default search action
Chunyan Yang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j11]Shouzhen Zeng, Chunyan Yang:
Risk evaluation of livestream e-commerce platforms based on expert trust networks and CODAS. Expert Syst. Appl. 260: 125408 (2025) - 2024
- [j10]Yingpu Che, Yongzhe Gu, Dong Bai, Delin Li, Jindong Li, Chaosen Zhao, Qiang Wang, Hongmei Qiu, Wen Huang, Chunyan Yang, Qingsong Zhao, Like Liu, Xing Wang, Guangnan Xing, Guoyu Hu, Zhihui Shan, Ruizhen Wang, Ying-hui Li, Xiuliang Jin, Li-juan Qiu:
Accurately estimate soybean growth stages from UAV imagery by accounting for spatial heterogeneity and climate factors across multiple environments. Comput. Electron. Agric. 225: 109313 (2024) - [c30]Dongmei Bin, Ming Xie, Chunyan Yang, Yongjian Liang, Xin Li:
Research on Cross domain Mutual Trust Technology of Power Communication Network for Power System Informatization Construction. PEAI 2024: 230-234 - 2023
- [c29]Dongmei Bin, Xin Li, Chunyan Yang, Songming Han, Ying Ling:
Federated Learning-Based Intrusion Detection Method for Smart Grid. CACML 2023: 316-322 - [c28]Dongmei Bin, Chunyan Yang, Songming Han:
Application Design of Data Security Pool System Based on Network Security Data Link Technology. ICISE 2023: 419-423 - [c27]Xinyan Yin, Tao Sun, Chunyan Yang, Zihao Zhang, Xiang Zhang, Mengli Su:
Research on fake news detection method based on multi-level semantic enhancement. IJCNN 2023: 1-8 - [c26]Xiang Zhang, Tao Sun, Chunyan Yang, Zihao Zhang, Xinyan Yin, Mengli Su, Zhibang Quan, Jishu Wei:
Rumor Detection Based on Depth and Breadth with Tree-Structured Recursive Neural Networks. IJCNN 2023: 1-8 - [c25]Haijing Luan, Taiyuan Hu, Jifang Hu, Ruilin Li, Detao Ji, Jiayin He, Xiaohong Duan, Chunyan Yang, Yajun Gao, Fan Chen, Beifang Niu:
Multi-class Cancer Classification of Whole Slide Images Through Transformer and Multiple Instance Learning. ISBRA 2023: 150-164 - [c24]Dongmei Bin, Fuchuan Tang, Yangguang Lin, Chunyan Yang, Ying Ling:
Application of Zero Trust Security Architecture in Power Communication Network Security Management System. SPCNC 2023: 397-401 - 2022
- [j9]Feng Chen, Chunyan Yang, Mohammad Khishe:
Diagnose Parkinson's disease and cleft lip and palate using deep convolutional neural networks evolved by IP-based chimp optimization algorithm. Biomed. Signal Process. Control. 77: 103688 (2022) - [j8]Chunyan Yang, Fangxin Di:
The repelling factors of the management accounting methods under the COVID-19 - case studies based on the scenario of private enterprises. Int. J. Technol. Manag. 89(1/2): 124-138 (2022) - [c23]Tong Yu, Xin Li, Ying Ling, Dongmei Bin, Chunyan Yang:
Deep Learning Based Malware Traffic Classification for Power Internet of Things Network Security. ICBDC 2022: 131-137 - [c22]Wenli Wu, Chunyan Yang, Xingsen Li:
Application of extension innovation method in assembly production process optimization. ITQM 2022: 412-419 - [c21]Biaobiao Ge, Chunyan Yang, Long Tang:
Extension knowledge representation of evolutionary law of technological systems in TRIZ. ITQM 2022: 461-468 - 2021
- [j7]Danyang Yuan, Xiaoyu He, Xinyin Han, Chunyan Yang, Fei Liu, Shuying Zhang, Haijing Luan, Ruilin Li, Jiayin He, Xiaohong Duan, Dongliang Wang, Qiming Zhou, Sujun Gao, Beifang Niu:
Comprehensive review and evaluation of computational methods for identifying FLT3-internal tandem duplication in acute myeloid leukaemia. Briefings Bioinform. 22(5) (2021) - [c20]Tong Yu, Ming Xie, Xin Li, Kang Huang, Dongmei Bin, Chunyan Yang:
Quantitative method of damage degree of power system network attack based on improved artificial immune algorithm. ICAIIS 2021: 84:1-84:6 - [c19]Tong Yu, Ming Xie, Xin Li, Ying Ling, Dongmei Bin, Chunyan Yang:
Network attack detection method for power system terminal based on improved random forest. ICAIIS 2021: 85:1-85:6 - [c18]Tong Yu, Ming Xie, Xin Li, Ying Ling, Dongmei Bin, Chunyan Yang:
Prediction Method of Power Grid Security Risk Range Based on Graph Semi-supervised Learning. ICAIIS 2021: 86:1-86:5 - 2020
- [c17]Xiaobo Mai, Chunyan Yang, Lulu Wang, Xiangmin Tan, Zhenqin Yuan, Jiazhong Li, Xin Wang:
Pharmacophore study using the HipHop for the screening novel potential BH3-mimetic compounds. HealthCom 2020: 1-2
2010 – 2019
- 2019
- [c16]Long Tang, Xuanbin Lu, Chunyan Yang, Xingsen Li:
Extension Support Vector Machine for Extension Classification. ITQM 2019: 174-182 - [c15]Long Tang, Xuanbin Lu, Chunyan Yang, Xingsen Li:
Classification conducting knowledge acquisition by an evolutionary robust GRBF-NN model. ITQM 2019: 183-190 - [c14]Chunyan Yang, Tian Zheng, Zhongmeng Zhao, Xinnuo He, Xuanping Zhang, Xiao Xiao, Jiayin Wang:
A Greedy Algorithm for Detecting Mutually Exclusive Patterns in Cancer Mutation Data. IWBBIO (1) 2019: 154-165 - 2018
- [j6]Long Tang, Yingjie Tian, Chunyan Yang, Panos M. Pardalos:
Ramp-loss nonparallel support vector regression: Robust, sparse and scalable approximation. Knowl. Based Syst. 147: 55-67 (2018) - [j5]Long Tang, Yingjie Tian, Chunyan Yang:
Nonparallel support vector regression model and its SMO-type solver. Neural Networks 105: 431-446 (2018) - [c13]Germano Resconi, Chunyan Yang:
Solution of Brain Contradiction by Extension Theory. IFIP TC12 ICIS 2018: 24-29 - [c12]Ziwei Cai, Chunyan Yang:
Research on the Extension Evaluation Model and Strategy Generation Method of Enterprise Service Quality. ITQM 2018: 381-391 - 2017
- [j4]Long Tang, Chunyan Yang, Weihua Li:
Adopting gene expression programming to generate extension strategies for incompatible problem. Neural Comput. Appl. 28(9): 2649-2664 (2017) - 2015
- [c11]Yongqiang Liao, Chunyan Yang, Weihua Li:
Extension Innovation Design of Product Family Based on Kano Requirement Model. ITQM 2015: 268-277 - [c10]Weihua Li, Chunyan Yang, Xiaodong Fu:
Combining How Net and Extension Strategy Generation Method to Improve Customer Values. ITQM 2015: 451-460 - 2014
- [j3]Qin Gao, Chao Sun, Chunyan Yang:
The Influence of Network Structural Properties on Information Dissemination Power in Microblogging Systems. Int. J. Hum. Comput. Interact. 30(5): 394-407 (2014) - 2012
- [c9]Chunyan Yang, Xiaomei Li, Weihua Li:
Research on Customer Segmentation Based on Extension Classification. APWeb Workshops 2012: 95-105 - 2011
- [c8]Qiming Huang, Chunyan Yang:
A Lightweight RFID Authenticate Protocol based on Smart SIM Card. LISS (3) 2011: 126-129 - 2010
- [j2]Chunyan Yang, Dewei Wu, Yane Lu, Yonglin Yu:
Research on network RTK positioning algorithm aided by quantum ranging. Sci. China Inf. Sci. 53(2): 248-257 (2010) - [c7]Tieming Su, Xinpeng Qiu, Chunyan Yang:
Study of Collaborative Design Based on Fuzzy Theory. CDVE 2010: 153-160 - [c6]Chunhui Piao, Zhenjiang Fan, Chunyan Yang, Xufang Han:
Research on RFID security protocol based on grouped tags and re-encryption scheme. WCNIS 2010: 568-572
2000 – 2009
- 2009
- [c5]Mingchang Wang, Shengbo Chen, Lixin Xing, Chunyan Yang, Zijun Wang:
Neural Network Based Landscape Pattern Simulation in ChangBai Mountain, Northeast China. ISNN (2) 2009: 911-920 - 2008
- [j1]Weihua Li, Chunyan Yang:
Extension Information-Knowledge-Strategy System for Semantic Interoperability. J. Comput. 3(8): 32-39 (2008) - 2007
- [c4]Weihua Li, Chunyan Yang:
Eliminate semantic conflicts in Web mining with extension methods. SMC 2007: 1183-1187 - 2005
- [c3]Hui Yang, Chonghui Song, Chunyan Yang, Tianyou Chai:
Component Content Soft-Sensor Based on Adaptive Fuzzy System in Rare-Earth Countercurrent Extraction Process. FSKD (2) 2005: 891-896 - [c2]Hui Yang, Chunyan Yang, Chonghui Song, Tianyou Chai:
Intelligent Optimal Control in Rare-Earth Countercurrent Extraction Process via Soft-Sensor. ICNC (2) 2005: 214-223 - [c1]Chunyan Yang, Guanghua Wang, Yang Li, Wen Cai:
Study on Knowledge Reasoning Based on Extended Formulas. AIAI 2005: 797-805
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint