default search action
Yuhao Luo
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j9]Yuhao Luo, Jianquan Zhu, Jiajun Chen, Ruibing Wu, Haojiang Huang, Wenhao Liu, Mingbo Liu:
High-Order Taylor Expansion-Based Nonlinear Value Function Approximation for Stochastic Economic Dispatch of Active Distribution Network. IEEE Trans. Smart Grid 15(5): 4511-4521 (2024) - [c15]Zhiyuan Yan, Yuhao Luo, Siwei Lyu, Qingshan Liu, Baoyuan Wu:
Transcending Forgery Specificity with Latent Space Augmentation for Generalizable Deepfake Detection. CVPR 2024: 8984-8994 - [c14]Li Wang, Jiaqi Li, Yuhao Luo, Jiahao Zheng, Lei Wang, Hao Li, Ke Xu, Chengfang Fang, Jie Shi, Zhizheng Wu:
ADVSV: An Over-the-Air Adversarial Attack Dataset for Speaker Verification. ICASSP 2024: 4555-4559 - [c13]Yuhao Luo, Kehua Chen, Meixin Zhu:
GRANP: A Graph Recurrent Attentive Neural Process Model for Vehicle Trajectory Prediction. IV 2024: 370-375 - [i7]Yuhao Luo, Shiwei Ma, Mingjun Nie, Changping Peng, Zhangang Lin, Jingping Shao, Qianfang Xu:
Domain-Aware Cross-Attention for Cross-domain Recommendation. CoRR abs/2401.11705 (2024) - [i6]Yuhao Luo, Kehua Chen, Meixin Zhu:
GRANP: A Graph Recurrent Attentive Neural Process Model for Vehicle Trajectory Prediction. CoRR abs/2404.08004 (2024) - [i5]Jikang Cheng, Zhiyuan Yan, Ying Zhang, Yuhao Luo, Zhongyuan Wang, Chen Li:
Can We Leave Deepfake Data Behind in Training Deepfake Detector? CoRR abs/2408.17052 (2024) - 2023
- [c12]Yang Wu, Zhiwei Ge, Yuhao Luo, Lin Liu, Sulong Xu:
Face Clustering via Graph Convolutional Networks with Confidence Edges. ICCV 2023: 20933-20942 - [c11]Bin Li, Yixuan Weng, Hu Guo, Bin Sun, Shutao Li, Yuhao Luo, Mengyao Qi, Xufei Liu, Yuwei Han, Haiwen Liang, Shuting Gao, Chen Chen:
Overview of the NLPCC 2023 Shared Task: Chinese Medical Instructional Video Question Answering. NLPCC (3) 2023: 233-242 - [i4]Li Wang, Jiaqi Li, Yuhao Luo, Jiahao Zheng, Lei Wang, Hao Li, Ke Xu, Chengfang Fang, Jie Shi, Zhizheng Wu:
AdvSV: An Over-the-Air Adversarial Attack Dataset for Speaker Verification. CoRR abs/2310.05369 (2023) - [i3]Xiangyu Shi, Yuhao Luo, Li Wang, Haorui He, Hao Li, Lei Wang, Zhizheng Wu:
Audio compression-assisted feature extraction for voice replay attack detection. CoRR abs/2310.05813 (2023) - [i2]Zhiyuan Yan, Yuhao Luo, Siwei Lyu, Qingshan Liu, Baoyuan Wu:
Transcending Forgery Specificity with Latent Space Augmentation for Generalizable Deepfake Detection. CoRR abs/2311.11278 (2023) - 2022
- [j8]Yujian Zhang, Yuhao Luo, Xing Chen, Fei Tong, Yuwei Xu, Jun Tao, Guang Cheng:
A Lightweight Authentication Scheme Based on Consortium Blockchain for Cross-Domain IoT. Secur. Commun. Networks 2022: 9686049:1-9686049:15 (2022) - [c10]Feng Jiang, Qianfang Xu, Wenliang Li, Bo Xiao, Yuhao Luo:
They Like Comedy, Don't You? A Cluster-Based Meta-Learning for Cold-Start Recommendation. ICME 2022: 1-6 - [c9]Yuhao Luo, Hengjing Zhang, Hengchang Liu:
Towards Fast and Accurate Intimate Contact Recognition through Video Analysis. IPTA 2022: 1-6 - 2021
- [j7]Rui Zheng, Shulin Zhang, Lei Liu, Yuhao Luo, Mingzhai Sun:
Uncertainty in Bayesian deep label distribution learning. Appl. Soft Comput. 101: 107046 (2021) - [c8]Yuhao Luo, Qianfang Xu, Wenliang Li, Feng Jiang, Bo Xiao:
A multi-step decision prediction model based on LightGBM. IEEE BigData 2021: 5714-5718 - 2020
- [j6]Yuhao Luo, Kun Chen, Lei Liu, Jicheng Liu, Jianbo Mao, Genjie Ke, Mingzhai Sun:
Dehaze of Cataractous Retinal Images Using an Unpaired Generative Adversarial Network. IEEE J. Biomed. Health Informatics 24(12): 3374-3383 (2020)
2010 – 2019
- 2019
- [j5]Lei Liu, Yuhao Luo, Xu Shen, Mingzhai Sun, Bin Li:
β-Dropout: A Unified Dropout. IEEE Access 7: 36140-36153 (2019) - [j4]Shulin Zhang, Rui Zheng, Yuhao Luo, Xuewei Wang, Jianbo Mao, Cynthia J. Roberts, Mingzhai Sun:
Simultaneous Arteriole and Venule Segmentation of Dual-Modal Fundus Images Using a Multi-Task Cascade Network. IEEE Access 7: 57561-57573 (2019) - [j3]Rui Zhang, Dong Yin, Jinwen Ding, Yuhao Luo, Wei Liu, Mingyue Yuan, Chengfeng Zhu, Zhipeng Zhou:
A detection method for low-pixel ratio object. Multim. Tools Appl. 78(9): 11655-11674 (2019) - 2018
- [j2]Can Wang, Xinyu Wu, Yue Ma, Guizhong Wu, Yuhao Luo:
A Flexible Lower Extremity Exoskeleton Robot with Deep Locomotion Mode Identification. Complex. 2018: 5712108:1-5712108:9 (2018) - [j1]Yuhao Luo, Dong Yin, An Wang, Wentao Wu:
Pedestrian tracking in surveillance video based on modified CNN. Multim. Tools Appl. 77(18): 24041-24058 (2018) - [c7]Yuhao Luo, Can Wang, Zheng Wang, Yue Ma, Xinyu Wu:
Comparision of different control algorithms for a knee exoskeleton. ICARCV 2018: 585-590 - [i1]Mingyue Yuan, Dong Yin, Jingwen Ding, Yuhao Luo, Zhipeng Zhou, Chengfeng Zhu, Rui Zhang:
A framework with updateable joint images re-ranking for Person Re-identification. CoRR abs/1803.02983 (2018) - 2017
- [c6]Yuhao Luo, Can Wang, Zheng Wang, Yue Ma, Chao Wang, Xinyu Wu:
Design and control for a compliant knee exoskeleton. ICIA 2017: 282-287 - [c5]Zhouyang Wang, Can Wang, Guizhong Wu, Yuhao Luo, Xinyu Wu:
A control system of lower limb exoskeleton robots based on motor imagery. ICIA 2017: 311-316 - 2012
- [c4]Juanru Li, Dawu Gu, Yuhao Luo:
Android Malware Forensics: Reconstruction of Malicious Events. ICDCS Workshops 2012: 552-558 - [c3]Xinyu Zhang, Xiangyu Zhang, Yuhao Luo:
Who-Works-With-Whom (WWWW): Web-based Directed Work Relationship Network for Maximizing Organizational Efficiency in Enterprises. ITNG 2012: 652-655 - [c2]Xinyu Zhang, Yuhao Luo, Zhaohui Liang:
Knowledge Services and Knowledge Building in E-learning. ITNG 2012: 831-832 - 2010
- [c1]Juanru Li, Dawu Gu, Chaoguo Deng, Yuhao Luo:
Digital Forensic Analysis on Runtime Instruction Flow. e-Forensics 2010: 168-178
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-18 21:49 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint