Yunyun Dong

ORCID: 0009-0004-5251-9928
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Digital Media Forensic Detection
  • Advanced Steganography and Watermarking Techniques
  • Adversarial Robustness in Machine Learning
  • Advanced Neural Network Applications
  • Anomaly Detection Techniques and Applications
  • Advanced Image Processing Techniques
  • Generative Adversarial Networks and Image Synthesis
  • IoT and Edge/Fog Computing
  • Advanced Image Fusion Techniques
  • Data Management and Algorithms
  • Caching and Content Delivery
  • Advanced Data Compression Techniques
  • Image and Signal Denoising Methods
  • Image Enhancement Techniques
  • Biometric Identification and Security
  • Chaos-based Image/Signal Encryption
  • Advanced Database Systems and Queries
  • Energy Efficient Wireless Sensor Networks
  • Educational Innovations and Challenges
  • Hand Gesture Recognition Systems
  • Ideological and Political Education
  • Image Processing Techniques and Applications
  • Privacy-Preserving Technologies in Data
  • Brain Tumor Detection and Classification
  • Lung Cancer Diagnosis and Treatment

Yunnan University
2015-2024

Taiyuan University of Technology
2023

Despite achieving exceptional performance, deep neural networks (DNNs) suffer from the harassment caused by adversarial examples, which are produced corrupting clean examples with tiny perturbations. Many powerful defense methods have been presented such as training data augmentation and input reconstruction which, however, usually rely on prior knowledge of targeted models or attacks. A example its version very similar but different high-level representations in a victim model. If we can...

10.1109/tdsc.2023.3241428 article EN cc-by-nc-nd IEEE Transactions on Dependable and Secure Computing 2023-02-01

Although several cloud storage systems have been proposed, most of them can provide highly efficient point queries only because the key-value pairs storing mechanism. For these systems, satisfying complex multi-dimensional means scanning whole dataset, which is inefficient. In this paper, we propose a multidimensional index framework, based on Skip-list and Octree, refer to as Skip-Octree. Using randomized skip list makes hierarchical Octree structure easier implement in system. To support...

10.1186/s13677-016-0060-1 article EN cc-by Journal of Cloud Computing Advances Systems and Applications 2016-07-15

Abstract Image hiding is a task that hides secret images into cover images. The purposes of image are to ensure the invisible human and can be recovered. current state‐of‐the‐art steganography methods run risk information leakage. A safe network (SIHNet) presented reduce leakage information. Based on some phenomena which use invertible neural network, reversible processing (SIP) module proposed make suitable for stego leak less Besides, lost (LIH) used hide images, thus method recover better...

10.1049/ipr2.13138 article EN cc-by IET Image Processing 2024-06-14

Abstract Image steganography is the art of concealing secret information within images to prevent detection. In deep‐learning‐based image steganography, a common practice fuse with cover directly generate stego image. However, not all features are equally critical for data hiding, and some insignificant ones may lead appearance residual artifacts in this article, novel network architecture hybrid attention mechanism based on generative adversarial introduced. This model consists three...

10.1049/ipr2.13127 article EN cc-by IET Image Processing 2024-06-17

Abstract Image hiding is a task that embeds secret images in digital without being detected. The performance of image has been greatly improved by using the invertible neural network. However, current methods are less robust face Joint Photographic Experts Group (JPEG) compression. cannot be extracted from stego after JPEG compression image. Some show good robustness for some certain quality factors but poor other common factors. An image‐hiding network (RIHINNet) to all proposed. First all,...

10.1049/ipr2.13209 article EN cc-by IET Image Processing 2024-08-23

Unmanned aerial vehicles (UAVs) have gained considerable attention in the research community due to their exceptional agility, maneuverability, and potential applications fields like surveillance, multi-access edge computing (MEC), various other domains. However, efficiently providing computation offloading services for concurrent Internet of Things devices (IOTDs) remains a significant challenge UAVs limited communication capabilities. Consequently, optimizing managing constrained...

10.3390/electronics12204371 article EN Electronics 2023-10-22

Honeycomb lung is a pulmonary manifestation that occurs in the terminal stage of various diseases, which greatly threatens patients. Due to different locations and irregular shapes lesions, accurate segmentation honeycomb region an essential challenging problem. However, most deep learning methods struggle effectively utilize both global local information from lesion images, resulting cannot accurately segment lesion. In addition, these often ignore some semantic necessary for location shape...

10.14569/ijacsa.2023.0141256 article EN International Journal of Advanced Computer Science and Applications 2023-01-01

Nowadays the information explosion have generated a large amount of data. To utilise these data, there is trend setup efficient data index, especially for multidimensional indexing. However, most current cloud storage systems build indexing based on distributed hash (DHT), where are stored by key-value. This module not very suitable range queries in solve problems, this paper builds index skip lists and octree structure. Firstly, architecture adopts structure to store establish corresponding...

10.1504/ijwet.2015.073952 article EN International Journal of Web Engineering and Technology 2015-01-01

Most cloud providers offer Deep Learning as a Service (DLaaS) for different business, science and engineering domains. However, it is known that deep neural networks (DNNs) are vulnerable to adversarial examples, which can cause well-trained DNN models misbehave by injecting human-imperceptible perturbations the query input data. Securing learning service becomes critical challenge in mitigating such perturbations, enhancing robustness of DNNs. In this article, we report two important facts:...

10.1109/tsc.2023.3286583 article EN IEEE Transactions on Services Computing 2023-06-15

Image preprocessing models are usually employed as the preceding operations of high‐level vision tasks to improve performance. The adversarial attack technology makes both these face severe challenges. Prior research is focused solely on attacking single object detection models, without considering impact (multifocus image fusion) perturbations within system. Multifocus fusion work in conjunction with enhance quality images and capability Herein, problem system that utilizes multifocus its...

10.1002/aisy.202300771 article EN cc-by Advanced Intelligent Systems 2024-06-19

In the rapidly evolving domain of mobile edge–cloud computing (MECC), proliferation Internet Things (IoT) devices and applications poses significant challenges, particularly in dynamically managing computational demands user mobility. Current research has partially addressed aspects service migration resource allocation, yet it often falls short thoroughly examining nuanced interdependencies between strategies consequential impacts delays, intricacies handling incomplete tasks during...

10.3390/a17080370 article EN cc-by Algorithms 2024-08-21

10.1109/ijcnn60899.2024.10650747 article EN 2022 International Joint Conference on Neural Networks (IJCNN) 2024-06-30

Abstract Image steganography aims to hide secret data in the cover media for covert communication. Though many deep‐learning‐based image methods have been presented, these approaches suffer from inefficiency of building long‐distance connections between and images, leading noticeable modification traces poor steganalysis resistance. To improve visual imperceptibility generated stego it is essential establish a global correlation images. In this way, can be dispersed throughout globally....

10.1049/ipr2.13225 article EN cc-by-nc-nd IET Image Processing 2024-09-20

Adversarial examples in which imperceptible perturbations to the input can easily subvert a well-trained model’s prediction pose huge potential security threats deep neural networks (DNNs). As an effective way resist adversarial samples, reconstruction eliminate antagonism of inference process without involving modifications target structure and parameters. However, preprocessing inputs often results some loss protected accuracy. In this paper, we introduce new method that adopts high-level...

10.3390/electronics12092017 article EN Electronics 2023-04-26

With the arrival of era "new engineering", rapid development Internet and new technologies has provided references for teaching models in universities. Traditional can no longer meet needs contemporary college students. Integrating rain classroom, China MOOCs, Bilibili other platforms into process will play an important role "1 + 1> 2". Especially national strategic disciplines such as cyberspace security artificial intelligence, it is necessary to closely align with needs, actively adjust...

10.23977/aduhe.2023.051811 article EN Adult and Higher Education 2023-01-01

Multi-focus image fusion can overcome the issues that optical lens imaging cannot focus multiple targets simultaneously due to depth of field limitation. In this paper, we propose a generative adversarial network (DDF-GAN) which consists generator and two discriminators directly generate fused images without decision maps post-processing. training process, source all-in-focus generated by are used as input one dual discriminators. Meanwhile, gradient map another discriminator. An...

10.1109/msn57253.2022.00096 article EN 2021 17th International Conference on Mobility, Sensing and Networking (MSN) 2022-12-01

The robustness and security of deep neural network (DNN) models have received much attention in recent years. In-depth research on adversarial example generation methods that make DNN wrong judgments decisions will facilitate further more comprehensive practical defense methods. Most existing focus too attack performance design noise at the pixel level, resulting generated examples with redundant evident perturbations. In this paper, we try to find well-designed perturbations feature-level...

10.1109/ictai56018.2022.00152 article EN 2022-10-01
Coming Soon ...