Xiaobo Hu

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2024
Building Category Graphs Representation with Spatial and Temporal Attention for Visual Navigation.
ACM Trans. Multim. Comput. Commun. Appl., July, 2024

Disturbance rejection with compensation on features.
Pattern Recognit., March, 2024

Agent-Centric Relation Graph for Object Visual Navigation.
IEEE Trans. Circuits Syst. Video Technol., February, 2024

Adversarial Feature Equilibrium Network for Multimodal Change Detection in Heterogeneous Remote Sensing Images.
IEEE Trans. Geosci. Remote. Sens., 2024

An Intrusion Detection Method Based on Attention Mechanism to Improve CNN-BiLSTM Model.
Comput. J., 2024

How to Learn Domain-Invariant Representations for Visual Reinforcement Learning: An Information-Theoretical Perspective.
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024

What Effects the Generalization in Visual Reinforcement Learning: Policy Consistency with Truncated Return Prediction.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Disturbance rejection in pattern recognition: a realization of quantum neural network.
Quantum Inf. Process., November, 2023

Efficient Exploitation of Noise Leakage for Template Attack.
IEEE Embed. Syst. Lett., September, 2023

Skill-Based Hierarchical Reinforcement Learning for Target Visual Navigation.
IEEE Trans. Multim., 2023

Semi-Direct Multimap SLAM System for Real-Time Sparse 3-D Map Reconstruction.
IEEE Trans. Instrum. Meas., 2023

Autonomous Multirobot Navigation and Cooperative Mapping in Partially Unknown Environments.
IEEE Trans. Instrum. Meas., 2023

Towards Disturbance Rejection in Feature Pyramid Network.
IEEE Trans. Artif. Intell., 2023

A Reliable Representation with Bidirectional Transition Model for Visual Reinforcement Learning Generalization.
CoRR, 2023

PyramidFlow: High-Resolution Defect Contrastive Localization Using Pyramid Normalizing Flow.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

2022
NrtNet: An Unsupervised Method for 3D Non-Rigid Point Cloud Registration Based on Transformer.
Sensors, 2022

Improved-STCN Network with Enhanced Strategy for Sequence Polyp Segmentation.
Proceedings of the 4th International Workshop and Challenge on Computer Vision in Endoscopy (EndoCV 2022) co-located with the 19th IEEE International Symposium on Biomedical Imaging (ISBI 2022), 2022

Variance analysis based distinguisher for template attack.
Proceedings of the 18th International Conference on Computational Intelligence and Security, 2022

2021
Preventing Overfitting via Sample Reweighting for Recommender System Incremental Update (Student Abstract).
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
Resistive Effects on the Spatially Resolved Absolute Electroluminescence of Thin-Film Cu(In, Ga)Se<sub>2</sub> Solar Cells Studied by a Distributed Two-Diode Model.
IEEE Access, 2020

Statistical Detection Of Collective Data Fraud.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2020

2019
Customer Value Analysis Method Based on Automotive Multi-value-Chain Collaboration.
Proceedings of the Computer Supported Cooperative Work and Social Computing, 2019

2018
A Real-Time Abnormal Data Detecting Strategy for Length Sensors Measurement.
Proceedings of the IEEE International Conference on Real-time Computing and Robotics, 2018

Active Shield Design for Security Chip in Smart Grid.
Proceedings of the Frontiers in Cyber Security - First International Conference, 2018

2017
Analysis of Investment Relationships Between Companies and Organizations Based on Knowledge Graph.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2017

Practical Partial-Nonce-Exposure Attack on ECC Algorithm.
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017

2014
Power analysis based reverse engineering on the secret round function of block ciphers.
Concurr. Comput. Pract. Exp., 2014

A chaotic image encryption scheme owning temp-value feedback.
Commun. Nonlinear Sci. Numer. Simul., 2014

Toward reverse engineering on secret S-boxes in block ciphers.
Sci. China Inf. Sci., 2014

Design for security test on cryptographic ICs for design-time security evaluation.
Proceedings of the 9th International Design and Test Symposium, 2014

2013
Using EEG to Improve Massive Open Online Courses Feedback Interaction.
Proceedings of the Workshops at the 16th International Conference on Artificial Intelligence in Education AIED 2013, 2013

2009
Research on the Clustering and Composition of P2P-Based Web Services.
Proceedings of the 2nd International Conference on BioMedical Engineering and Informatics, 2009


  Loading...