Yu Bao

According to our database1, Yu Bao authored at least 35 papers between 2009 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 


On csauthors.net:


Bayesian Co-Clustering Truth Discovery for Mobile Crowd Sensing Systems.
IEEE Trans. Ind. Informatics, 2020

Glancing Transformer for Non-Autoregressive Neural Machine Translation.
CoRR, 2020

Explicit Semantic Decomposition for Definition Generation.
Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics, 2020

Non-autoregressive Transformer by Position Learning.
CoRR, 2019

Techno-economic analyses for vertical use cases in the 5G domain.
CoRR, 2019

Toward more accurate prediction of caspase cleavage sites: a comprehensive review of current methods, tools and features.
Briefings Bioinform., 2019

WiSafe: a real-time system for intrusion detection based on wifi signals.
Proceedings of the ACM Turing Celebration Conference - China, 2019

Generating Sentences from Disentangled Syntactic and Semantic Spaces.
Proceedings of the 57th Conference of the Association for Computational Linguistics, 2019

A Chance-Constrained Programming Approach to the Design of Robust Broadband Beamformers With Microphone Mismatches.
IEEE ACM Trans. Audio Speech Lang. Process., 2018

Analysis of Critical and Redundant Vertices in Controlling Directed Complex Networks Using Feedback Vertex Sets.
J. Comput. Biol., 2018

How Do Metro Station Crowd Flows Influence the Taxi Demand Based on Deep Spatial-Temporal Network?
Proceedings of the 14th International Conference on Mobile Ad-Hoc and Sensor Networks, 2018

Virtual movement of relay nodes for two-tier wireless sensor networks in tunnels.
Int. J. Distributed Sens. Networks, 2017

Compact CNN Based Video Representation for Efficient Video Copy Detection.
Proceedings of the MultiMedia Modeling - 23rd International Conference, 2017

Object-Based Aggregation of Deep Features for Image Retrieval.
Proceedings of the MultiMedia Modeling - 23rd International Conference, 2017

Profit maximization resource allocation in cloud computing with performance guarantee.
Proceedings of the 36th IEEE International Performance Computing and Communications Conference, 2017

Multi-level feature representations for video semantic concept detection.
Neurocomputing, 2016

LBSizeCleav: improved support vector machine (SVM)-based prediction of Dicer cleavage sites using loop/bulge length.
BMC Bioinform., 2016

Discriminative Feature Learning with an Optimal Pattern Model for Image Classification.
Proceedings of the MultiMedia Modeling - 22nd International Conference, 2016

Region-based CNN for Logo Detection.
Proceedings of the International Conference on Internet Multimedia Computing and Service, 2016

Quantitative comparison of lossless video compression for multi-camera stereo and view interpolation applications.
Proceedings of the IEEE 13th International New Circuits and Systems Conference, 2015

There is a Will, There is a Way: A New Mechanism for Traffic Control Based on VTL and VANET.
Proceedings of the 16th IEEE International Symposium on High Assurance Systems Engineering, 2015

Relay Node Deployment for Wireless Sensor Networks Based on PSO.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

Decision Fusion Supported by Correlated Auxiliary Data in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2014

Cuteness Recognition and Localization in the Photos of Animals.
Proceedings of the ACM International Conference on Multimedia, MM '14, Orlando, FL, USA, November 03, 2014

Reversible Watermarking Algorithm of Grid Map Based on Prediction-Error Histogram.
J. Softw., 2013

Digital radio over fiber for LTE-advanced: Opportunities and challenges.
Proceedings of the 17th International Conference on Optical Networking Design and Modeling, 2013

Some insights into farfield wideband beamformers in the presence of microphone mismatches.
Proceedings of the IEEE International Conference on Acoustics, 2013

Vulnerability Evaluating Based on Attack Graph.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

Robust farfield wideband beamformer design using worst-case performance optimization.
Proceedings of the IEEE Asia Pacific Conference on Circuits and Systems, 2012

Resisting Collusion by Game in Culture Web.
Proceedings of the 20th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, 2011

Multistage Filtering for Collusion Detection in P2P Network.
Proceedings of the IEEE Ninth International Conference on Dependable, 2011

A committee machine with two-layer expert nets.
Kybernetes, 2010

Interest-driven Reasoning Based on Commitment Alternating Temporal Logic in the P2P Reputation System.
J. Comput., 2010

Cross-language Search: The Case of Google Language Tools.
First Monday, 2009

Information access across languages on the web: From search engines to digital libraries.
Proceedings of the Thriving on Diversity: Information Opportunities in a Pluralistic World, 2009