default search action
Feng Yi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j20]Pingping Lv, Chi Zhang, Feng Yi, Ting Yuan, Shupei Li, Meitong Zhang:
A Novel FSVM with PSO for gait phase detection based on elastic pressure sensing insole system. Int. J. Intell. Robotics Appl. 8(3): 596-608 (2024) - [j19]Feng Yi, Lei Su, Huaiwen He, Tao Xiao:
Mining human periodic behaviors via tensor factorization and entropy. PeerJ Comput. Sci. 10: e1851 (2024) - [j18]Shulong Zhao, Jiayi Zheng, Feng Yi, Xiangke Wang, Zongyu Zuo:
Exponential Predefined Time Trajectory Tracking Control for Fixed-Wing UAV With Input Saturation. IEEE Trans. Aerosp. Electron. Syst. 60(5): 6406-6419 (2024) - [j17]Shulong Zhao, Feng Yi, Qipeng Wang, Jiayi Zheng, Xiangke Wang:
Cooperative Tracking of Fixed-Wing UAVs With Arbitrary Convergence Time: Theory and Experiment. IEEE Trans. Ind. Informatics 20(8): 9918-9927 (2024) - [j16]Qipeng Wang, Xiangke Wang, Jiayi Zheng, Hao Chen, Feng Yi, Shulong Zhao, Lincheng Shen:
Fixed-Time Consensus Based on a Fractional Adaptive Gain for Multi-Agent Systems. IEEE Trans. Intell. Veh. 9(1): 2479-2488 (2024) - 2023
- [j15]Jian Yang, Jingyang Zhou, Hanbin Zhou, Feng Yi, Dongran Song, Mi Dong:
High-Precision Harmonic Current Extraction for PMSM Based on Multiple Reference Frames Considering Speed Harmonics. IEEE Trans. Ind. Electron. 70(10): 9764-9776 (2023) - [c18]Enwei Shen, Yingjiao Deng, Kouhong Xiong, Dang Ke, Yuliang Zhao, Feng Yi:
ResNet50-based classification of footwear in nuclear power plants surveillance images. CISP-BMEI 2023: 1-5 - [c17]Qipeng Wang, Lincheng Shen, Feng Yi, Shulong Zhao, Xiangke Wang:
Predefined-Time Tracking Control of Fixed-wing Unmanned Aerial Vehicles subject to external disturbance and unmodeled dynamics. CoDIT 2023: 1256-1260 - 2020
- [j14]Feng Yi, Bo Jiang, Jianjun Wu:
Topic Modeling for Short Texts via Word Embedding and Document Correlation. IEEE Access 8: 30692-30705 (2020) - [j13]Feng Yi, Bo Jiang, Lu Wang, Jianjun Wu:
Cybersecurity Named Entity Recognition Using Multi-Modal Ensemble Learning. IEEE Access 8: 63214-63224 (2020) - [j12]Feng Yi, Bo Jiang, Jianjun Wu:
Heterogeneous Information Network Embedding for Mention Recommendation. IEEE Access 8: 91394-91404 (2020) - [j11]Guoliang Hu, Feng Yi, Wang Tong, Lifan Yu:
Development and Evaluation of a MR Damper With Enhanced Effective Gap Lengths. IEEE Access 8: 156347-156361 (2020) - [c16]Feng Yi, Yuting Ji, Zeli Lao, Jiaheng Wang:
An Enhanced Discontinuous Reception Mechanism for Power Saving in 5G. VTC Fall 2020: 1-5
2010 – 2019
- 2019
- [c15]Bo Jiang, Zhigang Lu, Ning Li, Jianjun Wu, Feng Yi, Dongxu Han:
Retweeting Prediction Using Matrix Factorization with Binomial Distribution and Contextual Information. DASFAA (2) 2019: 121-138 - [c14]Bo Jiang, Feng Yi, Jianjun Wu, Zhigang Lu:
Retweet Prediction Using Context-Aware Coupled Matrix-Tensor Factorization. KSEM (1) 2019: 185-196 - 2018
- [j10]Hongtao Wang, Hongmei Wang, Feng Yi, Hui Wen, Gang Li, Limin Sun:
Context-aware personalized path inference from large-scale GPS snippets. Expert Syst. Appl. 91: 78-88 (2018) - [j9]Feng Yi, Guan Feng, Hongtao Wang, Zhi Li, Limin Sun:
MIAC: A mobility intention auto-completion model for location prediction. Intell. Syst. Account. Finance Manag. 25(4): 161-173 (2018) - [c13]Feng Yi, Zaichen Zhang, Xiaohu You, Chuan Zhang:
Efficient Circulant Matrix Construction and Implementation for Compressed Sensing. ICASSP 2018: 1174-1178 - [c12]Feng Yi, Huang Yi Cai, Fu Zheng Xin:
A Logic-Based Attack Graph for Analyzing Network Security Risk Against Potential Attack. NAS 2018: 1-4 - [c11]Feng Yi, Libo Yin, Hui Wen, Hongsong Zhu, Limin Sun, Gang Li:
Mining Human Periodic Behaviors Using Mobility Intention and Relative Entropy. PAKDD (1) 2018: 488-499 - 2017
- [j8]Hongtao Wang, Hui Wen, Feng Yi, Hongsong Zhu, Limin Sun:
Road Traffic Anomaly Detection via Collaborative Path Inference from GPS Snippets. Sensors 17(3): 550 (2017) - [j7]Feng Yi, Hong Li, Hongtao Wang, Limin Sun:
Why You Go Reveals Who You Know: Disclosing Social Relationship by Cooccurrence. Wirel. Commun. Mob. Comput. 2017 (2017) - [c10]Feng Yi, Yu Gu, Hongtao Wang, Yuyan Sun, Limin Sun:
Mobility Pattern Based Relationship Inference from Spatiotemporal Data. GLOBECOM 2017: 1-6 - [c9]Feng Yi, Jin Ping:
Influences of PWM modulation modes on energy feedback commutation for BLDCM driven flywheel energy storage system. IECON 2017: 2767-2771 - [c8]Feng Yi, Zhi Li, Hongtao Wang, Weimin Zheng, Limin Sun:
MIAC: A Mobility Intention Auto-Completion Model for Location Prediction. KSEM 2017: 432-444 - [c7]Feng Yi, Hong Li, Hongtao Wang, Hui Wen, Limin Sun:
Mobility Intention-Based Relationship Inference from Spatiotemporal Data. WASA 2017: 871-876 - 2016
- [j6]Hongtao Wang, Qiang Li, Feng Yi, Zhi Li, Limin Sun:
Influential spatial facility prediction over large scale cyber-physical vehicles in smart city. EURASIP J. Wirel. Commun. Netw. 2016: 103 (2016) - [c6]Hongtao Wang, Hui Wen, Feng Yi, Zhi Li, Limin Sun:
Tensor Filter: Collaborative Path Inference from GPS Snippets of Vehicles. WASA 2016: 103-115 - 2015
- [c5]Hongtao Wang, Qiang Li, Feng Yi, Qi Han, Limin Sun:
Influential Spatial Facility Prediction over Dynamic Objects. WASA 2015: 528-538 - 2014
- [c4]Daoshun Wang, Feng Yi, Ching-Nung Yang:
Visual Cryptography Scheme with Autostereogram. IWDW 2014: 364-375 - 2013
- [j5]Feng Yi, Hui Zou:
SURE-tuned tapering estimation of large covariance matrices. Comput. Stat. Data Anal. 58: 339-351 (2013) - 2011
- [j4]Daoshun Wang, Feng Yi, Xiaobo Li:
Probabilistic visual secret sharing schemes for grey-scale images and color images. Inf. Sci. 181(11): 2189-2208 (2011) - 2010
- [j3]Daoshun Wang, Feng Yi:
On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme. EURASIP J. Adv. Signal Process. 2010 (2010)
2000 – 2009
- 2009
- [j2]Daoshun Wang, Feng Yi, Xiaobo Li:
On general construction for extended visual cryptography schemes. Pattern Recognit. 42(11): 3071-3082 (2009) - 2008
- [c3]Feng Yi, Xiaobo Wu:
A novel coefficient automatic calculation method for sinc filter in sigma-delta ADCs. APCCAS 2008: 1240-1243 - 2007
- [c2]Daoshun Wang, Xiaobo Li, Feng Yi:
Probabilistic (n, n) Visual Secret Sharing Scheme for Grayscale Images. Inscrypt 2007: 192-200 - [c1]Feng Yi, Daoshun Wang, Xiaobo Li, Yiqi Dai:
Colored Probabilistic Visual Cryptography Scheme with Reversing. Security and Management 2007: 138-141 - [i3]Daoshun Wang, Feng Yi, Xiaobo Li:
Probabilistic Visual Secret Sharing Schemes for Gray-scale images and Color images. CoRR abs/0712.4183 (2007) - 2006
- [j1]Feng Yi, Qichao Sun, Jie Dong, Lu Yu:
Low-Complexity Tools in AVS Part 7. J. Comput. Sci. Technol. 21(3): 345-353 (2006) - [i2]Daoshun Wang, Feng Yi, Xiaobo Li, Ping Luo, Yiqi Dai:
On the Analysis and Generalization of Extended Visual Cryptography Schemes. CoRR abs/cs/0610172 (2006) - [i1]Feng Yi, Daoshun Wang, Yiqi Dai:
Visual secret sharing scheme with autostereogram. IACR Cryptol. ePrint Arch. 2006: 295 (2006)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint