default search action
Yuping Hu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Jiayi Li, Yuping Hu, Xin Huang:
CaSaFormer: A cross- and self-attention based lightweight network for large-scale building semantic segmentation. Int. J. Appl. Earth Obs. Geoinformation 130: 103942 (2024) - [c9]Yuping Hu, Xin Huang, Jiayi Li, Zhen Zhang:
GBSS: A Global Building Semantic Segmentation Dataset for Large-Scale Remote Sensing Building Extraction. IGARSS 2024: 244-248 - [i1]Yuping Hu, Xin Huang, Jiayi Li, Zhen Zhang:
GBSS: a global building semantic segmentation dataset for large-scale remote sensing building extraction. CoRR abs/2401.01178 (2024) - 2023
- [c8]Yuping Hu, Qian Li:
Optimization Analysis of Product Design Process Based on Reinforcement Learning Algorithm. DSIE 2023: 312-321 - [c7]Yuping Hu, Danfeng Chen:
Product Design Process Based on GANs Model. DSIE 2023: 322-332 - 2021
- [j12]Xianfu Zhang, Yuping Hu, Ruimin Luo, Chao Li, Zhichuan Tang:
The Impact of Load Style Variation on Gait Recognition Based on sEMG Images Using a Convolutional Neural Network. Sensors 21(24): 8365 (2021) - 2020
- [j11]Zhuoyi Tan, Yuping Hu, Dongjun Luo, Man Hu, Kaihang Liu:
The clothing image classification algorithm based on the improved Xception model. Int. J. Comput. Sci. Eng. 23(3): 214-223 (2020)
2010 – 2019
- 2019
- [j10]Sen Zhang, Yuping Hu, Chunmei Wang:
Evaluation of borrower's credit of P2P loan based on adaptive particle swarm optimisation BP neural network. Int. J. Comput. Sci. Eng. 19(2): 197-205 (2019) - [j9]Fucheng Pan, Dezhi Han, Yuping Hu:
Design and application of real-time network abnormal traffic detection system based on Spark Streaming. Int. J. Embed. Syst. 11(5): 562-572 (2019) - [j8]Sen Zhang, Yuping Hu, Zhuoyi Tan:
Research on borrower's credit classification of P2P network loan based on LightGBM algorithm. Int. J. Embed. Syst. 11(5): 602-612 (2019) - 2017
- [j7]Wei Yan, Jing Sun, Zhenggang Liu, Yuping Hu:
A novel bi-subgroup adaptive evolutionary algorithm for optimizing degree of hybridization of HEV bus. Clust. Comput. 20(1): 497-505 (2017) - [c6]Xianfu Zhang, Shouqian Sun, Chao Li, Xiangyu Zhao, Yuping Hu:
DeepGait: A Learning Deep Convolutional Representation for Gait Recognition. CCBR 2017: 447-456 - [c5]Yuping Hu, Chunmei Wang, Hang Xiao, Sen Zhang:
A Clothing Image Retrieval System Based on Improved Itti Model. GSKI (2) 2017: 232-242 - 2016
- [j6]Yuping Hu, Hang Xiao, Dongjun Luo:
基于GrabCut改进算法的服装图像检索方法 (Clothing Image Retrieval Method Based on Improved GrabCut Algorithm). 计算机科学 43(Z11): 242-246 (2016) - 2011
- [j5]Yichun Liu, Yinghong Liang, Yuping Hu:
A Fair Payment Protocol for Cascading P2P Transaction. J. Networks 6(9): 1313-1320 (2011) - [j4]Zhijian Wang, Yuping Hu, Shaohua Li, Dingguo Wei:
Internetware Structure Description and Research of the Petri Net Method. J. Softw. 6(9): 1779-1786 (2011) - [j3]Yuping Hu, Zhijian Wang, Hui Liu, Guangjun Guo:
A Geometric Distortion Resilient Image Watermark Algorithm Based on DWT-DFT. J. Softw. 6(9): 1805-1812 (2011) - [c4]LingFeng Zhang, Xine You, Yuping Hu:
Image-Adaptive Watermarking Algorithm to Improve Watermarking Technology for Certain WaterMarking Based on DWT and Chaos. CSISE (1) 2011: 43-49
2000 – 2009
- 2009
- [j2]Jun Zhang, Yuping Hu, Zhibin Yuan:
Detection of LSB Matching Steganography using the Envelope of Histogram. J. Comput. 4(7): 646-653 (2009) - [j1]Yuping Hu, Jun Zhang:
A Secure and Efficient Buyer-Seller Watermarking Protocol. J. Multim. 4(3): 161-168 (2009) - 2008
- [c3]Yuping Hu:
A Watermarking Protocol for Piracy Tracing. ISECS 2008: 882-885 - [c2]Congxu Zhu, Yuping Hu:
A Multipurpose Watermarking Scheme for Image Authentication and Copyright Protection. ISECS 2008: 930-933 - 2004
- [c1]Shengsheng Yu, Yuping Hu, Jingli Zhou:
Content-based watermarking scheme for image authentication. ICARCV 2004: 1083-1087
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-28 01:29 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint