Chengsheng Yuan

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Known people with the same name:

Bibliography

2025
Dual-scale Dual-rate Video Compressive Sensing for Edge Surveillance Device.
Int. J. Auton. Adapt. Commun. Syst., 2025

Dual-scale dual-rate video compressive sensing for edge surveillance devices.
Int. J. Auton. Adapt. Commun. Syst., 2025

MambaForDIF: Distance-Importance Features and Long-Range Dependencies for Enhancing Aspect-Based Sentiment Analysis.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2025

RiceSeg-YOLO: A Multi-scale Attention-Based Instance Segmentation Model for Rice Leaf Rolling in Complex Paddy Environments.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2025

2024
Face forgery detection with cross-level attention.
Int. J. Auton. Adapt. Commun. Syst., 2024

Analysis and optimisation of RON loss via compound variable selection and BP neural network.
Int. J. Auton. Adapt. Commun. Syst., 2024

CLGuard: Presentation Attack Detection Model using Clean Labels for Copyright Protection.
Proceedings of the 20th International Conference on Mobility, Sensing and Networking, 2024

A Review of Super Resolution Technology for Extended-Range Precipitation Forecasting.
Proceedings of the International Conference on Computer and Applications, 2024

2023
High-performance reversible data hiding in encrypted images with adaptive Huffman code.
Digit. Signal Process., March, 2023

A survey on neural network-based image data hiding for secure communication.
Int. J. Auton. Adapt. Commun. Syst., 2023

Glow Model-Based Latent Vector Optimization for Generative Image Steganography in Edge and Cloud Computing Environment.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

2022
Adversarial Attack with Adaptive Gradient Variance for Deep Fake Fingerprint Detection.
Proceedings of the 24th IEEE International Workshop on Multimedia Signal Processing, 2022

2020
An Optimized Mass-spring Model with Shape Restoration Ability Based on Volume Conservation.
KSII Trans. Internet Inf. Syst., 2020

Face spoof detection using feature map superposition and CNN.
Int. J. Comput. Sci. Eng., 2020

2019
An effective comparison protocol over encrypted data in cloud computing.
J. Inf. Secur. Appl., 2019


  Loading...