default search action
Shoulin Yin
Person information
- unicode name: 殷守林
- affiliation: Shenyang Normal University, Software College, Shenyang, China
- affiliation (PhD): Harbin Institute of Technology, College of Information and Communication Engineering, Harbin, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j62]Jing Yu, Lu Zhao, Shoulin Yin, Mirjana Ivanovic:
News recommendation model based on encoder graph neural network and bat optimization in online social multimedia art education. Comput. Sci. Inf. Syst. 21(3): 989-1012 (2024) - [j61]Shoulin Yin, Liguo Wang, Lin Teng:
Threshold segmentation based on information fusion for object shadow detection in remote sensing images. Comput. Sci. Inf. Syst. 21(4): 1221-1241 (2024) - [j60]Lin Teng, Yulong Qiao, Shoulin Yin:
Underwater image denoising based on curved wave filtering and two-dimensional variational mode decomposition. Comput. Sci. Inf. Syst. 21(4): 1765-1781 (2024) - [j59]Shoulin Yin, Mirjana Ivanovic:
Guest editorial: Recent advances in AI methods for image processing: Theory, algorithms, and applications. Comput. Sci. Inf. Syst. 21(4): v-viii (2024) - [j58]Muhammad Ibrar, Shoulin Yin, Hang Li, Shahid Karim, Asif Ali Laghari:
Comprehensive review of emerging cybersecurity trends and developments. Int. J. Electron. Secur. Digit. Forensics 16(5): 633-647 (2024) - [j57]Shoulin Yin, Hang Li, Asif Ali Laghari, Thippa Reddy Gadekallu, Gabriel Avelino R. Sampedro, Ahmad S. Almadhor:
An Anomaly Detection Model Based on Deep Auto-Encoder and Capsule Graph Convolution via Sparrow Search Algorithm in 6G Internet of Everything. IEEE Internet Things J. 11(18): 29402-29411 (2024) - [j56]Shoulin Yin, Hang Li, Lin Teng, Asif Ali Laghari, Vania Vieira Estrela:
Attribute-based multiparty searchable encryption model for privacy protection of text data. Multim. Tools Appl. 83(15): 45881-45902 (2024) - 2023
- [j55]Denghui Zhang, Muhammad Shafiq, Liguo Wang, Gautam Srivastava, Shoulin Yin:
Privacy-preserving remote sensing images recognition based on limited visual cryptography. CAAI Trans. Intell. Technol. 8(4): 1166-1177 (2023) - [j54]Shoulin Yin, Liguo Wang, Qunming Wang, Mirjana Ivanovic, Jinghui Yang:
M2F2-RCNN: Multi-functional faster RCNN based on multi-scale feature fusion for region search in remote sensing images. Comput. Sci. Inf. Syst. 20(4): 1289-1310 (2023) - [j53]Yu Jiang, Shoulin Yin:
Heterogenous-view occluded expression data recognition based on cycle-consistent adversarial network and K-SVD dictionary learning under intelligent cooperative robot environment. Comput. Sci. Inf. Syst. 20(4): 1869-1883 (2023) - [j52]Junjun Liu, Jun Zhang, Shoulin Yin:
Hybrid chaotic system-oriented artificial fish swarm neural network for image encryption. Evol. Intell. 16(1): 77-87 (2023) - [j51]Man Jiang, Shoulin Yin:
Facial expression recognition based on convolutional block attention module and multi-feature fusion. Int. J. Comput. Vis. Robotics 13(1): 21-37 (2023) - [j50]Dandan Liu, Xiangxian Chen, Zhonghao Guo, Jiaxi Yuan, Shoulin Yin:
Research on the online parameter identification method of train driving dynamic model. Int. J. Comput. Vis. Robotics 13(5): 497-509 (2023) - [j49]Shoulin Yin, Liguo Wang, Qunming Wang, Jinghui Yang, Man Jiang:
Remote Sensing Image Segmentation Based on a Novel Gaussian Mixture Model and SURF Algorithm. Int. J. Swarm Intell. Res. 14(2): 1-15 (2023) - [j48]Asif Ali Laghari, Sana Shahid, Rahul Yadav, Shahid Karim, Awais Khan Jumani, Hang Li, Shoulin Yin:
The state of art and review on video streaming. J. High Speed Networks 29(3): 211-236 (2023) - [j47]Asif Ali Laghari, Hang Li, Shoulin Yin, Shahid Karim, Abdullah Ayub Khan, Muhammad Ibrar:
Blockchain applications for Internet of Things (IoT): A review. Multiagent Grid Syst. 19(4): 363-379 (2023) - [j46]Muhammad Ibrar, Shahid Karim, Shoulin Yin, Hang Li, Asif Ali Laghari:
Impact of Covid-19 epidemic on online learning and educational resources in China. EAI Endorsed Trans. Pervasive Health Technol. 9(1) (2023) - [j45]Shoulin Yin, Liguo Wang, Muhammad Shafiq, Lin Teng, Asif Ali Laghari, Muhammad Faizan Khan:
G2Grad-CAMRL: An Object Detection and Interpretation Model Based on Gradient-Weighted Class Activation Mapping and Reinforcement Learning in Remote Sensing Images. IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. 16: 3583-3598 (2023) - [j44]Peng Li, Asif Ali Laghari, Mamoon Rashid, Jing Gao, Thippa Reddy Gadekallu, Abdul Rehman Javed, Shoulin Yin:
A Deep Multimodal Adversarial Cycle-Consistent Network for Smart Enterprise System. IEEE Trans. Ind. Informatics 19(1): 693-702 (2023) - [j43]Lin Teng, Yulong Qiao, Muhammad Shafiq, Gautam Srivastava, Abdul Rehman Javed, Thippa Reddy Gadekallu, Shoulin Yin:
FLPK-BiSeNet: Federated Learning Based on Priori Knowledge and Bilateral Segmentation Network for Image Edge Extraction. IEEE Trans. Netw. Serv. Manag. 20(2): 1529-1542 (2023) - 2022
- [j42]Asif Ali Laghari, Hui He, Asiya Khan, Rashid Ali Laghari, Shoulin Yin, Jiachi Wang:
Crowdsourcing platform for QoE evaluation for cloud multimedia services. Comput. Sci. Inf. Syst. 19(3): 1305-1328 (2022) - [j41]Shoulin Yin, Mirjana Ivanovic:
Guest editorial - real-time image processing with deep neural networks and optimization algorithms. Comput. Sci. Inf. Syst. 19(3): iii-vi (2022) - [j40]Qingwu Shi, Shoulin Yin, Kun Wang, Lin Teng, Hang Li:
Multichannel convolutional neural network-based fuzzy active contour model for medical image segmentation. Evol. Syst. 13(4): 535-549 (2022) - [j39]Xiaowei Wang, Shoulin Yin, Muhammad Shafiq, Asif Ali Laghari, Shahid Karim, Omar Cheikhrouhou, Wajdi Alhakami, Habib Hamam:
A New V-Net Convolutional Neural Network Based on Four-Dimensional Hyperchaotic System for Medical Image Encryption. Secur. Commun. Networks 2022: 4260804:1-4260804:14 (2022) - 2021
- [j38]Shoulin Yin, Hang Li:
GSAPSO-MQC: medical image encryption based on genetic simulated annealing particle swarm optimization and modified quantum chaos system. Evol. Intell. 14(4): 1817-1829 (2021) - [j37]Desheng Liu, Linna Shan, Lei Wang, Shoulin Yin, Hui Wang, Chaoyang Wang:
P3OI-MELSH: Privacy Protection Target Point of Interest Recommendation Algorithm Based on Multi-Exploring Locality Sensitive Hashing. Frontiers Neurorobotics 15: 660304 (2021) - [j36]Shoulin Yin, Hang Li, Asif Ali Laghari, Shahid Karim, Awais Khan Jumani:
A Bagging Strategy-Based Kernel Extreme Learning Machine for Complex Network Intrusion Detection. EAI Endorsed Trans. Scalable Inf. Syst. 8(33): e8 (2021) - 2020
- [j35]Lin Teng, Hang Li, Shoulin Yin, Yang Sun:
A Modified Advanced Encryption Standard for Data Security. Int. J. Netw. Secur. 22(1): 112-117 (2020) - [j34]Lei Meng, Shoulin Yin, Chu Zhao, Hang Li, Yang Sun:
An Improved Image Encryption Algorithm Based on Chaotic Mapping and Discrete Wavelet Transform Domain. Int. J. Netw. Secur. 22(1): 155-160 (2020) - [j33]Chu Zhao, Shoulin Yin, Hang Li, Yang Sun:
Medical Image Encryption Based on Stream Cipher Algorithm and Krill Group. Int. J. Netw. Secur. 22(2): 314-320 (2020) - [j32]Shoulin Yin, Jie Liu, Lin Teng:
Improved Elliptic Curve Cryptography with Homomorphic Encryption for Medical Image Encryption. Int. J. Netw. Secur. 22(3): 419-424 (2020) - [j31]Jing Bi, Shoulin Yin, Hang Li, Lin Teng, Chu Zhao:
Research on Medical Image Encryption Method Based on Improved Krill Herb Algorithm and Chaotic Systems. Int. J. Netw. Secur. 22(3): 484-489 (2020) - [j30]Shoulin Yin, Jie Liu, Lin Teng:
A Sequential Cipher Algorithm Based on Feedback Discrete Hopfield Neural Network and Logistic Chaotic Sequence. Int. J. Netw. Secur. 22(5): 869-873 (2020) - [j29]Xiaowei Wang, Shoulin Yin, Hang Li, Jiachi Wang, Lin Teng:
A Network Intrusion Detection Method Based on Deep Multi-scale Convolutional Neural Network. Int. J. Wirel. Inf. Networks 27(4): 503-517 (2020) - [j28]Shahid Karim, Ye Zhang, Shoulin Yin, Irfana Bibi, Ali Anwar Brohi:
A brief review and challenges of object detection in optical remote sensing imagery. Multiagent Grid Syst. 16(3): 227-243 (2020) - [j27]Shoulin Yin, Hang Li, Desheng Liu, Shahid Karim:
Active contour modal based on density-oriented BIRCH clustering method for medical image segmentation. Multim. Tools Appl. 79(41-42): 31049-31068 (2020) - [j26]Shoulin Yin, Hang Li:
Hot Region Selection Based on Selective Search and Modified Fuzzy C-Means in Remote Sensing Images. IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. 13: 5862-5871 (2020)
2010 – 2019
- 2019
- [j25]Yang Sun, Shoulin Yin, Hang Li, Lin Teng, Shahid Karim:
GPOGC: Gaussian Pigeon-Oriented Graph Clustering Algorithm for Social Networks Cluster. IEEE Access 7: 99254-99262 (2019) - [j24]Yang Sun, Lin Teng, Shoulin Yin, Hang Li:
A new wolf colony search algorithm based on search strategy for solving travelling salesman problem. Int. J. Comput. Sci. Eng. 18(1): 1-11 (2019) - [j23]Jing Yu, Hang Li, Shoulin Yin:
New intelligent interface study based on K-means gaze tracking. Int. J. Comput. Sci. Eng. 18(1): 12-20 (2019) - [j22]Shoulin Yin, Ye Zhang, Shahid Karim:
Region search based on hybrid convolutional neural network in optical remote sensing images. Int. J. Distributed Sens. Networks 15(5) (2019) - [j21]Shoulin Yin, Hang Li, Lin Teng:
A Novel Proxy Re-encryption Scheme Based on Identity Property and Stateless Broadcast Encryption Under Cloud Environment. Int. J. Netw. Secur. 21(5): 797-803 (2019) - [j20]Shoulin Yin, Hang Li, Lin Teng:
A New Chi-square Distribution De-noising Method for Image Encryption. Int. J. Netw. Secur. 21(5): 804-811 (2019) - [j19]Yang Sun, Shoulin Yin, Jie Liu, Lin Teng:
A Certificateless Group Authenticated Key Agreement Protocol Based on Dynamic Binary Tree. Int. J. Netw. Secur. 21(5): 843-849 (2019) - [j18]Yang Sun, Shoulin Yin, Hang Li:
A New Wavelet Threshold Function Based on Gaussian Kernel Function for Image De-noising. J. Inf. Hiding Multim. Signal Process. 10(1): 91-101 (2019) - [j17]Shahid Karim, Ye Zhang, Shoulin Yin, Asif Ali Laghari, Ali Anwar Brohi:
Impact of compressed and down-scaled training images on vehicle detection in remote sensing imagery. Multim. Tools Appl. 78(22): 32565-32583 (2019) - [c6]Jiachi Wang, Hang Li, Shoulin Yin, Yang Sun:
Research on Improved Pedestrian Detection Algorithm Based on Convolutional Neural Network. iThings/GreenCom/CPSCom/SmartData 2019: 254-258 - 2018
- [j16]Shoulin Yin, Ye Zhang, Shahid Karim:
Large Scale Remote Sensing Image Segmentation Based on Fuzzy Region Competition and Gaussian Mixture Model. IEEE Access 6: 26069-26080 (2018) - [j15]Lin Teng, Hang Li, Shoulin Yin:
Modified pyramid dual tree direction filter-based image denoising via curvature scale and nonlocal mean multigrade remnant filter. Int. J. Commun. Syst. 31(16) (2018) - [j14]Lina Zou, Xueying Wang, Shoulin Yin:
A Data Sorting and Searching Scheme Based on Distributed Asymmetric Searchable Encryption. Int. J. Netw. Secur. 20(3): 502-508 (2018) - [j13]Lin Teng, Hang Li, Jie Liu, Shoulin Yin:
An Efficient and Secure Cipher-Text Retrieval Scheme Based on Mixed Homomorphic Encryption and Multi-Attribute Sorting Method. Int. J. Netw. Secur. 20(5): 872-878 (2018) - [j12]Yang Sun, Shoulin Yin, Lin Teng, Jie Liu:
Study on Wavelet Transform Adjustment Method with Enhancement of Color Image. J. Inf. Hiding Multim. Signal Process. 9(3): 606-614 (2018) - [j11]Shoulin Yin, Jie Liu, Lin Teng:
A New Krill Herd Algorithm Based on SVM Method for Road Feature Extraction. J. Inf. Hiding Multim. Signal Process. 9(4): 997-1005 (2018) - [j10]Yue Zhao, Hang Li, Shoulin Yin, Yang Sun:
A New Chinese Word Segmentation Method Based on Maximum Matching. J. Inf. Hiding Multim. Signal Process. 9(6): 1528-1535 (2018) - [c5]Shahid Karim, Ye Zhang, Shoulin Yin, Muhammad Rizwan Asif:
An Efficient Region Proposal Method for Optical Remote Sensing Imagery. IGARSS 2018: 2455-2458 - [c4]Jing Bi, Shoulin Yin:
A New Graph Semi-Supervised Learning Method for Medical Image Automatic Annotation. iThings/GreenCom/CPSCom/SmartData 2018: 43-46 - [c3]Shoulin Yin, Jing Bi:
Medical Image Annotation Based on Deep Transfer Learning. iThings/GreenCom/CPSCom/SmartData 2018: 47-49 - 2017
- [j9]Caihui Lan, Haifeng Li, Shoulin Yin, Lin Teng:
A New Security Cloud Storage Data Encryption Scheme Based on Identity Proxy Re-encryption. Int. J. Netw. Secur. 19(5): 804-810 (2017) - [j8]Jie Liu, Shoulin Yin, Hang Li, Lin Teng:
A Density-based Clustering Method for K-anonymity Privacy Protection. J. Inf. Hiding Multim. Signal Process. 8(1): 12-18 (2017) - [j7]Hang Li, Shoulin Yin, Chu Zhao, Lin Teng:
A Proxy Re-Encryption Scheme Based on Elliptic Curve Group. J. Inf. Hiding Multim. Signal Process. 8(1): 218-227 (2017) - [j6]Haiyun Li, Haifeng Li, Kaibin Wei, Shoulin Yin, Chu Zhao:
A Multi-keyword Search Algorithm Based on Polynomial Function and Safety Inner-product Method in Secure Cloud Environment. J. Inf. Hiding Multim. Signal Process. 8(2): 413-422 (2017) - [j5]Haiyun Ma, Zhonglin Zhang, Haifeng Li, Shoulin Yin, Chu Zhao:
A Provable Private Data Aggregation Scheme Based on Digital Signatures and Homomorphic Encryption for Wireless Sensor Networks. J. Inf. Hiding Multim. Signal Process. 8(3): 536-543 (2017) - [j4]Wencui Chang, Haifeng Li, Shoulin Yin:
Mixed Symmetric Key and Elliptic Curve Encryption Scheme Used for Password Authentication and Update Under Unstable Network Environment. J. Inf. Hiding Multim. Signal Process. 8(3): 632-639 (2017) - [j3]Tianhua Liu, Shoulin Yin:
An improved particle swarm optimization algorithm used for BP neural network and multimedia course-ware evaluation. Multim. Tools Appl. 76(9): 11961-11974 (2017) - [c2]Yang Sun, Lin Teng, Shoulin Yin, Jie Liu, Hang Li:
Study a Join Query Strategy Over Data Stream Based on Sliding Windows. DMBD 2017: 334-342 - [c1]Jie Liu, Lin Teng, Shoulin Yin:
An Improved Discrete Firefly Algorithm Used for Traveling Salesman Problem. ICSI (1) 2017: 593-600 - 2016
- [j2]Shoulin Yin, Jie Liu:
A K-means Approach for Map-Reduce Model and Social Network Privacy Protection. J. Inf. Hiding Multim. Signal Process. 7(6): 1215-1221 (2016) - [j1]Shoulin Yin, Hang Li, Jie Liu:
A New Provable Secure Certificateless Aggregate Signcryption Scheme. J. Inf. Hiding Multim. Signal Process. 7(6): 1274-1281 (2016)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 20:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint