Hongyu Sun

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Known people with the same name:

Bibliography

2025
Evolving Paradigms in Automated Program Repair: Taxonomy, Challenges, and Opportunities.
ACM Comput. Surv., February, 2025

ShaderNN: A lightweight and efficient inference engine for real-time applications on mobile GPUs.
Neurocomputing, 2025

2024
MDRL-ETT: A Multiagent Deep Reinforcement Learning-Enhanced Transmission Tomography System to Detect Anomalous Geological Structures.
IEEE Trans. Syst. Man Cybern. Syst., October, 2024

Leveraging Blockchain Based Federated Learning for Trustworthy 6G IoMT Image Analysis.
IEEE Wirel. Commun., August, 2024

Crack Detection Method for Wind Turbine Tower Bolts Using Ultrasonic Spiral Phased Array.
Sensors, August, 2024

A High-Precision Defect Quantification Method Using a Unilateral Oblique Focusing Guided Wave EMAT and a Theory-Informed Explainable Progressive Residual Deep Convolutional Network.
IEEE Trans. Instrum. Meas., 2024

Rail Web Buried Defect Location and Quantification Methods in Hybrid High-Order Guided Wave Detection.
IEEE Trans. Instrum. Meas., 2024

A Measurement Angle Error Correction Method for Polarized Images Based on Levenberg-Marquardt.
IEEE Trans. Instrum. Meas., 2024

Point-PRC: A Prompt Learning Based Regulation Framework for Generalizable Point Cloud Analysis.
CoRR, 2024

Beyond Film Subtitles: Is YouTube the Best Approximation of Spoken Vocabulary?
CoRR, 2024

WeatherReal: A Benchmark Based on In-Situ Observations for Evaluating Weather Models.
CoRR, 2024

Autonomous, Self-driving Multi-Step Growth of Semiconductor Heterostructures Guided by Machine Learning.
CoRR, 2024

Real-time volume rendering with octree-based implicit surface representation.
Comput. Aided Geom. Des., 2024

Applying Contrastive Learning to Code Vulnerability Type Classification.
Proceedings of the 2024 Conference on Empirical Methods in Natural Language Processing, 2024

Practical Measurements of Translucent Materials with Inter-Pixel Translucency Prior.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024

2023
Inconsistent measurement and incorrect detection of software names in security vulnerability reports.
Comput. Secur., December, 2023

Beyond Correlations: Deep Learning for Seismic Interferometry.
IEEE Trans. Neural Networks Learn. Syst., July, 2023

Infrared Image-Enhancement Algorithm for Weak Targets in Complex Backgrounds.
Sensors, July, 2023

Guided wave signal-based sensing and classification for small geological structure.
IET Signal Process., July, 2023

Study on the Impacts of Hazardous Behaviors on Autonomous Vehicle Collision Rates Based on Humanoid Scenario Generation in CARLA.
CoRR, 2023

A Survey on Automated Program Repair Techniques.
CoRR, 2023

Quantification Method of Rail Web Buried Defect using Hybrid High-Order Guided Waves.
Proceedings of the IEEE International Instrumentation and Measurement Technology Conference, 2023

Speech emotion recognition algorithm based on bimodality and attention mechanism.
Proceedings of the 2023 4th International Conference on Computing, 2023

2022
Microcrack Defect Quantification Using a Focusing High-Order SH Guided Wave EMAT: The Physics-Informed Deep Neural Network GuwNet.
IEEE Trans. Ind. Informatics, 2022

Development of a Physics-Informed Doubly Fed Cross-Residual Deep Neural Network for High-Precision Magnetic Flux Leakage Defect Size Estimation.
IEEE Trans. Ind. Informatics, 2022

Deep Learning for Low-Frequency Extrapolation of Multicomponent Data in Elastic FWI.
IEEE Trans. Geosci. Remote. Sens., 2022

Identification of feature genes and pathways for Alzheimer's disease via WGCNA and LASSO regression.
Frontiers Comput. Neurosci., 2022

Cargo Ecosystem Dependency-Vulnerability Knowledge Graph Construction and Vulnerability Propagation Study.
CoRR, 2022

Data-Driven Predictive Control With Switched Subspace Matrices for an SCR System.
IEEE Access, 2022

Hierarchical Attention Network for Interpretable and Fine-Grained Vulnerability Detection.
Proceedings of the IEEE INFOCOM 2022, 2022

A Novel Cuprotosis-Related lncRNA Signature Predicts Survival Outcomes in Patients with Glioblastoma.
Proceedings of the Intelligent Computing Theories and Application, 2022

VDBWGDL: Vulnerability Detection Based On Weight Graph And Deep Learning.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

Vulnerability Dataset Construction Methods Applied To Vulnerability Detection: A Survey.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

Repairing Security Vulnerabilities Using Pre-trained Programming Language Models.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

SbrPBert: A BERT-Based Model for Accurate Security Bug Report Prediction.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

Detecting API Missing-Check Bugs Through Complete Cross Checking of Erroneous Returns.
Proceedings of the Information Security and Cryptology - 18th International Conference, 2022

2021
Effective Focal Area Dimension Optimization of Shear Horizontal Point-Focusing EMAT Using Orthogonal Test Method.
IEEE Trans. Instrum. Meas., 2021

Development of Frequency-Mixed Point-Focusing Shear Horizontal Guided-Wave EMAT for Defect Inspection Using Deep Neural Network.
IEEE Trans. Instrum. Meas., 2021

Defect Detection and Identification of Point-Focusing Shear-Horizontal EMAT for Plate Inspection.
IEEE Trans. Instrum. Meas., 2021

Propagation Features of Channel Wave Signal in Coal Seam with Scouring Zone.
Traitement du Signal, 2021

Precise grabbing of overlapping objects system based on end-to-end deep neural network.
Comput. Commun., 2021

Multi-Attention Generative Adversarial Network for Multivariate Time Series Prediction.
IEEE Access, 2021

Quantification of Defects with Point-Focusing Shear Horizontal Guided Wave EMAT Using Deep Residual Network.
Proceedings of the 19th IEEE International Conference on Industrial Informatics, 2021

Research on Experience Evaluation of Taobao Shopping Platform Service.
Proceedings of the HCI in Business, Government and Organizations, 2021

Detecting Inconsistent Vulnerable Software Version in Security Vulnerability Reports.
Proceedings of the Frontiers in Cyber Security - 4th International Conference, 2021

A Review of Data Representation Methods for Vulnerability Mining Using Deep Learning.
Proceedings of the Frontiers in Cyber Security - 4th International Conference, 2021

Spatial Characteristics of Emotions in Disaster Areas and Non-disaster Areas: Use the Flood in Southern China as An Example.
Proceedings of the 8th International Conference on Behavioral and Social Computing, 2021

Facing COVID-19 in China and the US: Do we have the same emotions?
Proceedings of the 8th International Conference on Behavioral and Social Computing, 2021

2020
US-WGAN.
Dataset, August, 2020

Three-Dimensional Mirror Surface Measurement Based on Local Blur Analysis of Phase Measuring Deflectometry System.
Traitement du Signal, 2020

Vul-Mirror: A Few-Shot Learning Method for Discovering Vulnerable Code Clone.
EAI Endorsed Trans. Security Safety, 2020

Vertical handover algorithm based on multi-attribute and neural network in heterogeneous integrated network.
EURASIP J. Wirel. Commun. Netw., 2020

Predicting truncated multiple recursive generators with unknown parameters.
Des. Codes Cryptogr., 2020

A Multivariate Time Series Prediction Schema based on Multi-attention in recurrent neural network.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

Efficient Vulnerability Detection based on abstract syntax tree and Deep Learning.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Mode Identification of Denoised SH Guided Waves Using Variational Mode Decomposition Method.
Proceedings of the 2020 IEEE Sensors, Rotterdam, The Netherlands, October 25-28, 2020, 2020

UA-Miner: Deep Learning Systems for Expose Unprotected API Vulnerability in Source Code.
Proceedings of the 12th International Conference on Advanced Computational Intelligence, 2020

Meanderline Coil Arrangement of Ultrasonic Wave Line-Focusing Electromagnetic Acoustic Transducers.
Proceedings of the 2020 IEEE International Instrumentation and Measurement Technology Conference, 2020

How public emotions change with emergent social events.
Proceedings of the 7th International Conference on Behavioural and Social Computing, 2020

2019
Simulating and Testing Microvibrations on an Optical Satellite Using Acceleration Sensor-Based Jitter Measurements.
Sensors, 2019

Multimodal Lamb Wave Identification Using Combination of Instantaneous Frequency with EMD.
Proceedings of the IEEE International Instrumentation and Measurement Technology Conference, 2019

Characteristics of the multi-transducer point-focusing fan-shaped PPM Shear-Horizontal wave EMATs for plate inspection.
Proceedings of the IEEE International Instrumentation and Measurement Technology Conference, 2019

New Features of Authentication Scheme for the IoT: A Survey.
Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things, 2019

Fast Anomaly Detection in Multiple Multi-Dimensional Data Streams.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

2018
A collaborative and open solution for large-scale online learning.
Comput. Appl. Eng. Educ., 2018

2017
The role of negative corona in charged particle dynamics.
Simul. Model. Pract. Theory, 2017

Development of an MCNP assisted modelling software based on OpenCasCade.
Int. J. Ad Hoc Ubiquitous Comput., 2017

Parallel GPU-based collision detection of irregular vessel wall for massive particles.
Clust. Comput., 2017

Analysis on Al-Cu Dissimilar Materials Friction Stir Welding Butt Joint Based on J Integral Model.
Proceedings of the Intelligent Computing, Networked Control, and Their Engineering Applications, 2017

2016
Information theory based performance analysis and enhancement of Safety applications and cluster design in VANET.
EAI Endorsed Trans. Ind. Networks Intell. Syst., 2016

2015
GPU-accelerated visualisation of ADS granular flow target model.
Int. J. High Perform. Comput. Netw., 2015

The Design and Implementation of Embedded Online Laboratory.
Proceedings of the 44th International Conference on Parallel Processing Workshops, 2015

A Special Sorting Method for Neighbor Search Procedure in Smoothed Particle Hydrodynamics on GPUs.
Proceedings of the 44th International Conference on Parallel Processing Workshops, 2015

Accelerating 3D Digital Differential Analyzer Ray Tracing Algorithm on the GPU Using CUDA.
Proceedings of the 44th International Conference on Parallel Processing Workshops, 2015

Bhattacharyya distance and confidence map based feature selection for Common spatial patterns algorithms in brain computer interface.
Proceedings of the 12th International Conference on Fuzzy Systems and Knowledge Discovery, 2015

2008
Taser Blunt Probe Dart-To-Heart Distance Causing Ventricular Fibrillation in Pigs.
IEEE Trans. Biomed. Eng., 2008

Decision-Model-Based Code Generation for SPLE.
Proceedings of the Software Product Lines, 12th International Conference, 2008

2007
Taser Dart-to-Heart Distance That Causes Ventricular Fibrillation in Pigs.
IEEE Trans. Biomed. Eng., 2007

2006
Model Checking Timed Systems with Urgencies.
Proceedings of the Automated Technology for Verification and Analysis, 2006


  Loading...