default search action
Jianyi Liu
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j47]Mengyuan Ding, Chenjie Yang, Jianyi Liu, Xuguang Lan, Nanning Zheng:
Relationship detection for manipulation in object stacking scene with fully connected CRF. Neurocomputing 611: 128661 (2025) - 2024
- [j46]Jianyi Liu, Xingxing Huang, Xinyu Shu, Xudong Dong:
Multiple correlation filters with gaussian constraint for fast online tracking. J. Vis. Commun. Image Represent. 99: 104089 (2024) - [j45]Ning Yu, Jianyi Liu, Yu Shi:
A Siamese Neural Network Framework With Sememe-Based Context Extraction for Interactive Argument Pair Identification. IEEE Signal Process. Lett. 31: 2355-2359 (2024) - [j44]Yihao Li, Ru Zhang, Jianyi Liu, Qi Lei:
A Semantic Controllable Long Text Steganography Framework Based on LLM Prompt Engineering and Knowledge Graph. IEEE Signal Process. Lett. 31: 2610-2614 (2024) - [j43]Youqiang Sun, Jianyi Liu, Ru Zhang:
Generative Image Steganography Based on Guidance Feature Distribution. ACM Trans. Multim. Comput. Commun. Appl. 20(11): 336:1-336:18 (2024) - [c61]Yihao Li, Ru Zhang, Jianyi Liu:
An Enhanced Prompt-Based LLM Reasoning Scheme via Knowledge Graph-Integrated Collaboration. ICANN (5) 2024: 251-265 - [c60]Ruifan Zhang, Jianyi Liu, Ru Zhang:
Controllable Semantic Linguistic Steganography via Summarization Generation. ICASSP 2024: 4560-4564 - [c59]Yihong Lu, Jianyi Liu, Ru Zhang:
An Images Regeneration Method for CG Anti-Forensics Based on Sensor Device Trace. ICME 2024: 1-6 - [c58]Yu Wang, Yuhong Shi, Jianyi Liu, Xinhu Zheng:
Incremental Conflict-Based Search for Multi-agent Path Finding in Dynamic Environment. AIAI (4) 2024: 349-359 - [c57]Yuhong Shi, Jianyi Liu, Xinhu Zheng:
LFENav: LLM-Based Frontiers Exploration for Visual Semantic Navigation. AIAI (4) 2024: 375-388 - [c56]Jingwen Li, Ru Zhang, Jianyi Liu:
Attack Behavior Extraction Based on Heterogeneous Threat Intelligence Graphs and Data Augmentation. IJCNN 2024: 1-9 - [i14]Yihao Wang, Ruiqi Song, Ru Zhang, Jianyi Liu, Lingxiao Li:
LLsM: Generative Linguistic Steganography with Large Language Model. CoRR abs/2401.15656 (2024) - [i13]Yihao Li, Ru Zhang, Jianyi Liu, Gongshen Liu:
An Enhanced Prompt-Based LLM Reasoning Scheme via Knowledge Graph-Integrated Collaboration. CoRR abs/2402.04978 (2024) - [i12]Yifan Tang, Yihao Wang, Ru Zhang, Jianyi Liu:
Linguistic Steganalysis via LLMs: Two Modes for Efficient Detection of Strongly Concealed Stego. CoRR abs/2406.04218 (2024) - [i11]Yufei Luo, Zhen Yang, Ru Zhang, Jianyi Liu:
Pseudo-label Based Domain Adaptation for Zero-Shot Text Steganalysis. CoRR abs/2406.18565 (2024) - [i10]Zhen Yang, Wenhui Wang, Tao Qi, Peng Zhang, Tianyun Zhang, Ru Zhang, Jianyi Liu, Yongfeng Huang:
LICM: Effective and Efficient Long Interest Chain Modeling for News Recommendation. CoRR abs/2408.00859 (2024) - [i9]Yihong Lu, Jianyi Liu, Ru Zhang:
Current Status and Trends in Image Anti-Forensics Research: A Bibliometric Analysis. CoRR abs/2408.11365 (2024) - [i8]Yihao Wang, Ru Zhang, Yifan Tang, Jianyi Liu:
