Zhenyu Yang

ORCID: 0000-0001-6067-2237
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Harmonic Analysis Research
  • Nonlinear Partial Differential Equations
  • Advanced Mathematical Physics Problems
  • Iterative Methods for Nonlinear Equations
  • Algorithms and Data Compression
  • Information and Cyber Security
  • Neural Networks and Applications
  • Mathematical and Theoretical Analysis
  • Geometric Analysis and Curvature Flows
  • Network Security and Intrusion Detection
  • Spam and Phishing Detection
  • Distributed and Parallel Computing Systems
  • Advanced Mathematical Modeling in Engineering

Beijing Normal University
2022-2024

Wuhan University
2011-2019

In this paper, the authors establish a general (two-weight) boundedness criterion for pair of functions, [Formula: see text], on text] in scale weighted Lebesgue spaces, Lorentz (Lorentz–)Morrey and variable spaces. As applications, give unified approach to prove Calderón–Zygmund operators, Littlewood–Paley text]-functions, Lusin area fractional integral aforementioned function Moreover, via applying above criterion, further obtain Riesz transforms, operators associated with second-order...

10.1142/s0219530524500180 article EN Analysis and Applications 2024-04-05

In recent years, there has been growing interest in the field of functional neural networks. They have proposed and studied with aim approximating continuous functionals defined on sets functions Euclidean domains. this paper, we consider spheres. The approximation ability deep ReLU networks is investigated by novel spherical analysis using an encoder-decoder framework. An encoder comes up first to accommodate infinite-dimensional nature domain functionals. It utilizes harmonics help us...

10.48550/arxiv.2410.01047 preprint EN arXiv (Cornell University) 2024-10-01

With many security events taking place in recent years, scientists have realized vulnerability management is an important field and it brings critical effects to information systems services. One topic this identify similarity relationship between vulnerabilities. It can help us alarm potential attacks. In paper, we propose a text mining approach compute score two vulnerabilities based on their description. consists of steps: preprocessing computation. Experimental results annotated dataset...

10.1109/iscit.2011.6089949 article EN 2011-10-01

10.1007/s10473-023-0214-4 article EN Acta Mathematica Scientia 2022-11-28

A two dimensional data matrix has been widely used in many applications. The lossless compression of not only brings benefits for storage but also network transmission. In this paper, we propose a novel data-mining-based approach consisting three steps: reordering and grouping columns rows by co-clustering; post-processing to further expose redundancy matrix; standard compressor. inverse transform co-clustering is very fast simple, which facilitates uncompression. We tested the on synthetic...

10.1109/fskd.2011.6019940 article EN 2011-07-01

Let be a space of homogeneous type in the sense Coifman and Weiss. Namely, is non‐empty set, quasi‐metric on , positive measure satisfying doubling condition. In this article, authors establish general weighted good‐ inequality for pair functions . Using inequality, further obtain two‐weight boundedness criterion scale Lebesgue spaces. As an application, prove global gradient estimates some quasi‐linear elliptic equations bounded Reifenberg flat domains

10.1002/mma.8282 article EN Mathematical Methods in the Applied Sciences 2022-04-13
Coming Soon ...