Junyu Lin

Orcid: 0009-0003-4007-9681

According to our database1, Junyu Lin authored at least 66 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
SDAC-BBPP: A Secure Dynamic Access Control Scheme With Blockchain-Based Privacy Protection for IIoT.
IEEE Trans. Netw. Serv. Manag., June, 2024

FGDB-MLPP: A fine-grained data-sharing scheme with blockchain based on multi-level privacy protection.
IET Commun., March, 2024

Enhancing privacy-preserving machine learning with self-learnable activation functions in fully homomorphic encryption.
J. Inf. Secur. Appl., 2024

CABC: A Cross-Domain Authentication Method Combining Blockchain with Certificateless Signature for IIoT.
Future Gener. Comput. Syst., 2024

Beyond Direct Relationships: Exploring Multi-Order Label Pair Dependencies for Knowledge Distillation.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

Cross-view Contrastive Unification Guides Generative Pretraining for Molecular Property Prediction.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

Cross-View Contrastive Fusion for Enhanced Molecular Property Prediction.
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024

2023
A Multitask Network for People Counting, Motion Recognition, and Localization Using Through-Wall Radar.
Sensors, October, 2023

Revisiting Multi-modal 3D Semantic Segmentation in Real-world Autonomous Driving.
CoRR, 2023

Multiple-Channel Weight-Based CNN Fault Diagnosis Method.
Proceedings of the Data Science, 2023

Research on Multi-Modal Time Series Data Prediction Method Based on Dual-Stage Attention Mechanism.
Proceedings of the Data Science, 2023

A Dark Transformation-Equivariant Algorithm for Dark Object Detection.
Proceedings of the 2023 4th International Conference on Computing, 2023

2022
D^2ETR: Decoder-Only DETR with Computationally Efficient Cross-Scale Attention.
CoRR, 2022

Smoothness and Liouville type theorem for a system with cubic nonlinearities from biaxial nematic liquid crystals in two dimensions.
Appl. Math. Lett., 2022

2021
Cooperation Learning From Multiple Social Networks: Consistent and Complementary Perspectives.
IEEE Trans. Cybern., 2021

PaintNet: A shape-constrained generative framework for generating clothing from fashion model.
Multim. Tools Appl., 2021

Bug Triage Model Considering Cooperative and Sequential Relationship.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

Correcting Perspective Distortion In Incremental Video Stitching.
Proceedings of the 2021 IEEE International Conference on Multimedia & Expo Workshops, 2021

2020
Black-box adversarial sample generation based on differential evolution.
J. Syst. Softw., 2020

Joint Service Caching and Computation Offloading to Maximize System Profits in Mobile Edge-Cloud Computing.
Proceedings of the 16th International Conference on Mobility, Sensing and Networking, 2020

Hybrid Optimization-Based GRU Neural Network for Software Reliability Prediction.
Proceedings of the Data Science, 2020

RE-GCN: Relation Enhanced Graph Convolutional Network for Entity Alignment in Heterogeneous Knowledge Graphs.
Proceedings of the Database Systems for Advanced Applications, 2020

Composite Backdoor Attack for Deep Neural Network by Mixing Existing Benign Features.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
DOAMI: A distributed on-line algorithm to minimize interference for routing in wireless sensor networks.
Theor. Comput. Sci., 2019

An effective method for service components selection based on micro-canonical annealing considering dependability assurance.
Frontiers Comput. Sci., 2019

A Multimodal Text Matching Model for Obfuscated Language Identification in Adversarial Communication?
Proceedings of the World Wide Web Conference, 2019

Nonstandard Periodic Gait Energy Image for Gait Recognition and Data Augmentation.
Proceedings of the Pattern Recognition and Computer Vision - Second Chinese Conference, 2019

A Time-Series Sockpuppet Detection Method for Dynamic Social Relationships.
Proceedings of the Database Systems for Advanced Applications, 2019

A Near-Optimal Heterogeneous Task Allocation Scheme for Mobile Crowdsensing.
Proceedings of the Wireless Sensor Networks - 13th China Conference, 2019

2018
Composing Semantic Collage for Image Retargeting.
IEEE Trans. Image Process., 2018

Learning adaptive receptive fields for deep image parsing networks.
Comput. Vis. Media, 2018

A Cross-Domain Collaborative Filtering Algorithm Based on Feature Construction and Locally Weighted Linear Regression.
Comput. Intell. Neurosci., 2018

Abstract: An Indoor Localization Simulation Platform for Localization Accuracy Evaluation.
Proceedings of the 15th Annual IEEE International Conference on Sensing, 2018

Optimal Content Caching Policy Considering Mode Selection and User Preference under Overlay D2D Communications.
Proceedings of the 14th International Conference on Mobile Ad-Hoc and Sensor Networks, 2018

Joint Optimization of Traffic and Computation Offloading in UAV-Assisted Wireless Networks.
Proceedings of the 15th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2018

A Collision-Free Path Planning Approach for Multiple Robots Under Warehouse Scenarios.
Proceedings of the Wireless Sensor Networks - 12th China Conference, 2018

An Action Recognition Method Based on Wearable Sensors.
Proceedings of the Ad Hoc Networks - 10th EAI International Conference, 2018

2017
Forward Self-Similar Solutions to the Viscoelastic Navier-Stokes Equation with Damping.
SIAM J. Math. Anal., 2017

Optimizing broadcast duration for layered video streams in cellular networks.
Peer-to-Peer Netw. Appl., 2017

Performance analysis and optimization for chunked network coding based wireless cooperative downloading systems.
Frontiers Inf. Technol. Electron. Eng., 2017

DGTM: a dynamic grouping based trust model for mobile peer-to-peer networks.
Frontiers Inf. Technol. Electron. Eng., 2017

面向移动物联网的可信超网络概念及构架研究 (Concept and Architecture of Trustworthy Super Network for Mobile Internet of Things).
计算机科学, 2017

Joint optimization of downlink and D2D transmissions for SVC streaming in cooperative cellular networks.
Neurocomputing, 2017

Optimal transmission for scalable video coded streaming in cellular wireless networks with the cooperation of local peer-to-peer network.
Int. J. Distributed Sens. Networks, 2017

Design and Realization of an Indoor Positioning Algorithm Based on Differential Positioning Method.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

The Construction and Application of MOOCs University Computer Foundation in Application-Oriented University.
Proceedings of the Data Science, 2017

A Cooperative Optimization Method for Mobile User Data Offloading.
Proceedings of the Wireless Sensor Networks, 2017

2016
服务器监控技术综述及展望 (Review and Prospect of Server Monitoring Technology).
计算机科学, 2016

An adaptive disorder-avoidance cooperative downloading method.
Comput. Networks, 2016

Multi-focus Image Fusion via Region Mosaicing on Contrast Pyramids.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016

Joint Optimization of Downlink and D2D Transmissions for SVC Streaming in Cooperative Cellular Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016

Lossless and High Robust Watermarking of Electronic Chart for Copyright Protection.
Proceedings of the Social Computing, 2016

MM-Sync: A Mobility Built-In Model Based Time Synchronization Approach for Underwater Sensor Networks.
Proceedings of the 2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud), 2016

2015
Global Finite Energy Weak Solutions to the Compressible Nematic Liquid Crystal Flow in Dimension Three.
SIAM J. Math. Anal., 2015

Analyzing the service availability of mobile cloud computing systems by fluid-flow approximation.
Frontiers Inf. Technol. Electron. Eng., 2015

A Generation Method of Network Security Hardening Strategy Based on Attack Graphs.
Int. J. Web Serv. Res., 2015

Fine-Grained Access Control for Big Data Based on CP-ABE in Cloud Computing.
Proceedings of the Intelligent Computation in Big Data Era, 2015

An Energy Efficient Random Walk Based Expanding Ring Search Method for Wireless Networks.
Proceedings of the Intelligent Computation in Big Data Era, 2015

Data Flow Analysis and Formal Method.
Proceedings of the Intelligent Computation in Big Data Era, 2015

An Availability Evaluation Method of Web Services Using Improved Grey Correlation Analysis with Entropy Difference and Weight.
Proceedings of the Intelligent Computation in Big Data Era, 2015

A Distributed Strategy for Defensing Objective Function Attack in Large-scale Cognitive Networks.
Proceedings of the Intelligent Computation in Big Data Era, 2015

A Dependable Service Path Searching Method in Distributed Virtualized Environment Using Adaptive Bonus-Penalty Micro-Canonical Annealing.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

Metric and Distributed On-Line Algorithm for Minimizing Routing Interference in Wireless Sensor Networks.
Proceedings of the Combinatorial Optimization and Applications, 2015

2014
DFDP: A Distributed Algorithm for Finding Disjoint Paths in Wireless Sensor Networks with Correctness Guarantee.
Int. J. Distributed Sens. Networks, 2014

An Adaptive Channel Sensing Approach and its Analysis Based on Hierarchical Colored Petri Net in Distributed Cognitive Radio Networks.
Proceedings of the Advances in Wireless Sensor Networks - The 8th China Conference, 2014

Network Traffic Analysis for Mobile Terminal Based Multi-scale Entropy.
Proceedings of the 2014 Asia-Pacific Services Computing Conference, 2014


  Loading...