Yantao Li
Yantao Li
College of Computer Science, Chongqing University
Verified email at - Homepage
Cited by
Cited by
A distributed spatial–temporal weighted model on MapReduce for short-term traffic flow forecasting
D Xia, B Wang, H Li, Y Li, Z Zhang
Neurocomputing 179, 246-263, 2016
A novel Hash algorithm construction based on chaotic neural network
Y Li, S Deng, D Xiao
Neural Computing & Applications 20 (1), 133-141, 2011
Using Data Augmentation in Continuous Authentication on Smartphones
Y Li, H Hu, G Zhou
IEEE Internet of Things Journal 6 (1), 628-640, 2019
Analysis and improvement of a chaos-based Hash function construction
S Deng, Y Li, D Xiao
Communications in Nonlinear Science and Numerical Simulation 15 (5), 1338-1347, 2010
AdaSense: Adapting sampling rates for activity recognition in body sensor networks
X Qi, M Keally, G Zhou, Y Li, Z Ren
2013 IEEE 19th Real-Time and Embedded Technology and Applications Symposium …, 2013
SCANet: Sensor-based Continuous Authentication with Two-stream Convolutional Neural Networks
Y Li, H Hu, Z Zhu, G Zhou
ACM Transactions on Sensor Networks 16 (3), 1-27, 2020
A map reduce-based nearest neighbor approach for big-data-driven traffic flow prediction
D Xia, H Li, B Wang, Y Li, Z Zhang
IEEE access 4, 2920-2934, 2016
Using Feature Fusion Strategies in Continuous Authentication on Smartphones
Y Li, B Zou, S Deng, G Zhou
IEEE Internet Computing 24 (2), 49-56, 2020
A distributed WND-LSTM model on MapReduce for short-term traffic flow prediction
D Xia, M Zhang, X Yan, Y Bai, Y Zheng, Y Li, H Li
Neural Computing and Applications 33 (7), 2393–2410, 2021
Communication Energy Modeling and Optimization through Joint Packet Size Analysis of BSN and WiFi Networks
Y Li, X Qi, M Keally, Z Ren, G Zhou, D Xiao, S Deng
IEEE Transactions on Parallel and Distributed Systems 24 (9), 1741-1751, 2013
Parallel Hash function construction based on chaotic maps with changeable parameters
Y Li, D Xiao, S Deng, Q Han, G Zhou
Neural Computing & Applications 20 (8), 1305-1312, 2011
Multi-Scale and Multi-Direction GAN for CNN-Based Single Palm-Vein Identification
H Qin, MA El-Yacoubi, Y Li, C Liu
IEEE Transactions on Information Forensics and Security 16, 2652-2666, 2021
Radiosense: Exploiting wireless communication patterns for body sensor network activity recognition
X Qi, G Zhou, Y Li, G Peng
2012 IEEE 33rd Real-Time Systems Symposium, 95-104, 2012
Chaotic hash function based on the dynamic S-Box with variable parameters
Y Li, G Ge, D Xia
Nonlinear Dynamics 84 (4), 2387-2402, 2016
Sensor-Based Continuous Authentication Using Cost-Effective Kernel Ridge Regression
Y Li, H Hu, G Zhou, S Deng
IEEE Access 6, 32554-32565, 2018
Analysis and improvement of a hash-based image encryption algorithm
S Deng, Y Zhan, D Xiao, Y Li
Communications in Nonlinear Science and Numerical Simulation 16 (8), 3269–3278, 2011
Cryptographic and parallel hash function based on cross coupled map lattices suitable for multimedia communication security
Y Li, G Ge
Multimedia Tools and Applications 78 (13), 17973–17994, 2019
A driving behavior detection system based on a smartphone's built‐in sensor
Y Li, F Xue, L Feng, Z Qu
International Journal of Communication Systems 30 (8), 1-13, 2017
A fast and efficient hash function based on generalized chaotic mapping with variable parameters
Y Li, X Li, X Liu
Neural Computing and Applications 28 (6), 1405–1415, 2017
Deciphering an image cipher based on 3-cell chaotic map and biological operations
Y Zhang, Y Li, W Wen, Y Wu, J Chen
Nonlinear Dynamics 82 (4), 1831-1837, 2015
The system can't perform the operation now. Try again later.
Articles 1–20