Chenyang Yu

Orcid: 0000-0002-9813-3164

According to our database1, Chenyang Yu authored at least 16 papers between 2021 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Deeply Coupled Convolution-Transformer With Spatial-Temporal Complementary Learning for Video-Based Person Re-Identification.
IEEE Trans. Neural Networks Learn. Syst., October, 2024

A Video Is Worth Three Views: Trigeminal Transformers for Video-Based Person Re-Identification.
IEEE Trans. Intell. Transp. Syst., September, 2024

Sensitive Breath Acetone Detection Based on α-Fe<sub>2</sub>O<sub>3</sub> Nanoparticles Modified WO<sub>3</sub> Nanoplate Heterojunctions.
IEEE Trans. Instrum. Meas., 2024

Evaluating the Effectiveness of Deep Learning Models for Foundational Program Analysis Tasks.
Proc. ACM Program. Lang., 2024

Part Representation Learning with Teacher-Student Decoder for Occluded Person Re-Identification.
Proceedings of the IEEE International Conference on Acoustics, 2024

Enhancing Weakly Supervised Anomaly Detection in Surveillance Videos: The CLIP-Augmented Bimodal Memory Enhanced Network.
Proceedings of the 17th International Conference on Control, 2024

Harnessing LLMs for Cross-City OD Flow Prediction.
Proceedings of the 32nd ACM International Conference on Advances in Geographic Information Systems, 2024

Protecting Vehicle Location Privacy with Contextually-Driven Synthetic Location Generation.
Proceedings of the 32nd ACM International Conference on Advances in Geographic Information Systems, 2024

TF-CLIP: Learning Text-Free CLIP for Video-Based Person Re-identification.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Ped-Mix: Mix Pedestrians for Occluded Person Re-identification.
Proceedings of the Pattern Recognition and Computer Vision - 6th Chinese Conference, 2023

Lark: Verified Cross-Domain Access Control for Trusted Execution Environments.
Proceedings of the 34th IEEE International Symposium on Software Reliability Engineering, 2023

VeriReach: A Formally Verified Algorithm for Reachability Analysis in Virtual Private Cloud Networks.
Proceedings of the IEEE International Conference on Web Services, 2023

2022
PA-Boot: A Formally Verified Authentication Protocol for Multiprocessor Secure Boot.
CoRR, 2022

Is your access allowed or not? A Verified Tag-based Access Control Framework for the Multi-domain TEE.
Proceedings of the Internetware 2022: 13th Asia-Pacific Symposium on Internetware, Hohhot, China, June 11, 2022

Designing, Developing and Deploying an Enterprise Scale Network Monitoring System.
Proceedings of the ISEC 2022: 15th Innovations in Software Engineering Conference, Gandhinagar, India, February 24, 2022

2021
Watching You: Global-Guided Reciprocal Learning for Video-Based Person Re-Identification.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021


  Loading...