Yafei Song

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Known people with the same name:

Bibliography

2025
Application of deep learning in malware detection: a review.
J. Big Data, December, 2025

Block-level masking and feature importance-based adversarial example generation.
J. Big Data, December, 2025

Wan-Animate: Unified Character Animation and Replacement with Holistic Replication.
CoRR, September, 2025

Wan-S2V: Audio-Driven Cinematic Video Generation.
CoRR, August, 2025

NUDT4MSTAR: A Large Dataset and Benchmark Towards Remote Sensing Object Recognition in the Wild.
CoRR, January, 2025

Reliability-based design optimization of hinge sleeve using adaptive E-SVM.
Reliab. Eng. Syst. Saf., 2025

Dynamic bound adaptive gradient methods with belief in observed gradients.
Pattern Recognit., 2025

SAR target augmentation and recognition via cross-domain reconstruction.
Pattern Recognit., 2025

Robust Secure Energy Efficiency Optimization for Active STAR-RIS Assisted ISAC Systems.
IEEE Open J. Commun. Soc., 2025

Retraction notice to "TriCh-LKRepNet: A large kernel convolutional malicious code classification network for structure reparameterisation and triple-channel mapping" [Computers & Security 144 (2024) 103937].
Comput. Secur., 2025

2024
FPFnet: Image steganalysis model based on adaptive residual extraction and feature pyramid fusion.
Multim. Tools Appl., May, 2024

A network security situation prediction approach based on MAML and BiGRU.
J. Intell. Fuzzy Syst., 2024

Intrusion Detection Method of Unmanned Aerial Vehicles Based on Lightweight Transformer.
Proceedings of the 20th International Conference on Mobility, Sensing and Networking, 2024

Research on Intent Recognition Method of Air Targets Based on Transformer Model.
Proceedings of the 5th International Conference on Machine Learning and Computer Application, 2024

Evaluate Geometry of Radiance Fields with Low-Frequency Color Prior.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Multilayer discriminative extreme learning machine for classification.
Int. J. Mach. Learn. Cybern., June, 2023

Network intrusion detection based on conditional wasserstein variational autoencoder with generative adversarial network and one-dimensional convolutional neural networks.
Appl. Intell., May, 2023

A multiscale intrusion detection system based on pyramid depthwise separable convolution neural network.
Neurocomputing, April, 2023

Network Security Situation Prediction Based on TCAN-BiGRU Optimized by SSA and IQPSO.
Comput. Syst. Sci. Eng., 2023

Make-A-Character: High Quality Text-to-3D Character Generation within Minutes.
CoRR, 2023

Evaluate Geometry of Radiance Field with Low-frequency Color Prior.
CoRR, 2023

Masked Space-Time Hash Encoding for Efficient Dynamic Scene Reconstruction.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Reducing Shape-Radiance Ambiguity in Radiance Fields with a Closed-Form Color Estimation Method.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

DG3D: Generating High Quality 3D Textured Shapes by Learning to Discriminate Multi-Modal Diffusion-Renderings.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

Mixed Neural Voxels for Fast Multi-view Video Synthesis.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

2022
A New Method for Joint Recognition and Location of Radar Jamming.
Proceedings of the IEEE International Geoscience and Remote Sensing Symposium, 2022

2021
A New Deep Hierarchy for Underwater Image Reconstruction.
Proceedings of the IEEE International Geoscience and Remote Sensing Symposium, 2021

2020
Locally optimum watermark decoder in NSST domain using RSS-based Cauchy distribution.
Multim. Tools Appl., 2020

2019
超混沌彩色图像加密算法优化及安全性分析 (Security Analysis and Optimization of Hyper-chaotic Color Image Encryption Algorithm).
计算机科学, 2019

Color image encryption algorithm based on hyperchaotic and security analysis.
J. Electronic Imaging, 2019

Combining Evidence Sources in Time Domain With Decision Maker's Preference on Time Sequence.
IEEE Access, 2019

Near space defense operation modeling and realization of multi-sensor autonomous cooperative scheduling.
Proceedings of the International Conference on Artificial Intelligence, 2019

2018
New Distance Measure for Atanassov's Intuitionistic Fuzzy Sets and Its Application in Decision Making.
Symmetry, 2018

Evidence combination based on credibility and non-specificity.
Pattern Anal. Appl., 2018

直觉模糊框架内的证据动态可靠性评估及应用 (Dynamic Reliability Evaluation Method of Evidence Based on Intuitionistic Fuzzy Sets and Its Applications).
计算机科学, 2018

A new distance between BPAs based on the power-set-distribution pignistic probability function.
Appl. Intell., 2018

2017
A new similarity measure between intuitionistic fuzzy sets and the positive definiteness of the similarity matrix.
Pattern Anal. Appl., 2017

Measure uncertainty for belief structures based on lower and upper probabilities.
Proceedings of the 20th International Conference on Information Fusion, 2017

2016
Evaluating evidence reliability based on intuitionistic fuzzy MCDM model.
J. Intell. Fuzzy Syst., 2016

2015
A distance measure between intuitionistic fuzzy belief functions.
Knowl. Based Syst., 2015


  Loading...