
Liyang Yu
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [j10]Jinkai Chen
, Chi Zhang, Weipeng Xuan, Liyang Yu, Shurong Dong
, Yuedong Xie
, Wuliang Yin
, Ji-Kui Luo
:
Triboelectric Nanogenerator-Based Self-Powered Resonant Sensor for Non-Destructive Defect Detection. Sensors 19(15): 3262 (2019) - 2018
- [c9]Junchao Wang, Lingxuan Fu, Liyang Yu, Xiwei Huang, Philip Brisk
, William H. Grover
:
Accelerating Simulation of Particle Trajectories in Microfluidic Devices by Constructing a Cloud Database. ISVLSI 2018: 666-671 - 2017
- [c8]Junbin Fang, Sijin Li, Guikai Xi, Zoe Lin Jiang, Siu-Ming Yiu, Liyang Yu, Xuan Wang, Qi Han, Qiong Li:
Semantic Video Carving Using Perceptual Hashing and Optical Flow. IFIP Int. Conf. Digital Forensics 2017: 223-244 - 2016
- [j9]Mahmoud Emam
, Qi Han, Liyang Yu, Hongli Zhang:
A Keypoint-Based Region Duplication Forgery Detection Algorithm. IEICE Trans. Inf. Syst. 99-D(9): 2413-2416 (2016) - [j8]Liyang Yu, Huanran Wang, Qi Han, Xiamu Niu, Siu-Ming Yiu, Jun-bin Fang, Zhifang Wang:
Exposing frame deletion by detecting abrupt changes in video streams. Neurocomputing 205: 84-91 (2016) - [j7]Liyang Yu, Qi Han, Xiamu Niu:
Feature point-based copy-move forgery detection: covering the non-textured areas. Multim. Tools Appl. 75(2): 1159-1176 (2016) - 2015
- [j6]Liyang Yu, Qi Han, Xiamu Niu:
Qualified matching feature collection for feature point-based copy-move forgery detection. J. Electronic Imaging 24(2): 023035 (2015) - [c7]Mahmoud Emam
, Qi Han, Liyang Yu, Ye Zhang, Xiamu Niu:
A passive technique for detecting copy-move forgery with rotation based on polar complex exponential transform. ICDIP 2015: 963104 - [c6]Liyang Yu, Chunxiao Fan, Yue Ming:
A visual tracker based on improved kernel correlation filter. ICIMCS 2015: 60:1-60:4 - [c5]Hao Yuan, Xiaoxia Zhao, Liyang Yu:
A Distributed Bayesian Algorithm for data fault detection in wireless sensor networks. ICOIN 2015: 63-68 - [c4]Liyang Yu, Qi Han, Xiamu Niu:
Detecting Duplicated Frames by Mapping Frames to 3D Skeletons. IIH-MSP 2015: 168-171 - 2014
- [b3]Liyang Yu:
A Developer's Guide to the Semantic Web, Second Edition. Springer 2014, ISBN 978-3-662-43795-7, pp. 1-818 - [j5]Qi Han, Liyang Yu, Wenchao Zheng, Na Cheng, Xiamu Niu:
A Novel QKD Network Routing Algorithm Based on Optical-Path-Switching. J. Inf. Hiding Multim. Signal Process. 5(1): 13-19 (2014) - [j4]Liyang Yu, Qi Han, Xiamu Niu:
An improved contraction-based method for mesh skeleton extraction. Multim. Tools Appl. 73(3): 1709-1722 (2014) - [c3]Liyang Yu, Qi Han, Xiamu Niu:
Copy-Rotation-Move Forgery Detection Using the MROGH Descriptor. IC2E 2014: 510-513 - 2012
- [j3]Zhenfeng Shi, Dan Le, Liyang Yu, Xiamu Niu:
3D Mesh Segmentation Based on Markov Random Fields and Graph Cuts. IEICE Trans. Inf. Syst. 95-D(2): 703-706 (2012) - [j2]Zhenfeng Shi, Xiamu Niu, Liyang Yu:
A Multi-Scale Structural Degradation Metric for Perceptual Evaluation of 3D Mesh Simplification. IEICE Trans. Inf. Syst. 95-D(7): 1989-2001 (2012) - [j1]Zhenfeng Shi, Liyang Yu, Ahmed A. Abd El-Latif
, Xiamu Niu:
Skeleton Modulated Topological Perception Map for Rapid Viewpoint Selection. IEICE Trans. Inf. Syst. 95-D(10): 2585-2588 (2012) - 2011
- [b2]Liyang Yu:
A Developer's Guide to the Semantic Web. Springer 2011, ISBN 978-3-642-15969-5, pp. I-XIX, 1-608
2000 – 2009
- 2007
- [b1]Liyang Yu:
Introduction to the semantic web and semantic web services. CRC Press 2007, ISBN 978-1-584-88933-5, pp. 1-341 - 2006
- [c2]Liyang Yu, Rajshekhar Sunderraman, Haibin Wang:
An indexation and discovery architecture for semantic web services and its application in bioinformatics. GrC 2006: 744-749 - 2000
- [c1]Theodore Allen, Liyang Yu:
Low cost response surface methods for and from simulation optimization. Winter Simulation Conference 2000: 704-714
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2021-04-08 10:56 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint