default search action
Yuan Niu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j5]Hui Bai, Tian Fan, Yuan Niu, Zhihua Cui:
Multi-UAV Cooperative Trajectory Planning Based on Many-Objective Evolutionary Algorithm. Complex Syst. Model. Simul. 2(2): 130-141 (2022) - [c15]Yuan Niu, Feihu Huang, Hui Zhou, Jian Peng:
Deep Spatio-Temporal Method for ADHD Classification Using Resting-State fMRI. ICTAI 2022: 1082-1087 - [c14]Yuan Niu, Xiaogang Fu, Yunbing Wang:
Research on PCB Defect Detection Algorithm Based on Improved YOLOv5. RICAI 2022: 1220-1224 - [i1]Juntao Jiang, Yuan Niu, Yi Tao:
The First IEEE UV2022 Mathematical Modelling Competition: Backgrounds and Problems. CoRR abs/2212.07903 (2022) - 2021
- [j4]Yuan Niu, Xuejie He, Guijuan Hao, Liang Wang:
Genetic Algorithm-Based Computed Tomography Image Analysis for the Diagnosis and Mental Health of COVID-19 Patients in Early Low-Incidence Areas. Sci. Program. 2021: 2297206:1-2297206:9 (2021)
2010 – 2019
- 2019
- [j3]Antonis C. Stylianou, Chandrasekar Subramaniam, Yuan Niu:
The Role of Knowledge Management in the Relationship between IT Capability and Interorganizational Performance: An Empirical Investigation. Commun. Assoc. Inf. Syst. 45: 4 (2019) - [c13]Qixing Wang, Fei Miao, Jie Wu, Yuan Niu, Chengliang Wang, Nicholas E. Lownes:
Dynamic Pricing for Autonomous Vehicle E-hailing Services Reliability and Performance Improvement. CASE 2019: 948-953 - [c12]Theo Bertram, Elie Bursztein, Stephanie Caro, Hubert Chao, Rutledge Chin Feman, Peter Fleischer, Albin Gustafsson, Jess Hemerly, Chris Hibbert, Luca Invernizzi, Lanah Kammourieh Donnelly, Jason Ketover, Jay Laefer, Paul Nicholas, Yuan Niu, Harjinder Obhi, David Price, Andrew Strait, Kurt Thomas, Al Verney:
Five Years of the Right to be Forgotten. CCS 2019: 959-972 - 2018
- [c11]Yuan Niu, Jianping Zheng:
Message Passing Algorithm for GFDM-IM Detection. DSP 2018: 1-5 - 2016
- [c10]Frank Li, Grant Ho, Eric Kuan, Yuan Niu, Lucas Ballard, Kurt Thomas, Elie Bursztein, Vern Paxson:
Remedying Web Hijacking: Notification Effectiveness and Webmaster Comprehension. WWW 2016: 1009-1019 - 2015
- [j2]Sungjune Park, Antonis C. Stylianou, Chandrasekar Subramaniam, Yuan Niu:
Information technology and interorganizational learning: An investigation of knowledge exploration and exploitation processes. Inf. Manag. 52(8): 998-1011 (2015) - 2011
- [c9]Yuan Niu, Hao Chen:
Gesture Authentication with Touch Input for Mobile Devices. MobiSec 2011: 13-24 - 2010
- [c8]Richard Chow, Markus Jakobsson, Ryusuke Masuoka, Jesus Molina, Yuan Niu, Elaine Shi, Zhexuan Song:
Authentication in the clouds: a framework and its application to mobile users. CCSW 2010: 1-6 - [c7]Elaine Shi, Yuan Niu, Markus Jakobsson, Richard Chow:
Implicit Authentication through Learning User Behavior. ISC 2010: 99-113
2000 – 2009
- 2009
- [c6]Yuan Niu, Sungjune Park, Antonis C. Stylianou, Chandrasekar Subramaniam:
Bridging Gaps in Organizational Knowledge - The Role of IT-Enabled Organizational Learning in Supply Chain Partnerships. ICIS 2009: 74 - 2008
- [j1]Ram L. Kumar, Haya Ajjan, Yuan Niu:
Information Technology Portfolio Management: Literature Review, Framework, and Research Issues. Inf. Resour. Manag. J. 21(3): 64-87 (2008) - [c5]Yuan Niu, Antonis C. Stylianou, Susan J. Winter:
Blowing the Whistle on Unethical Information Techmology Practices: The Role of Machiavellianism, Gender and Computer Liteacy. AMCIS 2008: 269 - [c4]Yuan Niu, Francis Hsu, Hao Chen:
iPhish: Phishing Vulnerabilities on Consumer Electronics. UPSEC 2008 - 2007
- [c3]Yuan Niu, Hao Chen, Francis Hsu, Yi-Min Wang, Ming Ma:
A Quantitative Study of Forum Spamming Using Context-based Analysis. NDSS 2007 - [c2]Yi-Min Wang, Ming Ma, Yuan Niu, Hao Chen:
Spam double-funnel: connecting web spammers with advertisers. WWW 2007: 291-300 - 2006
- [c1]Yuan Niu, Susan J. Winter:
The Effect of Task Type and Information Format on Web Searching Performance. ICIS 2006: 52
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-22 20:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint