Yichun Zhang

Orcid: 0000-0003-1525-9157

According to our database1, Yichun Zhang authored at least 15 papers between 2009 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Automated Segmentation of Prohibited Items in X-Ray Baggage Images Using Dense De-Overlap Attention Snake.
IEEE Trans. Multim., 2023

2022
PIXDet: Prohibited Items X-Ray Image Detection in Complex Background.
Proceedings of CECNet 2022, 2022

2021
Will Multi-modal Data Improves Few-shot Learning?
CoRR, 2021

2017
Using Wavelet Packet Transform for Surface Roughness Evaluation and Texture Extraction.
Sensors, 2017

Research on rubbing image mosaic based on SIFT feature.
Proceedings of the 13th International Conference on Natural Computation, 2017

2016
Sparse Reconstruction for Micro Defect Detection in Acoustic Micro Imaging.
Sensors, 2016

2015
Saliency detection using a background probability model.
Proceedings of the 2015 IEEE International Conference on Image Processing, 2015

Real-time 3D facial expression control based on performance.
Proceedings of the 12th International Conference on Fuzzy Systems and Knowledge Discovery, 2015

2014
Dynamics Analysis and Nonlinear Control of an Offshore Boom Crane.
IEEE Trans. Ind. Electron., 2014

An improved image retrieval method based on SIFT algorithm and saliency map.
Proceedings of the 11th International Conference on Fuzzy Systems and Knowledge Discovery, 2014

2013
A Method of Shot-Boundary Detection Based on HSV Space.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013

2012
HB-MAP Protocol: A New Secure Bidirectional Light-Wight Authentication Protocol of HB.
Proceedings of the Ninth IEEE International Conference on e-Business Engineering, 2012

2010
Distributed Key Management Scheme for Large Scale Pay-TV Application.
Proceedings of the Third International Symposium on Intelligent Information Technology and Security Informatics, 2010

2009
A DRM Authentication Scheme Based on Smart-Card.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

Transmission Performance Simulation of Broadcast Encryption Schemes with Pay-TV System Implementation Consideration.
Proceedings of the 8th IEEE/ACIS International Conference on Computer and Information Science, 2009


  Loading...