Nong Ye - Publications

Affiliations: 
Arizona State University, Tempe, AZ, United States 
Area:
Industrial Engineering, Computer Science

40 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2015 Ye N, Gong X, Pang LL, Gao WJ, Zhang YT, Li XL, Liu N, Li DD, Jin Y, Duan ZJ. Cytokine responses and correlations thereof with clinical profiles in children with enterovirus 71 infections. Bmc Infectious Diseases. 15: 225. PMID 26058678 DOI: 10.1186/s12879-015-0965-1  0.314
2015 Wang X, Guo T, Peng F, Long Y, Mu Y, Yang H, Ye N, Li X, Zhan X. Proteomic and functional profiles of a follicle-stimulating hormone positive human nonfunctional pituitary adenoma. Electrophoresis. 36: 1289-304. PMID 25809007 DOI: 10.1002/elps.201500006  0.335
2014 Li X, Liu F, Li Z, Ye N, Huang C, Yuan X. Atractylodes macrocephala polysaccharides induces mitochondrial-mediated apoptosis in glioma C6 cells. International Journal of Biological Macromolecules. 66: 108-12. PMID 24556116 DOI: 10.1016/j.ijbiomac.2014.02.019  0.304
2013 Ye N, Aranda BM, Hurley P. System impact characteristics of cyber services, security mechanisms, and attacks with implications in cyber system survivability Information Knowledge Systems Management. 12: 75-95. DOI: 10.3233/Iks-130217  0.324
2012 Li J, Jin Y, Tan XJ, Ye N, Yu WL, Li XL, Lu F. [Genetic characterization of coxsackievirus A16 isolated in Nanjing city in 2010]. Zhonghua Liu Xing Bing Xue Za Zhi = Zhonghua Liuxingbingxue Zazhi. 33: 1099-100. PMID 23346651  0.3
2012 Li J, Jin Y, Tan XJ, Ye N, Yu WL, Zhang YT, Li XL, Xu WB. [Etiology of hand-foot-and-mouth disease seen in Nanjing in 2010 and molecular characteristics analysis of EV71]. Zhonghua Er Ke Za Zhi. Chinese Journal of Pediatrics. 50: 267-70. PMID 22801226  0.317
2012 Ye N, Aranda BM, Yau S, Huang D. Analysis and modeling of service impacts on system activities, resource workloads and service performance on computer and network systems Information-Knowledge-Systems Management Archive. 11: 255-274. DOI: 10.3233/Iks-2012-0210  0.329
2010 Ye N, Yau S, Huang D, Baydogan M, Aranda BM, Roontiva A, Hurley P. Models of dynamic relations among service activities, system state and service quality on computer and network systems Information Knowledge Systems Management. 9: 99-116. DOI: 10.3233/Iks-2010-0160  0.312
2009 Yau SS, Ye N, Sarjoughian HS, Huang D, Roontiva A, Baydogan M, Muqsith MA. Toward development of adaptive service-based software systems Ieee Transactions On Services Computing. 2: 247-260. DOI: 10.1109/Tsc.2009.17  0.308
2008 Xu X, Li X, Ma L, Ye N, Weng B. An unexpected diethyl azodicarboxylate-promoted dehydrogenation of tertiaryamine and tandem reaction with sulfonyl azide. Journal of the American Chemical Society. 130: 14048-9. PMID 18826314 DOI: 10.1021/ja8047514  0.316
2007 Li X, Ye N, Xu X, Sawhey R. Influencing factors of job waiting time variance on a single machine European Journal of Industrial Engineering. 1: 56-73. DOI: 10.1504/Ejie.2007.012654  0.452
2007 Ye N, Li X, Farley T, Xu X. Job scheduling methods for reducing waiting time variance Computers & Operations Research. 34: 3069-3083. DOI: 10.1016/J.Cor.2005.11.015  0.473
2007 Li X, Ye N, Liu T, Sun Y. Job scheduling to minimize the weighted waiting time variance of jobs Computers & Industrial Engineering. 52: 41-56. DOI: 10.1016/J.Cie.2006.10.010  0.449
2007 Ye N, Chen Q. Attack-norm separation for detecting attack-induced quality problems on computers and networks Quality and Reliability Engineering International. 23: 545-553. DOI: 10.1002/Qre.830  0.364
2006 Ye N, Farley T, Lakshminarasimhan D. An attack-norm separation approach for detecting cyber attacks Information Systems Frontiers. 8: 163-177. DOI: 10.1007/S10796-006-8731-Y  0.321
2006 Yang Z, Ye N, Lai Y. QoS Model of a Router with Feedback Control Quality and Reliability Engineering International. 22: 429-444. DOI: 10.1002/Qre.720  0.334
2005 Zhao L, Park K, Lai YC, Ye N. Tolerance of scale-free networks against attack-induced cascades. Physical Review. E, Statistical, Nonlinear, and Soft Matter Physics. 72: 025104. PMID 16196627 DOI: 10.1103/Physreve.72.025104  0.316
2005 Park K, Lai YC, Zhao L, Ye N. Jamming in complex gradient networks. Physical Review. E, Statistical, Nonlinear, and Soft Matter Physics. 71: 065105. PMID 16089802 DOI: 10.1103/Physreve.71.065105  0.3
2005 Zhao L, Lai YC, Park K, Ye N. Onset of traffic congestion in complex networks. Physical Review. E, Statistical, Nonlinear, and Soft Matter Physics. 71: 026125. PMID 15783396 DOI: 10.1103/Physreve.71.026125  0.329
2005 Ye N, Farley T. A scientific approach to cyberattack detection Computer. 38: 55-61. DOI: 10.1109/Mc.2005.358  0.322
2005 Ye N, Yang Z, Lai Y, Farley T. Enhancing router QoS through job scheduling with weighted shortest processing time-adjusted Computers & Operations Research. 32: 2255-2269. DOI: 10.1016/J.Cor.2004.03.001  0.326
2005 Ye N, Gel ES, Li X, Farley T, Lai YC. Web server QoS models: Applying scheduling rules from production planning Computers and Operations Research. 32: 1147-1164. DOI: 10.1016/J.Cor.2003.10.001  0.472
2004 Ye N, Zhang Y, Borror CM. Robustness of the Markov-chain model for cyber-attack detection Ieee Transactions On Reliability. 53: 116-123. DOI: 10.1109/Tr.2004.823851  0.315
2003 Liu Z, Lai YC, Ye N. Propagation and immunization of infection on general networks with both homogeneous and heterogeneous components. Physical Review. E, Statistical, Nonlinear, and Soft Matter Physics. 67: 031911. PMID 12689105 DOI: 10.1103/Physreve.67.031911  0.314
2003 Ye N, Li X, Farley T. A data mining technique for discovering distinct patterns of hand signs: implications in user training and computer interface design. Ergonomics. 46: 188-96. PMID 12554406 DOI: 10.1080/00140130303526  0.431
2003 Lai Y, Liu Z, Ye N. Infection Dynamics on Growing Networks International Journal of Modern Physics B. 17: 4045-4061. DOI: 10.1142/S0217979203022027  0.303
2003 Ye N, Vilbert S, Chen Q. Computer intrusion detection through EWMA for autocorrelated and uncorrelated data Ieee Transactions On Reliability. 52: 75-82. DOI: 10.1109/Tr.2002.805796  0.328
2003 Ye N, Lai Y, Farley T. Dependable information infrastructures as complex adaptive systems Systems Engineering. 6: 225-237. DOI: 10.1002/Sys.10048  0.323
2002 Liu Z, Lai YC, Ye N. Statistical properties and attack tolerance of growing networks with algebraic preferential attachment. Physical Review. E, Statistical, Nonlinear, and Soft Matter Physics. 66: 036112. PMID 12366189 DOI: 10.1103/Physreve.66.036112  0.314
2002 Ye N. QoS-Centric Stateful Resource Management in Information Systems Information Systems Frontiers. 4: 149-160. DOI: 10.1023/A:1016046702190  0.322
2002 Liu Z, Lai Y, Ye N, Dasgupta P. Connectivity distribution and attack tolerance of general networks with both preferential and random attachments Physics Letters A. 303: 337-344. DOI: 10.1016/S0375-9601(02)01317-8  0.314
2002 Ye N, Borror C, Zhang Y. EWMA techniques for computer intrusion detection through anomalous changes in event intensity Quality and Reliability Engineering International. 18: 443-451. DOI: 10.1002/Qre.493  0.346
2002 Li X, Ye N. Grid- and dummy-cluster-based learning of normal and intrusive clusters for computer intrusion detection Quality and Reliability Engineering International. 18: 231-242. DOI: 10.1002/Qre.477  0.311
2002 Ye N. Secure, reliable computer and network systems Quality and Reliability Engineering International. 18. DOI: 10.1002/Qre.472  0.301
2002 Emran SM, Ye N. Robustness of chi-square and Canberra distance metrics for computer intrusion detection Quality and Reliability Engineering International. 18: 19-28. DOI: 10.1002/Qre.441  0.301
2001 Li X, Ye N. Decision Tree Classifiers for Computer Intrusion Detection Scalable Computing: Practice and Experience. 4. DOI: 10.12694/Scpe.V4I2.238  0.324
1998 Ye N, Giordano J, Feldman J, Zhong Q. Information fusion techniques for network intrusion detection Information Technology. 117-120. DOI: 10.1109/It.1998.713395  0.331
1997 Ye N, Zhao B. Automatic Setting of Article Format Through Neural Networks Plastics, Rubber and Composites Processing and Applications. 9: 81-100. DOI: 10.1207/S15327590Ijhc0901_5  0.315
1993 Ye N, Zhao B, Salvendy G. Neural-networks-aided fault diagnosis in supervisory control of advanced manufacturing systems The International Journal of Advanced Manufacturing Technology. 8: 200-209. DOI: 10.1007/Bf01748629  0.326
1991 Ye N, Salvendy G. Cognitive engineering based knowledge representation in neural networks Behaviour and Information Technology. 10: 403-418. DOI: 10.1080/01449299108924299  0.312
Show low-probability matches.