Login / Signup
Kun Yin
ORCID
Publication Activity (10 Years)
Years Active: 2014-2024
Publications (10 Years): 9
Top Topics
Anomaly Detection
Document Understanding
Automatic Text Summarization
Network Security
Top Venues
IEEE Access
CoRR
LREC/COLING
ICCT
</>
Publications
</>
Bocheng Li
,
Zhujin Gao
,
Yongxin Zhu
,
Kun Yin
,
Haoyu Cao
,
Deqiang Jiang
,
Linli Xu
Few-shot Temporal Pruning Accelerates Diffusion Models for Text Generation.
LREC/COLING
(2024)
Chaohu Liu
,
Kun Yin
,
Haoyu Cao
,
Xinghua Jiang
,
Xin Li
,
Yinsong Liu
,
Deqiang Jiang
,
Xing Sun
,
Linli Xu
HRVDA: High-Resolution Visual Document Assistant.
CoRR
(2024)
Haoyu Cao
,
Changcun Bao
,
Chaohu Liu
,
Huang Chen
,
Kun Yin
,
Hao Liu
,
Yinsong Liu
,
Deqiang Jiang
,
Xing Sun
Attention Where It Matters: Rethinking Visual Document Understanding with Selective Region Concentration.
CoRR
(2023)
Haoyu Cao
,
Changcun Bao
,
Chaohu Liu
,
Huang Chen
,
Kun Yin
,
Hao Liu
,
Yinsong Liu
,
Deqiang Jiang
,
Xing Sun
Attention Where It Matters: Rethinking Visual Document Understanding with Selective Region Concentration.
ICCV
(2023)
Yu Yang
,
Chengpeng Yao
,
Jinwei Yang
,
Kun Yin
A Network Security Situation Element Extraction Method Based on Conditional Generative Adversarial Network and Transformer.
IEEE Access
10 (2022)
Chengpeng Yao
,
Yu Yang
,
Kun Yin
,
Jinwei Yang
Traffic Anomaly Detection in Wireless Sensor Networks Based on Principal Component Analysis and Deep Convolution Neural Network.
IEEE Access
10 (2022)
Tongkai Xu
,
Chunling Hao
,
Qingshui Guo
,
Kun Yin
,
Tang Hu
,
Lijie Yang
An Efficient Alignment Method for Scanning Data of 77GHz mmWave Imaging Radar.
ICCT
(2022)
Kun Yin
,
Yu Yang
,
Chengpeng Yao
,
Jinwei Yang
Long-Term Prediction of Network Security Situation Through the Use of the Transformer-Based Model.
IEEE Access
10 (2022)
Kun Yin
,
Meng Yan
,
Ling Xu
,
Zhou Xu
,
Zhao Li
,
Dan Yang
,
Xiaohong Zhang
Improving Log-Based Anomaly Detection with Component-Aware Analysis.
ICSME
(2020)
Jingang Zhou
,
Kun Yin
Automated web testing based on textual-visual UI patterns: the UTF approach.
ACM SIGSOFT Softw. Eng. Notes
39 (5) (2014)