default search action
Yuxiang Hong
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j16]Yuxiang Hong, Yuxuan Jiang, Mingxuan Yang, Baohua Chang, Dong Du:
Intelligent seam tracking in foils joining based on spatial-temporal deep learning from molten pool serial images. Robotics Comput. Integr. Manuf. 91: 102840 (2025) - 2024
- [j15]Yuxiang Hong, Mengyi Xu, Steven Furnell:
Situational support and information security behavioural intention: a comparative study using conservation of resources theory. Behav. Inf. Technol. 43(3): 523-539 (2024) - [j14]Yuxiang Hong, Mingxuan Yang, Ruiling Yuan, Dong Du, Baohua Chang:
A Novel Quality Monitoring Approach Based on Multigranularity Spatiotemporal Attentive Representation Learning During Climbing GTAW. IEEE Trans. Ind. Informatics 20(6): 8218-8228 (2024) - [c5]Yuxiang Hong, Da Wang, Majid Mohammad Shafiee, Merrill Warkentin:
Formation of Cybersecurity Awareness: A Positive Psychological Perspective. AMCIS 2024 - 2023
- [j13]Adéle da Veiga, Steven Furnell, Yuxiang Hong, Merrill Warkentin:
Introduction to the special issue on insider threats in cybersecurity. J. Inf. Secur. Appl. 79: 103585 (2023) - [j12]Yuxiang Hong, Mingxuan Yang, Baohua Chang, Dong Du:
Filter-PCA-Based Process Monitoring and Defect Identification During Climbing Helium Arc Welding Process Using DE-SVM. IEEE Trans. Ind. Electron. 70(7): 7353-7362 (2023) - [j11]Yuxiang Hong, Mingxuan Yang, Yuxuan Jiang, Dong Du, Baohua Chang:
Real-Time Quality Monitoring of Ultrathin Sheets Edge Welding Based on Microvision Sensing and SOCIFS-SVM. IEEE Trans. Ind. Informatics 19(4): 5506-5516 (2023) - 2022
- [j10]Yuxiang Hong, Steven Furnell:
Motivating Information Security Policy Compliance: Insights from Perceived Organizational Formalization. J. Comput. Inf. Syst. 62(1): 19-28 (2022) - 2021
- [j9]Yuxiang Hong, Steven Furnell:
Understanding cybersecurity behavioral habits: Insights from situational support. J. Inf. Secur. Appl. 57: 102710 (2021) - [j8]Yuxiang Hong, Mengyi Xu:
Autonomous Motivation and Information Security Policy Compliance: Role of Job Satisfaction, Responsibility, and Deterrence. J. Organ. End User Comput. 33(6): 1-17 (2021) - [j7]Bo Hong, Aiting Jia, Yuxiang Hong, Xiangwen Li, Jiapeng Gao, Yuanyuan Qu:
Online Extraction of Pose Information of 3D Zigzag-Line Welding Seams for Welding Seam Tracking. Sensors 21(2): 375 (2021) - 2020
- [j6]Jiahui Liu, Xu Jin, YuXiang Hong, Fan Liu, QiXiang Chen, Yalou Huang, MingMing Liu, Maoqiang Xie, Fengchi Sun:
Collaborative linear manifold learning for link prediction in heterogeneous networks. Inf. Sci. 511: 297-308 (2020) - [j5]Gaoyang Li, Yuxiang Hong, Jiapeng Gao, Bo Hong, Xiangwen Li:
Welding Seam Trajectory Recognition for Automated Skip Welding Guidance of a Spatially Intermittent Welding Seam Based on Laser Vision Sensor. Sensors 20(13): 3657 (2020)
2010 – 2019
- 2019
- [c4]Yuxiang Hong, Steven Furnell:
Organizational formalization and employee information security behavioral intentions based on an extended TPB model. Cyber Security 2019: 1-4 - 2018
- [j4]Yaogong Zhang, Jiahui Liu, Xiaohu Liu, Xin Fan, YuXiang Hong, Yuan Wang, Yalou Huang, Maoqiang Xie:
Prioritizing disease genes with an improved dual label propagation framework. BMC Bioinform. 19(1): 47:1-47:12 (2018) - [j3]Yuxiang Hong, Baohua Chang, Guodong Peng, Zhang Yuan, Xiangchun Hou, Boce Xue, Dong Du:
In-Process Monitoring of Lack of Fusion in Ultra-Thin Sheets Edge Welding Using Machine Vision. Sensors 18(8): 2411 (2018) - [c3]Yaogong Zhang, Yuan Wang, Jiahui Liu, Xiaohu Liu, Yuxiang Hong, Xin Fan, Yalou Huang:
IDLP: A Novel Label Propagation Framework for Disease Gene Prioritization. PAKDD (1) 2018: 261-272 - [c2]Xin Fan, YuXiang Hong, Xiaohu Liu, Yaogong Zhang, Maoqiang Xie:
Neighborhood Constraint Matrix Completion for Drug-Target Interaction Prediction. PAKDD (1) 2018: 348-360 - 2017
- [j2]Jinle Zeng, Baohua Chang, Dong Du, Guodong Peng, Shuhe Chang, Yuxiang Hong, Li Wang, Jiguo Shan:
A Vision-Aided 3D Path Teaching Method before Narrow Butt Joint Welding. Sensors 17(5): 1099 (2017) - [i1]Yaogong Zhang, Yingjie Xu, Xin Fan, YuXiang Hong, Jiahui Liu, Zhicheng He, Yalou Huang, Maoqiang Xie:
Mining Functional Modules by Multiview-NMF of Phenome-Genome Association. CoRR abs/1705.03998 (2017) - 2016
- [j1]Jinle Zeng, Baohua Chang, Dong Du, Yuxiang Hong, Shuhe Chang, Yirong Zou:
A Precise Visual Method for Narrow Butt Detection in Specular Reflection Workpiece Welding. Sensors 16(9): 1480 (2016) - [c1]Shuhe Chang, Yanqing Zhong, Zhenhua Quan, Yuxiang Hong, Jinle Zeng, Dong Du:
A real-time object tracking and image stabilization system for photographing in vibration environment using OpenTLD algorithm. ARSO 2016: 141-145
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-23 18:32 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint