Year |
Citation |
Score |
2020 |
Li Y, Hu H, Zhu Z, Zhou G. SCANet: Sensor-based Continuous Authentication with Two-stream Convolutional Neural Networks Acm Transactions On Sensor Networks. 16: 1-27. DOI: 10.1145/3397179 |
0.307 |
|
2020 |
Li Y, Zou B, Deng S, Zhou G. Using Feature Fusion Strategies in Continuous Authentication on Smartphones Ieee Internet Computing. 24: 49-56. DOI: 10.1109/Mic.2020.2971447 |
0.342 |
|
2019 |
Li Y, Hu H, Zhou G. Using Data Augmentation in Continuous Authentication on Smartphones Ieee Internet of Things Journal. 6: 628-640. DOI: 10.1109/Jiot.2018.2851185 |
0.356 |
|
2018 |
Li Y, Hu H, Zhou G, Deng S. Sensor-Based Continuous Authentication Using Cost-Effective Kernel Ridge Regression Ieee Access. 6: 32554-32565. DOI: 10.1109/Access.2018.2841347 |
0.365 |
|
2018 |
Li Y, Xue F, Fan X, Qu Z, Zhou G. Pedestrian walking safety system based on smartphone built-in sensors. Iet Communications. 12: 751-758. DOI: 10.1049/Iet-Com.2017.0502 |
0.308 |
|
2017 |
Li Y, Li X, Liu X. A fast and efficient hash function based on generalized chaotic mapping with variable parameters Neural Computing and Applications. 28: 1405-1415. DOI: 10.1007/S00521-015-2158-7 |
0.357 |
|
2017 |
Li Y, Xue F, Feng L, Qu Z. A driving behavior detection system based on a smartphone's built‐in sensor International Journal of Communication Systems. 30. DOI: 10.1002/Dac.3178 |
0.326 |
|
2016 |
Li Y, Zhou G, Nie B. Improving Web Performance in Home Broadband Access Networks Wireless Personal Communications. 1-16. DOI: 10.1007/S11277-016-3585-1 |
0.338 |
|
2015 |
Li Y, Zhou G, Shen D. Determining driver phone use leveraging smartphone sensors Multimedia Tools and Applications. DOI: 10.1007/S11042-015-2969-7 |
0.333 |
|
2014 |
Li Y, Zhou G, Ruddy G, Cutler B. A Measurement-Based Prioritization Scheme for Smartphone Applications Wireless Personal Communications. 78: 333-346. DOI: 10.1007/S11277-014-1756-5 |
0.333 |
|
2014 |
Li Y, Zhou G, Zheng N, Hong L. An adaptive backoff algorithm for multi-channel CSMA in wireless sensor networks Neural Computing and Applications. 25: 1845-1851. DOI: 10.1007/S00521-014-1674-1 |
0.326 |
|
2013 |
Li Y, Graham D, Zhou G, Qi X, Deng S, Xiao D. Discrete-time Markov Model for Wireless Link Burstiness Simulations Wireless Personal Communications. 72: 987-1004. DOI: 10.1007/S11277-013-1051-X |
0.33 |
|
2013 |
Thompson R, Zhou G, Lu L, Krishnamurthy S, Dong H, Qi X, Li Y, Keally M, Ren Z. A Self-Adaptive Spectrum Management Middleware for Wireless Sensor Networks Wireless Personal Communications. 68: 131-151. DOI: 10.1007/S11277-011-0443-Z |
0.318 |
|
2013 |
Li Y, Xiao D, Deng S, Zhou G. Improvement and performance analysis of a novel hash function based on chaotic neural network Neural Computing and Applications. 22: 391-402. DOI: 10.1007/S00521-011-0703-6 |
0.406 |
|
2012 |
Li Y, Xiao D, Deng S. Keyed hash function based on a dynamic lookup table of functions Information Sciences. 214: 56-75. DOI: 10.1016/J.Ins.2012.06.001 |
0.331 |
|
2012 |
Li Y, Xiao D, Li H, Deng S. Parallel chaotic Hash function construction based on cellular neural network Neural Computing and Applications. 21: 1563-1573. DOI: 10.1007/S00521-011-0726-Z |
0.357 |
|
2011 |
Li Y, Xiao D, Deng S. Hash Function Construction Based on the Chaotic Look-Up Table with Changeable Parameter International Journal of Modern Physics B. 25: 3835-3851. DOI: 10.1142/S0217979211102241 |
0.353 |
|
2011 |
Deng S, Zhan Y, Xiao D, Li Y. Analysis and improvement of a hash-based image encryption algorithm Communications in Nonlinear Science and Numerical Simulation. 16: 3269-3278. DOI: 10.1016/J.Cnsns.2010.12.016 |
0.325 |
|
2011 |
Li Y, Xiao D, Deng S, Han Q, Zhou G. Parallel Hash function construction based on chaotic maps with changeable parameters Neural Computing and Applications. 20: 1305-1312. DOI: 10.1007/S00521-011-0543-4 |
0.362 |
|
2011 |
Li Y, Deng S, Xiao D. A novel Hash algorithm construction based on chaotic neural network Neural Computing and Applications. 20: 133-141. DOI: 10.1007/S00521-010-0432-2 |
0.387 |
|
2010 |
Deng S, Li Y, Xiao D. Analysis and improvement of a chaos-based Hash function construction Communications in Nonlinear Science and Numerical Simulation. 15: 1338-1347. DOI: 10.1016/J.Cnsns.2009.05.065 |
0.398 |
|
2009 |
Deng S, Xiao D, Li Y, Peng W. A novel combined cryptographic and hash algorithm based on chaotic control character Communications in Nonlinear Science and Numerical Simulation. 14: 3889-3900. DOI: 10.1016/J.Cnsns.2009.02.020 |
0.36 |
|
Show low-probability matches. |