The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Jianping Yin: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Zhiping Cai, Jianping Yin, Xianghui Liu, Shaohe Lv
    An Approximation Algorithm for Weak Vertex Cover Problem in Network Management. [Citation Graph (0, 0)][DBLP]
    AAIM, 2005, pp:243-251 [Conf]
  2. Jianping Yin, Shaohe Lv, Zhiping Cai, Chi Liu
    On a Novel Filtering Mechanism for Capacity Estimation: Extended Version. [Citation Graph (0, 0)][DBLP]
    AINTEC, 2005, pp:269-281 [Conf]
  3. Shaohe Lv, Jianping Yin, Zhiping Cai, Chi Liu
    On a Novel Methodology for Estimating Available Bandwidth Along Network Paths. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:703-710 [Conf]
  4. Boyun Zhang, Jianping Yin, Jingbo Hao
    Using Fuzzy Pattern Recognition to Detect Unknown Malicious Executables Code. [Citation Graph (0, 0)][DBLP]
    FSKD (1), 2005, pp:629-634 [Conf]
  5. Xianghui Liu, Jianping Yin, Xicheng Lu, Zhiping Cai, Jianmin Zhao
    The Analysis of Efficient Monitoring Grid Traffic with Flow Conservation Equation. [Citation Graph (0, 0)][DBLP]
    GCC Workshops, 2004, pp:52-58 [Conf]
  6. Ling Zhang, Jianping Yin, Yu-bin Zhan
    An Anonymous Digital Cash and Fair Payment Protocol Utilizing Smart Card in Mobile Environments. [Citation Graph (0, 0)][DBLP]
    GCC Workshops, 2006, pp:335-340 [Conf]
  7. Xianghui Liu, Jianping Yin, Zhiping Cai, Shaohe Lv
    On the Placement of Active Monitor in IP Network. [Citation Graph (0, 0)][DBLP]
    ICCNMC, 2005, pp:1181-1187 [Conf]
  8. En Zhu, Jianping Yin, Guomin Zhang
    Fingerprint Enhancement Using Circular Gabor Filter. [Citation Graph (0, 0)][DBLP]
    ICIAR (2), 2004, pp:750-758 [Conf]
  9. Yuanli Wang, Xianghui Liu, Jianping Yin
    Requirements of Quality of Service in Wireless Sensor Network. [Citation Graph (0, 0)][DBLP]
    ICN/ICONS/MCL, 2006, pp:116- [Conf]
  10. Jianping Yin, Zhiping Cai, Wentao Zhao, Xianghui Liu
    Passive Calibration of Active Measuring Latency. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:746-753 [Conf]
  11. Xianghui Liu, Jianping Yin, Zhiping Cai, Xueyuan Huang, Shiming Chen
    Optimizing the Distributed Network Monitoring Model with Bounded Bandwidth and Delay Constraints by Genetic Algorithm. [Citation Graph (0, 0)][DBLP]
    ICNC (2), 2005, pp:913-921 [Conf]
  12. En Zhu, Jianping Yin, Chunfeng Hu, Guomin Zhang
    Quality Estimation of Fingerprint Image Based on Neural Network. [Citation Graph (0, 0)][DBLP]
    ICNC (2), 2005, pp:65-70 [Conf]
  13. Zhiping Cai, Wentao Zhao, Jianping Yin, Xianghui Liu
    Using Passive Measuring to Calibrate Active Measuring Latency. [Citation Graph (0, 0)][DBLP]
    ICOIN, 2005, pp:198-206 [Conf]
  14. Jingbo Hao, Jianping Yin, Boyun Zhang
    Evolvable Viral Agent Modeling and Exploration. [Citation Graph (0, 0)][DBLP]
    ICONIP (3), 2006, pp:866-873 [Conf]
  15. Xianghui Liu, Jianping Yin, Zhiping Cai, Xicheng Lu, Shiming Chen
    Optimizing the Distributed Network Monitoring Model with Bounded Bandwidth and Delay Constraints by Neural Networks. [Citation Graph (0, 0)][DBLP]
    ISNN (1), 2005, pp:805-810 [Conf]
  16. Zhiping Cai, Jianping Yin, Fang Liu, Xianghui Liu, Shaohe Lv
    Efficiently Passive Monitoring Flow Bandwidth. [Citation Graph (0, 0)][DBLP]
    NPC, 2005, pp:266-269 [Conf]
  17. Zhiping Cai, Jianping Yin, Fang Liu, Xianghui Liu, Shaohe Lv
    Distributed Active Measuring Link Bandwidth in IP Networks. [Citation Graph (0, 0)][DBLP]
    NPC, 2005, pp:295-302 [Conf]
  18. Jingbo Hao, Jianping Yin, Boyun Zhang
    Modeling Viral Agents and Their Dynamics with Persistent Turing Machines and Cellular Automata. [Citation Graph (0, 0)][DBLP]
    PRIMA, 2006, pp:690-695 [Conf]
  19. Boyun Zhang, Jianping Yin, Jingbo Hao
    Using RS and SVM to Detect New Malicious Executable Codes. [Citation Graph (0, 0)][DBLP]
    RSKT, 2006, pp:574-579 [Conf]
  20. Ling Zhang, Jianping Yin, Mengjun Li, Jieren Cheng
    A Novel Fairness Property of Electronic Commerce Protocols and Its Game-based Formalization. [Citation Graph (0, 0)][DBLP]
    SEKE, 2006, pp:410-415 [Conf]
  21. Ling Zhang, Jianping Yin, Yu-bin Zhan
    Mining Maximum Frequent Access Patterns in Web Logs Based on Unique Labeled Tree. [Citation Graph (0, 0)][DBLP]
    WISE Workshops, 2006, pp:73-82 [Conf]
  22. Yuanli Wang, Xianghui Liu, Jing Ning, Jianping Yin, Yongan Wu
    Algorithms for Delay Constrained and Energy Efficiently Routing in Wireless Sensor Network. [Citation Graph (0, 0)][DBLP]
    WASA, 2006, pp:632-642 [Conf]
  23. En Zhu, Jianping Yin, Chunfeng Hu, Guomin Zhang, Jianming Zhang
    Excluding the Remaining Ridges of Fingerprint Image. [Citation Graph (0, 0)][DBLP]
    VISAPP (1), 2006, pp:346-353 [Conf]
  24. En Zhu, Jianping Yin, Guomin Zhang, Chunfeng Hu
    Fingerprint Minutiae Relationship Representation and Matching Based on Curve Coordinate System. [Citation Graph (0, 0)][DBLP]
    Int. J. Image Graphics, 2005, v:5, n:4, pp:729-744 [Journal]
  25. En Zhu, Jianping Yin, Guomin Zhang, Chunfeng Hu
    A Gabor Filter Based Fingerprint Enhancement Scheme Using Average Frequency. [Citation Graph (0, 0)][DBLP]
    IJPRAI, 2006, v:20, n:3, pp:417-430 [Journal]
  26. En Zhu, Jianping Yin, Chunfeng Hu, Guomin Zhang
    A systematic method for fingerprint ridge orientation estimation and image segmentation. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition, 2006, v:39, n:8, pp:1452-1472 [Journal]
  27. En Zhu, Jianping Yin, Guomin Zhang
    Fingerprint matching based on global alignment of multiple reference minutiae. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition, 2005, v:38, n:10, pp:1685-1694 [Journal]
  28. Shaohe Lv, Xiaodong Wang, Xingming Zhou, Jianping Yin
    Towards a New Methodology for Estimating Available Bandwidth on Network Paths. [Citation Graph (0, 0)][DBLP]
    APPT, 2007, pp:487-496 [Conf]
  29. Boyun Zhang, Jianping Yin, Jingbo Hao, Dingxing Zhang, Shulin Wang
    Malicious Codes Detection Based on Ensemble Learning. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:468-477 [Conf]
  30. Boyun Zhang, Jianping Yin, Jingbo Hao, Shulin Wang, Dingxing Zhang
    New Malicious Code Detection Based on N-Gram Analysis and Rough Set Theory. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:626-633 [Conf]
  31. Jun Long, Jianping Yin, En Zhu
    An Active Learning Method Based on Most Possible Misclassification Sampling Using Committee. [Citation Graph (0, 0)][DBLP]
    MDAI, 2007, pp:104-113 [Conf]
  32. Boyun Zhang, Jianping Yin, Jingbo Hao
    Intelligent Detection Computer Viruses Based on Multiple Classifiers. [Citation Graph (0, 0)][DBLP]
    UIC, 2007, pp:1181-1190 [Conf]
  33. Jianping Yin, En Zhu, Xuejun Yang, Guomin Zhang, Chunfeng Hu
    Two steps for fingerprint segmentation. [Citation Graph (0, 0)][DBLP]
    Image Vision Comput., 2007, v:25, n:9, pp:1391-1403 [Journal]

  34. A Computational Model of Computer Worms Based on Persistent Turing Machines. [Citation Graph (, )][DBLP]


  35. A Hybrid Parallel Signature Matching Model for Network Security Applications Using SIMD GPU. [Citation Graph (, )][DBLP]


  36. Associating Minutiae between Distorted Fingerprints Using Minimal Spanning Tree. [Citation Graph (, )][DBLP]


  37. DDoS Attack Detection Method Based on Linear Prediction Model. [Citation Graph (, )][DBLP]


  38. Robust Local Tangent Space Alignment. [Citation Graph (, )][DBLP]


  39. Score based biometric template selection. [Citation Graph (, )][DBLP]


  40. Fingerprint alignment using special ridges. [Citation Graph (, )][DBLP]


  41. Unknown Malicious Codes Detection Based on Rough Set Theory and Support Vector Machine. [Citation Graph (, )][DBLP]


  42. Graph-Based Active Learning Based on Label Propagation. [Citation Graph (, )][DBLP]


  43. A Novel Method for Multibiometric Fusion Based on FAR and FRR. [Citation Graph (, )][DBLP]


  44. Dynamic Neighborhood Selection for Nonlinear Dimensionality Reduction. [Citation Graph (, )][DBLP]


  45. A Large Margin Classifier with Additional Features. [Citation Graph (, )][DBLP]


  46. Model for Survivability of Wireless Sensor Network. [Citation Graph (, )][DBLP]


  47. Active Learning with Misclassification Sampling Using Diverse Ensembles Enhanced by Unlabeled Instances. [Citation Graph (, )][DBLP]


  48. A Prediction Model of DoS Attack's Distribution Discrete Probability. [Citation Graph (, )][DBLP]


  49. Incremental Manifold Learning Algorithm Using PCA on Overlapping Local Neighborhoods for Dimensionality Reduction. [Citation Graph (, )][DBLP]


  50. Adaptive Neighborhood Select Based on Local Linearity for Nonlinear Dimensionality Reduction. [Citation Graph (, )][DBLP]


  51. DDoS Attack Detection Algorithm Using IP Address Features. [Citation Graph (, )][DBLP]


  52. A Max-Margin Learning Algorithm with Additional Features. [Citation Graph (, )][DBLP]


  53. Score Based Biometric Template Selection and Update. [Citation Graph (, )][DBLP]


  54. A Preliminary Study of Coordinated Worm Networks. [Citation Graph (, )][DBLP]


  55. On the Selection of Multi Optimal Imaging Frames in Single Time Slot for Earth Observation Satellite. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.305secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002