Yijun Yang

Orcid: 0000-0002-4496-3154

According to our database1, Yijun Yang authored at least 45 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Genuine Knowledge from Practice: Diffusion Test-Time Adaptation for Video Adverse Weather Removal.
CoRR, 2024

EEE-QA: Exploring Effective and Efficient Question-Answer Representations.
CoRR, 2024

GuardT2I: Defending Text-to-Image Models from Adversarial Prompts.
CoRR, 2024

An objective comparison of methods for augmented reality in laparoscopic liver resection by preoperative-to-intraoperative image fusion.
CoRR, 2024

Vivim: a Video Vision Mamba for Medical Video Object Segmentation.
CoRR, 2024

SegMamba: Long-range Sequential Modeling Mamba For 3D Medical Image Segmentation.
CoRR, 2024

2023
Multi-Modal Image Registration Based on Phase Exponent Differences of the Gaussian Pyramid.
Remote. Sens., December, 2023

MMA-Diffusion: MultiModal Attack on Diffusion Models.
CoRR, 2023

Embodied Multi-Modal Agent trained by an LLM from a Parallel TextWorld.
CoRR, 2023

MammoDG: Generalisable Deep Learning Breaks the Limits of Cross-Domain Multi-Center Breast Cancer Screening.
CoRR, 2023

Mask-Guided Progressive Network for Joint Raindrop and Rain Streak Removal in Videos.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

DiffMIC: Dual-Guidance Diffusion Network for Medical Image Classification.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2023, 2023

Continual Task Allocation in Meta-Policy Network via Sparse Prompting.
Proceedings of the International Conference on Machine Learning, 2023

Video Adverse-Weather-Component Suppression Network via Weather Messenger and Adversarial Backpropagation.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

2022
A Novel Hash Function Based on Multi-iterative Parallel Structure.
Wirel. Pers. Commun., 2022

Novel cryptographic hash function based on multiple compressive parallel structures.
Soft Comput., 2022

A Low-Complexity Underwater Acoustic Coherent Communication System for Small AUV.
Remote. Sens., 2022

PyPop7: A Pure-Python Library for Population-Based Black-Box Optimization.
CoRR, 2022

Be Your Own Neighborhood: Detecting Adversarial Example by the Neighborhood Relations Built on Self-Supervised Learning.
CoRR, 2022

Collective Learning of Low-Memory Matrix Adaptation for Large-Scale Black-Box Optimization.
Proceedings of the Parallel Problem Solving from Nature - PPSN XVII, 2022

What You See is Not What the Network Infers: Detecting Adversarial Examples Based on Semantic Contradiction.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

Pareto Policy Pool for Model-based Offline Reinforcement Learning.
Proceedings of the Tenth International Conference on Learning Representations, 2022

Distributed evolution strategies for large-scale optimization.
Proceedings of the GECCO '22: Genetic and Evolutionary Computation Conference, Companion Volume, Boston, Massachusetts, USA, July 9, 2022

Out-of-Distribution Detection with Semantic Mismatch Under Masking.
Proceedings of the Computer Vision, 2022

BiES: Adaptive Policy Optimization for Model-Based Offline Reinforcement Learning.
Proceedings of the AI 2021: Advances in Artificial Intelligence, 2022

2021
Revisiting Trans-Arctic Maritime Navigability in 2011-2016 from the Perspective of Sea Ice Thickness.
Remote. Sens., 2021

HCDG: A Hierarchical Consistency Framework for Domain Generalization on Medical Image Segmentation.
CoRR, 2021

MixDefense: A Defense-in-Depth Framework for Adversarial Example Detection Based on Statistical and Semantic Analysis.
CoRR, 2021

The distance between the weights of the neural network is meaningful.
CoRR, 2021

2020
Dynamic Spectrum Anti-Jamming Communications: Challenges and Opportunities.
IEEE Commun. Mag., 2020

2019
Secure and efficient parallel hash function construction and its application on cloud audit.
Soft Comput., 2019

Erratum to "A Novel Multiple-Bits Collision Attack Based on Double Detection with Error-Tolerant Mechanism".
Secur. Commun. Networks, 2019

A secure hash function based on feedback iterative structure.
Enterp. Inf. Syst., 2019

2018
Unmanned Aerial Vehicle-Aided Communications: Joint Transmit Power and Trajectory Optimization.
IEEE Wirel. Commun. Lett., 2018

A Novel Multiple-Bits Collision Attack Based on Double Detection with Error-Tolerant Mechanism.
Secur. Commun. Networks, 2018

Multiuser 3D massive MIMO transmission in full-duplex cellular system.
EURASIP J. Wirel. Commun. Netw., 2018

2017
Research on the Hash Function Structures and its Application.
Wirel. Pers. Commun., 2017

Secure Transmission of Wireless Relaying Systems With Jammer and Multiple-User Selection.
IEEE Access, 2017

Security Enhancement for Multiple Multi-Antenna Relaying Networks.
Proceedings of the 2017 IEEE Globecom Workshops, Singapore, December 4-8, 2017, 2017

2016
City Group Optimization: An Optimizer for Continuous Problems.
Int. J. Swarm Intell. Res., 2016

Pendulum-like oscillation controller for UAV based on Lévy-flight pigeon-inspired optimization and LQR.
Proceedings of the 2016 IEEE Symposium Series on Computational Intelligence, 2016

2015
Improved Hash Functions for Cancelable Fingerprint Encryption Schemes.
Wirel. Pers. Commun., 2015

A Fingerprint Encryption Scheme Based on Irreversible Function and Secure Authentication.
Comput. Math. Methods Medicine, 2015

2012
Feature-Scoring-Based Multi-cue Infrared Object Tracking.
Proceedings of the Intelligent Science and Intelligent Data Engineering, 2012

Self-Adaptability Research of Billet Character Segmentation in the Complex Scene.
Proceedings of the Third International Conference on Digital Manufacturing & Automation, 2012


  Loading...