Jianyun Xu

According to our database1, Jianyun Xu authored at least 20 papers between 2004 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
FusionFormer: A Multi-sensory Fusion in Bird's-Eye-View and Temporal Consistent Transformer for 3D Object Detection.
CoRR, 2023

PUPS: Point Cloud Unified Panoptic Segmentation.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
INT: Towards Infinite-Frames 3D Detection with an Efficient Framework.
Proceedings of the Computer Vision - ECCV 2022, 2022

2021
Multimodal trajectory forecasting based on discrete heat map.
CoRR, 2021

CenterAtt: Fast 2-stage Center Attention Network.
CoRR, 2021

RPVNet: A Deep and Efficient Range-Point-Voxel Fusion Network for LiDAR Point Cloud Segmentation.
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021

SGMNet: Learning Rotation-Invariant Point Cloud Representations via Sorted Gram Matrix.
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021

2008
Feature mining and pattern classification for steganalysis of LSB matching steganography in grayscale images.
Pattern Recognit., 2008

Image complexity and feature mining for steganalysis of least significant bit matching steganography.
Inf. Sci., 2008

2007
Obfuscated Malicious Executable Scanner.
J. Res. Pract. Inf. Technol., 2007

Behaviour Mining for Fraud Detection.
J. Res. Pract. Inf. Technol., 2007

2006
Microarray Gene Expression Classification Based on Supervised Learning and Similarity Measures.
Proceedings of the IEEE International Conference on Systems, 2006

Tree Based Behavior Monitoring for Adaptive Fraud Detection.
Proceedings of the 18th International Conference on Pattern Recognition (ICPR 2006), 2006

Image Complexity and Feature Extraction for Steganalysis of LSB Matching Steganography.
Proceedings of the 18th International Conference on Pattern Recognition (ICPR 2006), 2006

2005
Fraud Detection System Based on Behavior Mining and Anomaly Detection.
Proceedings of the 2nd Indian International Conference on Artificial Intelligence, 2005

Online Fraud Detection System Based on Non-Stationery Anomaly Detection.
Proceedings of The 2005 International Conference on Security and Management, 2005

2004
JPEG Compression Immune Steganography Using Wavelet Transform.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

Polymorphic Malicious Executable Scanner by API Sequence Analysis.
Proceedings of the 4th International Conference on Hybrid Intelligent Systems (HIS 2004), 2004

Detecting Hidden Information in the Wavelet Domain.
Proceedings of the International Conference on Imaging Science, Systems and Technology, 2004

Static Analyzer of Vicious Executables (SAVE).
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004


  Loading...