Hai Yu

Orcid: 0000-0002-8024-1781

Affiliations:
  • Northeastern University, Software College, Shenyang, China


According to our database1, Hai Yu authored at least 59 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Hierarchical Multiscenario H.265/HEVC Video Encryption Scheme.
Int. J. Bifurc. Chaos, January, 2024

2023
Runtime Permission Issues in Android Apps: Taxonomy, Practices, and Ways Forward.
IEEE Trans. Software Eng., 2023

Plumber: Boosting the Propagation of Vulnerability Fixes in the npm Ecosystem.
IEEE Trans. Software Eng., 2023

Can Machine Learning Pipelines Be Better Configured?
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023

2022
Will Dependency Conflicts Affect My Program's Semantics?
IEEE Trans. Software Eng., 2022

Joint Security and Energy-Efficient Cooperative Architecture for 5G Underlaying Cellular Networks.
Symmetry, 2022

Devising optimal integration test orders using cost-benefit analysis.
Frontiers Inf. Technol. Electron. Eng., 2022

$\hbox {ABDF}^{2}$-Net: an adaptive bi-directional features fusion network for real-time detection of threat object.
J. Real Time Image Process., 2022

Weighted zigzag decodable fountain codes for unequal error protection.
IET Commun., 2022

Duplicated zigzag decodable fountain codes with the unequal error protection property.
Comput. Commun., 2022

Insight: Exploring Cross-Ecosystem Vulnerability Impacts.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

2021
Superpixels With Content-Adaptive Criteria.
IEEE Trans. Image Process., 2021

An ultrahigh-resolution image encryption algorithm using random super-pixel strategy.
Multim. Tools Appl., 2021

AFTD-Net: real-time anchor-free detection network of threat objects for X-ray baggage screening.
J. Real Time Image Process., 2021

An automated detection model of threat objects for X-ray baggage inspection based on depthwise separable convolution.
J. Real Time Image Process., 2021

HERO: On the Chaos When PATH Meets Modules.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021

2020
Watershed-Based Superpixels With Global and Local Boundary Marching.
IEEE Trans. Image Process., 2020

A novel compressive sensing-based framework for image compression-encryption with S-box.
Multim. Tools Appl., 2020

An Image Encryption Algorithm Based on Random Hamiltonian Path.
Entropy, 2020

A Naming Game-Based Method for the Location of Information Source in Social Networks.
Complex., 2020

Watchman: monitoring dependency conflicts for Python library ecosystem.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020

2019
Efficient protection using chaos for Context-Adaptive Binary Arithmetic Coding in H.264/Advanced Video Coding.
Multim. Tools Appl., 2019

A Symmetric Image Encryption Algorithm Based on a Coupled Logistic-Bernoulli Map and Cellular Automata Diffusion Strategy.
Entropy, 2019

Evolutionary Game Dynamics of the Competitive Information Propagation on Social Networks.
Complex., 2019

Hot Topic Detection Based on a Refined TF-IDF Algorithm.
IEEE Access, 2019

Efficient and Secure Image Encryption Algorithm Using a Novel Key-Substitution Architecture.
IEEE Access, 2019

Could I have a stack trace to examine the dependency conflict issue?
Proceedings of the 41st International Conference on Software Engineering, 2019

2018
Automatic Software Refactoring via Weighted Clustering in Method-Level Networks.
IEEE Trans. Software Eng., 2018

Risk Analysis on Multi-Granular Flow Network for Software Integration Testing.
IEEE Trans. Circuits Syst. II Express Briefs, 2018

An image encryption scheme using self-adaptive selective permutation and inter-intra-block feedback diffusion.
Signal Process., 2018

Using reliability risk analysis to prioritize test cases.
J. Syst. Softw., 2018

Improved online fountain codes.
IET Commun., 2018

Research Frontier in Chaos Theory and Complex Networks.
Entropy, 2018

SSCSMA-based random relay selection scheme for large-scale relay networks.
Comput. Commun., 2018

Hybrid method combining superpixel, random walk and active contour model for fast and accurate liver segmentation.
Comput. Medical Imaging Graph., 2018

The construction of Chinese microblog gender-specific thesauruses and user gender classification.
Appl. Netw. Sci., 2018

A Dynamic Personalized News Recommendation System Based on BAP User Profiling Method.
IEEE Access, 2018

Do the dependency conflicts in my project matter?
Proceedings of the 2018 ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2018

2017
Analysis of the Dynamic Influence of Social Network Nodes.
Sci. Program., 2017

A distributed energy-efficient cooperative routing algorithm based on optimal power allocation.
Proceedings of the IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, China, October 29, 2017

Relative health index of wind turbines based on kernel density estimation.
Proceedings of the IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, China, October 29, 2017

Anticipatory Runway Incursion Prevention Based on Inaccurate Position Surveillance Information.
Proceedings of the Intelligent Information and Database Systems - 9th Asian Conference, 2017

2016
Image encryption based on three-dimensional bit matrix permutation.
Signal Process., 2016

A security improved image encryption scheme based on chaotic Baker map and hyperchaotic Lorenz system.
Int. J. Comput. Sci. Eng., 2016

A Novel Image Encryption Scheme Using the Composite Discrete Chaotic System.
Entropy, 2016

Collaborative Contextual Anomaly Detection for Industrial Equipment Groups.
Proceedings of the 9th International Symposium on Computational Intelligence and Design, 2016

2015
Reusing the permutation matrix dynamically for efficient image cryptographic algorithm.
Signal Process., 2015

A fast chaos-based image encryption scheme with a dynamic state variables selection mechanism.
Commun. Nonlinear Sci. Numer. Simul., 2015

2014
Fast Single Image Super-Resolution via Self-Example Learning and Sparse Representation.
IEEE Trans. Multim., 2014

A Multiaddress Co-Chaos Shift Keying Communication Scheme and Performance Analysis.
Int. J. Bifurc. Chaos, 2014

2013
Integral sliding mode controller design for congestion problem in ATM networks.
Int. J. Control, 2013

An image encryption scheme using reverse 2-dimensional chaotic map and dependent diffusion.
Commun. Nonlinear Sci. Numer. Simul., 2013

A symmetric color image encryption algorithm using the intrinsic features of bit distributions.
Commun. Nonlinear Sci. Numer. Simul., 2013

2012
Scale-Free Luby Transform Codes.
Int. J. Bifurc. Chaos, 2012

2011
A chaos-based symmetric image encryption scheme using a bit-level permutation.
Inf. Sci., 2011

2009
Research and Implementation of Embedded Intelligent Network Self-Healing Equipment Based on E1 Link.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009

2008
A new approach to generalized chaos synchronization based on the stability of the error system.
Kybernetika, 2008

Research and Analysis of Securities Market based on Multi-Fractal Generator.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Fractal Image Compression Based on Number of Hopping and Variance of Continuing Positive and Negative Pixels.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008


  Loading...