Xiaoyi Yu

According to our database1, Xiaoyi Yu authored at least 38 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
VT-BPAN: vision transformer-based bilinear pooling and attention network fusion of RGB and skeleton features for human action recognition.
Multim. Tools Appl., September, 2024

2023
Integrating Vision Transformer-Based Bilinear Pooling and Attention Network Fusion of RGB and Skeleton Features for Human Action Recognition.
Int. J. Comput. Intell. Syst., December, 2023

Design Knowledge Perception and Representation Method for User Requirements.
Proceedings of the 6th IEEE International Conference on Knowledge Innovation and Invention, 2023

2022
Resource Mapping Allocation Scheme in 6G Satellite Twin Network.
Sensors, 2022

A Novel Method to Determine the Handover Threshold Based on Reconfigurable Factor Graph for LEO Satellite Internet Network.
IEEE Access, 2022

2021
Computing aware scheduling in mobile edge computing system.
Wirel. Networks, 2021

A novel adaptive code block group hybrid automatic repeat request scheme for low earth orbit satellite networks.
Int. J. Satell. Commun. Netw., 2021

A novel scheme of cross-network radio resources scheduling in SAGN based on unified resources mapping and genetic algorithm.
Int. J. Commun. Syst., 2021

A novel accurate and low-complexity behavior model for IMUX-HPA-OMUX of LEO satellite based on iterative compensation of cascade modeling errors.
IEICE Electron. Express, 2021

Research on Traffic Classification for Space-Ground Integrated Network Based on Feature Clustering.
Proceedings of the ICIT 2021: IoT and Smart City, Guangzhou, China, December 22 - 25, 2021, 2021

2019
Automatic Neural Network Search Method for Open Set Recognition.
Proceedings of the 2019 IEEE International Conference on Image Processing, 2019

An Efficient off-Line Handwritten Japanese Address Recognition System.
Proceedings of the 2019 International Conference on Document Analysis and Recognition, 2019

Text Line Adjustment Based on Neural Network.
Proceedings of the 2019 International Conference on Document Analysis and Recognition, 2019

2018
Generative Adversarial Networks for Open Set Historical Chinese Character Recognition.
Proceedings of the Visual Information Processing and Communication IX, Burlingame, CA, USA, 28 January 2018, 2018

Real-Time CPU Scheduling Approach for Mobile Edge Computing System.
Proceedings of the Smart Grid and Innovative Frontiers in Telecommunications, 2018

Compact Binary Feature for Open Set Recognition.
Proceedings of the 13th IAPR International Workshop on Document Analysis Systems, 2018

Prediction Based Deep Autoencoding Model for Anomaly Detection.
Proceedings of the Computer Vision - ACCV 2018 Workshops, 2018

2017
Semi-supervised Learning Feature Representation for Historical Chinese Character Recognition.
Proceedings of the Visual Information Processing and Communication VIII, Burlingame, CA, USA, 29 January 2017, 2017

Robust multi-object tracking based on higher-order graph and min-cost flow network.
Proceedings of the 4th International Conference on Systems and Informatics, 2017

Research and Demonstration of Measuring and Evaluation System of Electronic Resources Relying on Sniffer.
Proceedings of the 2017 International Conference on E-commerce, 2017


2013
A Quantum-Modeled Fuzzy C-Means clustering algorithm for remotely sensed multi-band image segmentation.
Proceedings of the 2013 IEEE International Geoscience and Remote Sensing Symposium, 2013

2009
Recoverable Privacy Protection for Video Content Distribution.
EURASIP J. Inf. Secur., 2009

2008
Isotropy-based steganalysis in multiple least significant bits.
Proceedings of the Security, 2008

A fast and effective method to detect multiple least significant bits steganography.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

An Improved Steganalysis Method of LSB Matching.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Breaking the YASS algorithm via pixel and DCT coefficients analysis.
Proceedings of the 19th International Conference on Pattern Recognition (ICPR 2008), 2008

Run length based steganalysis for LSB matching steganography.
Proceedings of the 2008 IEEE International Conference on Multimedia and Expo, 2008

Weighted stego-Image based steganalysis in multiple least significant bits.
Proceedings of the 2008 IEEE International Conference on Multimedia and Expo, 2008

Privacy protecting visual processing for secure video surveillance.
Proceedings of the International Conference on Image Processing, 2008

A discrete wavelet transform based recoverable image processing for privacy protection.
Proceedings of the International Conference on Image Processing, 2008

2007
Steganography using Sensor Noise and Linear Prediction Synthesis Filter.
Proceedings of the International Conference on Image Processing, 2007

Privacy Preserving: Hiding a Face in a Face.
Proceedings of the Computer Vision, 2007

2005
Extended optimization method of LSB steganalysis.
Proceedings of the 2005 International Conference on Image Processing, 2005

2004
Steganalysis of Data Hiding in Binary Images.
Proceedings of the 17th International Conference on Pattern Recognition, 2004

On Estimation of Secret Message Length in JSteg-like Steganography.
Proceedings of the 17th International Conference on Pattern Recognition, 2004

Model based steganalysis.
Proceedings of the 2004 International Conference on Image Processing, 2004

Reliable detection of BPCS-steganography in natural images.
Proceedings of the Third International Conference on Image and Graphics, 2004


  Loading...