


default search action
Ying Hong
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2023
- [j21]Kai Wang, Jinxia Wu, Tianqing Zhu, Wei Ren, Ying Hong:
Defense against membership inference attack in graph neural networks through graph perturbation. Int. J. Inf. Sec. 22(2): 497-509 (2023) - 2022
- [j20]Ying Hong, Haiyan Xie, Vahan Hovhannisyan, Ioannis K. Brilakis
:
A graph-based approach for unpacking construction sequence analysis to evaluate schedules. Adv. Eng. Informatics 52: 101625 (2022) - [j19]Ying Hong
, Haiyan Xie, Gary Bhumbra, Ioannis K. Brilakis
:
Improving the accuracy of schedule information communication between humans and data. Adv. Eng. Informatics 53: 101645 (2022) - [j18]Cuixin Yuan, Ying Hong, Junjie Wu:
Does Facebook activity reveal your dark side? Using online language features to understand an individual's dark triad and needs. Behav. Inf. Technol. 41(2): 292-306 (2022) - [j17]Biao Wang
, Ying Hong
, Zhihe Long
, Qiqi Pan
, Pengyu Li
, Yao Xi
, Zhengbao Yang
:
Characterization of Wrist Motions and Bionic Energy Harvesting for Wrist Wearables. IEEE Internet Things J. 9(21): 21147-21156 (2022) - [j16]John Patrick Fitzsimmons, Ruodan Lu, Ying Hong, Ioannis K. Brilakis:
Construction schedule risk analysis - a hybrid machine learning approach. J. Inf. Technol. Constr. 27: 70-93 (2022) - 2021
- [j15]Ying Hong, Meng Wan, Zheng Li:
Understanding the Health Information Sharing Behavior of Social Media Users: An Empirical Study on WeChat. J. Organ. End User Comput. 33(5): 180-203 (2021) - [j14]Cuixin Yuan, Ying Hong, Junjie Wu:
Personality expression and recognition in Chinese language usage. User Model. User Adapt. Interact. 31(1): 121-147 (2021) - 2020
- [j13]Junling Zhang, Ying Hong, Xiaowen Qi, Changyong Liang:
Probabilistic Hybrid Linguistic Approaches for Multiple Attribute Group Decision Making with Decision Hesitancy and the Prioritization of Attribute Relationships. Symmetry 12(2): 235 (2020) - [j12]Jianyu Long
, Zhenzhong Sun, Chuan Li, Ying Hong, Yun Bai
, Shaohui Zhang
:
A Novel Sparse Echo Autoencoder Network for Data-Driven Fault Diagnosis of Delta 3-D Printers. IEEE Trans. Instrum. Meas. 69(3): 683-692 (2020) - 2019
- [j11]Peng Liu
, Ying Hong, Yan Liu:
Deep Differential Convolutional Network for Single Image Super-Resolution. IEEE Access 7: 37555-37564 (2019) - [j10]Peng Liu
, Ying Hong, Yan Liu:
A Novel Multi-Scale Adaptive Convolutional Network for Single Image Super-Resolution. IEEE Access 7: 45191-45200 (2019) - [j9]Jianyu Long
, Zhenzhong Sun, Panos M. Pardalos, Ying Hong, Shaohui Zhang, Chuan Li
:
A hybrid multi-objective genetic local search algorithm for the prize-collecting vehicle routing problem. Inf. Sci. 478: 40-61 (2019) - [j8]Ying Hong, Ahmed W. A. Hammad, Ali Akbarnezhad:
Forecasting the net costs to organisations of Building Information Modelling (BIM) implementation at different levels of development (LOD). J. Inf. Technol. Constr. 24: 588-603 (2019) - 2018
- [j7]Jianyu Long, Ying Hong, Yun Bai
, Shaohui Zhang, Zhenzhong Sun
:
Practical Production Scheduling for Hot Metal Pretreatment-Steelmaking-Continuous Casting Process Involving Preventive Maintenance Consideration. IEEE Access 6: 57017-57029 (2018) - [j6]Peng Liu, Ying Hong, Yan Liu:
Multi-Branch Deep Residual Network for Single Image Super-Resolution. Algorithms 11(10): 144 (2018) - [j5]Jianyu Long
, Zhenzhong Sun, Haibin Chen, Yun Bai
, Ying Hong:
Variable neighborhood search for integrated determination of charge batching and casting start time in steel plants. J. Intell. Fuzzy Syst. 34(6): 3821-3832 (2018) - 2017
- [j4]Haifei Zhang, Ying Hong, Jianlin Qiu:
An off-policy least square algorithms with eligibility trace based on importance reweighting. Clust. Comput. 20(4): 3475-3487 (2017) - [j3]Wenji Liu, Liangyu Li, Ying Hong, Jianfeng Yue:
Linear Mathematical Model for Seam Tracking with an Arc Sensor in P-GMAW Processes. Sensors 17(3): 591 (2017) - 2016
- [j2]Jiarui Li, Ying Hong, Chengpeng Hao:
Wheeze Detection Algorithm Based on Correlation-Coefficients Analysis. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(3): 760-764 (2016) - 2013
- [j1]Chao Dong, Li Gao, Ying Hong, Chengpeng Hao:
Adaptive Feedback Cancellation on Improved DCD Algorithms. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(6): 1478-1481 (2013)
Conference and Workshop Papers
- 2022
- [c7]Yongjia Lei, Zhiying Cui, Linyan Dai, Ning Xiao, Xiangjie Wang, Xiangfang Ma, Ying Hong:
The Development of Traffic Flow Prediction Based on Deep Learning: A Literature Review. ICCCS 2022: 140-145 - [c6]Yuer Yang
, Shanlin Zhu, Liangtian Zhao, Yehua Huang, Zhiying Cui, Ying Hong, Xiangjie Wang:
Analysis of Innovative Product Experience Based on Logistic Regression with Data Augmentation. ICCCS 2022: 915-920 - 2014
- [c5]Ying Hong, Kaizhi Huang, Wenyu Luo, Shengbin Lin:
A Game-Based Mechanism of Relay Selection for Wireless Network Security. VTC Spring 2014: 1-5 - 2011
- [c4]Chaoke Pei, Li Gao, Donghui Wang, Ying Hong:
A PFT Visual Attention Detection Model Using Bayesian Framework. ICIG 2011: 816-820 - 2010
- [c3]Weipeng Ma, Li Gao, Ying Hong, Donghui Wang, Chaoke Pei:
A fuzzy logic based fast inter mode selection algorithm in H.264/AVC. ICIMCS 2010: 65-68 - [c2]Ying Hong:
Western Mainstream Computer Typeface for Large Amounts of Information Design. MVHI 2010: 165-167 - 2009
- [c1]Tao Yu, Qiang Wu, Ying Hong:
Analysis on the Spillover Effect of Foreign Direct Investment: Case of Suzhou. NCM 2009: 1203-1206
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:10 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint