Hongyu Yang

Orcid: 0009-0003-1027-622X

According to our database1, Hongyu Yang authored at least 173 papers between 2005 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Enhancing air traffic control: A transparent deep reinforcement learning framework for autonomous conflict resolution.
Expert Syst. Appl., 2025

2024
Long-Term Airport Network Performance Forecasting With Linear Diffusion Graph Networks.
IEEE Trans. Intell. Transp. Syst., November, 2024

CAG-Malconv: A Byte-Level Malware Detection Method With CBAM and Attention-GRU.
IEEE Trans. Netw. Serv. Manag., October, 2024

SA<sup>3</sup>WT: Adaptive Wavelet-Based Transformer with Self-Paced Auto Augmentation for Face Forgery Detection.
Int. J. Comput. Vis., October, 2024

A novel Android malware detection method with API semantics extraction.
Comput. Secur., February, 2024

Graph-guided deep hashing networks for similar patient retrieval.
Comput. Biol. Medicine, February, 2024

Spatiotemporal Propagation Learning for Network-Wide Flight Delay Prediction.
IEEE Trans. Knowl. Data Eng., January, 2024

Touchformer: A Transformer-Based Two-Tower Architecture for Tactile Temporal Signal Classification.
IEEE Trans. Haptics, 2024

Theoretical Model and Experimental Investigation on Integrated Calibration in MFPP With a Bi-Telecentric Camera and a Scheimpflug Projector.
IEEE Trans. Instrum. Meas., 2024

LSTPNet: Long short-term perception network for dynamic facial expression recognition in the wild.
Image Vis. Comput., 2024

Integrating prior knowledge into a bibranch pyramid network for medical image segmentation.
Image Vis. Comput., 2024

Hierarchical disentangled representation for image denoising and beyond.
Image Vis. Comput., 2024

Multi-Hop Distributed Clustering Algorithm Based on Link Duration.
IEICE Trans. Commun., 2024

MRAN: Multimodal relationship-aware attention network for fake news detection.
Comput. Stand. Interfaces, 2024

MRFM: A timely detection method for DDoS attacks in IoT with multidimensional reconstruction and function mapping.
Comput. Stand. Interfaces, 2024

Affective Behavior Analysis using Task-adaptive and AU-assisted Graph Network.
CoRR, 2024

Aligning LLMs through Multi-perspective User Preference Ranking-based Feedback for Programming Question Answering.
CoRR, 2024

ArtNeRF: A Stylized Neural Field for 3D-Aware Cartoonized Face Synthesis.
CoRR, 2024

DreamScape: 3D Scene Creation via Gaussian Splatting joint Correlation Modeling.
CoRR, 2024

Deep Common Feature Mining for Efficient Video Semantic Segmentation.
CoRR, 2024

PRX-Change: Enhancing remote sensing change detection through progressive feature refinement and Cross-Attention interaction.
Int. J. Appl. Earth Obs. Geoinformation, 2024

Distributed multi-hop clustering algorithm for aeronautical ad-hoc network.
Ad Hoc Networks, 2024

Depth-Aware Dual-Stream Interactive Transformer Network for Facial Expression Recognition.
Proceedings of the Pattern Recognition and Computer Vision - 7th Chinese Conference, 2024

3D Face Modeling via Weakly-Supervised Disentanglement Network Joint Identity-Consistency Prior.
Proceedings of the 18th IEEE International Conference on Automatic Face and Gesture Recognition, 2024

DrFER: Learning Disentangled Representations for 3D Facial Expression Recognition.
Proceedings of the 18th IEEE International Conference on Automatic Face and Gesture Recognition, 2024

Initno: Boosting Text-to-Image Diffusion Models via Initial Noise Optimization.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024

Exploration of Foot-based Text Entry Techniques for Virtual Reality Environments.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2024

2023
Improving airport arrival flow prediction considering heterogeneous and dynamic network dependencies.
Inf. Fusion, December, 2023

Multiscale progressive text prompt network for medical image segmentation.
Comput. Graph., November, 2023

A Specific Emitter Identification System Design for Crossing Signal Modes in the Air Traffic Control Radar Beacon System and Wireless Devices.
Sensors, October, 2023

Noninvasive Brain Imaging and Stimulation in Post-Stroke Motor Rehabilitation: A Review.
IEEE Trans. Cogn. Dev. Syst., September, 2023

The DC Microgrid-Based SoC Adaptive Droop Control Algorithm.
J. Circuits Syst. Comput., August, 2023

Learning the degradation distribution for medical image superresolution via sparse swin transformer.
Comput. Graph., August, 2023

Universal wavelength reuse mechanism for optical networks-on-chip based on a cooperative game.
J. Opt. Commun. Netw., June, 2023

Differential evolution with variable leader-adjoint populations.
Appl. Intell., June, 2023

An image-based facial acupoint detection approach using high-resolution network and attention fusion.
IET Biom., May, 2023

Population reduction with individual similarity for differential evolution.
Artif. Intell. Rev., May, 2023

Enhancing differential evolution algorithm using leader-adjoint populations.
Inf. Sci., April, 2023

An Order Reduction Design Framework for Higher-Order Binary Markov Random Fields.
Entropy, March, 2023

ImFace++: A Sophisticated Nonlinear 3D Morphable Face Model with Implicit Neural Representations.
CoRR, 2023

Enhancing Representation Learning for Periodic Time Series with Floss: A Frequency Domain Regularization Approach.
CoRR, 2023

Iterative Reconstruction Based on Latent Diffusion Model for Sparse Data Reconstruction.
CoRR, 2023

Hierarchical Disentangled Representation for Invertible Image Denoising and Beyond.
CoRR, 2023

A DGA Domain Name Detection Method Based on Two-Stage Feature Reinforcement.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

EAMDM: An Evolved Android Malware Detection Method Using API Clustering.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

Long Short-Term Perception Network for Dynamic Facial Expression Recognition.
Proceedings of the Pattern Recognition and Computer Vision - 6th Chinese Conference, 2023

An Improved Capsule Network for DGA Domain Detection.
Proceedings of the 19th International Conference on Mobility, Sensing and Networking, 2023

A Semantics-Aware Normalizing Flow Model for Anomaly Detection.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023

DLAHSD: Dynamic Label Adopted In Auxiliary Head for SAR Detection.
Proceedings of the IEEE International Conference on Image Processing, 2023

Flow-Based One-Class Anomaly Detection with Multi-Frequency Feature Fusion.
Proceedings of the IEEE International Conference on Image Processing, 2023

A Fake News Detection Method Based on a Multimodal Cooperative Attention Network.
Proceedings of the Information and Communications Security - 25th International Conference, 2023

Denoising Diffusion Autoencoders are Unified Self-supervised Learners.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

CS-LSTM: a hybrid channel estimation scheme in IDFT-VFDM system.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2023

Visual-Haptic-Kinesthetic Object Recognition with Multimodal Transformer.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2023, 2023

GanNeXt: A New Convolutional GAN for Anomaly Detection.
Proceedings of the Artificial Neural Networks and Machine Learning, 2023

Unsupervised 3D Animal Canonical Pose Estimation with Geometric Self-Supervision.
Proceedings of the 17th IEEE International Conference on Automatic Face and Gesture Recognition, 2023

NeuFace: Realistic 3D Neural Face Rendering from Multi-View Images.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

An Android Malware Detection Method Using Better API Contextual Information.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023

A Multi-scene Webpage Fingerprinting Method Based on Multi-head Attention and Data Enhancement.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023

Learning Polysemantic Spoof Trace: A Multi-Modal Disentanglement Network for Face Anti-spoofing.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
IoT botnet detection with feature reconstruction and interval optimization.
Int. J. Intell. Syst., December, 2022

Ref-ZSSR: Zero-Shot Single Image Superresolution with Reference Image.
Comput. Graph. Forum, October, 2022

Pyramid Attention "Zero-Shot" Network for Single-Image Superresolution.
IEEE Trans. Netw. Sci. Eng., 2022

An Adaptive IoT Network Security Situation Prediction Model.
Mob. Networks Appl., 2022

Structure-aware siamese graph neural networks for encounter-level patient similarity learning.
J. Biomed. Informatics, 2022

An Adaptive Specific Emitter Identification System for Dynamic Noise Domain.
IEEE Internet Things J., 2022

Discovering regression-detection bi-knowledge transfer for unsupervised cross-domain crowd counting.
Neurocomputing, 2022

Network security situation assessment with network attack behavior classification.
Int. J. Intell. Syst., 2022

Explainable and Safe Reinforcement Learning for Autonomous Air Mobility.
CoRR, 2022

STS: Surround-view Temporal Stereo for Multi-view 3D Detection.
CoRR, 2022

Spatiotemporal Propagation Learning for Network-Wide Flight Delay Prediction.
CoRR, 2022

Malware detection based on visualization of recombined API instruction sequence.
Connect. Sci., 2022

New stability results of generalized impulsive functional differential equations.
Sci. China Inf. Sci., 2022

A backtracking differential evolution with multi-mutation strategies autonomy and collaboration.
Appl. Intell., 2022

Quality Judgment of 3D Face Point Cloud Based on Feature Fusion.
IEEE Access, 2022

Source Code Vulnerability Detection Using Vulnerability Dependency Representation Graph.
Proceedings of the IEEE International Conference on Trust, 2022

DRICP: Defect Risk Identification Using Sample Category Perception.
Proceedings of the IEEE International Conference on Trust, 2022

A Defect Heterogeneous Risk Assessment Method with Misclassification Cost.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2022

Multi-view Gait Video Synthesis.
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022

Depth Completion Using Geometry-Aware Embedding.
Proceedings of the 2022 International Conference on Robotics and Automation, 2022

DSTAGNN: Dynamic Spatial-Temporal Aware Graph Neural Network for Traffic Flow Forecasting.
Proceedings of the International Conference on Machine Learning, 2022

Heterogeneous sEMG Sensing for Stroke Motor Restoration Assessment.
Proceedings of the Intelligent Robotics and Applications - 15th International Conference, 2022

A Synchronous Acquisition System of Ultrasound, sEMG and IMU for Human Motion Prediction.
Proceedings of the Intelligent Robotics and Applications - 15th International Conference, 2022

Design of Wireless Synchronous sEMG Information Acquisition System.
Proceedings of the Intelligent Robotics and Applications - 15th International Conference, 2022

A Transformer-Based GAN for Anomaly Detection.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2022, 2022

Face Super-Resolution with Spatial Attention Guided by Multiscale Receptive-Field Features.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2022, 2022

ImFace: A Nonlinear 3D Morphable Face Model with Implicit Neural Representations.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

ABPN: Adaptive Blend Pyramid Network for Real-Time Local Retouching of Ultra High-Resolution Photo.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

VDHGT: A Source Code Vulnerability Detection Method Based on Heterogeneous Graph Transformer.
Proceedings of the Cyberspace Safety and Security - 14th International Symposium, 2022

A Defect Level Assessment Method Based on Weighted Probability Ensemble.
Proceedings of the Cyberspace Safety and Security - 14th International Symposium, 2022

A Multi-stage APT Attack Detection Method Based on Sample Enhancement.
Proceedings of the Cyberspace Safety and Security - 14th International Symposium, 2022

Animal Pose Refinement in 2D Images with 3D Constraints.
Proceedings of the 33rd British Machine Vision Conference 2022, 2022

2021
A Multi-Dimensional Goal Aircraft Guidance Approach Based on Reinforcement Learning with a Reward Shaping Algorithm.
Sensors, 2021

Learning Continuous Face Age Progression: A Pyramid of GANs.
IEEE Trans. Pattern Anal. Mach. Intell., 2021

A Novel Algorithm for Improving Malicious Node Detection Effect in Wireless Sensor Networks.
Mob. Networks Appl., 2021

Online Rebuilding Regression Random Forests.
Knowl. Based Syst., 2021

Stability of delayed switched systems via Razumikhin technique and application to switched neural networks.
IMA J. Math. Control. Inf., 2021

Long short-term memory self-adapting online random forests for evolving data stream regression.
Neurocomputing, 2021

Intensity enhancement via GAN for multimodal face expression recognition.
Neurocomputing, 2021

A Pythagorean fuzzy Petri net based security assessment model for civil aviation airport security inspection information system.
Int. J. Intell. Syst., 2021

Disentangled generative adversarial network for low-dose CT.
EURASIP J. Adv. Signal Process., 2021

Identify Apple Leaf Diseases Using Deep Learning Algorithm.
CoRR, 2021

Small data assisting face image illumination normalization.
Comput. Graph., 2021

A network security situation assessment method based on adversarial deep learning.
Appl. Soft Comput., 2021

Comprehensive Degree Based Key Node Recognition Method in Complex Networks.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

Image Inpainting via Conditional Texture and Structure Dual Generation.
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021

Boundary Guided Context Aggregation for Semantic Segmentation.
Proceedings of the 32nd British Machine Vision Conference 2021, 2021

2020
A Security Situation Assessment Model of Information System for Smart Mobile Devices.
Wirel. Commun. Mob. Comput., 2020

Asymmetric Joint GANs for Normalizing Face Illumination From a Single Image.
IEEE Trans. Multim., 2020

Cross-Layer Network Lifetime Maximization in Underwater Wireless Sensor Networks.
IEEE Syst. J., 2020

An Unsupervised Learning-Based Network Threat Situation Assessment Model for Internet of Things.
Secur. Commun. Networks, 2020

A Key Business Node Identification Model for Internet of Things Security.
Secur. Commun. Networks, 2020

Online random forests regression with memories.
Knowl. Based Syst., 2020

Mitigating LFA through segment rerouting in IoT environment with traceroute flow abnormality detection.
J. Netw. Comput. Appl., 2020

Normalization of face illumination with photorealistic texture via deep image prior synthesis.
Neurocomputing, 2020

Three-Way Decisions with Intuitionistic Uncertain Linguistic Decision-Theoretic Rough Sets Based on Generalized Maclaurin Symmetric Mean Operators.
Int. J. Fuzzy Syst., 2020

Towards Unsupervised Crowd Counting via Regression-Detection Bi-knowledge Transfer.
Proceedings of the MM '20: The 28th ACM International Conference on Multimedia, 2020

Intensity Enhancement Via Gan for Multimodal Facial Expression Recognition.
Proceedings of the IEEE International Conference on Image Processing, 2020

A Variational Generative Network Based Network Threat Situation Assessment.
Proceedings of the Information and Communications Security - 22nd International Conference, 2020

A Random Access Protocol Based on Idle Pilot Reallocation for Crowded Massive MIMO Systems.
Proceedings of the ICECC 2020: The 3rd International Conference on Electronics, 2020

Pixel Sampling for Style Preserving Face Pose Editing.
Proceedings of the 2020 IEEE International Joint Conference on Biometrics, 2020

3D Face Mask Anti-spoofing via Deep Fusion of Dynamic Texture and Shape Clues.
Proceedings of the 15th IEEE International Conference on Automatic Face and Gesture Recognition, 2020

Fuzzy Petri Nets Based Information System Security Situation Assessment Model.
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020

Learning Invariant Representation for Unsupervised Image Restoration.
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020

Comparing the Tangible Tutorial System and the Human Teacher in Intangible Cultural Heritage Education.
Proceedings of the DIS '20: Designing Interactive Systems Conference 2020, 2020

2019
Visual Attention Network for Low-Dose CT.
IEEE Signal Process. Lett., 2019

New stability results for impulsive neural networks with time delays.
Neural Comput. Appl., 2019

Some Maclaurin Symmetric Mean Aggregation Operators Based on Cloud Model and Their Application to Decision-Making.
Int. J. Inf. Technol. Decis. Mak., 2019

Research on RSA and Hill hybrid encryption algorithm.
Int. J. Comput. Sci. Eng., 2019

Hybridizing Dragonfly Algorithm with Differential Evolution for Global Optimization.
IEICE Trans. Inf. Syst., 2019

Self-adaptive mutation differential evolution algorithm based on particle swarm optimization.
Appl. Soft Comput., 2019

A differential evolution algorithm with dual preferred learning mutation.
Appl. Intell., 2019

Wireless Network Intrusion Detection Based on Improved Convolutional Neural Network.
IEEE Access, 2019

Combined Wireless Network Intrusion Detection Model Based on Deep Learning.
IEEE Access, 2019

Blockchain-Based Secure and Trustworthy Internet of Things in SDN-Enabled 5G-VANETs.
IEEE Access, 2019

Connectivity-Aware UAV Path Planning with Aerial Coverage Maps.
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019

Attacking Gait Recognition Systems via Silhouette Guided GANs.
Proceedings of the 27th ACM International Conference on Multimedia, 2019

Mitigating Link-Flooding Attack with Segment Rerouting in SDN.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

2018
Self-adaptive differential evolution algorithm with improved mutation strategy.
Soft Comput., 2018

New Multi-Keyword Ciphertext Search Method for Sensor Network Cloud Platforms.
Sensors, 2018

Dynamic Risk Access Control Model for Cloud Platform.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Cross-Layer Design for Network Lifetime Maximization in Underwater Wireless Sensor Networks.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Learning Face Age Progression: A Pyramid Architecture of GANs.
Proceedings of the 2018 IEEE Conference on Computer Vision and Pattern Recognition, 2018

2017
Facial aging simulation via tensor completion and metric learning.
IET Comput. Vis., 2017

Geometry Clipmaps Terrain Rendering Using Hardware Tessellation.
IEICE Trans. Inf. Syst., 2017

Self-adaptive differential evolution algorithm with improved mutation mode.
Appl. Intell., 2017

Scalable Bayesian Rule Lists.
Proceedings of the 34th International Conference on Machine Learning, 2017

Interference-Avoid-Concept Based Indoor VLC Network Throughput Optimization.
Proceedings of the Geo-Spatial Knowledge and Intelligence - 5th International Conference, 2017

2016
Face Aging Effect Simulation Using Hidden Factor Analysis Joint Sparse Representation.
IEEE Trans. Image Process., 2016

Efficient kd-tree construction for ray tracing using ray distribution sampling.
Multim. Tools Appl., 2016

Power Consumption Based Android Malware Detection.
J. Electr. Comput. Eng., 2016

DepAudioNet: An Efficient Deep Model for Audio based Depression Classification.
Proceedings of the 6th International Workshop on Audio/Visual Emotion Challenge, 2016

Research on Collaborative Strategic Air Traffic Flow Management Based on BDI Agent.
Proceedings of the 13th International Conference on Embedded Software and Systems, 2016

2015
Evacuation Simulation Incorporating Safety Signs and Information Sharing.
Proceedings of the Image and Graphics - 8th International Conference, 2015

Facial Aging Simulation via Tensor Completion.
Proceedings of the Biometric Recognition - 10th Chinese Conference, 2015

2014
Sensor Fusion Method for Horizon Detection From an Aircraft in Low Visibility Conditions.
IEEE Trans. Instrum. Meas., 2014

An approach to facial expression recognition integrating radial basis function kernel and multidimensional scaling analysis.
Soft Comput., 2014

A Fast Kd-tree Construction for Ray Tracing based on Efficient Ray Distribution.
J. Softw., 2014

Detecting soft shadows in a single outdoor image: From local edge-based models to global constraints.
Comput. Graph., 2014

Age invariant face recognition based on texture embedded discriminative graph model.
Proceedings of the IEEE International Joint Conference on Biometrics, Clearwater, 2014

2013
Web Service Replacement Algorithm based on Complex Network.
J. Networks, 2013

Oscillation Criteria for Second Order Nonlinear Neutral Perturbed Dynamic Equations on Time Scales.
J. Comput., 2013

Facial Expression Recognition Based on Incremental Isomap with Expression Weighted Distance.
J. Comput., 2013

Traffic Flow Simulator Using Virtual Controller Model.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

Next Big Thing in Big Data: The Security of the ICT Supply Chain.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

Depression recognition based on dynamic facial and vocal expression features using partial least square regression.
Proceedings of the 3rd ACM international workshop on Audio/visual emotion challenge, 2013

2012
Oscillation Criteria for Nonlinear Neutral Perturbed Dynamic Equations on Time Scales.
Proceedings of the Information Computing and Applications - Third International Conference, 2012

2008
A New Approach to Network Anomaly Attack Detection.
Proceedings of the Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008

Independent Component Analysis of Event-related Functional Near-infrared Spectroscopy (fNIRS).
Proceedings of the 2008 International Conference on BioMedical Engineering and Informatics, 2008

2006
Clustering and Classification Based Anomaly Detection.
Proceedings of the Fuzzy Systems and Knowledge Discovery, Third International Conference, 2006

Network Anomalous Attack Detection Based on Clustering and Classifier.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

2005
IntegratedMap: a Web interface for integrating genetic map data.
Bioinform., 2005

OxfordGrid: a web interface for pairwise comparative map views.
Bioinform., 2005


  Loading...