Hai Yuan

Orcid: 0009-0008-8625-4015

According to our database1, Hai Yuan authored at least 18 papers between 2006 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Real-Time Animatable 2DGS-Avatars with Detail Enhancement from Monocular Videos.
CoRR, May, 2025

Hierarchical Cross-Modal Image Generation for Multimodal Biometric Recognition With Missing Modality.
IEEE Trans. Inf. Forensics Secur., 2025

Bias-Compensated Normalized Iterative Wiener Filter Algorithm With Noisy Input.
IEEE Signal Process. Lett., 2025

Dynamic interaction and router selection network for multi-modality biometric recognition.
Knowl. Based Syst., 2025

2024
Adaptive Event-Triggered Consensus of Multi-Agent Systems in Sense of Asymptotic Convergence.
Sensors, January, 2024

Application of One-click Conversion of Image Weather Styles Based on the CycleGAN.
Proceedings of the 8th IEEE International Conference on Vision, 2024

3D Meteorological Scene Simulation Method Based on ClimateNeRF.
Proceedings of the 8th IEEE International Conference on Vision, 2024

2023
Improved YOLOv7-Based Algorithm for Detecting Foreign Objects on the Roof of a Subway Vehicle.
Sensors, December, 2023

A detection algorithm for cherry fruits based on the improved YOLO-v4 model.
Neural Comput. Appl., July, 2023

A Novel 3D Complex Welding Seam Tracking Method in Symmetrical Robotic MAG Welding Process Using a Laser Vision Sensing.
Symmetry, 2023

Shape regulation of tapered microchannels in silica glass ablated by femtosecond laser with theoretical modeling and machine learning.
J. Intell. Manuf., 2023

2021
A Novel Seam Tracking Technique with a Four-Step Method and Experimental Investigation of Robotic Welding Oriented to Complex Welding Seam.
Sensors, 2021

2012
Dependability evaluation of integrated circuits at design time against laser fault injection.
Secur. Commun. Networks, 2012

2011
Simple power analysis attacks using chosen message against ECC hardware implementations.
Proceedings of the 2011 World Congress on Internet Security, 2011

Channel state information based key generation vs. side-channel analysis key information leakage.
Proceedings of the 5th International Conference on Network and System Security, 2011

2010
Evaluation Metrics of Physical Non-invasive Security.
Proceedings of the Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 2010

2006
Substra: A Framework for Automatic Generation of Integration Tests.
Proceedings of the 2006 International Workshop on Automation of Software Test, 2006

Automatic extraction of abstract-object-state machines from unit-test executions.
Proceedings of the 28th International Conference on Software Engineering (ICSE 2006), 2006


  Loading...