Jing Yang

ORCID: 0000-0003-1632-6278
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Chaos-based Image/Signal Encryption
  • Data Management and Algorithms
  • Graph Theory and Algorithms
  • Advanced Image and Video Retrieval Techniques
  • Network Security and Intrusion Detection
  • Anomaly Detection Techniques and Applications
  • Cryptographic Implementations and Security
  • Insect Pheromone Research and Control
  • Advanced Graph Neural Networks
  • Neural Networks and Applications
  • Species Distribution and Climate Change
  • Mobile Agent-Based Network Management
  • Cellular Automata and Applications
  • Network Packet Processing and Optimization
  • Caching and Content Delivery
  • Computational Physics and Python Applications
  • Internet Traffic Analysis and Secure E-voting
  • Peer-to-Peer Network Technologies
  • Misinformation and Its Impacts
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Image and Object Detection Techniques
  • Geoscience and Mining Technology
  • Advancements in PLL and VCO Technologies
  • Medical Image Segmentation Techniques
  • Access Control and Trust

Chinese Academy of Sciences
2019-2024

University of Chinese Academy of Sciences
2019-2024

Institute of Information Engineering
2019-2024

Tianjin University of Technology and Education
2021-2024

China Information Technology Security Evaluation Center
2020-2023

China University of Geosciences (Beijing)
2011-2021

Beijing University of Posts and Telecommunications
2020-2021

Institute of Automation
2019-2021

Shandong Institute of Automation
2019-2021

Data Assurance and Communication Security
2017-2019

True random number generators (TRNGs) are widely used in cryptographic systems, and their security is the base of many algorithms protocols. At present, entropy estimation based on a stochastic model well-recommended approach to evaluate specific TRNG structure. Besides, generation speed also an important property for TRNGs. For this purpose, analog-to-digital converter (ADC) can be employed sample noisy signal achieve high bit rate. However, no research focuses basis toward ADC sampling. In...

10.1109/tifs.2019.2908798 article EN IEEE Transactions on Information Forensics and Security 2019-04-01

Widely used as fundamental security components in most cryptographic applications, random number generators (RNGs) rely mainly on randomness provided by entropy sources. If the is less than expected, RNGs may be compromised and thus impair of whole applications. However, common assumptions (e.g., outputs are independent identically distributed, i.e., IID) not always hold. For example, many sources based some physical phenomena that fragile sensitive to external factors temperature), which...

10.1109/tifs.2019.2947871 article EN IEEE Transactions on Information Forensics and Security 2019-10-16

Automatic detecting rumors on social media has become a challenging task. Previous studies focus learning indicative clues from conversation threads for identifying rumorous information. However, these methods only model various views but fail to fuse multi-view features very well. In this paper, we propose novel fusion framework rumor representation and classification. It encodes the multiple based Graph Convolutional Networks (GCN) leverages Neural (CNN) capture consistent complementary...

10.1109/icassp48485.2024.10446777 article EN ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2024-03-18

10.1109/tiv.2024.3490574 article EN IEEE Transactions on Intelligent Vehicles 2024-01-01

True Random Number Generator (TRNG) is indispensable in cryptographic algorithms and protocols, the quality of randomness directly influences security applications. Multiple theoretical or offline entropy estimation methods have been proposed to evaluate TRNGs, while their ideal assumptions commonly cannot be satisfied due perturbation operating conditions at runtime, which makes it difficult achieve sufficient for output TRNGs practice. Moreover, bitrate TRNG another fundamental concern...

10.1109/tcsi.2023.3323883 article EN IEEE Transactions on Circuits and Systems I Regular Papers 2023-10-23

News recommendations aimed at alleviating network information overload. Traditional methods cannot simultaneously consider the representation of entities in news level knowledge and influence social networks on user interest points. The above two factors have a huge correlation with efficiency recommendation. In order to these factors, this paper proposes recommendation model based graph which integrates into recommendations. is deep framework content for click-through rate prediction....

10.1109/iciba50161.2020.9276847 article EN 2020-11-06

Random number generator (RNG) is a fundamental and important cryptographic element, which has made an outstanding contribution to guaranteeing the network communication security of applications in Internet age. In reality, if random used cannot provide sufficient randomness (unpredictability) as expected, these are vulnerable threats cause system crashes. Min-entropy one approaches that usually employed quantify unpredictability. The NIST Special Publication 800-90B adopts concept...

10.1155/2020/4241713 article EN cc-by Security and Communication Networks 2020-02-17

Microservice architecture is embraced by a growing number of enterprises due to the benefits modularity and flexibility. However, being composed numerous interdependent microservices, it prone cascading failures afflicted arising problem troubleshooting, which entails arduous efforts identify root cause node ensure service availability. Previous works use call graph characterize causality relation-ships microservices but not completely or comprehensively, leading an insufficient search...

10.23919/date56975.2023.10137078 article EN Design, Automation & Test in Europe Conference & Exhibition (DATE), 2015 2023-04-01

10.1016/j.cviu.2019.03.003 article EN Computer Vision and Image Understanding 2019-04-05

Combined with quantum computing and genetic algorithm, algorithm (QGA) shows considerable ability of parallelism. Experiments have shown that QGA performs quite well on TSP, job shop problem some other typical combinatorial optimization problems. The problems like nutritional diet which can be transformed into specific combinational also solved through smoothly. This paper sums up the main points for general These such as modeling problem, qubit decoding rotation strategy are useful to...

10.4028/www.scientific.net/amm.568-570.822 article EN Applied Mechanics and Materials 2014-06-10

Based on the measurement of in-situ stress and engineering-geological conditions, we built computing models with pre-exerting boundary loads simulated regional field involved. Boundary can be approximately determined by use multiple linear regressions, further optimized artificial neural network. By calculation, corresponding initial reach ideal accuracy. As an example, inversely analyzed engineering problem in Chinese Wo-bei mine. The results shows that simulation meet point very well,...

10.4028/www.scientific.net/amm.510.226 article EN Applied Mechanics and Materials 2014-02-01

10.1109/iai63275.2024.10730484 article EN 2022 4th International Conference on Industrial Artificial Intelligence (IAI) 2024-08-21

In this paper, we investigate the properties of cycles for node representation in star graph. Cycles can be any order. The position each symbol ordinary cycle is fixed and not nested into other cycle. However, cyclic shift operations on symbols a none-ordinary are allowed number distinct paths graph determined using combinatorial analysis.

10.1109/cmc.2009.294 article EN 2009-01-01

In order to solve the printing failure caused by projection part of light source in 3D process, this paper proposes a system adjustment scheme. By analyzing polymerization state photosensitive resin, detecting intensity ultraviolet light, extracting outline picture, and comparing similarity optical detection can find out cause provide us with advice on how adjust ensure that continue be normal. following, authors proposed process system, simulated experiment confirm whether irradiated resin...

10.1109/cac48633.2019.8997053 article EN 2019-11-01

An outdoor plume tracing method with a TDLAS gas sensor on UAV is proposed in this paper. The installed modified 3-axis aerial gimbal, and oriented fixed angle Į to the vertical direction. During flying of UAV, rotated continuously by controlling yaw scanning three-dimensional area beneath UAV. With time series detected odor concentration line integral (CLI), searching path planned find trace source. verified CPTS-3D simulation platform. results experiments show that has high search...

10.1109/cac53003.2021.9728167 article EN 2021 China Automation Congress (CAC) 2021-10-22

10.1166/jctn.2016.5009 article EN Journal of Computational and Theoretical Nanoscience 2016-05-01
Coming Soon ...