Yufan Chen

Orcid: 0009-0006-5348-4282

According to our database1, Yufan Chen authored at least 41 papers between 2018 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
An Extreme Value Theory-Based Approach for Reliable Drone RF Signal Identification.
IEEE Trans. Cogn. Commun. Netw., April, 2024

Boosting Open-Set RF Signal Recognition Under Low SNR Condition in Feature Space.
IEEE Commun. Lett., March, 2024

Unveiling encrypted traffic types through hierarchical network characteristics.
Comput. Secur., March, 2024

RoDLA: Benchmarking the Robustness of Document Layout Analysis Models.
CoRR, 2024

E-DoH: Elegantly Detecting the Depths of Open DoH Service on the Internet.
CoRR, 2024

Skeleton-Based Human Action Recognition with Noisy Labels.
CoRR, 2024

MolNexTR: A Generalized Deep Learning Model for Molecular Image Recognition.
CoRR, 2024

Fourier Prompt Tuning for Modality-Incomplete Scene Segmentation.
CoRR, 2024

EPA: Neural Collapse Inspired Robust Out-of-Distribution Detector.
CoRR, 2024

2023
UArch: A Super-Resolution Processor With Heterogeneous Triple-Core Architecture for Workloads of U-Net Networks.
IEEE Trans. Biomed. Circuits Syst., June, 2023

TriNymAuth: Triple Pseudonym Authentication Scheme for VANETs Based on Cuckoo Filter and Paillier Homomorphic Encryption.
Sensors, February, 2023

A novel end-to-end deep separation network based on attention mechanism for single channel blind separation in wireless communication.
IET Signal Process., February, 2023

Global Context-Based Threshold Strategy for Drone Identification Under the Low SNR Condition.
IEEE Internet Things J., January, 2023

MonoGaussianAvatar: Monocular Gaussian Point-based Head Avatar.
CoRR, 2023

Unveiling the Hidden Realm: Self-supervised Skeleton-based Action Recognition in Occluded Environments.
CoRR, 2023

Elevating Skeleton-Based Action Recognition with Efficient Multi-Modality Self-Supervision.
CoRR, 2023

A Regularized Neural Optimization Approach with Beta Densities for Blind Deconvolution.
Proceedings of the International Conference on Wireless Communications and Signal Processing, 2023

Research on the Construction of a Multimodal Cognitive Graph of Textile and Clothing.
Proceedings of the 23rd IEEE International Conference on Software Quality, 2023

Intelligent Question Answering System Based on Cognitive Graph: A Case Study of Textile Fabrics.
Proceedings of the 23rd IEEE International Conference on Software Quality, 2023

Few Shot Medical Image Segmentation with Cross Attention Transformer.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2023, 2023

Beyond "Protected" and "Private": An Empirical Security Analysis of Custom Function Modifiers in Smart Contracts.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

Rethinking Boundary Detection in Deep Learning Models for Medical Image Segmentation.
Proceedings of the Information Processing in Medical Imaging, 2023

Dual Discriminative Relative-of-Gaussians Prior for Blind Deblurring.
Proceedings of the 15th International Conference on Digital Image Processing, 2023

Open Scene Understanding: Grounded Situation Recognition Meets Segment Anything for Helping People with Visual Impairments.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

On Potentials of the Gamma Densities to Blind Face Hallucination.
Proceedings of the 16th International Congress on Image and Signal Processing, 2023

UACT: A Unified Energy-efficient Computing Architecture for CNN and TCNN.
Proceedings of the 15th IEEE International Conference on ASIC, 2023

Can Large Language Models Provide Security & Privacy Advice? Measuring the Ability of LLMs to Refute Misconceptions.
Proceedings of the Annual Computer Security Applications Conference, 2023

2022
Neurometabolic timecourse of healthy aging.
NeuroImage, 2022

Neural Inertial Localization.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

2021
Multi-task learning of perceptive feature for thyroid malignant probability prediction.
Proceedings of the Medical Imaging 2021: Computer-Aided Diagnosis, 2021

A New Lightweight Dual-Microphone RNN-VAD Assist Adaptive Blocking Matrix for Dual-Channel Speech Enhancement.
Proceedings of the IEEE International Conference on Signal Processing, 2021

Joint Sparse Channel Estimation and Tracking for SC-FDE Based V2X Communication Systems.
Proceedings of the 21st International Conference on Communication Technology, 2021

BEDIM: Lateral Movement Detection In Enterprise Network Through Behavior Deviation Measurement.
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021

2020
A Real-Time Dual-Microphone Speech Enhancement Algorithm Assisted by Bone Conduction Sensor.
Sensors, 2020

To outsource or not: The impact of information leakage risk on information security strategy.
Inf. Manag., 2020

MBTree: Detecting Encryption RAT Communication Using Malicious Behavior Tree.
CoRR, 2020

Automatic Modulation Classification Scheme Based on LSTM With Random Erasing and Attention Mechanism.
IEEE Access, 2020

2019
The Replica Dataset: A Digital Replica of Indoor Spaces.
CoRR, 2019

An Approach for Scale Suspicious Network Events Detection.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

2018
Outsourcing Information Security: The Role of Information Leakage in Outsourcing Decisions.
Proceedings of the 2018 International Conference on Information Resources Management, 2018

A Multi-Representation Ensemble Approach to Classifying Vocal Diseases.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018


  Loading...