Yuheng Huang

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Known people with the same name:

Bibliography

2025
RecIS: Sparse to Dense, A Unified Training Framework for Recommendation Models.
CoRR, September, 2025

End4: End-to-end Denoising Diffusion for Diffusion-Based Inpainting Detection.
CoRR, September, 2025

Risk Assessment Framework for Code LLMs via Leveraging Internal States.
CoRR, April, 2025

CBA: Backdoor Attack on Deep Speech Classification via Audio Compression.
Proceedings of the 26th Annual Conference of the International Speech Communication Association, 2025

An Enhanced Autism Detection Model Based on Electroencephalogram Signals.
Proceedings of the International Joint Conference on Neural Networks, 2025

2024
Region-based online selective examination for weakly supervised semantic segmentation.
Inf. Fusion, 2024

Video Frame Interpolation for Large Motion with Generative Prior.
Proceedings of the Pattern Recognition and Computer Vision - 7th Chinese Conference, 2024

Visible-Infrared Person Search: A Novel Benchmark and Solution.
Proceedings of the Pattern Recognition - 27th International Conference, 2024

Optimization Method for Model Predictive Control Based on BiLSTM.
Proceedings of the 9th Asia-Pacific Conference on Intelligent Robot Systems, 2024

2021
LogClass: Anomalous Log Identification and Classification With Partial Labels.
IEEE Trans. Netw. Serv. Manag., 2021

Zero-Shot Certified Defense against Adversarial Patches with Vision Transformers.
CoRR, 2021

2020
Summarizing Unstructured Logs in Online Services.
CoRR, 2020

A Semantic-aware Representation Framework for Online Log Analysis.
Proceedings of the 29th International Conference on Computer Communications and Networks, 2020

2019
Anthropogenic biases in chemical reaction data hinder exploratory inorganic synthesis.
Nat., 2019

2014
Non-binary Sparse Measurement Matrices for Binary Signal Recovery.
Circuits Syst. Signal Process., 2014

2013
Selective Demodulation Scheme Based on Log-Likelihood Ratio Threshold.
KSII Trans. Internet Inf. Syst., 2013


  Loading...