default search action
Meng Yi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j23]Bing Li, Peng Yang, Yuankang Sun, Zhongjian Hu, Meng Yi:
Multi-view pre-trained transformer via hierarchical capsule network for answer sentence selection. Appl. Intell. 54(21): 10561-10580 (2024) - [j22]Bing Li, Peng Yang, Yuankang Sun, Zhongjian Hu, Meng Yi:
Advances and challenges in artificial intelligence text generation. Frontiers Inf. Technol. Electron. Eng. 25(1): 64-83 (2024) - [j21]Peng Yang, Siming Jiang, Meng Yi, Bing Li, Yuankang Sun, Ruochen Ma:
An optimized environment-adaptive computation offloading strategy for real-time cross-camera task in edge computing networks. Multim. Tools Appl. 83(6): 17251-17279 (2024) - [j20]Meng Yi, Renqian Zhang:
Modeling and Solving the Joint Replenishment Problem with Cross-Selling Effects Considering One Shared Minor Item. Syst. 12(1): 6 (2024) - [j19]Peng Yang, Ruochen Ma, Meng Yi, Yifan Zhang, Bing Li, Zijian Bai:
A computation offloading strategy for multi-access edge computing based on DQUIC protocol. J. Supercomput. 80(12): 18285-18318 (2024) - [c10]Bingqing Ren, Peng Yang, Meng Yi, Dongmei Yang:
A Parallel and Distributed Data Management Approach for MEC Using the Improved Parameterized Deep Q-Network. APWeb/WAIM (5) 2024: 195-209 - 2023
- [j18]Miaojiang Chen, Meng Yi, Mingfeng Huang, Guosheng Huang, Yingying Ren, Anfeng Liu:
A novel deep policy gradient action quantization for trusted collaborative computation in intelligent vehicle networks. Expert Syst. Appl. 221: 119743 (2023) - [j17]Peng Yang, Penghui Zhang, Bing Li, Shunhang Ji, Meng Yi:
Aspect-Based Sentiment Analysis Using Adversarial BERT with Capsule Networks. Neural Process. Lett. 55(6): 8041-8058 (2023) - [j16]Jiaze Sun, Meng Yi:
Detecting adversarial examples using image reconstruction differences. Soft Comput. 27(12): 7863-7877 (2023) - [j15]Meng Yi, Peng Yang, Miaojiang Chen, Loc Nguyen The:
A DRL-Driven Intelligent Joint Optimization Strategy for Computation Offloading and Resource Allocation in Ubiquitous Edge IoT Systems. IEEE Trans. Emerg. Top. Comput. Intell. 7(1): 39-54 (2023) - [j14]Bing Li, Peng Yang, Zhongjian Hu, Yuankang Sun, Meng Yi:
Graph-enhanced multi-answer summarization under question-driven guidance. J. Supercomput. 79(18): 20417-20444 (2023) - [c9]Cheng Fang, Peng Yang, Meng Yi, Miao Du, Bing Li:
Resource Cooperative Scheduling Optimization Considering Security in Edge Mobile Networks. CollaborateCom (1) 2023: 54-74 - 2022
- [j13]Miaojiang Chen, Wei Liu, Ning Zhang, Junling Li, Yingying Ren, Meng Yi, Anfeng Liu:
GPDS: A multi-agent deep reinforcement learning game for anti-jamming secure computing in MEC network. Expert Syst. Appl. 210: 118394 (2022) - [j12]Meng Yi, Peng Yang, Miao Du, Ruochen Ma:
DMADRL: A Distributed Multi-agent Deep Reinforcement Learning Algorithm for Cognitive Offloading in Dynamic MEC Networks. Neural Process. Lett. 54(5): 4341-4373 (2022) - 2020
- [j11]Jiarong Liang, Meng Yi, Weiguang Zhang, Yanyan Li, Xinyu Liang, Bin Qin:
On Constructing Strongly Connected Dominating and Absorbing Set in 3-Dimensional Wireless Ad Hoc Networks. Complex. 2020: 9189645:1-9189645:12 (2020) - [j10]Jiarong Liang, Meng Yi, Yanyan Li, Xinyu Liang:
The Construction of a Virtual Backbone with a Bounded Diameter in a Wireless Network. Wirel. Commun. Mob. Comput. 2020: 5602325:1-5602325:14 (2020)
2010 – 2019
- 2018
- [j9]Meng Yi, Qingkui Chen, Gang Zhang:
Multistage Dynamic Packet Access Mechanism of Internet of Things. Mob. Inf. Syst. 2018: 3601604:1-3601604:16 (2018) - [j8]Dong Wang, Meng Yi, Fan Yang, Erik Blasch, Carolyn Sheaff, Genshe Chen, Haibin Ling:
Online single target tracking in WAMI: benchmark and evaluation. Multim. Tools Appl. 77(9): 10939-10960 (2018) - 2016
- [j7]Meng Yi, Yan Chu:
基于仿射不变约束与快速EKF滤波的航拍图像稳像 (Aerial Video Image Stabilization Based on Affine Invariant Constraint and Fast EKF Adaptive Filter). 计算机科学 43(8): 313-317 (2016) - [j6]Meng Yi, Qingkui Chen, Neal N. Xiong:
An Effective Massive Sensor Network Data Access Scheme Based on Topology Control for the Internet of Things. Sensors 16(11): 1846 (2016) - [c8]Meng Yi, Li-chun Sui:
Piecewise Planar Region Matching for High-Resolution Aerial Video Tracking. ECC 2016: 77-83 - 2015
- [j5]Meng Yi, Qingkui Chen, Gang Zhang, Haiyan Zhao:
DPA: 一种动态环境下QoS单播路由算法 (DPA: A QoS Unicast Routing Algorithm in Dynamic Environment). 计算机科学 42(1): 126-128 (2015) - 2014
- [j4]Yu Zhou, Yinfei Yang, Meng Yi, Xiang Bai, Wenyu Liu, Longin Jan Latecki:
Online Multiple targets Detection and Tracking from Mobile robot in Cluttered indoor Environments with Depth Camera. Int. J. Pattern Recognit. Artif. Intell. 28(1) (2014) - [j3]Xu Zhang, Baolong Guo, Yunyi Yan, Wei Sun, Meng Yi:
Image Retrieval Method Based on IPDSH and SRIP. KSII Trans. Internet Inf. Syst. 8(5): 1676-1689 (2014) - [j2]Meng Yi, Bao-Long Guo, Chunman Yan:
Improved Image Alignment Algorithm Based on Projective Invariant for Aerial Video Stabilization. KSII Trans. Internet Inf. Syst. 8(9): 3177-3195 (2014) - [j1]Meng Yi, Bao-Long Guo, Chunman Yan:
Global Image Registration Based on Invariant Representation of Polar Complex Exponential Transform. J. Inf. Sci. Eng. 30(3): 853-873 (2014) - [c7]Meng Yi, Yan Chu, Yunyi Yan:
Precision Mosaicking of Multi-images Based on Conic-Epipolar Constraint. ECC (2) 2014: 555-563 - [c6]Liang Du, Meng Yi, Erik Blasch, Haibin Ling:
GARP-face: Balancing privacy protection and utility preservation in face de-identification. IJCB 2014: 1-8 - 2012
- [c5]Tianyang Ma, Meng Yi, Longin Jan Latecki:
View-Invariant Object Detection by Matching 3D Contours. ACCV Workshops (2) 2012: 183-196 - [c4]Meng Yi, Yinfei Yang, Wenjing Qi, Yu Zhou, Yunfeng Li, Zygmunt Pizlo, Longin Jan Latecki:
Navigation toward Non-static Target Object Using Footprint Detection Based Tracking. ACCV (3) 2012: 389-400 - 2011
- [c3]Meng Yi, Bao-Long Guo, Chunman Yan:
Aerial Video Images Registration Based on Optimal Derivative Filters with Scene-Adaptive Corners. ICIG 2011: 993-997 - 2010
- [c2]Bin B. Zhu, Jeff Yan, Qiujie Li, Chao Yang, Jia Liu, Ning Xu, Meng Yi, Kaiwei Cai:
Attacks and design of image recognition CAPTCHAs. CCS 2010: 187-200 - [c1]Chunman Yan, Baolong Guo, Meng Yi:
Optimization for the directional filter bank of the nonsubsampled contourlet transform. ICNC 2010: 4135-4138
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:34 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint