Follow
Yanping Zhang
Yanping Zhang
Verified email at gonzaga.edu
Title
Cited by
Cited by
Year
A survey of cyber crimes
Y Zhang, Y Xiao, K Ghaboosi, J Zhang, H Deng
Security and Communication Networks 5 (4), 422-437, 2012
892012
Coverage, connectivity, and deployment in wireless sensor networks
Y Wang, Y Zhang, J Liu, R Bhandari
Recent development in wireless sensor and ad-hoc networks, 25-44, 2015
702015
A survey of security visualization for computer network logs
Y Zhang, Y Xiao, M Chen, J Zhang, H Deng
Security and Communication Networks 5 (4), 404-421, 2012
492012
Performance analysis of ALOHA and p-persistent ALOHA for multi-hop underwater acoustic sensor networks
Y Xiao, Y Zhang, JH Gibson, GG Xie, H Chen
Cluster Computing 14, 65-80, 2011
382011
Divide‐and conquer‐based surveillance framework using robots, sensor nodes, and RFID tags
Y Xiao, Y Zhang
Wireless Communications and Mobile Computing 11 (7), 964-979, 2011
332011
Two and three-dimensional intrusion object detection under randomized scheduling algorithms in sensor networks
Y Xiao, Y Zhang, M Peng, H Chen, X Du, B Sun, K Wu
Computer Networks 53 (14), 2458-2475, 2009
302009
Surveillance and tracking system with collaboration of robots, sensor nodes, and RFID tags
Y Xiao, Y Zhang
2009 Proceedings of 18th International Conference on Computer Communications …, 2009
282009
Primate social systems, scent-marking and their applications in mobile and static sensor networks
Y Zhang, Y Xiao, KL Bales
International Journal of Sensor Networks 5 (4), 210-222, 2009
282009
Primate-inspired communication methods for mobile and static sensors and RFID tags
Y Xiao, Y Zhang, X Liang
ACM Transactions on Autonomous and Adaptive Systems (TAAS) 6 (4), 1-37, 2011
272011
A critical line based boundary surveillance strategy in wireless sensor networks
Y Xiao, Y Zhang
Telecommunication Systems 52, 423-434, 2013
232013
LPViT: a transformer based model for PCB image classification and defect detection
K An, Y Zhang
IEEE Access 10, 42542-42553, 2022
212022
Primate-inspired scent marking for mobile and static sensors and RFID tags
Y Zhang, Y Xiao
2009 Proceedings of 18th International Conference on Computer Communications …, 2009
182009
Generating routes for autonomous driving in vehicle-to-infrastructure communications
J Yang, T Chen, B Payne, P Guo, Y Zhang, J Guo
Digital Communications and Networks 6 (4), 444-451, 2020
162020
A patrolling scheme in wireless sensor and robot networks
Y Zhang, Y Xiao
Proceedings of the IEEE Conference on Computer Communications Workshops …, 2011
142011
Performance analysis of p-persistent aloha for multi-hop underwater acoustic sensor networks
Y Xiao, Y Zhang, JH Gibson, GG Xie
2009 International Conference on Embedded Software and Systems, 305-311, 2009
142009
Bio-inspired patrolling scheme design in wireless and mobile sensor and robot networks
Y Zhang, Y Xiao, Y Wang, P Mosca
Wireless Personal Communications 92, 1303-1332, 2017
112017
Medium access control layer for underwater sensor networks
Y Zhang, Y Xiao, M Chen, P Bahri, M Kamboj
Underwater Acoustic Sensor Networks, 179-250, 2009
112009
Intrusion objects with shapes under randomized scheduling algorithm in sensor networks
Y Xiao, H Chen, Y Zhang, X Du, B Sun, K Wu
2008 The 28th International Conference on Distributed Computing Systems …, 2008
102008
Datlmedqa: A data augmentation and transfer learning based solution for medical question answering
S Zhou, Y Zhang
Applied Sciences 11 (23), 11251, 2021
82021
Partial sensing coverage in 3d wireless lattice sensor networks
Y Wang, W Chu, Z Xiao, Y Zhang
2014 IEEE International Conference on Communications (ICC), 24-29, 2014
82014
The system can't perform the operation now. Try again later.
Articles 1–20