Deyu Yuan

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2023
Fine Grained Feature Extraction Model of Riot-related Images Based on YOLOv5.
Comput. Syst. Sci. Eng., 2023

2022
A Novel Transfer Learning-Based Algorithm for Detecting Violence Images.
KSII Trans. Internet Inf. Syst., 2022

Anomaly Detection Model for Key Places Based on Improved YOLOv5.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022

2021
Link Prediction and Node Classification Based on Multitask Graph Autoencoder.
Wirel. Commun. Mob. Comput., 2021

2020
Intervention algorithm for malicious information in online social networks based on trusted regulator.
Int. J. Wirel. Mob. Comput., 2020

Reverse Intervention for Dealing with Malicious Information in Online Social Networks.
Comput. Informatics, 2020

Particle Propagation Model for Dynamic Node Classification.
IEEE Access, 2020

A Survey of Algorithms and Applications Related with Graph Embedding.
Proceedings of the CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, 2020

2019
基于拓扑扩展的在线社交网络恶意信息源定位算法 (Malicious Information Source Locating Algorithm Based on Topological Extension in Online Social Network).
计算机科学, 2019

2016
Coverage and Capacity Optimization Analysis in Heterogeneous Cellular Networks Based on Truncated Function.
Wirel. Pers. Commun., 2016

A Distributed User Association Algorithm in Heterogeneous Cellular Networks.
Proceedings of the Human Centered Computing - Second International Conference, 2016

Novel Hotspot Information Analysis System Using Automatic Information Extraction.
Proceedings of the Human Centered Computing - Second International Conference, 2016

2015
Energy efficient power allocation scheme for multi-cell with hybrid energy sources.
Proceedings of the 26th IEEE Annual International Symposium on Personal, 2015

2014
QoE-Oriented Resource Allocation for Femtocell Networks.
Proceedings of the Human Centered Computing - First International Conference, 2014

An Novel Message Delivery Mechanism in Opportunistic Networks.
Proceedings of the Human Centered Computing - First International Conference, 2014

2012
A Survey on the Security of Multihop Ad Hoc Network.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012


  Loading...