State-of-the-art Advances of Deep-learning Linguistic Steganalysis Research. CoRR abs/2409.01780 (2024) - 2023
- [j42]Youqiang Sun, Jianyi Liu, Ru Zhang:
Large capacity generative image steganography via image style transfer and feature-wise deep fusion. Appl. Intell. 53(23): 28675-28693 (2023) - [j41]Huachao Xiao, Yangxin Wang, Jianyi Liu, Jiaxin Huo, Yang Hu, Yu Wang:
APRS: Automatic pruning ratio search using Siamese network with layer-level rewards. Digit. Signal Process. 133: 103864 (2023) - [j40]Yihao Wang, Ru Zhang, Jianyi Liu:
V-A3tS: A rapid text steganalysis method based on position information and variable parameter multi-head self-attention controlled by length. J. Inf. Secur. Appl. 75: 103512 (2023) - [j39]Lei Guan, Fan Liu, Ru Zhang, Jianyi Liu, Yifan Tang:
MCW: A Generalizable Deepfake Detection Method for Few-Shot Learning. Sensors 23(21): 8763 (2023) - [j38]Jiawei Li, Ru Zhang, Jianyi Liu:
ConLBS: An Attack Investigation Approach Using Contrastive Learning with Behavior Sequence. Sensors 23(24): 9881 (2023) - [j37]Qiong Xu, Ru Zhang, Jianyi Liu:
Linguistic Steganalysis by Enhancing and Integrating Local and Global Features. IEEE Signal Process. Lett. 30: 16-20 (2023) - [j36]Yihao Wang, Ru Zhang, Jianyi Liu:
RLS-DTS: Reinforcement-Learning Linguistic Steganalysis in Distribution-Transformed Scenario. IEEE Signal Process. Lett. 30: 1232-1236 (2023) - [j35]Zhentan Zheng, Jianyi Liu, Nanning Zheng:
P$^{2}$-GAN: Efficient Stroke Style Transfer Using Single Style Image. IEEE Trans. Multim. 25: 6000-6012 (2023) - [c55]Youqiang Sun, Jianyi Liu, Ru Zhang:
A Robust Generative Image Steganography Method based on Guidance Features in Image Synthesis. ICME 2023: 55-60 - [c54]Ming Chen, Jianyi Liu, Jinlong Pang, Zhiqiang Jian, Pei Chen, Xinhu Zheng:
Multi-risk Aware Trajectory Planning for Car-like Robot in Highly Dynamic Environments. ITSC 2023: 4709-4716 - [c53]Yucong Zhong, Jianyi Liu, Zhiqiang Jian, Jinlong Pang, Shitao Chen, Xinhu Zheng:
DVT-Tree: Dynamic Visible Topology Tree for Efficient Mapless Navigation in Maze Environments. ITSC 2023: 4717-4724 - [i7]Yihao Wang, Ruiqi Song, Ru Zhang, Jianyi Liu:
UP4LS: User Profile Constructed by Multiple Attributes for Enhancing Linguistic Steganalysis. CoRR abs/2311.01775 (2023) - 2022
- [j34]Jianyi Liu, Ying Liu, Jingwen Li, Wenxin Sun, Jie Cheng, Ru Zhang, Xingjie Huang, Jin Pang:
Two statistical traffic features for certain APT group identification. J. Inf. Secur. Appl. 67: 103207 (2022) - [j33]Ruihua Zhang, Fan Yang, Yan Luo, Jianyi Liu, Cong Wang:
Learning invariant representation for unsupervised domain adaptive thorax disease classification. Pattern Recognit. Lett. 160: 155-162 (2022) - [j32]Shengnan Guo, Jianyi Liu, Zhongliang Yang, Weike You, Ru Zhang:
Linguistic Steganalysis Merging Semantic and Statistical Features. IEEE Signal Process. Lett. 29: 2128-2132 (2022) - [c52]Dazhuang Liu, Zhen Yang, Ru Zhang, Jianyi Liu:
A Robust Deepfake Video Detection Method based on Continuous Frame Face-swapping. AIIPCC 2022: 188-191 - [c51]Jing Li, Xingjie Huang, Yating Gao, Jianyi Liu, Ru Zhang, Jinmeng Zhao:
Distant Supervised Relation Extraction Based on Sentence-Level Attention with Relation Alignment. ICAIS (1) 2022: 142-152 - [c50]Ru Zhang, Hao Dong, Zhen Yang, Wenbo Ying, Jianyi Liu:
A CNN Based Visual Audio Steganography Model. ICAIS (1) 2022: 431-442 - [c49]Kaijie Liu, Wei Hu, Jianyi Liu, Jie Cheng, Yating Gao, Jin Pang:
Malicious Code Classification Method of Advanced Persistent Threat Based on Asm2Vec. ICCIP 2022: 89-94 - [c48]Jie Cheng, Jingchu Wang, Ang Xia, Lu Teng, Jianyi Liu:
Deep Features Based IDS Alarm False Positive Elimination Algorithm. ICCPR 2022: 565-570 - [c47]Jinlong Pang, Songyi Zhang, Jiawei Fu, Jianyi Liu, Nanning Zheng:
Curvature Continuous Path Planning with Reverse Searching for Efficient and Precise Autonomous Parking. ITSC 2022: 2798-2805 - [i6]Jiawei Li, Ru Zhang, Jianyi Liu, Gongshen Liu:
LogKernel A Threat Hunting Approach Based on Behaviour Provenance Graph and Graph Kernel Clustering. CoRR abs/2208.08820 (2022) - 2021
- [j31]Ruihua Zhang, Fan Yang, Yan Luo, Jianyi Liu, Jinbin Li, Cong Wang:
Part-Aware Mask-Guided Attention for Thorax Disease Classification. Entropy 23(6): 653 (2021) - [j30]Andrea K. Graham, Sarah W. Neubert, Angela Chang, Jianyi Liu, Emily Fu, Emilie A. Green, Rachel Kornfield, Jennifer Nicholas:
Applying User-Centered Design Methods to Understand Users' Day-to-Day Experiences Can Inform a Mobile Intervention for Binge Eating and Weight Management. Frontiers Digit. Health 3: 651749 (2021) - [j29]Jianyi Liu, Cong Zhang, Ru Zhang, Yi Li, Jie Cheng:
A video steganalysis method based on coding cost variation. Int. J. Distributed Sens. Networks 17(2): 155014772199273 (2021) - [c46]Jianyi Liu, Yansheng Qu, Jiaqi Li, Yunxiao Wang, Jing Zhang, Hongshan Yin:
Malicious Code Family Classification Method Based on Spatial Pyramid Pooling and Deep Residual Network. CCIS 2021: 260-264 - [c45]Wei Hu, Jianyi Liu, Han Guo, Jing Li, Xinjian Zhao, Mingyang Zhang:
Network Security Situation Prediction Model Based on Security Situation Factors. DSC 2021: 23-31 - [c44]Jin Pang, Xingjie Huang, Ru Zhang, Jianyi Liu, Yue Wang, Youqiang Sun:
A Reversible Digital Watermarking Algorithm Based on Medical Images via Threshold Segmentation and Contrast Enhancement. ICIG (2) 2021: 675-690 - [c43]Yating Gao, Ru Zhang, Xianxu Li, Jianyi Liu, Kaifeng Zhao, Xue Cheng:
Carrier Robust Reversible Watermark Model Based on Image Block Chain Authentication. ICIG (1) 2021: 712-724 - [c42]Jianyi Liu, Yuhan Wang, Zhen Yang, Ruifan Zhang, Ru Zhang:
A Controllable Image Steganography with Chaos and User Key. ICIG (1) 2021: 785-797 - 2020
- [j28]Jianyi Liu, Yu Tian, Ru Zhang, Youqiang Sun, Chan Wang:
A Two-Stage Generative Adversarial Networks With Semantic Content Constraints for Adversarial Example Generation. IEEE Access 8: 205766-205777 (2020) - [j27]Jianyi Liu, Kaifeng Zhao, Ru Zhang:
A Fully Reversible Data Hiding Scheme in Encrypted Images Based on Homomorphic Encryption and Pixel Prediction. Circuits Syst. Signal Process. 39(7): 3532-3552 (2020) - [j26]Jianyi Liu, José C. Príncipe, Arash Andalib:
Fast spatio-temporal decorrelation using FIR filter network with decoupled adaptive step sizes. Digit. Signal Process. 96 (2020) - [j25]Wenting Cui, Jianyi Liu, Shaoyi Du, Yuying Liu, Teng Wan, Mengqi Han, Qingnan Mou, Jing Yang, Yu-Cheng Guo:
Individual retrieval based on oral cavity point cloud data and correntropy-based registration algorithm. IET Image Process. 14(12): 2675-2681 (2020) - [j24]Ru Zhang, Feng Zhu, Jianyi Liu, Gongshen Liu:
Depth-Wise Separable Convolutions and Multi-Level Pooling for an Efficient Spatial CNN-Based Steganalysis. IEEE Trans. Inf. Forensics Secur. 15: 1138-1150 (2020) - [c41]Lu Xiao, Jianyi Liu, Wenchao Zhai, Liangqin Jiang:
Computational Analysis of Emotions and Topics in Survivor Interviews about Nanking Massacre. DH 2020 - [i5]Zhentan Zheng, Jianyi Liu:
P$^2$-GAN: Efficient Style Transfer Using Single Style Image. CoRR abs/2001.07466 (2020) - [i4]Ru Zhang, Sheng Zou, Jianyi Liu, Bingjie Lin, Dazhuang Liu:
Constructing feature variation coefficients to evaluate feature learning capabilities of convolutional layers in steganographic detection algorithms of spatial domain. CoRR abs/2010.10140 (2020) - [i3]Ru Zhang, Wenxin Sun, Jianyi Liu, Jingwen Li, Guan Lei, Han Guo:
Construction of Two Statistical Anomaly Features for Small-Sample APT Attack Traffic Classification. CoRR abs/2010.13978 (2020)
2010 – 2019
- 2019
- [j23]Ru Zhang, Chunjing Lu, Jianyi Liu:
A high capacity reversible data hiding scheme for encrypted covers based on histogram shifting. J. Inf. Secur. Appl. 47: 199-207 (2019) - [j22]Ru Zhang, Shiqi Dong, Jianyi Liu:
Invisible steganography via generative adversarial networks. Multim. Tools Appl. 78(7): 8559-8575 (2019) - [j21]Jianyi Liu, Rui Qiao, Yueying Li, Sheng Li:
Witness detection in multi-instance regression and its application for age estimation. Multim. Tools Appl. 78(23): 33703-33722 (2019) - [c40]Jianyi Liu, Bowen Liu, Ru Zhang, Cong Wang:
Multi-step Attack Scenarios Mining Based on Neural Network and Bayesian Network Attack Graph. ICAIS (2) 2019: 62-74 - [c39]Peixin Xue, Jianyi Liu, Shitao Chen, Zhuoli Zhou, Yongbo Huo, Nanning Zheng:
Crossing-Road Pedestrian Trajectory Prediction via Encoder-Decoder LSTM. ITSC 2019: 2027-2033 - 2018
- [j20]Ru Zhang, Gongshen Liu, Jianyi Liu, Jan P. Nees:
Analysis of Message Attacks in Aviation Data-Link Communication. IEEE Access 6: 455-463 (2018) - [j19]Yanhua Qin, Yumin Liu, Jianyi Liu, Zhongyuan Yu:
Underdetermined Wideband DOA Estimation for Off-Grid Sources with Coprime Array Using Sparse Bayesian Learning. Sensors 18(1): 253 (2018) - [j18]Zhou Su, Yilong Hui, Qichao Xu, Tingting Yang, Jianyi Liu, Yunjian Jia:
An Edge Caching Scheme to Distribute Content in Vehicular Networks. IEEE Trans. Veh. Technol. 67(6): 5346-5356 (2018) - [c38]Jianyi Liu, Fangyu Weng, Ru Zhang, Yunbiao Guo:
Network Security Situation Assessment Approach Based on Attack-Defense Stochastic Game Model. ICCCS (3) 2018: 161-173 - [c37]Yu Yang, Ru Zhang, Jianyi Liu, Yuhan Wang, Fuhong Huang:
An Image Steganography Algorithm Based on Pixel Block Difference and Variable Modulus Function. IIH-MSP (2) 2018: 36-43 - [c36]Jianyi Liu, Keyi Li, Yang Li, Ru Zhang, Xi Duan:
Attack Pattern Mining Algorithm Based on Fuzzy Clustering and Sequence Pattern from Security Log. IIH-MSP (2) 2018: 44-52 - [i2]Shiqi Dong, Ru Zhang, Jianyi Liu:
Invisible Steganography via Generative Adversarial Network. CoRR abs/1807.08571 (2018) - [i1]Ru Zhang, Feng Zhu, Jianyi Liu, Gongshen Liu:
Efficient feature learning and multi-size image steganalysis based on CNN. CoRR abs/1807.11428 (2018) - 2017
- [j17]Jinxia Wei, Ru Zhang, Jianyi Liu, Jing Li, Xinxin Niu, Yuangang Yao:
Dynamic data integrity auditing for secure outsourcing in the cloud. Concurr. Comput. Pract. Exp. 29(12) (2017) - [j16]Jinxia Wei, Xinxin Niu, Ru Zhang, Jianyi Liu, Yuangang Yao:
Efficient data possession-checking protocol with deduplication in cloud. Int. J. Distributed Sens. Networks 13(8) (2017) - [j15]Xingyu Chen, Xuguang Lan, Guoqiang Liang, Jianyi Liu, Nanning Zheng:
Pose-and-illumination-invariant face representation via a triplet-loss trained deep reconstruction model. Multim. Tools Appl. 76(21): 22043-22058 (2017) - [j14]Ru Zhang, Yanyu Huo, Jianyi Liu, Fangyu Weng:
Constructing APT Attack Scenarios Based on Intrusion Kill Chain and Fuzzy Clustering. Secur. Commun. Networks 2017: 7536381:1-7536381:9 (2017) - [c35]Ru Zhang, Jianyi Liu, Feng Zhu:
A Steganography Algorithm Based on MP3 Linbits Bit of Huffman Codeword. IIH-MSP (2) 2017: 169-176 - [c34]Keyi Li, Yang Li, Jianyi Liu, Ru Zhang, Xi Duan:
Attack pattern mining algorithm based on security log. ISI 2017: 205 - 2016
- [j13]Jinxia Wei, Jianyi Liu, Ru Zhang, Xinxin Niu:
Efficient Dynamic Replicated Data Possession Checking in Distributed Cloud Storage Systems. Int. J. Distributed Sens. Networks 12(1): 1894713:1-1894713:11 (2016) - [c33]Yang Li, Ying Xue, Yuangang Yao, Xianghui Zhao, Jianyi Liu, Ru Zhang:
An attack pattern mining algorithm based on fuzzy logic and sequence pattern. CCIS 2016: 234-238 - [c32]Xiang Li, Jianyi Liu, Yanyu Huo, Ru Zhang, Yuangang Yao:
An Android malware detection method based on AndroidManifest file. CCIS 2016: 239-243 - [c31]Ying Xue, Yang Li, Yuangang Yao, Xianghui Zhao, Jianyi Liu, Ru Zhang:
Phishing sites detection based on Url Correlation. CCIS 2016: 244-248 - [c30]Yuangang Yao, Jinxia Wei, Jianyi Liu, Ru Zhang:
Efficiently secure multiparty computation based on homomorphic encryption. CCIS 2016: 343-349 - [c29]Yi Xu, Furong Li, Jianyi Liu, Ru Zhang, Yuangang Yao, Dongfang Zhang:
Detecting False Information of Social Network in Big Data. CollaborateCom 2016: 642-651 - [c28]Furong Li, Ru Zhang, Yi Xu, Jianyi Liu, Juan Li:
Privacy preservation based on rotation perturbation in weighted social networks. ISCIT 2016: 206-211 - 2015
- [j12]Yao Ma, Jianyi Liu, Xi Yang, Yuehu Liu, Nanning Zheng:
Double layer multiple task learning for age estimation with insufficient training samples. Neurocomputing 147: 380-386 (2015) - [j11]Jinxia Wei, Ru Zhang, Jianyi Liu, Xinxin Niu, Yixian Yang:
Defense Strategy of Network Security based on Dynamic Classification. KSII Trans. Internet Inf. Syst. 9(12): 5116-5134 (2015) - 2014
- [j10]Jianyi Liu, Yao Ma, Lixin Duan, Fangfang Wang, Yuehu Liu:
Hybrid constraint SVR for facial age estimation. Signal Process. 94: 576-582 (2014) - [c27]Heng Gu, Weiguang Wang, Peng Liu, Siyue Zhang, Jianyi Liu, Cong Wang:
A system for web page sensitive keywords detection. CCIS 2014: 370-374 - [c26]Siyue Zhang, Weiguang Wang, Zhao Chen, Heng Gu, Jianyi Liu, Cong Wang:
A web page malicious script detection system. CCIS 2014: 394-399 - [c25]Xu Han, Tao Lv, Lin Wei, Yanyan Wu, Jianyi Liu, Cong Wang:
A model for website anomaly detection based on log analysis. CCIS 2014: 604-608 - [c24]Xi Yang, Jianyi Liu, Yao Ma, Jianru Xue:
Facial age estimation from web photos using multiple-instance learning. ICME 2014: 1-6 - 2013
- [j9]Yang Yang, Yuehu Liu, Jianyi Liu:
Automatic face image annotation based on a single template with constrained warping deformation. IET Comput. Vis. 7(1): 20-28 (2013) - [j8]Jianyi Liu, Kuizhi Mei, Fangfang Wang, Nanning Zheng:
Interactive Poisson Photometric Propagation for Facial Composite. J. Multim. 8(2): 153-160 (2013) - [c23]Jizeng Guan, Xiaolu Zhu, Mingtao Lei, Jianyi Liu, Cong Wang:
Business Impact Analysis Model Based on the Analytic Hierarchy Process. ISCTCS 2013: 227-234 - 2012
- [j7]Da Xiao, Yan Yang, Wenbin Yao, Chunhua Wu, Jianyi Liu, Yixian Yang:
Multiple-File Remote Data Checking for cloud storage. Comput. Secur. 31(2): 192-205 (2012) - 2010
- [j6]Lei Xiong, Nanning Zheng, Jianyi Liu, Shaoyi Du, Yuehu Liu:
Eye synthesis using the eye curve model. Image Vis. Comput. 28(3): 329-342 (2010) - [j5]Shaoyi Du, Nanning Zheng, Shihui Ying, Jianyi Liu:
Affine iterative closest point algorithm for point set registration. Pattern Recognit. Lett. 31(9): 791-799 (2010) - [c22]Jianyi Liu, Cong Wang, Zhengyang Liu, Wenbin Yao:
Advertising Keywords Extraction from Web Pages. WISM 2010: 336-343
2000 – 2009
- 2009
- [j4]Lei Xiong, Nanning Zheng, Shaoyi Du, Jianyi Liu:
Facial Expression Synthesis Based on Facial Component Model. Int. J. Pattern Recognit. Artif. Intell. 23(3): 637-657 (2009) - [j3]Jianyi Liu, Nanning Zheng, Lei Xiong:
Silhouette quality quantification for gait sequence analysis and recognition. Signal Process. 89(7): 1417-1427 (2009) - 2008
- [j2]Nanning Zheng, Qubo You, Gaofeng Meng, Jihua Zhu, Shaoyi Du, Jianyi Liu:
50 Years of Image Processing and Pattern Recognition in China. IEEE Intell. Syst. 23(6): 33-41 (2008) - [j1]Qubo You, Nanning Zheng, Ling Gao, Shaoyi Du, Jianyi Liu:
Solution for supervised graph embedding: A case study. Signal Process. 88(9): 2293-2301 (2008) - [c21]Miao Wan, Song Liu, Jianyi Liu, Cong Wang:
Automatic Technical Term Extraction Based on Term Association. FSKD (2) 2008: 19-23 - [c20]Jianyi Liu, Jinghua Wang, Cong Wang:
A Text Network Representation Model. FSKD (4) 2008: 150-154 - [c19]Jinghua Wang, Jianyi Liu, Cong Wang, Ping Zhang:
Keyword Indexing System with HowNet and PageRank. ICNSC 2008: 389-393 - [c18]Jianyi Liu, Jinghua Wang, Cong Wang:
Research on Text Network Representation. ICNSC 2008: 1217-1221 - [c17]Bingjing Xu, Yu Deng, Jianyi Liu:
Self-revise Hierarchical Classifier Based on SMO Algorithm for Chinese Question Classification. ICNSC 2008: 1683-1687 - [c16]Jianyi Liu, Nanning Zheng, Lei Xiong, Gaofeng Meng, Shaoyi Du:
Illumination transition image: Parameter-based illumination estimation and re-rendering. ICPR 2008: 1-4 - [c15]Jinghua Wang, Jianyi Liu, Ping Zhang:
Chinese Word Sense Disambiguation with PageRank and HowNet. IJCNLP 2008: 39-44 - 2007
- [c14]Steven Eno, Lauren Mace, Jianyi Liu, Brian Benson, Kailash Raman, Kiju Lee, Matthew Moses, Gregory S. Chirikjian:
Robotic Self-Replication in a Structured Environment without Computer Control. CIRA 2007: 327-332 - [c13]Jianyi Liu, Nanning Zheng:
Partitioning Gait Cycles Adaptive to Fluctuating Periods and Bad Silhouettes. ICB 2007: 347-355 - [c12]Jianyi Liu, Nanning Zheng, Bo Chen, Jishang Wei:
Estimating Aging Pattern by Aging Increment Distribution for Re-rendering of Facial Age Effects. ICIC (1) 2007: 782-791 - [c11]Lei Xiong, Nanning Zheng, Qubo You, Jianyi Liu:
Facial Expression Sequence Synthesis Based on Shape and Texture Fusion Model. ICIP (4) 2007: 473-476 - [c10]Jianyi Liu, Nanning Zheng:
Gait History Image: A Novel Temporal Template for Gait Recognition. ICME 2007: 663-666 - [c9]Lei Xiong, Nanning Zheng, Qubo You, Jianyi Liu, Shaoyi Du:
Eye Synthesis Using the Eye Curve Model. ICTAI (2) 2007: 531-534 - [c8]Nan Ren, Jianyi Liu, Xiang Su, Ping Wang, Juan Yin:
A Research on the Project of Digital Comprehensive Capability Platform for Shipbuilding. CONFENIS (1) 2007: 487-491 - [c7]Nan Ren, Yixin Li, Jianyi Liu, Hong Miao:
A Research on the Application of Three-D Planning of EIS in Manufacturing Industry. CONFENIS (2) 2007: 1215-1219 - [c6]Jinghua Wang, Jianyi Liu, Cong Wang:
Keyword Extraction Based on PageRank. PAKDD 2007: 857-864 - 2006
- [c5]Xuan Zhang, Jianyi Liu, Yaolong Zhang, Cong Wang:
Spam Behavior Recognition Based on Session Layer Data Mining. FSKD 2006: 1289-1298 - 2005
- [c4]Alejandro Jaimes, Takeshi Nagamine, Jianyi Liu, Kengo Omura, Nicu Sebe:
Affective Meeting Video Analysis. ICME 2005: 1412-1415 - [c3]Alejandro Jaimes, Jianyi Liu:
Hotspot Components for Gesture-Based Interaction. INTERACT 2005: 1062-1066 - [c2]Cong Wang, Yahui Guo, Jianyi Liu:
IIPP and CIT based intelligent autonomous QA system. ISADS 2005: 620-623 - 2004
- [c1]Fu Yun, Nanning Zheng, Jianyi Liu, Zhang Ting:
Facetransfer: a system model of facial image rendering. SMC (3) 2004: 2180-2185
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-23 20:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint