Yujia Hu

Orcid: 0009-0009-1869-5756

According to our database1, Yujia Hu authored at least 26 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Non-rigid point cloud registration for middle ear diagnostics with endoscopic optical coherence tomography.
Int. J. Comput. Assist. Radiol. Surg., January, 2024

MTDroid: A Moving Target Defense-Based Android Malware Detector Against Evasion Attacks.
IEEE Trans. Inf. Forensics Secur., 2024

InstructAV: Instruction Fine-tuning Large Language Models for Authorship Verification.
CoRR, 2024

Contrastive Disentanglement for Authorship Attribution.
Proceedings of the Companion Proceedings of the ACM on Web Conference 2024, 2024

Real-Time Trajectory Synthesis with Local Differential Privacy.
Proceedings of the 40th IEEE International Conference on Data Engineering, 2024

ToxiCloakCN: Evaluating Robustness of Offensive Language Detection in Chinese with Cloaking Perturbations.
Proceedings of the 2024 Conference on Empirical Methods in Natural Language Processing, 2024

2023
LDPTrace: Locally Differentially Private Trajectory Synthesis.
Proc. VLDB Endow., 2023

Yelp Reviews and Food Types: A Comparative Analysis of Ratings, Sentiments, and Topics.
CoRR, 2023

Knowledge-refined Denoising Network for Robust Recommendation.
Proceedings of the 46th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2023

Who Wrote it and Why? Prompting Large-Language Models for Authorship Verification.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2023, 2023

Interpretable Sock Puppet Attribution.
Proceedings of the IEEE International Conference on Big Data, 2023

2022
Self-Guided Learning to Denoise for Robust Recommendation.
Proceedings of the SIGIR '22: The 45th International ACM SIGIR Conference on Research and Development in Information Retrieval, Madrid, Spain, July 11, 2022

2021
E<sup>2</sup>DTC: An End to End Deep Trajectory Clustering Framework via Self-Training.
Proceedings of the 37th IEEE International Conference on Data Engineering, 2021

Using Investor and News Sentiment in Tourism Stock Price Prediction based on XGBoost Model.
Proceedings of the 6th IEEE/ACIS International Conference on Big Data, 2021

Design of Electric Bicycle for Delivery from the Perspective of Perceptual Engineering.
Proceedings of the Advances in Usability, User Experience, Wearable and Assistive Technology, 2021

2019
基于预先缓存的连续查询隐私保护机制 (Pre-cache Based Privacy Protection Mechanism in Continuous LBS Queries).
计算机科学, 2019

P2TA: Privacy-preserving task allocation for edge computing enhanced mobile crowdsensing.
J. Syst. Archit., 2019

2018
Privacy-Preserving Task Allocation for Edge Computing Enhanced Mobile Crowdsensing.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

Incentivizing Multimedia Data Acquisition for Machine Learning System.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

2017
High Dimensional Ensemble Neuronal Activity Pattern Analysis: Visualization and Wave Detection Focused.
Proceedings of the 8th ACM International Conference on Bioinformatics, 2017

2015
Secrecy Outage on Transmit Antenna Selection With Weighting Errors at Maximal-Ratio Combiners.
IEEE Commun. Lett., 2015

Secrecy Outage Analysis of Multiuser Diversity With Unequal Average SNR in Transmit Antenna Selection Systems.
IEEE Commun. Lett., 2015

Secrecy analysis for selection among transmit antennas with unequal average SNR performance.
Proceedings of the 2015 IEEE Wireless Communications and Networking Conference, 2015

Analysis of Information-Guided Transmit Antenna Selection for Security Enhancement.
Proceedings of the IEEE 81st Vehicular Technology Conference, 2015

2014
Secrecy rate balancing for the downlink multiuser MISO system with independent confidential messages.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2014

Secrecy Outage Analysis of Transmit Antenna Selection with Switch-and-Examine Combining over Rayleigh Fading.
Proceedings of the IEEE 80th Vehicular Technology Conference, 2014


  Loading...