Yi Hu

According to our database1, Yi Hu authored at least 156 papers between 1994 and 2019.

Collaborative distances:

Awards

IEEE Fellow

IEEE Fellow 2015, "For leadership in wide-area synchronized measurement systems".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
A Low Power and Fast Tracking Light-to-Frequency Converter With Adaptive Power Scaling for Blood SpO2 Sensing.
IEEE Trans. Biomed. Circuits and Systems, 2019

Segmental contributions to cochlear implant speech perception.
Speech Communication, 2019

Dielectric Spherical Particle on an Interface in an Applied Electric Field.
SIAM Journal of Applied Mathematics, 2019

A novel fuzzy rule extraction approach using Gaussian kernel-based granular computing.
Knowl. Inf. Syst., 2019

A Speech Homomorphic Encryption Scheme with Less Data Expansion in Cloud Computing.
TIIS, 2019

Research on Age Estimation Algorithm Based on Structured Sparsity.
IJPRAI, 2019

Integrated planning of ship deployment, service schedule and container routing.
Computers & OR, 2019

A self-organizing multimodal multi-objective pigeon-inspired optimization algorithm.
SCIENCE CHINA Information Sciences, 2019

GPS Signal Acquisition Based on Compressive Sensing and Modified Greedy Acquisition Algorithm.
IEEE Access, 2019

Improving Semantic Matching via Multi-Task Learning in E-Commerce.
Proceedings of the SIGIR 2019 Workshop on eCommerce, 2019

A Coincidence Counting System for Twelve-photon Entanglement Experiment.
Proceedings of the 7th International Conference on Photonics, Optics and Laser Technology, 2019

2018
Digital Control Strategies With Attractiveness and Invariance Specifications.
IEEE Trans. Contr. Sys. Techn., 2018

Interpersonal synchronization of inferior frontal cortices tracks social interactive learning of a song.
NeuroImage, 2018

Optimization of Coverage in 5G Self-Organizing Small Cell Networks.
MONET, 2018

Task assignment and sequencing decision model under uncertain available time of service providers.
JORS, 2018

Age estimation algorithm of facial images based on multi-label sorting.
EURASIP J. Image and Video Processing, 2018

HDncRNA: a comprehensive database of non-coding RNAs associated with heart diseases.
Database, 2018

Capacitated closed-loop supply chain network design under uncertainty.
Advanced Engineering Informatics, 2018

Intra-Frame Error Concealment Scheme Using 3D Reversible Data Hiding in Mobile Cloud Environment.
IEEE Access, 2018

The Whole-Page Optimization via Dynamic Ad Allocation.
Proceedings of the Companion of the The Web Conference 2018 on The Web Conference 2018, 2018

An Improved Coordinated Multichannel MAC Scheme by Efficient Use of Idle Service Channels for VANETs.
Proceedings of the 87th IEEE Vehicular Technology Conference, 2018

A Data-Aware Energy-Saving Storage Management Strategy for On-Site Astronomical Observation at Dome A.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

2017
Investigating the Underlying Factors of Corruption in the Public Construction Sector: Evidence from China.
Science and Engineering Ethics, 2017

Dormancy Mechanism Based Power Allocation in Heterogeneous Networks: A Stackelberg Game Approach.
MONET, 2017

China's energy consumption forecasting by GMDH based auto-regressive model.
J. Systems Science & Complexity, 2017

The Analysis for the Cargo Volume with Hybrid Discrete Wavelet Modeling.
International Journal of Information Technology and Decision Making, 2017

Factors attracting Chinese Generation Y in the smartphone application marketplace.
Frontiers Comput. Sci., 2017

Timely cloud gaming.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Optimized Data Layout for Spatio-temporal Data in Time Domain Astronomy.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2017

Analyzing chronological order reconstruction problem in cyber-physical systems.
Proceedings of the 19th IEEE International Conference on e-Health Networking, 2017

Coverage Optimization in Self-organizing Small Cells.
Proceedings of the 5G for Future Wireless Networks - First International Conference, 2017

2016
A dual fragile watermarking scheme for speech authentication.
Multimedia Tools Appl., 2016

Employing miniaturized computers for distributed vulnerability assessment.
Proceedings of the 11th International Conference for Internet Technology and Secured Transactions, 2016

SEGUE: Quality of Service Aware Edge Cloud Service Migration.
Proceedings of the 2016 IEEE International Conference on Cloud Computing Technology and Science, 2016

2015
GPS Signal Availability Augmentation Utilizing the Navigation Signal Retransmission Via the GEO Comsat.
Wireless Personal Communications, 2015

A 60 V Tolerance Transceiver With ESD Protection for FlexRay-Based Communication Systems.
IEEE Trans. on Circuits and Systems, 2015

Investigating the Effectiveness of Response Strategies for Vulnerabilities to Corruption in the Chinese Public Construction Sector.
Science and Engineering Ethics, 2015

Multiple dimensioned mining of financial fluctuation through radial basis function networks.
Neural Computing and Applications, 2015

Penetration testing in a box.
Proceedings of the 2015 Information Security Curriculum Development Conference, 2015

GeoTopo: A PoP-level Topology Generator for Evaluation of Future Internet Architectures.
Proceedings of the 23rd IEEE International Conference on Network Protocols, 2015

An Energy Efficient Storage System for Astronomical Observation Data on Dome A.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

An Agent Based Approach to Perform Damage Assessment and Recovery Efficiently after a Cyber Attack to Ensure E-government Database Security.
Proceedings of the 48th Hawaii International Conference on System Sciences, 2015

2014
An adaptive anomaly-based intrusion prevention system for databases.
Proceedings of the 2014 IEEE International Conference on Systems, Man, and Cybernetics, 2014

Poster: enabling mobile content-oriented networking in the mobilityfirst future internet architecture.
Proceedings of the Fifteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2014

Efficient Reversible Data Hiding Based on Prefix Matching and Directed LSB Embedding.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

Estimating Returns to Education of Chinese Residents: Evidence from Optimal Model Selection.
Proceedings of the Second International Conference on Information Technology and Quantitative Management, 2014

Perceptual contribution of vowels and consonants to sentence intelligibility by cochlear implant users.
Proceedings of the 2014 International Symposium on Integrated Circuits (ISIC), 2014

An efficient spectral subtraction-based strategy for suppressing reverberation in cochlear implant devices.
Proceedings of the 2014 International Symposium on Integrated Circuits (ISIC), 2014

Objective quality evaluation of noise-suppressed speech: effects of temporal envelope and fine-structure cues.
Proceedings of the INTERSPEECH 2014, 2014

A Transfer Learning Based Classifier Ensemble Model for Customer Credit Scoring.
Proceedings of the Seventh International Joint Conference on Computational Sciences and Optimization, 2014

2013
An In-Situ Highly Sensitive and Reliable Chlorophyll Sensor Based on Pseudo-Random Sequence Modulation.
IEEE Trans. Instrumentation and Measurement, 2013

A Hilbert-fine-structure-derived physical metric for predicting the intelligibility of noise-distorted and noise-suppressed speech.
Speech Communication, 2013

Combinatorial Aspects of Mixed Arrangements.
Ars Comb., 2013

A Self-Organizing Distributed Memory Cache for Data Sharing Applications in Cluster Environment.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

Complex-Valued GMDH-type Neural Network for Real-Valued Classification Problems.
Proceedings of the Sixth International Conference on Business Intelligence and Financial Engineering, 2013

Carbon Emission Abatement: An Introduction.
Proceedings of the Sixth International Conference on Business Intelligence and Financial Engineering, 2013

Ownership and Indirect Financing of Smes: Estimation Based on Propensity Score Matching.
Proceedings of the Sixth International Conference on Business Intelligence and Financial Engineering, 2013

Energy Consumption and Economic Growth in China's Industrial Sectors.
Proceedings of the Sixth International Conference on Business Intelligence and Financial Engineering, 2013

Energy Pricing and Carbon Emission Based on Hyperbolic Discounting Preference.
Proceedings of the Sixth International Conference on Business Intelligence and Financial Engineering, 2013

Pricing American Parisian Options and ITS Application in the Valuation of Convertible Bonds.
Proceedings of the Sixth International Conference on Business Intelligence and Financial Engineering, 2013

2012
Peer-to-Peer Support for Large Scale Interactive Applications.
PhD thesis, 2012

PMU Interoperability, Steady-State and Dynamic Performance Tests.
IEEE Trans. Smart Grid, 2012

Maintaining Data Consistency in Structured P2P Systems.
IEEE Trans. Parallel Distrib. Syst., 2012

Peer-to-peer indirect reciprocity via personal currency.
J. Parallel Distrib. Comput., 2012

Environmental health risk detection with GeogDetector.
Environmental Modelling and Software, 2012

P2P consistency support for large-scale interactive applications.
Computer Networks, 2012

Detecting collaborative insider attacks in information systems.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2012

An approach for detecting malicious keyloggers.
Proceedings of the 2012 Information Security Curriculum Development Conference, 2012

A high voltage analog multiplexer with digital calibration for battery management systems.
Proceedings of the IEEE International Conference on IC Design & Technology, 2012

Coefficient Thresholding with Image Restoration.
Proceedings of the 2012 Data Compression Conference, Snowbird, UT, USA, April 10-12, 2012, 2012

Design and Implementation of High-Performance Embedded Numerical Control System.
Proceedings of the 12th IEEE International Conference on Computer and Information Technology, 2012

2011
Acceleration technique for boosting classification and its application to face detection.
Proceedings of the 3rd Asian Conference on Machine Learning, 2011

Document sentiment classification by exploring description model of topical terms.
Computer Speech & Language, 2011

SpiceC: scalable parallelism via implicit copying and explicit commit.
Proceedings of the 16th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, 2011

Online Web Sentiment Analysis on Campus Network.
Proceedings of the 4th International Symposium on Computational Intelligence and Design, 2011

A high speed transceiver front-end design with fault detection for FlexRay-based automotive communication systems.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2011), 2011

Profiling file repository access patterns for identifying data exfiltration activities.
Proceedings of the 2011 IEEE Symposium on Computational Intelligence in Cyber Security, 2011

A Hierarchical Scheduling Policy for Large-Scale Rendering.
Proceedings of the Sixth Chinagrid Annual Conference, ChinaGrid 2011, Dalian, Liaoning, 2011

2010
Internet-based intelligent service-oriented system architecture for collaborative product development.
Int. J. Computer Integrated Manufacturing, 2010

Lane Detection based on Guided RANSAC.
Proceedings of the VISAPP 2010 - Proceedings of the Fifth International Conference on Computer Vision Theory and Applications, Angers, France, May 17-21, 2010, 2010

An effective log mining approach for database intrusion detection.
Proceedings of the IEEE International Conference on Systems, 2010

A Balanced Consistency Maintenance Protocol for Structured P2P Systems.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Two-Dimensional Traceability Link Rule Mining for Detection of Insider Attacks.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010

Equalization of urban and rural basic public facilities based on GIS: A case study of educational facilities in Changzhou.
Proceedings of the 18th International Conference on Geoinformatics: GIScience in Change, 2010

Cloud Model-Based Security-Aware and Fault-Tolerant Job Scheduling for Computing Grid.
Proceedings of the Fifth Annual ChinaGrid Conference, ChinaGrid 2010, Guangzhou, 2010

2009
An Open CNC System Based on Component Technology.
IEEE Trans. Automation Science and Engineering, 2009

Ultra High Voltage Transmission in China: Developments, Current Status and Future Prospects.
Proceedings of the IEEE, 2009

A bio-inspired application of natural language processing: A case study in extracting multiword expression.
Expert Syst. Appl., 2009

Network Anomaly Detection Based on Traffic Prediction.
Proceedings of the International Conference on Scalable Computing and Communications / Eighth International Conference on Embedded Computing, 2009

Human Head Tracking Based on Inheritance and Evolution Concept.
Proceedings of the IAPR Conference on Machine Vision Applications (IAPR MVA 2009), 2009

Insider Threat in Database Systems: Preventing Malicious Users' Activities in Databases.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

Application of Artificial Intelligence Technique in Distributed Generation System.
Proceedings of the Advances in Neural Networks, 2009

Budget-Based Self-Optimized Incentive Search in Unstructured P2P Networks.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

On the use of Bayesian modeling for predicting noise reduction performance.
Proceedings of the IEEE International Conference on Acoustics, 2009

Analysis of Data Dependency Based Intrusion Detection System.
Proceedings of the Data and Applications Security XXIII, 2009

A traceability link mining approach for identifying insider threats.
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009

Multi-objective Optimization Approaches Using a CE-ACO Inspired Strategy to Improve Grid Jobs Scheduling.
Proceedings of the Fourth ChinaGrid Annual Conference, ChinaGrid 2009, Yantai, Shandong, 2009

2008
Evaluation of Objective Quality Measures for Speech Enhancement.
IEEE Trans. Audio, Speech & Language Processing, 2008

PolyU at TAC 2008.
Proceedings of the First Text Analysis Conference, 2008

Developing Evaluation Model of Topical Term for Document-Level Sentiment Classification.
Proceedings of the PRICAI 2008: Trends in Artificial Intelligence, 2008

A Conceptual Model of Adjectival Modification in Chinese and Its Automatic Construction from a Machine Readable Dictionary.
Proceedings of the 2008 International Conference on Multimedia and Ubiquitous Engineering (MUE 2008), 2008

A Practical Approach for Relevance Measure of Inter-sentence.
Proceedings of the Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008

Mining Inter-transaction Data Dependencies for Database Intrusion Detection.
Proceedings of the Innovations and Advances in Computer Sciences and Engineering, 2008

2007
Subjective comparison and evaluation of speech enhancement algorithms.
Speech Communication, 2007

Using a Generative Model for Sentiment Analysis.
IJCLCLP, 2007

Inorganic Element Functional Group Database on Pulverized Coal Surface Based on XPS Method.
Data Science Journal, 2007

Modeling deceptive information dissemination using a holistic approach.
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), 2007

The Dictionary-Based Quantified Conceptual Relations for Hard and Soft Chinese Text Clustering.
Proceedings of the Natural Language Processing and Information Systems, 2007

The Bootstrapping Based Recognition of Conceptual Relationship for Text Retrieval.
Proceedings of the Natural Language Processing and Information Systems, 2007

Human Body Region Extraction from Photos.
Proceedings of the IAPR Conference on Machine Vision Applications (IAPR MVA 2007), 2007

A Language Modeling Approach to Sentiment Analysis.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

Text Retrieval Oriented Auto-construction of Conceptual Relationship.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

A Comparative Intelligibility Study of Speech Enhancement Algorithms.
Proceedings of the IEEE International Conference on Acoustics, 2007

A Trust Based Information Dissemination Model for Evaluating the Effect of Deceptive Data.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

Modeling of Places Based on Feature Distribution.
Proceedings of the Human-Computer Interaction. HCI Intelligent Multimodal Interaction Environments, 2007

Distributed Call Admission Protocol for Multi-Channel Multi-Radio Wireless Networks.
Proceedings of the Global Communications Conference, 2007

Automated Extraction of Conceptual Knowledge from a Chinese Machine-Readable Dictionary.
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007

A New Hierarchical Conceptual Graph Formalism Adapted for Chinese Document Retrieval.
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007

The Design and Implementation of a GMA based Grid Monitoring Service.
Proceedings of the 11th International Conference on Computer Supported Cooperative Work in Design, 2007

A Novel Method for Intelligence of Sensors Modeling.
Proceedings of the Computational Intelligence and Security, International Conference, 2007

Traffic signal control using fuzzy logic and evolutionary algorithms.
Proceedings of the IEEE Congress on Evolutionary Computation, 2007

SECGrid: Science and Engineering Computing Based Collaborative Problem Solving Environment.
Proceedings of the Cooperative Design, 2007

2006
Modeling Deceptive Action in Virtual Communities.
Proceedings of the Security in Information Systems, 2006

Energy efficient real-time data aggregation in wireless sensor networks.
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2006

Evaluation of objective measures for speech enhancement.
Proceedings of the INTERSPEECH 2006, 2006

Multi-Band Speech Enhancement for Functional MRI.
Proceedings of the 2006 IEEE International Conference on Acoustics Speech and Signal Processing, 2006

Subjective Comparison of Speech Enhancement Algorithms.
Proceedings of the 2006 IEEE International Conference on Acoustics Speech and Signal Processing, 2006

A Bio-Inspired Approach for Multi-Word Expression Extraction.
Proceedings of the ACL 2006, 2006

2005
Design and Analysis of Techniques for Detection of Malicious Activities in Database Systems.
J. Network Syst. Manage., 2005

An Approach to Automatic Construction of Lexical Relations Between Chinese Nouns from Machine Readable Dictionary.
Proceedings of the Natural Language Processing and Information Systems, 2005

Phase noise spectra analysis for LC oscillators.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2005), 2005

A New Method for Sentiment Classification in Text Retrieval.
Proceedings of the Natural Language Processing, 2005

Bilingual Semantic Network Construction.
Proceedings of the Advances in Intelligent Computing, 2005

Dual Filtering Strategy for Chinese Term Extraction.
Proceedings of the Fuzzy Systems and Knowledge Discovery, Second International Conference, 2005

2004
Speech enhancement based on wavelet thresholding the multitaper spectrum.
IEEE Trans. Speech and Audio Processing, 2004

Incorporating a psychoacoustical model in frequency domain speech enhancement.
IEEE Signal Process. Lett., 2004

A Template Matching Method Based on Marker-Controlled Watershed Segmentation.
IEICE Transactions, 2004

A data mining approach for database intrusion detection.
Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), 2004

A matching method based on marker-controlled watershed segmentation.
Proceedings of the 2004 International Conference on Image Processing, 2004

Succinct and Fast Accessible Data Structures for Database Damage Assessment.
Proceedings of the Distributed Computing and Internet Technology, 2004

A noise estimation algorithm with rapid adaptation for highly nonstationary environments.
Proceedings of the 2004 IEEE International Conference on Acoustics, 2004

2003
A perceptually motivated approach for speech enhancement.
IEEE Trans. Speech and Audio Processing, 2003

A generalized subspace approach for enhancing speech corrupted by colored noise.
IEEE Trans. Speech and Audio Processing, 2003

Frequency offset estimation during handover in 3G UMTS.
Proceedings of the IEEE 14th International Symposium on Personal, 2003

Identification of Malicious Transactions in Database Systems.
Proceedings of the 7th International Database Engineering and Applications Symposium (IDEAS 2003), 2003

Matching of characters in scene images by using local shape feature vectors.
Proceedings of the 12th International Conference on Image Analysis and Processing (ICIAP 2003), 2003

2002
A perceptually motivated subspace approach for speech enhancement.
Proceedings of the 7th International Conference on Spoken Language Processing, ICSLP2002, 2002

Research of Machine Learning Method for Specific Information Recognition on the Internet.
Proceedings of the 4th IEEE International Conference on Multimodal Interfaces (ICMI 2002), 2002

A subspace approach for enhancing speech corrupted by colored noise.
Proceedings of the IEEE International Conference on Acoustics, 2002

2001
Generic scheduling methods for a linear QR array SoC processor.
Proceedings of the IEEE International Conference on Acoustics, 2001

A cross-correlation technique for enhancing speech corrupted with correlated noise.
Proceedings of the IEEE International Conference on Acoustics, 2001

Demonstrating Real-Time JPEG Image Compression-Decompression Using Standard Component IP Cores on a Programmable Logic Based Platform for DSP and Image Processing.
Proceedings of the Field-Programmable Logic and Applications, 2001

1997
Hierarchical VHDL libraries for DSP ASIC design.
Proceedings of the 1997 IEEE International Conference on Acoustics, 1997

A Lifetime-Sensitive Scheduling Method.
Proceedings of the 1997 Advances in Parallel and Distributed Computing Conference (APDC '97), 1997

1995
VLSI architectures for vector quantization.
VLSI Signal Processing, 1995

1994
Automated design of DSP array processor chips.
Proceedings of the International Conference on Application Specific Array Processors, 1994


  Loading...