Shoulin Yin

Orcid: 0000-0002-5367-1372

Affiliations:
  • Shenyang Normal University, Software College, Shenyang, China
  • Harbin Institute of Technology, College of Information and Communication Engineering, Harbin, China (PhD)


According to our database1, Shoulin Yin authored at least 59 papers between 2016 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Privacy-preserving remote sensing images recognition based on limited visual cryptography.
CAAI Trans. Intell. Technol., December, 2023

FLPK-BiSeNet: Federated Learning Based on Priori Knowledge and Bilateral Segmentation Network for Image Edge Extraction.
IEEE Trans. Netw. Serv. Manag., June, 2023

Hybrid chaotic system-oriented artificial fish swarm neural network for image encryption.
Evol. Intell., February, 2023

A Deep Multimodal Adversarial Cycle-Consistent Network for Smart Enterprise System.
IEEE Trans. Ind. Informatics, 2023

G2Grad-CAMRL: An Object Detection and Interpretation Model Based on Gradient-Weighted Class Activation Mapping and Reinforcement Learning in Remote Sensing Images.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2023

The state of art and review on video streaming.
J. High Speed Networks, 2023

Remote Sensing Image Segmentation Based on a Novel Gaussian Mixture Model and SURF Algorithm.
Int. J. Swarm Intell. Res., 2023

Research on the online parameter identification method of train driving dynamic model.
Int. J. Comput. Vis. Robotics, 2023

Facial expression recognition based on convolutional block attention module and multi-feature fusion.
Int. J. Comput. Vis. Robotics, 2023

M2F2-RCNN: Multi-functional faster RCNN based on multi-scale feature fusion for region search in remote sensing images.
Comput. Sci. Inf. Syst., 2023

Heterogenous-view occluded expression data recognition based on cycle-consistent adversarial network and K-SVD dictionary learning under intelligent cooperative robot environment.
Comput. Sci. Inf. Syst., 2023

2022
A New V-Net Convolutional Neural Network Based on Four-Dimensional Hyperchaotic System for Medical Image Encryption.
Secur. Commun. Networks, 2022

Multichannel convolutional neural network-based fuzzy active contour model for medical image segmentation.
Evol. Syst., 2022

Guest editorial - real-time image processing with deep neural networks and optimization algorithms.
Comput. Sci. Inf. Syst., 2022

Crowdsourcing platform for QoE evaluation for cloud multimedia services.
Comput. Sci. Inf. Syst., 2022

2021
A Bagging Strategy-Based Kernel Extreme Learning Machine for Complex Network Intrusion Detection.
EAI Endorsed Trans. Scalable Inf. Syst., 2021

P<sup>3</sup>OI-MELSH: Privacy Protection Target Point of Interest Recommendation Algorithm Based on Multi-Exploring Locality Sensitive Hashing.
Frontiers Neurorobotics, 2021

GSAPSO-MQC: medical image encryption based on genetic simulated annealing particle swarm optimization and modified quantum chaos system.
Evol. Intell., 2021

2020
Hot Region Selection Based on Selective Search and Modified Fuzzy C-Means in Remote Sensing Images.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2020

Active contour modal based on density-oriented BIRCH clustering method for medical image segmentation.
Multim. Tools Appl., 2020

A brief review and challenges of object detection in optical remote sensing imagery.
Multiagent Grid Syst., 2020

A Network Intrusion Detection Method Based on Deep Multi-scale Convolutional Neural Network.
Int. J. Wirel. Inf. Networks, 2020

Medical Image Encryption Based on Stream Cipher Algorithm and Krill Group.
Int. J. Netw. Secur., 2020

A Sequential Cipher Algorithm Based on Feedback Discrete Hopfield Neural Network and Logistic Chaotic Sequence.
Int. J. Netw. Secur., 2020

Improved Elliptic Curve Cryptography with Homomorphic Encryption for Medical Image Encryption.
Int. J. Netw. Secur., 2020

A Modified Advanced Encryption Standard for Data Security.
Int. J. Netw. Secur., 2020

An Improved Image Encryption Algorithm Based on Chaotic Mapping and Discrete Wavelet Transform Domain.
Int. J. Netw. Secur., 2020

Research on Medical Image Encryption Method Based on Improved Krill Herb Algorithm and Chaotic Systems.
Int. J. Netw. Secur., 2020

2019
Impact of compressed and down-scaled training images on vehicle detection in remote sensing imagery.
Multim. Tools Appl., 2019

A New Wavelet Threshold Function Based on Gaussian Kernel Function for Image De-noising.
J. Inf. Hiding Multim. Signal Process., 2019

A New Chi-square Distribution De-noising Method for Image Encryption.
Int. J. Netw. Secur., 2019

A Novel Proxy Re-encryption Scheme Based on Identity Property and Stateless Broadcast Encryption Under Cloud Environment.
Int. J. Netw. Secur., 2019

A Certificateless Group Authenticated Key Agreement Protocol Based on Dynamic Binary Tree.
Int. J. Netw. Secur., 2019

Region search based on hybrid convolutional neural network in optical remote sensing images.
Int. J. Distributed Sens. Networks, 2019

New intelligent interface study based on K-means gaze tracking.
Int. J. Comput. Sci. Eng., 2019

A new wolf colony search algorithm based on search strategy for solving travelling salesman problem.
Int. J. Comput. Sci. Eng., 2019

GPOGC: Gaussian Pigeon-Oriented Graph Clustering Algorithm for Social Networks Cluster.
IEEE Access, 2019

Research on Improved Pedestrian Detection Algorithm Based on Convolutional Neural Network.
Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2019

2018
A New Chinese Word Segmentation Method Based on Maximum Matching.
J. Inf. Hiding Multim. Signal Process., 2018

A New Krill Herd Algorithm Based on SVM Method for Road Feature Extraction.
J. Inf. Hiding Multim. Signal Process., 2018

Study on Wavelet Transform Adjustment Method with Enhancement of Color Image.
J. Inf. Hiding Multim. Signal Process., 2018

A Data Sorting and Searching Scheme Based on Distributed Asymmetric Searchable Encryption.
Int. J. Netw. Secur., 2018

An Efficient and Secure Cipher-Text Retrieval Scheme Based on Mixed Homomorphic Encryption and Multi-Attribute Sorting Method.
Int. J. Netw. Secur., 2018

Modified pyramid dual tree direction filter-based image denoising via curvature scale and nonlocal mean multigrade remnant filter.
Int. J. Commun. Syst., 2018

Large Scale Remote Sensing Image Segmentation Based on Fuzzy Region Competition and Gaussian Mixture Model.
IEEE Access, 2018

Medical Image Annotation Based on Deep Transfer Learning.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

A New Graph Semi-Supervised Learning Method for Medical Image Automatic Annotation.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

An Efficient Region Proposal Method for Optical Remote Sensing Imagery.
Proceedings of the 2018 IEEE International Geoscience and Remote Sensing Symposium, 2018

2017
An improved particle swarm optimization algorithm used for BP neural network and multimedia course-ware evaluation.
Multim. Tools Appl., 2017

A Provable Private Data Aggregation Scheme Based on Digital Signatures and Homomorphic Encryption for Wireless Sensor Networks.
J. Inf. Hiding Multim. Signal Process., 2017

A Density-based Clustering Method for K-anonymity Privacy Protection.
J. Inf. Hiding Multim. Signal Process., 2017

A Proxy Re-Encryption Scheme Based on Elliptic Curve Group.
J. Inf. Hiding Multim. Signal Process., 2017

A Multi-keyword Search Algorithm Based on Polynomial Function and Safety Inner-product Method in Secure Cloud Environment.
J. Inf. Hiding Multim. Signal Process., 2017

Mixed Symmetric Key and Elliptic Curve Encryption Scheme Used for Password Authentication and Update Under Unstable Network Environment.
J. Inf. Hiding Multim. Signal Process., 2017

A New Security Cloud Storage Data Encryption Scheme Based on Identity Proxy Re-encryption.
Int. J. Netw. Secur., 2017

An Improved Discrete Firefly Algorithm Used for Traveling Salesman Problem.
Proceedings of the Advances in Swarm Intelligence - 8th International Conference, 2017

Study a Join Query Strategy Over Data Stream Based on Sliding Windows.
Proceedings of the Data Mining and Big Data - Second International Conference, 2017

2016
A New Provable Secure Certificateless Aggregate Signcryption Scheme.
J. Inf. Hiding Multim. Signal Process., 2016

A K-means Approach for Map-Reduce Model and Social Network Privacy Protection.
J. Inf. Hiding Multim. Signal Process., 2016


  Loading...