|
Search the dblp DataBase
Jianping Yin:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Zhiping Cai, Jianping Yin, Xianghui Liu, Shaohe Lv
An Approximation Algorithm for Weak Vertex Cover Problem in Network Management. [Citation Graph (0, 0)][DBLP] AAIM, 2005, pp:243-251 [Conf]
- Jianping Yin, Shaohe Lv, Zhiping Cai, Chi Liu
On a Novel Filtering Mechanism for Capacity Estimation: Extended Version. [Citation Graph (0, 0)][DBLP] AINTEC, 2005, pp:269-281 [Conf]
- Shaohe Lv, Jianping Yin, Zhiping Cai, Chi Liu
On a Novel Methodology for Estimating Available Bandwidth Along Network Paths. [Citation Graph (0, 0)][DBLP] CIS (2), 2005, pp:703-710 [Conf]
- Boyun Zhang, Jianping Yin, Jingbo Hao
Using Fuzzy Pattern Recognition to Detect Unknown Malicious Executables Code. [Citation Graph (0, 0)][DBLP] FSKD (1), 2005, pp:629-634 [Conf]
- Xianghui Liu, Jianping Yin, Xicheng Lu, Zhiping Cai, Jianmin Zhao
The Analysis of Efficient Monitoring Grid Traffic with Flow Conservation Equation. [Citation Graph (0, 0)][DBLP] GCC Workshops, 2004, pp:52-58 [Conf]
- Ling Zhang, Jianping Yin, Yu-bin Zhan
An Anonymous Digital Cash and Fair Payment Protocol Utilizing Smart Card in Mobile Environments. [Citation Graph (0, 0)][DBLP] GCC Workshops, 2006, pp:335-340 [Conf]
- Xianghui Liu, Jianping Yin, Zhiping Cai, Shaohe Lv
On the Placement of Active Monitor in IP Network. [Citation Graph (0, 0)][DBLP] ICCNMC, 2005, pp:1181-1187 [Conf]
- En Zhu, Jianping Yin, Guomin Zhang
Fingerprint Enhancement Using Circular Gabor Filter. [Citation Graph (0, 0)][DBLP] ICIAR (2), 2004, pp:750-758 [Conf]
- Yuanli Wang, Xianghui Liu, Jianping Yin
Requirements of Quality of Service in Wireless Sensor Network. [Citation Graph (0, 0)][DBLP] ICN/ICONS/MCL, 2006, pp:116- [Conf]
- Jianping Yin, Zhiping Cai, Wentao Zhao, Xianghui Liu
Passive Calibration of Active Measuring Latency. [Citation Graph (0, 0)][DBLP] ICN (2), 2005, pp:746-753 [Conf]
- Xianghui Liu, Jianping Yin, Zhiping Cai, Xueyuan Huang, Shiming Chen
Optimizing the Distributed Network Monitoring Model with Bounded Bandwidth and Delay Constraints by Genetic Algorithm. [Citation Graph (0, 0)][DBLP] ICNC (2), 2005, pp:913-921 [Conf]
- En Zhu, Jianping Yin, Chunfeng Hu, Guomin Zhang
Quality Estimation of Fingerprint Image Based on Neural Network. [Citation Graph (0, 0)][DBLP] ICNC (2), 2005, pp:65-70 [Conf]
- Zhiping Cai, Wentao Zhao, Jianping Yin, Xianghui Liu
Using Passive Measuring to Calibrate Active Measuring Latency. [Citation Graph (0, 0)][DBLP] ICOIN, 2005, pp:198-206 [Conf]
- Jingbo Hao, Jianping Yin, Boyun Zhang
Evolvable Viral Agent Modeling and Exploration. [Citation Graph (0, 0)][DBLP] ICONIP (3), 2006, pp:866-873 [Conf]
- Xianghui Liu, Jianping Yin, Zhiping Cai, Xicheng Lu, Shiming Chen
Optimizing the Distributed Network Monitoring Model with Bounded Bandwidth and Delay Constraints by Neural Networks. [Citation Graph (0, 0)][DBLP] ISNN (1), 2005, pp:805-810 [Conf]
- Zhiping Cai, Jianping Yin, Fang Liu, Xianghui Liu, Shaohe Lv
Efficiently Passive Monitoring Flow Bandwidth. [Citation Graph (0, 0)][DBLP] NPC, 2005, pp:266-269 [Conf]
- Zhiping Cai, Jianping Yin, Fang Liu, Xianghui Liu, Shaohe Lv
Distributed Active Measuring Link Bandwidth in IP Networks. [Citation Graph (0, 0)][DBLP] NPC, 2005, pp:295-302 [Conf]
- Jingbo Hao, Jianping Yin, Boyun Zhang
Modeling Viral Agents and Their Dynamics with Persistent Turing Machines and Cellular Automata. [Citation Graph (0, 0)][DBLP] PRIMA, 2006, pp:690-695 [Conf]
- Boyun Zhang, Jianping Yin, Jingbo Hao
Using RS and SVM to Detect New Malicious Executable Codes. [Citation Graph (0, 0)][DBLP] RSKT, 2006, pp:574-579 [Conf]
- Ling Zhang, Jianping Yin, Mengjun Li, Jieren Cheng
A Novel Fairness Property of Electronic Commerce Protocols and Its Game-based Formalization. [Citation Graph (0, 0)][DBLP] SEKE, 2006, pp:410-415 [Conf]
- Ling Zhang, Jianping Yin, Yu-bin Zhan
Mining Maximum Frequent Access Patterns in Web Logs Based on Unique Labeled Tree. [Citation Graph (0, 0)][DBLP] WISE Workshops, 2006, pp:73-82 [Conf]
- Yuanli Wang, Xianghui Liu, Jing Ning, Jianping Yin, Yongan Wu
Algorithms for Delay Constrained and Energy Efficiently Routing in Wireless Sensor Network. [Citation Graph (0, 0)][DBLP] WASA, 2006, pp:632-642 [Conf]
- En Zhu, Jianping Yin, Chunfeng Hu, Guomin Zhang, Jianming Zhang
Excluding the Remaining Ridges of Fingerprint Image. [Citation Graph (0, 0)][DBLP] VISAPP (1), 2006, pp:346-353 [Conf]
- En Zhu, Jianping Yin, Guomin Zhang, Chunfeng Hu
Fingerprint Minutiae Relationship Representation and Matching Based on Curve Coordinate System. [Citation Graph (0, 0)][DBLP] Int. J. Image Graphics, 2005, v:5, n:4, pp:729-744 [Journal]
- En Zhu, Jianping Yin, Guomin Zhang, Chunfeng Hu
A Gabor Filter Based Fingerprint Enhancement Scheme Using Average Frequency. [Citation Graph (0, 0)][DBLP] IJPRAI, 2006, v:20, n:3, pp:417-430 [Journal]
- En Zhu, Jianping Yin, Chunfeng Hu, Guomin Zhang
A systematic method for fingerprint ridge orientation estimation and image segmentation. [Citation Graph (0, 0)][DBLP] Pattern Recognition, 2006, v:39, n:8, pp:1452-1472 [Journal]
- En Zhu, Jianping Yin, Guomin Zhang
Fingerprint matching based on global alignment of multiple reference minutiae. [Citation Graph (0, 0)][DBLP] Pattern Recognition, 2005, v:38, n:10, pp:1685-1694 [Journal]
- Shaohe Lv, Xiaodong Wang, Xingming Zhou, Jianping Yin
Towards a New Methodology for Estimating Available Bandwidth on Network Paths. [Citation Graph (0, 0)][DBLP] APPT, 2007, pp:487-496 [Conf]
- Boyun Zhang, Jianping Yin, Jingbo Hao, Dingxing Zhang, Shulin Wang
Malicious Codes Detection Based on Ensemble Learning. [Citation Graph (0, 0)][DBLP] ATC, 2007, pp:468-477 [Conf]
- Boyun Zhang, Jianping Yin, Jingbo Hao, Shulin Wang, Dingxing Zhang
New Malicious Code Detection Based on N-Gram Analysis and Rough Set Theory. [Citation Graph (0, 0)][DBLP] CIS, 2006, pp:626-633 [Conf]
- Jun Long, Jianping Yin, En Zhu
An Active Learning Method Based on Most Possible Misclassification Sampling Using Committee. [Citation Graph (0, 0)][DBLP] MDAI, 2007, pp:104-113 [Conf]
- Boyun Zhang, Jianping Yin, Jingbo Hao
Intelligent Detection Computer Viruses Based on Multiple Classifiers. [Citation Graph (0, 0)][DBLP] UIC, 2007, pp:1181-1190 [Conf]
- Jianping Yin, En Zhu, Xuejun Yang, Guomin Zhang, Chunfeng Hu
Two steps for fingerprint segmentation. [Citation Graph (0, 0)][DBLP] Image Vision Comput., 2007, v:25, n:9, pp:1391-1403 [Journal]
A Computational Model of Computer Worms Based on Persistent Turing Machines. [Citation Graph (, )][DBLP]
A Hybrid Parallel Signature Matching Model for Network Security Applications Using SIMD GPU. [Citation Graph (, )][DBLP]
Associating Minutiae between Distorted Fingerprints Using Minimal Spanning Tree. [Citation Graph (, )][DBLP]
DDoS Attack Detection Method Based on Linear Prediction Model. [Citation Graph (, )][DBLP]
Robust Local Tangent Space Alignment. [Citation Graph (, )][DBLP]
Score based biometric template selection. [Citation Graph (, )][DBLP]
Fingerprint alignment using special ridges. [Citation Graph (, )][DBLP]
Unknown Malicious Codes Detection Based on Rough Set Theory and Support Vector Machine. [Citation Graph (, )][DBLP]
Graph-Based Active Learning Based on Label Propagation. [Citation Graph (, )][DBLP]
A Novel Method for Multibiometric Fusion Based on FAR and FRR. [Citation Graph (, )][DBLP]
Dynamic Neighborhood Selection for Nonlinear Dimensionality Reduction. [Citation Graph (, )][DBLP]
A Large Margin Classifier with Additional Features. [Citation Graph (, )][DBLP]
Model for Survivability of Wireless Sensor Network. [Citation Graph (, )][DBLP]
Active Learning with Misclassification Sampling Using Diverse Ensembles Enhanced by Unlabeled Instances. [Citation Graph (, )][DBLP]
A Prediction Model of DoS Attack's Distribution Discrete Probability. [Citation Graph (, )][DBLP]
Incremental Manifold Learning Algorithm Using PCA on Overlapping Local Neighborhoods for Dimensionality Reduction. [Citation Graph (, )][DBLP]
Adaptive Neighborhood Select Based on Local Linearity for Nonlinear Dimensionality Reduction. [Citation Graph (, )][DBLP]
DDoS Attack Detection Algorithm Using IP Address Features. [Citation Graph (, )][DBLP]
A Max-Margin Learning Algorithm with Additional Features. [Citation Graph (, )][DBLP]
Score Based Biometric Template Selection and Update. [Citation Graph (, )][DBLP]
A Preliminary Study of Coordinated Worm Networks. [Citation Graph (, )][DBLP]
On the Selection of Multi Optimal Imaging Frames in Single Time Slot for Earth Observation Satellite. [Citation Graph (, )][DBLP]
Search in 0.030secs, Finished in 0.033secs
|