Ye Yao

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2024
Active Reconfigurable Intelligent Surface-Aided User-Centric Networks.
IEEE Trans. Veh. Technol., 2024

Reversible Data Hiding in Encrypted Images Using Global Compression of Zero-Valued High Bit-Planes and Block Rearrangement.
IEEE Trans. Multim., 2024

2023
CTNet: hybrid architecture based on CNN and transformer for image inpainting detection.
Multim. Syst., December, 2023

A Privacy-Preserving Social Computing Framework for Health Management Using Federated Learning.
IEEE Trans. Comput. Soc. Syst., August, 2023

Text Coverless Information Hiding Based on the Combination of Chinese Character Components.
J. Circuits Syst. Comput., February, 2023

Distortion-Aware Mutual Constraint for Screen Content Image Quality Assessment.
Proceedings of the Image and Graphics - 12th International Conference, 2023

2022
CGNet: Detecting computer-generated images based on transfer learning with attention module.
Signal Process. Image Commun., 2022

2021
Spatiotemporal Trident Networks: Detection and Localization of Object Removal Tampering in Video Passive Forensics.
IEEE Trans. Circuits Syst. Video Technol., 2021

A Novel Threshold Changeable Secret Image Sharing Scheme.
Symmetry, 2021

Font Transfer Based on Parallel Auto-encoder for Glyph Perturbation via Strokes Moving.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021

2020
Face recognition under low illumination based on convolutional neural network.
Int. J. Auton. Adapt. Commun. Syst., 2020

An eigenvalue-based immunization scheme for node attacks in networks with uncertainty.
Sci. China Inf. Sci., 2020

2019
A Novel Image Secret Sharing Scheme without Third-Party Scrambling Method.
Mob. Networks Appl., 2019

Dynamic improved pixel value ordering reversible data hiding.
Inf. Sci., 2019

An Evaluation of Deep Learning-Based Computer Generated Image Detection Approaches.
IEEE Access, 2019

2018
Deep Learning for Detection of Object-Based Forgery in Advanced Video.
Symmetry, 2018

Distinguishing Computer-Generated Graphics from Natural Images Based on Sensor Pattern Noise and Deep Learning.
Sensors, 2018

Computer-Aided Annotation for Video Tampering Dataset of Forensic Research.
J. Inf. Hiding Multim. Signal Process., 2018

Computer-Aided Annotation for Video Tampering Dataset of Forensic Research.
CoRR, 2018

Node Immunization in Networks with Uncertainty.
Proceedings of the 17th IEEE International Conference On Trust, 2018

CPS: A Community Priority Based Vaccine Distribution Strategy in Different Networks.
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018

2017
DeepTFP: Mobile Time Series Data Analytics based Traffic Flow Prediction.
CoRR, 2017

Poster: DeepTFP: Mobile Time Series Data Analytics based Traffic Flow Prediction.
Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking, 2017

Buffer-aware opportunistic routing for wireless sensor networks.
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017

2016
Extreme learning machine via free sparse transfer representation optimization.
Memetic Comput., 2016

1D Barcode Region Detection Based on the Hough Transform and Support Vector Machine.
Proceedings of the MultiMedia Modeling - 22nd International Conference, 2016

2013
A spatio-temporal inpainting method for Kinect depth video.
Proceedings of the 2013 IEEE International Conference on Signal and Image Processing Applications, 2013

2012
Bridging Theories and Practices: An Evaluation Framework of Small and Medium Sized Enterprises' (SMEs) Decision-making in China.
Proceedings of the Fifth International Joint Conference on Computational Sciences and Optimization, 2012

2011
A Dynamical Model Reveals Gene Co-Localizations in Nucleus.
PLoS Comput. Biol., 2011

An objective visual security assessment for cipher-images based on local entropy.
Multim. Tools Appl., 2011

Experiment and simulation research of engine cooling fan in dump truck.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011

2009
Visual Security Assessment for Cipher-Images based on Neighborhood Similarity.
Informatica (Slovenia), 2009

2008
A Verifiable (t, n) Multiple Secret Sharing Scheme and Its Analyses.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008


  Loading...