default search action
Yadi Wang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j23]Bingbing Jiang, Jun Liu, Zidong Wang, Chenglong Zhang, Jie Yang, Yadi Wang, Weiguo Sheng, Weiping Ding:
Semi-supervised multi-view feature selection with adaptive similarity fusion and learning. Pattern Recognit. 159: 111159 (2025) - 2024
- [j22]Yadi Wang, Mengyao Huang, Liming Zhou, Hangjun Che, Bingbing Jiang:
Multi-cluster nonlinear unsupervised feature selection via joint manifold learning and generalized Lasso. Expert Syst. Appl. 255: 124502 (2024) - [j21]Wangyang Yu, Yadi Wang, Lu Liu, Yisheng An, Bo Yuan, John Panneerselvam:
A Multiperspective Fraud Detection Method for Multiparticipant E-Commerce Transactions. IEEE Trans. Comput. Soc. Syst. 11(2): 1564-1576 (2024) - [j20]Yadi Wang, Jun Wang, Nikhil R. Pal:
Supervised Feature Selection via Collaborative Neurodynamic Optimization. IEEE Trans. Neural Networks Learn. Syst. 35(5): 6878-6892 (2024) - [c12]Yadi Wang, Yu-Chen Chang, Linlin Li, Yunwei Sheng, Sheba Sow, Susan R. Fussell:
Emoji Interpretation and Usage in Bilingual Communication. HCI (61) 2024: 157-167 - 2023
- [j19]Xianyu Zuo, Xiangyu Wang, Wenbo Zhang, Yadi Wang:
MISPSO-Attack: An efficient adversarial watermarking attack based on multiple initial solution particle swarm optimization. Appl. Soft Comput. 147: 110777 (2023) - [j18]Yadi Wang, Hongyun Zhang, Duoqian Miao, Witold Pedrycz:
Multi-granularity re-ranking for visible-infrared person re-identification. CAAI Trans. Intell. Technol. 8(3): 770-779 (2023) - [j17]Yadi Wang, Jun Wang:
Neurodynamics-driven holistic approaches to semi-supervised feature selection. Neural Networks 157: 377-386 (2023) - [j16]Yadi Wang, Jun Wang, Dacheng Tao:
Neurodynamics-driven supervised feature selection. Pattern Recognit. 136: 109254 (2023) - [j15]Yadi Wang, Xiaoping Li, Rubén Ruiz:
Feature Selection With Maximal Relevance and Minimal Supervised Redundancy. IEEE Trans. Cybern. 53(2): 707-717 (2023) - [c11]Ather Sharif, Ruican Zhong, Yadi Wang:
Conveying Uncertainty in Data Visualizations to Screen-Reader Users Through Non-Visual Means. ASSETS 2023: 67:1-67:6 - [c10]Yadi Wang, Xiaoding Guo, Yibo Zhang, Yiyuan Ren, Wendi Huang, Zunyan Liu, Yuming Feng, Xiangguang Dai, Wei Zhang, Hangjun Che:
An Adaptive Framework of Multimodal Emotion Recognition Based on Collaborative Discriminative Learning. ICACI 2023: 1-8 - 2022
- [j14]Xiaoping Li, Dongyuan Pan, Yadi Wang, Rubén Ruiz:
Scheduling multi-tenant cloud workflow tasks with resource reliability. Sci. China Inf. Sci. 65(9): 1-18 (2022) - [j13]Yadi Wang, Zefeng Zhang, Yinghao Lin:
Multi-Cluster Feature Selection Based on Isometric Mapping. IEEE CAA J. Autom. Sinica 9(3): 570-572 (2022) - [j12]Bingbing Jiang, Junhao Xiang, Xingyu Wu, Yadi Wang, Huanhuan Chen, Weiwei Cao, Weiguo Sheng:
Robust multi-view learning via adaptive regression. Inf. Sci. 610: 916-937 (2022) - [j11]Lei Xia, Christoph Rosner, Yadi Wang, Xiaorong Zhou, Frank E. Maas, Rinaldo Baldini Ferroli, Haiming Hu, Guangshun Huang:
Proton Electromagnetic Form Factors in the Time-like Region through the Scan Technique. Symmetry 14(2): 231 (2022) - [j10]Xiaoping Li, Yadi Wang, Rubén Ruiz:
A Survey on Sparse Learning Models for Feature Selection. IEEE Trans. Cybern. 52(3): 1642-1660 (2022) - [j9]Yadi Wang, Wangyang Yu, Peng Teng, Guanjun Liu, Dongming Xiang:
A Detection Method for Abnormal Transactions in E-Commerce Based on Extended Data Flow Conformance Checking. Wirel. Commun. Mob. Comput. 2022: 4434714:1-4434714:14 (2022) - [c9]Yadi Wang, Yicheng Pan, Meng Ma, Ping Wang:
Abnormal Situation Simulation and Dynamic Causality Discovery in Urban Traffic Networks (Short Paper). COSIT 2022: 22:1-22:7 - 2021
- [j8]Yadi Wang, Xiaoping Li, Jun Wang:
A neurodynamic optimization approach to supervised feature selection via fractional programming. Neural Networks 136: 194-206 (2021) - [j7]Yadi Wang, Jun Wang, Hangjun Che:
Two-timescale neurodynamic approaches to supervised feature selection based on alternative problem formulations. Neural Networks 142: 180-191 (2021) - 2020
- [c8]Yadi Wang, Xiaoping Li, Jun Wang:
A Neurodynamic Approach to L0-Constrained Optimization. ICACI 2020: 44-50
2010 – 2019
- 2019
- [j6]Juntao Li, Yadi Wang, Huimin Xiao, Cunshuan Xu:
Gene selection of rat hepatocyte proliferation using adaptive sparse group lasso with weighted gene co-expression network analysis. Comput. Biol. Chem. 80: 364-373 (2019) - [j5]Yadi Wang, Xiaoping Li, Rubén Ruiz:
Weighted General Group Lasso for Gene Selection in Cancer Classification. IEEE Trans. Cybern. 49(8): 2860-2873 (2019) - [c7]Yadi Wang, Xiaoping Li, Rubén Ruiz, Xia Zhu:
Feature Selection via Adaptive Spectral Clustering based on Joint Mutual Information. CSCWD 2019: 164-169 - [c6]Ke Li, Xiaochun Lu, Yadi Wang:
Quantitative Relationship Model of Express Service Network and Service Facilities in Beijing. SMC 2019: 312-317 - 2017
- [j4]Yu Xin, Yadi Wang, Zhiqiang Xie, Jing Yang:
A cooperative scheduling method based on the device load feedback for multiple tasks scheduling. J. Netw. Comput. Appl. 99: 110-119 (2017) - [j3]Juntao Li, Yimin Cao, Yadi Wang, Huimin Xiao:
Online Learning Algorithms for Double-Weighted Least Squares Twin Bounded Support Vector Machines. Neural Process. Lett. 45(1): 319-339 (2017) - 2016
- [j2]Juntao Li, Yadi Wang, Yimin Cao, Cunshuan Xu:
Weighted doubly regularized support vector machine and its application to microarray classification with noise. Neurocomputing 173: 595-605 (2016) - 2012
- [c5]Hailin Li, Yadi Wang, Jihong Han:
A Novel Method for Modeling Complex Network of Software System Security. SERE (Companion) 2012: 24-26
2000 – 2009
- 2009
- [j1]Jihong Han, Zhiyong Zhou, Yadi Wang:
Automatic Verification for Secrecy of Cryptographic Protocols in First-Order Logic. Int. J. Distributed Sens. Networks 5(1): 14 (2009) - [c4]Hengjun Wang, Yadi Wang, Jihong Han:
A Security Architecture for Tactical Mobile Ad Hoc Networks. WKDD 2009: 312-315 - 2008
- [c3]Hengjun Wang, Yadi Wang, Jihong Han, Yuchen Zhang, Min Liu:
Analysis of Distributed CA Model for MANETs Based on Queuing Theory. PACIIA (1) 2008: 497-501 - [c2]Yuchen Zhang, Jing Liu, Yadi Wang, Jihong Han, Hengjun Wang, Kun Wang:
Identity-Based Threshold Key Management for Ad Hoc Networks. PACIIA (2) 2008: 797-801 - 2005
- [c1]Yuanbo Guo, Jianfeng Ma, Yadi Wang:
An Intrusion-Resilient Authorization and Authentication Framework for Grid Computing Infrastructure. International Conference on Computational Science (3) 2005: 229-236
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-08 01:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint