default search action
Yinan Yao
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j3]Chen Dong, Xiaodong Guo, Sihuang Lian, Yinan Yao, Zhenyi Chen, Yang Yang, Zhanghui Liu:
Harnessing the advances of MEDA to optimize multi-PUF for enhancing IP security of biochips. J. King Saud Univ. Comput. Inf. Sci. 36(3): 101996 (2024) - [c8]Yulong Li, Wenxin Li, Yinan Yao, Yuxuan Du, Keqiu Li:
Host-driven In-Network Aggregation on RDMA. INFOCOM 2024: 1051-1060 - 2023
- [j2]Yinan Yao, Decheng Qiu, Huangda Liu, Zhongliao Yang, Ximeng Liu, Yang Yang, Chen Dong:
A Reliable and Secure Mobile Cyber-Physical Digital Microfluidic Biochip for Intelligent Healthcare. IEEE Access 11: 137990-137998 (2023) - [j1]Chen Dong, Yinan Yao, Yi Xu, Ximeng Liu, Yan Wang, Hao Zhang, Li Xu:
A Cost-Driven Method for Deep-Learning-Based Hardware Trojan Detection. Sensors 23(12): 5503 (2023) - [c7]Yinan Yao, Decheng Qiu, Bolun Li, Chen Dong, Li Xu, Xiaodong Guo, Changping Lai:
IoT-enabled Low Communication Cost Sentiment Analysis Architecture for Intelligent Healthcare. DASC/PiCom/CBDCom/CyberSciTech 2023: 367-374 - [c6]Yaojie Ke, Yinan Yao, Zhengye Xie, Hepeng Xie, Hui Lin, Chen Dong:
Empowering Intelligent Home Safety: Indoor Family Fall Detection with YOLOv5. DASC/PiCom/CBDCom/CyberSciTech 2023: 942-949 - [c5]Chenxi Lyu, Yinan Yao, Xiaodong Guo, Zihong Huang, Chen Dong, Yuanyuan Zhang, Zhenyi Chen:
AntiMal: an Approach of Malware Detection Employing Swin Transformer. ICCNS 2023: 1-5 - [c4]Zhongliao Yang, Yinan Yao, Xiaodong Guo, Peixin Huang, Jiayin Li, Yuzhong Chen, Xintian Liang:
A Module Placement Method for Digital Microfluidic Biochips Based on Security Design. ICCNS 2023: 40-45 - [c3]Yinan Yao, Chen Dong, Zhengye Xie, Yuqing Li, Xiaodong Guo, Yang Yang, Xiaoding Wang:
A Deep Learning Approach for Hardware Trojan Detection Based on Ensemble Learning. ICCNS 2023: 69-76 - [c2]Changping Lai, Yinan Yao, Yuzhong Chen, Xintian Liang, Tianqi Cai, Yiqing Shi:
Detection of IoT Botnet Based on Convolutional Neural Network and Linear Support Vector Machine. ICCNS 2023: 222-226 - [c1]Zeyi Liu, Xiaodong Guo, Yinan Yao, Yuzhong Chen, Xin Yang, Jiayin Li:
Nonstationary Network Traffic Prediction With RevIN-based LSTM. ICCNS 2023: 265-269
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-20 20:59 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint