Yu Qin

Orcid: 0009-0000-4244-1443

According to our database1, Yu Qin authored at least 124 papers between 2004 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Rapid and Precise Topological Comparison with Merge Tree Neural Networks.
IEEE Trans. Vis. Comput. Graph., January, 2025

2024
An hp-version error estimate of spectral collocation methods for weakly singular Volterra integro-differential equations with vanishing delays.
Comput. Appl. Math., July, 2024

Survey of research on confidential computing.
IET Commun., June, 2024

Research on Three-Dimensional Cloud Structure Retrieval and Fusion Technology for the MODIS Instrument.
Remote. Sens., May, 2024

Spatial-Aware Learning in Feature Embedding and Classification for One-Stage 3-D Object Detection.
IEEE Trans. Geosci. Remote. Sens., 2024

Application-Oriented Talents Training for Music Majors in Colleges and Universities Based on Internet Remote Technology.
Int. J. Web Based Learn. Teach. Technol., 2024

Multi-branch-feature fusion super-resolution network.
Digit. Signal Process., 2024

ICML Topological Deep Learning Challenge 2024: Beyond the Graph Domain.
CoRR, 2024

Decoupled and Interactive Regression Modeling for High-performance One-stage 3D Object Detection.
CoRR, 2024

Learning production functions for supply chains with graph neural networks.
CoRR, 2024

Derivative-free tree optimization for complex systems.
CoRR, 2024

Enhancing the "Immunity" of Mixture-of-Experts Networks for Adversarial Defense.
CoRR, 2024

Context-based Fast Recommendation Strategy for Long User Behavior Sequence in Meituan Waimai.
Proceedings of the Companion Proceedings of the ACM on Web Conference 2024, 2024

Transformer Model with Multi-Type Classification Decisions for Intrusion Attack Detection of Track Traffic and Vehicle.
Proceedings of the IEEE International Conference on Acoustics, 2024

UDAA: An Unsupervised Domain Adaptation Adversarial Learning Framework for Zero-Resource Cross-Domain Named Entity Recognition.
Proceedings of the Chinese Computational Linguistics - 23rd China National Conference, 2024

2023
High Spatial Resolution Fractional Vegetation Coverage Inversion Based on UAV and Sentinel-2 Data: A Case Study of Alpine Grassland.
Remote. Sens., September, 2023

Unlocking the Power of Voice for Financial Risk Prediction: A Theory-Driven Deep Learning Design Approach.
MIS Q., 2023

A Non-Uniform Low-Light Image Enhancement Method with Multi-Scale Attention Transformer and Luminance Consistency Loss.
CoRR, 2023

Visualizing Topological Importance: A Class-Driven Approach.
CoRR, 2023

Heterogeneous Knowledge Fusion: A Novel Approach for Personalized Recommendation via LLM.
CoRR, 2023

Dynamic Grouping for Climate Change Negotiation: Facilitating Cooperation and Balancing Interests through Effective Strategies.
CoRR, 2023

Cluster Nodes Integrity Attestation and Monitoring Scheme for Confidential Computing Platform.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

Heterogeneous Knowledge Fusion: A Novel Approach for Personalized Recommendation via LLM.
Proceedings of the 17th ACM Conference on Recommender Systems, 2023

Prompt-Based Learning in Natural Language Processing from 2020 to 2022, a Survey.
Proceedings of the 8th IEEE International Conference on Network Intelligence and Digital Content, 2023

Spiking Neural Network Based Text Summarization System.
Proceedings of the 8th IEEE International Conference on Network Intelligence and Digital Content, 2023

CNN-Transformer Combined with Skip Structure for Tuberculosis Cavity Segmentation.
Proceedings of the 9th International Conference on Computing and Artificial Intelligence, 2023

Content Richness Evaluation Method For Abstractive Summarization.
Proceedings of the 9th IEEE International Conference on Cloud Computing and Intelligent Systems, 2023

2022
A Domain-Oblivious Approach for Learning Concise Representations of Filtered Topological Spaces for Clustering.
IEEE Trans. Vis. Comput. Graph., 2022

