default search action
Jiawei Yuan
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j36]Jiawei Yuan, Hongyong Leng, Yurong Qian, Jiaying Chen, Mengnan Ma, Shuxiang Hou:
Evidence and Axial Attention Guided Document-level Relation Extraction. Comput. Speech Lang. 90: 101728 (2025) - 2024
- [j35]Jiawei Yuan, Shuiping Yang, Wan-Lin Yan:
An adaptive uniform search framework for constrained multi-objective optimization. Appl. Soft Comput. 162: 111800 (2024) - [j34]Guanxiong Ha, Chunfu Jia, Xiaowei Ge, Jiawei Yuan, Hang Chen, Mingyue Li:
Efficient and anonymous password-hardened encryption services. Inf. Sci. 653: 119771 (2024) - [j33]Jiawei Yuan, Hai-Lin Liu, Shuiping Yang:
An adaptive parental guidance strategy and its derived indicator-based evolutionary algorithm for multi- and many-objective optimization. Swarm Evol. Comput. 84: 101449 (2024) - [j32]Zhikang Li, Jiazhu Li, Yihe Zhao, Zixuan Li, Xuan Shi, Shaohui Qin, Jie Li, Jiawei Yuan, Qi Ma, Zilong Zhao, Shiwang Zhang, Zheng Yuan, Xiaozhang Wang, Libo Zhao:
Noninvasive Stress Detection Based on Piezoelectric Micromachined Ultrasonic Transducers for Bolt Loosening Warning. IEEE Trans. Instrum. Meas. 73: 1-16 (2024) - [c39]Dancheng Xin, Jiawei Yuan, Yang Li:
Diffusion Based Counterfactual Augmentation for Dual Sentiment Classification. LREC/COLING 2024: 4901-4911 - [c38]Anthony Finn, Mengjie Jia, Yanyan Li, Jiawei Yuan:
Detecting Stealthy GPS Spoofing Attack Against UAVs Using Onboard Sensors. INFOCOM (Workshops) 2024: 1-6 - 2023
- [j31]Qian-Long Dang, Jiawei Yuan:
A Kalman filter-based prediction strategy for multiobjective multitasking optimization. Expert Syst. Appl. 213(Part): 119025 (2023) - [j30]Changfan Luo, Yiping Xu, Yongkang Shao, Zihan Wang, Jianzheng Hu, Jiawei Yuan, Yuchen Liu, Meiyu Duan, Lan Huang, Fengfeng Zhou:
EvaGoNet: An integrated network of variational autoencoder and Wasserstein generative adversarial network with gradient penalty for binary classification tasks. Inf. Sci. 629: 109-122 (2023) - [j29]Jiawei Yuan, Zaibin Jiao:
Faulty-Feeder Detection for Single Phase-to-Ground Faults in Distribution Networks Based on Waveform Encoding and Waveform Segmentation. IEEE Trans. Smart Grid 14(5): 4100-4115 (2023) - [c37]Ashok Raja, Mengjie Jia, Jiawei Yuan:
Towards the Security of AI-Enabled UAV Anomaly Detection. ICC 2023: 803-808 - [c36]Mengjie Jia, Ashok Raja, Jiawei Yuan:
A Hybrid Delay-aware Approach Towards UAV Flight Data Anomaly Detection. ICNC 2023: 176-180 - [c35]Aakash Shrestha, Yantian Hou, Min Long, Jiawei Yuan:
Virtual Curtain: A Communicative Fine-grained Privacy Control Framework for Augmented Reality. ICNC 2023: 188-194 - 2022
- [j28]Jiawei Yuan, Zaibin Jiao:
Faulty feeder detection based on image recognition of current waveform superposition in distribution networks. Appl. Soft Comput. 130: 109663 (2022) - [j27]Jiawei Yuan, Yuan Gao, Shukai Li, Pei Liu, Lixing Yang:
Integrated optimization of train timetable, rolling stock assignment and short-turning strategy for a metro line. Eur. J. Oper. Res. 301(3): 855-874 (2022) - [j26]Ashok Raja, Laurent Njilla, Jiawei Yuan:
Adversarial Attacks and Defenses Toward AI-Assisted UAV Infrastructure Inspection. IEEE Internet Things J. 9(23): 23379-23389 (2022) - [j25]Lin Zhang, Jiawei Yuan, Kang Yuan, Jinlong Hong, Haitao Ding, Hong Chen:
Automated Braking Decision and Control for Pedestrian Collision Avoidance Based on Risk Assessment. IEEE Intell. Transp. Syst. Mag. 14(3): 41-61 (2022) - [j24]Jiawei Yuan, Hai-Lin Liu, Zhaoshui He:
A constrained multi-objective evolutionary algorithm using valuable infeasible solutions. Swarm Evol. Comput. 68: 101020 (2022) - [j23]Jiawei Yuan, Hai-Lin Liu, Yew-Soon Ong, Zhaoshui He:
Indicator-Based Evolutionary Algorithm for Solving Constrained Multiobjective Optimization Problems. IEEE Trans. Evol. Comput. 26(2): 379-391 (2022) - [j22]Lin Zhang, Kang Yuan, Hongqing Chu, Yanjun Huang, Haitao Ding, Jiawei Yuan, Hong Chen:
Pedestrian Collision Risk Assessment Based on State Estimation and Motion Prediction. IEEE Trans. Veh. Technol. 71(1): 98-111 (2022) - [c34]Li Yan, Jiawei Yuan, Liang Zhengxiong, Chuang Gao, Wei Xiaoqing:
Study on Dynamic Characteristics of Sliding Friction Interfaces in Feed System During Non-stable Starting Stage. CoDIT 2022: 1178-1183 - [c33]Yang Li, Jiawei Yuan:
Generative Data Augmentation with Contrastive Learning for Zero-Shot Stance Detection. EMNLP 2022: 6985-6995 - [c32]Yifan Yu, Yunkai Xu, Jiawei Yuan, Changhao Wu, Xiaoguang Liu, Ming Su:
Keycrux: A New Design of Distributed and Convenient Blockchain Digital Wallet. SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta 2022: 2444-2451 - 2021
- [j21]Tao Zhang, Jiawei Yuan, Yeh-Cheng Chen, Wenjing Jia:
Self-learning soft computing algorithms for prediction machines of estimating crowd density. Appl. Soft Comput. 105: 107240 (2021) - [j20]Jian Wang, Yongxin Liu, Shuteng Niu, Houbing Song, Weipeng Jing, Jiawei Yuan:
Blockchain enabled verification for cellular-connected unmanned aircraft system networking. Future Gener. Comput. Syst. 123: 233-244 (2021) - [j19]Ning Yang, Hai-Lin Liu, Jiawei Yuan:
Performance investigation of I∊-indicator and I∊+-indicator based on Lp-norm. Neurocomputing 458: 546-558 (2021) - [j18]Yifan Tian, Laurent Njilla, Jiawei Yuan, Shucheng Yu:
Low-Latency Privacy-Preserving Outsourcing of Deep Neural Network Inference. IEEE Internet Things J. 8(5): 3300-3309 (2021) - [j17]Jiawei Yuan, Yifan Li:
Solving binary multi-objective knapsack problems with novel greedy strategy. Memetic Comput. 13(4): 447-458 (2021) - [j16]Jiawei Yuan:
Dynamic grid-based uniform search for solving constrained multiobjective optimization problems. Memetic Comput. 13(4): 497-508 (2021) - [j15]Jiawei Yuan, Hai-Lin Liu, Fangqing Gu, Qingfu Zhang, Zhaoshui He:
Investigating the Properties of Indicators and an Evolutionary Many-Objective Algorithm Using Promising Regions. IEEE Trans. Evol. Comput. 25(1): 75-86 (2021) - [c31]Fali Mi, Jiawei Yuan:
Design of English Listening Simulation Teaching System Based on Cloud Computing. eLEOT (1) 2021: 355-366 - [c30]Ashok Raja, Jiawei Yuan:
Detecting Spying Activities from the Sky via Deep Learning. ICC 2021: 1-6 - [c29]Ashok Raja, Laurent Njilla, Jiawei Yuan:
Blur the Eyes of UAV: Effective Attacks on UAV-based Infrastructure Inspection. ICTAI 2021: 661-665 - [c28]Jiawei Yuan, Laurent Njilla:
Lightweight and Reliable Decentralized Reward System using Blockchain. INFOCOM Workshops 2021: 1-6 - [c27]Julio Galvan, Ashok Raja, Yanyan Li, Jiawei Yuan:
Sensor Data-Driven UAV Anomaly Detection using Deep Learning Approach. MILCOM 2021: 589-594 - [c26]Zichen Liu, Libo Zhao, Yihe Zhao, Jie Li, Zhikang Li, Yu Bai, Ping Yang, Qijing Lin, Zixuan Li, Jiawei Yuan, Zhuangde Jiang:
Design and Simulation of a Wide-Bandwidth CMUTs Array with Dual-Mixed radii and Multi Operating Modes. NEMS 2021: 299-302 - [c25]Ashok Raja, Julio Galvan, Yanyan Li, Jiawei Yuan:
UCLP: A Novel UAV Cybersecurity Laboratory Platform. SIGITE 2021: 23-28 - 2020
- [j14]Yifan Tian, Jiawei Yuan, Yantian Hou:
CPAR: Cloud-Assisted Privacy-preserving Image Annotation with Randomized k-d Forest. EAI Endorsed Trans. Security Safety 6(22): e5 (2020) - [i6]Yifan Tian, Laurent Njilla, Jiawei Yuan, Shucheng Yu:
Low Latency Privacy-preserving Outsourcing of Deep Neural Network Inference. IACR Cryptol. ePrint Arch. 2020: 155 (2020)
2010 – 2019
- 2019
- [j13]Qiang Wang, Hai-Lin Liu, Jiawei Yuan, Lei Chen:
Optimizing the energy-spectrum efficiency of cellular systems by evolutionary multi-objective algorithm. Integr. Comput. Aided Eng. 26(2): 207-220 (2019) - [j12]Yifan Tian, Jiawei Yuan, Houbing Song:
Efficient privacy-preserving authentication framework for edge-assisted Internet of Drones. J. Inf. Secur. Appl. 48 (2019) - [j11]Jiawei Yuan, Yifan Tian:
Practical Privacy-Preserving MapReduce Based K-Means Clustering Over Large-Scale Dataset. IEEE Trans. Cloud Comput. 7(2): 568-579 (2019) - [c24]Yifan Tian, Jiawei Yuan, Houbing Song:
Secure and Reliable Decentralized Truth Discovery Using Blockchain. CNS 2019: 1-8 - [c23]Zhuosheng Zhang, Laurent L. Njilla, Shucheng Yu, Jiawei Yuan:
Edge-Assisted Learning for Real-Time UAV Imagery via Predictive Offloading. GLOBECOM 2019: 1-6 - [c22]Charles Mercenit, Juan C. Rios, Yongxin Liu, Jian Wang, Jiawei Yuan, Houbing Song:
Analysis of Rogue Access Points Using SDR. ICII 2019: 50-55 - [c21]Yongxin Liu, Jian Wang, Houbing Song, Jianqiang Li, Jiawei Yuan:
Blockchain-based Secure Routing Strategy for Airborne Mesh Networks. ICII 2019: 56-61 - [c20]Yifan Tian, Jiawei Yuan, Yantian Hou:
PDF-DS: Privacy-Preserving Data Filtering for Distributed Data Streams in Cloud. iThings/GreenCom/CPSCom/SmartData 2019: 1217-1224 - [c19]Anil Acharya, Yantian Hou, Ying Mao, Jiawei Yuan:
Edge-Assisted Image Processing with Joint Optimization of Responding and Placement Strategy. iThings/GreenCom/CPSCom/SmartData 2019: 1241-1248 - [c18]Anil Acharya, Yantian Hou, Ying Mao, Min Xian, Jiawei Yuan:
Workload-Aware Task Placement in Edge-Assisted Human Re-identification. SECON 2019: 1-9 - [c17]Yifan Tian, Jiawei Yuan, Shucheng Yu, Yantian Hou, Houbing Song:
Edge-Assisted CNN Inference over Encrypted Data for Internet of Things. SecureComm (1) 2019: 85-104 - [i5]Yifan Tian, Jiawei Yuan, Shucheng Yu, Yantian Hou:
LEP-CNN: A Lightweight Edge Device Assisted Privacy-preserving CNN Inference Solution for IoT. CoRR abs/1901.04100 (2019) - 2018
- [j10]Jiawei Yuan, Yao-Lin Jiang:
A parameterised model order reduction method for parametric systems based on Laguerre polynomials. Int. J. Control 91(8): 1861-1872 (2018) - [j9]Jiawei Yuan, Yao-Lin Jiang:
A multi-point parameterized model reduction for large parametric systems by using Krylov-subspace techniques. Trans. Inst. Meas. Control 40(4): 1340-1351 (2018) - [c16]Jiawei Yuan, Hai-Lin Liu, Fangqing Gu:
A Cost Value Based Evolutionary Many-Objective Optimization Algorithm with Neighbor Selection Strategy. CEC 2018: 1-8 - [c15]Jian Wang, Yongxin Liu, Alfaidi Amal, Houbing Song, Richard S. Stansbury, Jiawei Yuan, Tianyu Yang:
Fountain Code Enabled ADS-B for Aviation Security and Safety Enhancement. IPCCC 2018: 1-7 - [i4]Yifan Tian, Yantian Hou, Jiawei Yuan:
CPAR: Cloud-Assisted Privacy-preserving Image Annotation with Randomized KD-Forest. CoRR abs/1811.04195 (2018) - 2017
- [j8]Jiawei Yuan, Hai-Lin Liu, Chaoda Peng:
Population Decomposition-Based Greedy Approach Algorithm for the Multi-Objective Knapsack Problems. Int. J. Pattern Recognit. Artif. Intell. 31(4): 1759006:1-1759006:17 (2017) - [j7]Jiawei Yuan, Bradley A. Malin, François Modave, Yi Guo, William R. Hogan, Elizabeth Shenkman, Jiang Bian:
Towards a privacy preserving cohort discovery framework for clinical research networks. J. Biomed. Informatics 66: 42-51 (2017) - [c14]Yifan Tian, Yantian Hou, Jiawei Yuan:
CAPIA: Cloud assisted privacy-preserving image annotation. CNS 2017: 1-9 - 2016
- [c13]Jiawei Yuan, Hai-Lin Liu:
A New Dominance Relation Based on Simplex for Many Objective Optimization Problems. CIS 2016: 175-178 - [c12]Yifan Tian, Jiawei Yuan, Shucheng Yu:
SBPA: Social behavior based cross Social Network phishing attacks. CNS 2016: 366-367 - [c11]Cilia E. Zayas, Zhe He, Jiawei Yuan, Mildred Maldonado-Molina, William R. Hogan, François Modave, Yi Guo, Jiang Bian:
Examining Healthcare Utilization Patterns of Elderly and Middle-Aged Adults in the United States. FLAIRS 2016: 361-367 - 2015
- [j6]Lu Shi, Jiawei Yuan, Shucheng Yu, Ming Li:
MASK-BAN: Movement-Aided Authenticated Secret Key Extraction Utilizing Channel Characteristics in Body Area Networks. IEEE Internet Things J. 2(1): 52-62 (2015) - [j5]Jiawei Yuan, Shucheng Yu:
PCPOR: Public and constant-cost proofs of retrievability in cloud. J. Comput. Secur. 23(3): 403-425 (2015) - [j4]Jiawei Yuan, Yao-Lin Jiang, Zhi-Hua Xiao:
Structure-preserving model order reduction by general orthogonal polynomials for integral-differential systems. J. Frankl. Inst. 352(1): 138-154 (2015) - [j3]Jiawei Yuan, Shucheng Yu:
Public Integrity Auditing for Dynamic Data Sharing With Multiuser Modification. IEEE Trans. Inf. Forensics Secur. 10(8): 1717-1726 (2015) - [c10]Jiawei Yuan, Shucheng Yu, Linke Guo:
SEISA: Secure and efficient encrypted image search with access control. INFOCOM 2015: 2083-2091 - 2014
- [j2]Jiawei Yuan, Shucheng Yu:
Privacy Preserving Back-Propagation Neural Network Learning Made Practical with Cloud Computing. IEEE Trans. Parallel Distributed Syst. 25(1): 212-221 (2014) - [c9]Jiawei Yuan, Shucheng Yu:
Efficient public integrity checking for cloud data sharing with multi-user modification. INFOCOM 2014: 2121-2129 - 2013
- [j1]Lu Shi, Ming Li, Shucheng Yu, Jiawei Yuan:
BANA: Body Area Network Authentication Exploiting Channel Characteristics. IEEE J. Sel. Areas Commun. 31(9): 1803-1816 (2013) - [c8]Jiawei Yuan, Shucheng Yu:
Proofs of retrievability with public verifiability and constant communication cost in cloud. SCC@ASIACCS 2013: 19-26 - [c7]Jiawei Yuan, Shucheng Yu:
Secure and constant cost public cloud storage auditing with deduplication. CNS 2013: 145-153 - [c6]Jiawei Yuan, Shucheng Yu:
Flexible and publicly verifiable aggregation query for outsourced databases in cloud. CNS 2013: 520-524 - [c5]Jiawei Yuan, Shucheng Yu:
Efficient privacy-preserving biometric identification in cloud computing. INFOCOM 2013: 2652-2660 - [c4]Lu Shi, Jiawei Yuan, Shucheng Yu, Ming Li:
ASK-BAN: authenticated secret key extraction utilizing channel characteristics for body area networks. WISEC 2013: 155-166 - [i3]Jiawei Yuan, Shucheng Yu:
Secure and Constant Cost Public Cloud Storage Auditing with Deduplication. IACR Cryptol. ePrint Arch. 2013: 149 (2013) - [i2]Jiawei Yuan, Shucheng Yu:
Flexible and Publicly Verifiable Aggregation Query for Outsourced Databases in Cloud. IACR Cryptol. ePrint Arch. 2013: 627 (2013) - 2012
- [c3]Jiawei Yuan, Lu Shi, Shucheng Yu, Ming Li:
Authenticated secret key extraction using channel characteristics for body area networks. CCS 2012: 1028-1030 - [c2]Jiawei Yuan, Shucheng Yu:
Privacy Preserving Back-Propagation Learning Made Practical with Cloud Computing. SecureComm 2012: 292-309 - [c1]Lu Shi, Ming Li, Shucheng Yu, Jiawei Yuan:
BANA: body area network authentication exploiting channel characteristics. WISEC 2012: 27-38 - [i1]Jiawei Yuan, Shucheng Yu:
Proofs of Retrievability with Public Verifiability and Constant Communication Cost in Cloud. IACR Cryptol. ePrint Arch. 2012: 682 (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-04 20:43 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint