default search action
Junyang Yu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j43]Zongwei Tang, Junyang Yu, Xiuli Chai, Tianfeng Ma, Zhihua Gan, Binjie Wang:
ImageShield: a responsibility-to-person blind watermarking mechanism for image datasets protection. Appl. Intell. 55(1): 84 (2025) - [j42]Tingyu Wang, Rui Zhai, Longge Wang, Junyang Yu, Han Li, Zhicheng Wang, Jinhu Wu:
Multi-scale attention and loss penalty mechanism for multi-view clustering. Multim. Syst. 31(1): 54 (2025) - [j41]Hao Yang, Junyang Yu, Rui Zhai:
High-precision intrusion detection for cybersecurity communications based on multi-scale convolutional neural networks. J. Supercomput. 81(1): 277 (2025) - 2024
- [j40]Jiafei Chen, Junyang Yu, Yingqi Wang, Xin He:
ELANet: an efficiently lightweight asymmetrical network for real-time semantic segmentation. Adv. Math. Commun. 33(1) (2024) - [j39]Yuxi Zhao, Longge Wang, Junyang Yu, Fang Zuo, Tingyu Wang, Zhicheng Wang, Han Li:
Subspace clustering based on a multichannel attention mechanism. Int. J. Mach. Learn. Cybern. 15(4): 1415-1430 (2024) - [j38]Yiru He, Shiqian Wang, Junyang Yu, Chaoyang Liu, Xin He, Han Li:
Joint weighted knowledge distillation and multi-scale feature distillation for long-tailed recognition. Int. J. Mach. Learn. Cybern. 15(4): 1647-1661 (2024) - [j37]Yingqi Wang, Huiqin Ji, Junyang Yu, Hongyu Han, Rui Zhai:
Click-through rate prediction based on feature interaction and behavioral sequence. Int. J. Mach. Learn. Cybern. 15(7): 2899-2913 (2024) - [j36]Rui Zhai, Haozhe Jin, Wei Gong, Ke Lu, Yanhong Liu, Yalin Song, Junyang Yu:
Adaptive client selection and model aggregation for heterogeneous federated learning. Multim. Syst. 30(4): 211 (2024) - [j35]Yongbo Yu, Yage Zhang, Junyang Yu, Jianwei Yue:
Lightweight decoder U-net crack segmentation network based on depthwise separable convolution. Multim. Syst. 30(5): 295 (2024) - [j34]Zhiyi Xin, Junyang Yu, Xin He, Yalin Song, Han Li:
SiamRAAN: Siamese Residual Attentional Aggregation Network for Visual Object Tracking. Neural Process. Lett. 56(2): 98 (2024) - [j33]Yalin Song, Hang Liu, Shuai Zhao, Haozhe Jin, Junyang Yu, Yanhong Liu, Rui Zhai, Longge Wang:
Fedadkd:heterogeneous federated learning via adaptive knowledge distillation. Pattern Anal. Appl. 27(4): 134 (2024) - [j32]Yingqi Wang, Huiqin Ji, Xin He, Junyang Yu, Hongyu Han, Rui Zhai, Longge Wang:
Disentangled self-attention neural network based on information sharing for click-through rate prediction. PeerJ Comput. Sci. 10: e1764 (2024) - [j31]Bohan Li, Xin He, Junyang Yu, Guanghui Wang, Yixin Song, Shunjie Pan, Hangyu Gu:
Adaptive memory reservation strategy for heavy workloads in the Spark environment. PeerJ Comput. Sci. 10: e2460 (2024) - 2023
- [j30]Jinjiang Wang, Junyang Yu, Yixin Song, Xin He, Yalin Song:
An efficient energy-aware and service quality improvement strategy applied in cloud computing. Clust. Comput. 26(6): 4031-4049 (2023) - [j29]Yafeng Zhang, Junyang Yu, Yuanyuan Wang, Shuang Tang, Han Li, Zhiyi Xin, Chaoyi Wang, Ziming Zhao:
Small object detection based on hierarchical attention mechanism and multi-scale separable detection. IET Image Process. 17(14): 3986-3999 (2023) - [j28]Kai Miao, Xin He, Junyang Yu, Guanghui Wang, Yongchao Chen:
A Study of Chinese News Headline Classification Based on Keyword Feature Expansion. Int. J. Comput. Intell. Syst. 16(1): 71 (2023) - [j27]Cong Shi, Rui Zhai, Yalin Song, Junyang Yu, Han Li, Yingqi Wang, Longge Wang:
Few-shot Sentiment Analysis Based on Adaptive Prompt Learning and Contrastive Learning. Inf. Technol. Control. 52(4): 1058-1072 (2023) - [j26]Zhihua Gan, Wenbin Jiang, Xiuli Chai, Yalin Song, Junyang Yu:
End-to-end image splicing localization based on multi-scale features and residual refinement module. J. Electronic Imaging 32(6) (2023) - [j25]Zhifeng Ma, Junyang Yu, Longge Wang, Huazhu Chen, Yuxi Zhao, Xin He, Yingqi Wang, Yalin Song:
Multi-view clustering based on view-attention driven. Int. J. Mach. Learn. Cybern. 14(8): 2621-2631 (2023) - [j24]Xin Zheng, Xin He, Yimo Ren, Jinfa Wang, Junyang Yu:
Owner named entity recognition in website based on multidimensional text guidance and space alignment co-attention. Multim. Syst. 29(6): 3757-3770 (2023) - [j23]Hangyu Gu, Jinjiang Wang, Junyang Yu, Dan Wang, Bohan Li, Xin He, Xiang Yin:
Towards virtual machine scheduling research based on multi-decision AHP method in the cloud computing platform. PeerJ Comput. Sci. 9: e1675 (2023) - [j22]Jinjiang Wang, Junyang Yu, Rui Zhai, Xin He, Yixin Song:
GMPR: A Two-Phase Heuristic Algorithm for Virtual Machine Placement in Large-Scale Cloud Data Centers. IEEE Syst. J. 17(1): 1419-1430 (2023) - [j21]Yixin Song, Junyang Yu, Jinjiang Wang, Xin He:
Memory management optimization strategy in Spark framework based on less contention. J. Supercomput. 79(2): 1504-1525 (2023) - [j20]Rui Zhai, Libo Zhang, Yingqi Wang, Yalin Song, Junyang Yu:
A multi-channel attention graph convolutional neural network for node classification. J. Supercomput. 79(4): 3561-3579 (2023) - 2022
- [j19]Junyang Yu, Mengle Zuo, Lifeng Dong, Huanlong Zhang, Xin He:
The multi-level classification and regression network for visual tracking via residual channel attention. Digit. Signal Process. 120: 103269 (2022) - [j18]Xin He, Haochen Yang, Guanghui Wang, Junyang Yu:
Towards trusted node selection using blockchain for crowdsourced abnormal data detection. Future Gener. Comput. Syst. 133: 320-330 (2022) - [j17]Lang Yu, Baojun Qiao, Huanlong Zhang, Junyang Yu, Xin He:
LTST: Long-term segmentation tracker with memory attention network. Image Vis. Comput. 119: 104374 (2022) - [j16]Jinjiang Wang, Hangyu Gu, Junyang Yu, Yixin Song, Xin He, Yalin Song:
Research on virtual machine consolidation strategy based on combined prediction and energy-aware in cloud computing platform. J. Cloud Comput. 11: 50 (2022) - [j15]Yalin Song, Yuhao Zhong, Zhihua Gan, Yang Yang, Junyang Yu, Xin He:
Generative adversarial networks-based image steganography with multiscale features integration. J. Electronic Imaging 31(5) (2022) - [j14]Ziming Zhao, Mengle Zuo, Junyang Yu, Xin He, Yalin Song, Rui Zhai:
Siamese network based on global and local feature matching for object tracking. J. Electronic Imaging 31(6) (2022) - [j13]Zhihua Gan, Xiaohui Cheng, Zilong Pang, Changjiang Zhu, Junyang Yu, Xin He:
Highly accurate end-to-end image steganalysis based on auxiliary information and attention mechanism. J. Electronic Imaging 31(6) (2022) - 2021
- [j12]Huanlong Zhang, Liyun Cheng, Jianwei Zhang, Wanwei Huang, Xiulei Liu, Junyang Yu:
Structural pixel-wise target attention for robust object tracking. Digit. Signal Process. 117: 103139 (2021) - [j11]Lang Yu, Huanlong Zhang, Junyang Yu, Baojun Qiao:
Online-adaptive classification and regression network with sample-efficient meta learning for long-term tracking. Image Vis. Comput. 112: 104181 (2021) - [c4]Lina Ge, Xin He, Guanghui Wang, Junyang Yu:
Chain-AAFL: Chained Adversarial-Aware Federated Learning Framework. WISA 2021: 237-248 - [c3]Yongchao Chen, Xin He, Guanghui Wang, Junyang Yu:
Improving Text Summarization Using Feature Extraction Approach Based on Pointer-generator with Coverage. WISA 2021: 489-496 - [c2]Chengzong Li, Rui Zhai, Fang Zuo, Junyang Yu, Libo Zhang:
Mixed Multi-channel Graph Convolution Network on Complex Relation Graph. WISA 2021: 497-504 - 2020
- [j10]Zhou Zhou, Hongmin Wang, Huailing Shao, Lifeng Dong, Junyang Yu:
A high-performance scheduling algorithm using greedy strategy toward quality of service in the cloud environments. Peer-to-Peer Netw. Appl. 13(6): 2214-2223 (2020) - [j9]Xiulei Liu, Shoulu Hou, Qiang Tong, Xuhong Liu, Zhihui Qin, Junyang Yu:
A Prediction Approach for Video Hits in Mobile Edge Computing Environment. Secur. Commun. Networks 2020: 8857564:1-8857564:6 (2020)
2010 – 2019
- 2019
- [j8]Qingjie Zhao, Jie Li, Junyang Yu, Hongyuan Ji:
基于动态自适应权重和柯西变异的蝙蝠优化算法 (Bat Optimization Algorithm Based on Dynamically Adaptive Weight and Cauchy Mutation). 计算机科学 46(6A): 89-92 (2019) - 2018
- [j7]Zhou Zhou, Jian Chang, Zhigang Hu, Junyang Yu, Fangmin Li:
A modified PSO algorithm for task scheduling optimization in cloud computing. Concurr. Comput. Pract. Exp. 30(24) (2018) - [j6]Zhou Zhou, Junyang Yu, Fangmin Li, Fei Yang:
Virtual machine migration algorithm for energy efficiency optimization in cloud computing. Concurr. Comput. Pract. Exp. 30(24) (2018) - [j5]Long Wang, Junyang Yu, Baojun Qiao:
Intelligent evaluation of computer network security based on neural network. J. Intell. Fuzzy Syst. 35(3): 2887-2891 (2018) - 2017
- [j4]Junyang Yu, Shihua Cao, Xianshu Fu, Feng Zhou, Jianming Sun, Yulin Chen:
基于人事信息系统的机构人员数据共享应用 (Application for Data Sharing of Organization and Personnel Based on Personnel Information System). 计算机科学 44(Z6): 594-597 (2017) - 2015
- [j3]Huanlong Zhang, Shiqiang Hu, Junyang Yu:
Visual tracking via robust multitask sparse prototypes. J. Electronic Imaging 24(2): 023025 (2015) - 2014
- [j2]Shihua Cao, Qihui Wang, Yaping Yuan, Junyang Yu:
Anomaly Event Detection Method Based on Compressive Sensing and Iteration in Wireless Sensor Networks. J. Networks 9(3): 711-718 (2014) - [j1]Junyang Yu, Zhigang Hu, Neal N. Xiong, He Liu, Zhou Zhou:
An energy conservation replica placement strategy for Dynamo. J. Supercomput. 69(3): 1068-1086 (2014)
2000 – 2009
- 2007
- [c1]Xiajiong Shen, Yan Xu, Junyang Yu, Ke Zhang:
Intelligent Search Engine Based on Formal Concept Analysis. GrC 2007: 669-674
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:01 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint