


default search action
Yupeng Hu
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Yupeng Hu 0001
— Southwest Jiaotong University, Chengdu, Sichuan, China - Yupeng Hu 0002
— Shandong University, Qingdao, Shandong, China - Yupeng Hu 0003
— Shandong University, Jinan, China - Yupeng Hu 0004
— Hunan University, Changsha, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[j12]Yupeng Hu
, Yapeng Li, Jindong Tu
, Tinghuan Chen
, Qi Sun
, Cheng Zhuo:
Hierarchical Behavioral Learning-Based Dynamic Electromigration Analysis for Signal Networks. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 44(11): 4433-4437 (2025)
[c13]Wenxin Kuang, Qizhuang Liang, Peng Sun, Wei Fu, Qiao Hu, Yupeng Hu:
Unveiling the Pruning Risks on Privacy Vulnerabilities of Deep Neural Networks. ICASSP 2025: 1-5
[i3]Yupeng Hu, Changxing Ding, Chang Sun, Shaoli Huang, Xiangmin Xu:
Bilateral Collaboration with Large Vision-Language Models for Open Vocabulary Human-Object Interaction Detection. CoRR abs/2507.06510 (2025)
[i2]Qilang Ye, Wei Zeng, Meng Liu, Jie Zhang, Yupeng Hu, Zitong Yu, Yu Zhou:
When Eyes and Ears Disagree: Can MLLMs Discern Audio-Visual Confusion? CoRR abs/2511.10059 (2025)- 2024
[c12]Yuting Xiao
, Jiongyi Chen, Yupeng Hu, Jing Huang:
FIRMRES: Exposing Broken Device-Cloud Access Control in IoT Through Static Firmware Analysis. DSN 2024: 495-506- 2023
[i1]Xubin Zhong, Changxing Ding, Yupeng Hu, Dacheng Tao
:
Disentangled Interaction Representation for One-Stage Human-Object Interaction Detection. CoRR abs/2312.01713 (2023)- 2022
[c11]Zhiquan Tang, Qiao Hu, Yupeng Hu, Wenxin Kuang, Jiongyi Chen:
SEVulDet: A Semantics-Enhanced Learnable Vulnerability Detector. DSN 2022: 150-162- 2021
[j11]Li Zhang
, Weiping He, Yupeng Hu, Shuxia Wang, Huidong Bai
, Mark Billinghurst
:
Using the Visuo-Haptic Illusion to Perceive and Manipulate Different Virtual Objects in Augmented Reality. IEEE Access 9: 143782-143794 (2021)
[j10]Peng Zhan, Yupeng Hu, Lin Chen, Wei Luo, Xueqing Li:
SPAR: set-based piecewise aggregate representation for time series anomaly detection. Sci. China Inf. Sci. 64(4) (2021)
[j9]Yupeng Hu, Chong Yang, Peng Zhan, Jia Zhao, Yujun Li, Xueqing Li:
Efficient continuous KNN join processing for real-time recommendation. Pers. Ubiquitous Comput. 25(6): 1001-1011 (2021)
[c10]Shaohua Zhang, Weiping He, Shuxia Wang, Shuo Feng, Zhenghang Hou, Yupeng Hu:
An AR-Enabled See-Through System for Vision Blind Areas. HCI (44) 2021: 206-213- 2020
[j8]Peng Zhan, Changchang Sun, Yupeng Hu, Wei Luo, Jiecai Zheng, Xueqing Li:
Feature-Based Online Representation Algorithm for Streaming Time Series Similarity Search. Int. J. Pattern Recognit. Artif. Intell. 34(5): 2050010:1-2050010:25 (2020)
[c9]Yupeng Hu, Weiping He, Li Zhang
, Silian Li:
Enhancing Realism and Presence with Active Physical Reactions in Augmented Reality. OZCHI 2020: 700-704
[c8]Silian Li, Weiping He, Li Zhang
, Yupeng Hu:
Physicalizing Virtual Objects with Affordances to Support Tangible Interactions in AR. VRST 2020: 67:1-67:2
2010 – 2019
- 2019
[c7]Peng Zhan, Yupeng Hu, Lin Chen, Wei Luo, Xueqing Li:
Efficient Search of the Optimal Prefix and Suffix Invariant Size for Dynamic Time Warping. HPCC/SmartCity/DSS 2019: 1971-1978
[c6]Shuo Kuai, Yupeng Hu, Xinxiao Zhao, Dong Qin, Wentao Li, Xueqing Li:
A Novel Efficient Query Strategy on Hibernate. ICSCA 2019: 105-108- 2018
[c5]Xin Ren, Yupeng Hu, Wenxin Kuang, Mohamadou Ballo Souleymanou:
A Web Attack Detection Technology Based on Bag of Words and Hidden Markov Model. MASS 2018: 526-531- 2017
[j7]Mingzhu Deng
, Wei Chen, Nong Xiao, Songping Yu, Yupeng Hu:
GLE-Dedup: A Globally-Locally Even Deduplication by Request-Aware Placement for Better Read Performance. Int. J. Parallel Program. 45(4): 946-964 (2017)
[j6]Lei Gao, Yupeng Hu:
WSN中基于最小延时的数据汇集树构建与传输调度算法 (Data Aggregation Tree Construction and Transmission Scheduling Algorithm Based on Minimum Latency in Wireless Sensor Networks). 计算机科学 44(Z6): 300-304 (2017)
[c4]Ming Jing, Xueqing Li, Yupeng Hu:
Interactive Temporal Visualization of Collaboration Networks. PCM (2) 2017: 713-722
[c3]Sheheryar Ali Arshad, Chunhai Feng, Yonghe Liu, Yupeng Hu, Ruiyun Yu, Siwang Zhou, Heng Li:
Wi-chase: A WiFi based human activity recognition system for sensorless environments. WoWMoM 2017: 1-6- 2016
[c2]Yanliang Liu, Yupeng Hu, Ruiyun Yu, Yonghe Liu:
Application recommendation at places for mobile users. WoWMoM 2016: 1-9- 2014
[j5]Bo Yin, Siwang Zhou, Yaping Lin, Yonghe Liu, Yupeng Hu:
Efficient distributed skyline computation using dependency-based data partitioning. J. Syst. Softw. 93: 69-83 (2014)
[j4]Quan Xu, Thomas M. Chen
, Yupeng Hu, Pu Gong:
Write Pattern Format Algorithm for Reliable NAND-Based SSDs. IEEE Trans. Circuits Syst. II Express Briefs 61-II(7): 516-520 (2014)- 2013
[j3]Yupeng Hu, Nong Xiao, Xiao-Fan Liu:
An elastic error correction code technique for NAND flash-based consumer electronic devices. IEEE Trans. Consumer Electron. 59(1): 1-8 (2013)
2000 – 2009
- 2009
[j2]Jianping Yu, Yaping Lin, Yupeng Hu:
Ant-Based Delay-Sensitive Query Processing for Wireless Sensor Networks. Int. J. Distributed Sens. Networks 5(1): 30 (2009)- 2007
[c1]Yupeng Hu, Yaping Lin, Yonghe Liu, Weini Zeng:
RAS: A Robust Authentication Scheme for Filtering False Data in Wireless Sensor Networks. ICON 2007: 200-205- 2002
[j1]Zhixing Yang, Yupeng Hu, Chang-Yong Pan, Lin Yang:
Design of a 3780-point IFFT processor for TDS-OFDM. IEEE Trans. Broadcast. 48(1): 57-61 (2002)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-01-13 23:44 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







