


default search action
Yuan Hong
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Yuan Hong 0001
— University of Connecticut, Connecticut Advanced Computing Center (CACC), Mansfield, CT, USA (and 2 more) - Yuan Hong 0002
— Dalhousie University, Halifax, Nova Scotia, Canada - Yuan Hong 0003 — Shanghai Jiao Tong University School of Medicine, Shanghai, China
- Yuan Hong 0004 — College of Mathematical Medicine, Zhejiang Normal University School, Jinhua, China
- Yuan Hong 0005 — Affiliated Hospital of Jiangxi University of Chinese Medicine, Nanchang, Jiangxi, China
- Yuan Hong 0006 — Aerospace Information Research Institute, Chinese Academy of Sciences, Beijing, China
- Yuan Hong 0007 — iFLYTEK Co., Ltd., Hefei, China
- Yuan Hong 0008 — East China Normal University, Department of Mathematics, Shanghai, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[j11]Shuhui Zhou
, Xing He, Zhenshuo Zhang
, Feng Gao, Yuan Hong, Ruijin Gao, Xiaoming Wang, Hongsheng Yun, Ruhui Ma
, Jinshan Sun:
StarData: Distributed Map-Reduce Framework Atop Serverless Computing Platforms. IEEE Access 13: 182633-182644 (2025)
[j10]Lin Fan
, Meng Li
, Zhenting Hu, Yuan Hong
, Dexing Kong
:
DNGG: Medical Image Lossless Encryption via Deep Network Guided Generative. IEEE Signal Process. Lett. 32: 1331-1335 (2025)
[c7]Shuya Feng, Yuan Hong:
DPED: Multi-Layer Noise Distillation for Privacy-Preserving Text Embeddings. EMNLP 2025: 25237-25245
[i3]Haoran Dai, Jiawen Wang, Ruo Yang, Manali Sharma, Zhonghao Liao, Yuan Hong, Binghui Wang:
Practical, Generalizable and Robust Backdoor Attacks on Text-to-Image Diffusion Models. CoRR abs/2508.01605 (2025)
[i2]Feng Han, Xiao Lan, Weiran Liu, Lei Zhang, Hao Ren, Lin Qu, Yuan Hong:
Concretely Efficient Correlated Oblivious Permutation. IACR Cryptol. ePrint Arch. 2025: 449 (2025)- 2021
[i1]Zhikun Liu, Yuanpeng Liu, Yuan Hong, Jinwen Meng, Jianguo Wang, Shusen Zheng, Xiao Xu:
Deep learning for prediction of hepatocellular carcinoma recurrence after resection or liver transplantation: a discovery and validation study. CoRR abs/2106.00090 (2021)
2010 – 2019
- 2019
[j9]Yuan Hong, Li Chen, Lianguang Mo:
Optimization of cluster resource indexing of Internet of Things based on improved ant colony algorithm. Clust. Comput. 22(Supplement): 7379-7387 (2019)- 2017
[j8]Wang Hao, Yuan Hong:
Training project arrangement for tennis athletes based on BP neural network model. Int. J. Reason. based Intell. Syst. 9(3/4): 144-148 (2017)
[j7]Xiao Wang
, Tielin Shi, Guanglan Liao, Yichun Zhang
, Yuan Hong, Kepeng Chen:
Using Wavelet Packet Transform for Surface Roughness Evaluation and Texture Extraction. Sensors 17(4): 933 (2017)- 2016
[j6]Yichun Zhang
, Tielin Shi, Lei Su, Xiao Wang
, Yuan Hong, Kepeng Chen, Guanglan Liao:
Sparse Reconstruction for Micro Defect Detection in Acoustic Micro Imaging. Sensors 16(10): 1773 (2016)- 2014
[j5]Yuan Hong, Haibo Liao, Yazhi Jiang:
Construction Engineering Cost Evaluation Model and Application Based on RS-IPSO-BP Neural Network. J. Comput. 9(4): 1020-1025 (2014)- 2013
[c6]Yuan Hong, Changhao Xia, Shixiang Zhang, Lin Wu, Chao Yuan, Ying Huang, Xuxu Wang, Haifeng Zhu:
Load forecasting using elastic gradient descent. ICNC 2013: 247-251- 2011
[j4]Zhen Liu
, Yuan Hong, Qiong Liu, Yan-Jie Chai
:
An Emotion Model for Virtual Agents with Evolvable Motivation. Trans. Edutainment 6: 154-163 (2011)
2000 – 2009
- 2009
[c5]Fan Wang, Yuan Hong, Wenbin Zhang, Gagan Agrawal:
Personality Based Latent Friendship Mining. DMIN 2009: 427-433
[c4]Bangquan Liu, Zhen Liu
, Yuan Hong:
A Simulation Based on Emotions Model for Virtual Human Crowds. ICIG 2009: 836-840- 2008
[j3]Yuan Hong, Han-Wei Shen:
Parallel reflective symmetry transformation for volume data. Comput. Graph. 32(1): 41-54 (2008)
[c3]Hao Liu, Yuan Hong, Hongwei Hao, Chengyao Wang:
Kernel: A RDB-Based Object Persistence Component Set for Java. CSSE (2) 2008: 64-67- 2007
[c2]Yuan Hong, Han-Wei Shen:
Parallel Reflective Symmetry Transformation for Volume Data. EGPGV 2007: 77-83- 2005
[c1]Danny van Noort, Yuan Hong, Joseph Ibershoff, Jerzy W. Jaromczyk:
Simulation and Visualization for DNA Computing in Microreactors. ICNC (2) 2005: 1206-1217- 2004
[j2]Yuan Hong:
Tree-width, clique-minors, and eigenvalues. Discret. Math. 274(1-3): 281-287 (2004)
1990 – 1999
- 1993
[j1]Yuan Hong:
Bounds of eigenvalues of graphs. Discret. Math. 123(1-3): 65-74 (1993)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-02-03 23:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







