default search action
Jiang Yu
Publications
- 2024
- [j51]Jiang Yu, Fengyong Li, Zichi Wang, Wen Si, Xinpeng Zhang:
Diverse Batch Steganography Using Model-Based Selection and Double-Layered Payload Assignment. IEEE Trans. Circuits Syst. Video Technol. 34(8): 7785-7800 (2024) - [i3]Ivan DeAndres-Tame, Ruben Tolosana, Pietro Melzi, Rubén Vera-Rodríguez, Minchul Kim, Christian Rathgeb, Xiaoming Liu, Aythami Morales, Julian Fiérrez, Javier Ortega-Garcia, Zhizhou Zhong, Yuge Huang, Yuxi Mi, Shouhong Ding, Shuigeng Zhou, Shuai He, Lingzhi Fu, Heng Cong, Rongyu Zhang, Zhihong Xiao, Evgeny Smirnov, Anton Pimenov, Aleksei Grigorev, Denis Timoshenko, Kaleb Mesfin Asfaw, Cheng-Yaw Low, Hao Liu, Chuyi Wang, Qing Zuo, Zhixiang He, Hatef Otroshi-Shahreza, Anjith George, Alexander Unnervik, Parsa Rahimi, Sébastien Marcel, Pedro C. Neto, Marco Huber, Jan Niklas Kolf, Naser Damer, Fadi Boutros, Jaime S. Cardoso, Ana Filipa Sequeira, Andrea Atzori, Gianni Fenu, Mirko Marras, Vitomir Struc, Jiang Yu, Zhangjie Li, Jichun Li, Weisong Zhao, Zhen Lei, Xiangyu Zhu, Xiaoyu Zhang, Bernardo Biesseck, Pedro Vidal, Luiz Coelho, Roger Granada, David Menotti:
Second Edition FRCSyn Challenge at CVPR 2024: Face Recognition Challenge in the Era of Synthetic Data. CoRR abs/2404.10378 (2024) - [i2]Zidu Wang, Xiangyu Zhu, Jiang Yu, Tianshuo Zhang, Zhen Lei:
S2TD-Face: Reconstruct a Detailed 3D Face with Controllable Texture from a Single Sketch. CoRR abs/2408.01218 (2024) - 2023
- [j50]Peixing Yang, Jiang Yu:
Melnikov analysis in a cubic system with a multiple line of critical points. Appl. Math. Lett. 145: 108787 (2023) - [j49]Jiang Yu, Xiaoyi Zhou, Wen Si, Fengyong Li, Cong Liu, Xinpeng Zhang:
Secure Steganographic Cover Generation via a Noise-Optimization Stacked StyleGAN2. Symmetry 15(5): 979 (2023) - [j48]Jiang Yu, Jing Jin, Feng Chen, Yue Zhang:
Digital-Enabled Public Service Innovation in China's eHealth Sector: An Institutional Logics Perspective. IEEE Trans. Engineering Management 70(4): 1621-1638 (2023) - 2022
- [j47]Wei Liu, Jian You, Zinan Liu, Yi Hou, Xun Zhu, Jiang Yu:
Analysis of Crucial Factors Affecting Contact Force of PCB Spring Terminals Based on Simulation and Rank Correlation. IEEE Access 10: 86935-86942 (2022) - [j46]Yuanyuan Chen, Jiang Yu:
Limit Cycles Bifurcating from a Class of Cubic Hamiltonian Systems. Int. J. Bifurc. Chaos 32(6): 2250088:1-2250088:16 (2022) - [j45]Qianqian Zhao, Jiang Yu, Cheng Wang:
Nontrivial Limit Cycles in a Kind of Piecewise Smooth Generalized Abel Equation. Int. J. Bifurc. Chaos 32(14): 2250216:1-2250216:18 (2022) - [c34]Linna Yang, Zhijun Chen, Yun Bai, Mingjie Zhang, Jiang Yu:
Research on Data Processing and Visualization of Simulation System. ICBDT 2022: 131-134 - 2021
- [j44]Jiahao Ye, Jingjing Yang, Jiang Yu, Siqiao Tan, Feng Luo, Zheming Yuan, Yuan Chen:
A Chi-MIC Based Adaptive Multi-Branch Decision Tree. IEEE Access 9: 78962-78972 (2021) - [j43]Qianqian Zhao, Cheng Wang, Jiang Yu:
Limit Cycles in Discontinuous Planar Piecewise Linear Systems Separated by a Nonregular Line of Center-Center Type. Int. J. Bifurc. Chaos 31(9): 2150136:1-2150136:17 (2021) - [j42]Fengyong Li, Hengjie Zhu, Jiang Yu, Chuan Qin:
Double linear regression prediction based reversible data hiding in encrypted images. Multim. Tools Appl. 80(2): 2141-2159 (2021) - [j41]Guanghui Song, Kui Cai, Xingwei Zhong, Jiang Yu, Jun Cheng:
Performance Limit and Coding Schemes for Resistive Random-Access Memory Channels. IEEE Trans. Commun. 69(4): 2093-2106 (2021) - 2020
- [j39]Peixing Yang, Jean-Pierre Françoise, Jiang Yu:
Second Order Melnikov Functions of Piecewise Hamiltonian Systems. Int. J. Bifurc. Chaos 30(1): 2050016:1-2050016:11 (2020) - [j37]Ke Rong, Yong Lin, Jiang Yu, Yue Zhang:
Manufacturing strategies for the ecosystem-based manufacturing system in the context of 3D printing. Int. J. Prod. Res. 58(8): 2315-2334 (2020) - [c31]Changqi Zhang, Jiang Yu, Yudong Li, Wen Si:
Dynamic Trajectory for Visual Perception of Abnormal Behavior. FCS 2020: 271-282 - [c30]Jiang Yu, Changqi Zhang, Yudong Li, Wen Si:
Multi-resolution Steganalysis of JPEG Images Using the Contrast of DCT Coefficients. FCS 2020: 628-640 - [c29]Guanghui Song, Kui Cai, Xingwei Zhong, Jiang Yu, Jun Cheng:
Coding for Resistive Random-Access Memory Channels. GLOBECOM 2020: 1-6 - [i1]Guanghui Song, Kui Cai, Xingwei Zhong, Jiang Yu, Jun Cheng:
Performance Limit and Coding Schemes for Resistive Random-Access Memory Channels. CoRR abs/2005.02601 (2020) - 2019
- [j36]Qianqian Zhao, Jiang Yu:
Poincaré Maps of " <"-Shape Planar Piecewise Linear Dynamical Systems with a Saddle. Int. J. Bifurc. Chaos 29(12): 1950165:1-1950165:21 (2019) - [j35]Xiaowei Li, Jiang Yu, Jun Chang, Jinpeng Yang, Yaxin Ran:
一种基于CSI的非合作式人体行为识别方法 (Non-cooperative Human Behavior Recognition Method Based on CSI). 计算机科学 46(12): 266-271 (2019) - 2018
- [j34]Fengyong Li, Kui Wu, Xinpeng Zhang, Jiang Yu, Jingsheng Lei, Mi Wen:
Robust Batch Steganography in Social Networks With Non-Uniform Payload and Data Decomposition. IEEE Access 6: 29912-29925 (2018) - [j33]Guanyu Liu, Ping Gao, Feng Chen, Jiang Yu, Yue Zhang:
Technological innovation systems and IT industry sustainability in China: A case study of mobile system innovation. Telematics Informatics 35(5): 1144-1165 (2018) - [c27]Zheng Wang, Jiang Yu:
Model of Decision Making for Agents Based on Relationship Coefficient. ATIS 2018: 199-207 - 2017
- [j32]Zhipeng Long, Jiang Yu, Jun Chang:
一种改进的自适应全双工中继系统中继策略 (Improved Adaptive Relaying Strategy for Full Duplex Relay System). 计算机科学 44(9): 110-114 (2017) - [j31]Xingwei Zhou, Bo Zhou, Jiang Yu, Lan Yang, Yang Yang:
Research on Initial Rotor Position Estimation and Anti-Reverse Startup Methods for DSEM. IEEE Trans. Ind. Electron. 64(4): 3297-3307 (2017) - [c25]Haiyan Yu, Kun Xiang, Jiang Yu:
Understanding a moderating effect of physicians' endorsement to online workload: An empirical study in online health-care communities. IEEE BigData 2017: 4866-4868 - [c23]Fengyong Li, Mingquan Xin, Jinguo Li, Jiang Yu:
Improved detection for copy-move forgery with multi-scale sliding windows. ISPACS 2017: 231-236 - [c22]Jiang Yu, Wen Si, Fenyong Li:
Reversible data hiding in encrypted images with auxiliary syndrome. ISPACS 2017: 237-241 - 2016
- [j30]Hang Cheng, Xinpeng Zhang, Jiang Yu, Fengyong Li:
Markov process-based retrieval for encrypted JPEG images. EURASIP J. Inf. Secur. 2016: 1 (2016) - [j29]Hongyu Nie, Donghai Zhai, Jiang Yu, Meng Wang:
基于断裂结构线匹配模型的大破损区域图像修复算法 (Large Damaged Area Image Inpainting Algorithm Based on Matching Model for Broken Structure Line). 计算机科学 43(10): 292-296 (2016) - [j28]Hang Cheng, Xinpeng Zhang, Jiang Yu, Yuan Zhang:
Encrypted JPEG image retrieval using block-wise feature comparison. J. Vis. Commun. Image Represent. 40: 111-117 (2016) - [j27]Jiang Yu, Xinpeng Zhang, Fengyong Li:
Spatial steganalysis using redistributed residuals and diverse ensemble classifier. Multim. Tools Appl. 75(21): 13613-13625 (2016) - [j26]Hang Cheng, Xinpeng Zhang, Jiang Yu:
AC-coefficient histogram-based retrieval for encrypted JPEG images. Multim. Tools Appl. 75(21): 13791-13803 (2016) - [j25]Fengyong Li, Xinpeng Zhang, Hang Cheng, Jiang Yu:
Digital image steganalysis based on local textural features and double dimensionality reduction. Secur. Commun. Networks 9(8): 729-736 (2016) - [j24]Jiang Yu, Fengyong Li, Hang Cheng, Xinpeng Zhang:
Spatial Steganalysis Using Contrast of Residuals. IEEE Signal Process. Lett. 23(7): 989-992 (2016) - [j23]Jiaxing Lei, Bo Zhou, Jiadan Wei, Jinliang Bian, Yiqi Zhu, Jiang Yu, Yang Yang:
Predictive Power Control of Matrix Converter With Active Damping Function. IEEE Trans. Ind. Electron. 63(7): 4550-4559 (2016) - 2015
- [j22]Dapeng Tao, Jun Cheng, Xu Lin, Jiang Yu:
Local structure preserving discriminative projections for RGB-D sensor-based scene classification. Inf. Sci. 320: 383-394 (2015) - [c21]Hang Cheng, Xinpeng Zhang, Jiang Yu, Fengyong Li:
Markov Process Based Retrieval for Encrypted JPEG Images. ARES 2015: 417-421 - [c20]Jiang Yu, Geng Liu, Xin Zhang, Pengju Ren:
A high efficient hardware architecture for multiview 3DTV. ASP-DAC 2015: 22-23 - [c19]Xinpeng Zhang, Zichi Wang, Jiang Yu, Zhenxing Qian:
Reversible visible watermark embedded in encrypted domain. ChinaSIP 2015: 826-830 - [c18]Yuan Zhang, Xinpeng Zhang, Chuan Qin, Jiang Yu:
Multiple Description Coding for Encrypted Images. IIH-MSP 2015: 85-88 - 2014
- [j21]Fengyong Li, Xinpeng Zhang, Jiang Yu, Wenfeng Shen:
Adaptive JPEG steganography with new distortion function. Ann. des Télécommunications 69(7-8): 431-440 (2014) - [j20]Jaume Llibre, Jiang Yu, Xiang Zhang:
On the Limit Cycles of the Polynomial Differential Systems with a Linear Node and Homogeneous Nonlinearities. Int. J. Bifurc. Chaos 24(5) (2014) - [j19]Xingyong Yu, Jiang Yu, Jun Chang:
Modelling and analysis of protection and control applications in smart substation. Int. J. Wirel. Mob. Comput. 7(1): 54-60 (2014) - 2013
- [j18]Dingheng Pi, Jiang Yu, Xiang Zhang:
On the sliding bifurcation of a Class of Planar Filippov Systems. Int. J. Bifurc. Chaos 23(3) (2013) - [j17]Ke Rong, Yong Lin, Yongjiang Shi, Jiang Yu:
Linking business ecosystem lifecycle with platform strategy: a triple view of technology, application and organisation. Int. J. Technol. Manag. 62(1): 75-94 (2013) - [j16]Ke Rong, Yongjiang Shi, Jiang Yu:
Nurturing business ecosystems to deal with industry uncertainties. Ind. Manag. Data Syst. 113(3): 385-402 (2013) - 2011
- [j12]Jiang Yu, Olav Tirkkonen, Danpu Liu:
Distributed Greedy Synchronization with Memory in Self-Organized. J. Next Gener. Inf. Technol. 2(3): 49-59 (2011) - [c17]Jianbo Lu, Guanzhong Dai, Dejun Mu, Jiang Yu, Haipeng Li:
QoS Guarantee in Tomcat Web Server: A Feedback Control Approach. CyberC 2011: 183-189 - [c16]Jiang Yu, Yong Qin, Limin Jia, Zongyi Xing:
Optimization of Vehicles Arrangement in Distribution Center. LISS (2) 2011: 180-184 - 2010
- [j10]Ping Gao, Jiang Yu:
Has China caught up in IT? Commun. ACM 53(8): 30-32 (2010) - [c15]Jiang Yu, Linsheng Li, Anhong Wang, Qichuan Tian:
FDCT-Based Digital Watermarking Algorithm for Gray Images. CASoN 2010: 646-649 - 2009
- [j8]Hao Wu, Yijian Pei, Jiang Yu:
Detecting academic experts by topic-sensitive link analysis. Frontiers Comput. Sci. China 3(4): 445-456 (2009) - [c12]Hao Wu, Yijian Pei, Jiang Yu:
Hidden Topic Analysis Based Formal Framework for Finding Experts in Metadata Corpus. ACIS-ICIS 2009: 369-374 - 2008
- [j6]Xue Han, Jiang Yu:
Evaluating 3G Licensing Patterns for an Indigenous Standard in China. Int. J. Inf. Technol. Decis. Mak. 7(3): 451-470 (2008) - [c9]Jiang Yu, Olav Tirkkonen:
Self-Organized Synchronization in Wireless Network. SASO 2008: 329-338 - 2007
- [c7]Jiang Yu, Fei Lin, Yong Teng, Guangxin Yue:
MIMO-OFDM Transmission Adaptation using Rank. PIMRC 2007: 1-5 - 2006
- [j5]Jiang Yu, Chun Tung Chou, Zongkai Yang, Xu Du, Tai Wang:
A dynamic caching algorithm based on internal popularity distribution of streaming media. Multim. Syst. 12(2): 135-149 (2006) - [c6]Jiang Yu, Xu Du, Tai Wang, Chun Tung Chou:
Internal popularity of streaming video and its implication on caching. AINA (1) 2006: 35-40 - [c5]Xu Du, Tai Wang, Zongkai Yang, Jiang Yu, Wei Liu:
Variable Rate Caching for Video Delivery in Heterogeneous Environment. ICC 2006: 1046-1051 - 2005
- [j3]Jiang Yu, Xin Fang:
The strategic roles of government in e-infrastructure development: case studies of China and Korea. Electron. Gov. an Int. J. 2(2): 177-187 (2005) - 2004
- [c2]Jiang Yu, Yongjiang Shi, Xin Fang:
Building innovative capability in firms of developing countries to face the domestic global competition. ISTAS 2004: 17-22
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-13 01:39 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint