Junfeng Yu

Orcid: 0000-0001-7894-4958

According to our database1, Junfeng Yu authored at least 16 papers between 2009 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
SemanticLoop: Loop Closure With 3D Semantic Graph Matching.
IEEE Robotics Autom. Lett., 2023

2022
Variational learning of deep fuzzy theoretic nonparametric model.
Neurocomputing, 2022

LraSched: Admitting More Long-Running Applications via Auto-Estimating Container Size and Affinity.
Comput. J., 2022

2021
Comparison and Enlightenment of International Evaluation Index System of Scientific Research Institutions.
Proceedings of the ICISCAE 2021: 4th International Conference on Information Systems and Computer Aided Education, Dalian, China, September 24, 2021

Ontology-Driven Approach to Research and Educational Organization Information Representation.
Proceedings of the Progress in Image Processing, Pattern Recognition and Communication Systems, 2021

2020
Research on Library Knowledge Recommendation Based on Intelligent Discovery System.
Proceedings of the RICAI 2020: 2nd International Conference on Robotics, 2020

2019
Case Reasoning Research of Emergency Network Opinion Based on Ontology.
Proceedings of the 12th International Symposium on Computational Intelligence and Design, 2019

2018
Medical long-distance monitoring system based on internet of things.
EURASIP J. Wirel. Commun. Netw., 2018

Remote sensing image mosaic technology based on SURF algorithm in agriculture.
EURASIP J. Image Video Process., 2018

2016
DroidScreening: a practical framework for real-world Android malware analysis.
Secur. Commun. Networks, 2016

2015
A review of contrast pattern based data mining.
Proceedings of the Seventh International Conference on Digital Image Processing, 2015

2012
Digital resources serving performance assessing based on fuzzy neural networks.
Proceedings of the 2012 IEEE International Conference on Granular Computing, 2012

2011
LeakProber: a framework for profiling sensitive data leakage paths.
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011

2010
Weight Based Multiple Support Vector Machine Identification of Peer-to-Peer Traffic.
J. Networks, 2010

2009
Measuring Botnet Size by Using URL and Collaborative MailServers.
Proceedings of the Fifth International Conference on Networking and Services, 2009

Using Simulation to Characterize Topology of Peer to Peer Botnets.
Proceedings of the International Conference on Computer Modeling and Simulation, 2009


  Loading...