Multi-Scale Validation and Uncertainty Analysis of GEOV3 and MuSyQ FVC Products: A Case Study of an Alpine Grassland Ecosystem.
Remote. Sens., 2022

A Multi-Stage Ensembled-Learning Approach for Signal Classification Based on Deep CNN and LGBM Models.
J. Commun., 2022

Biosignal Classification Based on Multi-Feature Multi-Dimensional WaveNet-LSTM Models.
J. Commun., 2022

A document analysis deep learning regression model for initial coin offerings success prediction.
Expert Syst. Appl., 2022

MHKD-MVQA: Multimodal Hierarchical Knowledge Distillation for Medical Visual Question Answering.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2022

Deconfounded Visual Grounding.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
Applications of UAVs in Cold Region Ecological and Environmental Studies.
Remote. Sens., 2021

Mapping of Kobresia pygmaea Community Based on Umanned Aerial Vehicle Technology and Gaofen Remote Sensing Data in Alpine Meadow Grassland: A Case Study in Eastern of Qinghai-Tibetan Plateau.
Remote. Sens., 2021

Multimodal super-resolved <i>q</i>-space deep learning.
Medical Image Anal., 2021

Super-Resolved q-Space deep learning with uncertainty quantification.
Medical Image Anal., 2021

Lightweight densely connected residual network for human pose estimation.
J. Real Time Image Process., 2021

Evolutionary Programming: A Population-Based Optimization Algorithm for Coded Multiuser Systems.
J. Commun., 2021

Graph-Based Detection and LDPC Decoding over 2D Intersymbol Interference Channels.
J. Commun., 2021

Limited-Search Chase Decoding Algorithm for LDPC Coded Underwater Acoustic Multiuser Channels.
J. Commun., 2021

PANet: Perspective-Aware Network with Dynamic Receptive Fields and Self-Distilling Supervision for Crowd Counting.
CoRR, 2021

A Domain-Oblivious Approach for Learning Concise Representations of Filtered Topological Spaces.
CoRR, 2021

Multi-hop Learning Promote Cooperation in Multi-agent Systems.
Proceedings of the Knowledge Science, Engineering and Management, 2021

A Deblurring Method of Electric Power Inspection Images Based on GAN.
Proceedings of the 7th International Conference on Systems and Informatics, 2021

Design and Implementation of Artificial Intelligence Platform Dedicated to Power System.
Proceedings of the 7th International Conference on Systems and Informatics, 2021

2020
The Effect of Laser and Ultrasound Synchronization in Photo-Mediated Ultrasound Therapy.
IEEE Trans. Biomed. Eng., 2020

RIPTE: Runtime Integrity Protection Based on Trusted Execution for IoT Device.
Secur. Commun. Networks, 2020

Effects of Patchiness on Surface Soil Moisture of Alpine Meadow on the Northeastern Qinghai-Tibetan Plateau: Implications for Grassland Restoration.
Remote. Sens., 2020

Species Monitoring Using Unmanned Aerial Vehicle to Reveal the Ecological Role of Plateau Pika in Maintaining Vegetation Diversity on the Northeastern Qinghai-Tibetan Plateau.
Remote. Sens., 2020

Finite-time synchronization of complex-valued neural networks with finite-time distributed delays.
Neurocomputing, 2020

Optimization of a Fuze MEMS Setback Arming Device Based on the EDM Process.
IEEE Access, 2020

SeRoT: A Secure Runtime System on Trusted Execution Environments.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Genetic Algorithm (GA)-Based Detection for Coded Partial-Response Channels.
Proceedings of the MLMI 2020: The 3rd International Conference on Machine Learning and Machine Intelligence, 2020

Knowledge Transfer Between Datasets for Learning-Based Tissue Microstructure Estimation.
Proceedings of the 17th IEEE International Symposium on Biomedical Imaging, 2020

Financial Risk Prediction with Multi-Round Q&A Attention Network.
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020

Photo-mediated Ultrasound Therapy to Treat Retinal Neovascularization.
Proceedings of the 42nd Annual International Conference of the IEEE Engineering in Medicine & Biology Society, 2020

2019
Hydrological stream data pipeline framework based on IoTDB.
Serv. Oriented Comput. Appl., 2019

Finite-Time Synchronization of Complex-Valued Neural Networks with Multiple Time-Varying Delays and Infinite Distributed Delays.
Neural Process. Lett., 2019

Evaluation of the Accuracy of the Field Quadrat Survey of Alpine Grassland Fractional Vegetation Cover Based on the Satellite Remote Sensing Pixel Scale.
ISPRS Int. J. Geo Inf., 2019

Analysis of the Effect of UV-LIGA Fabrication Error on the Microspring Elastic Coefficient.
IEEE Access, 2019

Tests and Simulation Research on the Output Energy of Microdetonators.
IEEE Access, 2019

Model Predictive Control of Heating Process with Weather Forecast Compensation.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2019

Minimal Kernel: An Operating System Architecture for TEE to Resist Board Level Physical Attacks.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

Super-Resolved q-Space Deep Learning.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2019, 2019

Recurrent Layer Aggregation using LSTM.
Proceedings of the International Joint Conference on Neural Networks, 2019

Network Search for Binary Networks.
Proceedings of the International Joint Conference on Neural Networks, 2019

A Bayesian Improved Defense Model for Deceptive Attack in Honeypot-Enabled Networks.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

Look Back and Predict Forward in Image Captioning.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019

SecTEE: A Software-based Approach to Secure Enclave Architecture Using TEE.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

What You Say and How You Say It Matters: Predicting Stock Volatility Using Verbal and Vocal Cues.
Proceedings of the 57th Conference of the Association for Computational Linguistics, 2019

2018
A Panel Data Model-Based Multi-Factor Predictive Model of Highway Electromechanical Equipment Faults.
IEEE Trans. Intell. Transp. Syst., 2018

Using mobile phones to enhance computing platform trust.
Telecommun. Syst., 2018

Estimation of Grassland Canopy Height and Aboveground Biomass at the Quadrat Scale Using Unmanned Aerial Vehicle.
Remote. Sens., 2018

工业控制系统的安全技术与应用研究综述 (Summary of Security Technology and Application in Industrial Control System).
计算机科学, 2018

Formal analysis of HMAC authorisation in the TPM2.0 specification.
IET Inf. Secur., 2018

Attend More Times for Image Captioning.
CoRR, 2018

AAoT: Lightweight attestation and authentication of low-resource things in IoT and CPS.
Comput. Networks, 2018

Defect characterization of amorphous silicon thin film solar cell based on low frequency noise.
Sci. China Inf. Sci., 2018

2017
Combining paper cooperative network and topic model for expert topic analysis and extraction.
Neurocomputing, 2017

Formal Analysis of a TTP-Free Blacklistable Anonymous Credentials System (Full Version).
IACR Cryptol. ePrint Arch., 2017

Secure Code Updates for Smart Embedded Devices based on PUFs.
IACR Cryptol. ePrint Arch., 2017

Detecting micro-blog user interest communities through the integration of explicit user relationship and implicit topic relations.
Sci. China Inf. Sci., 2017

An Efficient Trustzone-Based In-application Isolation Schema for Mobile Authenticators.
Proceedings of the Security and Privacy in Communication Networks, 2017

Formal Analysis of a TTP-Free Blacklistable Anonymous Credentials System.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

Machine Learning Methods for Driving Risk Prediction.
Proceedings of the 3rd ACM SIGSPATIAL Workshop on Emergency Management using, Redondo Beach, CA, USA, November 07, 2017

TICS: Trusted Industry Control System Based on Hardware Security Module.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

2016
AEP-M: Practical Anonymous E-Payment for Mobile Devices using ARM TrustZone and Divisible E-Cash (Full Version).
IACR Cryptol. ePrint Arch., 2016

Computational Soundness Results for Stateful Applied pi Calculus.
CoRR, 2016

Extraction of Expert Relations Integrated with Expert Topic and Associated Relationship Features.
Proceedings of the Social Media Processing - 5th National Conference, 2016

Computational Soundness Results for Stateful Applied π Calculus.
Proceedings of the Principles of Security and Trust - 5th International Conference, 2016

AEP-M: Practical Anonymous E-Payment for Mobile Devices Using ARM TrustZone and Divisible E-Cash.
Proceedings of the Information Security - 19th International Conference, 2016

Automated Security Proof of Cryptographic Support Commands in TPM 2.0.
Proceedings of the Information and Communications Security - 18th International Conference, 2016

2015
Security analysis of SM2 key exchange protocol in TPM2.0.
Secur. Commun. Networks, 2015

DAA-TZ: An Efficient DAA Scheme for Mobile Devices using ARM TrustZone.
IACR Cryptol. ePrint Arch., 2015

TMSUI: A Trust Management Scheme of USB Storage Devices for Industrial Control Systems.
IACR Cryptol. ePrint Arch., 2015

TrustTokenF: A Generic Security Framework for Mobile Two-Factor Authentication Using TrustZone.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Approaches to Detect Micro-Blog User Interest Communities Through the Integration of Explicit User Relationship and Implicit Topic Relations.
Proceedings of the Social Media Processing - 4th National Conference, 2015

Formal Analysis of Enhanced Authorization in the TPM 2.0.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
Universally Composable secure TNC protocol based on IF-T binding to TLS.
IACR Cryptol. ePrint Arch., 2014

Providing Root of Trust for ARM TrustZone using SRAM PUFs.
IACR Cryptol. ePrint Arch., 2014

Automated Proof for Authorization Protocols of TPM 2.0 in Computational Model (full version).
IACR Cryptol. ePrint Arch., 2014

A Lightweight Anonymous Mobile Shopping Scheme Based on DAA for Trusted Mobile Platform.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Improving the Security of the HMQV Protocol Using Tamper-Proof Hardware.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Direct Anonymous Attestation in practice: Implementation and efficient revocation.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

Automated Proof for Authorization Protocols of TPM 2.0 in Computational Model.
Proceedings of the Information Security Practice and Experience, 2014

Providing Root of Trust for ARM TrustZone using On-Chip SRAM.
Proceedings of the 4th International Workshop on Trustworthy Embedded Devices, 2014

ExBLACR: Extending BLACR System.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014

2013
Dynamic Modeling and Computer Simulation for Autonomous Underwater Vehicles with Fins.
J. Comput., 2013

Type-Based Analysis of Protected Storage in the TPM (full version).
IACR Cryptol. ePrint Arch., 2013

TEEM: A User-Oriented Trusted Mobile Device for Multi-platform Security Applications.
Proceedings of the Trust and Trustworthy Computing - 6th International Conference, 2013

Mobile Trusted Agent (MTA): Build User-Based Trust for General-Purpose Computer Platform.
Proceedings of the Network and System Security - 7th International Conference, 2013

Type-Based Analysis of Protected Storage in the TPM.
Proceedings of the Information and Communications Security - 15th International Conference, 2013

2012
TSD: A Flexible Root of Trust for the Cloud.
Proceedings of the 11th IEEE International Conference on Trust, 2012

2011
SD-GIS-based temporal-spatial simulation of water quality in sudden water pollution accidents.
Comput. Geosci., 2011

A Property-Based Attestation Scheme with the Variable Privacy.
Proceedings of the IEEE 10th International Conference on Trust, 2011

A DRTM-Based Method for Trusted Network Connection.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Design and Analysis on Direct Anonymous Attestation for Security Chip.
Proceedings of the 2nd International Symposium on Intelligence Information Processing and Trusted Computing, 2011

DAA Protocol Analysis and Verification.
Proceedings of the Trusted Systems - Third International Conference, 2011

Obtaining the Integrity of Your Virtual Machine in the Cloud.
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011

2010
A property-based attestation protocol for TCM.
Sci. China Inf. Sci., 2010

2009
An Anonymous Property-Based Attestation Protocol from Bilinear Maps.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2004
Estimation of the change of soil moisture in vegetated surface with multi-temporal AirSAR data.
Proceedings of the 2004 IEEE International Geoscience and Remote Sensing Symposium, 2004


  Loading...