Wangyang Yu

ORCID: 0000-0003-1037-210X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Business Process Modeling and Analysis
  • Petri Nets in System Modeling
  • Service-Oriented Architecture and Web Services
  • Software System Performance and Reliability
  • Fault Detection and Control Systems
  • Access Control and Trust
  • Software Testing and Debugging Techniques
  • Complex Network Analysis Techniques
  • Cognitive Computing and Networks
  • Vehicular Ad Hoc Networks (VANETs)
  • Data Stream Mining Techniques
  • Machine Learning and ELM
  • Financial Distress and Bankruptcy Prediction
  • Software Engineering Techniques and Practices
  • Smart Agriculture and AI
  • Advanced Queuing Theory Analysis
  • Network Security and Intrusion Detection
  • Digital Imaging for Blood Diseases
  • Personal Information Management and User Behavior
  • Traffic control and management
  • Formal Methods in Verification
  • Opinion Dynamics and Social Influence
  • Software Reliability and Analysis Research
  • Traffic Prediction and Management Techniques
  • Radar Systems and Signal Processing

Shaanxi Normal University
2015-2025

Anhui University of Science and Technology
2023-2024

China Tourism Academy
2022-2023

Ministry of Education of the People's Republic of China
2018-2023

Fiberhome Technology Group (China)
2022-2023

East China Normal University
2020

Shaanxi Science and Technology Department
2018

Tongji University
2013-2016

Shandong University of Science and Technology
2009

University of Hong Kong
1994-1995

E-commerce and online shopping with a third-party payment platform have rapidly developed recently, encountered many fault tolerance security problems concerned by users. The causes of these include malicious behavior imperfect business processes. latter lead to the emergence vulnerabilities loss user funds which become more serious years. We focus on process e-commerce, propose formal model for constructing an e-commerce called Business Process Net. It integrates both data control flows...

10.1109/tsmc.2013.2248358 article EN IEEE Transactions on Systems Man and Cybernetics Systems 2013-06-06

Recently, online shopping integrating third-party payment platforms (TPPs) introduces new security challenges due to complex interactions between Application Programming Interfaces (APIs) of Merchants and TPPs. Malicious clients may exploit vulnerabilities by calling APIs in an arbitrary order or playing various roles. To deal with the issue early stages system development, this paper presents a formal method for modeling verification business processes malicious behavior patterns considered...

10.1109/tase.2014.2362819 article EN IEEE Transactions on Automation Science and Engineering 2015-01-20

Detection and prevention of fraudulent transactions in e-commerce platforms have always been the focus transaction security systems. However, due to concealment e-commerce, it is not easy capture attackers solely based on historic order information. Many works try develop technologies prevent frauds, which considered dynamic behaviors users from multiple perspectives. This leads an inefficient detection behaviors. To this end, article proposes a novel fraud method that integrates machine...

10.1109/tcss.2022.3232619 article EN IEEE Transactions on Computational Social Systems 2023-01-06

E-commerce business process nets (EBPNs) are a novel formal model for describing and validating e-commerce systems including interactive parties such as shopper, merchant, third-party payment platform. Data errors nondeterminacy of the data states during trading can be depicted with help EBPNs. However, problem about how to analyze EBPNs remains largely open. To their data-liveness, data-boundedness, reachability, this paper presents two analysis methods. For EBPNs, reachability is proposed...

10.1109/tsmc.2016.2598287 article EN IEEE Transactions on Systems Man and Cybernetics Systems 2016-09-14

Cross-project defect prediction (CPDP) refers to identifying defect-prone software modules in one project (target) using historical data collected from other projects (source), which can help developers find bugs and prioritize their testing efforts. Recently, CPDP has attracted great research interest. However, the source target usually exist redundancy nonlinearity characteristics. Besides, most methods do not exploit label information uncover underlying knowledge for propagation. These...

10.1109/tr.2021.3074660 article EN publisher-specific-oa IEEE Transactions on Reliability 2021-05-12

Conceptual modeling, which includes both control-flow and data-flow has posed great challenges for conventional business process management systems. To support systematic modeling analysis, in this paper, we propose a novel effective Petri net-based approach. We first introduce new type of net, called WFIO-net, the firing rule is formally defined by extending classical net with read write semantics, to model information. Then, discuss about three possible errors over i.e., missing, redundant...

10.1109/access.2020.2976124 article EN cc-by IEEE Access 2020-01-01

Many Next-Generation consumer electronic devices would be distributed hybrid systems, such as UAVs (Unmanned Aerial Vehicles) and smart cars. The safety risk control are the key issues for sustainability of systems. modeling systems is difficult to abstracted by traditional Petri Nets. This also makes reachable marking graph unable applied nets paper proposes a novel Net model analyze We name it Semi-continuous Colored (SCPN) that inherits excellent capabilities analysis methods Nets, can...

10.1145/3715960 article EN ACM Transactions on Embedded Computing Systems 2025-02-10

Malaria is an important and worldwide fatal disease that has been widely reported by the World Health Organization (WHO), it about 219 million cases worldwide, with 435,000 of those mortal. The common malaria diagnosis approach heavily reliant on highly trained experts, who use a microscope to examine samples. Therefore, there need create automated solution for malaria. One main objectives this work design tool could be used diagnose from image blood sample. In paper, we firstly developed...

10.1016/j.dcan.2021.07.011 article EN cc-by Digital Communications and Networks 2021-07-29

With the development of smart devices and mobile communication technologies, e-commerce has spread over all aspects life. Abnormal transaction detection is important in since abnormal transactions can result large losses. Additionally, integrating data flow control research process modeling analysis it plays an role correctness security business processes. This paper proposes a novel method detecting via integration model flows. Our model, called Extended Data Petri net (DPNE), integrates...

10.1155/2022/4434714 article EN cc-by Wireless Communications and Mobile Computing 2022-01-04

The e-commerce business process net (EBPN) is a novel formal model for describing an system and its interactive parts, such as shoppers, merchants, the third-party payment platforms. Vulnerability analysis has great impact on trustworthiness of EBPN, which issue stemming from data inconsistency problems. Data problems affect consistency EBPN transaction analysis. underlying causes inconsistent are closely related to concurrent operations, control flow flow. However, most existing detection...

10.1109/tsmc.2018.2862387 article EN IEEE Transactions on Systems Man and Cybernetics Systems 2018-08-21

Energy is at the center of human society and drives technologies overall well-being. Today, artificial intelligence (AI) are widely used for system modeling, prediction, control, optimization in energy sector. The internet things (IoT) core third wave information industry revolution AI. In sector, tens billions IoT appliances linked to Internet, these generate massive amounts data every day. Extracting useful from amount will be a very meaningful thing. Complex event processing (CEP)...

10.3390/en15165892 article EN cc-by Energies 2022-08-14

Gait analysis plays an important role in the fields of healthcare and sports sciences. Conventional gait relies on costly equipment such as optical motion capture cameras wearable sensors, some which require trained assessors for data collection processing. With recent developments computer vision deep neural networks, using monocular RGB 3D human pose estimation has shown tremendous promise a cost-effective efficient solution clinical analysis. In this paper, markerless technique is...

10.3390/bioengineering10060653 article EN cc-by Bioengineering 2023-05-26

Abstract Petri net models are frequently complex and difficult to understand modify. Slicing technology is very useful in analyzing programs, has been widely used specification level for model reduction. So it necessary explore slicing methods nets. This paper proposes a dynamic technique nets based on the structural dependency graph (SDG). Firstly, SDG constructed from criterion by backtracking algorithm. Secondly, given marking, slice can be acquired. As case study, proposed method applied...

10.1002/asjc.1031 article EN Asian Journal of Control 2014-11-07

In online social networks, information diffusion presents a complicated dynamic process that accompanies users' lives, in which the link between multi-information symbiosis and conflict is frequently overlooked. We investigate two aspects influence of by examining phenomena dissemination individuals general environment networks. To characterize process, an effective model positive negative based on evolutionary game theory developed. reduce impact network ecosystem as much possible while...

10.1109/tnse.2022.3211988 article EN IEEE Transactions on Network Science and Engineering 2022-10-10

Due to the continued growth threat in Phishing, a kind of stable identity authentication method is highly needed based on individual characteristics just like browsing behaviors. Most existing researches focused behavior patterns group users are used personal recommendation, website structure optimization or web prediction. In order ensure validity user and security e-commerce, we construct personalized model ARM (Association Rule Mining) from Web usage log. We compare real-time behaviors...

10.1109/iscid.2014.205 article EN 2014-12-01
Coming Soon ...