default search action
Yong Hao
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j18]Yong Hao, Chengxiang Zhang, Xiyan Li:
DBM-ViT: A multiscale features fusion algorithm for health status detection in CXR / CT lungs images. Biomed. Signal Process. Control. 87(Part A): 105365 (2024) - [j17]Jiwen Ren, Yuming Xiong, Xinyu Chen, Yong Hao:
Comparative Analysis of Machine Learning and Deep Learning Algorithms for Assessing Agricultural Product Quality Using NIRS. Sensors 24(16): 5438 (2024) - [i1]Ye Zhang, Mengran Zhu, Kailin Gui, Jiayue Yu, Yong Hao, Haozhan Sun:
Development and Application of a Monte Carlo Tree Search Algorithm for Simulating Da Vinci Code Game Strategies. CoRR abs/2403.10720 (2024) - 2023
- [j16]Hui Xu, Hong He, Wei Xue, Zhuangzhuang Dai, Yong Hao:
Transfer learning and clustering analysis of epileptic EEG signals on Riemannian manifold. Appl. Soft Comput. 146: 110656 (2023) - 2022
- [j15]Tao Li, Yinquan Yu, Chaoqiang Huang, Jinwen Yang, Yuanchang Zhong, Yong Hao:
Method for predicting cutter remaining life based on multi-scale cyclic convolutional network. Int. J. Distributed Sens. Networks 18(5): 155013292211020 (2022) - [c15]Yong Hao, Jun Li, Bing Huang, Shuo Song:
Distributed Bearing-only Formation Splitting and Merging Control of Underactuated Autonomous Surface Vessels. ICCA 2022: 352-358 - [c14]Yong Hao, Shuo Song, Bing Huang, Jun Li:
Distributed Edge-event Triggered Formation Control for Multiple Unmanned Surface Vessels with Connectivity Preservation. ICCA 2022: 359-364 - 2021
- [j14]Hong He, Xinyue Liu, Yong Hao:
A progressive deep wavelet cascade classification model for epilepsy detection. Artif. Intell. Medicine 118: 102117 (2021) - [c13]Huimin Zhang, Hong He, Yong Hao, Hui Xu:
Brain Connectivity Feature Mining of Post-Encephalitis Epilepsy. ICCPR 2021: 18-23 - 2020
- [j13]Zhen Shi, Chengchen Deng, Sai Zhang, Yaen Xie, Hongtao Cui, Yong Hao:
Hyperbolic Tangent Function-Based Finite-Time Sliding Mode Control for Spacecraft Rendezvous Maneuver Without Chattering. IEEE Access 8: 60838-60849 (2020) - [j12]Yong Hao, Yushan He, Yaen Xie, Cong Sun, Kun Zhao:
Neural-Network Based Finite-Time Coordinated Formation Control for Spacecraft Without Unwinding. IEEE Access 8: 127507-127518 (2020) - [j11]Xiaobo Chen, Lin Zhao, Yong Hao, Lianhua Yu, Chengcai Lv:
An Evaluation Algorithm for the Interoperability of Global Navigation Satellite Systems. Traitement du Signal 37(1): 137-144 (2020) - [c12]Haiyong Zeng, Xu Zhu, Yufei Jiang, Zhongxiang Wei, Yong Hao:
Hybrid-Mode Multiple Access for UAV-BS Assisted Communications with UL-DL Rate Balancing. GLOBECOM 2020: 1-6
2010 – 2019
- 2019
- [j10]Lin Zhao, Kun Zhao, Yong Hao, Xinyu Zhang, Yushan He:
The Attitude Control Algorithm of Agile Optical Satellite Oriented to Nonparallel-Ground-Track-Imaging. IEEE Access 7: 164362-164373 (2019) - 2018
- [j9]Yuan Liu, Yong Hao, Weiwei Liu:
Loosely Formation-Displaced Geostationary Orbit Optimization with Complex Hybrid Sail Propulsion. Complex. 2018: 3576187:1-3576187:9 (2018) - [j8]Lin Zhao, Xiaowen Wu, Yuan Liu, Yong Hao:
A segmented attitude planning and controlling method for agile satellite based on Pseudospectral method. Trans. Inst. Meas. Control 40(4): 1188-1200 (2018) - 2017
- [c11]Wei Wu, Yong Hao:
Random Back-Off Mechanism for Contention-Based Uplink of SCMA. CSPS 2017: 1010-1017 - 2015
- [j7]Xiang Wu, Fangming Deng, Yong Hao, Zhihui Fu, Lihua Zhang:
Design of a Humidity Sensor Tag for Passive Wireless Applications. Sensors 15(10): 25564-25576 (2015) - 2014
- [j6]Jin Tang, Yu Cheng, Yong Hao, Wei Song:
SIP Flooding Attack Detection with a Multi-Dimensional Sketch Design. IEEE Trans. Dependable Secur. Comput. 11(6): 582-595 (2014) - 2013
- [j5]Yong Hao, Jin Tang, Yu Cheng:
Secure Cooperative Data Downloading in Vehicular Ad Hoc Networks. IEEE J. Sel. Areas Commun. 31(9-Supplement): 523-537 (2013) - [j4]Wenlong Shen, Lu Liu, Xianghui Cao, Yong Hao, Yu Cheng:
Cooperative Message Authentication in Vehicular Cyber-Physical Systems. IEEE Trans. Emerg. Top. Comput. 1(1): 84-97 (2013) - [c10]Yong Hao, Lifeng He, Tsuyoshi Nakamura, Yuyan Chao:
A fuzzy approach to object segmentation using depth image. ISDA 2013: 364-369 - 2012
- [c9]Xiaowen Wu, Lin Zhao, Yong Hao, Xin Yan:
An Novel Effective Simulation Method of Star Atlas for Star Identification. CSO 2012: 14-17 - [c8]Yong Hao, Tingting Han, Yu Cheng:
A cooperative message authentication protocol in VANETs. GLOBECOM 2012: 5562-5566 - [c7]Lin Zhao, Zhonghua Su, Yong Hao:
The star sensor layout based on geometric position analysis. ICAL 2012: 141-144 - [c6]Jin Tang, Yu Cheng, Yong Hao:
Detection and prevention of SIP flooding attacks in voice over IP networks. INFOCOM 2012: 1161-1169 - 2011
- [j3]Shou-Qiang Shen, Jian-Miao Cen, Yong Hao:
On the determinants and inverses of circulant matrices with Fibonacci and Lucas numbers. Appl. Math. Comput. 217(23): 9790-9797 (2011) - [j2]Yong Hao, Yu Cheng, Chi Zhou, Wei Song:
A Distributed Key Management Framework with Cooperative Message Authentication in VANETs. IEEE J. Sel. Areas Commun. 29(3): 616-629 (2011) - [c5]Yong Hao, Jin Tang, Yu Cheng:
Cooperative Sybil Attack Detection for Position Based Applications in Privacy Preserved VANETs. GLOBECOM 2011: 1-5 - 2010
- [j1]Yong Hao, Lifeng He, Tsuyoshi Nakamura, Yuyan Chao, Hidenori Itoh:
Spatial Object Segmentation Using Stereo Images. J. Adv. Comput. Intell. Intell. Informatics 14(6): 645-653 (2010) - [c4]Jin Tang, Yong Hao, Yu Cheng, Chi Zhou:
Detection of Resource-Drained Attacks on SIP-Based Wireless VoIP Networks. GLOBECOM 2010: 1-5 - [c3]Yong Hao, Jin Tang, Yu Cheng, Chi Zhou:
Secure Data Downloading with Privacy Preservation in Vehicular Ad Hoc Networks. ICC 2010: 1-5 - [c2]Jin Tang, Yu Cheng, Yong Hao, Chi Zhou:
Real-Time Detection of Selfish Behavior in IEEE 802.11 Wireless Networks. VTC Fall 2010: 1-5
2000 – 2009
- 2008
- [c1]Yong Hao, Yu Cheng, Kui Ren:
Distributed Key Management with Protection Against RSU Compromise in Group Signature Based VANETs. GLOBECOM 2008: 4951-4955
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint