


Остановите войну!
for scientists:
Chen Yan
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j19]Hua Wang, Yujin Lin, Chen Yan:
T-Maps-Based Tolerance Analysis of Composites Assembly Involving Compensation Strategies. J. Comput. Inf. Sci. Eng. 22(4) (2022) - [j18]Chenggong Du, Yunmei Li, Heng Lyu, Kun Shi, Naisen Liu, Chen Yan, Jinheng Pan, Yulong Guo, Yuan Li:
Characteristics of the Total Suspended Matter Concentration in the Hongze Lake during 1984-2019 Based on Landsat Data. Remote. Sens. 14(12): 2919 (2022) - [j17]Xiaoyu Ji
, Xinyan Zhou
, Chen Yan
, Jiangyi Deng
, Wenyuan Xu:
A Nonlinearity-Based Secure Face-to-Face Device Authentication for Mobile Devices. IEEE Trans. Mob. Comput. 21(4): 1155-1171 (2022) - [c32]Andrew K. Lampinen, Nicholas A. Roy, Ishita Dasgupta, Stephanie Cy Chan, Allison C. Tam, James L. McClelland, Chen Yan, Adam Santoro, Neil C. Rabinowitz, Jane X. Wang, Felix Hill:
Tell me why! Explanations support learning relational and causal structure. ICML 2022: 11868-11890 - [c31]Yan Jiang, Xiaoyu Ji, Kai Wang, Chen Yan, Richard Mitev, Ahmad-Reza Sadeghi, Wenyuan Xu:
WIGHT: Wired Ghost Touch Attack on Capacitive Touchscreens. IEEE Symposium on Security and Privacy 2022: 984-1001 - [i9]Chen Yan, Zhijian Xu, Zhanyuan Yin, Xiaoyu Ji, Wenyuan Xu:
Rolling Colors: Adversarial Laser Exploits against Traffic Light Recognition. CoRR abs/2204.02675 (2022) - [i8]Yan Long, Chen Yan, Shivan Prasad, Wenyuan Xu, Kevin Fu:
Private Eye: On the Limits of Textual Screen Peeking via Eyeglass Reflections in Video Conferencing. CoRR abs/2205.03971 (2022) - [i7]Josh Abramson, Arun Ahuja, Federico Carnevale, Petko Georgiev, Alex Goldin, Alden Hung, Jessica Landon, Timothy P. Lillicrap, Alistair Muldal, Blake A. Richards, Adam Santoro, Tamara von Glehn, Greg Wayne, Nathaniel Wong, Chen Yan:
Evaluating Multimodal Interactive Agents. CoRR abs/2205.13274 (2022) - [i6]Chen Yan, Federico Carnevale, Petko Georgiev, Adam Santoro, Aurelia Guy, Alistair Muldal, Chia-Chun Hung, Josh Abramson, Timothy P. Lillicrap, Gregory Wayne:
Intra-agent speech permits zero-shot task acquisition. CoRR abs/2206.03139 (2022) - 2021
- [j16]Xian Sun
, Peijin Wang
, Zhiyuan Yan, Wenhui Diao, Xiaonan Lu, Zhujun Yang, Yidan Zhang, Deliang Xiang
, Chen Yan, Jie Guo, Bo Dang
, Wei Wei, Feng Xu, Cheng Wang, Ronny Hänsch, Martin Weinmann, Naoto Yokoya, Kun Fu:
Automated High-Resolution Earth Observation Image Interpretation: Outcome of the 2020 Gaofen Challenge. IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. 14: 8922-8940 (2021) - [j15]Chen Yan
, Guoming Zhang, Xiaoyu Ji
, Tianchen Zhang, Taimin Zhang, Wenyuan Xu
:
The Feasibility of Injecting Inaudible Voice Commands to Voice Assistants. IEEE Trans. Dependable Secur. Comput. 18(3): 1108-1124 (2021) - [c30]Xiaoyu Ji, Yushi Cheng, Yuepeng Zhang, Kai Wang, Chen Yan, Wenyuan Xu, Kevin Fu:
Poltergeist: Acoustic Adversarial Machine Learning against Cameras and Computer Vision. IEEE Symposium on Security and Privacy 2021: 160-175 - [i5]Andrew K. Lampinen, Nicholas A. Roy, Ishita Dasgupta, Stephanie C. Y. Chan, Allison C. Tam, James L. McClelland, Chen Yan, Adam Santoro, Neil C. Rabinowitz, Jane X. Wang, Felix Hill:
Tell me why! - Explanations support learning of relational and causal structure. CoRR abs/2112.03753 (2021) - [i4]Josh Abramson, Arun Ahuja, Arthur Brussee, Federico Carnevale, Mary Cassin, Felix Fischer, Petko Georgiev, Alex Goldin, Tim Harley, Felix Hill, Peter C. Humphreys, Alden Hung, Jessica Landon, Timothy P. Lillicrap, Hamza Merzic, Alistair Muldal, Adam Santoro, Guy Scully, Tamara von Glehn, Greg Wayne, Nathaniel Wong, Chen Yan, Rui Zhu:
Creating Multimodal Interactive Agents with Imitation and Self-Supervised Learning. CoRR abs/2112.03763 (2021) - 2020
- [j14]Chen Yan
, Haidong Zhang
:
Attribute Reduction Methods Based on Pythagorean Fuzzy Covering Information Systems. IEEE Access 8: 28484-28495 (2020) - [j13]Haidong Zhang
, Duojie Jia-hua
, Chen Yan
:
Multi-Attribute Group Decision-Making Methods Based on Pythagorean Fuzzy N-Soft Sets. IEEE Access 8: 62298-62309 (2020) - [c29]Zhengping Ding, Chen Yan, Chunli Liu, Jianrui Ji, Yezheng Liu:
Short Text Processing for Analyzing User Portraits: A Dynamic Combination. ICANN (2) 2020: 733-745 - [c28]Chen Yan, Hocheol Shin, Connor Bolton, Wenyuan Xu, Yongdae Kim, Kevin Fu:
SoK: A Minimalist Approach to Formalizing Analog Sensor Security. IEEE Symposium on Security and Privacy 2020: 233-248 - [i3]Josh Abramson, Arun Ahuja, Arthur Brussee, Federico Carnevale, Mary Cassin, Stephen Clark, Andrew Dudzik, Petko Georgiev, Aurelia Guy, Tim Harley, Felix Hill, Alden Hung, Zachary Kenton, Jessica Landon, Timothy P. Lillicrap, Kory W. Mathewson, Alistair Muldal, Adam Santoro, Nikolay Savinov, Vikrant Varma, Greg Wayne, Nathaniel Wong, Chen Yan, Rui Zhu:
Imitating Interactive Intelligence. CoRR abs/2012.05672 (2020) - [i2]Nicolas Gast, Bruno Gaujal, Chen Yan:
Exponential Convergence Rate for the Asymptotic Optimality of Whittle Index Policy. CoRR abs/2012.09064 (2020)
2010 – 2019
- 2019
- [j12]Chen Yan, Kevin Fu, Wenyuan Xu:
On Cuba, diplomats, ultrasound, and intermodulation distortion. Comput. Biol. Medicine 104: 250-266 (2019) - [j11]Peiguo Hou, Zhixuan Wang, Chen Yan:
基于RFID标签的防碰撞算法改进 (Improvement of Anti-collision Algorithm Based on RFID Tag). 计算机科学 46(11A): 359-362 (2019) - [j10]Haitian Pang
, Zhi Wang
, Chen Yan, Qinghua Ding, Kun Yi, Jiangchuan Liu
, Lifeng Sun
:
Content Harvest Network: Optimizing First Mile for Crowdsourced Live Streaming. IEEE Trans. Circuits Syst. Video Technol. 29(7): 2112-2125 (2019) - [c27]Chen Yan, Yan Long, Xiaoyu Ji, Wenyuan Xu:
The Catcher in the Field: A Fieldprint based Spoofing Detection for Text-Independent Speaker Verification. CCS 2019: 1215-1229 - [c26]Xinyan Zhou, Xiaoyu Ji, Chen Yan, Jiangyi Deng, Wenyuan Xu:
NAuth: Secure Face-to-Face Device Authentication via Nonlinearity. INFOCOM 2019: 2080-2088 - 2018
- [j9]Wenyuan Xu, Chen Yan
, Weibin Jia, Xiaoyu Ji
, Jianhao Liu:
Analyzing and Enhancing the Security of Ultrasonic Sensors for Autonomous Vehicles. IEEE Internet Things J. 5(6): 5015-5029 (2018) - [j8]Chen Yan
, Emre Salman
:
Mono3D: Open Source Cell Library for Monolithic 3-D Integrated Circuits. IEEE Trans. Circuits Syst. I Regul. Pap. 65-I(3): 1075-1085 (2018) - [j7]Chen Yan
, Jaya Dofe, Scott Kontak, Qiaoyan Yu, Emre Salman
:
Hardware-Efficient Logic Camouflaging for Monolithic 3-D ICs. IEEE Trans. Circuits Syst. II Express Briefs 65-II(6): 799-803 (2018) - [c25]Wei Tu, Chen Yan, Yiping Yan, Xu Ding, Lifeng Sun:
Who Is Earning? Understanding and Modeling the Virtual Gifts Behavior of Users in Live Streaming Economy. MIPR 2018: 118-123 - [c24]Sun Ruizong, Xiang Guangli, Gao Qiwei, Chen Yan:
A study of location privacy protection about kinteresting points query based on double anchors. UPINLBS 2018: 1-7 - 2017
- [j6]Chen Yan, Zhihua Gan, Emre Salman:
Package-embedded spiral inductor characterization with application to switching buck converters. Microelectron. J. 66: 41-47 (2017) - [j5]Chen Yan, Zhirong Wang, Kai Liu, Qingqing Zuo, Yaya Zhen, Shangfeng Zhang:
Numerical simulation of size effects of gas explosions in spherical vessels. Simul. 93(8): 695-705 (2017) - [c23]Guoming Zhang, Chen Yan, Xiaoyu Ji
, Tianchen Zhang, Taimin Zhang, Wenyuan Xu:
DolphinAttack: Inaudible Voice Commands. CCS 2017: 103-117 - [c22]Jaya Dofe, Zhiming Zhang, Qiaoyan Yu, Chen Yan, Emre Salman:
Impact of Power Distribution Network on Power Analysis Attacks in Three-Dimensional Integrated Circuits. ACM Great Lakes Symposium on VLSI 2017: 327-332 - [c21]Chen Yan, Emre Salman:
Routing Congestion Aware Cell Library Development for Monolithic 3D ICs. ICRC 2017: 1-4 - [c20]Chen Yan, Zhengqun Wang, Xue Zhou:
Design of a detection system of faces intercepted by video based on the skin color model. ICSAI 2017: 165-169 - [c19]Chen Yan, Qiqi Xie, Qiulin Chen, Li Zhang, Yaodong Cui, Zuqiang Meng:
The Optimization Algorithm of Circle Stock Problem with Standard Usage Leftover. IFIP TC12 ICIS 2017: 234-240 - [c18]Chen Yan, Zhihua Gan, Emre Salman:
In-package spiral inductor characterization for high efficiency buck converters. ISCAS 2017: 1-4 - [c17]Chen Yan, Scott Kontak, Hailang Wang, Emre Salman:
Open source cell library Mono3D to develop large-scale monolithic 3D integrated circuits. ISCAS 2017: 1-4 - [c16]Haitian Pang, Zhi Wang, Chen Yan, Qinghua Ding, Lifeng Sun:
First Mile in Crowdsourced Live Streaming: A Content Harvest Network Approach. ACM Multimedia (Thematic Workshops) 2017: 101-109 - [c15]Chen Yan, Peng Wang, Lifeng Sun:
Sensing Urban with Wi-Fi and Satellite: Functional Region Discovery across Cities. ACM Multimedia (Thematic Workshops) 2017: 314-322 - [c14]Chen Yan, Peng Wang, Haitian Pang, Lifeng Sun, Shiqiang Yang:
CELoF: WiFi Dwell Time Estimation in Free Environment. MMM (1) 2017: 503-514 - [c13]Chen Yan, Peng Wang, Chutong Xu, Lifeng Sun:
Visualizing Wi-Fi accesses from city-scale population for urban analysis. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017: 1-8 - [i1]Guoming Zhang, Chen Yan, Xiaoyu Ji, Taimin Zhang, Tianchen Zhang, Wenyuan Xu:
DolphinAtack: Inaudible Voice Commands. CoRR abs/1708.09537 (2017) - 2016
- [c12]Jaya Dofe, Chen Yan, Scott Kontak, Emre Salman, Qiaoyan Yu:
Transistor-level camouflaged logic locking method for monolithic 3D IC security. AsianHOST 2016: 1-6 - 2014
- [c11]Jie Chen, Ping Li, Chong Su, Dapeng Fu, Chen Yan:
Online Learning-Prediction Based Diagnosis Decision Support System Towards Swallowing Dysfunction in Rehabilitation Medicine. RiTA 2014: 769-783 - 2013
- [c10]Chen Yan, Jiang Yuhong:
An exploratory study of employing blogs as a platform for English learning beyond the classroom. ITHET 2013: 1-5 - 2012
- [c9]Chen Yan, Jiang Yuhong:
Integration of ICTs into subject teaching in pre-service English teacher education. ITHET 2012: 1-5 - 2011
- [c8]Chen Yan, Julien Cordry:
Increased Game Immersion by Using Live Player-Mapped Avatar Evolution. Edutainment 2011: 276-280 - [c7]Yingying Zhai, Ying Li, Chen Yan, Yu Zhang:
Computational Prediction Model of Macrosegregation in Continuously Casting Steel Blooms. ICDMA 2011: 316-319
2000 – 2009
- 2009
- [j4]Romain Pellerin, Chen Yan, Julien Cordry, Eric Gressier-Soudan
:
Player Profile Management on NFC Smart Card for Multiplayer Ubiquitous Games. Int. J. Comput. Games Technol. 2009: 323095:1-323095:9 (2009) - [j3]Stéphane Natkin, Chen Yan:
Adaptive Narration in Multiplayer Ubiquitous Games. Int. J. Cogn. Informatics Nat. Intell. 3(2): 61-83 (2009) - [c6]Ivo Flammer, Chen Yan, Wolf Ka, August Flammer, Jean-Paul Cheung, Romain Pellerin:
Player Feedback Evaluation: Indicating Mass Public Potential for Pervasive Games. ICEC 2009: 252-257 - [c5]Liu Shuyong, Chen Yan, Yang Ming, Ding Rui:
Bicluster Algorithm and Used in Market Analysis. WKDD 2009: 504-507 - 2007
- [c4]Stéphane Natkin, Chen Yan, Sylvie Jumpertz, Bernard Marquet:
Creating Multiplayer Ubiquitous Games using an adaptive narration model based on a user's model. DiGRA Conference 2007 - 2006
- [c3]Stéphane Natkin, Chen Yan:
User model in multiplayer mixed reality entertainment applications. Advances in Computer Entertainment Technology 2006: 74 - [c2]Stéphane Natkin, Chen Yan:
User model in multiplayer mixed reality entertainment applications. Advances in Computer Entertainment Technology 2006: 85 - 2005
- [c1]Stéphane Natkin, Chen Yan:
Analysis of Correspondences between Real and Virtual Worlds in General Public Applications. CGIV 2005: 323-332 - 2004
- [j2]Raja Sengupta
, Chen Yan:
A Hybrid Spatio-Temporal Data Model and Structure (HST-DMS) for Efficient Storage and Retrieval of Land Use Information. Trans. GIS 8(3): 351-366 (2004)
1990 – 1999
- 1999
- [j1]Chen Zheng, He Ping, Chen Yan:
A mathematical model using artificial neural networks to forecast shares tendency. Appl. Math. Comput. 99(1): 71-76 (1999)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2022-08-01 21:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint