Hongyu Gao
Orcid: 0000-0002-0769-9577
According to our database1,
Hongyu Gao
authored at least 42 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Enhancing Multi-modal Regular Expression Synthesis via Large Language Models and Semantic Manipulations of Sub-expressions.
Proceedings of the Dependable Software Engineering. Theories, Tools, and Applications, 2024
2023
Computational thinking in early childhood is underpinned by sequencing ability and self-regulation: a cross-sectional study.
Educ. Inf. Technol., November, 2023
WD-UNeXt: Weight loss function and dropout U-Net with ConvNeXt for automatic segmentation of few shot brain gliomas.
IET Image Process., 2023
Proceedings of the Digital Multimedia Communications, 2023
Application Recommendation based on Metagraphs: Combining Behavioral and Published Information.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023
2022
Recursive Minimum-Variance Filter Design for State-Saturated Complex Networks With Uncertain Coupling Strengths Subject to Deception Attacks.
IEEE Trans. Cybern., 2022
Sci. Comput. Program., 2022
Boosting Multi-Modal E-commerce Attribute Value Extraction via Unified Learning Scheme and Dynamic Range Minimization.
CoRR, 2022
Robot programming versus block play in early childhood education: Effects on computational thinking, sequencing ability, and self-regulation.
Br. J. Educ. Technol., 2022
CAliC: Accurate and Efficient Image-Text Retrieval via Contrastive Alignment and Visual Contexts Modeling.
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022
2021
J. Syst. Softw., 2021
Sci. China Inf. Sci., 2021
Cooperation dynamics based on reputation in the mixed population with two species of strategists.
Appl. Math. Comput., 2021
2020
An Event-Triggering Approach to Recursive Filtering for Complex Networks With State Saturations and Random Coupling Strengths.
IEEE Trans. Neural Networks Learn. Syst., 2020
Non-fragile estimation for discrete-time T-S fuzzy systems with event-triggered protocol.
Kybernetika, 2020
Recursive filtering for time-varying systems under duty cycle scheduling based on collaborative prediction.
J. Frankl. Inst., 2020
Proceedings of the International Symposium on Theoretical Aspects of Software Engineering, 2020
2019
Proceedings of the 26th IEEE International Conference on Software Analysis, 2019
Proceedings of the 2019 International Symposium on Theoretical Aspects of Software Engineering, 2019
2017
基于Android平台的隐私泄漏静态检测工具的分析与比较 (Analysis and Comparison of Privacy Leak Static Detection Tools for Android Applications).
计算机科学, 2017
计算机科学, 2017
2016
IEEE/ACM Trans. Netw., 2016
IEEE/ACM Trans. Netw., 2016
Sci. Program., 2016
2014
Proceedings of the Seventh International Joint Conference on Computational Sciences and Optimization, 2014
Proceedings of the Seventh International Joint Conference on Computational Sciences and Optimization, 2014
Proceedings of the 30th Annual Computer Security Applications Conference, 2014
2013
Proceedings of the ACM SIGCOMM 2013 Conference, 2013
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
Proceedings of the 2013 10th Web Information System and Application Conference, 2013
2012
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
Proceedings of the Web Technologies and Applications, 2012
2011
A new Temporal-Constraint-Based algorithm by handling temporal qualities for video enhancement.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2011), 2011
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2011), 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
2010
Proceedings of the Web-Age Information Management, 2010
NetShield: massive semantics-based vulnerability signature matching for high-speed networks.
Proceedings of the ACM SIGCOMM 2010 Conference on Applications, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010