default search action
Yifeng Sun
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j14]Zhao Zhao, Weike Song, Huajie Wang, Yifeng Sun, Haifeng Luo:
Development and Application of IoT Monitoring Systems for Typical Large Amusement Facilities. Sensors 24(14): 4433 (2024) - [j13]Zhangchen Song, Peiqing Liu, Hao Guo, Yifeng Sun, Shujie Jiang:
The Influence of Low-Frequency Oscillations on Trailing-Edge Tonal Noise with Symmetry Spanwise Source Regions. Symmetry 16(6): 710 (2024) - 2023
- [j12]Shuang Wu, Jinlong Wu, Yifeng Sun, Tong Yao:
Optimization Algorithm for Urban Rail Transit Operation Scheduling based on Linear Programming. Scalable Comput. Pract. Exp. 24(3): 203-216 (2023) - [j11]Weike Song, Zhao Zhao, Kun Zhang, Huajie Wang, Yifeng Sun:
Development of Multifunctional Detection Robot for Roller Coaster Track. Sensors 23(20): 8346 (2023) - 2022
- [c18]Yifeng Sun, Hao Lan Zhang, Yifan Lu, Yun Xue:
EEG Signal Classification Using Shallow FBCSP ConvNet with a New Cropping Strategy. BI 2022: 359-368 - [c17]Yubin Wang, Yifeng Sun, Jiang Wu, Hao Hu, Zhiqiang Wu, Weigui Huang:
Reinforcement Learning using Reward Expectations in Scenarios with Aleatoric Uncertainties. CoG 2022: 261-267 - [c16]Jian Yin, Jiachen Ma, Wei Xie, Yifeng Sun, Maoyi Liu, Yonglei Li:
An Adaptive Control Method for Robot Constant Force Polishing Device. ICICT 2022: 159-165 - 2020
- [j10]Haitao Song, Guangming Tang, Yifeng Sun, Shunxiang Yang:
Anisotropic distortion cost update strategy in spatial image steganography. Multim. Tools Appl. 79(17-18): 11973-11992 (2020) - [c15]Yu Zhang, Binglong Li, Yifeng Sun:
Android Encryption Database Forensic Analysis Based on Static Analysis. CSAE 2020: 89:1-89:9
2010 – 2019
- 2019
- [j9]Hai-Tao Song, Guangming Tang, Guang Kou, Yifeng Sun, Mingming Jiang:
Digital steganography model and embedding optimization strategy. Multim. Tools Appl. 78(7): 8271-8288 (2019) - [j8]Haitao Song, Guangming Tang, Yifeng Sun, Zhanzhan Gao:
Security Measure for Image Steganography Based on High Dimensional KL Divergence. Secur. Commun. Networks 2019: 3546367:1-3546367:13 (2019) - [c14]Long Quang Tran, Yifeng Sun, Robin P. Guan, Junaid Saeed, Liuping Wang, Peter J. Radcliffe:
Development and Outcomes of Teaching PID Control in Classroom with Hands on Learning Experience. ICIT 2019: 1041-1047 - 2018
- [j7]Xiaoyu Xu, Yifeng Sun, Jiang Wu, Yi Sun:
Steganography algorithms recognition based on match image and deep features verification. Multim. Tools Appl. 77(21): 27955-27979 (2018) - [c13]Yifeng Sun, Xiaoyu Xu, Haitao Song, Guangming Tang, Shunxiang Yang:
Improving Testing Accuracy of Convolutional Neural Network for Steganalysis Using Segmented Subimages. ICCCS (4) 2018: 313-323 - 2017
- [c12]Yifeng Sun, Tzi-cker Chiueh:
TCP Performance Optimization for Epoch-based Execution. APSys 2017: 10:1-10:7 - 2016
- [c11]Xiaoyu Xu, Yifeng Sun, Guangming Tang, Shiyuan Chen, Jian Zhao:
Deep Learning on Spatial Rich Model for Steganalysis. IWDW 2016: 564-577 - 2015
- [j6]Tsozen Yeh, Shuwen Yang, Yifeng Sun:
Improving the program performance through prioritized memory management and disk operation. Concurr. Comput. Pract. Exp. 27(13): 3345-3361 (2015) - [j5]Yanling Chen, Guangming Tang, Yifeng Sun:
基于免疫危险理论的网络安全态势评估 (Assessment of Network Security Situation Based on Immune Danger Theory). 计算机科学 42(6): 167-170 (2015) - [j4]Shufan Yan, Guangming Tang, Yifeng Sun, Zhanzhan Gao, Liuqing Shen:
A triple-layer steganography scheme for low bit-rate speech streams. Multim. Tools Appl. 74(24): 11763-11782 (2015) - [c10]Yifeng Sun, Lixu Gu, Junfeng Cai:
Target vessel identification in endoscopic coronary artery bypass grafting. BMEI 2015: 418-422 - 2014
- [c9]Tsozen Yeh, Yifeng Sun:
Enabling Prioritized Cloud I/O Service in Hadoop Distributed File System. HPCC/CSS/ICESS 2014: 256-259 - 2013
- [j3]Jing Liu, Guangming Tang, Yifeng Sun:
A secure steganography for privacy protection in healthcare system. J. Medical Syst. 37(2): 9918 (2013) - [c8]Yifeng Sun, Tzi-cker Chiueh:
SIDE: Isolated and efficient execution of unmodified device drivers. DSN 2013: 1-12 - 2012
- [j2]Yifeng Sun, Danmei Niu, Guangming Tang, Zhanzhan Gao:
Optimized LSB Matching Steganography Based on Fisher Information. J. Multim. 7(4): 295-302 (2012) - 2010
- [j1]Xiaolin Wang, Yifeng Sun, Yingwei Luo, Zhenlin Wang, Yu Li, Binbin Zhang, Haogang Chen, Xiaoming Li:
Dynamic memory paravirtualization transparent to guest OS. Sci. China Inf. Sci. 53(1): 77-88 (2010)
2000 – 2009
- 2009
- [c7]Yifeng Sun, Yingwei Luo, Xiaolin Wang, Zhenlin Wang, Binbin Zhang, Haogang Chen, Xiaoming Li:
Fast Live Cloning of Virtual Machine Based on Xen. HPCC 2009: 392-399 - 2008
- [c6]Bin Liu, Fenlin Liu, Chunfang Yang, Yifeng Sun:
Secure Steganography in Compressed Video Bitstreams. ARES 2008: 1382-1387 - [c5]Yingwei Luo, Binbin Zhang, Xiaolin Wang, Zhenlin Wang, Yifeng Sun, Haogang Chen:
Live and incremental whole-system migration of virtual machines using block-bitmap. CLUSTER 2008: 99-106 - [c4]Ping Wang, Fenlin Liu, Guodong Wang, Yifeng Sun, Daofu Gong:
Multi-class steganalysis for Jpeg stego algorithms. ICIP 2008: 2076-2079 - [c3]Yifeng Sun, Fenlin Liu, Bin Liu, Ping Wang:
Steganalysis Based on Difference Image. IWDW 2008: 184-198 - 2007
- [c2]Yifeng Sun, David Levy:
Suggestions on Pattern Transformation in UML-RT. ICSEA 2007: 17 - [c1]Yifeng Sun, David Levy:
A Software Process for Modeling Complex Systems with UML-RT. TASE 2007: 401-410
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-23 18:30 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint