Yang Yu

ORCID: 0000-0002-5204-2929
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Generative Adversarial Networks and Image Synthesis
  • Digital Media Forensic Detection
  • Anomaly Detection Techniques and Applications
  • Face recognition and analysis
  • Quantum Information and Cryptography
  • Quantum and electron transport phenomena
  • Reinforcement Learning in Robotics
  • Network Security and Intrusion Detection
  • Image and Signal Denoising Methods
  • Advanced Image Processing Techniques
  • Advanced Radiotherapy Techniques
  • Adversarial Robustness in Machine Learning
  • Image and Video Quality Assessment
  • Video Surveillance and Tracking Methods
  • Advanced Image Fusion Techniques
  • Optical measurement and interference techniques
  • Radiomics and Machine Learning in Medical Imaging
  • Quantum Computing Algorithms and Architecture
  • Cooperative Communication and Network Coding
  • Advanced Vision and Imaging
  • Internet Traffic Analysis and Secure E-voting
  • Advanced Measurement and Metrology Techniques
  • Machine Learning and Data Classification
  • Power Systems Fault Detection
  • Coal and Its By-products

University of Science and Technology Beijing
2024-2025

Shaanxi University of Technology
2025

Beijing Sport University
2023-2024

Peng Cheng Laboratory
2023-2024

Liaoning Technical University
2024

Beihua University
2024

China Aerodynamics Research and Development Center
2024

China University of Petroleum, Beijing
2024

Shijiazhuang Tiedao University
2024

UNSW Sydney
2024

Wireless sensor networks are being developed for a variety of applications.With the continuing advances in network and application design, appropriate middleware is needed to provide both standardized portable system abstractions capability support coordinate concurrent applications on networks.In this paper, we first identify several design principles such middleware.These motivate cluster-based lightweight framework that separates semantics from underlying hardware, operating system,...

10.1109/mnet.2004.1265829 article EN IEEE Network 2004-01-01

Recently, realistic DeepFake videos have raised severe security concerns in society. Existing video-based detection methods observe local spatial regions with the coarse temporal view, thus it is difficult to obtain subtle spatiotemporal information, resulting limited generalization ability. In this paper, we propose a novel Augmented Multi-scale Spatiotemporal Inconsistency Magnifier (AMSIM) Global View (GIV) and more meticulous Multi-timescale Local (MLIV), focusing on mining comprehensive...

10.1109/tmm.2023.3237322 article EN IEEE Transactions on Multimedia 2023-01-01

Understory topography serves as a crucial data source, playing an instrumental role in numerous forest ecosystem applications. However, the use of synthetic aperture radar interferometry and optical stereo for acquisition ASTER (Advanced Spaceborne Thermal Emission Reflection Radiometer), SRTM (Shuttle Radar Topography Mission), GLO-30 (Copernicus Digital Elevation Model) DEM presents unique challenges, particularly forested environments. These challenges are primarily due to limitations...

10.3390/f15030426 article EN Forests 2024-02-23

Recently, DeepFake videos have developed rapidly, causing new security issues in society. Due to the rough spatiotemporal view, existing video-based detection methods struggle capture fine-grained information, resulting limited generalization ability. In addition, although transformer has achieved great success past few years, application of on deepfake video still needs be studied. To solve this problem, paper, we propose a novel Multiple Spatiotemporal Views Transformer (MSVT) with Local...

10.1109/tcsvt.2023.3281448 article EN IEEE Transactions on Circuits and Systems for Video Technology 2023-05-30

Deepfake techniques can forge the visual or audio signals in video, which leads to inconsistencies between and (VA) signals. Therefore, multimodal detection methods expose deepfake videos by extracting VA inconsistencies. Recently, technology has started collaborative forgery obtain more realistic videos, poses new challenges for Recent propose first extract natural correspondences real a self-supervised manner, then use learned as targets guide extraction of subsequent stage. However,...

10.1109/tcsvt.2023.3309899 article EN IEEE Transactions on Circuits and Systems for Video Technology 2023-08-29

This paper presents a new energy vehicle driving control system based on image processing technology. Through and analysis of road images, the is able to recognise elements, plan route, calculate its direction speed parameters. In order improve system’s applicability in various environments, it first divides into two categories: surface other objects. Then, uses manual iteration method determine optimal threshold suggests an adaptive improvement method. Second, carries out feature extraction...

10.71442/mari2025-0001 article EN cc-by 2025-02-20

Pyraminx and Skewb are complex but not innovative or interesting puzzles developed from traditional puzzles. Although people have been able to solve these two kinds of Rubik’s cube manually, the structure group pyraminx skewb still unclear algorithms for solving through theory unknown. Firstly, this paper introduces structures skewb. is closely related pyraminx. Because they all four axes rotation. So mathematical connecting with theory. Secondly, in paper, we expound on adequate important...

10.61173/eqr9d492 article EN other-oa Science and Technology of Engineering Chemistry and Environmental Protection 2025-02-26

In order to further study the effect of welding residual stress on fatigue strength a TC4 titanium alloy sheet during laser welding, butt joint model for sheets was established using ABAQUS (2022) software. The temperature and fields generated process were comprehensively simulated, melt pool shape magnitudes experimentally verified. experimental parameters included power range 900–1200 W, speeds 12.5 25 mm/s, double-sided approach with cooling interval 20 s between passes. findings indicate...

10.3390/cryst15030230 article EN cc-by Crystals 2025-02-27

To identify MRI features of hepatocellular carcinoma (HCC) that predict microvascular invasion (MVI) and postoperative intrahepatic recurrence in patients without peritumoral hepatobiliary phase (HBP) hypointensity.One hundred thirty with HCC who underwent preoperative gadoxetate-enhanced curative hepatic resection were retrospectively reviewed. Two radiologists reviewed all MR images assessed the radiological HCCs. The ability HBP hypointensity to MVI was analyzed. We then predicted...

10.2147/jhc.s422632 article EN cc-by-nc Journal of Hepatocellular Carcinoma 2023-09-01

The addition of small amount nickel to hot-working die steel has been found be beneficial for hardenability and toughness. In this paper, the Cr–Mo–V was studied improve hardenability, inherent mechanism enhancing toughness further explored. research results indicate that as a non-carbide-forming element does not alter type total carbide precipitation at equilibrium, but it can dissolve into matrix form substitutional lattice distortions with Fe atoms, promoting dispersion secondary carbides...

10.1016/j.jmrt.2023.10.229 article EN cc-by-nc-nd Journal of Materials Research and Technology 2023-11-01

This research aims to evaluate the compressive strength of FRP-confined columns using machine learning models. By systematically organizing codes and models proposed by various researchers, significant indicators influencing have been identified. A comprehensive database comprising 366 samples, including both CFRP GFRP, has assembled. Based on this database, a model was developed accurately predict strength. thorough evaluation conducted, comparing researchers. Additionally, detailed...

10.3389/fmats.2024.1408670 article EN cc-by Frontiers in Materials 2024-06-06

Purpose: This study presents the implementation and experimental results of a novel technique for 4D tumor tracking using commercially available commonly used treatment couch evaluates accuracy in clinical settings. Methods: Commercially is capable positioning patient accurately; however, currently there no provision compensating physiological movement real‐time. In this paper, real‐time control presented together with motion compensation four dimensions (superior‐inferior, lateral,...

10.1118/1.4758064 article EN Medical Physics 2012-10-26

Advancements in computer vision and deep learning have made it difficult to distinguish deepfake visual media. While existing detection frameworks achieved significant performance on challenging datasets, these approaches consider only a single perspective. More importantly, urban scenes, neither complex scenarios can be covered by view nor the correlation between multiple datasets of information well utilized. In this article, mine new for utilize multi-view contained images, we propose...

10.1145/3558004 article EN ACM Transactions on Multimedia Computing Communications and Applications 2022-08-22

10.1016/j.image.2023.117010 article EN Signal Processing Image Communication 2023-07-07

Advancements in computer vision and deep learning have led to difficulty distinguishing Deepfake real videos. In particular, forgery audios are also generated accompany fake videos make them more realistic, which makes detection difficult. Existing methods that use multimodal information ignore the representation gap between different modalities, resulting limited performance. To address this problem, paper, a novel method utilizing contrastive (MCL) is proposed better explore intra-modal...

10.1109/tcsvt.2023.3312738 article EN IEEE Transactions on Circuits and Systems for Video Technology 2023-09-07

The spread of fake face videos leads to severe social concerns, which promotes the development detection methods for these videos. Existing patch-based focus on local regions find forgery common clues, while ignoring important role global information. In this paper, a novel spatiotemporal network is proposed can better utilize implicit complementary advantages and Specifically, spatial module consists information stream extracted from patches selected by attention layers. Then, fusion...

10.1109/icassp43922.2022.9746061 article EN ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2022-04-27

Network security situational awareness is based on the extraction and analysis of big data, by understanding these data to evaluate current network status predict future development trends, provide feedback decision-makers make corresponding countermeasures, achieve protection for environment. This article focuses artificial intelligence, summarizes related definitions classic models awareness, provides an overview intelligence. Starting from method machine learning, it specifically...

10.3390/electronics12102309 article EN Electronics 2023-05-19
Coming Soon ...