


default search action
Haotian Zhu
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[j16]Xiangrong Li, Yu Zhang, Haotian Zhu
, Yubo Wang, Junjia Huang:
A multi-dimensional trust attestation solution in 5G-IoT. Digit. Commun. Networks 11(1): 225-233 (2025)
[j15]Haotian Zhu
, Wei Wu
, Haipeng Peng
, Dawei Zhao
:
MACS-BNet: A Stealthy Multiconstraint Adversarial Backdoor Network Against Compressed Learning. IEEE Internet Things J. 12(14): 27557-27572 (2025)
[j14]Bei Gong
, Mowei Gong
, Zhe Li
, Haotian Zhu
, Weizhi Meng
, Chong Guo
:
ECGSH: An Efficient Certificateless Group Signcryption-Based Homomorphic in Industrial IoT. IEEE Trans. Inf. Forensics Secur. 20: 9357-9371 (2025)
[j13]Bei Gong
, Zhe Li
, Mowei Gong, Haotian Zhu, Weizhi Meng
, Chong Guo
:
Lightweight Continuous Authentication via IMU Fingerprinting for V2X. IEEE Trans. Intell. Transp. Syst. 26(7): 10483-10495 (2025)
[j12]Chong Guo
, Bei Gong
, Zhe Li
, Mowei Gong, Haotian Zhu
:
FORT: A Forward Secure and Threshold Authorized Multi-Authority Attribute-Based Signature Scheme for Multimedia IoT. IEEE Trans. Multim. 27: 8859-8874 (2025)
[c10]Haotian Zhu, Shuchao Pang, Zhigang Lu, Yongbin Zhou, Minhui Xue:
GAP-Diff: Protecting JPEG-Compressed Images from Diffusion-based Facial Customization. NDSS 2025
[i8]Liming Lu, Shuchao Pang, Siyuan Liang, Haotian Zhu, Xiyu Zeng, Aishan Liu, Yunhuai Liu, Yongbin Zhou:
Adversarial Training for Multimodal Large Language Models against Jailbreak Attacks. CoRR abs/2503.04833 (2025)
[i7]Chenchen Zhang, Yuhang Li, Can Xu, Jiaheng Liu, Ao Liu, Shihui Hu, Dengpeng Wu, Guanhua Huang, Kejiao Li, Qi Yi, Ruibin Xiong, Haotian Zhu, Yuanxing Zhang, Yuhao Jiang, Yue Zhang, Zenan Xu, Bohui Zhai, Guoxiang He, Hebin Li, Jie Zhao, Le Zhang, Lingyun Tan, Pengyu Guo, Xianshu Pang, Yang Ruan, Zhifeng Zhang, Zhonghu Wang, Ziyan Xu, Zuopu Yin, Wiggin Zhou, Chayse Zhou, Fengzong Lian:
ArtifactsBench: Bridging the Visual-Interactive Gap in LLM Code Generation Evaluation. CoRR abs/2507.04952 (2025)
[i6]Jason Chou, Ao Liu, Yuchi Deng, Zhiying Zeng, Tao Zhang, Haotian Zhu, Jianwei Cai, Yue Mao, Chenchen Zhang, Lingyun Tan, Ziyan Xu, Bohui Zhai, Hengyi Liu, Speed Zhu, Wiggin Zhou, Fengzong Lian:
AutoCodeBench: Large Language Models are Automatic Code Benchmark Generators. CoRR abs/2508.09101 (2025)
[i5]Xiyu Zeng, Siyuan Liang, Liming Lu, Haotian Zhu, Enguang Liu, Jisheng Dang, Yongbin Zhou, Shuchao Pang:
SafeSteer: Adaptive Subspace Steering for Efficient Jailbreak Defense in Vision-Language Models. CoRR abs/2509.21400 (2025)- 2024
[j11]Wei Wu
, Haipeng Peng
, Haotian Zhu
, Lixiang Li
:
MVC-RSN: A Malware Classification Method With Variant Identification Ability. IEEE Internet Things J. 11(21): 35654-35668 (2024)
[j10]Juan Xia, Yuxia Li, Haotian Zhu, Feiyang Xue, Feng Shi, Nana Li
:
A Bayesian Change Point Model for Dynamic Alternative Transcription Start Site Usage During Cellular Differentiation. J. Comput. Biol. 31(5): 445-457 (2024)
[j9]Jiamin Zhu
, Meixuan Wu, Yi Zhou, Nan Cao, Haotian Zhu, Min Zhu:
Dowsing: a task-driven approach for multiple-view visualizations dynamic recommendation. J. Vis. 27(4): 695-712 (2024)
[j8]Wei Wu
, Haipeng Peng
, Haotian Zhu
, Derun Zhang:
CSMC: A Secure and Efficient Visualized Malware Classification Method Inspired by Compressed Sensing. Sensors 24(13): 4253 (2024)
[c9]Ummay Kulsum
, Haotian Zhu
, Bowen Xu
, Marcelo d'Amorim
:
A Case Study of LLM for Automated Vulnerability Repair: Assessing Impact of Reasoning and Patch Validation Feedback. AIware 2024
[c8]Zhiwen You
, Kanyao Han
, Haotian Zhu, Bertram Ludäscher, Jana Diesner:
SciPrompt: Knowledge-augmented Prompting for Fine-grained Categorization of Scientific Topics. EMNLP 2024: 6087-6104
[c7]Zhe Li
, Ang Li
, Chong Guo
, Pengxuan Sun
, Haotian Zhu
, Tianqi Peng
:
IMU-Based CWT and Whitening-Aided for Human Activity Recognition. ICAIP 2024: 81-86
[i4]Ummay Kulsum, Haotian Zhu, Bowen Xu, Marcelo d'Amorim:
A Case Study of LLM for Automated Vulnerability Repair: Assessing Impact of Reasoning and Patch Validation Feedback. CoRR abs/2405.15690 (2024)
[i3]Zhensu Sun, Haotian Zhu, Bowen Xu, Xiaoning Du, Li Li
, David Lo:
LLM as Runtime Error Handler: A Promising Pathway to Adaptive Self-Healing of Software Systems. CoRR abs/2408.01055 (2024)
[i2]Zhiwen You, Kanyao Han, Haotian Zhu, Bertram Ludäscher, Jana Diesner:
SciPrompt: Knowledge-augmented Prompting for Fine-grained Categorization of Scientific Topics. CoRR abs/2410.01946 (2024)- 2023
[j7]Yihan Hou
, Haotian Zhu, Hai-Ning Liang
, Lingyun Yu
:
A study of the effect of star glyph parameters on value estimation and comparison. J. Vis. 26(2): 493-507 (2023)
[c6]Zipeng Diao, Bei Gong, Haotian Zhu, Yong Wu:
A Trusted Routing Schemes for IoT. ICCCS 2023: 298-303
[c5]Bin Han, Haotian Zhu, Sitong Zhou, Sofia Ahmed, Md. Mushfiqur Rahman, Fei Xia, Kevin Lybarger:
HuskyScribe at MEDIQA-Sum 2023: Summarizing Clinical Dialogues with Transformers. CLEF (Working Notes) 2023: 1488-1509
[c4]Haotian Zhu
, Yujun Yang
, Yimei Yang
:
"Research of the Smart \"Farmer\" System and Rural Land Risk Prediction". ICMLCA 2023: 293-299- 2022
[j6]Jiawei Lu
, Wei Zhao, Haotian Zhu, Jie Li, Zhenbo Cheng, Gang Xiao
:
Optimal machine placement based on improved genetic algorithm in cloud computing. J. Supercomput. 78(3): 3448-3476 (2022)
[j5]Changlin Li, Mengqi Cao, Xiaolin Wen, Haotian Zhu, Shangsong Liu, Xinyi Zhang, Min Zhu:
MDIVis: Visual analytics of multiple destination images on tourism user generated content. Vis. Informatics 6(3): 1-10 (2022)- 2021
[j4]Mingqiao Wang
, Haotian Zhu
, Chengyu Zhou, Ping Zheng
, Chengde Tong
:
Analysis and Optimization of a V-Shape Combined Pole Interior Permanent-Magnet Synchronous Machine With Temperature Rise and Demagnetization Considered. IEEE Access 9: 64761-64775 (2021)
[j3]Shangsong Liu, Di Peng, Haotian Zhu, Xiaolin Wen, Xinyi Zhang, Zhenghao Zhou, Min Zhu
:
MulUBA: multi-level visual analytics of user behaviors for improving online shopping advertising. J. Vis. 24(6): 1287-1301 (2021)
[c3]Cecheng Zhao, Ziyang Huang, Hui Wang
, Haitao Fu, Dong Wang, Yingjie Gao, Haotian Zhu, Xiaohui Niu, Wen Zhang:
A robust drug representation learning model for eliminating cell specificity in gene expression profile and its application. BIBM 2021: 1191-1196- 2020
[j2]Jiawei Lu
, Huan Zhou, Haotian Zhu, Yuanming Zhang, Qianhui Liang, Gang Xiao:
DCEM: A data cell evolution model for service composition based on bigraph theory. Future Gener. Comput. Syst. 112: 330-347 (2020)
[j1]Haiyan Ni, Jianping Hu
, Xuqiang Zhang, Haotian Zhu:
The Optimizations of Dual-Threshold Independent-Gate FinFETs and Low-Power Circuit Designs. J. Circuits Syst. Comput. 29(7): 2050114:1-2050114:28 (2020)
[c2]Haotian Zhu, Denise Mak, Jesse Gioannini, Fei Xia:
NLPStatTest: A Toolkit for Comparing NLP System Performance. AACL/IJCNLP (System Demonstrations) 2020: 40-46
[i1]Haotian Zhu, Denise Mak, Jesse Gioannini, Fei Xia:
NLPStatTest: A Toolkit for Comparing NLP System Performance. CoRR abs/2011.13231 (2020)
2010 – 2019
- 2017
[c1]Haotian Zhu, Jianping Hu, Huishan Yang, Yang Xiong, Tingfeng Yang:
A topology optimization method for low-power logic circuits with dual-threshold independent-gate FinFETs. PATMOS 2017: 1-6
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-12-28 00:27 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







