Search Results - "Guo, Yunchuan"

Refine Results
  1. 1

    Real-Time Detection Method for Small Traffic Signs Based on Yolov3 by Zhang, Huibing, Qin, Longfei, Li, Jun, Guo, Yunchuan, Zhou, Ya, Zhang, Jingwei, Xu, Zhi

    Published in IEEE access (2020)
    “…It is very challenging to detect traffic signs using a high-precision real-time approach in realistic scenes with respect to driver-assistance systems for…”
    Get full text
    Journal Article
  2. 2

    Demonstration of a Flexible Graphene-Based Biosensor for Sensitive and Rapid Detection of Ovarian Cancer Cells by Han, Ling, Wan, Qi, Zheng, Ai, Guo, Yunchuan, Chen, Yali

    Published in Nanoscale research letters (23-12-2021)
    “…It is significant to develop an efficient early detection and prediction method for ovarian cancer via a facile and low-cost approach. To address such issues,…”
    Get full text
    Journal Article
  3. 3

    A Stackelberg Security Game for Adversarial Outbreak Detection in the Internet of Things by Chen, Lili, Wang, Zhen, Li, Fenghua, Guo, Yunchuan, Geng, Kui

    Published in Sensors (Basel, Switzerland) (01-02-2020)
    “…With limited computing resources and a lack of physical lines of defense, the Internet of Things (IoT) has become a focus of cyberattacks. In recent years,…”
    Get full text
    Journal Article
  4. 4

    Graphene-Based Biosensors with High Sensitivity for Detection of Ovarian Cancer Cells by Wan, Qi, Han, Ling, Guo, Yunchuan, Yu, Huijun, Tan, Li, Zheng, Ai, Chen, Yali

    Published in Molecules (Basel, Switzerland) (30-11-2021)
    “…Ovarian cancer has the highest mortality rate in the world. Therefore, it is urgent but still challenging to develop an efficient circulating tumor cell (CTC)…”
    Get full text
    Journal Article
  5. 5

    Modeling of 3-D Vertical Interconnect Using Support Vector Machine Regression by Xia, Lei, Meng, Jicheng, Xu, Ruimin, Yan, Bo, Guo, Yunchuan

    “…In this letter, the support vector machine (SVM) regression approach is introduced to model the three-dimensional (3-D) high density microwave packaging…”
    Get full text
    Journal Article
  6. 6

    High-Temperature-Annealed Flexible Carbon Nanotube Network Transistors for High-Frequency Wearable Wireless Electronics by Lan, Yu, Yang, Yang, Wang, Yan, Wu, Yun, Cao, Zhengyi, Huo, Shuai, Jiang, Lihong, Guo, Yunchuan, Wu, Yunqiu, Yan, Bo, Xu, Ruimin, Chen, Yuanfu, Li, Yanrong, Lal, Shalini, Ma, Zhenqiang, Xu, Yuehang

    Published in ACS applied materials & interfaces (10-06-2020)
    “…Semiconducting single-walled carbon nanotubes (SWNTs) are potential active materials for fast-growing flexible/wearable applications with low-power…”
    Get full text
    Journal Article
  7. 7

    Detecting conflict of heterogeneous access control policies by Yu, Mingjie, Li, Fenghua, Yu, Nenghai, Wang, Xiao, Guo, Yunchuan

    Published in Digital communications and networks (01-10-2022)
    “…Policy conflicts may cause substantial economic losses. Although a large amount of effort has been spent on detecting intra-domain policy conflict, it can not…”
    Get full text
    Journal Article
  8. 8

    Hierarchically defining Internet of Things security: From CIA to CACA by Yin, Lihua, Fang, Binxing, Guo, Yunchuan, Sun, Zhe, Tian, Zhihong

    “…With the rapid development of Internet of Things technology (e.g. wireless sensor networks), security has become a global issue. Confidentiality, integrity,…”
    Get full text
    Journal Article
  9. 9

    Combination Model of Heterogeneous Data for Security Measurement by Xiuze Dong, Yunchuan Guo, Fenghua Li, Liju Dong, Arshad Khan

    “…Measuring security is a core step for guaranteeing security of network and information systems. Due to massiveness and heterogeneity of measurement data, it is…”
    Get full text
    Journal Article
  10. 10

    SRIM Scheme: An Impression-Management Scheme for Privacy-Aware Photo-Sharing Users by Li, Fenghua, Sun, Zhe, Niu, Ben, Guo, Yunchuan, Liu, Ziwen

    Published in Engineering (Beijing, China) (01-02-2018)
    “…With the development of online social networks (OSNs) and modern smartphones, sharing photos with friends has become one of the most popular social activities…”
    Get full text
    Journal Article
  11. 11

    Efficient modeling of novel uniplanar left-handed metamaterials by Yunchuan Guo, Goussetis, G., Feresidis, A.P., Vardaxoglou, J.C.

    “…This paper presents an efficient modeling technique for the derivation of the dispersion characteristics of novel uniplanar metallodielectric periodic…”
    Get full text
    Journal Article
  12. 12

    Spatiotemporal Access Model Based on Reputation for the Sensing Layer of the IoT by Qian, Junyan, Li, Chao, Yin, Lihua, Guo, Yunchuan

    Published in TheScientificWorld (01-01-2014)
    “…Access control is a key technology in providing security in the Internet of Things (IoT). The mainstream security approach proposed for the sensing layer of…”
    Get full text
    Journal Article
  13. 13

    Cyber Attacks Prediction Model Based on Bayesian Network by Jinyu Wu, Lihua Yin, Yunchuan Guo

    “…Cyber attacks prediction is an important part of risk management. Existing cyber attacks prediction methods did not fully consider the specific environment…”
    Get full text
    Conference Proceeding
  14. 14

    Support Vector Regression for Measuring Electromagnetic Parameters of Magnetic Thin-Film Materials by Yunqiu Wu, Yunqiu Wu, Zongxi Tang, Zongxi Tang, Yuehang Xu, Yuehang Xu, Yunchuan Guo, Yunchuan Guo, Biao Zhang, Biao Zhang

    Published in IEEE transactions on magnetics (01-12-2007)
    “…We propose a novel method for extracting the electromagnetic parameters (complex permittivity and permeability) of magnetic thin-film materials. The method…”
    Get full text
    Journal Article
  15. 15

    Utility-based cooperative decision in cooperative authentication by Guo Yunchuan, Yin Lihua, Liu Licai, Fang Binxing

    “…In mobile networks, cooperative authentication is an efficient way to recognize false identities and messages. However, an attacker can track the location of…”
    Get full text
    Conference Proceeding
  16. 16

    Information content security on the Internet: the control model and its evaluation by Fang, BinXing, Guo, YunChuan, Zhou, Yuan

    Published in Science China. Information sciences (01-01-2010)
    “…Flooding of harmful information on the Internet seriously endangers the physiological and mental health of teenagers. Due to the user-friendliness of the…”
    Get full text
    Journal Article
  17. 17

    Automatically verifying STRAC policy by Guo Yunchuan, Yin Lihua, Li Chao

    “…In the IoT (Internet of Things), inconsistent ACP (Access Control Policies) would cause disastrous consequences, for example, fire disasters and failures of…”
    Get full text
    Conference Proceeding
  18. 18

    Analyzing asking/bidding price in dynamic game for cooperative authentication by Liu Licai, Guo Yunchuan, Yin Lihua

    “…With the problem that the non-cooperation of selfish nodes causes by location privacy leakage and resource consumption, some researchers proposed a…”
    Get full text
    Conference Proceeding
  19. 19

    A Ka-band equal-branch waveguide power divider by Guo, Yunchuan, Xu, Yuehang, Xu, Ruimin

    Published in Microwave and optical technology letters (01-11-2007)
    “…A Ka‐band equal‐branch waveguide power divider is proposed in this letter. This waveguide power divider has the uniform main guide and all the branches in same…”
    Get full text
    Journal Article
  20. 20

    Cache of cryptographic key based on query popularity by Wei JIN, Fenghua LI, Ziyan ZHOU, Xiyang SUN, Yunchuan GUO

    Published in 网络与信息安全学报 (01-02-2023)
    “…In the current HDFS (Hadoop Distributed File System) key management system, the encryption zone keys are all loaded into the memory during startup of key…”
    Get full text
    Journal Article