Yuhao Luo

Orcid: 0000-0001-5182-6783

According to our database1, Yuhao Luo authored at least 29 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
High-Order Taylor Expansion-Based Nonlinear Value Function Approximation for Stochastic Economic Dispatch of Active Distribution Network.
IEEE Trans. Smart Grid, September, 2024

Domain-Aware Cross-Attention for Cross-domain Recommendation.
CoRR, 2024

Can We Leave Deepfake Data Behind in Training Deepfake Detector?
Proceedings of the Advances in Neural Information Processing Systems 38: Annual Conference on Neural Information Processing Systems 2024, 2024

Data-Scarce Event Argument Extraction: A Dynamic Modular Prompt Tuning Model Based on Slot Transfer.
Proceedings of the 7th International Conference on Machine Learning and Natural Language Processing, 2024

GRANP: A Graph Recurrent Attentive Neural Process Model for Vehicle Trajectory Prediction.
Proceedings of the IEEE Intelligent Vehicles Symposium, 2024

ADVSV: An Over-the-Air Adversarial Attack Dataset for Speaker Verification.
Proceedings of the IEEE International Conference on Acoustics, 2024

Transcending Forgery Specificity with Latent Space Augmentation for Generalizable Deepfake Detection.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024

2023
Audio compression-assisted feature extraction for voice replay attack detection.
CoRR, 2023

Overview of the NLPCC 2023 Shared Task: Chinese Medical Instructional Video Question Answering.
Proceedings of the Natural Language Processing and Chinese Computing, 2023

Face Clustering via Graph Convolutional Networks with Confidence Edges.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

2022
A Lightweight Authentication Scheme Based on Consortium Blockchain for Cross-Domain IoT.
Secur. Commun. Networks, 2022

Towards Fast and Accurate Intimate Contact Recognition through Video Analysis.
Proceedings of the Eleventh International Conference on Image Processing Theory, 2022

They Like Comedy, Don't You? A Cluster-Based Meta-Learning for Cold-Start Recommendation.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2022

2021
Uncertainty in Bayesian deep label distribution learning.
Appl. Soft Comput., 2021

A multi-step decision prediction model based on LightGBM.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

2020
Dehaze of Cataractous Retinal Images Using an Unpaired Generative Adversarial Network.
IEEE J. Biomed. Health Informatics, 2020

2019
A detection method for low-pixel ratio object.
Multim. Tools Appl., 2019

Simultaneous Arteriole and Venule Segmentation of Dual-Modal Fundus Images Using a Multi-Task Cascade Network.
IEEE Access, 2019

β-Dropout: A Unified Dropout.
IEEE Access, 2019

2018
Pedestrian tracking in surveillance video based on modified CNN.
Multim. Tools Appl., 2018

A framework with updateable joint images re-ranking for Person Re-identification.
CoRR, 2018

A Flexible Lower Extremity Exoskeleton Robot with Deep Locomotion Mode Identification.
Complex., 2018

Comparision of different control algorithms for a knee exoskeleton.
Proceedings of the 15th International Conference on Control, 2018

2017
A control system of lower limb exoskeleton robots based on motor imagery.
Proceedings of the IEEE International Conference on Information and Automation, 2017

Design and control for a compliant knee exoskeleton.
Proceedings of the IEEE International Conference on Information and Automation, 2017

2012
Who-Works-With-Whom (WWWW): Web-based Directed Work Relationship Network for Maximizing Organizational Efficiency in Enterprises.
Proceedings of the Ninth International Conference on Information Technology: New Generations, 2012

Knowledge Services and Knowledge Building in E-learning.
Proceedings of the Ninth International Conference on Information Technology: New Generations, 2012

Android Malware Forensics: Reconstruction of Malicious Events.
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012

2010
Digital Forensic Analysis on Runtime Instruction Flow.
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010


  Loading...