Search Results - "Guo, Yunchuan"
-
1
Real-Time Detection Method for Small Traffic Signs Based on Yolov3
Published in IEEE access (2020)“…It is very challenging to detect traffic signs using a high-precision real-time approach in realistic scenes with respect to driver-assistance systems for…”
Get full text
Journal Article -
2
Demonstration of a Flexible Graphene-Based Biosensor for Sensitive and Rapid Detection of Ovarian Cancer Cells
Published in Nanoscale research letters (23-12-2021)“…It is significant to develop an efficient early detection and prediction method for ovarian cancer via a facile and low-cost approach. To address such issues,…”
Get full text
Journal Article -
3
A Stackelberg Security Game for Adversarial Outbreak Detection in the Internet of Things
Published in Sensors (Basel, Switzerland) (01-02-2020)“…With limited computing resources and a lack of physical lines of defense, the Internet of Things (IoT) has become a focus of cyberattacks. In recent years,…”
Get full text
Journal Article -
4
Graphene-Based Biosensors with High Sensitivity for Detection of Ovarian Cancer Cells
Published in Molecules (Basel, Switzerland) (30-11-2021)“…Ovarian cancer has the highest mortality rate in the world. Therefore, it is urgent but still challenging to develop an efficient circulating tumor cell (CTC)…”
Get full text
Journal Article -
5
Modeling of 3-D Vertical Interconnect Using Support Vector Machine Regression
Published in IEEE microwave and wireless components letters (01-12-2006)“…In this letter, the support vector machine (SVM) regression approach is introduced to model the three-dimensional (3-D) high density microwave packaging…”
Get full text
Journal Article -
6
High-Temperature-Annealed Flexible Carbon Nanotube Network Transistors for High-Frequency Wearable Wireless Electronics
Published in ACS applied materials & interfaces (10-06-2020)“…Semiconducting single-walled carbon nanotubes (SWNTs) are potential active materials for fast-growing flexible/wearable applications with low-power…”
Get full text
Journal Article -
7
Detecting conflict of heterogeneous access control policies
Published in Digital communications and networks (01-10-2022)“…Policy conflicts may cause substantial economic losses. Although a large amount of effort has been spent on detecting intra-domain policy conflict, it can not…”
Get full text
Journal Article -
8
Hierarchically defining Internet of Things security: From CIA to CACA
Published in International journal of distributed sensor networks (01-01-2020)“…With the rapid development of Internet of Things technology (e.g. wireless sensor networks), security has become a global issue. Confidentiality, integrity,…”
Get full text
Journal Article -
9
Combination Model of Heterogeneous Data for Security Measurement
Published in Journal of universal computer science (2019)“…Measuring security is a core step for guaranteeing security of network and information systems. Due to massiveness and heterogeneity of measurement data, it is…”
Get full text
Journal Article -
10
SRIM Scheme: An Impression-Management Scheme for Privacy-Aware Photo-Sharing Users
Published in Engineering (Beijing, China) (01-02-2018)“…With the development of online social networks (OSNs) and modern smartphones, sharing photos with friends has become one of the most popular social activities…”
Get full text
Journal Article -
11
Efficient modeling of novel uniplanar left-handed metamaterials
Published in IEEE transactions on microwave theory and techniques (01-04-2005)“…This paper presents an efficient modeling technique for the derivation of the dispersion characteristics of novel uniplanar metallodielectric periodic…”
Get full text
Journal Article -
12
Spatiotemporal Access Model Based on Reputation for the Sensing Layer of the IoT
Published in TheScientificWorld (01-01-2014)“…Access control is a key technology in providing security in the Internet of Things (IoT). The mainstream security approach proposed for the sensing layer of…”
Get full text
Journal Article -
13
Cyber Attacks Prediction Model Based on Bayesian Network
Published in 2012 IEEE 18th International Conference on Parallel and Distributed Systems (01-12-2012)“…Cyber attacks prediction is an important part of risk management. Existing cyber attacks prediction methods did not fully consider the specific environment…”
Get full text
Conference Proceeding -
14
Support Vector Regression for Measuring Electromagnetic Parameters of Magnetic Thin-Film Materials
Published in IEEE transactions on magnetics (01-12-2007)“…We propose a novel method for extracting the electromagnetic parameters (complex permittivity and permeability) of magnetic thin-film materials. The method…”
Get full text
Journal Article -
15
Utility-based cooperative decision in cooperative authentication
Published in IEEE INFOCOM 2014 - IEEE Conference on Computer Communications (01-04-2014)“…In mobile networks, cooperative authentication is an efficient way to recognize false identities and messages. However, an attacker can track the location of…”
Get full text
Conference Proceeding -
16
Information content security on the Internet: the control model and its evaluation
Published in Science China. Information sciences (01-01-2010)“…Flooding of harmful information on the Internet seriously endangers the physiological and mental health of teenagers. Due to the user-friendliness of the…”
Get full text
Journal Article -
17
Automatically verifying STRAC policy
Published in 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) (01-04-2014)“…In the IoT (Internet of Things), inconsistent ACP (Access Control Policies) would cause disastrous consequences, for example, fire disasters and failures of…”
Get full text
Conference Proceeding -
18
Analyzing asking/bidding price in dynamic game for cooperative authentication
Published in 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) (01-04-2014)“…With the problem that the non-cooperation of selfish nodes causes by location privacy leakage and resource consumption, some researchers proposed a…”
Get full text
Conference Proceeding -
19
A Ka-band equal-branch waveguide power divider
Published in Microwave and optical technology letters (01-11-2007)“…A Ka‐band equal‐branch waveguide power divider is proposed in this letter. This waveguide power divider has the uniform main guide and all the branches in same…”
Get full text
Journal Article -
20
Cache of cryptographic key based on query popularity
Published in 网络与信息安全学报 (01-02-2023)“…In the current HDFS (Hadoop Distributed File System) key management system, the encryption zone keys are all loaded into the memory during startup of key…”
Get full text
Journal Article