Yongpeng Yang
This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.
Bibliography
2024
Multim. Tools Appl., March, 2024
Nonconvex γ-norm and Laplacian scale mixture with salient map for moving object detection.
Multim. Tools Appl., March, 2024
Multim. Tools Appl., 2024
2023
Big Data Res., November, 2023
Dynamic Jacobi graph and trend-aware flow attention convolutional network for traffic forecasting.
Digit. Signal Process., September, 2023
Digit. Signal Process., September, 2023
Novel RPCA with nonconvex logarithm and truncated fraction norms for moving object detection.
Digit. Signal Process., March, 2023
Time-series Decomposition and Augmented Self-rescaling Graph Neural Network for Traffic Forecasting.
Proceedings of the International Conference on Wireless Communications and Signal Processing, 2023
2022
Multim. Tools Appl., November, 2022
Proceedings of the KDD '22: The 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 14, 2022
2021
ACM Trans. Multim. Comput. Commun. Appl., 2021
Noise robust intuitionistic fuzzy c-means clustering algorithm incorporating local information.
IET Image Process., 2021
2020
Generalized nuclear norm and Laplacian scale mixture based low-rank and sparse decomposition for video foreground-background separation.
Signal Process., 2020
Brain MR Multimodal Medical Image Registration Based on Image Segmentation and Symmetric Self-similarity.
KSII Trans. Internet Inf. Syst., 2020
Foreground-Background Separation via Generalized Nuclear Norm and Structured Sparse Norm Based Low-Rank and Sparse Decomposition.
IEEE Access, 2020
2019
Generalized singular value thresholding operator based nonconvex low-rank and sparse decomposition for moving object detection.
J. Frankl. Inst., 2019
2017
Modeling and analysis of identity threat behaviors through text mining of identity theft stories.
Comput. Secur., 2017
2014
Modelling and Analysis of Identity Threat Behaviors through Text Mining of Identity Theft Stories.
Proceedings of the IEEE Joint Intelligence and Security Informatics Conference, 2014
2010
Membership based on combining cluster center with affinity in FSVR and its application in soft sensor modeling.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2010
Proceedings of the Seventh International Conference on Fuzzy Systems and Knowledge Discovery, 2010