default search action
Ji-yao An
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j24]Hongfang Gong, Renfa Li, Jiyao An, Guoqi Xie:
Reliability Modeling and Assessment for a Cyber-Physical System With a Complex Boundary Behavior. IEEE Trans. Reliab. 72(1): 224-239 (2023) - 2022
- [j23]Jiyao An, Wei Liu, Qingqin Liu, Liang Guo, Ping Ren, Tao Li:
DGInet: Dynamic graph and interaction-aware convolutional network for vehicle trajectory prediction. Neural Networks 151: 336-348 (2022) - [j22]Hao Li, Kenli Li, Jiyao An, Keqin Li:
An Online and Scalable Model for Generalized Sparse Nonnegative Matrix Factorization in Industrial Applications on Multi-GPU. IEEE Trans. Ind. Informatics 18(1): 437-447 (2022) - 2021
- [j21]Jiyao An, Liang Guo, Wei Liu, Zhiqiang Fu, Ping Ren, Xinzhi Liu, Tao Li:
IGAGCN: Information geometry and attention-based spatiotemporal graph convolutional networks for traffic flow prediction. Neural Networks 143: 355-367 (2021) - [j20]Jing Huang, Renfa Li, Jiyao An, Haibo Zeng, Wanli Chang:
A DVFS-Weakly Dependent Energy-Efficient Scheduling Approach for Deadline-Constrained Parallel Applications on Heterogeneous Systems. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 40(12): 2481-2494 (2021) - [j19]Jing Huang, Renfa Li, Yehua Wei, Jiyao An, Wanli Chang:
Bi-Directional Timing-Power Optimisation on Heterogeneous Multi-Core Architectures. IEEE Trans. Sustain. Comput. 6(4): 572-585 (2021) - 2020
- [j18]Wufei Wu, Renfa Li, Guoqi Xie, Jiyao An, Yang Bai, Jia Zhou, Keqin Li:
A Survey of Intrusion Detection for In-Vehicle Networks. IEEE Trans. Intell. Transp. Syst. 21(3): 919-933 (2020) - [j17]Hongfang Gong, Renfa Li, Jiyao An, Yang Bai, Keqin Li:
Quantitative Modeling and Analytical Calculation of Anelasticity for a Cyber-Physical System. IEEE Trans. Syst. Man Cybern. Syst. 50(11): 4746-4761 (2020)
2010 – 2019
- 2019
- [j16]Jiyao An, Meng Hu, Li Fu, Jiawei Zhan:
A Novel Fuzzy Approach for Combining Uncertain Conflict Evidences in the Dempster-Shafer Theory. IEEE Access 7: 7481-7501 (2019) - [j15]Jiyao An, Li Fu, Meng Hu, Weihong Chen, Jiawei Zhan:
A Novel Fuzzy-Based Convolutional Neural Network Method to Traffic Flow Prediction With Uncertain Traffic Accident Information. IEEE Access 7: 20708-20722 (2019) - [j14]Weihong Chen, Jiyao An, Renfa Li, Guoqi Xie:
Tensor-Train Fuzzy Deep Computation Model for Citywide Traffic Flow Prediction. IEEE Access 7: 120581-120593 (2019) - [j13]Jiyao An, Yingjun Yu, Jie Tang, Jiawei Zhan:
Fuzzy-Based Hybrid Location Algorithm for Vehicle Position in VANETs via Fuzzy Kalman Filtering Approach. Adv. Fuzzy Syst. 2019: 5142937:1-5142937:11 (2019) - [j12]Hao Li, Keqin Li, Jiyao An, Weihua Zheng, Kenli Li:
An efficient manifold regularized sparse non-negative matrix factorization model for large-scale recommender systems on GPUs. Inf. Sci. 496: 464-484 (2019) - [j11]Jing Huang, Yan Liu, Renfa Li, Keqin Li, Jiyao An, Yang Bai, Fan Yang, Guoqi Xie:
Optimal power allocation and load balancing for non-dedicated heterogeneous distributed embedded computing systems. J. Parallel Distributed Comput. 130: 24-36 (2019) - [j10]Guoqi Xie, Gang Zeng, Jiyao An, Renfa Li, Keqin Li:
Resource-Cost-Aware Fault-Tolerant Design Methodology for End-to-End Functional Safety Computation on Automotive Cyber-Physical Systems. ACM Trans. Cyber Phys. Syst. 3(1): 4:1-4:27 (2019) - 2018
- [j9]Weihong Chen, Ji-yao An, Renfa Li, Li Fu, Guoqi Xie, Md. Zakirul Alam Bhuiyan, Keqin Li:
A novel fuzzy deep-learning approach to traffic flow prediction with uncertain spatial-temporal data features. Future Gener. Comput. Syst. 89: 78-88 (2018) - [j8]Hongfang Gong, Renfa Li, Yang Bai, Ji-yao An, Keqin Li:
Message response time analysis for automotive cyber-physicalsystems with uncertain delay: An M/PH/1 queue approach. Perform. Evaluation 125: 21-47 (2018) - [j7]Hao Li, Kenli Li, Ji-yao An, Keqin Li:
MSGD: A Novel Matrix Factorization Approach for Large-Scale Collaborative Filtering Recommender Systems on GPUs. IEEE Trans. Parallel Distributed Syst. 29(7): 1530-1544 (2018) - [c6]Hao Li, Kenli Li, Ji-yao An, Keqin Li:
CUSNTF: A Scalable Sparse Non-negative Tensor Factorization Model for Large-scale Industrial Applications on Multi-GPU. CIKM 2018: 1113-1122 - [c5]Jiyao An, Qianying Chen, Ming Chen, Zicheng Li:
A Novel Stability Criterion for a Class of Networked Control Systems Using Some Integral Inequalities. ISIE 2018: 579-584 - 2017
- [j6]Jing Huang, Renfa Li, Ji-yao An, Derrick Ntalasha, Fan Yang, Keqin Li:
Energy-Efficient Resource Utilization for Heterogeneous Embedded Computing Systems. IEEE Trans. Computers 66(9): 1518-1531 (2017) - [j5]Hongfang Gong, Renfa Li, Ji-yao An, Weiwei Chen, Keqin Li:
Scheduling Algorithms of Flat Semi-Dormant Multicontrollers for a Cyber-Physical System. IEEE Trans. Ind. Informatics 13(4): 1665-1680 (2017) - 2015
- [j4]Mengmeng Ma, Ji-yao An:
Combination of Evidence with Different Weighting Factors: A Novel Probabilistic-Based Dissimilarity Measure Approach. J. Sensors 2015: 509385:1-509385:9 (2015) - [c4]Ji-yao An, Weihong Chen, Guilin Wen:
Improved delay-fractional-dependent stability criteria for systems with nonlinear perturbations. CCA 2015: 563-568 - 2011
- [j3]Ji-yao An, Guilin Wen:
Improved stability criteria for time-varying delayed T-S fuzzy systems via delay partitioning approach. Fuzzy Sets Syst. 185(1): 83-94 (2011) - [j2]Ji-yao An, Guilin Wen, Nianfei Gan, Renfa Li:
A delay-derivative-dependent approach to robust H∞ filter design for uncertain systems with time-varying distributed delays. J. Frankl. Inst. 348(2): 179-200 (2011) - [j1]Ji-yao An, Guilin Wen, Chong Lin, Renfa Li:
New Results on a Delay-Derivative-Dependent Fuzzy H ∞ Filter Design for T-S Fuzzy Systems. IEEE Trans. Fuzzy Syst. 19(4): 770-779 (2011)
2000 – 2009
- 2007
- [c3]Ji-yao An, Ronghui Wu, Renfa Li, Cheng Xu:
An Intrusion Alarm System Based on Fuzzy Reasoning Machine. IITA 2007: 165-168 - 2006
- [c2]Ji-yao An, Guangxue Yue, Fei Yu, Renfa Li:
Intrusion Detection Based on Fuzzy Neural Networks. ISNN (2) 2006: 231-239 - [c1]Guangxue Yue, Fei Yu, Yi-jun Chen, Ronghui Wu, Ji-yao An, Renfa Li:
Access Control Model for P2P File-Sharing Systems Based on Trust and Recommendation. SKG 2006: 74
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:54 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint