Yonghong Wang

ORCID: 0000-0003-2230-1018
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Access Control and Trust
  • Cryptography and Data Security
  • Advanced Computational Techniques and Applications
  • Logic, Reasoning, and Knowledge
  • Network Security and Intrusion Detection
  • Privacy-Preserving Technologies in Data
  • Advanced Data Compression Techniques
  • Image and Signal Denoising Methods
  • Higher Education and Teaching Methods
  • Bayesian Modeling and Causal Inference
  • Power Systems and Technologies
  • Geomagnetism and Paleomagnetism Studies
  • Geochemistry and Geologic Mapping
  • Digital Filter Design and Implementation
  • Advanced Technologies in Various Fields
  • Industrial Technology and Control Systems
  • Data Mining Algorithms and Applications
  • Impact of AI and Big Data on Business and Society
  • Radiomics and Machine Learning in Medical Imaging
  • Advanced Optical Network Technologies
  • Cloud Data Security Solutions
  • Opinion Dynamics and Social Influence
  • Software-Defined Networks and 5G
  • Advanced Sensor and Control Systems
  • Internet Traffic Analysis and Secure E-voting

Xinzhou Teachers University
2023-2024

Ocean University of China
2024

Qingdao National Laboratory for Marine Science and Technology
2024

INTI International University
2023

Mississippi State University
1993-2022

Northwest Normal University
2019

State Key Laboratory of Bioreactor Engineering
2013

North University of China
2012-2013

East China University of Science and Technology
2013

Carnegie Mellon University
2010-2011

An evidence-based account of trust is essential for an appropriate treatment application-level interactions among autonomous and adaptive parties. Key examples include social networks service-oriented computing. Existing approaches either ignore evidence or only partially address the twin challenges mapping to trustworthiness combining reports from imperfectly trusted sources. This article develops a mathematically well-formulated approach that naturally supports discounting reports....

10.1145/1867713.1867715 article EN ACM Transactions on Autonomous and Adaptive Systems 2010-11-01

In open settings, the participants are autonomous and there is no central authority to ensure felicity of their interactions. When agents interact in such each relies upon being able model trustworthiness with whom it interacts. Fundamentally, models must consider past behavior other parties order predict future behavior. Further, sensible for share information via referrals trustworthy agents. Much progress has recently been made on probabilistic trust including those that support...

10.5555/1402821.1402905 article EN Adaptive Agents and Multi-Agents Systems 2008-05-12

Traditional routing algorithms have several limitations that become increasingly significant in the context of Software-Defined Networking (SDN). Firstly, these often limited support for Quality Service (QoS) requirements, making them less suitable handling diverse traffic types efficiently. Moreover, current SDN controllers leverage a default shortest-path approach, which does not allow more dynamic and flexible management based on real-time network policies. To address issues, this paper...

10.1186/s40537-024-01029-x article EN cc-by-nc-nd Journal Of Big Data 2024-10-28

An embedded wavelet-based coder for the compression of hyperspectral imagery is described. The proposed coder, three-dimensional (3-D) tarp, employs an explicit estimate probability coefficient significance to drive a nonadaptive arithmetic resulting in simple implementation suited vectorized acceleration single-instruction-multiple-data (SIMD) hardware. 3-D tarp compared other prominent coders imagery, and state-of-the-art rate-distortion performance observed.

10.1109/lgrs.2004.824762 article EN IEEE Geoscience and Remote Sensing Letters 2004-04-01

Identifying and ranking influential nodes in complex networks is a critical aspect to study the survival robustness of networks. Many ongoing researches have proposed centrality metrics address this problem, so that performance each attributed specific scenarios. For example, based on local structure low accuracy due use limited information, global suffer from high complexity. Meanwhile, semi-local are amazingly well, but an efficient for identifying still not available differences scale In...

10.1016/j.jksuci.2023.101906 article EN cc-by-nc-nd Journal of King Saud University - Computer and Information Sciences 2023-12-27

Multihypothesis motion compensation is extended into the transform domain by using a redundant wavelet to produce multiple predictions that are diverse in phase. The corresponding inverse implicitly combines multihypothesis single spatial-domain prediction for such no side information needed describe combination weights. Additionally, we use hierarchical search tailor motion-vector field individual phases. Substantial gains rate-distortion performance obtained comparison an equivalent system...

10.1109/icip.2003.1246614 article EN 2004-06-03

A video coder is presented that combines mesh-based motion-compensated temporal filtering, phase-diversity multihypothesis motion compensation, and an embedded 3D wavelet-coefficient coder. The key contribution of this work the introduction paradigm into which achieved by deploying filtering in domain a spatially redundant wavelet transform. regular triangle mesh used to track between frames, affine transform triangles implements compensation within lifting-based Experimental results reveal...

10.1109/icip.2003.1246790 article EN 2004-06-03

Nonlinear analysis of electroencephalogram (EEG) signals provides a means for studying the dynamical changes in cortical networks related to brain electrical activity. In this study, correlation dimension (D2) and point (PD2) were used investigate quantitative complexity EEG during cognitive processes. EEGs recorded 30 normal subjects under seven conditions: two resting states five mental activities. Results show that D2 PD2 are significantly correlated. Compared D2, is more sensitive data...

10.1109/iembs.2004.1403233 article EN 2005-03-21

In many exciting multiagent applications - including future battlefields, law enforcement, and commerce agents must communicate in inherently or potentially hostile environments which an adversaries disrupt intercept the communication between for malicious purposes, but wireless ad hoc networks often proposed these are particularly susceptible to attack. Intelligent balance network performance with possible harm suffered from adversary's attack, while accounting broadcast nature of their...

10.1109/wi-iat.2011.252 article EN 2012 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology 2011-08-01

Instruction-set simulator is very important method and technique in reverse engineering analysis, compiling optimization code coverage testing. It provides the test platform for analyzing software accurate data program comprehension. An instruction-set designed this article, it can simulate various processor's object program. This paper also a to construct virtual instruction set, especially describes design memory simulating system simulator.

10.1109/iccsit.2009.5234931 article EN 2009-01-01
Coming Soon ...