default search action
Yongfeng Yin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j9]Yilong Yang, Yibo Liu, Tianshu Bao, Weiru Wang, Nan Niu, Yongfeng Yin:
DeepOCL: A deep neural network for Object Constraint Language generation from unrestricted nature language. CAAI Trans. Intell. Technol. 9(1): 250-263 (2024) - [j8]Xiaoming Wang, Yilong Yang, Weiru Wang, Yuanhua Zhou, Yongfeng Yin, Zhiguo Gong:
Generative adversarial networks based motion learning towards robotic calligraphy synthesis. CAAI Trans. Intell. Technol. 9(2): 452-466 (2024) - 2023
- [c8]Yang Zhang, Yang Li, Yilong Yang, Shuang Chen, Juntao Gao, Weiru Wang, Yongfeng Yin:
RapidMS: A Tool for Supporting Rapid Microservices Generation and Refinement from Requirements Model. MoDELS (Companion) 2023: 45-49 - [c7]Yang Li, Yang Zhang, Yilong Yang, Weiru Wang, Yongfeng Yin:
RM2MS: A Tool for Automatic Identification of Microservices from Requirements Models. MoDELS (Companion) 2023: 50-54 - 2022
- [c6]Tianshu Bao, Jing Yang, Yilong Yang, Yongfeng Yin:
RM2Doc: A Tool for Automatic Generation of Requirements Documents from Requirements Models. ICSE-Companion 2022: 188-192 - 2021
- [j7]Kang Song, Mengyun Nie, Jing Jiang, Chunguo Li, Yongfeng Yin:
On the Secrecy for Relay-Aided SWIPT Internet of Things System With Cooperative Eavesdroppers. IEEE Access 9: 28204-28212 (2021) - [j6]Xi Liu, Yongfeng Yin, Haifeng Li, Jiabin Chen, Chang Liu, Shengli Wang, Rui Yin:
Intelligent radar software defect classification approach based on the latent Dirichlet allocation topic model. EURASIP J. Adv. Signal Process. 2021(1): 1-20 (2021) - 2020
- [j5]Zhiyong Wang, Shengwei Xu, Guoai Xu, Yongfeng Yin, Miao Zhang, Dawei Sun:
Game Theoretical Method for Anomaly-Based Intrusion Detection. Secur. Commun. Networks 2020: 8824163:1-8824163:10 (2020) - [j4]Ruihong Yin, Wei Zhao, Xudong Fan, Yongfeng Yin:
AF-SSD: An Accurate and Fast Single Shot Detector for High Spatial Remote Sensing Imagery. Sensors 20(22): 6530 (2020) - [j3]Peng Xiao, Yongfeng Yin, Bin Liu, Bo Jiang, Yashwant K. Malaiya:
Adaptive Testing Based on Moment Estimation. IEEE Trans. Syst. Man Cybern. Syst. 50(3): 911-922 (2020) - [c5]Bo Jiang, Xiaoyan Wang, Wing Kwong Chan, T. H. Tse, Na Li, Yongfeng Yin, Zhenyu Zhang:
CUDAsmith: A Fuzzer for CUDA Compilers. COMPSAC 2020: 861-871 - [c4]Yongfeng Yin, Xuefeng Wang, Qingran Su:
On Test Sequcence Generation of Time-Triggered Ethernet Using Genetic Algorithm. DSA 2020: 349-354 - [c3]Defei Hou, Yongfeng Yin, Qingran Su, Lijun Liu:
Software Refactoring Scheme Based on NSGA-II Algorithm. DSA 2020: 447-452
2010 – 2019
- 2019
- [c2]Yongfeng Yin, Yuyan Shao, Xuefeng Wang, Qingran Su:
A Flexible Cyber Security Experimentation Platform Architecture Based on Docker. QRS Companion 2019: 413-420 - 2010
- [j2]Yongfeng Yin, Bin Liu, Duo Su:
Research on Formal Verification Technique for Aircraft Safety-Critical Software. J. Comput. 5(8): 1152-1159 (2010) - [j1]Yongfeng Yin, Bin Liu, Zhen Li, Chun Zhang, Ning Wu:
The Integrated Application Based on Real-time Extended UML and Improved Formal Method in Real-time Embedded Software Testing. J. Networks 5(12): 1410-1416 (2010)
2000 – 2009
- 2009
- [c1]Yongfeng Yin, Bin Liu, Bentao Zheng:
On Test Script Technique Oriented Automation of Embedded Software Simulation Testing. CSIE (7) 2009: 727-732
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-06 20:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint