Yue Chi

Orcid: 0009-0005-6404-8569

According to our database1, Yue Chi authored at least 13 papers between 2005 and 2026.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book  In proceedings  Article  PhD thesis  Dataset  Other 

Links

On csauthors.net:

Bibliography

2026
A novel variational feature decomposition framework for joint shadow detection and removal in complex visual scenes.
Eng. Appl. Artif. Intell., 2026

2024
Self-Attention Generative Adversarial Network Interpolating and Denoising Seismic Signals Simultaneously.
Remote. Sens., January, 2024

Structured Low-Rank Tensor Completion for IoT Spatiotemporal High-Resolution Sensing Data Reconstruction.
IEEE Internet Things J., 2024

Advanced Heart Sound Classification for Valvular Heart Disease Detection Using a Hybrid CNN-LSTM-GRU Model.
Proceedings of the 2024 7th International Conference on Sensors, 2024

2022
A Subspace Approach to Sparse-Sampling-Based Multi-Attribute Data Aggregation in IoT.
IEEE Internet Things J., 2022

2021
Recovery of Corrupted Data in Wireless Sensor Networks Using Tensor Robust Principal Component Analysis.
IEEE Commun. Lett., 2021

Prediction of MoRFs based on sequence properties and convolutional neural networks.
BioData Min., 2021

2018
Circular Traffic Sign Detection in Natural Scenes.
J. Comput., 2018

2017
A Fast Image Restoration Method Based on an Improved Criminisi Algorithm.
J. Comput., 2017

2015
Color image segmentation based on a modified k-means algorithm.
Proceedings of the 7th International Conference on Internet Multimedia Computing and Service, 2015

Image deconvolution using <i>ℓ</i><sup>1</sup> sparse regularization.
Proceedings of the 7th International Conference on Internet Multimedia Computing and Service, 2015

2008
Static Power Optimization for CMOS Combinational Circuit Based on Bacterial Colony Chemotaxis Algorithm.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

2005
Assessment of Windows System Security Using Vulnerability Relationship Graph.
Proceedings of the Computational Intelligence and Security, International Conference, 2005


  Loading...