Browsing by Author Yang, C

Showing results 1 to 20 of 32  next >
Issue DateTitleAuthor(s)
1-Dec-2018Inertial-Based Filtration Method for Removal of Microcarriers from Mesenchymal Stem Cell SuspensionsMoloudi, R; Oh, S; Yang, C; Teo, KL; Lam, ATL; Warkiani, ME; Naing, MW
1-Nov-2018A two-stage locality-sensitive hashing based approach for privacy-preserving mobile service recommendation in cross-platform edge environmentQi, L; Zhang, X; Dou, W; Hu, C; Yang, C; Chen, J
1-Oct-2018Curve fitting based efficient parameter selection for robust provable data possessionLiu, M; Zhang, X; Yang, C; He, Q; Zhang, J
5-Sep-2018Asymmetric Commutative Encryption Scheme Based Efficient Solution to the Millionaires' ProblemLiu, M; Nanda, P; Zhang, X; Yang, C; Yu, S; Li, J
10-Aug-2018Inference attack in android activity based on program fingerprintYang, L; Wei, T; Ma, J; Yu, S; Yang, C
1-Apr-2018Lanthanide-Doped Upconversion Luminescent Materials for Point of Care DiagnosisShang, Y; Bao, G; Zhou, J; Wong, K; Yang, C; Jin, D
1-Mar-2018Inertial particle focusing dynamics in a trapezoidal straight microchannel: application to particle filtrationMoloudi, R; Oh, S; Yang, C; Ebrahimi Warkiani, M; Naing, MW
1-Mar-2018The Blockchain as a Decentralized Security Framework [Future Directions]Puthal, D; Malik, N; Mohanty, SP; Kougianos, E; Yang, C
29-Jan-2018Stock market analysis using social networksLi, M; Puthal, D; Yang, C; Luo, Y; Zhang, J; Li, J
1-Jan-2018Privacy-preserving matrix product based static mutual exclusive roles constraints violation detection in interoperable role-based access controlLiu, M; Luo, Y; Yang, C; Pang, S; Puthal, D; Ren, K; Zhang, X
1-Oct-2017Big-Sensing-Data Curation for the Cloud is Coming: A Promise of Scalable Cloud-Data-Center Mitigation for Next-Generation IoT and Wireless Sensor NetworksYang, C; Puthal, D; Mohanty, SP; Kougianos, E
7-Sep-2017Privacy-Preserving Distributed Service Recommendation Based on Locality-Sensitive HashingQi, L; Xiang, H; Dou, W; Yang, C; Qin, Y; Zhang, X
7-Sep-2017Privacy-preserving detection of statically mutually exclusive roles constraints violation in interoperable role-based access controlLiu, M; Zhang, X; Yang, C; Pang, S; Puthal, D; Ren, K
1-Sep-2017Requirement-oriented core technological components’ identification based on SAO analysisYang, C; Zhu, D; Wang, X; Zhang, Y; Zhang, G; Lu, J
1-Jun-2017A scalable data chunk similarity based compression approach for efficient big sensing data processing on cloudYang, C; Chen, J
1-Jun-2017ChloroMitoCU: Codon patterns across organelle genomes for functional genomics and evolutionary applicationsSablok, G; Chen, TW; Lee, CC; Yang, C; Gan, RC; Wegrzyn, JL; La Porta, N; Nayak, KC; Huang, PJ; Varotto, C; Tang, P
8-Feb-2017Efficient Nonlinear Regression-Based Compression of Big Sensing Data on CloudYang, C; Chen, J
10-Jan-2017High power rechargeable magnesium/iodine battery chemistryTian, H; Gao, T; Li, X; Wang, X; Luo, C; Fan, X; Yang, C; Suo, L; Ma, Z; Han, W; Wang, C
1-Sep-2016Challenges facing an understanding of the nature of low-energy excited states in photosynthesisReimers, JR; Biczysko, M; Bruce, D; Coker, DF; Frankcombe, TJ; Hashimoto, H; Hauer, J; Jankowiak, R; Kramer, T; Linnanto, J; Mamedov, F; Müh, F; Rätsep, M; Renger, T; Styring, S; Wan, J; Wang, Z; Wang-Otomo, ZY; Weng, YX; Yang, C; Zhang, JP; Freiberg, A; Krausz, E
13-Jan-2016Semantic-based technology trend analysisYang, C; Zhu, D; Zhang, G