Yifeng Sun

Orcid: 0000-0001-7741-834X

According to our database1, Yifeng Sun authored at least 30 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Development of Multifunctional Detection Robot for Roller Coaster Track.
Sensors, October, 2023

Optimization Algorithm for Urban Rail Transit Operation Scheduling based on Linear Programming.
Scalable Comput. Pract. Exp., September, 2023

2022
An Adaptive Control Method for Robot Constant Force Polishing Device.
Proceedings of the 5th International Conference on Information and Computer Technologies, 2022

Reinforcement Learning using Reward Expectations in Scenarios with Aleatoric Uncertainties.
Proceedings of the IEEE Conference on Games, CoG 2022, Beijing, 2022

EEG Signal Classification Using Shallow FBCSP ConvNet with a New Cropping Strategy.
Proceedings of the Brain Informatics - 15th International Conference, 2022

2020
Anisotropic distortion cost update strategy in spatial image steganography.
Multim. Tools Appl., 2020

Android Encryption Database Forensic Analysis Based on Static Analysis.
Proceedings of the CSAE 2020: The 4th International Conference on Computer Science and Application Engineering, 2020

2019
Security Measure for Image Steganography Based on High Dimensional KL Divergence.
Secur. Commun. Networks, 2019

Digital steganography model and embedding optimization strategy.
Multim. Tools Appl., 2019

Development and Outcomes of Teaching PID Control in Classroom with Hands on Learning Experience.
Proceedings of the IEEE International Conference on Industrial Technology, 2019

2018
Steganography algorithms recognition based on match image and deep features verification.
Multim. Tools Appl., 2018

Improving Testing Accuracy of Convolutional Neural Network for Steganalysis Using Segmented Subimages.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
TCP Performance Optimization for Epoch-based Execution.
Proceedings of the 8th Asia-Pacific Workshop on Systems, Mumbai, India, September 2, 2017, 2017

2016
Deep Learning on Spatial Rich Model for Steganalysis.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

2015
A triple-layer steganography scheme for low bit-rate speech streams.
Multim. Tools Appl., 2015

基于免疫危险理论的网络安全态势评估 (Assessment of Network Security Situation Based on Immune Danger Theory).
计算机科学, 2015

Improving the program performance through prioritized memory management and disk operation.
Concurr. Comput. Pract. Exp., 2015

Target vessel identification in endoscopic coronary artery bypass grafting.
Proceedings of the 8th International Conference on Biomedical Engineering and Informatics, 2015

2014
Enabling Prioritized Cloud I/O Service in Hadoop Distributed File System.
Proceedings of the 2014 IEEE International Conference on High Performance Computing and Communications, 2014

2013
A secure steganography for privacy protection in healthcare system.
J. Medical Syst., 2013

SIDE: Isolated and efficient execution of unmodified device drivers.
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013

2012
Optimized LSB Matching Steganography Based on Fisher Information.
J. Multim., 2012

2010
Dynamic memory paravirtualization transparent to guest OS.
Sci. China Inf. Sci., 2010

2009
Fast Live Cloning of Virtual Machine Based on Xen.
Proceedings of the 11th IEEE International Conference on High Performance Computing and Communications, 2009

2008
Steganalysis Based on Difference Image.
Proceedings of the Digital Watermarking, 7th International Workshop, 2008

Multi-class steganalysis for Jpeg stego algorithms.
Proceedings of the International Conference on Image Processing, 2008

Live and incremental whole-system migration of virtual machines using block-bitmap.
Proceedings of the 2008 IEEE International Conference on Cluster Computing, 29 September, 2008

Secure Steganography in Compressed Video Bitstreams.
Proceedings of the The Third International Conference on Availability, 2008

2007
A Software Process for Modeling Complex Systems with UML-RT.
Proceedings of the First Joint IEEE/IFIP Symposium on Theoretical Aspects of Software Engineering, 2007

Suggestions on Pattern Transformation in UML-RT.
Proceedings of the Second International Conference on Software Engineering Advances (ICSEA 2007), 2007


  Loading...