default search action
Lili Yang 0001
Person information
- affiliation: Southern University of Science and Technology, Department of Statistics and Data Science, Shenzhen, China
- affiliation: Loughborough University, School of Business & Economics, Loughborough, UK
- affiliation (PhD 2004): University of Derby, Business School, Derby, UK
Other persons with the same name
- Lili Yang — disambiguation page
- Lili Yang 0002 — South China University of Technology, School of Electronic and Information Engineering, Guangzhou, China
- Lili Yang 0003 — Zhejiang University School of Medicine, Department of Genetics and Metabolism, Hangzhou, China
- Lili Yang 0004 — Jilin University, College of Computer Science and Technology, Key Laboratory of Symbol Computation and Knowledge Engineering, Changchun, China (and 1 more)
- Lili Yang 0005 — Lanzhou University, College of Atmospheric Sciences, Key Laboratory for Semi-Arid Climate Change, Lanzhou, China (and 1 more)
- Lili Yang 0006 — Jilin University, College of Transportation, Changchun, China
- Lili Yang 0007 — Nanjing University of Science and Technology, School of Electronic and Optical Engineering, Nanjing, China
- Lili Yang 0008 — Chinese Academy of Sciences, Institute of Electronics, State Key Laboratory of Transducer Technology, Beijing, China (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j22]Yuehua Gan, Qianqian Wang, Zhejun Huang, Lili Yang:
Attention-based causal representation learning for out-of-distribution recommendation. Appl. Intell. 54(24): 12964-12978 (2024) - [j21]Wenyuan Jia, Shu Chen, Lili Yang, Guomin Liu, Chiyu Li, Zhiqiang Cheng, Guoyin Wang, Xiaoyu Yang:
Ankylosing spondylitis prediction using fuzzy K-nearest neighbor classifier assisted by modified JAYA optimizer. Comput. Biol. Medicine 175: 108440 (2024) - [j20]Yuanyuan Feng, Yi Cao, Shuanghua Yang, Lili Yang, Tangjian Wei:
An approximation algorithm for bus evacuation problem. Neurocomputing 574: 127252 (2024) - [j19]Youmin Zhang, William K. Cheung, Qun Liu, Guoyin Wang, Lili Yang, Li Liu:
Towards explaining graph neural networks via preserving prediction ranking and structural dependency. Inf. Process. Manag. 61(2): 103571 (2024) - [c27]Rongping Huang, Wenwu Gong, Jiaxin Lu, Zhejun Huang, Lili Yang:
BACP: Bayesian Augmented CP Factorization for Traffic Data Imputation. ICIC (13) 2024: 108-120 - [c26]Jiaxin Lu, Wenwu Gong, Lili Yang:
Low-Rank Autoregressive Tucker Decomposition for Traffic Data Imputation. ICAC 2024: 1-6 - 2023
- [j18]Mingyi Wei, Zhejun Huang, Diping Yuan, Lili Yang:
Predicting ICU Mortality Based on Generative Adversarial Nets and Ensemble Methods. IEEE Access 11: 76403-76414 (2023) - [j17]Yuanyuan Feng, Yi Cao, Shuanghua Yang, Lili Yang, Tangjian Wei:
A two-step sub-optimal algorithm for bus evacuation planning. Oper. Res. 23(2): 36 (2023) - [c25]Zhejun Huang, Lili Yang, Wenfei Li:
A Comparison of the Effects of One-Step Integration Methods on Nonlinear MPC-Based Controllers for Trajectory Tracking. ICAC 2023: 1-6 - [c24]Wenwu Gong, Zhejun Huang, Lili Yang:
LSPTD: Low-Rank and Spatiotemporal Priors Enhanced Tucker Decomposition for Internet Traffic Data Imputation. ITSC 2023: 460-465 - [i1]Wenwu Gong, Zhejun Huang, Lili Yang:
Manifold Regularized Tucker Decomposition Approach for Spatiotemporal Traffic Data Imputation. CoRR abs/2305.06563 (2023) - 2021
- [j16]Thomas J. Huggins, Lili Yang, Jin Zhang, Marion Lara Tan, Raj Prasanna:
Psychological Effects of Dominant Responses to Early Warning Alerts. Int. J. Ambient Comput. Intell. 12(3): 1-15 (2021) - [j15]Zhiru Wang, Min Wang, Ruyu He, Ran S. Bhamra, Lili Yang:
Gray relational analysis based assessment of escalator accident risk in subway stations. J. Intell. Fuzzy Syst. 41(3): 4619-4628 (2021) - [j14]Shimin Hu, Simon Fong, Lili Yang, Shuang-Hua Yang, Nilanjan Dey, Richard C. Millham, Jinan Fiaidhi:
Fast and Accurate Terrain Image Classification for ASTER Remote Sensing by Data Stream Mining and Evolutionary-EAC Instance-Learning-Based Algorithm. Remote. Sens. 13(6): 1123 (2021) - [c23]Keyang Wang, Yiping Zeng, Fanyu Meng, Feiyu, Lili Yang:
Comparison between Calculation Methods for Semantic Text Similarity based on Siamese Networks. DSIT 2021: 389-395 - 2020
- [j13]Nebrase Elmrabit, Shuang-Hua Yang, Lili Yang, Huiyu Zhou:
Insider Threat Risk Prediction based on Bayesian Network. Comput. Secur. 96: 101908 (2020)
2010 – 2019
- 2018
- [c22]Tengyue Li, Simon Fong, Lili Yang:
Counting Passengers in Public Buses by Sensing Carbon Dioxide Concentration: Data Collection and Machine Learning. BDIOT 2018: 43-48 - 2017
- [j12]Raj Prasanna, Lili Yang, Malcolm King, Thomas J. Huggins:
Information systems architecture for fire emergency response. J. Enterp. Inf. Manag. 30(4): 605-624 (2017) - [c21]Yixing Shan, Linda Plotnick, Starr Roxanne Hiltz, Lili Yang:
A Comparison of Emergency Management Social Media Use in the United States and England. AMCIS 2017 - [c20]Murray Turoff, Víctor Amadeo Bañuls Silvera, Lili Yang:
A Review of Qualitative Comments on a Proposed Master's Degree in Emergency Management. HICSS 2017: 1-10 - 2016
- [j11]Shuang Huang, Chunjie Zhou, Lili Yang, Yuanqing Qin, Xiongfeng Huang, Bowen Hu:
Transient fault tolerant control for vehicle brake-by-wire systems. Reliab. Eng. Syst. Saf. 149: 148-163 (2016) - [c19]Kim Perren, Lili Yang, Jinjin He, Shuang-Hua Yang, Yixing Shan:
Incorporating persuasion into a decision support system: The case of the water user classification function. ICAC 2016: 429-434 - [c18]Linda Plotnick, Murray Turoff, Starr Roxanne Hiltz, Lili Yang, Victor A. Bañuls:
Curriculum Guidelines for Master's Level Programs in Information Systems for Emergency Management. ISCRAM 2016 - 2015
- [j10]Lili Yang, Raj Prasanna, Malcolm King:
GDIA: Eliciting information requirements in emergency first response. Requir. Eng. 20(4): 345-362 (2015) - [c17]Nebrase Elmrabit, Shuang-Hua Yang, Lili Yang:
Insider threats in information security categories and approaches. ICAC 2015: 1-6 - [c16]Lili Yang, Qun Liu, Shuang-Hua Yang, Dapeng Yu:
Evacuation Planning with Flood Inundation as Inputs. ISCRAM 2015 - [c15]Weiwei He, Shuang-Hua Yang, Lili Yang, Ping Li:
In-network data processing architecture for energy efficient wireless sensor networks. WF-IoT 2015: 299-304 - [c14]Shuang-Hua Yang, Xi Chen, Xiaomin Chen, Lili Yang, Baichong Chao, Jiangtao Cao:
A case study of internet of things: A wireless household water consumption monitoring system. WF-IoT 2015: 681-686 - 2014
- [c13]Yixing Shan, Lili Yang, Roy Kalawsky:
Exploring the prescriptive modeling of fire situation assessment. ISCRAM 2014 - 2013
- [c12]Ran Xu, Lili Yang, Shuang-Hua Yang:
Architecture Design of Internet of Things in Logistics Management for Emergency Response. GreenCom/iThings/CPScom 2013: 395-402 - [c11]Yanquan Zhou, Lili Yang, Bartel A. Van de Walle, Chong Han:
Classification of Microblogs for Support Emergency Responses: Case Study Yushu Earthquake in China. HICSS 2013: 1553-1562 - [c10]Weiwei He, Shuang-Hua Yang, Lili Yang:
NMCA: Neighbour-aware multi-path clustering aggregation in wireless sensor networks. ICNSC 2013: 798-803 - 2012
- [j9]Fachao Li, Ling Li, Chenxia Jin, Ruijiang Wang, Hong Wang, Lili Yang:
A 3PL supplier selection model based on fuzzy sets. Comput. Oper. Res. 39(8): 1879-1884 (2012) - [j8]WenAn Tan, Ling Li, Wei Xu, Fujun Yang, Chuanqun Jiang, Lili Yang, Jung Choi:
A role-oriented service system architecture for enterprise process collaboration. Comput. Oper. Res. 39(8): 1893-1900 (2012) - [j7]Lili Yang, Guofeng Su, Hongyong Yuan:
Design Principles of Integrated Information Platform for Emergency Responses: The Case of 2008 Beijing Olympic Games. Inf. Syst. Res. 23(3-1): 761-786 (2012) - 2011
- [j6]Huanjia Yang, Lili Yang, Shuang-Hua Yang:
Hybrid Zigbee RFID sensor network for humanitarian logistics centre management. J. Netw. Comput. Appl. 34(3): 938-948 (2011) - [c9]Raj Prasanna, Lili Yang, Malcolm King:
Evaluation of a software prototype for supporting fire emergency response. ISCRAM 2011 - 2010
- [c8]Yixing Shan, Lili Yang, Roy Kalawsky:
Exploration of Quantitative Assessment in Systems Architecture using Evidential Reasoning. IJCCI (ICEC) 2010: 146-152
2000 – 2009
- 2008
- [c7]Lili Yang, Malcolm King, Shuang-Hua Yang:
Integrating Technical Approaches, Organisational Issues, and Human Factors in Security Risk Assessment by Organising Security Related Questions. ICEIS (3-1) 2008: 311-315 - 2007
- [j5]Lili Yang, Bryan F. Jones, Shuang-Hua Yang:
A fuzzy multi-objective programming for optimization of fire station locations through genetic algorithms. Eur. J. Oper. Res. 181(2): 903-915 (2007) - [j4]Lili Yang, Shuang-Hua Yang:
A framework of security and safety checking for internet-based control systems. Int. J. Inf. Comput. Secur. 1(1/2): 185-200 (2007) - [j3]Lili Yang, Shuang-Hua Yang:
Multirate Control in Internet-Based Control Systems. IEEE Trans. Syst. Man Cybern. Part C 37(2): 185-192 (2007) - 2006
- [j2]Lili Yang, Bryan F. Jones, Shuang-Hua Yang:
Genetic algorithm based software integration with minimum software risk. Inf. Softw. Technol. 48(3): 133-141 (2006) - [c6]Lili Yang, Shuang-Hua Yang, Fang Yao:
Safety and Security of Remote Monitoring and Control of intelligent Home Environments. SMC 2006: 1149-1153 - [c5]Lili Yang:
Determining Sink Node Locations in Wireless Sensor Networks. SMC 2006: 3400-3404 - 2004
- [c4]Shuang-Hua Yang, X. Zuo, Lili Yang:
Control System Design for Internet-Enabled Arm Robots. IEA/AIE 2004: 663-672 - [c3]Lili Yang, Bryan F. Jones:
Assimilation Exchange Based Software Integration. IEA/AIE 2004: 1229-1238 - 2003
- [j1]Shuang-Hua Yang, X. Chen, Lili Yang:
Integration of control system design and implementation over the internet using the Jini technology. Softw. Pract. Exp. 33(12): 1151-1175 (2003) - [c2]Lili Yang, Michael Gell, Christian W. Dawson, Martin R. Brown:
Clustering Hoax Fire Calls Using Evolutionary Computation Technology. IEA/AIE 2003: 644-652 - 2002
- [c1]J. Hayes, Lili Yang, Michael Gell:
Engagement Profiling Across Advanced Trading Exchanges. ICWI 2002: 509-514
Coauthor Index
aka: Shuanghua Yang
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-28 20:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint