Name
Papers
Collaborators
LIU YAO
32
70
Citations 
PageRank 
Referers 
31
12.05
78
Referees 
References 
588
198
Search Limit
100588
Title
Citations
PageRank
Year
Would Humans Want to Work Side-by-Side with Autonomous Robots - The Effect of Robot Autonomy on Perceived Usefulness, Ease of Use and Desire for Contact.00.342021
A Study of Spectra Bandwidth Index Setting of Infrared Imager Based on Spectrum Simulation.00.342021
Web Objectionable Video Recognition Based on Deep Multi-Instance Learning With Representative Prototypes Selection00.342021
Asynchronous Teacher Guided Bit-Wise Hard Mining For Online Hashing00.342021
Hyperspectral Image Classification Based on a Shuffled Group Convolutional Neural Network with Transfer Learning.00.342020
SSAH: Semi-supervised Adversarial Deep Hashing with Self-paced Hard Sample Generation00.342020
A Planning Approach Based On Aptl00.342019
Bidirectional Temporal Convolution with Self-Attention Network for CTC-Based Acoustic Modeling00.342019
Clustering-Based Score Normalization for Speaker Verification00.342019
Lightweight Secure Processor Prototype on FPGA00.342018
Overview of Logistics Equilibrium Distribution Networks System - An Urban Perspective.00.342018
Optimizing TLB for Access Pattern Privacy Protection in Data Outsourcing.00.342017
NodeLeaper: Lower Overhead Oblivious AVL Tree00.342017
Spoofing Attacks against FM Indoor Localization.00.342016
Hashing for Cross-Modal Similarity Retrieval.00.342015
Isboxing: An Instruction Substitution Based Data Sandboxing For X86 Untrusted Libraries40.412015
A Simple Filtering Algorithm for Continuous Collision Detection Using Taylor Models00.342015
A New Approach to Embedding Semantic Link Network with Word2Vec Binary Code.00.342015
A 2+1 multi-bit incremental architecture using Smart-DEM algorithm00.342014
Stiffness Modeling and Optimization Analysis of a Novel 6-DOF Collaborative Parallel Manipulator.00.342014
EqualVisor: Providing Memory Protection in an Untrusted Commodity Hypervisor00.342014
Using Machine Language Model for Mimimorphic Malware Detection.00.342014
Community Detecting and Feature Analysis in Real Directed Weighted Social Networks.40.712013
A social similarity-aware multicast routing protocol in delay tolerant networks10.352013
A non-monetary protocol for peer-to-peer content distribution in wireless broadcast networks with network coding20.412013
Study on Construction of Semantic Metadata Structure in Professional Fields00.342013
Digital assisted high-order multi-bit analog to digital ramp converters.00.342011
Spatio-temporal data clustering based on type-2 fuzzy sets and cloud models00.342010
Research on Non-interactive Literature-Based Knowledge Discovery10.432008
Research on the Key Technology Based-NLP Of Chinese Medicine Pulse's Mathematical Quantifying20.452008
On Method and Automatic Construction Theory of Domain Ontology Based on Depended Text30.512006
Privacy Preservation for Data Cubes140.672004