Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Yiqiao Cai
@article{DBLP:journals/evi/ShaoCFLL22, author = {Chi Shao and Yiqiao Cai and Shunkai Fu and Jing Li and Wei Luo}, title = {An enhanced utilization mechanism of population information for Differential evolution}, journal = {Evol. Intell.}, volume = {15}, number = {4}, pages = {2247--2259}, year = {2022}, url = {https://doi.org/10.1007/s12065-018-0181-1}, doi = {10.1007/S12065-018-0181-1}, timestamp = {Thu, 10 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/evi/ShaoCFLL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/evi/ZhangCFZ22, author = {Kaikai Zhang and Yiqiao Cai and Shunkai Fu and Huizhen Zhang}, title = {Multiobjective memetic algorithm based on adaptive local search chains for vehicle routing problem with time windows}, journal = {Evol. Intell.}, volume = {15}, number = {4}, pages = {2283--2294}, year = {2022}, url = {https://doi.org/10.1007/s12065-019-00224-7}, doi = {10.1007/S12065-019-00224-7}, timestamp = {Thu, 10 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/evi/ZhangCFZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijis/SunTMCCC22, author = {Congcong Sun and Hui Tian and Wojciech Mazurczyk and Chin{-}Chen Chang and Yiqiao Cai and Yonghong Chen}, title = {Towards blind detection of steganography in low-bit-rate speech streams}, journal = {Int. J. Intell. Syst.}, volume = {37}, number = {12}, pages = {12085--12112}, year = {2022}, url = {https://doi.org/10.1002/int.23077}, doi = {10.1002/INT.23077}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijis/SunTMCCC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/CaiCZLG22, author = {Yiqiao Cai and Meiqin Cheng and Ying Zhou and Peizhong Liu and Jing{-}Ming Guo}, title = {A hybrid evolutionary multitask algorithm for the multiobjective vehicle routing problem with time windows}, journal = {Inf. Sci.}, volume = {612}, pages = {168--187}, year = {2022}, url = {https://doi.org/10.1016/j.ins.2022.08.103}, doi = {10.1016/J.INS.2022.08.103}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/CaiCZLG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/apin/CaiWFZ21, author = {Yiqiao Cai and Duanwei Wu and Shunkai Fu and Shengming Zeng}, title = {Self-regulated differential evolution for real parameter optimization}, journal = {Appl. Intell.}, volume = {51}, number = {8}, pages = {5873--5897}, year = {2021}, url = {https://doi.org/10.1007/s10489-020-01973-0}, doi = {10.1007/S10489-020-01973-0}, timestamp = {Fri, 16 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/apin/CaiWFZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/CaiPLG21, author = {Yiqiao Cai and Deming Peng and Peizhong Liu and Jing{-}Ming Guo}, title = {Evolutionary multi-task optimization with hybrid knowledge transfer strategy}, journal = {Inf. Sci.}, volume = {580}, pages = {874--896}, year = {2021}, url = {https://doi.org/10.1016/j.ins.2021.09.021}, doi = {10.1016/J.INS.2021.09.021}, timestamp = {Wed, 10 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/CaiPLG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/TianLCHC20, author = {Hui Tian and Jie Liu and Chin{-}Chen Chang and Yongfeng Huang and Yiqiao Cai}, title = {Detecting Steganography in Inactive Voice-Over-IP Frames Based on Statistic Characteristics of Fundamental Frequency}, journal = {{IEEE} Access}, volume = {8}, pages = {6117--6129}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2019.2962009}, doi = {10.1109/ACCESS.2019.2962009}, timestamp = {Tue, 09 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/TianLCHC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/CaiWLFL20, author = {Yiqiao Cai and Duanwei Wu and Shaopeng Liu and Shunkai Fu and Peizhong Liu}, title = {Enhancing Differential Evolution on Continuous Optimization Problems by Detecting Promising Leaders}, journal = {{IEEE} Access}, volume = {8}, pages = {226557--226578}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3045423}, doi = {10.1109/ACCESS.2020.3045423}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/CaiWLFL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/WangZLCTCW20, author = {Tian Wang and Jiandian Zeng and Yongxuan Lai and Yiqiao Cai and Hui Tian and Yonghong Chen and Baowei Wang}, title = {Data collection from WSNs to the cloud based on mobile Fog elements}, journal = {Future Gener. Comput. Syst.}, volume = {105}, pages = {864--872}, year = {2020}, url = {https://doi.org/10.1016/j.future.2017.07.031}, doi = {10.1016/J.FUTURE.2017.07.031}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/WangZLCTCW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/TianZCHWCC20, author = {Hui Tian and Zhao{-}Hua Zhu and Chin{-}Chen Chang and Yongfeng Huang and Tian Wang and Yonghong Chen and Yiqiao Cai}, title = {StegoNote: Steganography in Guitar Music Using Note Modulation}, journal = {Int. J. Netw. Secur.}, volume = {22}, number = {1}, pages = {68--79}, year = {2020}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v22-n1/ijns-2020-v22-n1-p68-79.pdf}, timestamp = {Tue, 09 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/TianZCHWCC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/ZhouKCWLHW20, author = {Ying Zhou and Lingjing Kong and Yiqiao Cai and Ziyan Wu and Shaopeng Liu and Jiaming Hong and Keke Wu}, title = {A Decomposition-Based Local Search for Large-Scale Many-Objective Vehicle Routing Problems With Simultaneous Delivery and Pickup and Time Windows}, journal = {{IEEE} Syst. J.}, volume = {14}, number = {4}, pages = {5253--5264}, year = {2020}, url = {https://doi.org/10.1109/JSYST.2019.2959664}, doi = {10.1109/JSYST.2019.2959664}, timestamp = {Wed, 16 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sj/ZhouKCWLHW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/swevo/CaiWZFTD20, author = {Yiqiao Cai and Duanwei Wu and Ying Zhou and Shunkai Fu and Hui Tian and Yongqian Du}, title = {Self-organizing neighborhood-based differential evolution for global optimization}, journal = {Swarm Evol. Comput.}, volume = {56}, pages = {100699}, year = {2020}, url = {https://doi.org/10.1016/j.swevo.2020.100699}, doi = {10.1016/J.SWEVO.2020.100699}, timestamp = {Thu, 02 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/swevo/CaiWZFTD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/CaiSZFTC19, author = {Yiqiao Cai and Chi Shao and Huizhen Zhang and Shunkai Fu and Hui Tian and Yonghong Chen}, title = {A Neighborhood-Assisted Framework for Differential Evolution}, journal = {{IEEE} Access}, volume = {7}, pages = {44338--44358}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2908660}, doi = {10.1109/ACCESS.2019.2908660}, timestamp = {Fri, 31 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/CaiSZFTC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/CaiSZFZT19, author = {Yiqiao Cai and Chi Shao and Ying Zhou and Shunkai Fu and Huizhen Zhang and Hui Tian}, title = {Differential Evolution With Adaptive Guiding Mechanism Based on Heuristic Rules}, journal = {{IEEE} Access}, volume = {7}, pages = {58023--58040}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2914963}, doi = {10.1109/ACCESS.2019.2914963}, timestamp = {Fri, 31 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/CaiSZFZT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/asc/ZhouKWLCL19, author = {Ying Zhou and Lingjing Kong and Ziyan Wu and Shaopeng Liu and Yiqiao Cai and Ye Liu}, title = {Ensemble of multi-objective metaheuristic algorithms for multi-objective unconstrained binary quadratic programming problem}, journal = {Appl. Soft Comput.}, volume = {81}, year = {2019}, url = {https://doi.org/10.1016/j.asoc.2019.105485}, doi = {10.1016/J.ASOC.2019.105485}, timestamp = {Wed, 16 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/asc/ZhouKWLCL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcse/SunC19, author = {Guo Sun and Yiqiao Cai}, title = {Differential evolution with dynamic neighbourhood learning strategy-based mutation operators}, journal = {Int. J. Comput. Sci. Eng.}, volume = {19}, number = {1}, pages = {140--151}, year = {2019}, url = {https://doi.org/10.1504/IJCSE.2019.099647}, doi = {10.1504/IJCSE.2019.099647}, timestamp = {Thu, 30 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcse/SunC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijitm/NanTWCC19, author = {Fulin Nan and Hui Tian and Tian Wang and Yiqiao Cai and Yonghong Chen}, title = {A collusion-resistant public auditing scheme for shared cloud data}, journal = {Int. J. Inf. Technol. Manag.}, volume = {18}, number = {2/3}, pages = {195--212}, year = {2019}, url = {https://doi.org/10.1504/IJITM.2019.099816}, doi = {10.1504/IJITM.2019.099816}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijitm/NanTWCC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ZhuCC19, author = {Bowen Zhu and Yonghong Chen and Yiqiao Cai}, title = {Three Kinds of Network Security Situation Awareness Model Based on Big Data}, journal = {Int. J. Netw. Secur.}, volume = {21}, number = {1}, pages = {115--121}, year = {2019}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v21-n1/ijns-2019-v21-n1-p115-121.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ZhuCC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/LiuCTWC19, author = {Huaijin Liu and Yonghong Chen and Hui Tian and Tian Wang and Yiqiao Cai}, title = {A Secure and Reliable Data Transmission Scheme in Wireless Body Area Network}, journal = {Int. J. Netw. Secur.}, volume = {21}, number = {4}, pages = {648--660}, year = {2019}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v21-n4/ijns-2019-v21-n4-p648-660.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/LiuCTWC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/soco/TianCCHWHCC19, author = {Hui Tian and Zhaoyi Chen and Chin{-}Chen Chang and Yongfeng Huang and Tian Wang and Zheng{-}an Huang and Yiqiao Cai and Yonghong Chen}, title = {Public audit for operation behavior logs with error locating in cloud storage}, journal = {Soft Comput.}, volume = {23}, number = {11}, pages = {3779--3792}, year = {2019}, url = {https://doi.org/10.1007/s00500-018-3038-8}, doi = {10.1007/S00500-018-3038-8}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/soco/TianCCHWHCC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bic-ta/PengCFL19, author = {Deming Peng and Yiqiao Cai and Shunkai Fu and Wei Luo}, editor = {Linqiang Pan and Jing Liang and Boyang Qu}, title = {Experimental Analysis of Selective Imitation for Multifactorial Differential Evolution}, booktitle = {Bio-inspired Computing: Theories and Applications - 14th International Conference, {BIC-TA} 2019, Zhengzhou, China, November 22-25, 2019, Revised Selected Papers, Part {I}}, series = {Communications in Computer and Information Science}, volume = {1159}, pages = {15--26}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-15-3425-6\_2}, doi = {10.1007/978-981-15-3425-6\_2}, timestamp = {Mon, 06 Apr 2020 16:56:00 +0200}, biburl = {https://dblp.org/rec/conf/bic-ta/PengCFL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssci/CaiPFT19, author = {Yiqiao Cai and Deining Peng and Shunkai Fu and Hui Tian}, title = {Multitasking differential evolution with difference vector sharing mechanism}, booktitle = {{IEEE} Symposium Series on Computational Intelligence, {SSCI} 2019, Xiamen, China, December 6-9, 2019}, pages = {3039--3046}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SSCI44817.2019.9002698}, doi = {10.1109/SSCI44817.2019.9002698}, timestamp = {Wed, 26 Feb 2020 16:57:41 +0100}, biburl = {https://dblp.org/rec/conf/ssci/CaiPFT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/WangZBCCTX18, author = {Tian Wang and Jiandian Zeng and Md. Zakirul Alam Bhuiyan and Yonghong Chen and Yiqiao Cai and Hui Tian and Mande Xie}, title = {Energy-efficient relay tracking with multiple mobile camera sensors}, journal = {Comput. Networks}, volume = {133}, pages = {130--140}, year = {2018}, url = {https://doi.org/10.1016/j.comnet.2018.01.002}, doi = {10.1016/J.COMNET.2018.01.002}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/WangZBCCTX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcse/ZhaoC18, author = {Meng Zhao and Yiqiao Cai}, title = {Intelligent selection of parents for mutation in differential evolution}, journal = {Int. J. Comput. Sci. Eng.}, volume = {17}, number = {2}, pages = {133--145}, year = {2018}, url = {https://doi.org/10.1504/IJCSE.2016.10002299}, doi = {10.1504/IJCSE.2016.10002299}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcse/ZhaoC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/CaiLWCT18, author = {Yiqiao Cai and Jingliang Liao and Tian Wang and Yonghong Chen and Hui Tian}, title = {Social learning differential evolution}, journal = {Inf. Sci.}, volume = {433-434}, pages = {464--509}, year = {2018}, url = {https://doi.org/10.1016/j.ins.2016.10.003}, doi = {10.1016/J.INS.2016.10.003}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/CaiLWCT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/SunCWTWC18, author = {Guo Sun and Yiqiao Cai and Tian Wang and Hui Tian and Cheng Wang and Yonghong Chen}, title = {Differential evolution with individual-dependent topology adaptation}, journal = {Inf. Sci.}, volume = {450}, pages = {1--38}, year = {2018}, url = {https://doi.org/10.1016/j.ins.2018.02.048}, doi = {10.1016/J.INS.2018.02.048}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/SunCWTWC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jihmsp/Zhu00C0C18, author = {Zhao{-}Hua Zhu and Hui Tian and Chin{-}Chen Chang and Yonghong Chen and Tian Wang and Yiqiao Cai}, title = {StegTab: Steganography in Guitar Tablatures}, journal = {J. Inf. Hiding Multim. Signal Process.}, volume = {9}, number = {4}, pages = {904--917}, year = {2018}, url = {http://bit.kuas.edu.tw/\%7Ejihmsp/2018/vol9/JIH-MSP-2018-04-013.pdf}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jihmsp/Zhu00C0C18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/LeiZXC18, author = {Qing Lei and Hongbo Zhang and Minghai Xin and Yiqiao Cai}, title = {A hierarchical representation for human action recognition in realistic scenes}, journal = {Multim. Tools Appl.}, volume = {77}, number = {9}, pages = {11403--11423}, year = {2018}, url = {https://doi.org/10.1007/s11042-018-5626-0}, doi = {10.1007/S11042-018-5626-0}, timestamp = {Thu, 09 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mta/LeiZXC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/symmetry/Liu000CC18, author = {Jie Liu and Hui Tian and Chin{-}Chen Chang and Tian Wang and Yonghong Chen and Yiqiao Cai}, title = {Steganalysis of Inactive Voice-Over-IP Frames Based on Poker Test}, journal = {Symmetry}, volume = {10}, number = {8}, pages = {336}, year = {2018}, url = {https://doi.org/10.3390/sym10080336}, doi = {10.3390/SYM10080336}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/symmetry/Liu000CC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ica3pp/ShaoCLL18, author = {Chi Shao and Yiqiao Cai and Wei Luo and Jing Li}, editor = {Jaideep Vaidya and Jin Li}, title = {Differential Evolution with Proximity-Based Replacement Strategy and Elite Archive Mechanism for Global Optimization}, booktitle = {Algorithms and Architectures for Parallel Processing - 18th International Conference, {ICA3PP} 2018, Guangzhou, China, November 15-17, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11335}, pages = {76--89}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-05054-2\_6}, doi = {10.1007/978-3-030-05054-2\_6}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/ica3pp/ShaoCLL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ica3pp/LuC0C0C18, author = {Jing Lu and Yuxiang Chen and Hui Tian and Yonghong Chen and Tian Wang and Yiqiao Cai}, editor = {Ting Hu and Feng Wang and Hongwei Li and Qian Wang}, title = {Improving the Security of a Public Auditing Scheme for Multiple-Replica Dynamic Data}, booktitle = {Algorithms and Architectures for Parallel Processing - {ICA3PP} 2018 International Workshops, Guangzhou, China, November 15-17, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11338}, pages = {185--191}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-05234-8\_23}, doi = {10.1007/978-3-030-05234-8\_23}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ica3pp/LuC0C0C18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ica3pp/WuCLL18, author = {Duanwei Wu and Yiqiao Cai and Jing Li and Wei Luo}, editor = {Jaideep Vaidya and Jin Li}, title = {Enhanced Differential Evolution with Self-organizing Map for Numerical Optimization}, booktitle = {Algorithms and Architectures for Parallel Processing - 18th International Conference, {ICA3PP} 2018, Guangzhou, China, November 15-17, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11335}, pages = {308--318}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-05054-2\_24}, doi = {10.1007/978-3-030-05054-2\_24}, timestamp = {Fri, 07 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ica3pp/WuCLL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/WangZBTCCZ17, author = {Tian Wang and Jiandian Zeng and Md. Zakirul Alam Bhuiyan and Hui Tian and Yiqiao Cai and Yonghong Chen and Bineng Zhong}, title = {Trajectory Privacy Preservation Based on a Fog Structure for Cloud Location Services}, journal = {{IEEE} Access}, volume = {5}, pages = {7692--7701}, year = {2017}, url = {https://doi.org/10.1109/ACCESS.2017.2698078}, doi = {10.1109/ACCESS.2017.2698078}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/WangZBTCCZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/LeiGWLC17, author = {Yu{-}Xiang Lei and Jin Gou and Cheng Wang and Wei Luo and Yiqiao Cai}, title = {Improved Differential Evolution With a Modified Orthogonal Learning Strategy}, journal = {{IEEE} Access}, volume = {5}, pages = {9699--9716}, year = {2017}, url = {https://doi.org/10.1109/ACCESS.2017.2705019}, doi = {10.1109/ACCESS.2017.2705019}, timestamp = {Fri, 13 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/LeiGWLC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/ZouXLPCW17, author = {Tao Zou and Wenzheng Xu and Weifa Liang and Jian Peng and Yiqiao Cai and Tian Wang}, title = {Improving charging capacity for wireless sensor networks by deploying one mobile vehicle with multiple removable chargers}, journal = {Ad Hoc Networks}, volume = {63}, pages = {79--90}, year = {2017}, url = {https://doi.org/10.1016/j.adhoc.2017.05.006}, doi = {10.1016/J.ADHOC.2017.05.006}, timestamp = {Mon, 03 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/adhoc/ZouXLPCW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ahswn/WangWLWTCCW17, author = {Tian Wang and Wenhua Wang and Yongxuan Lai and Sheng Wen and Hui Tian and Yiqiao Cai and Yonghong Chen and Baowei Wang}, title = {The Chaotic Video Surveillance in Mobile Camera Sensor Networks: Improving the Efficiency and Security}, journal = {Ad Hoc Sens. Wirel. Networks}, volume = {37}, number = {1-4}, pages = {95--115}, year = {2017}, url = {http://www.oldcitypublishing.com/journals/ahswn-home/ahswn-issue-contents/ahswn-volume-37-number-1-4-2017/ahswn-37-1-4-p-95-115/}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ahswn/WangWLWTCCW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/asc/GouLGWCL17, author = {Jin Gou and Yu{-}Xiang Lei and Wang{-}Ping Guo and Cheng Wang and Yiqiao Cai and Wei Luo}, title = {A novel improved particle swarm optimization algorithm based on individual difference evolution}, journal = {Appl. Soft Comput.}, volume = {57}, pages = {468--481}, year = {2017}, url = {https://doi.org/10.1016/j.asoc.2017.04.025}, doi = {10.1016/J.ASOC.2017.04.025}, timestamp = {Fri, 13 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/asc/GouLGWCL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/asc/CaiSWTCW17, author = {Yiqiao Cai and Guo Sun and Tian Wang and Hui Tian and Yonghong Chen and Jiahai Wang}, title = {Neighborhood-adaptive differential evolution for global numerical optimization}, journal = {Appl. Soft Comput.}, volume = {59}, pages = {659--706}, year = {2017}, url = {https://doi.org/10.1016/j.asoc.2017.06.002}, doi = {10.1016/J.ASOC.2017.06.002}, timestamp = {Wed, 20 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/asc/CaiSWTCW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/WangWCBLCTCW17, author = {Tian Wang and Wenhua Wang and Jiannong Cao and Md. Zakirul Alam Bhuiyan and Yongxuan Lai and Yiqiao Cai and Hui Tian and Yonghong Chen and Baowei Wang}, title = {Interoperable localization for mobile group users}, journal = {Comput. Commun.}, volume = {105}, pages = {53--65}, year = {2017}, url = {https://doi.org/10.1016/j.comcom.2017.02.006}, doi = {10.1016/J.COMCOM.2017.02.006}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/WangWCBLCTCW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/icl/WangLCTCJW17, author = {Tian Wang and Yang Li and Yonghong Chen and Hui Tian and Yiqiao Cai and Weijia Jia and Baowei Wang}, title = {Fog-Based Evaluation Approach for Trustworthy Communication in Sensor-Cloud System}, journal = {{IEEE} Commun. Lett.}, volume = {21}, number = {11}, pages = {2532--2535}, year = {2017}, url = {https://doi.org/10.1109/LCOMM.2017.2740279}, doi = {10.1109/LCOMM.2017.2740279}, timestamp = {Fri, 20 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/icl/WangLCTCJW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/WangPWLJCTC17, author = {Tian Wang and Zhen Peng and Sheng Wen and Yongxuan Lai and Weijia Jia and Yiqiao Cai and Hui Tian and Yonghong Chen}, title = {Reliable wireless connections for fast-moving rail users based on a chained fog structure}, journal = {Inf. Sci.}, volume = {379}, pages = {160--176}, year = {2017}, url = {https://doi.org/10.1016/j.ins.2016.06.031}, doi = {10.1016/J.INS.2016.06.031}, timestamp = {Fri, 20 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/WangPWLJCTC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/GuoCCWT17, author = {Weipeng Guo and Yonghong Chen and Yiqiao Cai and Tian Wang and Hui Tian}, title = {DIntrusion Detection in {WSN} with an Improved {NSA} Based on the {DE-CMOP}}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {11}, number = {11}, pages = {5574--5591}, year = {2017}, url = {https://doi.org/10.3837/tiis.2017.11.022}, doi = {10.3837/TIIS.2017.11.022}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/GuoCCWT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mis/TianSHWCC17, author = {Hui Tian and Jun Sun and Yongfeng Huang and Tian Wang and Yonghong Chen and Yiqiao Cai}, title = {Detecting Steganography of Adaptive Multirate Speech with Unknown Embedding Rate}, journal = {Mob. Inf. Syst.}, volume = {2017}, pages = {5418978:1--5418978:18}, year = {2017}, url = {https://doi.org/10.1155/2017/5418978}, doi = {10.1155/2017/5418978}, timestamp = {Tue, 09 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mis/TianSHWCC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/WangWWCTCW17, author = {Tian Wang and Qun Wu and Sheng Wen and Yiqiao Cai and Hui Tian and Yonghong Chen and Baowei Wang}, title = {Propagation Modeling and Defending of a Mobile Sensor Worm in Wireless Sensor and Actuator Networks}, journal = {Sensors}, volume = {17}, number = {1}, pages = {139}, year = {2017}, url = {https://doi.org/10.3390/s17010139}, doi = {10.3390/S17010139}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/WangWWCTCW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigpro/TianWCHCWCL17, author = {Hui Tian and Yanpeng Wu and Chin{-}Chen Chang and Yongfeng Huang and Yonghong Chen and Tian Wang and Yiqiao Cai and Jin Liu}, title = {Steganalysis of adaptive multi-rate speech using statistical characteristics of pulse pairs}, journal = {Signal Process.}, volume = {134}, pages = {9--22}, year = {2017}, url = {https://doi.org/10.1016/j.sigpro.2016.11.013}, doi = {10.1016/J.SIGPRO.2016.11.013}, timestamp = {Tue, 09 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigpro/TianWCHCWCL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/soco/TianWCHLWCL17, author = {Hui Tian and Yanpeng Wu and Yiqiao Cai and Yongfeng Huang and Jin Liu and Tian Wang and Yonghong Chen and Jing Lu}, title = {Distributed steganalysis of compressed speech}, journal = {Soft Comput.}, volume = {21}, number = {3}, pages = {795--804}, year = {2017}, url = {https://doi.org/10.1007/s00500-015-1816-0}, doi = {10.1007/S00500-015-1816-0}, timestamp = {Tue, 09 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/soco/TianWCHLWCL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/soco/TianCCKHCCW17, author = {Hui Tian and Zhaoyi Chen and Chin{-}Chen Chang and Minoru Kuribayashi and Yongfeng Huang and Yiqiao Cai and Yonghong Chen and Tian Wang}, title = {Enabling public auditability for operation behaviors in cloud storage}, journal = {Soft Comput.}, volume = {21}, number = {8}, pages = {2175--2187}, year = {2017}, url = {https://doi.org/10.1007/s00500-016-2311-y}, doi = {10.1007/S00500-016-2311-Y}, timestamp = {Tue, 09 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/soco/TianCCKHCCW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/soco/CaiZLWTC17, author = {Yiqiao Cai and Meng Zhao and Jingliang Liao and Tian Wang and Hui Tian and Yonghong Chen}, title = {Neighborhood guided differential evolution}, journal = {Soft Comput.}, volume = {21}, number = {16}, pages = {4769--4812}, year = {2017}, url = {https://doi.org/10.1007/s00500-016-2088-z}, doi = {10.1007/S00500-016-2088-Z}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/soco/CaiZLWTC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsw/WuWCTC17, author = {Qun Wu and Tian Wang and Yiqiao Cai and Hui Tian and Yonghong Chen}, title = {Rumor restraining based on propagation prediction with limited observations in large-scale social networks}, booktitle = {Proceedings of the Australasian Computer Science Week Multiconference, {ACSW} 2017, Geelong, Australia, January 31 - February 3, 2017}, pages = {1:1--1:8}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3014812.3014813}, doi = {10.1145/3014812.3014813}, timestamp = {Tue, 06 Nov 2018 11:06:53 +0100}, biburl = {https://dblp.org/rec/conf/acsw/WuWCTC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cse/ChenTLCCWC17, author = {Zhaoyi Chen and Hui Tian and Jing Lu and Wenqi Chen and Yiqiao Cai and Tian Wang and Yonghong Chen}, title = {Secure Public Audit for Operation Behavior Logs in Shared Cloud Storage}, booktitle = {2017 {IEEE} International Conference on Computational Science and Engineering, {CSE} 2017, and {IEEE} International Conference on Embedded and Ubiquitous Computing, {EUC} 2017, Guangzhou, China, July 21-24, 2017, Volume 2}, pages = {51--57}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CSE-EUC.2017.195}, doi = {10.1109/CSE-EUC.2017.195}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cse/ChenTLCCWC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cse/ShaoSZC17, author = {Chi Shao and Guo Sun and Meng Zhao and Yiqiao Cai}, title = {Adaptive Differential Evolution with Landscape Modality Detection for Global Optimization}, booktitle = {2017 {IEEE} International Conference on Computational Science and Engineering, {CSE} 2017, and {IEEE} International Conference on Embedded and Ubiquitous Computing, {EUC} 2017, Guangzhou, China, July 21-24, 2017, Volume 1}, pages = {204--209}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CSE-EUC.2017.43}, doi = {10.1109/CSE-EUC.2017.43}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cse/ShaoSZC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cse/ChenTLNCWC17, author = {Zhaoyi Chen and Hui Tian and Jing Lu and Fulin Nan and Yiqiao Cai and Tian Wang and Yonghong Chen}, title = {Secure Logging and Public Audit for Operation Behavior in Cloud Storage}, booktitle = {2017 {IEEE} International Conference on Computational Science and Engineering, {CSE} 2017, and {IEEE} International Conference on Embedded and Ubiquitous Computing, {EUC} 2017, Guangzhou, China, July 21-24, 2017, Volume 1}, pages = {444--450}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CSE-EUC.2017.85}, doi = {10.1109/CSE-EUC.2017.85}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cse/ChenTLNCWC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cse/SunC17, author = {Guo Sun and Yiqiao Cai}, title = {A Novel Neighborhood-Dependent Mutation Operator for Differential Evolution}, booktitle = {2017 {IEEE} International Conference on Computational Science and Engineering, {CSE} 2017, and {IEEE} International Conference on Embedded and Ubiquitous Computing, {EUC} 2017, Guangzhou, China, July 21-24, 2017, Volume 1}, pages = {837--841}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CSE-EUC.2017.167}, doi = {10.1109/CSE-EUC.2017.167}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cse/SunC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/asc/ZhouWZQBC16, author = {Yalan Zhou and Jiahai Wang and Yuren Zhou and Zhanyan Qiu and Zhisheng Bi and Yiqiao Cai}, title = {Differential evolution with guiding archive for global numerical optimization}, journal = {Appl. Soft Comput.}, volume = {43}, pages = {424--440}, year = {2016}, url = {https://doi.org/10.1016/j.asoc.2016.02.011}, doi = {10.1016/J.ASOC.2016.02.011}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/asc/ZhouWZQBC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/CaiCWT16, author = {Yiqiao Cai and Yonghong Chen and Tian Wang and Hui Tian}, title = {Improving differential evolution with a new selection method of parents for mutation}, journal = {Frontiers Comput. Sci.}, volume = {10}, number = {2}, pages = {246--269}, year = {2016}, url = {https://doi.org/10.1007/s11704-015-4480-8}, doi = {10.1007/S11704-015-4480-8}, timestamp = {Wed, 20 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fcsc/CaiCWT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/icl/ChenZTWC16, author = {Yonghong Chen and Ning Zhang and Hui Tian and Tian Wang and Yiqiao Cai}, title = {A Novel Connection Correlation Scheme Based on Threshold Secret Sharing}, journal = {{IEEE} Commun. Lett.}, volume = {20}, number = {12}, pages = {2414--2417}, year = {2016}, url = {https://doi.org/10.1109/LCOMM.2016.2604390}, doi = {10.1109/LCOMM.2016.2604390}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/icl/ChenZTWC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/WangPWCCTLZ16, author = {Tian Wang and Zhen Peng and Cheng Wang and Yiqiao Cai and Yonghong Chen and Hui Tian and Junbin Liang and Bineng Zhong}, title = {Extracting Target Detection Knowledge Based on Spatiotemporal Information in Wireless Sensor Networks}, journal = {Int. J. Distributed Sens. Networks}, volume = {12}, number = {2}, pages = {5831471:1--5831471:11}, year = {2016}, url = {https://doi.org/10.1155/2016/5831471}, doi = {10.1155/2016/5831471}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/WangPWCCTLZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jaihc/GuanWCZ16, author = {Wei Guan and Cheng Wang and Yiqiao Cai and Huizhen Zhang}, title = {Design and implementation of wireless monitoring network for temperature-humidity measurement}, journal = {J. Ambient Intell. Humaniz. Comput.}, volume = {7}, number = {1}, pages = {131--138}, year = {2016}, url = {https://doi.org/10.1007/s12652-015-0314-7}, doi = {10.1007/S12652-015-0314-7}, timestamp = {Wed, 01 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jaihc/GuanWCZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsjkx/LiuC00C16a, author = {Huaijin Liu and Yonghong Chen and Hui Tian and Tian Wang and Yiqiao Cai}, title = {{\unicode{20004}}{\unicode{23618}}{\unicode{26080}}{\unicode{32447}}{\unicode{20256}}{\unicode{24863}}{\unicode{32593}}{\unicode{20013}}{\unicode{33410}}{\unicode{33021}}{\unicode{30340}}{\unicode{23433}}{\unicode{20840}}{\unicode{33539}}{\unicode{22260}}{\unicode{26597}}{\unicode{35810}}{\unicode{26041}}{\unicode{27861}} (Privacy and Integrity Protection Range Query Processing in Two-tiered Wireless Sensor Networks)}, journal = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}}, volume = {43}, number = {{Z11}}, pages = {393--397}, year = {2016}, url = {https://doi.org/10.11896/j.issn.1002-137X.2016.11A.090}, doi = {10.11896/J.ISSN.1002-137X.2016.11A.090}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsjkx/LiuC00C16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsjkx/LiuC00C16, author = {Huaijin Liu and Yonghong Chen and Hui Tian and Tian Wang and Yiqiao Cai}, title = {{\unicode{19968}}{\unicode{31181}}{\unicode{21487}}{\unicode{26816}}{\unicode{27979}}{\unicode{25968}}{\unicode{25454}}{\unicode{23436}}{\unicode{25972}}{\unicode{24615}}{\unicode{30340}}{\unicode{23433}}{\unicode{20840}}{\unicode{25968}}{\unicode{25454}}{\unicode{32858}}{\unicode{21512}}{\unicode{21327}}{\unicode{35758}} (Integrity-checking Security Data Aggregation Protocol)}, journal = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}}, volume = {43}, number = {{Z6}}, pages = {353--356}, year = {2016}, url = {https://doi.org/10.11896/j.issn.1002-137X.2016.6A.084}, doi = {10.11896/J.ISSN.1002-137X.2016.6A.084}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsjkx/LiuC00C16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/TianWCHLWCC16, author = {Hui Tian and Yanpeng Wu and Chin{-}Chen Chang and Yongfeng Huang and Jin Liu and Tian Wang and Yonghong Chen and Yiqiao Cai}, title = {Steganalysis of analysis-by-synthesis speech exploiting pulse-position distribution characteristics}, journal = {Secur. Commun. Networks}, volume = {9}, number = {15}, pages = {2934--2944}, year = {2016}, url = {https://doi.org/10.1002/sec.1443}, doi = {10.1002/SEC.1443}, timestamp = {Tue, 09 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/TianWCHLWCC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/soco/CaiWCWTL16, author = {Yiqiao Cai and Jiahai Wang and Yonghong Chen and Tian Wang and Hui Tian and Wei Luo}, title = {Adaptive direction information in differential evolution for numerical optimization}, journal = {Soft Comput.}, volume = {20}, number = {2}, pages = {465--494}, year = {2016}, url = {https://doi.org/10.1007/s00500-014-1517-0}, doi = {10.1007/S00500-014-1517-0}, timestamp = {Wed, 20 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/soco/CaiWCWTL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/soco/LiaoCWTC16, author = {Jingliang Liao and Yiqiao Cai and Tian Wang and Hui Tian and Yonghong Chen}, title = {Cellular direction information based differential evolution for numerical optimization: an empirical study}, journal = {Soft Comput.}, volume = {20}, number = {7}, pages = {2801--2827}, year = {2016}, url = {https://doi.org/10.1007/s00500-015-1682-9}, doi = {10.1007/S00500-015-1682-9}, timestamp = {Wed, 20 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/soco/LiaoCWTC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosn/WangPLWBCC16, author = {Tian Wang and Zhen Peng and Junbin Liang and Sheng Wen and Md. Zakirul Alam Bhuiyan and Yiqiao Cai and Jiannong Cao}, title = {Following Targets for Mobile Tracking in Wireless Sensor Networks}, journal = {{ACM} Trans. Sens. Networks}, volume = {12}, number = {4}, pages = {31:1--31:24}, year = {2016}, url = {https://doi.org/10.1145/2968450}, doi = {10.1145/2968450}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosn/WangPLWBCC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cloudcomp/Chen0LC0C16, author = {Zhaoyi Chen and Hui Tian and Jing Lu and Yiqiao Cai and Tian Wang and Yonghong Chen}, editor = {Jiafu Wan and Kai Lin and Delu Zeng and Jin Li and Yang Xiang and Xiaofeng Liao and Jiwu Huang and Zheli Liu}, title = {Operational-Behavior Auditing in Cloud Storage}, booktitle = {Cloud Computing, Security, Privacy in New Computing Environments - 7th International Conference, CloudComp 2016, and First International Conference, {SPNCE} 2016, Guangzhou, China, November 25-26, and December 15-16, 2016, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {197}, pages = {162--172}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-69605-8\_15}, doi = {10.1007/978-3-319-69605-8\_15}, timestamp = {Sat, 29 Aug 2020 18:19:26 +0200}, biburl = {https://dblp.org/rec/conf/cloudcomp/Chen0LC0C16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cyberc/KongCTWCC16, author = {Xinling Kong and Yonghong Chen and Hui Tian and Tian Wang and Yiqiao Cai and Xin Chen}, editor = {Bin Xie and Xiaolong Xu}, title = {A Novel Botnet Detection Method Based on Preprocessing Data Packet by Graph Structure Clustering}, booktitle = {International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC 2016, Chengdu, China, October 13-15, 2016}, pages = {42--45}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CyberC.2016.16}, doi = {10.1109/CYBERC.2016.16}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/cyberc/KongCTWCC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spaccs/WangWBCTC16, author = {Wenhua Wang and Tian Wang and Md. Zakirul Alam Bhuiyan and Yiqiao Cai and Hui Tian and Yonghong Chen}, editor = {Guojun Wang and Indrakshi Ray and Jose M. Alcaraz Calero and Sabu M. Thampi}, title = {Improving the Localization Probability and Decreasing Communication Cost for Mobile Users}, booktitle = {Security, Privacy and Anonymity in Computation, Communication and Storage - SpaCCS 2016 International Workshops, TrustData, TSP, NOPE, DependSys, BigDataSPT, and WCSSC, Zhangjiajie, China, November 16-18, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10067}, pages = {197--207}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49145-5\_20}, doi = {10.1007/978-3-319-49145-5\_20}, timestamp = {Mon, 05 Feb 2024 20:29:50 +0100}, biburl = {https://dblp.org/rec/conf/spaccs/WangWBCTC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/apin/GouGHWC15, author = {Jin Gou and Wang{-}Ping Guo and Feng Hou and Cheng Wang and Yiqiao Cai}, title = {Adaptive differential evolution with directional strategy and cloud model}, journal = {Appl. Intell.}, volume = {42}, number = {2}, pages = {369--388}, year = {2015}, url = {https://doi.org/10.1007/s10489-014-0592-3}, doi = {10.1007/S10489-014-0592-3}, timestamp = {Fri, 13 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/apin/GouGHWC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/WangCJWWTCZ15, author = {Tian Wang and Yiqiao Cai and Weijia Jia and Sheng Wen and Guojun Wang and Hui Tian and Yonghong Chen and Bineng Zhong}, title = {Maximizing real-time streaming services based on a multi-servers networking framework}, journal = {Comput. Networks}, volume = {93}, pages = {199--212}, year = {2015}, url = {https://doi.org/10.1016/j.comnet.2015.10.019}, doi = {10.1016/J.COMNET.2015.10.019}, timestamp = {Fri, 20 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/WangCJWWTCZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/TianQGHLWCC15, author = {Hui Tian and Jie Qin and Shuting Guo and Yongfeng Huang and Jin Liu and Tian Wang and Yonghong Chen and Yiqiao Cai}, title = {Improved adaptive partial-matching steganography for Voice over {IP}}, journal = {Comput. Commun.}, volume = {70}, pages = {95--108}, year = {2015}, url = {https://doi.org/10.1016/j.comcom.2015.08.011}, doi = {10.1016/J.COMCOM.2015.08.011}, timestamp = {Tue, 09 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/TianQGHLWCC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijitwe/TianQHWLCWC15, author = {Hui Tian and Jie Qin and Yongfeng Huang and Xu An Wang and Jin Liu and Yonghong Chen and Tian Wang and Yiqiao Cai}, title = {A High-Capacity Covering Code for Voice-Over-IP Steganography}, journal = {Int. J. Inf. Technol. Web Eng.}, volume = {10}, number = {3}, pages = {46--63}, year = {2015}, url = {https://doi.org/10.4018/IJITWE.2015070104}, doi = {10.4018/IJITWE.2015070104}, timestamp = {Mon, 03 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijitwe/TianQHWLCWC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/CaiW15, author = {Yiqiao Cai and Jiahai Wang}, title = {Differential evolution with hybrid linkage crossover}, journal = {Inf. Sci.}, volume = {320}, pages = {244--287}, year = {2015}, url = {https://doi.org/10.1016/j.ins.2015.05.026}, doi = {10.1016/J.INS.2015.05.026}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/CaiW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jaihc/ChenWCD15, author = {Ye{-}Wang Chen and Jiong{-}Liang Wang and Yiqiao Cai and Ji{-}Xiang Du}, title = {A method for Chinese text classification based on apparent semantics and latent aspects}, journal = {J. Ambient Intell. Humaniz. Comput.}, volume = {6}, number = {4}, pages = {473--480}, year = {2015}, url = {https://doi.org/10.1007/s12652-015-0257-z}, doi = {10.1007/S12652-015-0257-Z}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jaihc/ChenWCD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jaihc/PengLC15, author = {Zewu Peng and Jingliang Liao and Yiqiao Cai}, title = {Differential evolution with distributed direction information based mutation operators: an optimization technique for big data}, journal = {J. Ambient Intell. Humaniz. Comput.}, volume = {6}, number = {4}, pages = {481--494}, year = {2015}, url = {https://doi.org/10.1007/s12652-015-0259-x}, doi = {10.1007/S12652-015-0259-X}, timestamp = {Mon, 10 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jaihc/PengLC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigpro/TianQHCWLC15, author = {Hui Tian and Jie Qin and Yongfeng Huang and Yonghong Chen and Tian Wang and Jin Liu and Yiqiao Cai}, title = {Optimal matrix embedding for Voice-over-IP steganography}, journal = {Signal Process.}, volume = {117}, pages = {33--43}, year = {2015}, url = {https://doi.org/10.1016/j.sigpro.2015.05.001}, doi = {10.1016/J.SIGPRO.2015.05.001}, timestamp = {Tue, 09 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigpro/TianQHCWLC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/soco/WangC15, author = {Jiahai Wang and Yiqiao Cai}, title = {Multiobjective evolutionary algorithm for frequency assignment problem in satellite communications}, journal = {Soft Comput.}, volume = {19}, number = {5}, pages = {1229--1253}, year = {2015}, url = {https://doi.org/10.1007/s00500-014-1337-2}, doi = {10.1007/S00500-014-1337-2}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/soco/WangC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/3pgcic/QinTHLCWCW15, author = {Jie Qin and Hui Tian and Yongfeng Huang and Jin Liu and Yonghong Chen and Tian Wang and Yiqiao Cai and Xu An Wang}, editor = {Fatos Xhafa and Leonard Barolli and Fabrizio Messina and Marek R. Ogiela}, title = {An Efficient VoIP Steganography Based on Random Binary Matrix}, booktitle = {10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC 2015, Krakow, Poland, November 4-6, 2015}, pages = {462--465}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/3PGCIC.2015.65}, doi = {10.1109/3PGCIC.2015.65}, timestamp = {Mon, 03 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/3pgcic/QinTHLCWCW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/TianWHLCWC15, author = {Hui Tian and Yanpeng Wu and Yongfeng Huang and Jin Liu and Yonghong Chen and Tian Wang and Yiqiao Cai}, title = {Steganalysis of Low Bit-Rate Speech Based on Statistic Characteristics of Pulse Positions}, booktitle = {10th International Conference on Availability, Reliability and Security, {ARES} 2015, Toulouse, France, August 24-27, 2015}, pages = {455--460}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ARES.2015.21}, doi = {10.1109/ARES.2015.21}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/TianWHLCWC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wasa/WangPLCCTZ15, author = {Tian Wang and Zhen Peng and Junbin Liang and Yiqiao Cai and Yonghong Chen and Hui Tian and Bineng Zhong}, editor = {Kuai Xu and Haojin Zhu}, title = {Detecting Targets Based on a Realistic Detection and Decision Model in Wireless Sensor Networks}, booktitle = {Wireless Algorithms, Systems, and Applications - 10th International Conference, {WASA} 2015, Qufu, China, August 10-12, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9204}, pages = {836--844}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-21837-3\_82}, doi = {10.1007/978-3-319-21837-3\_82}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/wasa/WangPLCCTZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijhpsa/CaiDC14, author = {Yiqiao Cai and Ji{-}Xiang Du and Weibin Chen}, title = {Enhancing the search ability of differential evolution through competent leader}, journal = {Int. J. High Perform. Syst. Archit.}, volume = {5}, number = {1}, pages = {50--62}, year = {2014}, url = {https://doi.org/10.1504/IJHPSA.2014.059875}, doi = {10.1504/IJHPSA.2014.059875}, timestamp = {Tue, 24 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijhpsa/CaiDC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcyb/WangLZC14, author = {Jiahai Wang and Jianjun Liao and Ying Zhou and Yiqiao Cai}, title = {Differential Evolution Enhanced With Multiobjective Sorting-Based Mutation Operators}, journal = {{IEEE} Trans. Cybern.}, volume = {44}, number = {12}, pages = {2792--2805}, year = {2014}, url = {https://doi.org/10.1109/TCYB.2014.2316552}, doi = {10.1109/TCYB.2014.2316552}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcyb/WangLZC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/3pgcic/LiaoCCWT14, author = {Jingliang Liao and Yiqiao Cai and Yonghong Chen and Tian Wang and Hui Tian}, title = {Improving Differential Evolution with Ring Topology-Based Mutation Operators}, booktitle = {2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, Guangdong, China, November 8-10, 2014}, pages = {103--109}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/3PGCIC.2014.43}, doi = {10.1109/3PGCIC.2014.43}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/3pgcic/LiaoCCWT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cec/CaiD14, author = {Yiqiao Cai and Ji{-}Xiang Du}, title = {Enhanced differential evolution with adaptive direction information}, booktitle = {Proceedings of the {IEEE} Congress on Evolutionary Computation, {CEC} 2014, Beijing, China, July 6-11, 2014}, pages = {305--312}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CEC.2014.6900228}, doi = {10.1109/CEC.2014.6900228}, timestamp = {Thu, 16 Dec 2021 14:03:16 +0100}, biburl = {https://dblp.org/rec/conf/cec/CaiD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartcomp/WangPCCT14, author = {Tian Wang and Zhen Peng and Yonghong Chen and Yiqiao Cai and Hui Tian}, title = {Continuous tracking for mobile targets with mobility nodes in WSNs}, booktitle = {International Conference on Smart Computing, {SMARTCOMP} 2014, Hong Kong, China, November 3-5, 2014}, pages = {261--268}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/SMARTCOMP.2014.7043867}, doi = {10.1109/SMARTCOMP.2014.7043867}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/smartcomp/WangPCCT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcyb/CaiW13, author = {Yiqiao Cai and Jiahai Wang}, title = {Differential Evolution With Neighborhood and Direction Information for Numerical Optimization}, journal = {{IEEE} Trans. Cybern.}, volume = {43}, number = {6}, pages = {2202--2215}, year = {2013}, url = {https://doi.org/10.1109/TCYB.2013.2245501}, doi = {10.1109/TCYB.2013.2245501}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcyb/CaiW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eidwt/CaiC13, author = {Yiqiao Cai and Weibin Chen}, title = {Adaptive Differential Evolution with Competent Leaders}, booktitle = {2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, Xi'an, Shaanxi, China, September 9-11, 2013}, pages = {204--210}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/EIDWT.2013.40}, doi = {10.1109/EIDWT.2013.40}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eidwt/CaiC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/soco/CaiWY12, author = {Yiqiao Cai and Jiahai Wang and Jian Yin}, title = {Learning-enhanced differential evolution for numerical optimization}, journal = {Soft Comput.}, volume = {16}, number = {2}, pages = {303--330}, year = {2012}, url = {https://doi.org/10.1007/s00500-011-0744-x}, doi = {10.1007/S00500-011-0744-X}, timestamp = {Tue, 18 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/soco/CaiWY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/soco/WangZCY12, author = {Jiahai Wang and Ying Zhou and Yiqiao Cai and Jian Yin}, title = {Learnable tabu search guided by estimation of distribution for maximum diversity problems}, journal = {Soft Comput.}, volume = {16}, number = {4}, pages = {711--728}, year = {2012}, url = {https://doi.org/10.1007/s00500-011-0780-6}, doi = {10.1007/S00500-011-0780-6}, timestamp = {Tue, 18 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/soco/WangZCY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/candie/WangCZWL11, author = {Jiahai Wang and Yiqiao Cai and Yalan Zhou and Rong Long Wang and Caiwei Li}, title = {Discrete particle swarm optimization based on estimation of distribution for terminal assignment problems}, journal = {Comput. Ind. Eng.}, volume = {60}, number = {4}, pages = {566--575}, year = {2011}, url = {https://doi.org/10.1016/j.cie.2010.12.014}, doi = {10.1016/J.CIE.2010.12.014}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/candie/WangCZWL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/WangCY11, author = {Jiahai Wang and Yiqiao Cai and Jian Yin}, title = {Multi-start stochastic competitive Hopfield neural network for frequency assignment problem in satellite communications}, journal = {Expert Syst. Appl.}, volume = {38}, number = {1}, pages = {131--145}, year = {2011}, url = {https://doi.org/10.1016/j.eswa.2010.06.027}, doi = {10.1016/J.ESWA.2010.06.027}, timestamp = {Tue, 18 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/eswa/WangCY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/CaiWYZ11, author = {Yiqiao Cai and Jiahai Wang and Jian Yin and Yalan Zhou}, title = {Memetic clonal selection algorithm with {EDA} vaccination for unconstrained binary quadratic programming problems}, journal = {Expert Syst. Appl.}, volume = {38}, number = {6}, pages = {7817--7827}, year = {2011}, url = {https://doi.org/10.1016/j.eswa.2010.12.124}, doi = {10.1016/J.ESWA.2010.12.124}, timestamp = {Tue, 18 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/eswa/CaiWYZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isnn/CaiWYLZ09, author = {Yiqiao Cai and Jiahai Wang and Jian Yin and Caiwei Li and Yunong Zhang}, editor = {Wen Yu and Haibo He and Nian Zhang}, title = {Multi-start Stochastic Competitive Hopfield Neural Network for p-Median Problem}, booktitle = {Advances in Neural Networks - {ISNN} 2009, 6th International Symposium on Neural Networks, {ISNN} 2009, Wuhan, China, May 26-29, 2009, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {5551}, pages = {75--83}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01507-6\_10}, doi = {10.1007/978-3-642-01507-6\_10}, timestamp = {Tue, 18 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isnn/CaiWYLZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.