, Yahui Yang, Yaofeng Tu:
S3R5: A Snapshot Storage System Based on ROW with Rapid Rollback, Recovery and Read-Write. HPCC/SmartCity/DSS 2019: 2111-2118 - [c32]Mengyu Zhang, Hecan Zhang, Yahui Yang, Qingni Shen:
PTAD: Provable and Traceable Assured Deletion in Cloud Storage. ISCC 2019: 1-6 - 2018
- [j2]Xiaofei Pan, Jiaqi Zhang, Shanshe Wang, Shiqi Wang, Yun Zhou, Wenhua Ding, Yahui Yang:
HDR video quality assessment: Perceptual evaluation of compressed HDR video. J. Vis. Commun. Image Represent. 57: 76-83 (2018) - [c31]Tong Hui, Yahui Yang, Qingni Shen, Zhonghai Wu:
Towards Real-Time Privacy Preservation: A Streaming Location Anonymous Method Based on Distributed Framework. ICC 2018: 1-6 - [c30]Yazhen Tian, Qingni Shen, Ziyao Zhu, Yahui Yang, Zhonghai Wu:
Non-Authentication Based Checkpoint Fault-tolerant Vulnerability in Spark Streaming. ISCC 2018: 783-786 - [c29]Yizhe Yang, Qingni Shen, Wu Xin, Wenjun Qian, Yahui Yang, Zhonghai Wu:
Memory Cache Attacks on Alluxio Impede High Performance Computing. ISPA/IUCC/BDCloud/SocialCom/SustainCom 2018: 407-414 - 2017
- [c28]Hongbo Zhou, Yahui Yang:
The Research and Implementation of the Fine-Grained Implicit Authentication Framework for Android. GSKI (2) 2017: 641-649 - [c27]Wu Xin, Qingni Shen, Yahui Yang, Zhonghai Wu:
SeEagle: Semantic-Enhanced Anomaly Detection for Securing Eagle. ICDF2C 2017: 221-227 - [c26]Wenjun Qian, Qingni Shen, Yizhe Yang, Yahui Yang, Zhonghai Wu:
Statically Defend Network Consumption Against Acker Failure Vulnerability in Storm. ICICS 2017: 661-673 - [c25]Ziyao Zhu, Qingni Shen, Yahui Yang, Zhonghai Wu:
MCS: Memory Constraint Strategy for Unified Memory Manager in Spark. ICPADS 2017: 437-444 - [c24]Yang Luo, Tian Puyang, Xiaoning Sun, Qingni Shen, Yahui Yang, Anbang Ruan, Zhonghai Wu:
RestSep: Towards a Test-Oriented Privilege Partitioning Approach for RESTful APIs. ICWS 2017: 548-555 - [c23]Shengjun Zhang, Hang Zhou, Yahui Yang, Zhonghai Wu:
A joint Bloom Filter and cross-encoding for data verification and recovery in cloud. ISCC 2017: 614-619 - [c22]Limin Li, Yahui Yang, Zhonghai Wu:
FMR-PDP: Flexible multiple-replica provable data possession in cloud storage. ISCC 2017: 1115-1121 - 2016
- [c21]Wenjun Qian, Qingni Shen, Jia Qin, Dong Yang, Yahui Yang, Zhonghai Wu:
S-Storm: A Slot-Aware Scheduling Strategy for Even Scheduler in Storm. HPCC/SmartCity/DSS 2016: 623-630 - [c20]Chuntao Dong, Qingni Shen, Lijing Cheng, Yahui Yang, Zhonghai Wu:
SECapacity: A Secure Capacity Scheduler in YARN. ICICS 2016: 184-194 - [c19]Wenting Li, Qingni Shen, Chuntao Dong, Yahui Yang, Zhonghai Wu:
DDHCS: Distributed Denial-of-service Threat to YARN Clusters based on Health Check Service. ICISSP 2016: 146-156 - [c18]Wenting Li, Qingni Shen, Chuntao Dong, Yahui Yang, Zhonghai Wu:
SEYARN: Enhancing Security of YARN Clusters Based on Health Check Service. ICISSP (Revised Selected Papers) 2016: 148-168 - [c17]Cong Li, Qingni Shen, Kang Chen, Yahui Yang, Zhonghai Wu:
Whispers in the Cloud - A Covert Channel using the Result of Creating a Virtual Machine. ICISSP 2016: 380-387 - [c16]Kang Chen, Qingni Shen, Cong Li, Yang Luo, Yahui Yang, Zhonghai Wu:
Sift - An Efficient Method for Co-residency Detection on Amazon EC2. ICISSP 2016: 423-431 - 2015
- [c15]Chang Guo, Qingni Shen, Yahui Yang, Zhonghai Wu:
User Rank: A User Influence-Based Data Distribution Optimization Method for Privacy Protection in Cloud Storage System. COMPSAC Workshops 2015: 104-109 - [c14]Zizhou Sun, Yahui Yang, Qingni Shen, Zhonghai Wu, Xiaochen Li:
MB-DDIVR: A Map-Based Dynamic Data Integrity Verification and Recovery Scheme in Cloud Storage. ICICS 2015: 335-345 - [c13]Chuntao Dong, Qingni Shen, Wenting Li, Yahui Yang, Zhonghai Wu, Xiang Wan:
Eavesdropper: A Framework for Detecting the Location of the Processed Result in Hadoop. ICICS 2015: 458-466 - [c12]Yuejian Fang, Zilong Wen, Qingni Shen, Yahui Yang, Zhonghai Wu:
POSTER: Ciphertext-Policy Attribute-Based Encryption Method with Secure Decryption Key Generation and Outsourcing Decryption of ABE Ciphertexts. SecureComm 2015: 585-589 - 2013
- [j1]Qingni Shen, Yahui Yang, Zhonghai Wu, Dandan Wang, Min Long:
Securing data services: a security architecture design for private storage cloud based on HDFS. Int. J. Grid Util. Comput. 4(4): 242-254 (2013) - 2012
- [c11]Qingni Shen, Yahui Yang, Zhonghai Wu, Xin Yang, Lizhe Zhang, Xi Yu, Zhenming Lao, Dandan Wang, Min Long:
SAPSC: Security Architecture of Private Storage Cloud Based on HDFS. AINA Workshops 2012: 1292-1297 - 2011
- [c10]Qingni Shen, Xin Yang, Xi Yu, Pengfei Sun, Yahui Yang, Zhonghai Wu:
Towards Data Isolation & Collaboration in Storage Cloud. APSCC 2011: 139-146 - [c9]Qingni Shen, Lizhe Zhang, Xin Yang, Yahui Yang, Zhonghai Wu, Ying Zhang:
SecDM: Securing Data Migration between Cloud Storage Systems. DASC 2011: 636-641 - [c8]Xin Yang, Qingni Shen, Yahui Yang, Sihan Qing:
A Way of Key Management in Cloud Storage Based on Trusted Computing. NPC 2011: 135-145
2000 – 2009
- 2009
- [c7]Dianbo Jiang, Yahui Yang, Min Xia:
Research on Intrusion Detection Based on an Improved SOM Neural Network. IAS 2009: 400-403 - [c6]Yahui Yang, Yunfei Chen, Min Xia, Juan Ma:
An Automated Mechanism of Security Test on Network Protocols. IAS 2009: 503-506 - [c5]Anbang Ruan, Qingni Shen, Liang Gu, Li Wang, Lei Shi, Yahui Yang, Zhong Chen:
Trusted Isolation Environment: An Attestation Architecture with Usage Control Model. ICICS 2009: 226-240 - [c4]Hongfang Jing, Bin Wang, Yahui Yang, Yan Xu:
A General Framework of Feature Selection for Text Categorization. MLDM 2009: 647-662 - [c3]Chen Shen, Jun Jiao, Bin Wang, Yahui Yang:
Multi-Instance Multi-Label Learning For Automatic Tag Recommendation. SMC 2009: 4910-4914 - [c2]Chen Shen, Bin Wang, Yahui Yang:
Exploiting Text Content in Image Search by Semi-supervised Learning Techniques. SMC 2009: 5063-5057 - 2008
- [c1]Ke Xu, Yahui Yang, Tao Chen:
Improving BitTorrent Network's Performance via Deploying Helpers. EUC (2) 2008: 507-512
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-28 20:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint