default search action
Yu Huang 0004
Person information
- affiliation: Peking University, National Engineering Research Center for Software Engineering, Beijing, China
Other persons with the same name
- Yu Huang — disambiguation page
- Yu Huang 0001 — Tsinghua University, Department of Computer Science and Technology, China
- Yu Huang 0002 — Nanjing University, Department of Computer Science and Technology, China
- Yu Huang 0003 — University of Southern California Los Angeles
- Yu Huang 0005 — Mentor Graphics Corporation, Wilsonville, OR, USA (and 1 more)
- Yu Huang 0006 — Sun Yat-Sen University, Department of Mathematics, Guangzhou, China
- Yu Huang 0007 — Samsung Electronics, Ridgefield Park, NJ, USA (and 2 more)
- Yu Huang 0008 — Arizona State University
- Yu Huang 0009 — University of Ulster, School of Computing and Mathematics, Jordanstown, UK (and 1 more)
- Yu Huang 0010 — Hunan University, School of Physics and Electronics, Changsha, China (and 1 more)
- Yu Huang 0011 — Southeast University, School of Electrical Engineering, Nanjing, China
- Yu Huang 0012 — Guangzhou University, China (and 1 more)
- Yu Huang 0013 — Huazhong University of Science and Technology, School of Computer Science and Technology, Wuhan, China
- Yu Huang 0014 — Soterix Medical Inc., New York, NY, USA (and 1 more)
- Yu Huang 0015 — University of Michigan, Ann Arbor, MI, USA (and 1 more)
- Yu Huang 0016 — Beijing University of Posts and Telecommunications, Key Laboratory of Universal Wireless Communications, Beijing, China
- Yu Huang 0017 — Seagate Technology, MN, USA (and 1 more)
- Yu Huang 0018 — University of Florida, FL, USA (and 1 more)
- Yu Huang 0019 — McMaster University, Hamilton, Ontario, Canada
- Yu Huang 0020 — Vanderbilt University, Nashville, TN, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j19]Weiping Ding, Zheng Zhang, Luis Martínez, Yu Huang, Zehong Cao, Jun Liu, Abhirup Banerjee:
New trends of adversarial machine learning for data fusion and intelligent system. Inf. Fusion 114: 102683 (2025) - 2024
- [j18]Jiayu Zhang, Hang Li, Dexuan Xu, Yiwei Lou, Menglong Ran, Zhi Jin, Yu Huang:
Decouple and Decorrelate: A Disentanglement Security Framework Combining Sample Weighting for Cross-Institution Biased Disease Diagnosis. IEEE Internet Things J. 11(15): 25543-25557 (2024) - [j17]Huashi Zhu, Dexuan Xu, Yu Huang, Zhi Jin, Weiping Ding, Jiahui Tong, Guoshuang Chong:
Graph Structure Enhanced Pre-Training Language Model for Knowledge Graph Completion. IEEE Trans. Emerg. Top. Comput. Intell. 8(4): 2697-2708 (2024) - [c45]Rongchao Zhang, Yiwei Lou, Dexuan Xu, Yongzhi Cao, Hanpin Wang, Yu Huang:
A Learnable Discrete-Prior Fusion Autoencoder with Contrastive Learning for Tabular Data Synthesis. AAAI 2024: 16803-16811 - [c44]Yiwei Lou, Jiayu Zhang, Dexuan Xu, Yongzhi Cao, Hanpin Wang, Yu Huang:
No-Reference MRI Quality Assessment via Contrastive Representation: Spatial and Frequency Domain Perspectives. ICME 2024: 1-6 - 2023
- [j16]Dexuan Xu, Huashi Zhu, Yu Huang, Zhi Jin, Weiping Ding, Hang Li, Menglong Ran:
Vision-knowledge fusion model for multi-domain medical report generation. Inf. Fusion 97: 101817 (2023) - [c43]Dexuan Xu, Yanyuan Chen, Jiayu Zhang, Yiwei Lou, Hanpin Wang, Jing He, Yu Huang:
Radiology Report Generation via Structured Knowledge-Enhanced Multi-modal Attention and Contrastive Learning. BIBM 2023: 2320-2325 - [c42]Yiwei Lou, Yanyuan Chen, Dexuan Xu, Doudou Zhou, Yongzhi Cao, Hanpin Wang, Yu Huang:
Refining the Unseen: Self-supervised Two-stream Feature Extraction for Image Quality Assessment. ICDM 2023: 1193-1198 - 2022
- [j15]Yiwei Lou, Yu Huang, Xuliang Xing, Yongzhi Cao, Hanpin Wang:
MTS-LSTDM: Multi-Time-Scale Long Short-Term Double Memory for power load forecasting. J. Syst. Archit. 125: 102443 (2022) - [j14]Yuanze Qin, Yiwei Lou, Yu Huang, Rigao Chen, Weihua Yue:
An Ensemble Deep Learning Approach Combining Phenotypic Data and fMRI for ADHD Diagnosis. J. Signal Process. Syst. 94(11): 1269-1281 (2022) - [c41]Tianyou Wang, Yuanze Qin, Yu Huang, Yiwei Lou, Chongyou Xu, Lei Chen:
Power Grid Data Monitoring and Analysis System based on Edge Computing. SmartCloud 2022: 32-38 - 2021
- [c40]Wenyi Yang, Wenhui Hu, Yingjie Liu, Yu Huang, Xueyang Liu, Shikun Zhang:
Research on Bootstrapping Algorithm for Health Insurance Data Fraud Detection Based on Decision Tree. BigDataSecurity 2021: 57-62 - [c39]Xiaoqi Liao, Hang Li, Xing Li, Pengyu Zhang, Yu Huang, Chunmei Wang:
An Automatic and Unified Consistency Verification Rule and Method of SG-CIM Model. BigDataSecurity 2021: 99-104 - [c38]Chongyou Xu, Guangxian Lv, Jian Du, Lei Chen, Yu Huang, Wang Zhou:
Kubeflow-based Automatic Data Processing Service for Data Center of State Grid Scenario. ISPA/BDCloud/SocialCom/SustainCom 2021: 924-930 - [c37]Zhengdong Ren, Jun Wang, Guangxian Lyu, Peng Liu, Wang Zhou, Yu Huang:
QBT: Efficient and Flexible Resource Allocation Method for Data Center of State Grid Scenario. KSEM 2021: 670-683 - [c36]Yingjie Liu, Xueyang Liu, Wenhui Hu, Minghui Zhang, Dongdong Du, Yu Huang:
FBLE: A Feature-based Label Enhancement Method for Corporate Bond Credit Rating Prediction. SmartCloud 2021: 73-77 - [c35]Yu Huang, Wenhui Hu, Xueyang Liu:
SG-CIM Mapping Entity Relationship Inference and Verification Techniques Based on Graph Representation Learning Technology. SmartCloud 2021: 101-106 - 2020
- [j13]Chengfeng Dou, Shikun Zhang, Hanping Wang, Li Sun, Yu Huang, Weihua Yue:
ADHD fMRI short-time analysis method for edge computing based on multi-instance learning. J. Syst. Archit. 111: 101834 (2020) - [c34]Yundan Liang, Zhengdong Ren, Jiawei Liao, Peipei Jin, Yu Huang, Guangxian Lv, Yiming Lu:
Research on Maintenance Strategy of Distribution Network based on Monte Carlo Tree. BigDataSecurity/HPSC/IDS 2020: 13-18 - [c33]Wenhui Hu, Long Zhang, Xueyang Liu, Yu Huang, Minghui Zhang, Liang Xing:
Research on Automatic Generation and Analysis Technology of Network Attack Graph. BigDataSecurity/HPSC/IDS 2020: 133-139 - [c32]Wei Liu, Jian Su, Zhenyu Mao, Peipei Jin, Yu Huang, Chengfeng Dou, Limei Zhou, Yuwei Shang:
Research on Text Classification Method of Distribution Network Equipment Fault based on Deep Learning. CSCloud/EdgeCom 2020: 11-16 - [c31]Lei Chen, Huihua Yu, Li Tong, Xu Huai, Peipei Jin, Yu Huang, Chengfeng Dou:
Research on Load Forecasting Method of Distribution Transformer based on Deep Learning. CSCloud/EdgeCom 2020: 228-233 - [c30]Lei Chen, Huihua Yu, Li Tong, Peipei Jin, Weiyan Zheng, Xu Huai, Yu Huang:
Research and Design of Distribution Equipment Health Early Warning System. ICA3PP (1) 2020: 579-590 - [c29]Wenhui Hu, Xueyang Liu, Yu Huang, Yu Wang, Minghui Zhang, Hui Zhao:
Structured Data Encoder for Neural Networks Based on Gradient Boosting Decision Tree. ICA3PP (2) 2020: 603-618 - [c28]Hongguo Zhao, Yunxia Liu, Yonghao Wang, Yu Huang:
Hiding Data into Blockchain-based Digital Video for Security Protection. SmartBlock 2020: 23-28 - [c27]Si Liu, Yunxia Liu, Cong Feng, Hongguo Zhao, Yu Huang:
Blockchain Privacy Data Protection Method Based on HEVC Video Steganography. SmartBlock 2020: 39-44 - [c26]Wei Liu, Jian Su, Lvying Qin, Yu Huang, Xu Huai, Qi Liu, Limei Zhou, Yuwei Shang, Xueyang Liu:
A framework of distribution transformer health early warning system based on EDC-GRU network. SmartCloud 2020: 187-192 - [c25]Guidong Wu, Hang Li, Xiaoqi Liao, Yuemeng Li, Yu Huang, Xiang Chen, Qi Liu, Xueyang Liu:
An Automatic and Rapid Knowledge Graph Construction Method of SG-CIM Model. SmartCloud 2020: 193-198
2010 – 2019
- 2019
- [j12]Xiaoming Li, Guangquan Xu, Wenjuan Lian, Hequn Xian, Litao Jiao, Yu Huang:
Multi-Layer Network Local Community Detection Based on Influence Relation. IEEE Access 7: 89051-89062 (2019) - [j11]Zhenyu Mao, Yi Su, Guangquan Xu, Xueping Wang, Yu Huang, Weihua Yue, Li Sun, Naixue Xiong:
Spatio-temporal deep learning method for ADHD fMRI classification. Inf. Sci. 499: 1-11 (2019) - [j10]Yu Huang, Wanxing Sheng, Peipei Jin, Baicuan Nie, Meikang Qiu, Guangquan Xu:
A Node-Oriented Discrete Event Scheduling Algorithm Based on Finite Resource Model. J. Organ. End User Comput. 31(3): 67-82 (2019) - [j9]Siwen Zhu, Yi Tang, Junxiang Zheng, Yongzhi Cao, Hanpin Wang, Yu Huang, Marian Margraf:
Sample Essentiality and Its Application to Modeling Attacks on Arbiter PUFs. ACM Trans. Embed. Comput. Syst. 18(5): 42:1-42:25 (2019) - [c24]Xueyang Liu, Junwei Qiu, Wenhui Hu, Yu Huang, Shikun Zhang, Heng Liu:
Research on Personalized Recommendation Technology Based on Collaborative Filtering. SmartCloud 2019: 41-46 - [c23]Wenhui Hu, Yu Wang, Xueyang Liu, Jinan Sun, Qing Gao, Yu Huang:
Open Source Software Vulnerability Propagation Analysis Algorithm based on Knowledge Graph. SmartCloud 2019: 121-127 - 2018
- [j8]Yuxin Jing, Hanpin Wang, Yu Huang, Lei Zhang, Yongzhi Cao:
A Modeling Language for MapReduce Programing in a Storage System Perspective. J. Signal Process. Syst. 90(8-9): 1133-1150 (2018) - 2017
- [j7]Yuxin Jing, Hanpin Wang, Yu Huang, Lei Zhang, Jiang Xu, Yongzhi Cao:
A modeling language to describe massive data storage management in cyber-physical systems. J. Parallel Distributed Comput. 103: 113-120 (2017) - [c22]Yu Huang, Juntao Li, Wenhui Hu, Xueyang Liu:
Research on a Simulation Period Reference Model and Its General Description Language. BigDataSecurity/HPSC/IDS 2017: 107-111 - [c21]Yuxin Jing, Hanpin Wang, Yu Huang, Lei Zhang, Yongzhi Cao:
Towards Formalizing of MapReduce. BigDataSecurity/HPSC/IDS 2017: 150-155 - 2016
- [c20]Jian Su, Yu Huang, Guangxian Lv, Haitao Liu, Peng Jin:
A Framework Research of Power Grid Knowledge Recommendation and Situation Reasoning Based on Cloud Computing and CEP. CSCloud 2016: 79-83 - [c19]Haitao Liu, Yu Huang, Guangxian Lv, Peng Jin, Xueyuan Su:
A Fault Injection Simulation Method Based on Petri Net. DASC/PiCom/DataCom/CyberSciTech 2016: 83-86 - 2015
- [j6]Yunni Xia, MengChu Zhou, Xin Luo, Qingsheng Zhu, Jia Li, Yu Huang:
Stochastic Modeling and Quality Evaluation of Infrastructure-as-a-Service Clouds. IEEE Trans Autom. Sci. Eng. 12(1): 162-170 (2015) - [c18]Yu Huang, Xuanzheng Hu, Guangxian Lv, Renfan Yang:
A Simulation Modeling Method Based on Petri Net. CSCloud 2015: 283-288 - 2011
- [c17]Jinan Sun, Yu Huang, Xin Gao, Shikun Zhang, Lifu Wang, Chong-Yi Yuan:
A Novel Method for Formally Detecting RFID Event Using Petri Nets. SEKE 2011: 122-125 - 2010
- [c16]Chunxiang Xu, Yu Huang, Wanling Qu, Hanpin Wang, Xiaojuan Ban:
A Petri Net-Based Algorithm for RFID Event Detection. COMPSAC 2010: 367-372 - [c15]Chong-Yi Yuan, Wen Zhao, Yu Huang:
Operation Expression: a Way to Verified Software. FCS 2010: 91-95
2000 – 2009
- 2009
- [j5]Yunni Xia, Qingsheng Zhu, Yu Huang, Zizhen Wang:
A novel reduction approach to analyzing QoS of workflow processes. Concurr. Comput. Pract. Exp. 21(2): 205-223 (2009) - [c14]Yunni Xia, Jun Chen, Mingqiang Zhou, Yu Huang:
A Petri-Net-Based Approach to QoS Estimation of Web Service Choreographies. APWeb/WAIM Workshops 2009: 113-124 - [c13]Wei Ye, Wen Zhao, Yu Huang, Wenhui Hu, Shikun Zhang, Lifu Wang:
Towards Passive RFID Event. COMPSAC (1) 2009: 492-499 - [c12]Jiaqi Zhu, Yu Huang, Hanpin Wang:
A Formal Descriptive Language and an Automated Detection Method for Complex Events in RFID. COMPSAC (1) 2009: 543-552 - [c11]Yu Huang, Jieying Li, Haiqiang Dun, Hanpin Wang:
Analyzing Service Composition Patterns in BPEL. JCAI 2009: 623-627 - [c10]Chunxiang Xu, Hanpin Wang, Wanling Qu, Meixia Zhu, Yu Huang:
A New Method to Model and Analyze the WS-BPEL Process under the Dead-Path-Elimination Semantics. SSIRI 2009: 203-211 - [c9]Wei Ye, Wen Zhao, Yu Huang, Wenhui Hu, Shikun Zhang, Lifu Wang:
Formal Definition and Detection Algorithm for Passive Event in RFID Middleware. APWeb/WAIM 2009: 538-543 - 2008
- [j4]Yu Huang, Hanpin Wang, Wen Zhao, Chunxiang Xu:
A practical method to analyze workflow logic models. Concurr. Comput. Pract. Exp. 20(1): 41-60 (2008) - [j3]Yunni Xia, Hanpin Wang, Wangsen Feng, Yu Huang:
QoS modeling and analysis of component-based software systems: a stochastic approach. Concurr. Comput. Pract. Exp. 20(12): 1359-1385 (2008) - [c8]Haiqiang Dun, Wen Zhao, Yu Huang, Shikun Zhang, Lifu Wang:
Modeling and Analysis of WS-BPEL Business Processes Based on ServiceNet. APSEC 2008: 265-272 - [c7]Wen Zhao, Yu Huang, Chong-Yi Yuan:
Synchronic Distance Based Workflow Logic Specification. HPCC 2008: 819-824 - 2007
- [j2]Chong-Yi Yuan, Wen Zhao, Shikun Zhang, Yu Huang:
A Three-Layer Model for Business Processes - Process Logic, Case Semantics and Workflow Management. J. Comput. Sci. Technol. 22(3): 410-425 (2007) - [c6]Yu Huang, Chunxiang Xu, Hanpin Wang, Yunni Xia, Jiaqi Zhu, Cheng Zhu:
Formalizing Web Service Choreography Interface. AINA Workshops (2) 2007: 576-581 - [c5]Yu Huang, Hanpin Wang, Wen Zhao, Jiaqi Zhu:
Analyzing Data Dependence Based on Workflow Net. International Conference on Computational Science (3) 2007: 257-264 - [c4]Yu Huang, Hanpin Wang:
A petri net semantics for web service choreography. SAC 2007: 1689-1690 - [c3]Yunni Xia, Hanpin Wang, Yu Huang, Wanling Qu:
Queuing analysis and performance evaluation of workflow through WFQN. TASE 2007: 178-187 - 2006
- [j1]Yunni Xia, Hanpin Wang, Yu Huang, L. Yuan:
A stochastic model for workflow QoS evaluation. Sci. Program. 14(3-4): 251-265 (2006) - [c2]Yunni Xia, Hanpin Wang, Yu Huang, Chunxiang Xu:
Stochastic modeling and quality evaluation of component-based software systems. QSIC 2006: 377-384 - 2005
- [c1]Yu Huang, Hanpin Wang, Peng Yu, Yunni Xia:
Property-Transition-Net-Based Workflow Process Modeling and Verification. FSEN 2005: 155-170
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-20 21:56 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint