Skip to main content

previous disabled Page of 2
and
  1. No Access

    Chapter and Conference Paper

    MVFAN: Multi-view Feature Assisted Network for 4D Radar Object Detection

    4D radar is recognized for its resilience and cost-effectiveness under adverse weather conditions, thus playing a pivotal role in autonomous driving. While cameras and LiDAR are typically the primary sensors u...

    Qiao Yan, Yihan Wang in Neural Information Processing (2024)

  2. No Access

    Chapter and Conference Paper

    RPF3D: Range-Pillar Feature Deep Fusion 3D Detector for Autonomous Driving

    In this paper, we present RPF3D, an innovative single-stage framework that explores the complementary nature of point clouds and range images for 3D object detection. Our method addresses the sampling region imba...

    Yihan Wang, Qiao Yan in Neural Information Processing (2024)

  3. Article

    Open Access

    Optimizing fluidity and tensile strength of magnetically driven epoxy-cement repair materials based on response surface

    Underwater crack repair is challenging due to drainage and exhaust, slurry retention at fixed points, and other issues. Magnetically driven epoxy resin cement slurry was developed, which can perform directiona...

    Shifu Qin, Jie Liu, ** Wang, Fan Yu, Zheng Li, Delin Tan in Scientific Reports (2023)

  4. No Access

    Article

    Android malware adversarial attacks based on feature importance prediction

    In the last decade, malicious Android applications have increased rapidly because of the popularity of Android mobile devices. In particular, some Android malware starts to use the adversarial examples generat...

    Yan** Guo, Qiao Yan in International Journal of Machine Learning and Cybernetics (2023)

  5. No Access

    Chapter and Conference Paper

    Design of Brake Disc Dust Cover Based on Multidisciplinary Optimization Method

    Modal, stiffness, vibration durability and other multidisciplinary properties need to be considered in the structural design of brake disc dust cover

    Qiao Yan, Wu **aoLong, Shi ChaoLiang in Proceedings of China SAE Congress 2021: Se… (2023)

  6. No Access

    Chapter and Conference Paper

    Multi-objective Optimization of Motor Rotor Notches Based on Multi-Objective Particle Swarm Optimization

    In response to the national carbon neutral strategy, the electric vehicle industry has developed rapidly in recent years, and users are increasingly concerned about the NVH performance of electric vehicles. In...

    Qiao Yan, Liu **glin, Qiao Yongming in The proceedings of the 10th Frontier Acade… (2023)

  7. No Access

    Article

    ECC-based lightweight authentication and access control scheme for IoT E-healthcare

    The E-healthcare system has a complex architecture, diverse business types, and sensitive data security. To meet the secure communication and access control requirements in the user–medical server, user–patien...

    Hailong Yao, Qiao Yan, **ngbing Fu, Zhibin Zhang, Caihui Lan in Soft Computing (2022)

  8. No Access

    Article

    Synchrotron-Based Temperature-Dependent Terahertz and Far-Infrared Spectroscopy of Aerographite and Single-Walled Carbon Nanotube Aerogel

    Synchrotron-based terahertz and far-infrared spectra of aerographite and single-walled carbon nanotube aerogel were acquired using the terahertz/far-infrared beamline at the Australian Synchrotron in the frequ...

    Hao Zhang, Qiao Yan in Journal of Infrared, Millimeter, and Terahertz Waves (2022)

  9. No Access

    Article

    Geomorphic natural hazard on loess terrain: expansion on the gully sidewall

    Gully sidewall expansion is an important geomorphic natural hazard, and the expansion destroys a large extent of agricultural land in the loess regions every year. The main aim of this study was to identify th...

    Yulei Ma, **angzhou Xu, Peiqing **ao, Qiao Yan, Chao Zhao in Natural Hazards (2021)

  10. Article

    Open Access

    The influence law of concrete aggregate particle size on acoustic emission wave attenuation

    Elastic waves have different attenuation laws when propagating in various materials, which is one of the important challenges in the application of non-destructive testing methods, such as acoustic emission (A...

    **n Wu, Qiao Yan, Ahmadreza Hedayat, Xuemei Wang in Scientific Reports (2021)

  11. No Access

    Article

    Scalar and Vector Evaluation Methods for Remaining Oil Potential of Water-Driven Reservoirs

    In recent years, numerical simulation and streamline simulation methods have been commonly used for characterizing and evaluating oil reservoirs. The conventional characterization parameters include oil satura...

    Liu Fan, Qiao Yan, Wang Kai, Zhou Wensheng in Chemistry and Technology of Fuels and Oils (2021)

  12. No Access

    Article

    The impact of propagation delay to different selfish miners in proof-of-work blockchains

    Selfish mining is an attack on the integrity of a blockchain network. Inspired by J. Göbel’s selfish mining model in the presence of propagation delay, we propose a competition model based on spatial Poisson p...

    Heli Wang, Qiao Yan, Victor C. M. Leung in Peer-to-Peer Networking and Applications (2021)

  13. Article

    Open Access

    Echinacoside exerts anti-tumor activity via the miR-503-3p/TGF-β1/Smad aixs in liver cancer

    Echinacoside (ECH) is the main active ingredient of Cistanches Herba, which is known to have therapeutic effects on metastatic tumors. However, the effects of ECH on liver cancer are still unclear. This study was...

    Wen Li, **g Zhou, Yajie Zhang, **g Zhang, Xue Li, Qiao Yan in Cancer Cell International (2021)

  14. No Access

    Chapter and Conference Paper

    The Study of the User Preferences of the Request Channel on Taking Over During Level-3 Automated Vehicles’ Driving Process

    When a level-3 automated vehicle fails with an autonomous driving system or encounters an unmanageable traffic situation, the driver needs to control the vehicle to ensure driving safety. The transfer process ...

    Qiao Yan, Yu**g Wang, Jiaru Chen in Cross-Cultural Design. Applications in Cul… (2021)

  15. No Access

    Article

    An actor-critic reinforcement learning-based resource management in mobile edge computing systems

    Reinforcement learning (RL) as an effective tool has attracted great attention in wireless communication field nowadays. In this paper, we investigate the offloading decision and resource allocation problem in...

    Fang Fu, Zhicai Zhang, Fei Richard Yu in International Journal of Machine Learning … (2020)

  16. Article

    Open Access

    Experimental study on evolution law for particle breakage during coal and gas outburst

    Coal and gas outburst is a dynamic phenomenon in underground mining engineering that is often accompanied by the throwing and breakage of large amounts of coal. To study the crushing effect and its evolution d...

    **n Wu, Yawen Peng, Jiang Xu, Qiao Yan in International Journal of Coal Science & Te… (2020)

  17. No Access

    Article

    Automatically synthesizing DoS attack traces using generative adversarial networks

    Artificial intelligence (AI) technology ruling people is still the scene in the science fiction film, but hackers using AI technology against existing security measures is an inescapable trend. Network intrusi...

    Qiao Yan, Mingde Wang, Wenyao Huang in International Journal of Machine Learning … (2019)

  18. Article

    Open Access

    Unbiased transcriptomic analyses reveal distinct effects of immune deficiency in CNS function with and without injury

    The mammalian central nervous system (CNS) is considered an immune privileged system as it is separated from the periphery by the blood brain barrier (BBB). Yet, immune functions have been postulated to heavil...

    Dandan Luo, Weihong Ge, **ao Hu, Chen Li, Chia-Ming Lee, Liqiang Zhou in Protein & Cell (2019)

  19. No Access

    Chapter and Conference Paper

    A DDoS Detection and Mitigation System Framework Based on Spark and SDN

    Distributed Denial of Service (DDoS) attack is a serious threat to commercial service network. DDoS attack has been studied for years. However, detecting and relieving DDoS attacks are still a problem. Especia...

    Qiao Yan, Wenyao Huang in Smart Computing and Communication (2017)

  20. No Access

    Article

    Application of integrated ARIMA and RBF network for groundwater level forecasting

    The combination model of autoregressive integrated moving average (ARIMA) and radial basis function network (RBFN) is used for the prediction of monthly groundwater level. The ARIMA model is used to estimate t...

    Qiao Yan, Cong Ma in Environmental Earth Sciences (2016)

previous disabled Page of 2