Search Results - "Yin, Yongfeng"

Refine Results
  1. 1

    Task Allocation of Multiple Unmanned Aerial Vehicles Based on Deep Transfer Reinforcement Learning by Yin, Yongfeng, Guo, Yang, Su, Qingran, Wang, Zhetao

    Published in Drones (Basel) (01-08-2022)
    “…With the development of UAV technology, the task allocation problem of multiple UAVs is remarkable, but most of these existing heuristic methods are easy to…”
    Get full text
    Journal Article
  2. 2

    Threat assessment of aerial targets based on improved GRA-TOPSIS method and three-way decisions by Yin, Yongfeng, Zhang, Routing, Su, Qingran

    “…Target threat assessment is a critical aspect of information warfare and can offer valuable auxiliary support to combat command decision-making. Aiming to…”
    Get full text
    Journal Article
  3. 3

    AF-SSD: An Accurate and Fast Single Shot Detector for High Spatial Remote Sensing Imagery by Yin, Ruihong, Zhao, Wei, Fan, Xudong, Yin, Yongfeng

    Published in Sensors (Basel, Switzerland) (15-11-2020)
    “…There are a large number of studies on geospatial object detection. However, many existing methods only focus on either accuracy or speed. Methods with both…”
    Get full text
    Journal Article
  4. 4

    Optimization of robustness of interdependent network controllability by redundant design by Zhang, Zenghu, Yin, Yongfeng, Zhang, Xin, Liu, Lijun

    Published in PloS one (13-02-2018)
    “…Controllability of complex networks has been a hot topic in recent years. Real networks regarded as interdependent networks are always coupled together by…”
    Get full text
    Journal Article
  5. 5

    Intelligent radar software defect classification approach based on the latent Dirichlet allocation topic model by Liu, Xi, Yin, Yongfeng, Li, Haifeng, Chen, Jiabin, Liu, Chang, Wang, Shengli, Yin, Rui

    “…Existing software intelligent defect classification approaches do not consider radar characters and prior statistics information. Thus, when applying these…”
    Get full text
    Journal Article
  6. 6

    Research on Drone Fault Detection Based on Failure Mode Databases by Hou, Defei, Su, Qingran, Song, Yi, Yin, Yongfeng

    Published in Drones (Basel) (01-08-2023)
    “…Drones are widely used in a number of key fields and are having a profound impact on all walks of life. Working out how to improve drone safety through fault…”
    Get full text
    Journal Article
  7. 7

    Redundant Design in Interdependent Networks by Liu, Lijun, Yin, Yongfeng, Zhang, Zenghu, Malaiya, Yashwant K

    Published in PloS one (20-10-2016)
    “…Modern infrastructure networks are often coupled together and thus could be modeled as interdependent networks. Overload and interdependent effect make…”
    Get full text
    Journal Article
  8. 8

    Effect Comparison of Both Iron Chelators on Outcomes, Iron Deposit, and Iron Transporters After Intracerebral Hemorrhage in Rats by Wang, Gaiqing, Hu, Weimin, Tang, Qingping, Wang, Li, Sun, Xin-gang, Chen, Yanli, Yin, Yongfeng, Xue, Fang, Sun, Zhitang

    Published in Molecular neurobiology (01-08-2016)
    “…Iron overload plays a key role in brain injury after intracerebral hemorrhage (ICH). We explored the roles of ferric iron chelator—deferiprone (DFP)—and…”
    Get full text
    Journal Article
  9. 9

    DeepOCL: A deep neural network for Object Constraint Language generation from unrestricted nature language by Yang, Yilong, Liu, Yibo, Bao, Tianshu, Wang, Weiru, Niu, Nan, Yin, Yongfeng

    “…Object Constraint Language (OCL) is one kind of lightweight formal specification, which is widely used for software verification and validation in NASA and…”
    Get full text
    Journal Article
  10. 10

    Generative adversarial networks based motion learning towards robotic calligraphy synthesis by Wang, Xiaoming, Yang, Yilong, Wang, Weiru, Zhou, Yuanhua, Yin, Yongfeng, Gong, Zhiguo

    “…Robot calligraphy visually reflects the motion capability of robotic manipulators. While traditional researches mainly focus on image generation and the…”
    Get full text
    Journal Article
  11. 11

    On the Secrecy for Relay-Aided SWIPT Internet of Things System With Cooperative Eavesdroppers by Song, Kang, Nie, Mengyun, Jiang, Jing, Li, Chunguo, Yin, Yongfeng

    Published in IEEE access (2021)
    “…In this paper, the secrecy performance in internet of things (IoTs) networks with cooperative eavesdroppers has been investigated, where simultaneous wireless…”
    Get full text
    Journal Article
  12. 12

    Outcome of multimodal MRI-guided intravenous thrombolysis in patients with stroke with unknown time of onset by Zhao, Jie, Zhao, Hongmei, Li, Runtao, Li, Jiangtao, Liu, Chang, Lv, Juan, Li, Yanan, Liu, Wei, Ma, Dongpu, Hao, Huaihai, Xiao, Xinguang, Liu, Junzhong, Yin, Yongfeng, Liu, Rongli, Yu, Qiaoyan, Wei, Yingjie, Li, Pengyan, Wang, Yue, Wang, Runqing

    Published in Stroke and vascular neurology (01-03-2019)
    “…ObjectiveIntravenous tissue plasminogen activator (tPA) is the standard therapy for patients with acute ischaemic stroke (AIS) within 4.5 hours of onset…”
    Get full text
    Journal Article
  13. 13

    Multi-tasking atrous convolutional neural network for machinery fault identification by Wang, Zining, Yin, Yongfeng, Yin, Rui

    “…As fault identification algorithms for rotating machinery based on deep learning are developing rapidly, convolutional neural networks (CNNs) have been…”
    Get full text
    Journal Article
  14. 14

    Cascading failure of interdependent networks with traffic: Using a redundancy design to protect influential nodes by Lijun Liu, Yongfeng Yin, Zenghu Zhang

    “…With the rapid development of technology, several infrastructure networks are often coupled together and thus need to be modeled as interdependent networks…”
    Get full text
    Conference Proceeding
  15. 15

    Adaptive Testing Based on Moment Estimation by Xiao, Peng, Yin, Yongfeng, Liu, Bin, Jiang, Bo, Malaiya, Yashwant K.

    “…Adaptive testing (AT) is a software testing approach that uses a feedback mechanism to enhance test effectiveness. Its testing strategy can be adjusted online…”
    Get full text
    Journal Article
  16. 16

    Game Theoretical Method for Anomaly-Based Intrusion Detection by Zhang, Miao, Yin, Yongfeng, Xu, Guoai, Xu, Shengwei, Wang, Zhiyong, Sun, Dawei

    “…In this paper, the game theoretical analysis method is presented to provide optimal strategies for anomaly-based intrusion detection systems (A-IDS). A…”
    Get full text
    Journal Article
  17. 17

    A Method of Test Case Automatic Generation for Embedded Software by Yongfeng Yin, Bin Liu

    “…At present, embedded software testing automation is a hot topic and the test case automatic generation is one of the key problems. In this paper, UML and…”
    Get full text
    Conference Proceeding
  18. 18

    A survey on the formal testing techniques for real-time embedded software by Yongfeng Yin, Bin Liu, Hongying Ni

    “…At present, real-time embedded software testing is a hot topic, and formal methods has become an important means in real-time embedded software modeling and…”
    Get full text
    Conference Proceeding
  19. 19

    Real-time Embedded Software Test Case Generation Based on Time-extended EFSM: A Case Study by Yongfeng Yin, Zhen Li, Bin Liu

    “…Software testing techniques based on formal methods can reduce the uncertainty, improve accuracy, validity and degree of automation. In this paper, formal…”
    Get full text
    Conference Proceeding
  20. 20

    Test Cases Generation for Embedded Real-Time Software Based on Extended UML by Yin Yongfeng, Liu Bin, Lu Minyan, Li Zhen

    “…Automated testing of embedded real-time software is a hotpot in nowadays software testing area. In this paper, the relations between unified modeling language…”
    Get full text
    Conference Proceeding