Degang Yang

Orcid: 0000-0002-8582-4302

According to our database1, Degang Yang authored at least 26 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Improved YOLOv7 models based on modulated deformable convolution and swin transformer for object detection in fisheye images.
Image Vis. Comput., 2024

LDConv: Linear deformable convolution for improving convolutional neural networks.
Image Vis. Comput., 2024

2023
Lightweight detection network based on receptive-field feature enhancement convolution and three dimensions attention for images captured by UAVs.
Image Vis. Comput., December, 2023

Finite-Time Bipartite Synchronization of Networked Systems with Time-Varying and Random Coupling Delays.
Circuits Syst. Signal Process., November, 2023

Fixed-time synchronization of switched duplex networks with stochastic disturbances and limited communication.
Commun. Nonlinear Sci. Numer. Simul., June, 2023

A Lightweight Object Detector Based on Spatial-Coordinate Self-Attention for UAV Aerial Images.
Remote. Sens., January, 2023

Evaluating Landslide Susceptibility Using Sampling Methodology and Multiple Machine Learning Models.
ISPRS Int. J. Geo Inf., 2023

AKConv: Convolutional Kernel with Arbitrary Sampled Shapes and Arbitrary Number of Parameters.
CoRR, 2023

RFAConv: Innovating Spatial Attention and Standard Convolutional Operation.
CoRR, 2023

2022
Preassigned-time bipartite synchronization of complex networks with quantized couplings and stochastic perturbations.
Math. Comput. Simul., 2022

An IoT-Based COVID-19 Prevention and Control System for Enclosed Spaces.
Future Internet, 2022

2021
An Effective Clustering Algorithm Using Adaptive Neighborhood and Border Peeling Method.
Comput. Intell. Neurosci., 2021

2019
适于移动终端字符识别环境的自适应多阈值二值化方法 (Adaptive Multi-level Threshold Binaryzation Method for Optical Character Recognition in Mobile Environment).
计算机科学, 2019

2018
Regional Inequality in China Based on NPP-VIIRS Night-Time Light Imagery.
Remote. Sens., 2018

2016
Global exponential stability of memristive neural networks with impulse time window and time-varying delays.
Neurocomputing, 2016

2013
Development of historical database for SF6 extra high voltage circuit breaker intelligent monitoring system.
Proceedings of the IEEE International Conference on Information and Automation, 2013

2012
Emergy Evaluation of Agriculture System in Oasis-Desert Region: Tarim River Basin Case Study.
Proceedings of the Third International Conference on Digital Manufacturing & Automation, 2012

2009
New delay-dependent exponential stability criteria of BAM neural networks with time delays.
Math. Comput. Simul., 2009

Novel delay-dependent global asymptotic stability condition of Hopfield neural networks with delays.
Comput. Math. Appl., 2009

2007
Stability analysis of a novel exponential-RED model with heterogeneous delays.
Comput. Commun., 2007

A Novel Delay-Dependent Global Stability Criterion of Delayed Hopfield Neural Networks.
Proceedings of the 2007 IEEE International Conference on Granular Computing, 2007

The Research for Hopf Bifurcation in a Single Inertial Neuron Model with External Forcing.
Proceedings of the 2007 IEEE International Conference on Granular Computing, 2007

2006
Existence of Periodic Solution of BAM Neural Network with Delay and Impulse.
Proceedings of the Advances in Neural Networks - ISNN 2006, Third International Symposium on Neural Networks, Chengdu, China, May 28, 2006

A Novel Cryptographic Scheme Based on Wavelet Neural Networks.
Proceedings of the Advances in Neural Networks - ISNN 2006, Third International Symposium on Neural Networks, Chengdu, China, May 28, 2006

A Novel Blind Digital Watermark Algorithm Based on Neural Network and Chaotic Map.
Proceedings of the Neural Information Processing, 13th International Conference, 2006

2004
A framework of cooperating intrusion detection based on clustering analysis and expert system.
Proceedings of the 3rd International Conference on Information Security, 2004


  Loading...