Sen Yan

ORCID: 0000-0001-6592-0893
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Privacy-Preserving Technologies in Data
  • Cryptography and Data Security
  • Face recognition and analysis
  • Cloud Data Security Solutions
  • Mathematical Control Systems and Analysis
  • Opportunistic and Delay-Tolerant Networks
  • Market Dynamics and Volatility
  • Radar Systems and Signal Processing
  • Privacy, Security, and Data Protection
  • Fractal and DNA sequence analysis
  • Transport and Logistics Innovations
  • Olfactory and Sensory Function Studies
  • Vehicular Ad Hoc Networks (VANETs)
  • Topic Modeling
  • Business Process Modeling and Analysis
  • Wireless Signal Modulation Classification
  • Big Data and Business Intelligence
  • Financial Markets and Investment Strategies
  • Face Recognition and Perception
  • Advanced Data Processing Techniques
  • Blockchain Technology Applications and Security
  • Islamic Finance and Banking Studies
  • Color perception and design
  • Generative Adversarial Networks and Image Synthesis
  • Linguistics and Cultural Studies

Inner Mongolia University
2024

Northwest Normal University
2023

CentraleSupélec
2023

Institut d'Électronique et des Technologies du numéRique
2023

University of Colorado Boulder
2022

Nanjing University of Information Science and Technology
2011

Jiangxi Normal University
2005

In this paper, we adopt the classification of personal information and hierarchy services to build a privacy system, in which one communicates with each other via pipes different security levels. level, has corresponding rights access other. The requesters are not able be infringed based on that service obtains from providers. Privacy system can decrease interaction, while circumstance strengthens enhances preserving. Thus strike balance between two goals Ubiquitous Computing: interaction

10.2298/csis110315055m article EN cc-by-nc-nd Computer Science and Information Systems 2011-01-01

The Intelligent Transportation System (ITS) is an important part of modern transportation infrastructure, employing a combination communication technology, information processing and control systems to manage networks. This integration various components such as roads, vehicles, systems, expected improve efficiency safety by providing better information, services, coordination modes. In recent years, graph-based machine learning has become increasingly research focus in the field ITS aiming...

10.48550/arxiv.2306.01282 preprint EN other-oa arXiv (Cornell University) 2023-01-01

Recent deep-learning techniques have made it possible to manipulate facial expressions in digital photographs or videos, however, these still lack fine and personalized ways control their creation. Moreover, current technologies are highly dependent on large labeled databases, which limits the range complexity of that can be modeled. Thus, cannot deal with non-basic emotions. In this paper, we propose a novel interdisciplinary approach combining Generative Adversarial Network (GAN) technique...

10.1371/journal.pone.0290612 article EN cc-by PLoS ONE 2023-08-25

Facial expression-based technologies have flooded our daily lives. However, most are limited to Ekman's basic facial expressions and rarely deal with more than ten emotional states. This is not only due the lack of prototypes for complex emotions but also time-consuming laborious task building an extensive labeled database. To remove these obstacles, we were inspired by a psychophysical approach affective computing, so-called reverse correlation process (RevCor), extract mental what given...

10.1109/fg57933.2023.10042515 article EN 2023-01-05

Edge computing bring storage, computing, processing, and networking closer to the devices that generate or consume data than traditional models based entirely on cloud, which is a set of edge technologies. nodes take some encryption decryption work for users, reducing network latency computational burden lightweight end certain extent. Attribute-based algorithm combined with searchable algorithm, achieve flexible access search encrypted data. Access policies are usually published in plain...

10.1109/miccis58901.2023.00008 article EN 2023-04-01
Coming Soon ...