Yanli Chen

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Known people with the same name:

Bibliography

2024
High-resolution model reconstruction and bridge damage detection based on data fusion of unmanned aerial vehicles light detection and ranging data imagery.
Comput. Aided Civ. Infrastructure Eng., April, 2024

FASCNet: An Edge-Computational Defect Detection Model for Industrial Parts.
IEEE Internet Things J., February, 2024

2023
The optimal energy-efficient design of user-specific RIS-aided uplink communication system.
Phys. Commun., August, 2023

A single defocused image depth recovery with superpixel segmentation.
Pattern Anal. Appl., August, 2023

A block padding approach in multidimensional dependency missing data.
Eng. Appl. Artif. Intell., April, 2023

A novel model watermarking for protecting generative adversarial network.
Comput. Secur., April, 2023

From Speaker Verification to Deepfake Algorithm Recognition: Our Learned Lessons from ADD2023 Track 3.
Proceedings of the Workshop on Deepfake Audio Detection and Analysis co-located with 32th International Joint Conference on Artificial Intelligence (IJCAI 2023), 2023

Fine-grained Face Anti-Spoofing based on Recursive Self-Attention and Multi-Scale Fusion.
Proceedings of the Asia Pacific Signal and Information Processing Association Annual Summit and Conference, 2023

2022
Efficient Privacy-Preserving Forensic Method for Camera Model Identification.
IEEE Trans. Inf. Forensics Secur., 2022

Image splicing forgery detection using simplified generalized noise model.
Signal Process. Image Commun., 2022

Sign steganography revisited with robust domain selection.
Signal Process., 2022

Real-Time Detection and Short-Term Prediction of Blast Furnace Burden Level Based on Space-Time Fusion Features.
Sensors, 2022

Unmanned Aircraft System Applications in Damage Detection and Service Life Prediction for Bridges: A Review.
Remote. Sens., 2022

High-Efficiency Multihomed Multimedia Transmission in Wireless Sensors.
Int. J. Mob. Comput. Multim. Commun., 2022

A novel two-dimensional reversible data hiding scheme based on high-efficiency histogram shifting for JPEG images.
Int. J. Distributed Sens. Networks, 2022

Identifying outliers in astronomical images with unsupervised machine learning.
CoRR, 2022

The MSXF TTS System for ICASSP 2022 ADD Challenge.
CoRR, 2022

Prediction Methods of Common Cancers in China Using PCA-ANN and DBN-ELM-BP.
IEEE Access, 2022

Multiple Histograms Shifting-Based Video Data Hiding Using Compression Sensing.
IEEE Access, 2022

Robust Video Watermarking Using Normalized Zernike Moments.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022

CSMRS: An Efficient and Effective Semantic-aware Ranked Search Scheme over Encrypted Cloud Data.
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022

Multi-source Infection Pattern Mining Algorithms over Moving Objects.
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022

2021
Adaptive Video Data Hiding through Cost Assignment and STCs.
IEEE Trans. Dependable Secur. Comput., 2021

Durability Optimization of Fiber Grating Hydrogen Sensor Based on Residual Stress.
Sensors, 2021

A Novel Framework Design of Network Intrusion Detection Based on Machine Learning Techniques.
Secur. Commun. Networks, 2021

A fast algorithm for the electromagnetic scattering from a large rectangular cavity in three dimensions.
J. Comput. Phys., 2021

Exploiting texture characteristics and spatial correlations for robustness metric of data hiding with noisy transmission.
IET Image Process., 2021

Beijing ZKJ-NPU Speaker Verification System for VoxCeleb Speaker Recognition Challenge 2021.
CoRR, 2021

Path Planning and Obstacle Avoiding of the USV Based on Improved ACO-APF Hybrid Algorithm With Adaptive Early-Warning.
IEEE Access, 2021

2020
Correction to: A reversible data hiding in encrypted image based on prediction-error estimation and location map.
Multim. Tools Appl., 2020

A reversible data hiding in encrypted image based on prediction-error estimation and location map.
Multim. Tools Appl., 2020

Mutual Inference Model for User Roles and Urban Functional Zones.
Int. J. Softw. Eng. Knowl. Eng., 2020

A novel two-dimensional reversible data hiding method with high embedding capacity in H.264/advanced video coding.
Int. J. Distributed Sens. Networks, 2020

An adaptive finite element PML method for the open cavity scattering problems.
CoRR, 2020

Multi-AUV Collaborative Operation Based on Time-Varying Navigation Map and Dynamic Grid Model.
IEEE Access, 2020

2019
A weak Galerkin finite element method for Burgers' equation.
J. Comput. Appl. Math., 2019

Reversible data hiding in homomorphically encrypted image using interpolation technique.
J. Inf. Secur. Appl., 2019

Adaptive VIRE indoor positioning algorithm based on Kriging interpolation.
Int. J. RF Technol. Res. Appl., 2019

An analysis of the weak Galerkin finite element method for convection-diffusion equations.
Appl. Math. Comput., 2019

A Novel Lossless Data Hiding Scheme in Homomorphically Encrypted Images.
Proceedings of the Digital Forensics and Watermarking - 18th International Workshop, 2019

2018
A video error concealment method using data hiding based on compressed sensing over lossy channel.
Telecommun. Syst., 2018

Attribute-Based Keyword Search with Proxy Re-Encryption in the Cloud.
IEICE Trans. Commun., 2018

Intra-Frame Error Concealment Scheme using 3D Reversible Data Hiding in Mobile Cloud Environment.
CoRR, 2018

Reversible Embedding to Covers Full of Boundaries.
CoRR, 2018

Intra-Frame Error Concealment Scheme Using 3D Reversible Data Hiding in Mobile Cloud Environment.
IEEE Access, 2018

Reversible Embedding to Covers Full of Boundaries.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

A Data Hiding Scheme with High Quality for H.264/AVC Video Streams.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
无线传感器网络多应用场景下的安全数据融合方案 (Secure Data Aggregation Scheme for Multiple Applications in Wireless Sensor Networks).
计算机科学, 2017

The Influence of Using XBRL on Quoted Company's Information Quality.
Proceedings of the Information Technology and Intelligent Transportation Systems, 2017

Data Hiding-Based Video Error Concealment Method Using Compressed Sensing.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

2016
A mixed nonoverlapping covolume method on quadrilateral grids for elliptic problems.
J. Comput. Appl. Math., 2016

2015
Adaptive Bilinear Element Finite Volume Methods for Second-Order Elliptic Problems on Nonmatching Grids.
J. Sci. Comput., 2015

2012
Weighted fairness guaranteed data aggregation scheduling algorithm in wireless sensor networks.
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012

2011
Taylor Kriging Metamodeling for Stochastic Simulation Interpolation.
Int. J. Oper. Res. Inf. Syst., 2011

2008
Investigating on the Curriculum Visions of Computing Disciplines.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008


  Loading...