default search action
Jun Yan 0005
Person information
- affiliation: University of Wollongong, School of Information Technology and Computer Science, NSW, Australia
- affiliation (PhD 2004): Swinburne University of Technology, Melbourne, VIC, Australia
Other persons with the same name
- Jun Yan — disambiguation page
- Jun Yan 0001 — Microsoft Research Asia, Beijing, China (and 1 more)
- Jun Yan 0002 — University of Connecticut, Department of Statistics, Storrs, CT, USA (and 1 more)
- Jun Yan 0003 — Wuhan University, School of Geodesy and Geomatics, Hubei, China
- Jun Yan 0004 — Chinese Academy of Sciences, CAS-MPG Partner Institute for Computational Biology, Shanghai, China
- Jun Yan 0006 — Nanjing University of Posts and Telecommunications, College of Telecommunications and Information Engineering, China (and 3 more)
- Jun Yan 0007 — Concordia University, Concordia Institute for Information Systems Engineering, Montreal, QC, Canada (and 1 more)
- Jun Yan 0008 — Mathworks Inc., Natick, MA, USA (and 1 more)
- Jun Yan 0009 — Chinese Academy of Sciences, Institute of Software, Technology Center of Software Engineering, Beijing, China
- Jun Yan 0010 — Yidu Cloud Technology Co. Ltd., Beijing, China
- Jun Yan 0011 — China University of Geosciences, School of Mechanical Engineering and Electronic Information, Wuhan
- Jun Yan 0012 — University of Southern California, CA, USA (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j28]Dingbang Liu, Fenghui Ren, Jun Yan, Guoxin Su, Wen Gu, Shohei Kato:
Scaling Up Multi-Agent Reinforcement Learning: An Extensive Survey on Scalability Issues. IEEE Access 12: 94610-94631 (2024) - [j27]Brighter Agyemang, Fenghui Ren, Jun Yan:
Proactive Agent Behaviour in Dynamic Distributed Constraint Optimisation Problems. Inf. 15(5): 255 (2024) - [j26]Rui Men, Xiumei Fan, Jun Yan, Axida Shan, Shujia Fan:
A communication link lifetime prediction-supported V2V partial computation offloading scheme for autonomous driving. J. Intell. Fuzzy Syst. 46(3): 6355-6368 (2024) - [c68]Minggang Wang, Shohei Kato, Wen Gu, Jun Yan, Fenghui Ren:
Speaker-Independent Depression Detection based on Adversarial Training Method. EUSIPCO 2024: 1521-1525 - [c67]Ruoxi Sun, Jun Yan, Fenghui Ren, Cong Cao:
Improving the Accuracy of Sequential Recommendation Using a Time-aware Architecture. HICSS 2024: 1120-1129 - 2023
- [j25]Susan Zhang, Jun Shen, Jun Yan:
Children's E-Learning Interactions and Perceived Outcomes with Educational Key Opinion Leaders in China. Commun. Assoc. Inf. Syst. 53: 20 (2023) - [j24]Mahdi Fahmideh, John C. Grundy, Aakash Ahmad, Jun Shen, Jun Yan, Davoud Mougouei, Peng Wang, Aditya Ghose, Anuradha Gunawardana, Uwe Aickelin, Babak Abedin:
Engineering Blockchain-based Software Systems: Foundations, Survey, and Future Directions. ACM Comput. Surv. 55(6): 110:1-110:44 (2023) - [j23]Brighter Agyemang, Fenghui Ren, Jun Yan:
Distributed Multi-Agent Hierarchy Construction for Dynamic DCOPs in Mobile Sensor Teams. Hum. Centric Intell. Syst. 3(4): 473-486 (2023) - [j22]Naghmeh Khajehali, Jun Yan, Yang-Wai Chow, Mahdi Fahmideh:
A Comprehensive Overview of IoT-Based Federated Learning: Focusing on Client Selection Methods. Sensors 23(16): 7235 (2023) - [c66]Yazeed AlZahrani, Jun Shen, Jun Yan:
Energy-Efficient Data Consistency based Sampling Rate Optimization and Aggregation Method for IoT. CSCWD 2023: 1348-1353 - [c65]Xiaochen Zhang, Jun Shen, Jun Yan:
Adult Learners' Online Engagement and Perceived Outcomes with Educational Key Opinion Leaders: a Two-Phase Study. CSCWD 2023: 1873-1877 - [c64]Fenghui Ren, Jun Yan:
A Multi-agent Approach for Decentralized Voltage Regulation in Micro Grids by Considering Distributed Generators. EMAS 2023: 151-166 - [c63]Susan Zhang, Jun Shen, Jun Yan:
Novel E-Learning Experience and Perceptions with Impacts from Educational Key Opinion Leaders. FIE 2023: 1-6 - 2022
- [c62]Yazeed AlZahrani, Jun Shen, Jun Yan:
Multi-Layer Efficient Data Classification Methods for Enterprise Business Applications. CBD 2022: 30-35 - [c61]Ruoxi Sun, Jun Yan, Fenghui Ren:
A Knowledge Graph-based Interactive Recommender System Using Reinforcement Learning. CBD 2022: 73-78 - [c60]Yazeed AlZahrani, Jun Shen, Jun Yan:
Spatial Goal Refinement Patterns for IoT Applications. EDGE 2022: 50-59 - [c59]Qianwen Xu, Jun Yan, Cong Cao:
Emotional Communication Between Chatbots and Users: An Empirical Study on Online Customer Service System. HCI (35) 2022: 513-530 - [i4]Mahdi Fahmideh, Jun Yan, Jun Shen, Aakash Ahmad, Davoud Mougouei, Anup Shrestha:
Knowledge Management for Cloud Computing Field. CoRR abs/2202.07875 (2022) - [i3]Brighter Agyemang, Fenghui Ren, Jun Yan:
Distributed Interaction Graph Construction for Dynamic DCOPs in Cooperative Multi-agent Systems. CoRR abs/2212.03461 (2022) - 2021
- [j21]Fei Xie, Jun Yan, Jun Shen:
A Novel PageRank-Based Fault Handling Strategy for Workflow Scheduling in Cloud Data Centers. Int. J. Web Serv. Res. 18(4): 1-26 (2021) - [c58]Susan Zhang, Jun Shen, Jun Yan:
How Learning Evolved from Offline Classroom to Online Platforms with its Amplifier, Edu-KOLs: A Systematic Literature Review. ACIS 2021: 6 - [i2]Mahdi Fahmideh, Jun Yan, Jun Shen, Davoud Mougouei, Yanlong Zhai, Aakash Ahmad:
A Comprehensive Framework for Analyzing IoT Platforms: A Smart City Industrial Experience. CoRR abs/2105.01877 (2021) - [i1]Mahdi Fahmideh, John Grundy, Aakash Ahmed, Jun Shen, Jun Yan, Davoud Mougouei, Peng Wang, Aditya Ghose, Anuradha Gunawardana, Uwe Aickelin, Babak Abedin:
Software Engineering for Blockchain Based Software Systems: Foundations, Survey, and Future Directions. CoRR abs/2105.01881 (2021) - 2020
- [c57]Fei Xie, Jun Yan, Jun Shen:
A Bandwidth and Latency Based Replica Selection Mechanism for Data-Intensive Workflow Applications in the Multi-Cloud Environment. ACSW 2020: 13:1-13:8 - [c56]Fei Xie, Jun Yan, Jun Shen:
A Utility-Based Fault Handling Approach for Efficient Job Rescue in Clouds. CLOUD 2020: 49-63 - [c55]Cong Cao, Jun Yan, Mengxiang Li:
Comparative Study on Service Framework System of Trusted Third Parties in E-commerce Environments in China and Australia. PACIS 2020: 110
2010 – 2019
- 2019
- [c54]Tran Viet Xuan Phuong, Willy Susilo, Guomin Yang, Jun Yan, Dongxi Liu:
Location Based Encryption. ACISP 2019: 21-38 - [c53]Cong Cao, Jun Yan, Mengxiang Li:
How to Understand the Role of Trusted Third Party in the Process of Establishing Trust for E-Commerce? AMCIS 2019 - 2018
- [c52]Cong Cao, Jun Yan, Mengxiang Li:
Understanding the Influencing Factors of the Effectiveness of Trusted Third Party's Trust Transformation. ACIS 2018: 72 - [c51]Cong Cao, Jun Yan, Mengxiang Li:
The Influence Factors of Online Review Quality and Their Mechanism on Trust Intention. ICEBE 2018: 147-152 - [c50]Fei Xie, Jun Yan, Jun Shen:
A Data Dependency and Access Threshold Based Replication Strategy for Multi-cloud Workflow Applications. ICSOC Workshops 2018: 281-293 - [c49]Cong Cao, Jun Yan, Mengxiang Li:
Understanding the Determinants of Online Consumer Review Helpfulness in Social Networking Service Context. PACIS 2018: 200 - [c48]Cong Cao, Jun Yan, Mengxiang Li:
The Impact of Different Channel of Online Review on Consumers' Online Trust. PACIS 2018: 213 - 2017
- [c47]Fei Xie, Jun Yan, Jun Shen:
Towards Cost Reduction in Cloud-Based Workflow Management through Data Replication. CBD 2017: 94-99 - [c46]Cong Cao, Jun Yan, Mengxiang Li:
The Effects of Consumer Perceived Different Service of Trusted Third Party on Trust Intention: An Empirical Study in Australia. ICEBE 2017: 62-69 - 2016
- [c45]Cong Cao, Jun Yan, Mengxiang Li:
Understanding the influence and service type of trusted third party on consumers' online trust: evidence from Australian B2C marketplace. ICEC 2016: 18:1-18:8 - 2015
- [j20]Zheng Lu, Jun Yan, Xinqin Wang:
Using grouping strategy and pattern discovery for delta extraction in a limited collaborative environment. Int. J. Bus. Intell. Data Min. 10(4): 378-405 (2015) - [j19]Zheng Lu, Haijun Liu, Jun Yan:
Delta extraction in a limited collaborative environment. Int. J. Intell. Inf. Database Syst. 9(1): 54-78 (2015) - [c44]Jun Yan, Hao Gao, Yi Mu:
Business Rule Driven Composite Service Optimisation and Selection. SCC 2015: 49-56 - 2014
- [j18]Jinguang Han, Willy Susilo, Yi Mu, Jun Yan:
Attribute-Based Data Transfer with Filtering Scheme in Cloud Computing. Comput. J. 57(4): 579-591 (2014) - [j17]Hao Gao, Jun Yan, Yi Mu:
Trust-oriented QoS-aware composite service selection based on genetic algorithms. Concurr. Comput. Pract. Exp. 26(2): 500-515 (2014) - [j16]Qiang He, Jun Yan, Hai Jin, Yun Yang:
Quality-Aware Service Selection for Service-Based Systems Based on Iterative Multi-Attribute Combinatorial Auction. IEEE Trans. Software Eng. 40(2): 192-215 (2014) - [c43]Xiaojun Zhang, Ping Yu, Jun Yan:
Patients' adoption of the e-appointment scheduling service: A case study in primary healthcare. HIC 2014: 176-181 - [c42]Jun Yan, Hao Gao, Yi Mu:
Attribute Based Service Customization and Selection. SOCA 2014: 57-64 - [c41]Cong Cao, Jun Yan:
Towards a Trust Model for Trust Establishment and Management in Business-to-Consumer E-Commerce. UIC/ATC/ScalCom 2014: 479-486 - 2013
- [j15]Azlan B. Ismail, Jun Yan, Jun Shen:
Incremental service level agreements violation handling with time impact analysis. J. Syst. Softw. 86(6): 1530-1544 (2013) - [j14]Qiang He, Jun Yan, Yun Yang, Ryszard Kowalczyk, Hai Jin:
A Decentralized Service Discovery Approach on Peer-to-Peer Networks. IEEE Trans. Serv. Comput. 6(1): 64-75 (2013) - 2012
- [j13]Jinguang Han, Willy Susilo, Yi Mu, Jun Yan:
Attribute-Based Oblivious Access Control. Comput. J. 55(10): 1202-1215 (2012) - [j12]Jinguang Han, Willy Susilo, Yi Mu, Jun Yan:
Efficient oblivious transfers with access control. Comput. Math. Appl. 63(4): 827-837 (2012) - [j11]Jun Yan, Lenan Wu:
Base station identification in single frequency network positioning system using fuzzy logic technique. IET Wirel. Sens. Syst. 2(3): 230-237 (2012) - [j10]Jinguang Han, Willy Susilo, Yi Mu, Jun Yan:
New constructions of OSBE schemes and their applications in oblivious access control. Int. J. Inf. Sec. 11(6): 389-401 (2012) - [j9]Miao Zhou, Yi Mu, Willy Susilo, Jun Yan, Liju Dong:
Privacy enhanced data outsourcing in the cloud. J. Netw. Comput. Appl. 35(4): 1367-1373 (2012) - [j8]Peishun Wang, Yi Mu, Willy Susilo, Jun Yan:
Privacy preserving protocol for service aggregation in cloud computing. Softw. Pract. Exp. 42(4): 467-483 (2012) - [j7]Ahmed Al-Hmouz, Jun Shen, Rami Al-Hmouz, Jun Yan:
Modeling and Simulation of an Adaptive Neuro-Fuzzy Inference System (ANFIS) for Mobile Learning. IEEE Trans. Learn. Technol. 5(3): 226-237 (2012) - [j6]Jinguang Han, Willy Susilo, Yi Mu, Jun Yan:
Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption. IEEE Trans. Parallel Distributed Syst. 23(11): 2150-2162 (2012) - [c40]Qiang He, Yun Yang, Jun Yan, Hai Jin:
INSC: An Iterative Negotiation Approach for Service Compositions. IEEE SCC 2012: 170-177 - [c39]Jingtai Piao, Jun Yan:
Computing Resource Prediction for MapReduce Applications Using Decision Tree. APWeb 2012: 570-577 - [c38]Xiaojun Zhang, Ping Yu, Jun Yan, Hongxiang Hu, Niraj Goureia:
Patients' perceptions of web self-service applications in primary healthcare. HIC 2012: 242-249 - 2011
- [c37]Azlan B. Ismail, Jun Yan, Jun Shen:
Analyzing Fault-Impact Region of Composite Service for Supporting Fault Handling Process. IEEE SCC 2011: 290-297 - [c36]Hao Gao, Jun Yan, Yi Mu:
Web Service Selection Based on Similarity Evaluation. IEEE SCC 2011: 322-329 - [c35]Ahmed Al-Hmouz, Jun Shen, Jun Yan, Rami Al-Hmouz:
Modeling Mobile Learning System Using ANFIS. ICALT 2011: 378-380 - [c34]Yi Xu, Jun Yan:
A Cloud Based Information Integration Platform for Smart Cars. SUComS 2011: 241-250 - [c33]Miao Zhou, Yi Mu, Willy Susilo, Man Ho Au, Jun Yan:
Privacy-Preserved Access Control for Cloud Computing. TrustCom 2011: 83-90 - 2010
- [j5]Azlan B. Ismail, Jun Yan, Jun Shen:
An offer generation approach to SLA negotiation support in service oriented computing. Serv. Oriented Comput. Appl. 4(4): 277-289 (2010) - [c32]Peishun Wang, Yi Mu, Willy Susilo, Jun Yan:
Constructing an Authentication Token to Access External Services in Service Aggregation. IEEE SCC 2010: 321-328 - [c31]Peishun Wang, Liju Dong, Yi Mu, Willy Susilo, Jun Yan:
A framework for privacy policy management in service aggregation. CSCWD 2010: 166-171 - [c30]Jingtai Piao, Jun Yan:
A Network-aware Virtual Machine Placement and Migration Approach in Cloud Computing. GCC 2010: 87-92 - [c29]Ahmed Al-Hmouz, Jun Shen, Jun Yan, Rami Al-Hmouz:
Enhanced learner model for adaptive mobile learning. iiWAS 2010: 783-786 - [c28]Hao Gao, Jun Yan, Yi Mu:
Dynamic Trust Model for Federated Identity Management. NSS 2010: 55-61 - [c27]Jinguang Han, Yi Mu, Willy Susilo, Jun Yan:
A Generic Construction of Dynamic Single Sign-on with Strong Security. SecureComm 2010: 181-198
2000 – 2009
- 2009
- [j4]Qiang He, Jun Yan, Ryszard Kowalczyk, Hai Jin, Yun Yang:
Lifetime service level agreement management with autonomous agents for services provision. Inf. Sci. 179(15): 2591-2605 (2009) - [c26]Azlan B. Ismail, Jun Yan, Jun Shen:
Dynamic Service Selection for Service Composition with Time Constraints. Australian Software Engineering Conference 2009: 183-190 - [c25]Xu Wei, Jun Yan:
An E-learning System Architecture Based on Web Services and Intelligent Agents. HIS (2) 2009: 173-177 - [c24]Qiang He, Jun Yan, Hai Jin, Yun Yang:
ServiceTrust: Supporting Reputation-Oriented Service Selection. ICSOC/ServiceWave 2009: 269-284 - [c23]Ahmed Al-Hmouz, Jun Shen, Jun Yan:
A Machine Learning Based Framework for Adaptive Mobile Learning. ICWL 2009: 34-43 - [c22]Azlan B. Ismail, Jun Yan, Jun Shen:
Towards dynamic formation of temporal constraints for the service level agreements negotiation. SOCA 2009: 1-8 - [c21]Azlan B. Ismail, Jun Yan, Jun Shen:
Verification of Composite Services with Temporal Consistency Checking and Temporal Satisfaction Estimation. WISE 2009: 343-350 - 2008
- [c20]Qiang He, Jun Yan, Yun Yang, Ryszard Kowalczyk, Hai Jin:
Chord4S: A P2P-based Decentralised Service Discovery Approach. IEEE SCC (1) 2008: 221-228 - [c19]Shuai Yuan, Jun Shen, Jun Yan:
A Practical Geographic Ontology for Spatial Web Services. IEEE SCC (2) 2008: 579-580 - [c18]Qiang He, Jun Yan, Hai Jin, Yun Yang:
Adaptation of Web Service Composition Based on Workflow Patterns. ICSOC 2008: 22-37 - [c17]Jun Yan, Jingtai Piao:
Towards QoS-Based Web Services Discovery. ICSOC Workshops 2008: 200-210 - 2007
- [j3]Jun Shen, Yun Yang, Jun Yan:
A p2p based service flow system with advanced ontology-based service profiles. Adv. Eng. Informatics 21(2): 221-229 (2007) - [j2]Jun Yan, Ryszard Kowalczyk, Jian Lin, Mohan Baruwal Chhetri, SukKeong Goh, Jian Ying Zhang:
Autonomous service level agreement negotiation for service composition provision. Future Gener. Comput. Syst. 23(6): 748-759 (2007) - [c16]Qiang He, Jun Yan, Ryszard Kowalczyk, Hai Jin, Yun Yang:
An Agent-based Framework for Service Level Agreement Management. CSCWD 2007: 412-417 - [c15]Qiang He, Jun Yan, Yun Yang, Ryszard Kowalczyk, Hai Jin:
Towards Collaborative Service Level Agreement Negotiation. GSEM 2007: 123-134 - [c14]Jun Yan, Phillip Pidgeon, Aneesh Krishna, Jianming Yong:
An agent-based decentralised process management framework for web service composition. Infoscale 2007: 24 - 2006
- [j1]Jun Yan, Yun Yang, Gitesh K. Raikundalia:
SwinDeW-a p2p-based decentralized workflow management system. IEEE Trans. Syst. Man Cybern. Part A 36(5): 922-935 (2006) - [c13]Jun Shen, Jun Yan, Yun Yang:
SwinDeW-S: Extending P2P Workflow Systems for Adaptive Composite Web Services. ASWEC 2006: 61-69 - [c12]Mohan Baruwal Chhetri, Jian Lin, SukKeong Goh, Jian Ying Zhang, Ryszard Kowalczyk, Jun Yan:
A Coordinated Architecture for the Agent-based Service Level Agreement Negotiation ofWeb Service Composition. ASWEC 2006: 90-99 - [c11]Yun Yang, Jun Shen, Jun Yan, Jinjun Chen:
Preface. Business Process Management Workshops 2006: 363-364 - [c10]Jun Yan, Ryszard Kowalczyk, Jian Lin, Mohan Baruwal Chhetri, SukKeong Goh, Jian Ying Zhang:
An Agent Negotiation Approach for Establishment of Service Level Agreement. CSCWD (Selected Papers) 2006: 459-468 - [c9]Jun Yan, Jian Ying Zhang, Jian Lin, Mohan Baruwal Chhetri, SukKeong Goh, Ryszard Kowalczyk:
Towards Autonomous Service Level Agreement Negotiation for Adaptive Service Composition. CSCWD 2006: 757-762 - [c8]Jianming Yong, Jun Yan, Xiaodi Huang:
WFMS-based Data Integration for e-Learning. CSCWD 2006: 1361-1366 - 2005
- [c7]Jun Shen, Yun Yang, Jun Yan:
Adapting P2P based decentralised workflow system SwinDeW-S with Web service profile support. CSCWD (1) 2005: 535-540 - [c6]Jun Yan, Yun Yang, Ryszard Kowalczyk, Xuan Thang Nguyen:
A Service Workflow Management Framework Based on Peer-to-Peer and Agent Technologies. QSIC 2005: 373-382 - 2004
- [c5]Yun Yang, Wei Lai, Jun Shen, Xiaodi Huang, Jun Yan, Lukman Setiawan:
Effective Visualisation of Workflow Enactment. APWeb 2004: 794-803 - [c4]Jun Yan, Yun Yang, Gitesh K. Raikundalia:
Towards Incompletely Specified Process Support in SwinDeW - A Peer-to-Peer Based Workflow System. CSCWD (Selected papers) 2004: 328-338 - 2003
- [c3]Jun Yan, Yun Yang, Gitesh K. Raikundalia:
Decentralised Coordination for Software Process Enactment. EWSPT 2003: 164-172 - [c2]Jun Yan, Yun Yang, Gitesh K. Raikundalia:
A Data Storage Mechanism for Peer-to-Peer Based Decentralised Workflow Systems. SEKE 2003: 354-358 - [c1]Jun Yan, Yun Yang, Gitesh K. Raikundalia:
Enacting Business Processes in a Decentralised Environment with p2p-Based Workflow Support. WAIM 2003: 290-297
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-20 20:56 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint