Yaokai Feng
Yaokai Feng
Verified email at ait.kyushu-u.ac.jp
Title
Cited by
Cited by
Year
Learning for disparity estimation through feature constancy
Z Liang, Y Feng, Y Guo, H Liu, W Chen, L Qiao, L Zhou, J Zhang
Proceedings of the IEEE Conference on Computer Vision and Pattern …, 2018
139*2018
Lightweight classification of IoT malware based on image recognition
J Su, VD Vasconcellos, S Prasad, S Daniele, Y Feng, K Sakurai
2018 IEEE 42Nd annual computer software and applications conference (COMPSAC …, 2018
832018
AatA is a novel autotransporter and virulence factor of avian pathogenic Escherichia coli
G Li, Y Feng, S Kariyawasam, KA Tivendale, Y Wannemuehler, F Zhou, ...
Infection and immunity 78 (3), 898-906, 2010
392010
A keypoint-based approach toward scenery character detection
S Uchida, Y Shigeyoshi, Y Kunishige, F Yaokai
2011 International Conference on Document Analysis and Recognition, 819-823, 2011
322011
Long non-coding RNA GAS5 sensitizes renal cell carcinoma to sorafenib via miR-21/SOX5 pathway
L Liu, X Pang, W Shang, H Xie, Y Feng, G Feng
Cell Cycle 18 (3), 257-263, 2019
262019
Scenery character detection with environmental context
Y Kunishige, F Yaokai, S Uchida
2011 International Conference on Document Analysis and Recognition, 1049-1053, 2011
192011
Stereo matching using multi-level cost volume and multi-scale feature constancy
Z Liang, Y Guo, Y Feng, W Chen, L Qiao, L Zhou, J Zhang, H Liu
IEEE transactions on pattern analysis and machine intelligence, 2019
172019
Gender, risk and journalism
J Harris, N Mosdell, J Griffiths
Journalism Practice 10 (7), 902-916, 2016
172016
Engineered warp knit auxetic fabrics
SC Ugbolue, YK Kim, SB Warner, Q Fan, CL Yang, O Kyzymchuk, Y Feng, ...
J. Text. Sci. Eng 2 (1), 2012
172012
A behavior-based method for detecting distributed scan attacks in darknets
Y Feng, Y Hori, K Sakurai, J Takeuchi
Journal of information processing 21 (3), 527-538, 2013
162013
Analytical dynamic programming tracker
S Uchida, I Fujimura, H Kawano, Y Feng
Asian Conference on Computer Vision, 296-309, 2010
142010
Character image patterns as big data
S Uchida, R Ishida, A Yoshida, W Cai, Y Feng
2012 International Conference on Frontiers in Handwriting Recognition, 479-484, 2012
132012
Character image patterns as big data
S Uchida, R Ishida, A Yoshida, W Cai, Y Feng
2012 International Conference on Frontiers in Handwriting Recognition, 479-484, 2012
132012
A part-based skew estimation method
S Shiraishi, Y Feng, S Uchida
2012 10th IAPR International Workshop on Document Analysis Systems, 185-189, 2012
132012
Evolution process of the Late Silurian–Late Devonian tectonic environment in Qimantagh in the western portion of east Kunlun, China: Evidence from the geochronology and …
N Hao, W Yuan, A Zhang, Y Feng, J Cao, X Chen, X Cheng, X Mo
Journal of Earth System Science 124 (1), 171-196, 2015
122015
Comprehensive analysis of correlation coefficients estimated from pooling heterogeneous microarray data
MM Almeida-de-Macedo, N Ransom, Y Feng, J Hurst, ES Wurtele
BMC bioinformatics 14 (1), 214, 2013
122013
Thin film design for advanced thermochromic smart radiator devices
F Yu-Dong, W Zhi-Min, M Ya-Li, Z Fu-Jia
Chinese Physics 16 (6), 1704, 2007
122007
SOM-based R*-tree for similarity retrieval
K Oh, Y Feng, K Kaneko, A Makinouchi, SH Bae
Proceedings Seventh International Conference on Database Systems for …, 2001
122001
Feature selection for machine learning-based early detection of distributed cyber attacks
Y Feng, H Akiyama, L Lu, K Sakurai
2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th …, 2018
112018
Packet In message based DDoS attack detection in SDN network using OpenFlow
X You, Y Feng, K Sakurai
2017 Fifth International Symposium on Computing and Networking (CANDAR), 522-528, 2017
112017
The system can't perform the operation now. Try again later.
Articles 1–20