Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Hanbing Yan
@inproceedings{DBLP:conf/icc/PanYQQ23, author = {Quanbo Pan and Hanbing Yan and Zhipeng Qin and Bingzhi Qi}, title = {{PACLASS:} {A} Lightweight Classification Framework on DNS-Over-HTTPS}, booktitle = {{IEEE} International Conference on Communications, {ICC} 2023, Rome, Italy, May 28 - June 1, 2023}, pages = {3805--3810}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICC45041.2023.10279398}, doi = {10.1109/ICC45041.2023.10279398}, timestamp = {Thu, 02 Nov 2023 17:09:41 +0100}, biburl = {https://dblp.org/rec/conf/icc/PanYQQ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/LvYLZJ22, author = {Haohui Lv and Hanbing Yan and Keyang Liu and Zhenwu Zhou and Junjie Jing}, title = {YOLOv5-AC: Attention Mechanism-Based Lightweight YOLOv5 for Track Pedestrian Detection}, journal = {Sensors}, volume = {22}, number = {15}, pages = {5903}, year = {2022}, url = {https://doi.org/10.3390/s22155903}, doi = {10.3390/S22155903}, timestamp = {Mon, 26 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/LvYLZJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cncert/MeiYHWZW22, author = {Rui Mei and Han{-}Bing Yan and Yongqiang He and Qinqin Wang and Shengqiang Zhu and Weiping Wen}, editor = {Wei Lu and Yuqing Zhang and Weiping Wen and Hanbing Yan and Chao Li}, title = {Considerations on Evaluation of Practical Cloud Data Protection}, booktitle = {Cyber Security - 19th China Annual Conference, {CNCERT} 2022, Beijing, China, August 16-17, 2022, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1699}, pages = {51--69}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-19-8285-9\_4}, doi = {10.1007/978-981-19-8285-9\_4}, timestamp = {Thu, 05 Jan 2023 17:08:54 +0100}, biburl = {https://dblp.org/rec/conf/cncert/MeiYHWZW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangYZMHZ22, author = {Qinqin Wang and Hanbing Yan and Chang Zhao and Rui Mei and Zhihui Han and Yu Zhou}, title = {{APT} Attribution for Malware Based on Time Series Shapelets}, booktitle = {{IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022}, pages = {769--777}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00108}, doi = {10.1109/TRUSTCOM56396.2022.00108}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangYZMHZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/WangYZMHZ22a, author = {Qinqin Wang and Hanbing Yan and Chang Zhao and Rui Mei and Zhihui Han and Yu Zhou}, title = {Measurement of Malware Family Classification on a Large-Scale Real-World Dataset}, booktitle = {{IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022}, pages = {1390--1397}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00196}, doi = {10.1109/TRUSTCOM56396.2022.00196}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/WangYZMHZ22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cncert/2021, editor = {Wei Lu and Yuqing Zhang and Weiping Wen and Hanbing Yan and Chao Li}, title = {Cyber Security - 18th China Annual Conference, {CNCERT} 2021, Beijing, China, July 20-21, 2021, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1506}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-16-9229-1}, doi = {10.1007/978-981-16-9229-1}, isbn = {978-981-16-9228-4}, timestamp = {Thu, 15 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cncert/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cncert/2022, editor = {Wei Lu and Yuqing Zhang and Weiping Wen and Hanbing Yan and Chao Li}, title = {Cyber Security - 19th China Annual Conference, {CNCERT} 2022, Beijing, China, August 16-17, 2022, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1699}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-19-8285-9}, doi = {10.1007/978-981-19-8285-9}, isbn = {978-981-19-8284-2}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cncert/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/LinZYWSGW21, author = {Hao Lin and Hua Zhang and Hanbing Yan and Huawei Wang and Yijie Shi and Fei Gao and Qiaoyan Wen}, title = {A Secure Online Treatment Blockchain Service}, journal = {Wirel. Pers. Commun.}, volume = {117}, number = {3}, pages = {1773--1795}, year = {2021}, url = {https://doi.org/10.1007/s11277-020-07945-4}, doi = {10.1007/S11277-020-07945-4}, timestamp = {Mon, 04 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/wpc/LinZYWSGW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qrs/MeiYHJ21, author = {Rui Mei and Han{-}Bing Yan and Zhihui Han and Jian{-}Chun Jiang}, title = {{CTSCOPY:} Hunting Cyber Threats within Enterprise via Provenance Graph-based Analysis}, booktitle = {21st {IEEE} International Conference on Software Quality, Reliability and Security, {QRS} 2021, Hainan, China, December 6-10, 2021}, pages = {28--39}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/QRS54544.2021.00014}, doi = {10.1109/QRS54544.2021.00014}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/qrs/MeiYHJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qrs/WangYH21, author = {Qinqin Wang and Hanbing Yan and Zhihui Han}, title = {Explainable {APT} Attribution for Malware Using {NLP} Techniques}, booktitle = {21st {IEEE} International Conference on Software Quality, Reliability and Security, {QRS} 2021, Hainan, China, December 6-10, 2021}, pages = {70--80}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/QRS54544.2021.00018}, doi = {10.1109/QRS54544.2021.00018}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/qrs/WangYH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scisec/MeiYH21, author = {Rui Mei and Han{-}Bing Yan and Zhihui Han}, editor = {Wenlian Lu and Kun Sun and Moti Yung and Feng Liu}, title = {RansomLens: Understanding Ransomware via Causality Analysis on System Provenance Graph}, booktitle = {Science of Cyber Security - Third International Conference, SciSec 2021, Virtual Event, August 13-15, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13005}, pages = {252--267}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-89137-4\_18}, doi = {10.1007/978-3-030-89137-4\_18}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scisec/MeiYH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wicomm/ZhangQZYGGWH20, author = {Hua Zhang and Jiawei Qin and Boan Zhang and Hanbing Yan and Jing Guo and Fei Gao and Senmiao Wang and Yangye Hu}, title = {A Multiclass Detection System for Android Malicious Apps Based on Color Image Features}, journal = {Wirel. Commun. Mob. Comput.}, volume = {2020}, pages = {8882295:1--8882295:21}, year = {2020}, url = {https://doi.org/10.1155/2020/8882295}, doi = {10.1155/2020/8882295}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wicomm/ZhangQZYGGWH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cncert/YuYMZG20, author = {Yuqi Yu and Hanbing Yan and Yuan Ma and Hao Zhou and Hongchao Guan}, editor = {Wei Lu and Qiaoyan Wen and Yuqing Zhang and Bo Lang and Weiping Wen and Hanbing Yan and Chao Li and Li Ding and Ruiguang Li and Yu Zhou}, title = {DeepHTTP: Anomalous {HTTP} Traffic Detection and Malicious Pattern Mining Based on Deep Learning}, booktitle = {Cyber Security - 17th China Annual Conference, {CNCERT} 2020, Beijing, China, August 12, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1299}, pages = {141--161}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-33-4922-3\_11}, doi = {10.1007/978-981-33-4922-3\_11}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cncert/YuYMZG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cncert/2020, editor = {Wei Lu and Qiaoyan Wen and Yuqing Zhang and Bo Lang and Weiping Wen and Hanbing Yan and Chao Li and Li Ding and Ruiguang Li and Yu Zhou}, title = {Cyber Security - 17th China Annual Conference, {CNCERT} 2020, Beijing, China, August 12, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1299}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-33-4922-3}, doi = {10.1007/978-981-33-4922-3}, isbn = {978-981-33-4921-6}, timestamp = {Thu, 15 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cncert/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/LiuLWY19, author = {Ya{-}Shu Liu and Yu{-}Kun Lai and Zhi{-}Hai Wang and Han{-}Bing Yan}, title = {A New Learning Approach to Malware Classification Using Discriminative Feature Extraction}, journal = {{IEEE} Access}, volume = {7}, pages = {13015--13023}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2892500}, doi = {10.1109/ACCESS.2019.2892500}, timestamp = {Wed, 27 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/LiuLWY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/kbs/LiuLLY19, author = {Hongyu Liu and Bo Lang and Ming Liu and Hanbing Yan}, title = {{CNN} and {RNN} based payload classification methods for attack detection}, journal = {Knowl. Based Syst.}, volume = {163}, pages = {332--341}, year = {2019}, url = {https://doi.org/10.1016/j.knosys.2018.08.036}, doi = {10.1016/J.KNOSYS.2018.08.036}, timestamp = {Tue, 25 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/kbs/LiuLLY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ict/LiuSY19, author = {Jieran Liu and Yuan Shen and Hanbing Yan}, title = {Functions-based {CFG} Embedding for Malware Homology Analysis}, booktitle = {26th International Conference on Telecommunications, {ICT} 2019, Hanoi, Vietnam, April 8-10, 2019}, pages = {220--226}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICT.2019.8798769}, doi = {10.1109/ICT.2019.8798769}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/ict/LiuSY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cncert/2018, editor = {Xiaochun Yun and Weiping Wen and Bo Lang and Hanbing Yan and Li Ding and Jia Li and Yu Zhou}, title = {Cyber Security - 15th International Annual Conference, {CNCERT} 2018, Beijing, China, August 14-16, 2018, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {970}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-13-6621-5}, doi = {10.1007/978-981-13-6621-5}, isbn = {978-981-13-6620-8}, timestamp = {Fri, 16 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cncert/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/YinWLZCYZ18, author = {Wei Yin and Qiaoyan Wen and Kaitai Liang and Zhenfei Zhang and Liqun Chen and Hanbing Yan and Hua Zhang}, title = {Delegation of Decryption Rights With Revocability From Learning With Errors}, journal = {{IEEE} Access}, volume = {6}, pages = {61163--61175}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2875069}, doi = {10.1109/ACCESS.2018.2875069}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/YinWLZCYZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZhangGYLYZZ18, author = {Hua Zhang and Hongchao Guan and Hanbing Yan and Wenmin Li and Yuqi Yu and Hao Zhou and Xingyu Zeng}, title = {Webshell Traffic Detection With Character-Level Features Based on Deep Learning}, journal = {{IEEE} Access}, volume = {6}, pages = {75268--75277}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2882517}, doi = {10.1109/ACCESS.2018.2882517}, timestamp = {Thu, 14 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ZhangGYLYZZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aiccc/HeWCYJ18, author = {Nengqiang He and Tianqi Wang and Pingyang Chen and Hanbing Yan and Zhengping Jin}, title = {An Android Malware Detection Method Based on Deep AutoEncoder}, booktitle = {Proceedings of the 2018 Artificial Intelligence and Cloud Computing Conference, {AICCC} 2018, Tokyo, Japan, December 21-23, 2018}, pages = {88--93}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3299819.3299834}, doi = {10.1145/3299819.3299834}, timestamp = {Tue, 02 Apr 2019 17:49:21 +0200}, biburl = {https://dblp.org/rec/conf/aiccc/HeWCYJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cncert/LvYM18, author = {Zhuo{-}Hang Lv and Han{-}Bing Yan and Rui Mei}, editor = {Xiaochun Yun and Weiping Wen and Bo Lang and Hanbing Yan and Li Ding and Jia Li and Yu Zhou}, title = {Automatic and Accurate Detection of Webshell Based on Convolutional Neural Network}, booktitle = {Cyber Security - 15th International Annual Conference, {CNCERT} 2018, Beijing, China, August 14-16, 2018, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {970}, pages = {73--85}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-981-13-6621-5\_6}, doi = {10.1007/978-981-13-6621-5\_6}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cncert/LvYM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsp/WenZY18, author = {Senhao Wen and Zhiyuan Zhao and Hanbing Yan}, title = {Detecting Malicious Websites in Depth through Analyzing Topics and Web-pages}, booktitle = {Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, {ICCSP} 2018, Guiyang, China, March 16-19, 2018}, pages = {128--133}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3199478.3199500}, doi = {10.1145/3199478.3199500}, timestamp = {Sun, 14 Apr 2019 17:40:32 +0200}, biburl = {https://dblp.org/rec/conf/iccsp/WenZY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ieea/WenRY18, author = {Senhao Wen and Yu Rao and Hanbing Yan}, title = {Information Protecting against {APT} Based on the Study of Cyber Kill Chain with Weighted Bayesian Classification with Correction Factor}, booktitle = {Proceedings of the 7th International Conference on Informatics, Environment, Energy and Applications, {IEEA} 2018, Beijing, China, March 28-31, 2018}, pages = {231--235}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3208854.3208893}, doi = {10.1145/3208854.3208893}, timestamp = {Mon, 03 Jul 2023 15:16:23 +0200}, biburl = {https://dblp.org/rec/conf/ieea/WenRY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1810-12751, author = {Yuqi Yu and Hanbing Yan and Hongchao Guan and Hao Zhou}, title = {DeepHTTP: Semantics-Structure Model with Attention for Anomalous {HTTP} Traffic Detection and Pattern Mining}, journal = {CoRR}, volume = {abs/1810.12751}, year = {2018}, url = {http://arxiv.org/abs/1810.12751}, eprinttype = {arXiv}, eprint = {1810.12751}, timestamp = {Thu, 08 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1810-12751.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YinWLZCYZ18, author = {Wei Yin and Qiaoyan Wen and Kaitai Liang and Zhenfei Zhang and Liqun Chen and Hanbing Yan and Hua Zhang}, title = {Delegation of Decryption Rights with Revocability from Learning with Errors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {777}, year = {2018}, url = {https://eprint.iacr.org/2018/777}, timestamp = {Fri, 04 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/YinWLZCYZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icncc/WenHY17, author = {Senhao Wen and Nengqiang He and Hanbing Yan}, title = {Detecting and Predicting {APT} Based on the Study of Cyber Kill Chain with Hierarchical Knowledge Reasoning}, booktitle = {Proceedings of the {VI} International Conference on Network, Communication and Computing, {ICNCC} 2017, Kunming, China, December 8-10, 2017}, pages = {115--119}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3171592.3171641}, doi = {10.1145/3171592.3171641}, timestamp = {Tue, 25 Apr 2023 15:28:14 +0200}, biburl = {https://dblp.org/rec/conf/icncc/WenHY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jam/XuYGZ14, author = {Honglin Xu and Han{-}Bing Yan and Cui{-}Fang Gao and Ping Zhu}, title = {Social Network Analysis Based on Network Motifs}, journal = {J. Appl. Math.}, volume = {2014}, pages = {874708:1--874708:6}, year = {2014}, url = {https://doi.org/10.1155/2014/874708}, doi = {10.1155/2014/874708}, timestamp = {Thu, 16 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jam/XuYGZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sose/WangYLXYX14, author = {Yonggang Wang and Shan Yao and Jing Li and Zhongfei Xia and Hanbing Yan and Junfeng Xu}, title = {ReSpam: {A} Novel Reputation Based Mechanism of Defending against Tag Spam in Social Computing}, booktitle = {8th {IEEE} International Symposium on Service Oriented System Engineering, {SOSE} 2014, Oxford, United Kingdom, April 7-11, 2014}, pages = {338--343}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/SOSE.2014.49}, doi = {10.1109/SOSE.2014.49}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sose/WangYLXYX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rsfdgrc/YanT13, author = {Han{-}Bing Yan and Xu{-}Qing Tang}, editor = {Davide Ciucci and Masahiro Inuiguchi and Yiyu Yao and Dominik Slezak and Guoyin Wang}, title = {The Impacting Analysis on Multiple Species Competition}, booktitle = {Rough Sets, Fuzzy Sets, Data Mining, and Granular Computing - 14th International Conference, RSFDGrC 2013, Halifax, NS, Canada, October 11-14, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8170}, pages = {269--276}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41218-9\_29}, doi = {10.1007/978-3-642-41218-9\_29}, timestamp = {Mon, 16 Mar 2020 17:44:10 +0100}, biburl = {https://dblp.org/rec/conf/rsfdgrc/YanT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnidc/HouZZY12, author = {Yixin Hou and Bo Zhao and Honggang Zhang and Hanbing Yan}, title = {A fast image spam filter based on {ORB}}, booktitle = {3rd {IEEE} International Conference on Network Infrastructure and Digital Content, {IC-NIDC} 2012, Beijing, China, September 21-23, 2012}, pages = {503--507}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ICNIDC.2012.6418804}, doi = {10.1109/ICNIDC.2012.6418804}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/icnidc/HouZZY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcst/LiuYM11, author = {Ya{-}Shu Liu and Han{-}Bing Yan and Ralph R. Martin}, title = {As-Rigid-As-Possible Surface Morphing}, journal = {J. Comput. Sci. Technol.}, volume = {26}, number = {3}, pages = {548--557}, year = {2011}, url = {https://doi.org/10.1007/s11390-011-1154-3}, doi = {10.1007/S11390-011-1154-3}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcst/LiuYM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvcg/YanHMY08, author = {Han{-}Bing Yan and Shi{-}Min Hu and Ralph R. Martin and Yong{-}Liang Yang}, title = {Shape Deformation Using a Skeleton to Drive Simplex Transformations}, journal = {{IEEE} Trans. Vis. Comput. Graph.}, volume = {14}, number = {3}, pages = {693--706}, year = {2008}, url = {https://doi.org/10.1109/TVCG.2008.28}, doi = {10.1109/TVCG.2008.28}, timestamp = {Mon, 14 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvcg/YanHMY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcst/YanHM07, author = {Han{-}Bing Yan and Shi{-}Min Hu and Ralph R. Martin}, title = {3D Morphing Using Strain Field Interpolation}, journal = {J. Comput. Sci. Technol.}, volume = {22}, number = {1}, pages = {147--155}, year = {2007}, url = {https://doi.org/10.1007/s11390-007-9020-z}, doi = {10.1007/S11390-007-9020-Z}, timestamp = {Mon, 14 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcst/YanHM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cgi/YanHM06, author = {Han{-}Bing Yan and Shi{-}Min Hu and Ralph Martin}, editor = {Tomoyuki Nishita and Qunsheng Peng and Hans{-}Peter Seidel}, title = {Skeleton-Based Shape Deformation Using Simplex Transformations}, booktitle = {Advances in Computer Graphics, 24th Computer Graphics International Conference, {CGI} 2006, Hangzhou, China, June 26-28, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4035}, pages = {66--77}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11784203\_6}, doi = {10.1007/11784203\_6}, timestamp = {Mon, 01 Mar 2021 13:46:59 +0100}, biburl = {https://dblp.org/rec/conf/cgi/YanHM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jvca/YanHM04, author = {Han{-}Bing Yan and Shi{-}Min Hu and Ralph R. Martin}, title = {Morphing based on strain field interpolation}, journal = {Comput. Animat. Virtual Worlds}, volume = {15}, number = {3-4}, pages = {443--452}, year = {2004}, url = {https://doi.org/10.1002/cav.48}, doi = {10.1002/CAV.48}, timestamp = {Thu, 16 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jvca/YanHM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.