Yanjun Liu

According to our database1, Yanjun Liu
  • authored at least 39 papers between 2009 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Efficient Information Hiding Based on Theory of Numbers.
Symmetry, 2018

Efficient access control system based on aesthetic QR code.
Personal and Ubiquitous Computing, 2018

Minima-maxima preserving data hiding algorithm for absolute moment block truncation coding compressed images.
Multimedia Tools Appl., 2018

An Improved Data Hiding Method Based on Lempel-Ziv-Welch Compression Codes.
I. J. Network Security, 2018

Reversible data hiding for JPEG images employing all quantized non-zero AC coefficients.
Displays, 2018

Variational Bayesian-Based Iterative Algorithm for ARX Models with Random Missing Outputs.
CSSP, 2018

2017
Fuzzy Adaptive Inverse Compensation Method to Tracking Control of Uncertain Nonlinear Systems With Generalized Actuator Dead Zone.
IEEE Trans. Fuzzy Systems, 2017

Adaptive Fuzzy Asymptotic Control of MIMO Systems With Unknown Input Coefficients Via a Robust Nussbaum Gain-Based Approach.
IEEE Trans. Fuzzy Systems, 2017

Command Filter-Based Adaptive Neural Tracking Controller Design for Uncertain Switched Nonlinear Output-Constrained Systems.
IEEE Trans. Cybernetics, 2017

A one-card-pass user authentication scheme using image morphing.
Multimedia Tools Appl., 2017

A high payload steganographic algorithm based on edge detection.
Displays, 2017

An offline user-verifiable electronic traveler's check system.
Proceedings of the 5th International Workshop on Biometrics and Forensics, 2017

A reversible data hiding scheme for image interpolation based on reference matrix.
Proceedings of the 5th International Workshop on Biometrics and Forensics, 2017

2016
Neural network-based adaptive control for a class of chemical reactor systems with non-symmetric dead-zone.
Neurocomputing, 2016

Notes on "An Anonymous Multi-server Authenticated Key Agreement Scheme Based on Trust Computing Using Smart Card and Biometrics".
I. J. Network Security, 2016

An Integratable Verifiable Secret Sharing Mechanism.
I. J. Network Security, 2016

High capacity turtle shell-based data hiding.
IET Image Processing, 2016

Distortion-free secret image sharing method with two meaningful shadows.
IET Image Processing, 2016

Least Squares-Based Iterative Identification Methods for Linear-in-Parameters Systems Using the Decomposition Technique.
CSSP, 2016

Exploring Variation-Aware Fault-Tolerant Cache under Near-Threshold Computing.
Proceedings of the 45th International Conference on Parallel Processing, 2016

2015
A novel verifiable secret sharing mechanism using theory of numbers and a method for sharing secrets.
Int. J. Communication Systems, 2015

A Novel Earthquake Education System Based on Virtual Reality.
IEICE Transactions, 2015

A CS Recovery Algorithm for Model and Time Delay Identification of MISO-FIR Systems.
Algorithms, 2015

Heterogeneous energy-efficient cache design in warehouse scale computers.
Proceedings of the 12th ACM International Conference on Computing Frontiers, 2015

2014
A Fast and Secure Scheme for Data Outsourcing in the Cloud.
TIIS, 2014

Computational power of tissue P systems for generating control languages.
Inf. Sci., 2014

An Access Control Mechanism Based on the Generalized Aryabhata Remainder Theorem.
I. J. Network Security, 2014

An authenticated group key distribution mechanism using theory of numbers.
Int. J. Communication Systems, 2014

A Novel Turtle Shell Based Scheme for Data Hiding.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

2013
An Efficient Oblivious Transfer Protocol Using Residue Number System.
I. J. Network Security, 2013

Consistency of the extended gradient identification algorithm for multi-input multi-output systems with moving average noises.
Int. J. Comput. Math., 2013

2012
Hierarchical Clustering Based on Hyper-edge Similarity for Community Detection.
Proceedings of the 2012 IEEE/WIC/ACM International Conferences on Web Intelligence, 2012

2011
Sensitivity analysis of spiking neuron synapse.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011

Influence of NR gene inhibition on cell senescence and growth and development.
Proceedings of the 4th International Conference on Biomedical Engineering and Informatics, 2011

2010
Convergence of stochastic gradient estimation algorithm for multivariable ARX-like systems.
Computers & Mathematics with Applications, 2010

Gradient based and least squares based iterative algorithms for matrix equations AXB + CXTD = F.
Applied Mathematics and Computation, 2010

Constructing and analyzing folksonomy in online social bookmarking.
Proceedings of the Fifth International Conference on Bio-Inspired Computing: Theories and Applications, 2010

2009
Asymptotic behavior of solutions for nonlinear delay differential equation with impulses.
Applied Mathematics and Computation, 2009

Multi-innovation stochastic gradient algorithm for multiple-input single-output systems using the auxiliary model.
Applied Mathematics and Computation, 2009


  Loading...