default search action
Yitao Yang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j12]Yitao Yang, Lidong Zhang:
Event-triggered adaptive tracking control of a class of nonlinear systems with asymmetric time-varying output constraints. Frontiers Inf. Technol. Electron. Eng. 25(8): 1134-1144 (2024) - [c22]Xin Tan, Jiamin Li, Yitao Yang, Jingzong Li, Hong Xu:
Arlo: Serving Transformer-based Language Models with Dynamic Input Lengths. ICPP 2024: 367-376 - [i4]Xin Tan, Yimin Jiang, Yitao Yang, Hong Xu:
Teola: Towards End-to-End Optimization of LLM-based Applications. CoRR abs/2407.00326 (2024) - 2023
- [j11]Xiaokun Hu, Qiangqiang Zhao, Yitao Yang, Shaoke Wan, Yanhui Sun, Jun Hong:
Accuracy analysis for machine tool spindles considering full parallel connections and form errors based on skin model shapes. J. Comput. Des. Eng. 10(5): 1970-1987 (2023) - [c21]Qiaowei Ma, Weiheng Liu, Yitao Yang, Chao Xu, Hongtao Ling, Jinghui Zhong:
The SCUT Text-To-Speech System for the Blizzard Challenge 2023. Blizzard Challenge 2023 - [c20]Jiamin Li, Qiang Su, Yitao Yang, Yimin Jiang, Cong Wang, Hong Xu:
Adaptive Gating in Mixture-of-Experts based Language Models. EMNLP 2023: 3577-3587 - [c19]Qiaowei Ma, Jinghui Zhong, Yitao Yang, Weiheng Liu, Ying Gao, Wing W. Y. Ng:
A Lightweight and Efficient Model for Audio Anti-Spoofing. MMAsia 2023: 31:1-31:7 - [c18]Yitao Yang, Tao Yang:
Self-Organizing Network and Adaptive Scheduling Mechanism in 5G Wireless Networks. PCCNT 2023: 67:1-67:5 - [i3]Jiamin Li, Qiang Su, Yitao Yang, Yimin Jiang, Cong Wang, Hong Xu:
Adaptive Gating in Mixture-of-Experts based Language Models. CoRR abs/2310.07188 (2023) - 2022
- [c17]Yitao Yang, Xiucai Ye, Tetsuya Sakurai:
Multi-View Federated Learning with Data Collaboration. ICMLC 2022: 178-183 - [c16]Weiheng Liu, Yitao Yang, Jinghui Zhong:
Towards Dual-Modal Crowd Density Forecasting in Transportation Building. IJCNN 2022: 1-8 - [i2]Qiaowei Ma, Jinghui Zhong, Yitao Yang, Weiheng Liu, Ying Gao, Wing W. Y. Ng:
ConvNext Based Neural Network for Anti-Spoofing. CoRR abs/2209.06434 (2022) - 2021
- [j10]Mingyue Qiu, Yitao Yang:
Analysis of the Current Situation and Characteristics of College Student "Online Fraud Cases". Int. J. Mob. Comput. Multim. Commun. 12(2): 56-73 (2021) - [c15]Weiheng Liu, Yitao Yang, Jiangwei Li, Jinghui Zhong:
The SCUT Text-To-Speech System for the Blizzard Challenge 2021. Blizzard Challenge 2021 - [i1]Yitao Yang, Bin Jia, Xiao-Yong Yan, Rui Jiang, Hao Ji, Ziyou Gao:
Identifying intracity freight trip ends from heavy truck GPS trajectories. CoRR abs/2106.09881 (2021) - 2020
- [j9]Jinyin Chen, Keke Hu, Yitao Yang, Yi Liu, Qi Xuan:
Collective transfer learning for defect prediction. Neurocomputing 416: 103-116 (2020) - [c14]Fahua Qian, Jian Cheng, Xinmeng Wang, Yitao Yang, Chanchan Li:
Design of In-depth Security Protection System of Integrated Intelligent Police Cloud. 3PGCIC 2020: 356-365 - [c13]Yitao Yang, Jinghui Zhong, Shehui Bu:
Submission from SCUT for Blizzard Challenge 2020. Blizzard Challenge / Voice Conversion Challenge 2020 - [c12]Yitao Yang, Yubao Wu, Xu An Wang:
Trusted Records Scheme in Scene Investigation. NBiS 2020: 303-308
2010 – 2019
- 2019
- [j8]Jinyin Chen, Yitao Yang, Keke Hu, Qi Xuan, Yi Liu, Chao Yang:
Multiview Transfer Learning for Software Defect Prediction. IEEE Access 7: 8901-8916 (2019) - [c11]Yitao Yang, Runqiu Hu, Guozi Sun, Chengyan Qiu:
Chinese Spam Data Filter Model in Mobile Internet. ICACT 2019: 339-343 - [c10]Jinyin Chen, Yitao Yang, Keke Hu, Haibin Zheng, Zhen Wang:
DAD-MCNN: DDoS Attack Detection via Multi-channel CNN. ICMLC 2019: 484-488 - 2017
- [j7]Yitao Yang, Zheng Xu, Liying Liu, Guozi Sun:
A security carving approach for AVI video based on frame size and index. Multim. Tools Appl. 76(3): 3293-3312 (2017) - [j6]Yitao Yang, Jingmin He, Zhongqin Gao, Bingbing Wang:
Exit times for the diffusion risk model with debit interest. Int. J. Syst. Assur. Eng. Manag. 8(2s): 1810-1815 (2017) - [c9]Yitao Yang, Runqiu Hu, Chengyan Qiu, Guozi Sun, Huakang Li:
A Spam Message Detection Model Based on Bayesian Classification. EIDWT 2017: 424-435 - [c8]Runqiu Hu, Yitao Yang:
Spam Mail Filtering Method Based on Suffix Tree. EIDWT 2017: 436-447 - 2016
- [c7]Huakang Li, Xinwen Zhang, Yitao Yang, Guozi Sun:
A Demonstration of Encrypted Logistics Information System. APWeb (2) 2016: 525-528 - [c6]Xuesong Jia, Danni Ren, Yitao Yang, Huakang Li, Guozi Sun:
DFIPS: Toward Distributed Flexible Intrusion Prevention System in Software Defined Network. SEKE 2016: 124-127 - [c5]Huakang Li, Zhenyu Wang, Yitao Yang, Guozi Sun:
A Security Proxy Scheme Based on Attribute Node Mapping for Cloud Storage. SpaCCS 2016: 14-25 - [c4]Xinwen Zhang, Huakang Li, Yitao Yang, Guozi Sun, Guangxuan Chen:
LIPPS: Logistics Information Privacy Protection System Based on Encrypted QR Code. Trustcom/BigDataSE/ISPA 2016: 996-1000 - 2015
- [c3]Fan Zhou, Yitao Yang, Zhaokun Ding, Guozi Sun:
Dump and analysis of Android volatile memory on Wechat. ICC 2015: 7151-7156 - 2014
- [c2]Siqi Huang, Yitao Yang, Huakang Li, Guozi Sun:
Topic Detection from Microblog Based on Text Clustering and Topic Model Analysis. APSCC 2014: 88-92 - [c1]Guozi Sun, Siqi Huang, Wan Bao, Yitao Yang, Zhiwei Wang:
A privacy protection policy combined with privacy homomorphism in the Internet of Things. ICCCN 2014: 1-6 - 2013
- [j5]Yitao Yang, Xiaolin Qin, Guozi Sun, Yong Xu, Zhongxue Yang, Zhiyue Zu:
Data Deduplication in Wireless Multimedia Monitoring Network. Int. J. Distributed Sens. Networks 9 (2013) - 2010
- [j4]Yitao Yang, Fanwei Meng:
Positive solutions of the singular semipositone boundary value problem on time scales. Math. Comput. Model. 52(3-4): 481-489 (2010)
2000 – 2009
- 2009
- [j3]Yitao Yang:
Robust mixed H2/H∞ Control for uncertain Systems with Time delay. Control. Intell. Syst. 37(1) (2009) - 2008
- [j2]Dehong Ji, Yitao Yang, Weigao Ge:
Triple positive pseudo-symmetric solutions to a four-point boundary value problem with p-Laplacian. Appl. Math. Lett. 21(3): 268-274 (2008) - 2007
- [j1]Dehong Ji, Weigao Ge, Yitao Yang:
The existence of symmetric positive solutions for Sturm-Liouville-like four-point boundary value problem with a p-Laplacian operator. Appl. Math. Comput. 189(2): 1087-1098 (2007)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint