default search action
Wenyuan Yang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j30]Ya'nan Guan, Weiping Ding, Shujiao Liao, Wenyuan Yang:
CycMixer: A simplified and rapidly converging object detection network of query based on cycle mixing. Eng. Appl. Artif. Intell. 127(Part A): 107220 (2024) - [j29]Yaqian Lu, Shujiao Liao, Wenyuan Yang, Ya'nan Guan, Di Wu:
Interval-valued test cost sensitive attribute reduction related to risk attitude. Int. J. Mach. Learn. Cybern. 15(9): 4155-4174 (2024) - [j28]Liwen Huang, Wenyuan Yang:
A irregular text detection via dilated recombination and efficient reorganization on natural scene. Multim. Syst. 30(3): 166 (2024) - [j27]Qihan He, Zhongxu Li, Wenyuan Yang:
LMFE-RDD: a road damage detector with a lightweight multi-feature extraction network. Multim. Syst. 30(4): 176 (2024) - [j26]Xizhu Xiao, Wenyuan Yang:
There's more to news media skepticism: a path analysis examining news media literacy, news media skepticism and misinformation behaviors. Online Inf. Rev. 48(3): 441-456 (2024) - [j25]Qihan He, Zhongxu Li, Wenyuan Yang:
Lsf-rdd: a local sensing feature network for road damage detection. Pattern Anal. Appl. 27(3): 99 (2024) - [j24]Lingfei Ren, Huan Lei, Zhongxu Li, Wenyuan Yang:
AF-DETR: efficient UAV small object detector via Assemble-and-Fusion mechanism. Pattern Anal. Appl. 27(4): 135 (2024) - [j23]Wenyuan Yang, Shuo Shao, Yue Yang, Xiyao Liu, Ximeng Liu, Zhihua Xia, Gerald Schaefer, Hui Fang:
Watermarking in Secure Federated Learning: A Verification Framework Based on Client-Side Backdooring. ACM Trans. Intell. Syst. Technol. 15(1): 5:1-5:25 (2024) - [j22]Wenyuan Yang, Shaocong Wu, Jianwei Fei, Xianwang Zeng, Yuemin Ding, Zhihua Xia:
A Bitcoin-based Secure Outsourcing Scheme for Optimization Problem in Multimedia Internet of Things. ACM Trans. Multim. Comput. Commun. Appl. 20(6): 152:1-152:23 (2024) - [j21]Han Wang, Hui Li, Abla Smahi, Feng Zhao, Yao Yao, Ching Chuen Chan, Shiyu Wang, Wenyuan Yang, Shuo-Yen Robert Li:
MIS: A Multi-Identifier Management and Resolution System in the Metaverse. ACM Trans. Multim. Comput. Commun. Appl. 20(7): 191:1-191:25 (2024) - [j20]Liwen Huang, Shujiao Liao, Wenyuan Yang:
DC-PSENet: a novel scene text detection method integrating double ResNet-based and changed channels recursive feature pyramid. Vis. Comput. 40(6): 4473-4491 (2024) - [j19]Junpei Liao, Liang Yi, Wenxin Shi, Wenyuan Yang, Yanmei Fang, Xin Yang:
Imperceptible backdoor watermarks for speech recognition model copyright protection. Vis. Intell. 2(1): 23 (2024) - [c12]Kuiye Ding, Xin Yang, Jintao Chen, Chao Liu, Songyao Hou, Wenyuan Yang:
UB-CRAF: A User Behavior-Driven Co-resident Risk Assessment Framework for Dynamically Migrating VMs in Clouds. ICIC (9) 2024: 340-351 - [i9]Yang Xu, Yunlin Tan, Cheng Zhang, Kai Chi, Peng Sun, Wenyuan Yang, Ju Ren, Hongbo Jiang, Yaoxue Zhang:
RobWE: Robust Watermark Embedding for Personalized Federated Learning Model Ownership Protection. CoRR abs/2402.19054 (2024) - [i8]Ziyou Liang, Run Wang, Weifeng Liu, Yuyang Zhang, Wenyuan Yang, Lina Wang, Xingkai Wang:
Let Real Images be as a Judger, Spotting Fake Images Synthesized with Generative Models. CoRR abs/2403.16513 (2024) - 2023
- [j18]Wenyuan Yang, Xiaoyu Zhou, Zhikai Chen, Bofei Guo, Zhongjie Ba, Zhihua Xia, Xiaochun Cao, Kui Ren:
AVoiD-DF: Audio-Visual Joint Learning for Detecting Deepfake. IEEE Trans. Inf. Forensics Secur. 18: 2015-2029 (2023) - [c11]Qi Lyu, Hui Li, Xinnan Lin, Han Wang, Hanxu Hou, Yuguo Yin, Qianbin Chen, Ping Fan, Gang Wan, Xiang Zhu, Selwyn Deng, Weixiang Huang, Jianping Wu, Jieren Cheng, Wenyuan Yang:
H-MIS: A Hierarchical Multi-Identifier System Based on Blockchain. IEEE Big Data 2023: 2326-2333 - [i7]Wenyuan Yang, Yuguo Yin, Gongxi Zhu, Hanlin Gu, Lixin Fan, Xiaochun Cao, Qiang Yang:
FedZKP: Federated Model Ownership Verification with Zero-knowledge Proof. CoRR abs/2305.04507 (2023) - [i6]Wenyuan Yang, Gongxi Zhu, Yuguo Yin, Hanlin Gu, Lixin Fan, Qiang Yang, Xiaochun Cao:
FedSOV: Federated Model Secure Ownership Verification with Unforgeable Signature. CoRR abs/2305.06085 (2023) - [i5]Junpei Liao, Zhikai Chen, Liang Yi, Wenyuan Yang, Baoyuan Wu, Xiaochun Cao:
Inter-frame Accelerate Attack against Video Interpolation Models. CoRR abs/2305.06540 (2023) - 2022
- [j17]Gangyi Tian, Jianran Liu, Hong Zhao, Wenyuan Yang:
Small object detection via dual inspection mechanism for UAV visual images. Appl. Intell. 52(4): 4244-4257 (2022) - [j16]Zhensen Chen, Wenyuan Yang, Jingmin Yang:
Video super-resolution network using detail component extraction and optical flow enhancement algorithm. Appl. Intell. 52(9): 10234-10246 (2022) - [j15]Zhensen Chen, Wenyuan Yang, Jingmin Yang:
Deeply feature fused video super-resolution network using temporal grouping. J. Supercomput. 78(7): 8999-9016 (2022) - [c10]Boyu Sun, Wenyuan Yang, Mengqi Yan, Yuesheng Zhu, Zhiqiang Bai:
A Practical Website Fingerprinting Defense Approach with Universal Adversarial Perturbations. ICCCS 2022: 752-760 - [c9]Xuewei Ma, Wenyuan Yang, Yuesheng Zhu, Zhiqiang Bai:
A Secure and Efficient Data Deduplication Scheme with Dynamic Ownership Management in Cloud Computing. IPCCC 2022: 194-201 - [i4]Xuewei Ma, Wenyuan Yang, Yuesheng Zhu, Zhiqiang Bai:
A Secure and Efficient Data Deduplication Scheme with Dynamic Ownership Management in Cloud Computing. CoRR abs/2208.09030 (2022) - [i3]Wenyuan Yang, Shuo Shao, Yue Yang, Xiyao Liu, Zhihua Xia, Gerald Schaefer, Hui Fang:
Watermarking in Secure Federated Learning: A Verification Framework Based on Client-Side Backdooring. CoRR abs/2211.07138 (2022) - [i2]Shuo Shao, Wenyuan Yang, Hanlin Gu, Jian Lou, Zhan Qin, Lixin Fan, Qiang Yang, Kui Ren:
FedTracker: Furnishing Ownership Verification and Traceability for Federated Learning Model. CoRR abs/2211.07160 (2022) - 2021
- [j14]Gangyi Tian, Jianran Liu, Wenyuan Yang:
A dual neural network for object detection in UAV images. Neurocomputing 443: 292-301 (2021) - [j13]Wenyuan Yang, Boyu Sun, Yuesheng Zhu, Dehao Wu:
A secure heuristic semantic searching scheme with blockchain-based verification. Inf. Process. Manag. 58(4): 102548 (2021) - [j12]Shunxin Guo, Hong Zhao, Wenyuan Yang:
Hierarchical feature selection with multi-granularity clustering structure. Inf. Sci. 568: 448-462 (2021) - [j11]Tian Li, Feifei Ding, Wenyuan Yang:
UAV object tracking by background cues and aberrances response suppression mechanism. Neural Comput. Appl. 33(8): 3347-3361 (2021) - [j10]Zhensen Chen, Jianran Liu, Jingmin Yang, Wenyuan Yang:
Super-resolution network-based fractional-pixel motion compensation. Signal Image Video Process. 15(7): 1547-1554 (2021) - [j9]Wenyuan Yang, Yuesheng Zhu:
A Verifiable Semantic Searching Scheme by Optimal Matching Over Encrypted Data in Public Cloud. IEEE Trans. Inf. Forensics Secur. 16: 100-115 (2021) - [j8]Shide Du, Zhanghui Liu, Zhaoliang Chen, Wenyuan Yang, Shiping Wang:
Differentiable Bi-Sparse Multi-View Co-Clustering. IEEE Trans. Signal Process. 69: 4623-4636 (2021) - [c8]Zuoyan Li, Wenyuan Yang, Ruixin Liu, Yuesheng Zhu:
Manipulation-Invariant Fingerprints for Cross-Dataset Deepfake Detection. ICONIP (4) 2021: 175-187 - [c7]Xiyao Liu, Shuo Shao, Yue Yang, Kangming Wu, Wenyuan Yang, Hui Fang:
Secure Federated Learning Model Verification: A Client-side Backdoor Triggered Watermarking Scheme. SMC 2021: 2414-2419 - 2020
- [j7]Tian Li, Peihan Wu, Feifei Ding, Wenyuan Yang:
Parallel Dual Networks for Visual Object Tracking. Appl. Intell. 50(12): 4631-4646 (2020) - [j6]Wenyuan Yang, Jun Tang, Renjie He, Yingguo Chen:
A Medium-Term Conflict Detection and Resolution Method for Open Low-Altitude City Airspace Based on Temporally and Spatially Integrated Strategies. IEEE Trans. Control. Syst. Technol. 28(5): 1817-1830 (2020) - [j5]Zhihua Xia, Leqi Jiang, Xiaohe Ma, Wenyuan Yang, Puzhao Ji, Neal Naixue Xiong:
A Privacy-Preserving Outsourcing Scheme for Image Local Binary Pattern in Secure Industrial Internet of Things. IEEE Trans. Ind. Informatics 16(1): 629-638 (2020) - [c6]Boyu Sun, Wenyuan Yang, Mengqi Yan, Dehao Wu, Yuesheng Zhu, Zhiqiang Bai:
An Encrypted Traffic Classification Method Combining Graph Convolutional Network and Autoencoder. IPCCC 2020: 1-8 - [c5]Guoxiong Su, Wenyuan Yang, Zhengding Luo, Yinghong Zhang, Zhiqiang Bai, Yuesheng Zhu:
BDTF: A Blockchain-Based Data Trading Framework with Trusted Execution Environment. MSN 2020: 92-97 - [i1]Guoxiong Su, Wenyuan Yang, Zhengding Luo, Yinghong Zhang, Zhiqiang Bai, Yuesheng Zhu:
BDTF: A Blockchain-Based Data Trading Framework with Trusted Execution Environment. CoRR abs/2007.06813 (2020)
2010 – 2019
- 2019
- [j4]Feifei Ding, Chan Li, Tian Li, Wenyuan Yang:
Multi-Cue Cascades for Robust Visual Tracking. IEEE Access 7: 125079-125090 (2019) - [j3]Jianran Liu, Shiping Wang, Wenyuan Yang:
Sparse autoencoder for social image understanding. Neurocomputing 369: 122-133 (2019) - [c4]Zhongxiang Chang, Yuning Chen, Wenyuan Yang, Zhongbao Zhou:
Analysis of Mission Planning Problem for Video Satellite Imaging with Variable Imaging Duration. SSCI 2019: 1700-1707 - 2018
- [j2]Jianran Liu, Chan Li, Wenyuan Yang:
Supervised Learning via Unsupervised Sparse Autoencoder. IEEE Access 6: 73802-73814 (2018) - [j1]Tong Li, Wenyuan Yang, Yuxiang Han, Xianghai Ji, Tao Yang, Qing Chen:
All-metal electrodes vertical gate-all-around device with self-catalyzed selective grown InAs NWs array. Sci. China Inf. Sci. 61(6): 062404:1-062404:10 (2018) - [c3]Wenyuan Yang, Yuning Chen, Renjie He, Zhongxiang Chang, Yingwu Chen:
The Bi-objective Active-Scan Agile Earth Observation Satellite Scheduling Problem: Modeling and Solution Approach. CEC 2018: 1-6 - 2015
- [c2]Wenyuan Yang, Bufang Zhou, William Zhu:
Sparse Matrix Feature Selection in Multi-label Learning. RSFDGrC 2015: 332-339
2000 – 2009
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-30 21:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint