Jiang Yu

Orcid: 0009-0006-2328-698X

According to our database1, Jiang Yu authored at least 87 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Diverse Batch Steganography Using Model-Based Selection and Double-Layered Payload Assignment.
IEEE Trans. Circuits Syst. Video Technol., August, 2024

S2TD-Face: Reconstruct a Detailed 3D Face with Controllable Texture from a Single Sketch.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024


2023
Melnikov analysis in a cubic system with a multiple line of critical points.
Appl. Math. Lett., November, 2023

Digital-Enabled Public Service Innovation in China's eHealth Sector: An Institutional Logics Perspective.
IEEE Trans. Engineering Management, April, 2023

Secure Steganographic Cover Generation via a Noise-Optimization Stacked StyleGAN2.
Symmetry, April, 2023

A New Performance Evaluation Method of Cross-Border E-Commerce Supply Chain based on LMBP Algorithm.
Proceedings of the 15th International Conference on Computer Modeling and Simulation, 2023

2022
Nontrivial Limit Cycles in a Kind of Piecewise Smooth Generalized Abel Equation.
Int. J. Bifurc. Chaos, 2022

Limit Cycles Bifurcating from a Class of Cubic Hamiltonian Systems.
Int. J. Bifurc. Chaos, 2022

Analysis of Crucial Factors Affecting Contact Force of PCB Spring Terminals Based on Simulation and Rank Correlation.
IEEE Access, 2022

Improving Machine Translation Formality Control with Weakly-Labelled Data Augmentation and Post Editing Strategies.
Proceedings of the 19th International Conference on Spoken Language Translation, 2022

Research on Data Processing and Visualization of Simulation System.
Proceedings of the 5th International Conference on Big Data Technologies, 2022

2021
Performance Limit and Coding Schemes for Resistive Random-Access Memory Channels.
IEEE Trans. Commun., 2021

Double linear regression prediction based reversible data hiding in encrypted images.
Multim. Tools Appl., 2021

Limit Cycles in Discontinuous Planar Piecewise Linear Systems Separated by a Nonregular Line of Center-Center Type.
Int. J. Bifurc. Chaos, 2021

A Chi-MIC Based Adaptive Multi-Branch Decision Tree.
IEEE Access, 2021

2020
Manufacturing strategies for the ecosystem-based manufacturing system in the context of 3D printing.
Int. J. Prod. Res., 2020

Centers and Limit Cycles of a Generalized Cubic Riccati System.
Int. J. Bifurc. Chaos, 2020

Second Order Melnikov Functions of Piecewise Hamiltonian Systems.
Int. J. Bifurc. Chaos, 2020

Intelligent and Ubiquitous Positioning Framework in 5G Edge Computing Scenarios.
IEEE Access, 2020

Coding for Resistive Random-Access Memory Channels.
Proceedings of the IEEE Global Communications Conference, 2020

Dynamic Trajectory for Visual Perception of Abnormal Behavior.
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020

Multi-resolution Steganalysis of JPEG Images Using the Contrast of DCT Coefficients.
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020

Research on Simulation Method of 5G Location Based on Channel Modeling.
Proceedings of the 6GN for Future Wireless Networks - Third EAI International Conference, 2020

2019
一种基于CSI的非合作式人体行为识别方法 (Non-cooperative Human Behavior Recognition Method Based on CSI).
计算机科学, 2019

Poincaré Maps of " <"-Shape Planar Piecewise Linear Dynamical Systems with a Saddle.
Int. J. Bifurc. Chaos, 2019

Field-of-view prediction in 360-degree videos with attention-based neural encoder-decoder networks.
Proceedings of the 11th ACM Workshop on Immersive Mixed and Virtual Environment Systems, 2019

2018
Technological innovation systems and IT industry sustainability in China: A case study of mobile system innovation.
Telematics Informatics, 2018

Robust Batch Steganography in Social Networks With Non-Uniform Payload and Data Decomposition.
IEEE Access, 2018

A Modulation Recognition Method Based on Bispectrum and DNN.
Proceedings of the Communications, Signal Processing, and Systems, 2018

Model of Decision Making for Agents Based on Relationship Coefficient.
Proceedings of the Applications and Techniques in Information Security, 2018

2017
Research on Initial Rotor Position Estimation and Anti-Reverse Startup Methods for DSEM.
IEEE Trans. Ind. Electron., 2017

一种改进的自适应全双工中继系统中继策略 (Improved Adaptive Relaying Strategy for Full Duplex Relay System).
计算机科学, 2017

Reversible data hiding in encrypted images with auxiliary syndrome.
Proceedings of the 2017 International Symposium on Intelligent Signal Processing and Communication Systems, 2017

Improved detection for copy-move forgery with multi-scale sliding windows.
Proceedings of the 2017 International Symposium on Intelligent Signal Processing and Communication Systems, 2017

A Positioning Method Based on RSSI and Power Spectrum Waveform Distinction.
Proceedings of the Communications and Networking, 2017

Understanding a moderating effect of physicians' endorsement to online workload: An empirical study in online health-care communities.
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017

2016
Predictive Power Control of Matrix Converter With Active Damping Function.
IEEE Trans. Ind. Electron., 2016

Spatial Steganalysis Using Contrast of Residuals.
IEEE Signal Process. Lett., 2016

Digital image steganalysis based on local textural features and double dimensionality reduction.
Secur. Commun. Networks, 2016

Spatial steganalysis using redistributed residuals and diverse ensemble classifier.
Multim. Tools Appl., 2016

AC-coefficient histogram-based retrieval for encrypted JPEG images.
Multim. Tools Appl., 2016

Encrypted JPEG image retrieval using block-wise feature comparison.
J. Vis. Commun. Image Represent., 2016

基于断裂结构线匹配模型的大破损区域图像修复算法 (Large Damaged Area Image Inpainting Algorithm Based on Matching Model for Broken Structure Line).
计算机科学, 2016

Markov process-based retrieval for encrypted JPEG images.
EURASIP J. Inf. Secur., 2016

2015
Local structure preserving discriminative projections for RGB-D sensor-based scene classification.
Inf. Sci., 2015

Multiple Description Coding for Encrypted Images.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015

Reversible visible watermark embedded in encrypted domain.
Proceedings of the IEEE China Summit and International Conference on Signal and Information Processing, 2015

A high efficient hardware architecture for multiview 3DTV.
Proceedings of the 20th Asia and South Pacific Design Automation Conference, 2015

2014
Modelling and analysis of protection and control applications in smart substation.
Int. J. Wirel. Mob. Comput., 2014

On the Limit Cycles of the Polynomial Differential Systems with a Linear Node and Homogeneous Nonlinearities.
Int. J. Bifurc. Chaos, 2014

Adaptive JPEG steganography with new distortion function.
Ann. des Télécommunications, 2014

2013
Nurturing business ecosystems to deal with industry uncertainties.
Ind. Manag. Data Syst., 2013

Linking business ecosystem lifecycle with platform strategy: a triple view of technology, application and organisation.
Int. J. Technol. Manag., 2013

On the sliding bifurcation of a Class of Planar Filippov Systems.
Int. J. Bifurc. Chaos, 2013

2012
Building virtual network for high-tech industry clusters: lessons from China.
Int. J. Netw. Virtual Organisations, 2012

2011
From 3G to 4G: technology evolution and path dynamics in China's mobile telecommunication sector.
Technol. Anal. Strateg. Manag., 2011

Distributed Greedy Synchronization with Memory in Self-Organized.
J. Next Gener. Inf. Technol., 2011

Building collaboration networks for 3G system development, attempts from China.
Int. J. Inf. Technol. Manag., 2011

Opportunistic Cooperative Multicast Based on Coded Cooperation.
IEICE Trans. Commun., 2011

Optimization of Vehicles Arrangement in Distribution Center.
Proceedings of the LISS 2011 - Proceedings of the 1st International Conference on Logistics, Informatics and Service Science, Volume 2, Beijing, China, 8, 2011

QoS Guarantee in Tomcat Web Server: A Feedback Control Approach.
Proceedings of the 2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2011

2010
Developing effective strategies to address complex challenges: evidence from local high-tech firms in China.
Int. J. Technol. Manag., 2010

Has China caught up in IT?
Commun. ACM, 2010

Cryptographic Key Agreement Protocol Simulation.
Proceedings of the Sixth International Conference on Semantics Knowledge and Grid, 2010

A Based-on A* Algorithm for Scheduling Application Tasks in Simulation Grid.
Proceedings of the Sixth International Conference on Semantics Knowledge and Grid, 2010

FDCT-Based Digital Watermarking Algorithm for Gray Images.
Proceedings of the International Conference on Computational Aspects of Social Networks, 2010

2009
A Scalable Testing Framework for Location-Based Services.
J. Comput. Sci. Technol., 2009

Detecting academic experts by topic-sensitive link analysis.
Frontiers Comput. Sci. China, 2009

Product Integrated Innovation Based on Function.
Proceedings of the Growth and Development of Computer-Aided Innovation, 2009

Hidden Topic Analysis Based Formal Framework for Finding Experts in Metadata Corpus.
Proceedings of the 8th IEEE/ACIS International Conference on Computer and Information Science, 2009

2008
Evaluating 3G Licensing Patterns for an Indigenous Standard in China.
Int. J. Inf. Technol. Decis. Mak., 2008

Self-Organized Synchronization in Wireless Network.
Proceedings of the Second IEEE International Conference on Self-Adaptive and Self-Organizing Systems, 2008

An Application of Pansystems Methodology to Path's Searching Problem Solving.
Proceedings of the 2008 International Conference on Foundations of Computer Science, 2008

2007
MIMO-OFDM Transmission Adaptation using Rank.
Proceedings of the IEEE 18th International Symposium on Personal, 2007

Recommending Expert System of Project Reviewing Based on CBR.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Contemporary Intelligent Computing Techniques, 2007

2006
A dynamic caching algorithm based on internal popularity distribution of streaming media.
Multim. Syst., 2006

Variable Rate Caching for Video Delivery in Heterogeneous Environment.
Proceedings of IEEE International Conference on Communications, 2006

Internal popularity of streaming video and its implication on caching.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

2005
A low-power multi-bit ΣΔ modulator in 90-nm digital CMOS without DEM.
IEEE J. Solid State Circuits, 2005

The evolution of China's mobile telecommunications industry: past, present and future.
Int. J. Mob. Commun., 2005

The strategic roles of government in e-infrastructure development: case studies of China and Korea.
Electron. Gov. an Int. J., 2005

A novel space-borne antenna anti-jamming technique based on immunity genetic algorithm-maximum likelihood.
Sci. China Ser. F Inf. Sci., 2005

Agile Testing of Location Based Services.
Proceedings of the Extreme Programming and Agile Processes in Software Engineering, 2005

The national champion in ICT standard competition: evidence from an emerging country.
Proceedings of the Weapons and Wires, 2005

2004
Building innovative capability in firms of developing countries to face the domestic global competition.
Proceedings of the International Symposium on Technology and Society, 2004

2003
Air Canon Design of Projection-Based Olfactory Display.
Proceedings of the Online Proceeding of the 13th International Conference on Artificial Reality and Telexistence, 2003


  Loading...