Hongyu Liu

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Known people with the same name:

Bibliography

2024
Android malware detection method based on graph attention networks and deep fusion of multimodal features.
Expert Syst. Appl., March, 2024

Intelligent Diagnosis of Alzheimer's Disease Based on Machine Learning.
CoRR, 2024

A Risk-aware Planning Framework of UGVs in Off-Road Environment.
CoRR, 2024

2023
The accuracy of artificial intelligence in predicting COVID-19 patient mortality: a systematic review and meta-analysis.
BMC Medical Informatics Decis. Mak., December, 2023

A novel hybrid model for hourly PM2.5 prediction considering air pollution factors, meteorological parameters and GNSS-ZTD.
Environ. Model. Softw., September, 2023

YAYI 2: Multilingual Open-Source Large Language Models.
CoRR, 2023

HeadArtist: Text-conditioned 3D Head Generation with Self Score Distillation.
CoRR, 2023

CAD: Photorealistic 3D Generation via Adversarial Distillation.
CoRR, 2023

Human MotionFormer: Transferring Human Motions with Vision Transformers.
CoRR, 2023

EduChain: A highly available education consortium blockchain platform based on Hyperledger Fabric.
Concurr. Comput. Pract. Exp., 2023

Intelligent Diagnosis of Alzheimer45s Disease Based on Machine Learning.
Proceedings of the 2023 4th International Symposium on Artificial Intelligence for Medicine Science, 2023

XFormer: Fast and Accurate Monocular 3D Body Capture.
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023

Human MotionFormer: Transferring Human Motions with Vision Transformers.
Proceedings of the Eleventh International Conference on Learning Representations, 2023

Make Encoder Great Again in 3D GAN Inversion through Geometry and Occlusion-Aware Encoding.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

Delving StyleGAN Inversion for Image Editing: A Foundation Latent Space Viewpoint.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

2022
Security Control for Multi-Time-Scale CPSs Under DoS Attacks: An Improved Dynamic Event-Triggered Mechanism.
IEEE Trans. Netw. Sci. Eng., 2022

Deformation Retrieval Using the Spatially Constrained MTInSAR Method.
IEEE Geosci. Remote. Sens. Lett., 2022

Modelling Dependency Structures of Carbon Trading Markets between China and European Union: From Carbon Pilot to COVID-19 Pandemic.
Axioms, 2022

Comparison and analysis of classical image denoising methods based on convolution neural network.
Proceedings of the IEEE Smartworld, 2022

One Model to Edit Them All: Free-Form Text-Driven Image Manipulation with Semantic Modulations.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

Retinal Artery/Vein Classification Based on Multi-Scale Category Fusion.
Proceedings of the 34th IEEE International Conference on Tools with Artificial Intelligence, 2022

An Applied Research of Persuasion Theory in the Design of Weight Management Applications.
Proceedings of the Distributed, Ambient and Pervasive Interactions. Smart Environments, Ecosystems, and Cities, 2022

Reinforcement Learning Based Preamble Resource Allocation Scheme for Access Control in Machine-to-Machine Communication.
Proceedings of the Communications and Networking - 17th EAI International Conference, 2022

Checkpointing and deterministic training for deep learning.
Proceedings of the 1st International Conference on AI Engineering: Software Engineering for AI, 2022

2021
Workflow Refactoring for Maximizing Concurrency and Block-Structuredness.
IEEE Trans. Serv. Comput., 2021

RT-MOBS: A compositional observer semantics of time Petri net for real-time property specification language based on <i>μ</i>-calculus.
Sci. Comput. Program., 2021

Internet of things image detection and activation of β-Catenin on bone growth.
Microprocess. Microsystems, 2021

Impacts of Systematic Errors on Topographic Parameter Estimation in Multitemporal InSAR: A Quantitative Description.
IEEE Geosci. Remote. Sens. Lett., 2021

DeFLOCNet: Deep Image Editing via Flexible Low-level Controls.
CoRR, 2021

DNS covert channel detection method using the LSTM model.
Comput. Secur., 2021

Assessing consistency across functional screening datasets in cancer cells.
Bioinform., 2021

Network Traffic Classification Method Supporting Unknown Protocol Detection.
Proceedings of the 46th IEEE Conference on Local Computer Networks, 2021

Interpretable deep learning method for attack detection based on spatial domain attention.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

Land Deformation at Longyao Ground Fissure and Its Surroundings Revealed by Time Series Insar.
Proceedings of the IEEE International Geoscience and Remote Sensing Symposium, 2021

PD-GAN: Probabilistic Diverse GAN for Image Inpainting.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

DeFLOCNet: Deep Image Editing via Flexible Low-Level Controls.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

PT-LSTM: Extending LSTM for Efficient Processing Time Attributes in Time Series Prediction.
Proceedings of the Web and Big Data - 5th International Joint Conference, 2021

2020
ReQTL: identifying correlations between expressed SNVs and gene expression using RNA-sequencing data.
Bioinform., 2020

Rethinking Image Inpainting via a Mutual Encoder-Decoder with Feature Equalizations.
Proceedings of the Computer Vision - ECCV 2020, 2020

Fusing Parallel Social Contexts within Flexible-Order Proximity for Microblog Topic Detection.
Proceedings of the CIKM '20: The 29th ACM International Conference on Information and Knowledge Management, 2020

Exploration of a Balanced Reference Corpus with a Wide Variety of Text Mining Tools.
Proceedings of the ACAI 2020: 3rd International Conference on Algorithms, 2020

2019
An alternative approach to public cloud data auditing supporting data dynamics.
Soft Comput., 2019

CNN and RNN based payload classification methods for attack detection.
Knowl. Based Syst., 2019

One-Stage Inpainting with Bilateral Attention and Pyramid Filling Block.
CoRR, 2019

Topic Model Based Android Malware Detection.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2019

An Overview of the 2019 Language and Intelligence Challenge.
Proceedings of the Natural Language Processing and Chinese Computing, 2019

Monitoring Spatiotemporal Deformation of Tatun Volcano Group by Multi-Temporal Insar.
Proceedings of the 2019 IEEE International Geoscience and Remote Sensing Symposium, 2019

Convolutional Neural Network for Resting State EEG Signal Analysis.
Proceedings of the 16th IEEE International Conference on Networking, Sensing and Control, 2019

Coherent Semantic Attention for Image Inpainting.
Proceedings of the 2019 IEEE/CVF International Conference on Computer Vision, 2019

A Review on Small-Diameter Pipeline Inspection Gauge Localization Techniques: Problems, Methods and Challenges.
Proceedings of the International Conference on Communications, 2019

SSL Malicious Traffic Detection Based On Multi-view Features.
Proceedings of the ICCNS 2019: The 9th International Conference on Communication and Network Security, 2019

Coarse-to-Fine Document Ranking for Multi-Document Reading Comprehension with Answer-Completion.
Proceedings of the International Conference on Asian Language Processing, 2019

Persuasive Design and Application of Intelligent Healthcare Product.
Proceedings of the Cross-Cultural Design. Methods, Tools and User Experience, 2019

The Design Patent Images Classification Based on Image Caption Model.
Proceedings of the Advances in Brain Inspired Cognitive Systems, 2019

2018
Face Inpainting with Dilated Skip Architecture and Multi-Scale Adversarial Networks.
Proceedings of the 9th International Symposium on Parallel Architectures, 2018

2017
Identity-based provable data possession revisited: Security analysis and generic construction.
Comput. Stand. Interfaces, 2017

Cloud Data Integrity Checking with Deduplication for Confidential Data Storage.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

2016
Influence of third-order dispersion on the compressibility of output pulses from giant chirp oscillators.
Proceedings of the 25th Wireless and Optical Communication Conference, 2016

2015
Insecurity of an Efficient Privacy-preserving Public Auditing Scheme for Cloud Data Storage.
J. Univers. Comput. Sci., 2015

Remote data possession checking with enhanced security for cloud storage.
Future Gener. Comput. Syst., 2015

Provably Secure Identity Based Provable Data Possession.
Proceedings of the Provable Security, 2015

2014
Industrial Wastewater Discharge Retrieval Based on Stable Nighttime Light Imagery in China from 1992 to 2010.
Remote. Sens., 2014

Improved security of a dynamic remote data possession checking protocol for cloud storage.
Expert Syst. Appl., 2014

2012
Probabilistic Models for Focused Web Crawling.
Comput. Intell., 2012

2011
Privacy Measures for Free Text Documents: Bridging the Gap between Theory and Practice.
Proceedings of the Trust, Privacy and Security in Digital Business, 2011

2010
A new perspective of privacy protection: Unique distinct l-SR diversity.
Proceedings of the Eighth Annual Conference on Privacy, Security and Trust, 2010

2009
Learner Strategies on EFL E-learning Platform: An Empirical Study.
Proceedings of the Fifth International Conference on Semantics, Knowledge and Grid, 2009

Discovering Structured Event Logs from Unstructured Audit Trails for Workflow Mining.
Proceedings of the Foundations of Intelligent Systems, 18th International Symposium, 2009

A machine learning approach to identifying process instance and activity.
Proceedings of the IADIS International Conference Applied Computing 2009, 2009

Automatic Detecting Documents Containing Personal Health Information.
Proceedings of the Artificial Intelligence in Medicine, 2009

2008
Exploiting Multiple Features with MEMMs for Focused Web Crawling.
Proceedings of the Natural Language and Information Systems, 2008

Private Data Discovery for Privacy Compliance in Collaborative Environments.
Proceedings of the Cooperative Design, 2008

Using Data Mining Methods to Predict Personally Identifiable Information in Emails.
Proceedings of the Advanced Data Mining and Applications, 4th International Conference, 2008

2006
Using HMM to learn user browsing patterns for focused Web crawling.
Data Knowl. Eng., 2006

2004
Probabilistic models for focused web crawling.
Proceedings of the Sixth ACM CIKM International Workshop on Web Information and Data Management (WIDM 2004), 2004

Focused Crawling by Learning HMM from User's Topic-specific Browsing.
Proceedings of the 2004 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2004), 2004


  Loading...