Search

Your search keyword '"Xiaofan Yang"' showing total 95 results

Search Constraints

Start Over You searched for: Author "Xiaofan Yang" Remove constraint Author: "Xiaofan Yang" Topic computer science Remove constraint Topic: computer science
95 results on '"Xiaofan Yang"'

Search Results

1. Effective Multiplatform Advertising Policy

2. Developing Cost-Effective Rumor-Refuting Strategy Through Game-Theoretic Approach

3. Defense Against Advanced Persistent Threat Through Data Backup and Recovery

4. A mango picking vision algorithm on instance segmentation and key point detection from RGB images in an open orchard

5. A Risk Management Approach to Defending Against the Advanced Persistent Threat

6. Automatic posture change analysis of lactating sows by action localisation and tube optimisation from untrimmed depth videos

7. An automatic recognition framework for sow daily behaviours based on motion and image analyses

8. A Low-Cost Distributed Denial-of-Service Attack Architecture

9. Automatic recognition of lactating sow postures by refined two-stream RGB-D faster R-CNN

10. A Cost-Effective Algorithm for Selecting Optimal Bandwidth to Clear Malicious Codes

11. A discount strategy in word-of-mouth marketing

12. Seeking Best-Balanced Patch-Injecting Strategies through Optimal Control Approach

13. On Dynamic Recovery of Cloud Storage System Under Advanced Persistent Threats

14. Accelerating the Lagrangian particle tracking of residence time distributions and source water mixing towards large scales

15. Effective Quarantine and Recovery Scheme Against Advanced Persistent Threat

17. Defending against Online Social Network Rumors through Optimal Control Approach

18. Automatic recognition of sow nursing behaviour using deep learning-based segmentation and spatial and temporal features

19. Discount pricing in word-of-mouth marketing: An optimal control approach

20. An effective rumor-containing strategy

21. Automatic recognition of lactating sow postures from depth images by deep learning detector

22. The modeling and analysis of the word-of-mouth marketing

23. A Differential Game Approach to Patch Injection

24. Fast and accurate detection of lactating sow nursing behavior with CNN-based optical flow and features

25. On the competition of two conflicting messages

26. A theoretical method for assessing disruptive computer viruses

27. Dynamic malware containment under an epidemic model with alert

28. On the Optimal Dynamic Control Strategy of Disruptive Computer Virus

29. Security Evaluation of the Cyber Networks Under Advanced Persistent Threats

30. A Novel Node-Level Rumor Propagation Model with Recommendation Mechanism

31. Effective Repair Strategy Against Advanced Persistent Threat: A Differential Game Approach

32. Maximum Profit of Viral Marketing

33. A CNN-based posture change detection for lactating sow in untrimmed depth videos

34. The effect of network topology on the spread of computer viruses: a modelling study

35. Intercomparison of 3D pore-scale flow and solute transport simulation methods

36. Simulating flow in porous media using the lattice Boltzmann method: Intercomparison of single-node boundary schemes from benchmarking to application

37. Cost-effective anti-rumor message-pushing schemes

38. Beidou Weak Signal Acquisition Algorithm Based on Envelope Replaced Differentially Coherent Integration

39. Atmospheric Absorption Loss Estimation of Terahertz-Wave Band Satellite Ground Detection

40. A tradeoff between the losses caused by computer viruses and the risk of the manpower shortage

41. Defending Against Advanced Persistent Threat: A Risk Management Perspective

42. Defending against the Advanced Persistent Threat: An Optimal Control Approach

43. Hybrid multiscale simulation of a mixing-controlled reaction

44. Theoretical and experimental analysis of the impacts of removable storage media and antivirus software on viral spread

45. Conditional Fault Tolerance of Hypermesh Optical Interconnection Networks

46. Propagation of computer virus both across the Internet and external computers: A complex-network approach

47. Propagation of computer virus under the influences of infected external computers and removable storage media

48. Wavelength assignment for locally twisted cube communication pattern on optical bus network-on-chip

49. Optimal wavelength assignment in the implementation of parallel algorithms with ternary n -cube communication pattern on mesh optical network

50. The spread of computer viruses over a reduced scale-free network

Catalog

Books, media, physical & digital resources