


Остановите войну!
for scientists:
Yi Yin
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j21]Yi Yin
, Lin Ouyang, Zhixiang Wu, Shuifang Yin:
A classification method based on encoder-decoder structure with paper content. Concurr. Comput. Pract. Exp. 34(9) (2022) - [j20]Qiyuan Song, Shouliang Qi, Chaoyang Jin, Lei Yang, Wei Qian, Yi Yin, Houyu Zhao, Hui Yu:
Functional Brain Connections Identify Sensorineural Hearing Loss and Predict the Outcome of Cochlear Implantation. Frontiers Comput. Neurosci. 16: 825160 (2022) - 2021
- [j19]Yi Yin, Dan Feng, Zhan Shi, Lin Ouyang:
Text recommendation based on time series and multi-label information. Comput. Sci. Inf. Syst. 18(2): 419-439 (2021) - [j18]John M. Roberts Jr.
, Yi Yin, Emily Dorshorst, Matthew A. Peeples
, Barbara J. Mills:
Assessing the performance of the bootstrap in simulated assemblage networks. Soc. Networks 65: 98-109 (2021) - [c22]Zhigang Li, Yi Yin, Dongliang Zhang:
Application of Augmented Reality in the Medicine Packaging Box. ICISCAE (ACM) 2021: 2923-2927 - [c21]Yi Yin, Vitalijs Jefimovs, Tim Mitchell, Andrew Kennedy, Darren Williams, Yingtao Tian:
Numerical Modelling of Electron Beam Welding of Pure Niobium with Beam Oscillation: Towards Industry 4.0. ICAC 2021: 1-6 - 2020
- [j17]Zhongyun Liu, Shan Li, Yi Yin, Yulin Zhang
:
Fast solvers for tridiagonal Toeplitz linear systems. Comput. Appl. Math. 39(4) (2020)
2010 – 2019
- 2019
- [j16]Chang Dai
, Jiandong Wu
, Guiyue Zhou
, Linxin Miao
, Yi Yin
:
Space Charge Behavior in Ethylene Propylene Rubber Under a 50-Hz AC Electric Field. IEEE Access 7: 171995-172003 (2019) - [j15]Zhao Yang, Yang Zhao, Xiao Hu, Yi Yin, Lihua Zhou, Dapeng Tao
:
A flexible vehicle surround view camera system by central-around coordinate mapping model. Multim. Tools Appl. 78(9): 11983-12006 (2019) - [j14]Yi Yin, Zhijian Liu, Jie Zheng, Liang Chen, Sen Wu, Saijie Wang, Zhijun Yan, Xinxiang Pan
:
The Effects of Position on the Wear Debris Detection with Planar Inductor. Sensors 19(22): 4961 (2019) - [c20]Komal Saifullah Khan
, Yi Yin, Abbas Jamalipour:
On the Application of Agglomerative Hierarchical Clustering for Cache-Assisted D2D Networks. CCNC 2019: 1-6 - [c19]Yi Yin, Yuichiro Tateiwa, Yun Wang, Guoqiang Zhang, Yoshiaki Katayama, Naohisa Takahashi, Chao Zhang:
An Analysis Method for IPv6 Firewall Policy. HPCC/SmartCity/DSS 2019: 1757-1762 - [c18]Yi Yin
, Stéphanie Prigent, Joan Torrent
, Human Rezaei, Dirk Drasdo, Marie Doumic
:
Automated Quantification of Amyloid Fibrils Morphological Features by Image Processing Techniques. ISBI 2019: 534-537 - [c17]Xue Zhang, Yi Yin, Wei Liu, Zhizhen Peng, Guoqiang Zhang, Yun Wang, Yuichiro Tateiwa, Naohisa Takahashi:
A Conflict Detection Method for IPv6 Time-Based Firewall Policy. ISPA/BDCloud/SocialCom/SustainCom 2019: 435-442 - [c16]Zhongbo Yin, Shuai Wu, Yi Yin, Wei Luo, Zhunchen Luo, Yushani Tan, Xiangyu Jiao, Dong Wang:
Relation Classification in Scientific Papers Based on Convolutional Neural Network. NLPCC (2) 2019: 242-253 - 2018
- [j13]Yu Zhang
, Deyuan Liu, Jiandong Wu, Yi Yin:
A Modified Algorithm for the Simulation of Charge Behavior in Water Tree Aged Cross-Linked Polyethylene Cable. IEEE Access 6: 23929-23938 (2018) - [j12]Yi Yin, Dan Feng, Yue Li, Shuifang Yin, Zhan Shi:
Text prediction method based on multi-label attributes and improved maximum entropy model. J. Intell. Fuzzy Syst. 34(2): 1097-1109 (2018) - [j11]Yi Yin
, Oliver Sedlaczek, Benedikt Müller, Arne Warth, Margarita Gonzalez-Vallinas
, Bernd Lahrmann, Niels Grabe, Hans-Ulrich Kauczor, Kai Breuhahn
, Irene E. Vignon-Clementel, Dirk Drasdo:
Tumor Cell Load and Heterogeneity Estimation From Diffusion-Weighted MRI Calibrated With Histological Data: an Example From Lung Cancer. IEEE Trans. Medical Imaging 37(1): 35-46 (2018) - [c15]Yi Yin, Anneke Zuiderwijk
, Jacco van Ossenbruggen, Keith G. Jeffery
, Ahmad Luthfi
, Marijn Janssen:
How to improve policy making using open data in virtual research environments: an interactive workshop discussing privacy, security and trust strategies. DG.O 2018: 131:1-131:2 - [c14]Yi Yin, Anneke Zuiderwijk, Marijn Janssen, Xander de Ronde, Keith G. Jeffery:
Multidisciplinary Collaboration Through Online Virtual Research Environments (VREs): What Do VRE Users Need? IWSG 2018 - 2017
- [j10]Yani Wang
, Feng Guo, Jiandong Wu, Yi Yin:
Effect of DC Prestressing on Periodic Grounded DC Tree in Cross-Linked Polyethylene at Different Temperatures. IEEE Access 5: 25876-25884 (2017) - [c13]Yi Yin, Yuichiro Tateiwa, Yun Wang, Yoshiaki Katayama, Naohisa Takahashi:
An Inconsistency Detection Method for Security Policy and Firewall Policy Based on CSP Solver. ICCCS (2) 2017: 147-161 - [c12]Yi Yin, Yuichiro Tateiwa, Yun Wang, Yoshiaki Katayama, Naohisa Takahashi:
Inconsistency Analysis of Time-Based Security Policy and Firewall Policy. ICFEM 2017: 447-463 - [i1]Yi Yin, Anneke Zuiderwijk:
Scientists. Fundamental Requirements to Deal with their Research Data in the Big Data Era. ERCIM News 2017(109) (2017) - 2016
- [j9]Yi Yin, Pengjian Shang, Guochen Feng
:
Modified multiscale cross-sample entropy for complex time series. Appl. Math. Comput. 289: 98-110 (2016) - [j8]Yi Yin, Pengjian Shang:
Forecasting traffic time series with multivariate predicting method. Appl. Math. Comput. 291: 266-278 (2016) - [c11]Anneke Zuiderwijk, Keith G. Jeffery
, Daniele Bailo
, Yi Yin:
Using Open Research Data for Public Policy Making: Opportunities of Virtual Research Environments. CeDEM 2016: 180-187 - 2015
- [j7]Yi Yin, Pengjian Shang, Jianan Xia
:
Compositional segmentation of time series in the financial markets. Appl. Math. Comput. 268: 399-412 (2015) - 2014
- [c10]Yi Yin, Yun Wang, Naohisa Takahashi:
Set-Based Calculation of Topological Relations between Snort Rules. CANDAR 2014: 617-619 - 2013
- [j6]Yi Yin
, Mouloud Adel, Salah Bourennane
:
Automatic Segmentation and Measurement of Vasculature in Retinal Fundus Images Using Probabilistic Formulation. Comput. Math. Methods Medicine 2013: 260410:1-260410:16 (2013) - 2012
- [j5]Yi Yin
, Mouloud Adel, Salah Bourennane:
Retinal vessel segmentation using a probabilistic tracking method. Pattern Recognit. 45(4): 1235-1244 (2012) - [c9]Yi Yin
, Mouloud Adel, Salah Bourennane:
An automatic tracking method for retinal vascular tree extraction. ICASSP 2012: 709-712 - 2011
- [j4]Subana Thanasegaran, Yi Yin, Yuichiro Tateiwa, Yoshiaki Katayama, Naohisa Takahashi:
A Topology-Based Conflict Detection System for Firewall Policies using Bit-Vector-Based Spatial Calculus. Int. J. Commun. Netw. Syst. Sci. 4(11): 683-695 (2011) - 2010
- [c8]Yi Yin, Mouloud Adel, Mireille Guillaume, Salah Bourennane:
Bayesian tracking for blood vessel detection in retinal images. EUSIPCO 2010: 1009-1013 - [c7]Yi Yin, Xiaodong Xu, Yoshiaki Katayama, Naohisa Takahashi:
Inconsistency Detection System for Security Policy and Firewall Policy. ICNC 2010: 294-297 - [c6]Yi Yin
, Mouloud Adel, Mireille Guillaume, Salah Bourennane:
A probabilistic based method for tracking vessels in retinal images. ICIP 2010: 4081-4084
2000 – 2009
- 2009
- [j3]Yi Yin, Weidong Wu:
A Real-Time Measurement Algorithm for Available Bandwidth. Int. J. Commun. Netw. Syst. Sci. 2(8): 746-753 (2009) - [c5]Subana Thanasegaran, Yi Yin, Yuichiro Tateiwa, Yoshiaki Katayama, Naohisa Takahashi:
A topological approach to detect conflicts in firewall policies. IPDPS 2009: 1-7 - 2008
- [j2]Yi Yin, Kazuaki Hida, Yoshiaki Katayama, Naohisa Takahashi:
Implementation of Filter Reverse Search System based on Spatial Relationships of Filters. J. Convergence Inf. Technol. 3(2): 6-12 (2008) - [j1]Yi Yin, Yoshiaki Katayama, Naohisa Takahashi:
Detection of Conflicts Caused by a Combination of Filters Based on Spatial Relationships. J. Inf. Process. 16: 142-156 (2008) - 2007
- [c4]W. M. Huang, J. P. John, S. Braithwaite, J. Kirchgessner, I. S. Lim, D. Morgan, Y. B. Park, S. Shams, I. To, P. Welch, Ralf Reuter, Hao Li
, A. Ghazinour, Peter Wennekers, Yi Yin:
SiGe 77GHz Automotive Radar Technology. ISCAS 2007: 1967-1970 - 2005
- [c3]Yi Yin, Raghuvel S. Bhuvaneswaran, Yoshiaki Katayama, Naoshi Takahashi:
Implementation of Packet Filter Configurations Anomaly Detection System with SIERRA. ICICS 2005: 467-480 - [c2]Yi Yin, Heinrich Klar, Peter Wennekers:
A cascade 3-1-1 multibit ΣΔ A/D modulator with reduced sensitivity to non-idealities. ISCAS (4) 2005: 3087-3090 - 2004
- [c1]Yi Yin, Heinrich Klar, Peter Wennekers:
A novel broadband cascade sigma-delta analog-to-digital converter. Circuits, Signals, and Systems 2004: 471-476
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2022-05-16 23:58 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint