default search action
Yadong Wan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Xiaofen Wang, Haodong Shi, Xiaotong Zhang, Yadong Wan, Peng Wang:
MicEMD: Open-source toolbox for electromagnetic modeling, inversion, and classification in underground metal target detection. SoftwareX 27: 101812 (2024) - [i1]Cheng Xu, Changtian Zhang, Yuchen Shi, Ran Wang, Shihong Duan, Yadong Wan, Xiaotong Zhang:
Subgoal-based Hierarchical Reinforcement Learning for Multi-Agent Collaboration. CoRR abs/2408.11416 (2024) - 2023
- [j16]Xiaofen Wang, Peng Wang, Xiaotong Zhang, Yadong Wan, Wen Liu, Haodong Shi:
Efficient and robust Levenberg-Marquardt Algorithm based on damping parameters for parameter inversion in underground metal target detection. Comput. Geosci. 176: 105354 (2023) - 2021
- [j15]Yadong Wan, Tong Li, Peng Wang, Shihong Duan, Chao Zhang, Na Li:
Robust and Efficient Classification for Underground Metal Target Using Dimensionality Reduction and Machine Learning. IEEE Access 9: 7384-7401 (2021) - [j14]Zhuang Li, Jingyan Qin, Xiaotong Zhang, Yadong Wan:
Addressing Class Overlap under Imbalanced Distribution: An Improved Method and Two Metrics. Symmetry 13(9): 1649 (2021) - [c12]Zhuang Li, Jingyan Qin, Haiyan Gong, Xiaotong Zhang, Yadong Wan:
Enhancing the generalization of feature construction using genetic programming for imbalanced data with augmented non-overlap degree. BIBM 2021: 960-965 - 2020
- [j13]Yadong Wan, Zhen Wang, Peng Wang, Chao Zhang, Shihong Duan, Na Li:
A Comparative Study of Inversion Optimization Algorithms for Underground Metal Target Detection. IEEE Access 8: 126401-126413 (2020)
2010 – 2019
- 2019
- [j12]Shihong Duan, Yue Li, Yadong Wan, Peng Wang, Zhen Wang, Na Li:
Sensitivity Analysis and Classification Algorithms Comparison for Underground Target Detection. IEEE Access 7: 116227-116246 (2019) - [c11]Wei Yang, Hao Wang, Yadong Wan, Yuanlong Cao, Zhiming Zhang, Shaolong Chen:
A Security Architecture for Internet of Things Based on Blockchain. BlockSys 2019: 363-368 - [c10]Shihong Duan, Yue Li, Peng Wang, Yadong Wan, Liyuan Xu, Tong Li:
The Influence of Target Orientation on the Underground Targets Classification. ICCT 2019: 487-494 - 2018
- [j11]Yadong Wan, Xinqiang Luo, Yue Qi, Jie He, Qin Wang:
Access-driven cache attack resistant and fast AES implementation. Int. J. Embed. Syst. 10(1): 32-40 (2018) - [j10]Wei Yang, Jie He, Yadong Wan, Qin Wang:
物联网通信协议的安全研究综述 (Security for Communication Protocols in Internet of Things: A Survey). 计算机科学 45(12): 32-41 (2018) - [j9]Wei Yang, Yadong Wan, Jie He, Yuanlong Cao:
Security Vulnerabilities and Countermeasures for Time Synchronization in TSCH Networks. Wirel. Commun. Mob. Comput. 2018: 1954121:1-1954121:14 (2018) - [c9]Wei Yang, Yuan Wang, Zhixiang Lai, Yadong Wan, Zhuo Cheng:
Security Vulnerabilities and Countermeasures in the RPL-Based Internet of Things. CyberC 2018 - 2017
- [j8]Yiping Li, Xiaotong Zhang, Jun Zeng, Yadong Wan, Fuqiang Ma:
A Distributed TDMA Scheduling Algorithm Based on Energy-Topology Factor in Internet of Things. IEEE Access 5: 10757-10768 (2017) - [j7]Wei Yang, Yadong Wan, Qin Wang:
Enhanced secure time synchronisation protocol for IEEE802.15.4e-based industrial Internet of Things. IET Inf. Secur. 11(6): 369-376 (2017) - [j6]Hangxing Wu, Hongbin Wang, Yadong Wan, Ming Zhang:
Improving the convergence time of DCTCP to reduce the completion time of short flows: a congestion window-based method. IET Networks 6(5): 112-115 (2017) - [j5]Wei Yang, Qin Wang, Yadong Wan, Yue Qi:
Time synchronisation attacks and defences in IEEE802.15.4e networks. Int. J. Embed. Syst. 9(6): 548-559 (2017) - [j4]Wei Yang, Qin Wang, Yadong Wan, Jie He:
IEEE802.15.4e 标准的安全多跳时间同步协议设计 (Design of Secure Multi-hop Time Synchronization Protocol for IEEE802.15.4e). 计算机科学 44(3): 175-181 (2017) - 2016
- [c8]Wei Yang, Qin Wang, Yadong Wan, Jie He:
Security Vulnerabilities and Countermeasures for Time Synchronization in IEEE802.15.4e Networks. CSCloud 2016: 102-107 - 2015
- [j3]Xinqiang Luo, Yue Qi, Yadong Wan, Qin Wang:
面向无线传感器网络的抗攻击低开销AES实现方法 (Attack-resistant and Low-cost AES Implementation for Wireless Sensor Network). 计算机科学 42(Z6): 402-407 (2015) - 2014
- [j2]Yadong Wan, Shihong Duan:
Link Layer Time-Varying Model for IEEE 802.15.4 Radio in Industrial Environment. Int. J. Distributed Sens. Networks 10 (2014) - [c7]Xinqiang Luo, Yue Qi, Yadong Wan, Qin Wang, Hong Zhang:
A Fast AES Encryption Method Based on Single LUT for Industrial Wireless Network. IIKI 2014: 158-161 - 2013
- [c6]Xinqiang Luo, Yue Qi, Yadong Wan, Qin Wang:
Overhead Model of CCM for Industrial Wireless Network. HPCC/EUC 2013: 1203-1208 - [c5]Yishuang Geng, Yadong Wan, Jie He, Kaveh Pahlavan:
An empirical channel model for the effect of human body on ray tracing. PIMRC 2013: 47-52 - [c4]Yadong Wan, Shihong Duan:
Study on IEEE802.15.4 link reliability in industrial environment. WiSEE 2013: 1-7 - 2012
- [c3]Huan Wang, Yanwei Yu, Qin Wang, Yadong Wan:
A density-based clustering structure mining algorithm for data streams. BigMine 2012: 69-76 - [c2]Xiaotong Zhang, Qiong Luo, Liang Cheng, Yadong Wan, Hongling Song, Yanhong Yang:
CRTRA: Coloring route-tree based resource allocation algorithm for industrial wireless sensor networks. WCNC 2012: 1870-1875
2000 – 2009
- 2008
- [j1]Chong Li, Xiaotong Zhang, Yadong Wan, Qin Wang:
A Co-verification Method Based on TWCNP-OS for Two-way Cable Network SOC. Int. J. Commun. Netw. Syst. Sci. 1(2): 199-206 (2008) - [c1]Yadong Wan, Lei Li, Jie He, Xiaotong Zhang, Qin Wang:
Anshan: Wireless Sensor Networks for Equipment Fault Diagnosis in the Process Industry. SECON 2008: 314-322
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-01 20:45 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint