default search action
Chen Hong
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j18]Xin Wang, Ning He, Chen Hong, Qi Wang, Ming Chen:
Improved YOLOX-X based UAV aerial photography object detection algorithm. Image Vis. Comput. 135: 104697 (2023) - [j17]Zilong Huang, Hongyuan Jing, Aidong Chen, Chen Hong, Xinna Shang:
Efficient image dehazing algorithm using multiple priors constraints. J. Vis. Commun. Image Represent. 90: 103694 (2023) - [j16]Xin Wang, Ning He, Chen Hong, Fengxi Sun, Wenjing Han, Qi Wang:
YOLO-ERF: lightweight object detector for UAV aerial images. Multim. Syst. 29(6): 3329-3339 (2023) - [c15]Ershen Wang, Xiaotong Wu, Chen Hong, Jihao Chen:
An Algorithm Combining Hidden States for Monotonic Value Function Factorisation. ICBAR 2023: 231-235 - 2022
- [j15]Chen Hong, Robin Thiele, Lars Feuerbach:
GenomeTornadoPlot: a novel R package for CNV visualization and focality analysis. Bioinform. 38(7): 2036-2038 (2022) - [j14]Aidong Chen, Chen Hong, Xinna Shang, Hongyuan Jing, Sen Xu:
Timing leakage to break SM2 signature algorithm. J. Inf. Secur. Appl. 67: 103210 (2022) - [j13]Chen Hong, Longquan Dai:
RMVAE: one-class classification via divergence regularization and maximization mutual information. Multim. Syst. 28(5): 1667-1677 (2022) - [j12]Chen Hong, Fuyao Zhu, Mengmeng Wang, Zhengjia Zhang:
Spatial-Temporal Variation Characteristics of Water Bodies and Their Climatic Drivers Over the Qinghai-Tibet Plateau in 2002-2020. IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. 15: 7913-7928 (2022) - [c14]Depeng Wang, Yibo Sun, Chen Hong:
End-to-end training image-text matching network. DSC 2022: 154-159 - [c13]Mangal Sain, Oloviddin Normurodov, Chen Hong, Kueh Lee Hui:
A Survey on the Security in Cyber Physical System with Multi-Factor Authentication. ICACT 2022: 1-8 - 2021
- [c12]Mangal Sain, Oloviddin Normurodov, Chen Hong, Kueh Lee Hui:
A Survey on the Security in Cyber Physical System with Multi-Factor Authentication. ICACT 2021: 1322-1329 - [c11]Hongyang Huang, Chai Song, Jin Ting, Taoling Tian, Chen Hong, Zhang Di, Danni Gao:
A Novel Machine Lip Reading Model. ITQM 2021: 1432-1437 - 2020
- [j11]Esther Rheinbay, Morten Muhlig Nielsen, Federico Abascal, Jeremiah Wala, Ofer Shapira, Grace Tiao, Henrik Hornshøj, Julian M. Hess, Randi Istrup Juul, Ziao Lin, Lars Feuerbach, Radhakrishnan Sabarinathan, Tobias Madsen, Jaegil Kim, Loris Mularoni, Shimin Shuai, Andrés Lanzós, Carl Herrmann, Yosef E. Maruvka, Ciyue Shen, Samirkumar B. Amin, Pratiti Bandopadhayay, Johanna Bertl, Keith A. Boroevich, John Busanovich, Joana Carlevaro-Fita, Dimple Chakravarty, Calvin Wing Yiu Chan, David Craft, Priyanka Dhingra, Klev Diamanti, Nuno A. Fonseca, Abel Gonzalez-Perez, Qianyun Guo, Mark P. Hamilton, Nicholas J. Haradhvala, Chen Hong, Keren Isaev, Todd A. Johnson, Malene Juul, André Kahles, Abdullah Kahraman, Youngwook Kim, Jan Komorowski, Kiran Kumar, Sushant Kumar, Donghoon Lee, Kjong-Van Lehmann, Yilong Li, Eric Minwei Liu, Lucas Lochovsky, Keunchil Park, Oriol Pich, Nicola D. Roberts, Gordon Saksena, Steven E. Schumacher, Nikos Sidiropoulos, Lina Sieverling, Nasa Sinnott-Armstrong, Chip Stewart, David Tamborero, Jose M. C. Tubio, Husen M. Umer, Liis Uusküla-Reimand, Claes Wadelius, Lina Wadi, Xiaotong Yao, Cheng-Zhong Zhang, Jing Zhang, James E. Haber, Asger Hobolth, Marcin Imielinski, Manolis Kellis, Michael S. Lawrence, Christian von Mering, Hidewaki Nakagawa, Benjamin J. Raphael, Mark A. Rubin, Chris Sander, Lincoln D. Stein, Joshua M. Stuart, Tatsuhiko Tsunoda, David A. Wheeler, Rory Johnson, Jüri Reimand, Mark Gerstein, Ekta Khurana, Peter J. Campbell, Núria López-Bigas, Gary D. Bader, Jonathan Barenboim, Rameen Beroukhim, Søren Brunak, Ken Chen, Jung Kyoon Choi, Jordi Deu-Pons, J. Lynn Fink, Joan Frigola, Carlo Gambacorti Passerini, Dale W. Garsed, Gad Getz, Ivo Glynne Gut, David Haan, Arif Ozgun Harmanci, Mohamed Helmy, Ermin Hodzic, José M. G. Izarzugaza, Jong K. Kim, Jan O. Korbel, Erik Larsson, Shantao Li, Xiaotong Li, Shaoke Lou, Kathleen Marchal, Iñigo Martincorena, Alexander Martínez-Fundichely, Patrick D. McGillivray, William Meyerson, Ferran Muiños, Marta Paczkowska, Kiejung Park, Jakob Skou Pedersen, Tirso Pons, Sergio Pulido-Tamayo, Iker Reyes-Salazar, Matthew A. Reyna, Carlota Rubio-Perez, Süleyman Cenk Sahinalp, Leonidas Salichos, Mark Shackleton, Raunak Shrestha, Alfonso Valencia, Miguel Vazquez, Lieven P. C. Verbeke, Jiayin Wang, Jonathan Warrell, Sebastian M. Waszak, Joachim Weischenfeldt, Guanming Wu, Jun Yu, Xuanping Zhang, Yan Zhang, Zhongming Zhao, Lihua Zou, Kadir C. Akdemir, Eva G. Alvarez, Adrian Baez-Ortega, Paul C. Boutros, David D. L. Bowtell, Benedikt Brors, Kathleen H. Burns, Kin Chan, Isidro Cortés-Ciriano, Ana Dueso-Barroso, Andrew J. Dunford, Paul A. Edwards, Xavier Estivill, Dariush Etemadmoghadam, Milana Frenkel-Morgenstern, Dmitry A. Gordenin, Barbara Hutter, David T. W. Jones, Young Seok Ju, Marat D. Kazanov, Leszek J. Klimczak, Youngil Koh, Eunjung Alice Lee, Jake June-Koo Lee, Andy G. Lynch, Geoff MacIntyre, Florian Markowetz, Matthew Meyerson, Satoru Miyano, Fabio C. P. Navarro, Stephan Ossowski, Peter J. Park, John V. Pearson, Montserrat Puiggròs, Karsten Rippe, Steven A. Roberts, Bernardo Rodriguez-Martin, Ralph Scully, David Torrents, Izar Villasante, Nicola Waddell, Jeremiah A. Wala, Lixing Yang, Sung-Soo Yoon, Jorge Zamora:
Analyses of non-coding somatic drivers in 2,658 cancer whole genomes. Nat. 578(7793): 102-111 (2020) - [j10]Wenhan Yang, Ye Yuan, Wenqi Ren, Jiaying Liu, Walter J. Scheirer, Zhangyang Wang, Taiheng Zhang, Qiaoyong Zhong, Di Xie, Shiliang Pu, Yuqiang Zheng, Yanyun Qu, Yuhong Xie, Liang Chen, Zhonghao Li, Chen Hong, Hao Jiang, Siyuan Yang, Yan Liu, Xiaochao Qu, Pengfei Wan, Shuai Zheng, Minhui Zhong, Taiyi Su, Lingzhi He, Yandong Guo, Yao Zhao, Zhenfeng Zhu, Jinxiu Liang, Jingwen Wang, Tianyi Chen, Yuhui Quan, Yong Xu, Bo Liu, Xin Liu, Qi Sun, Tingyu Lin, Xiaochuan Li, Feng Lu, Lin Gu, Shengdi Zhou, Cong Cao, Shifeng Zhang, Cheng Chi, Chubin Zhuang, Zhen Lei, Stan Z. Li, Shizheng Wang, Ruizhe Liu, Dong Yi, Zheming Zuo, Jianning Chi, Huan Wang, Kai Wang, Yixiu Liu, Xingyu Gao, Zhenyu Chen, Chang Guo, Yongzhou Li, Huicai Zhong, Jing Huang, Heng Guo, Jianfei Yang, Wenjuan Liao, Jiangang Yang, Liguo Zhou, Mingyue Feng, Likun Qin:
Advancing Image Understanding in Poor Visibility Environments: A Collective Benchmark Study. IEEE Trans. Image Process. 29: 5737-5752 (2020) - [c10]Chen Hong:
Research on Image Encryption Based on Compressed Sensing. CIPAE 2020: 84-88 - [c9]Deepanjali Mishra, Chen Hong, Kueh Lee Hui, Ahmed Al-Absi, Mangal Sain:
Cyber security in Research and Academics due to Social Media. ICACT 2020: 554-558
2010 – 2019
- 2019
- [j9]Dhekra Ben Amara, Chen Hong, Muhammad Hafeez:
Evaluating the eco-innovation strategy in business opportunity identification - enterprise business growth nexus. Int. J. Inf. Syst. Chang. Manag. 11(3/4): 272-291 (2019) - [j8]Xiaobing Yu, Xianrui Yu, Chen Hong:
An improved gravitational search algorithm for global optimization. J. Intell. Fuzzy Syst. 37(4): 5039-5047 (2019) - [c8]Jianrui Cai, Shuhang Gu, Radu Timofte, Lei Zhang, Xiao Liu, Yukang Ding, Dongliang He, Chao Li, Yi Fu, Shilei Wen, Ruicheng Feng, Jinjin Gu, Yu Qiao, Chao Dong, Dongwon Park, Se Young Chun, Sanghoon Yoon, Junhyung Kwak, Donghee Son, Syed Waqas Zamir, Aditya Arora, Salman H. Khan, Fahad Shahbaz Khan, Ling Shao, Zhengping Wei, Lei Liu, Hong Cai, Darui Li, Fujie Gao, Zheng Hui, Xiumei Wang, Xinbo Gao, Guoan Cheng, Ai Matsune, Qiuyu Li, Leilei Zhu, Huaijuan Zang, Shu Zhan, Yajun Qiu, Ruxin Wang, Jiawei Li, Yongcheng Jing, Mingli Song, Pengju Liu, Kai Zhang, Jingdong Liu, Jiye Liu, Hongzhi Zhang, Wangmeng Zuo, Wenyi Tang, Jing Liu, Youngjung Kim, Changyeop Shin, Minbeom Kim, Sungho Kim, Pablo Navarrete Michelini, Hanwen Liu, Dan Zhu, Xuan Xu, Xin Li, Furui Bai, Xiaopeng Sun, Lin Zha, Yuanfei Huang, Wen Lu, Yanpeng Cao, Du Chen, Zewei He, Anshun Sun, Siliang Tang, Hongfei Fan, Xiang Li, Guo Li, Wenjie Zhang, Yumei Zhang, Qingwen He, Jinghui Qin, Lishan Huang, Yukai Shi, Pengxu Wei, Wushao Wen, Liang Lin, Jun Yu, Guochen Xie, Mengyan Li, Rong Chen, Xiaotong Luo, Chen Hong, Yanyun Qu, Cuihua Li, Zhi-Song Liu, Li-Wen Wang, Chu-Tak Li, Can Zhao, Bowen Li, Chung-Chi Tsai, Shang-Chih Chuang, Joonhee Choi, Joonsoo Kim, Xiaoyun Jiang, Ze Pan, Qunbo Lv, Zheng Tan, Peidong He:
NTIRE 2019 Challenge on Real Image Super-Resolution: Methods and Results. CVPR Workshops 2019: 2211-2223 - [c7]Jin Ying, Zhang Jie, Tao Ye, Chen Hong:
VR Course Construction Oriented by Innovation Project Development. ICCSE 2019: 851-855 - 2018
- [c6]Chen Hong, Dianxi Shi:
A Control System Architecture with Cloud Platform for Multi-UAV Surveillance. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 1095-1097 - 2017
- [j7]Chen Hong, Naiyu Yin, Ning He, Oriol Lordan, Jose Maria Sallan:
Cascades Tolerance of Scale-Free Networks with Attack Cost. Int. J. Comput. Intell. Syst. 10(1): 1330-1336 (2017) - [j6]Chen Hong:
Design of human-computer interaction interface considering user friendliness. Int. J. Reason. based Intell. Syst. 9(3/4): 162-169 (2017) - [j5]Li Gu, Xue Han, Chen Hong, Li-qiang Ren, Kun Ding:
Research on the Influence Mechanism of Co-innovation Intention in Intellectual Property Service of China. J. Sci. Res. 6(3): 131-140 (2017) - 2013
- [c5]Pengcheng Xu, Chen Hong:
A Global Dynamic Queuing Strategy on Scale-Free Networks. GreenCom/iThings/CPScom 2013: 856-859 - 2011
- [j4]Chen Hong, Kong Li:
Swarm intelligence-based extremum seeking control. Expert Syst. Appl. 38(12): 14852-14860 (2011) - [c4]Gu Cong, Chen Hong:
HV CMOS orientated variation-aware layout and robust solution. ASICON 2011: 263-266 - 2010
- [j3]Chen Hong:
A GMDH-Based Traffic Flow Forecasting Model. J. Convergence Inf. Technol. 5(2): 107-111 (2010) - [c3]Chen Hong:
Research on the Necessity of College Teachers to Establish the Information System Education Concept. ICEE 2010: 358-360
2000 – 2009
- 2009
- [c2]Haiyan Zhao, Chen Hong, Ma Yan:
Robust moving horizon estimation for system with uncertain measurement output. CDC 2009: 673-677 - 2005
- [c1]Chen Hong, Chang'an Zhu:
Modeling the dynamics of biomimetic underwater robot fish. ROBIO 2005: 478-483 - 2000
- [j2]Ji-Rong Wen, Chen Hong, Shan Wang:
POTENTIAL: A Highly Adaptive Core of Parallel Database System. J. Comput. Sci. Technol. 15(6): 527-541 (2000)
1990 – 1999
- 1998
- [j1]Chen Hong, Gareth Loudon, Yimin Wu, Ruslana Zitserman:
Segmentation and Recognition of Continuous Handwriting Chinese Text. Int. J. Pattern Recognit. Artif. Intell. 12(2): 223-232 (1998)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-18 23:43 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint