


Остановите войну!
for scientists:
Yu Hao
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information

Other persons with the same name
- Yu Hao 0001 — Tsinghua University, Department of Computer Science and Technology, LITS, Beijing, China
- Yu Hao 0002
— Xi'an University of Posts and Telecommunications, School of Computer Science and Technology, China (and 1 more)
- Yu Hao 0003 — University of New South Wales, School of Computer Science and Engineering, Database Research Group, Sydney, NSW, Australia
- Yu Hao 0004
— Fudan University, School of Computer Science, Shanghai Key Laboratory of Intelligent Information Processing, China
- Yu Hao 0006 — Xi'an Jiaotong University, Department of Computer Science and Technology, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j11]Zhongzheng Yuan
, Tommy Azzino, Yu Hao, Yixuan Lyu
, Haoyang Pei, Alain Boldini, Marco Mezzavilla
, Mahya Beheshti, Maurizio Porfiri
, Todd E. Hudson, William H. Seiple, Yi Fang
, Sundeep Rangan
, Yao Wang
, John-Ross Rizzo
:
Network-Aware 5G Edge Computing for Object Detection: Augmenting Wearables to "See" More, Farther and Faster. IEEE Access 10: 29612-29632 (2022) - [i8]Chuhui Xue, Yu Hao, Shijian Lu, Philip H. S. Torr, Song Bai:
Language Matters: A Weakly Supervised Pre-training Approach for Scene Text Detection and Spotting. CoRR abs/2203.03911 (2022) - 2021
- [d1]Yu Hao, Sufian Latif, Hailong Zhang, Raef Bassily, Atanas Rountev:
Differential Privacy for Coverage Analysis of Software Traces (Artifact). Dagstuhl Artifacts Ser. 7(2): 07:1-07:3 (2021) - [j10]Yu Hao, Yuzong Gu, Yanbo Zhang:
Fuzzy Rule-Based Signal Restoration for Wireless Optical Communication of Multi-autonomous Underwater Vehicles. Int. J. Fuzzy Syst. 23(6): 1840-1848 (2021) - [j9]Yu Hao:
Computer Games as Social Sculptures: Rethinking the Discourse of Participation and Its Implications for Digital Game Design. Proc. ACM Hum. Comput. Interact. 5(CHI): 1-15 (2021) - [j8]Sibo Sun
, Shasha Qin, Yu Hao, Guangpu Zhang
, Chunhui Zhao:
Underwater Acoustic Localization of the Black Box Based on Generalized Second-Order Time Difference of Arrival (GSTDOA). IEEE Trans. Geosci. Remote. Sens. 59(9): 7245-7255 (2021) - [j7]Yu Xiuwu, Li Ying
, Liu Yong, Yu Hao:
Inertial optimization MCL deep mine localization algorithm based on grey prediction and artificial bee colony. Wirel. Networks 27(4): 3053-3072 (2021) - [c25]Shitong Zhu, Zhongjie Wang, Xun Chen, Shasha Li, Keyu Man, Umar Iqbal, Zhiyun Qian, Kevin S. Chan, Srikanth V. Krishnamurthy, Zubair Shafiq, Yu Hao, Guoren Li, Zheng Zhang, Xiaochen Zou:
Eluding ML-based Adblockers With Actionable Adversarial Examples. ACSAC 2021: 541-553 - [c24]Peixiang Zhang, Ying Liu, Yu Hao, Jiming Liu:
Deep Facial Expression Recognition Algorithm Combining Channel Attention. AIPR 2021: 260-265 - [c23]Zhongjie Wang, Shitong Zhu, Keyu Man, Pengxiong Zhu, Yu Hao, Zhiyun Qian, Srikanth V. Krishnamurthy, Tom La Porta, Michael J. De Lucia:
Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison. MTD@CCS 2021: 31-32 - [c22]Hang Zhang, Weiteng Chen, Yu Hao, Guoren Li, Yizhuo Zhai, Xiaochen Zou, Zhiyun Qian:
Statically Discovering High-Order Taint Style Vulnerabilities in OS Kernels. CCS 2021: 811-824 - [c21]Zhongjie Wang, Shitong Zhu, Keyu Man, Pengxiong Zhu, Yu Hao, Zhiyun Qian, Srikanth V. Krishnamurthy, Tom La Porta, Michael J. De Lucia:
Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison. CCS 2021: 3384-3399 - [c20]Yu Hao, Sufian Latif, Hailong Zhang, Raef Bassily, Atanas Rountev:
Differential Privacy for Coverage Analysis of Software Traces. ECOOP 2021: 8:1-8:25 - [i7]Yu Hao, Yi Fang:
RAR: Region-Aware Point Cloud Registration. CoRR abs/2110.03544 (2021) - [i6]Yu Hao, Yi Fang:
Meta-Learning 3D Shape Segmentation Functions. CoRR abs/2110.03854 (2021) - [i5]Yu Hao, Yi Fang:
3D Meta-Segmentation Neural Network. CoRR abs/2110.04297 (2021) - [i4]Zhongzheng Yuan, Tommy Azzino, Yu Hao, Yixuan Lyu, Haoyang Pei, Alain Boldini, Marco Mezzavilla, Mahya Beheshti, Maurizio Porfiri, Todd E. Hudson, William H. Seiple, Yi Fang, Sundeep Rangan, Yao Wang, John-Ross Rizzo:
Network-Aware 5G Edge Computing for Object Detection: Augmenting Wearables to "See" More, Farther and Faster. CoRR abs/2112.13194 (2021) - 2020
- [j6]Ilja Gubins, Marten L. Chaillet, Gijs van der Schot, Remco C. Veltkamp, Friedrich Förster
, Yu Hao, Xiaohua Wan, Xuefeng Cui, Fa Zhang, Emmanuel Moebel, Xiao Wang, Daisuke Kihara, Xiangrui Zeng, Min Xu, Nguyen P. Nguyen, Tommi A. White, Filiz Bunyak:
SHREC 2020: Classification in cryo-electron tomograms. Comput. Graph. 91: 279-289 (2020) - [j5]Yu Xiuwu, Yu Hao, Liu Yong, Xiao Renrong:
A clustering routing algorithm based on wolf pack algorithm for heterogeneous wireless sensor networks. Comput. Networks 167 (2020) - [j4]Hailong Zhang, Yu Hao, Sufian Latif, Raef Bassily, Atanas Rountev:
Differentially-private software frequency profiling under linear constraints. Proc. ACM Program. Lang. 4(OOPSLA): 203:1-203:24 (2020) - [c19]Hailong Zhang, Yu Hao, Sufian Latif, Raef Bassily, Atanas Rountev:
A study of event frequency profiling with differential privacy. CC 2020: 51-62 - [c18]Shuran Li, Yu Hao, JungKyoon Yoon:
PurPal: An Interactive Box that Up-regulates Positive Emotions in Consumption Behaviors. CHI Extended Abstracts 2020: 1-6 - [c17]Ruohong Zhang, Yu Hao, Donghan Yu, Wei-Cheng Chang, Guokun Lai, Yiming Yang:
Correlation-Aware Change-Point Detection via Graph Neural Networks. ICONIP (3) 2020: 555-567 - [c16]Sufian Latif, Yu Hao, Hailong Zhang, Raef Bassily, Atanas Rountev:
Introducing Differential Privacy Mechanisms for Mobile App Analytics of Dynamic Content. ICSME 2020: 267-277 - [c15]Yizhuo Zhai, Yu Hao, Hang Zhang, Daimeng Wang, Chengyu Song
, Zhiyun Qian, Mohsen Lesani, Srikanth V. Krishnamurthy, Paul Yu
:
UBITect: a precise and scalable method to detect use-before-initialization bugs in Linux kernel. ESEC/SIGSOFT FSE 2020: 221-232 - [i3]Ruohong Zhang, Yu Hao, Donghan Yu, Wei-Cheng Chang, Guokun Lai, Yiming Yang:
Explainable Unsupervised Change-point Detection via Graph Neural Networks. CoRR abs/2004.11934 (2020) - [i2]Lingjing Wang, Yu Hao, Xiang Li, Yi Fang:
3D Meta-Registration: Learning to Learn Registration of 3D Point Clouds. CoRR abs/2010.11504 (2020)
2010 – 2019
- 2019
- [j3]YuWei Zhao, Tinghuai Ma, Yu Hao, Wenhai Shen, Yuan Tian, Abdullah Al-Dhelaan:
ICRA: index based cache replacement algorithm for cloud storage. Int. J. Sens. Networks 29(1): 48-57 (2019) - [c14]Ilja Gubins, Gijs van der Schot, Remco C. Veltkamp, Friedrich Förster
, Xuefeng Du, Xiangrui Zeng, Zhenxi Zhu, Lufan Chang, Min Xu, Emmanuel Moebel, Antonio Martínez-Sánchez
, Charles Kervrann, Tuan Manh Lai, Xusi Han, Genki Terashi, Daisuke Kihara, Benjamin A. Himes, Xiaohua Wan, Jingrong Zhang, Shan Gao, Yu Hao, Zhilong Lv, Xiaohua Wan, Zhidong Yang, Zijun Ding, Xuefeng Cui, Fa Zhang:
Classification in Cryo-Electron Tomograms. 3DOR@Eurographics 2019: 49-54 - [c13]Yu Hao, Xien Liu, Ji Wu, Ping Lv:
Exploiting Sentence Embedding for Medical Question Answering. AAAI 2019: 938-945 - [c12]JungKyoon Yoon, Shuran Li, Yu Hao
, Chajoong Kim:
Towards Emotional Well-Being by Design: 17 Opportunities for Emotion Regulation for User-Centered Healthcare Design. PervasiveHealth 2019: 351-355 - 2018
- [j2]Tinghuai Ma
, Yu Hao, Wenhai Shen, Yuan Tian
, Mznah Al-Rodhaan:
An Improved Web Cache Replacement Algorithm Based on Weighting and Cost. IEEE Access 6: 27010-27017 (2018) - [j1]Tinghuai Ma, Yu Hao, Xiafei Suo, Yu Xue, Jie Cao:
A weighted collaboration network generalization method for privacy protection in C-DBLP. Intell. Data Anal. 22(1): 3-19 (2018) - [c11]Yu Hao, Renmin Han, Xiaohua Wan, Fa Zhang, Shiwei Sun:
Fiducial marker detection via deep learning approach for electron tomography. BIBM 2018: 642-645 - [i1]Yu Hao, Xien Liu, Ji Wu, Ping Lv:
Exploiting Sentence Embedding for Medical Question Answering. CoRR abs/1811.06156 (2018) - 2017
- [c10]Yu Hao
:
Dynamic emotion transitions based on emotion hysteresis. ACII 2017: 606-610 - 2016
- [c9]Chaohui Lv, Yu Hao, Mengyuan Xie:
Intelligent stage LED light control system based on Android smart phone. CISP-BMEI 2016: 1201-1205 - 2015
- [c8]Yu Hao
, Donghai Wang, James G. Budd:
Design of intelligent emotion feedback to assist users regulate emotions: Framework and principles. ACII 2015: 938-943 - 2014
- [c7]Yu Hao
, James G. Budd, Melody Moore Jackson, Mukul Sati, Sandeep Soni:
A visual feedback design based on a brain-computer interface to assist users regulate their emotional state. CHI Extended Abstracts 2014: 2491-2496 - 2013
- [c6]Yu Hao, Yida Gong, Young Mi (Christina) Choi:
Improving Management of Medical Equipment. HCI (11) 2013: 75-84 - 2012
- [c5]Yu Hao, Su Quan, Tang Jiandong:
Development of analyzer for non-invasive detection of helicobacter pylori with CO2 collecting card. BHI 2012: 526-529 - 2010
- [c4]Lianguan Shen, Heng Liu, Mujun Li, Yu Hao, Meiyan Wang, Jian Li, Jinjin Zheng:
Collaborative 3D CAD system for multiple user design. CSCWD 2010: 548-552
2000 – 2009
- 2008
- [c3]Lianguan Shen, Meiyan Wang, Yu Hao, Gaofei Zhao, Zhao Shu, Sun Yuan, Xiaodong Wang, Mujun Li, Jinjin Zheng:
MEMS lithography collaborative simulation environment research. CSCWD 2008: 913-918 - 2007
- [c2]Lianguan Shen, Yu Hao, Mujun Li, Wei Zhao, Jinjin Zheng:
A Synchronous Collaborative Environment for Engineering Design Education. CSCWD 2007: 298-303 - 2006
- [c1]Zou Gang, Meng Yao, Yu Hao, Fumihito Nishino
:
A Web-Based Method for Building Company Name Knowledge Base. APWeb 2006: 1118-1125
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2022-05-04 23:06 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint