Yantao Li - Publications

Affiliations: 
2012 Computer Science College of William and Mary, Williamsburg, VA 

22 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2020 Li Y, Hu H, Zhu Z, Zhou G. SCANet: Sensor-based Continuous Authentication with Two-stream Convolutional Neural Networks Acm Transactions On Sensor Networks. 16: 1-27. DOI: 10.1145/3397179  0.307
2020 Li Y, Zou B, Deng S, Zhou G. Using Feature Fusion Strategies in Continuous Authentication on Smartphones Ieee Internet Computing. 24: 49-56. DOI: 10.1109/Mic.2020.2971447  0.342
2019 Li Y, Hu H, Zhou G. Using Data Augmentation in Continuous Authentication on Smartphones Ieee Internet of Things Journal. 6: 628-640. DOI: 10.1109/Jiot.2018.2851185  0.356
2018 Li Y, Hu H, Zhou G, Deng S. Sensor-Based Continuous Authentication Using Cost-Effective Kernel Ridge Regression Ieee Access. 6: 32554-32565. DOI: 10.1109/Access.2018.2841347  0.365
2018 Li Y, Xue F, Fan X, Qu Z, Zhou G. Pedestrian walking safety system based on smartphone built-in sensors. Iet Communications. 12: 751-758. DOI: 10.1049/Iet-Com.2017.0502  0.308
2017 Li Y, Li X, Liu X. A fast and efficient hash function based on generalized chaotic mapping with variable parameters Neural Computing and Applications. 28: 1405-1415. DOI: 10.1007/S00521-015-2158-7  0.357
2017 Li Y, Xue F, Feng L, Qu Z. A driving behavior detection system based on a smartphone's built‐in sensor International Journal of Communication Systems. 30. DOI: 10.1002/Dac.3178  0.326
2016 Li Y, Zhou G, Nie B. Improving Web Performance in Home Broadband Access Networks Wireless Personal Communications. 1-16. DOI: 10.1007/S11277-016-3585-1  0.338
2015 Li Y, Zhou G, Shen D. Determining driver phone use leveraging smartphone sensors Multimedia Tools and Applications. DOI: 10.1007/S11042-015-2969-7  0.333
2014 Li Y, Zhou G, Ruddy G, Cutler B. A Measurement-Based Prioritization Scheme for Smartphone Applications Wireless Personal Communications. 78: 333-346. DOI: 10.1007/S11277-014-1756-5  0.333
2014 Li Y, Zhou G, Zheng N, Hong L. An adaptive backoff algorithm for multi-channel CSMA in wireless sensor networks Neural Computing and Applications. 25: 1845-1851. DOI: 10.1007/S00521-014-1674-1  0.326
2013 Li Y, Graham D, Zhou G, Qi X, Deng S, Xiao D. Discrete-time Markov Model for Wireless Link Burstiness Simulations Wireless Personal Communications. 72: 987-1004. DOI: 10.1007/S11277-013-1051-X  0.33
2013 Thompson R, Zhou G, Lu L, Krishnamurthy S, Dong H, Qi X, Li Y, Keally M, Ren Z. A Self-Adaptive Spectrum Management Middleware for Wireless Sensor Networks Wireless Personal Communications. 68: 131-151. DOI: 10.1007/S11277-011-0443-Z  0.318
2013 Li Y, Xiao D, Deng S, Zhou G. Improvement and performance analysis of a novel hash function based on chaotic neural network Neural Computing and Applications. 22: 391-402. DOI: 10.1007/S00521-011-0703-6  0.406
2012 Li Y, Xiao D, Deng S. Keyed hash function based on a dynamic lookup table of functions Information Sciences. 214: 56-75. DOI: 10.1016/J.Ins.2012.06.001  0.331
2012 Li Y, Xiao D, Li H, Deng S. Parallel chaotic Hash function construction based on cellular neural network Neural Computing and Applications. 21: 1563-1573. DOI: 10.1007/S00521-011-0726-Z  0.357
2011 Li Y, Xiao D, Deng S. Hash Function Construction Based on the Chaotic Look-Up Table with Changeable Parameter International Journal of Modern Physics B. 25: 3835-3851. DOI: 10.1142/S0217979211102241  0.353
2011 Deng S, Zhan Y, Xiao D, Li Y. Analysis and improvement of a hash-based image encryption algorithm Communications in Nonlinear Science and Numerical Simulation. 16: 3269-3278. DOI: 10.1016/J.Cnsns.2010.12.016  0.325
2011 Li Y, Xiao D, Deng S, Han Q, Zhou G. Parallel Hash function construction based on chaotic maps with changeable parameters Neural Computing and Applications. 20: 1305-1312. DOI: 10.1007/S00521-011-0543-4  0.362
2011 Li Y, Deng S, Xiao D. A novel Hash algorithm construction based on chaotic neural network Neural Computing and Applications. 20: 133-141. DOI: 10.1007/S00521-010-0432-2  0.387
2010 Deng S, Li Y, Xiao D. Analysis and improvement of a chaos-based Hash function construction Communications in Nonlinear Science and Numerical Simulation. 15: 1338-1347. DOI: 10.1016/J.Cnsns.2009.05.065  0.398
2009 Deng S, Xiao D, Li Y, Peng W. A novel combined cryptographic and hash algorithm based on chaotic control character Communications in Nonlinear Science and Numerical Simulation. 14: 3889-3900. DOI: 10.1016/J.Cnsns.2009.02.020  0.36
Show low-probability matches.