Huiyun Li

According to our database1, Huiyun Li authored at least 59 papers between 2001 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Accurate scale estimation for visual tracking with significant deformation.
IET Comput. Vis., 2020

Sparse Gaussian Process Based On Hat Basis Functions.
CoRR, 2020

Data Redundancy Mitigation in V2X Based Collective Perceptions.
IEEE Access, 2020

Model Predictive Motion Planning for Autonomous Vehicle in Mid-high Overtaking Scene.
Proceedings of the 91st IEEE Vehicular Technology Conference, 2020

A method of Monocular Visual Odometry Combining Feature points and Pixel Gradient for Dynamic Scene.
Proceedings of the 91st IEEE Vehicular Technology Conference, 2020

Fast Loop Closures Detection Method for Geomagnetic Signal and Lidar Fusion.
Proceedings of the 91st IEEE Vehicular Technology Conference, 2020

Perception-aided Visual-Inertial Integrated Positioning in Dynamic Urban Areas.
Proceedings of the IEEE/ION Position, Location and Navigation Symposium, 2020

2019
An Error Location and Correction Method for Memory Based on Data Similarity Analysis.
IEEE Trans. Very Large Scale Integr. Syst., 2019

Detecting Fault Injection Attacks Based on Compressed Sensing and Integer Linear Programming.
IEEE Trans. Dependable Secur. Comput., 2019

Smooth Trajectory Tracking Using Longitudinal Distance Constraint for A 4WS4WD Unmanned Ground Vehicle.
Proceedings of the 2019 IEEE International Conference on Robotics and Biomimetics, 2019

Accelerating the Validation of Motion Control for a 4WD4WS Ground Vehicle Using a Hierarchical Controller Hardware-in-the-loop System<sup>∗</sup>.
Proceedings of the 2019 IEEE International Conference on Robotics and Biomimetics, 2019

Performance Modelling of V2V based Collective Perceptions in Connected and Autonomous Vehicles.
Proceedings of the 44th IEEE Conference on Local Computer Networks, 2019

Regressive Scale Estimation for Visual Tracking.
Proceedings of the IEEE International Conference on Industrial Technology, 2019

Combining Deep Gaussian Process and Rule-Based Method for Decision-Making in Self-Driving Simulation with Small Data.
Proceedings of the 15th International Conference on Computational Intelligence and Security, 2019

2018
Identifying Single-Event Transient Location Based on Compressed Sensing.
IEEE Trans. Very Large Scale Integr. Syst., 2018

Adaptive Balance of Quality-resources of Neural Networks with Principle Component Analysis.
Proceedings of the TENCON 2018, 2018

Real-time Pedestrian and Vehicle Detection for Autonomous Driving.
Proceedings of the 2018 IEEE Intelligent Vehicles Symposium, 2018

Exploration on Spatiotemporal Data Repairing of Parking Lots Based on Recurrent GANs.
Proceedings of the 21st International Conference on Intelligent Transportation Systems, 2018

FLOPS: An Efficient and High-precision Prediction on Available Parking Spaces in a Long Time-span.
Proceedings of the 21st International Conference on Intelligent Transportation Systems, 2018

Aggregated Multi-deep Deterministic Policy Gradient for Self-driving Policy.
Proceedings of the Internet of Vehicles. Technologies and Services Towards Smart City, 2018

SAW: A Hybrid Prediction Model for Parking Occupancy Under the Environment of Lacking Real-Time Data.
Proceedings of the IECON 2018, 2018

Parking rank: A novel method of parking lots sorting and recommendation based on public information.
Proceedings of the IEEE International Conference on Industrial Technology, 2018

Application of DCGAN in Data Repair of Parking Lots.
Proceedings of the IEEE International Conference on Information and Automation, 2018

The Sixth Visual Object Tracking VOT2018 Challenge Results.
, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,
Proceedings of the Computer Vision - ECCV 2018 Workshops, 2018

Low-cost vector map assisted navigation strategy for autonomous vehicle.
Proceedings of the 2018 IEEE Asia Pacific Conference on Circuits and Systems, 2018

2017
Fast and automatic security test on cryptographic ICs against fault injection attacks based on design for security test.
IET Inf. Secur., 2017

Detection of Single Event Transients Based on Compressed Sensing.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Real-Time parking guidance model based on stackelberg game.
Proceedings of the IEEE International Conference on Information and Automation, 2017

ACPP: An effective privacy preserving scheme for precise location sharing in internet of vehicles.
Proceedings of the IEEE International Conference on Information and Automation, 2017

2016
A two-phase procedure for non-normal quantitative trait genetic association study.
BMC Bioinform., 2016

Searching parking spaces in urban environments based on non-stationary Poisson process analysis.
Proceedings of the 19th IEEE International Conference on Intelligent Transportation Systems, 2016

Indoor human detection using RGB-D images.
Proceedings of the IEEE International Conference on Information and Automation, 2016

Image Semantic Segmentation Based on Fully Convolutional Neural Network and CRF.
Proceedings of the Geo-Spatial Knowledge and Intelligence, 2016

2015
A Low-Cost TSV Test and Diagnosis Scheme Based on Binary Search Method.
IEEE Trans. Very Large Scale Integr. Syst., 2015

Design and Analysis of Multimodel-Based Anomaly Intrusion Detection Systems in Industrial Process Automation.
IEEE Trans. Syst. Man Cybern. Syst., 2015

Cache Side-Channel Attack to Recover Plaintext against Datagram TLS.
Proceedings of the 5th International Conference on IT Convergence and Security, 2015

Hardware Trojan prevention based on Fully Homomorphic Encryption.
Proceedings of the IEEE International Conference on Information and Automation, 2015

A novel TSV probing technique with adhesive test interposer.
Proceedings of the 33rd IEEE International Conference on Computer Design, 2015

2014
Through-silicon via placement with shuffled frog leap algorithm.
Proceedings of the 2014 IEEE International Conference on Robotics and Biomimetics, 2014

An early warning model of traffic accidents based on fractal theory.
Proceedings of the 17th International IEEE Conference on Intelligent Transportation Systems, 2014

Design for security test on cryptographic ICs for design-time security evaluation.
Proceedings of the 9th International Design and Test Symposium, 2014

A Study of the Status of Chinese Listed Companies' Voluntary Disclosure.
Proceedings of the Enterprise Systems Conference, 2014

A Statistical Model to Predict Success Rate of Ion Fault Injection Attacks for Cryptographic ICs.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

2013
Threat on Physical Layer Security: Side Channel vs. Wiretap Channel.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013

2012
Fast and scalable parallel processing of scalar multiplication in elliptic curve cryptosystems.
Secur. Commun. Networks, 2012

Dependability evaluation of integrated circuits at design time against laser fault injection.
Secur. Commun. Networks, 2012

Yield enhancement for 3D-stacked ICs: Recent advances and challenges.
Proceedings of the 17th Asia and South Pacific Design Automation Conference, 2012

2011
Enhanced correlation power analysis attack against trusted systems.
Secur. Commun. Networks, 2011

Simple power analysis attacks using chosen message against ECC hardware implementations.
Proceedings of the 2011 World Congress on Internet Security, 2011

Channel state information based key generation vs. side-channel analysis key information leakage.
Proceedings of the 5th International Conference on Network and System Security, 2011

Elliptic Curve Isogenies to Resist Differential Side-Channel Analysis Attacks.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

2010
Retrieving Lost Efficiency of Scalar Multiplications for Resisting against Side-Channel Attacks.
J. Comput., 2010

Evaluation Metrics of Physical Non-invasive Security.
Proceedings of the Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 2010

2009
Partitioned Computation to Accelerate Scalar Multiplication for Elliptic Curve Cryptosystems.
Proceedings of the 15th IEEE International Conference on Parallel and Distributed Systems, 2009

2008
Correlation Power Analysis Attack against Synchronous Stream Ciphers.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Enhanced Correlation Power Analysis Attack on Smart Card.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

2005
Security evaluation against electromagnetic analysis at design time.
Proceedings of the Tenth IEEE International High-Level Design Validation and Test Workshop 2005, Napa Valley, CA, USA, November 30, 2005

2003
Security Evaluation of Asynchronous Circuits.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2003

2001
A digital Class D amplifier design embodying a novel sampling process and pulse generator.
Proceedings of the 2001 International Symposium on Circuits and Systems, 2001


  Loading...