default search action
Xingyuan Zhang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i6]Xingyuan Zhang, Philip Becker-Ehmck, Patrick van der Smagt, Maximilian Karl:
Overcoming Knowledge Barriers: Online Imitation Learning from Observation with Pretrained World Models. CoRR abs/2404.18896 (2024) - 2023
- [c16]Xingyuan Zhang, Philip Becker-Ehmck, Patrick van der Smagt, Maximilian Karl:
Action Inference by Maximising Evidence: Zero-Shot Imitation from Observation with World Models. NeurIPS 2023 - [i5]Xingyuan Zhang, Philip Becker-Ehmck, Patrick van der Smagt, Maximilian Karl:
Action Inference by Maximising Evidence: Zero-Shot Imitation from Observation with World Models. CoRR abs/2312.02019 (2023) - 2022
- [j18]Bo Wang, Xingyuan Zhang, Bo Sun:
Propagation Prediction of Body Waves in Fluid-Saturated Soils with Flow-Independent Viscosity. Symmetry 14(2): 408 (2022) - [j17]Xingyuan Zhang, Fuhai Zhang:
Differentiable Spatial Regression: A Novel Method for 3D Hand Pose Estimation. IEEE Trans. Multim. 24: 166-176 (2022) - [c15]Rongjun Qin, Xingyuan Zhang, Songyi Gao, Xiong-Hui Chen, Zewen Li, Weinan Zhang, Yang Yu:
NeoRL: A Near Real-World Benchmark for Offline Reinforcement Learning. NeurIPS 2022 - 2021
- [j16]Xingyuan Zhang, Ya-Ping Huang, Yang Mi, Yanting Pei, Qi Zou, Song Wang:
Video sketch: A middle-level representation for action recognition. Appl. Intell. 51(4): 2589-2608 (2021) - [j15]Yanting Pei, Yaping Huang, Qi Zou, Xingyuan Zhang, Song Wang:
Effects of Image Degradation and Degradation Removal to CNN-Based Image Classification. IEEE Trans. Pattern Anal. Mach. Intell. 43(4): 1239-1253 (2021) - [j14]Yanting Pei, Yaping Huang, Xingyuan Zhang:
Consistency Guided Network for Degraded Image Classification. IEEE Trans. Circuits Syst. Video Technol. 31(6): 2231-2246 (2021) - [i4]Rongjun Qin, Songyi Gao, Xingyuan Zhang, Zhen Xu, Shengkai Huang, Zewen Li, Weinan Zhang, Yang Yu:
NeoRL: A Near Real-World Benchmark for Offline Reinforcement Learning. CoRR abs/2102.00714 (2021) - 2020
- [j13]Dianzhuan Jiang, Shengsheng Zhang, Yaping Huang, Qi Zou, Xingyuan Zhang, Mengyang Pu, Junbo Liu:
Detecting dense text in natural images. IET Comput. Vis. 14(8): 597-604 (2020) - [j12]Xingyuan Zhang, Christian Urban, Chunhan Wu:
Priority Inheritance Protocol Proved Correct. J. Autom. Reason. 64(1): 73-95 (2020) - [j11]Xingyuan Zhang, Yaping Huang, Qi Zou, Yanting Pei, Runsheng Zhang, Song Wang:
A Hybrid convolutional neural network for sketch recognition. Pattern Recognit. Lett. 130: 73-82 (2020) - [j10]Yang Mi, Xingyuan Zhang, Zhongguo Li, Song Wang:
Dual-Branch Network With a Subtle Motion Detector for Microaction Recognition in Videos. IEEE Trans. Image Process. 29: 6194-6208 (2020)
2010 – 2019
- 2019
- [j9]Jian Xu, Xingyuan Zhang, Christian Urban, Sebastiaan J. C. Joosten:
Universal Turing Machine. Arch. Formal Proofs 2019 (2019) - [j8]Xingyuan Zhang, Christian Urban:
Selected Extended Papers of ITP 2015: Preface. J. Autom. Reason. 62(4): 431-432 (2019) - [i3]Xingyuan Zhang, Fuhai Zhang:
Pixel-wise Regression: 3D Hand Pose Estimation via Spatial-form Representation and Differentiable Decoder. CoRR abs/1905.02085 (2019) - [i2]Yanting Pei, Yaping Huang, Xingyuan Zhang:
Classification-driven Single Image Dehazing. CoRR abs/1911.09389 (2019) - 2018
- [j7]Xingyuan Zhang, Yaping Huang, Qi Zou, Qingji Guan, Junbo Liu:
Making better use of edges for sketch generation. J. Electronic Imaging 27(06): 063006 (2018) - [i1]Yanting Pei, Yaping Huang, Qi Zou, Hao Zang, Xingyuan Zhang, Song Wang:
Effects of Image Degradations to CNN-based Image Classification. CoRR abs/1810.05552 (2018) - 2015
- [e1]Christian Urban, Xingyuan Zhang:
Interactive Theorem Proving - 6th International Conference, ITP 2015, Nanjing, China, August 24-27, 2015, Proceedings. Lecture Notes in Computer Science 9236, Springer 2015, ISBN 978-3-319-22101-4 [contents] - 2014
- [j6]Chunhan Wu, Xingyuan Zhang, Christian Urban:
A Formalisation of the Myhill-Nerode Theorem Based on Regular Expressions. J. Autom. Reason. 52(4): 451-480 (2014) - 2013
- [c14]Chunhan Wu, Xingyuan Zhang, Christian Urban:
A Formal Model and Correctness Proof for an Access Control Policy Framework. CPP 2013: 292-307 - [c13]Jian Xu, Xingyuan Zhang, Christian Urban:
Mechanising Turing Machines and Computability Theory in Isabelle/HOL. ITP 2013: 147-162 - 2012
- [c12]Xingyuan Zhang, Christian Urban, Chunhan Wu:
Priority Inheritance Protocol Proved Correct. ITP 2012: 217-232 - 2011
- [j5]Chunhan Wu, Xingyuan Zhang, Christian Urban:
The Myhill-Nerode Theorem Based on Regular Expressions. Arch. Formal Proofs 2011 (2011) - [c11]Chunhan Wu, Xingyuan Zhang, Christian Urban:
A Formalisation of the Myhill-Nerode Theorem Based on Regular Expressions (Proof Pearl). ITP 2011: 341-356
2000 – 2009
- 2009
- [c10]Jinshuang Wang, Huabing Yang, Xingyuan Zhang:
Liveness Reasoning with Isabelle/HOL. TPHOLs 2009: 485-499 - 2008
- [c9]Chunhan Wu, Xingyuan Zhang, Yuanyuan Wang:
A Replay-Oriented Software Architecture for Easy Debugging. CSSE (2) 2008: 491-499 - 2006
- [c8]Huabing Yang, Xingyuan Zhang, Yuanyuan Wang:
A correctness proof of the SRP protocol. IPDPS 2006 - [c7]Huabing Yang, Xingyuan Zhang, Yuanyuan Wang:
A Correctness Proof of the DSR Protocol. MSN 2006: 72-83 - 2005
- [j4]Hideo Kozumi, Xingyuan Zhang:
Bayesian and non-bayesian analysis of gamma stochastic frontier models by Markov Chain Monte Carlo methods. Comput. Stat. 20(4): 575-593 (2005) - 2004
- [j3]Mark Harman, Lin Hu, Malcolm Munro, Xingyuan Zhang, David W. Binkley, Sebastian Danicic, Mohammed Daoudi, Lahcen Ouarbya:
Syntax-Directed Amorphous Slicing. Autom. Softw. Eng. 11(1): 27-61 (2004) - 2002
- [j2]Mark Harman, Malcolm Munro, Lin Hu, Xingyuan Zhang:
Source code analysis and manipulation. Inf. Softw. Technol. 44(13): 717-720 (2002) - [c6]Mark Harman, Lin Hu, Robert M. Hierons, Malcolm Munro, Xingyuan Zhang, José Javier Dolado, Mari Carmen Otero, Joachim Wegener:
A Post-Placement Side-Effect Removal Algorithm. ICSM 2002: 2-11 - [c5]Xingyuan Zhang, Malcolm Munro, Mark Harman, Lin Hu:
Mechanized Operational Semantics of WSL. SCAM 2002: 73-82 - [c4]Mark Harman, Lin Hu, Malcolm Munro, Xingyuan Zhang, Sebastian Danicic, Mohammed Daoudi, Lahcen Ouarbya:
An Interprocedural Amorphous Slicer for WSL. SCAM 2002: 105-114 - [c3]Xingyuan Zhang, Malcolm Munro, Mark Harman, Lin Hu:
Weakest Precondition for General Recursive Programs Formalized in Coq. TPHOLs 2002: 332-348 - 2001
- [j1]Hui Jiang, Dong Lin, Xingyuan Zhang, Xiren Xie:
Type System in Programming Languages. J. Comput. Sci. Technol. 16(3): 286-292 (2001) - [c2]Mark Harman, Malcolm Munro, Lin Hu, Xingyuan Zhang:
Side-Effect Removal Transformation. IWPC 2001: 310-319 - [c1]Mark Harman, Lin Hu, Malcolm Munro, Xingyuan Zhang:
GUSTT: An Amorphous Slicing System which Combines Slicing and Transformation. WCRE 2001: 271-280
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-14 00:54 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint