Follow
Wangyang Yu
Wangyang Yu
Verified email at snnu.edu.cn
Title
Cited by
Cited by
Year
Modeling and validating e-commerce business process based on Petri nets
WY Yu, CG Yan, ZJ Ding, CJ Jiang, MC Zhou
IEEE Transactions on Systems, Man, and Cybernetics: Systems 44 (3), 327-341, 2013
862013
Modeling and verification of online shopping business processes by considering malicious behavior patterns
WY Yu, CG Yan, ZJ Ding, CJ Jiang, MC Zhou
IEEE Transactions on Automation Science and Engineering 13 (2), 647-662, 2014
552014
Analyzing E-commerce business process nets via incidence matrix and reduction
W Yu, C Yan, Z Ding, C Jiang, M Zhou
IEEE Transactions on Systems, Man, and Cybernetics: Systems 48 (1), 130-141, 2016
392016
Modeling and analysis of medical resource allocation based on Timed Colored Petri net
W Yu, M Jia, X Fang, Y Lu, J Xu
Future Generation Computer Systems 111, 368-374, 2020
382020
Petri net based data-flow error detection and correction strategy for business processes
C Liu, Q Zeng, H Duan, L Wang, J Tan, C Ren, W Yu
IEEE Access 8, 43265-43276, 2020
382020
Petri net-based methods for analyzing structural security in e-commerce business processes
W Yu, Z Ding, L Liu, X Wang, RD Crossley
Future Generation Computer Systems 109, 611-620, 2020
292020
Cross-project defect prediction via landmark selection-based kernelized discriminant subspace alignment
Z Li, J Niu, XY Jing, W Yu, C Qi
IEEE Transactions on Reliability 70 (3), 996-1013, 2021
272021
Image analysis and machine learning-based malaria assessment system
K Manning, X Zhai, W Yu
Digital Communications and Networks 8 (2), 132-142, 2022
262022
Optimal control for positive and negative information diffusion based on game theory in online social networks
P Wan, X Wang, G Min, L Wang, Y Lin, W Yu, X Wu
IEEE Transactions on Network Science and Engineering 10 (1), 426-440, 2022
162022
A Detection Method for Abnormal Transactions in E‐Commerce Based on Extended Data Flow Conformance Checking
Y Wang, W Yu, P Teng, G Liu, D Xiang
Wireless Communications and Mobile Computing 2022 (1), 4434714, 2022
162022
A dynamic data slice approach to the vulnerability analysis of e-commerce systems
M Wang, Z Ding, P Zhao, W Yu, C Jiang
IEEE Transactions on Systems, Man, and Cybernetics: Systems 50 (10), 3598-3612, 2018
162018
A kind of identity authentication method based on browsing behaviors
J Zhong, C Yan, W Yu, P Zhao, M Wang
2014 Seventh International Symposium on Computational Intelligence and …, 2014
142014
A complex event processing-based online shopping user risk identification system
Z Ma, W Yu, X Zhai, M Jia
IEEE Access 7, 172088-172096, 2019
132019
Dual-LightGCN: Dual light graph convolutional network for discriminative recommendation
W Huang, F Hao, J Shang, W Yu, S Zeng, C Bisogni, V Loia
Computer Communications 204, 89-100, 2023
122023
A multiperspective fraud detection method for multiparticipant e-commerce transactions
W Yu, Y Wang, L Liu, Y An, B Yuan, J Panneerselvam
IEEE Transactions on Computational Social Systems 11 (2), 1564-1576, 2023
122023
Dynamic slicing of Petri nets based on structural dependency graph and its application in system analysis
W Yu, Z Ding, X Fang
Asian Journal of Control 17 (4), 1403-1414, 2015
122015
An auto-extraction framework for cep rules based on the two-layer lstm attention mechanism: A case study on city air pollution forecasting
Y Liu, W Yu, C Gao, M Chen
Energies 15 (16), 5892, 2022
92022
Modeling and analytics of multi-factor disease evolutionary process by fusing petri nets and machine learning methods
W Yu, X Wang, X Fang, X Zhai
Applied Soft Computing 142, 110325, 2023
72023
Monocular 3D Human Pose Markerless Systems for Gait Assessment
X Zhu, I Boukhennoufa, B Liew, C Gao, W Yu, KD McDonald-Maier, ...
Bioengineering 10 (6), 653, 2023
62023
Knowledge points navigation based on three-way concept lattice for autonomous learning
F Hao, Y Gong, W Yu, V Loia
Pattern Recognition Letters 163, 96-103, 2022
62022
The system can't perform the operation now. Try again later.
Articles 1–20