default search action
Bowen Hu
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j18]Yun Wang, Kang Tian, Yanghan Gao, Bowen Hu, Xiaoyang Li, Yadong Zhou:
Enhancing the Performance of Multi-Category Text Classification via Label Relation Mining. IEEE Access 12: 61433-61442 (2024) - [j17]Haotian Liu, Yadong Zhou, Yuxun Zhou, Bowen Hu:
Heterogeneous Dual-Dynamic Attention Network for Modeling Mutual Interplay of Stocks. IEEE Trans. Artif. Intell. 5(7): 3595-3606 (2024) - [j16]Bowen Hu, Yadong Zhou, Jiang Wu, Ting Liu:
Estimating Nodal Admittance Matrix for Ill-Posed Inverse Power Flow Problem in Power Grid. IEEE Trans. Ind. Informatics 20(4): 5924-5936 (2024) - [j15]Bowen Hu, Choujun Zhan, Buzhou Tang, Bingchuan Wang, Baiying Lei, Shuqiang Wang:
3-D Brain Reconstruction by Hierarchical Shape-Perception Network From a Single Incomplete Image. IEEE Trans. Neural Networks Learn. Syst. 35(10): 13271-13283 (2024) - [j14]Bowen Hu, Yadong Zhou, Yuxun Zhou, Jiang Wu, Ting Liu, Xiaohong Guan:
Data Protection Method Against Cross-Domain Inference Threat in Cyber-Physical Power Grid. IEEE Trans. Smart Grid 15(4): 4170-4181 (2024) - [c13]Bowen Hu, Ziyi Yu, Yadong Zhou, Sizhe He, Yang Liu, Ting Liu, Xiaohong Guan:
A Positive-Unlabeled Learning Approach for Detecting Malicious In-app Purchases on the App Store. CASE 2024: 239-244 - [c12]Weiwei Tan, Bowen Hu, Yadong Zhou, Sizhe He, Yang Liu, Ting Liu, Xiaohong Guan:
A Virtual Primary Key Generation Scheme Based on Dimensionality Reduction and Encoding for Digital Fingerprinting. CASE 2024: 252-257 - [c11]Bowen Hu, Weiyang He, Si Wang, Wenye Liu, Chip-Hong Chang:
Live Demonstration: Man-in-the-Middle Attack on Edge Artificial Intelligence. ISCAS 2024: 1 - [c10]Ziwei Li, Zhaoqi Yang, Bowen Hu, Tong Li, Bo Wu, Yukuan Ding, Dulin Xu, Ke Xu:
ReND: Toward Reasoning-based BLE Neighbor Discovery by Integrating with Wi-Fi Fingerprints. IWQoS 2024: 1-6 - 2023
- [j13]Yadong Zhou, Bowen Hu, Junjie Zhang, Liyuan Sun, Xingyu Zhu, Ting Liu:
Detecting suspicious transactions in a virtual-currency-enabled online social network. J. Netw. Comput. Appl. 211: 103555 (2023) - [j12]Bowen Hu, Chunjie Zhou, Yu-Chu Tian, Xin Du, Xiaoya Hu:
Attack Intention Oriented Dynamic Risk Propagation of Cyberattacks on Cyber-Physical Power Systems. IEEE Trans. Ind. Informatics 19(3): 2453-2462 (2023) - [c9]Gongju Wang, Yulun Song, Yang Li, Mingjian Ni, Long Yan, Bowen Hu, Quanda Wang, Yixuan Li, Xingru Huang:
D-AE: A Discriminant Encode-Decode Nets for Data Generation. CollaborateCom (2) 2023: 96-114 - [c8]Tong Li, Bowen Hu, Guanjie Tu, Jinwen Shuai, Jiaxin Liang, Yukuan Ding, Ziwei Li, Ke Xu:
Accelerating BLE Neighbor Discovery via Wi-Fi Fingerprints. INFOCOM Workshops 2023: 1-2 - [i4]Bowen Hu, Baiying Lei, Shuqiang Wang:
SG-GAN: Fine Stereoscopic-Aware Generation for 3D Brain Point Cloud Up-sampling from a Single Image. CoRR abs/2305.12646 (2023) - [i3]Le Huang, Fan Xia, Hui Chen, Bowen Hu, Xiao Zhou, Chunxiao Li, Yaohui Jin, Yanyan Xu:
Reconstructing human activities via coupling mobile phone data with location-based social networks. CoRR abs/2306.03441 (2023) - 2022
- [j11]Bowen Hu, Yingwen Chen, HuJie Yu, Linghang Meng, Zhimin Duan:
Blockchain-Enabled Data-Sharing Scheme for Consumer IoT Applications. IEEE Consumer Electron. Mag. 11(2): 77-87 (2022) - [j10]Bowen Hu, Zhenghang Hao, Zhuo Chen, Jing Zhang:
Combination with Continual Learning Update Scheme for Power System Transient Stability Assessment. Sensors 22(22): 8982 (2022) - [c7]Yunfan Tian, Dongxin Liu, Laifu Wang, Bowen Hu:
A combined-CNN model of TLS Traffic Recognition and Classification. DSC 2022: 491-497 - [c6]Bowen Hu, Yanyan Shen, Guocheng Wu, Shuqiang Wang:
SRT: Shape Reconstruction Transformer for 3D Reconstruction of Point Cloud from 2D MRI. ICMLC 2022: 507-511 - [c5]Wenye Liu, Weiyang He, Bowen Hu, Chip-Hong Chang:
A Practical Man-in-the-Middle Attack on Deep Learning Edge Device by Sparse Light Strip Injection into Camera Data Lane. SOCC 2022: 1-6 - 2021
- [j9]Zhimin Duan, Yingwen Chen, HuJie Yu, Bowen Hu, Chen Chen:
RGB-Fusion: Monocular 3D reconstruction with learned depth prediction. Displays 70: 102100 (2021) - [j8]Chunjie Zhou, Bowen Hu, Yang Shi, Yu-Chu Tian, Xuan Li, Yue Zhao:
A Unified Architectural Approach for Cyberattack-Resilient Industrial Control Systems. Proc. IEEE 109(4): 517-541 (2021) - [j7]Bowen Hu, Chunjie Zhou, Yu-Chu Tian, Xiaoya Hu, Xinjue Junping:
Decentralized Consensus Decision-Making for Cybersecurity Protection in Multimicrogrid Systems. IEEE Trans. Syst. Man Cybern. Syst. 51(4): 2187-2198 (2021) - [j6]Junxin Huang, Yuchuan Luo, Shaojing Fu, Ming Xu, Bowen Hu:
pRide: Privacy-Preserving Online Ride Hailing Matching System With Prediction. IEEE Trans. Veh. Technol. 70(8): 7413-7425 (2021) - [c4]Yadong Zhou, Bowen Hu, Jiang Wu, Zhanbo Xu, Xiaohong Guan, Wei Chen, Ting Liu:
An Estimation Method of Transmission Line Parameters Based on Measurements of Injection Power and Voltage Phasor in Power Grid. CASE 2021: 202-207 - [c3]Tianyi Yue, Yadong Zhou, Bowen Hu, Zhanbo Xu, Xiaohong Guan, Hao Zhou, Ting Liu:
An Unsupervised-Learning Based Method for Detecting Groups of Malicious Web Crawlers in Internet. CASE 2021: 367-372 - [c2]Bowen Hu, Baiying Lei, Yanyan Shen, Yong Liu, Shuqiang Wang:
A Point Cloud Generative Model via Tree-Structured Graph Convolutions for 3D Brain Shape Reconstruction. PRCV (2) 2021: 263-274 - [i2]Bowen Hu, Baiying Lei, Yanyan Shen, Yong Liu, Shuqiang Wang:
A Point Cloud Generative Model via Tree-Structured Graph Convolutions for 3D Brain Shape Reconstruction. CoRR abs/2107.09923 (2021) - [i1]Bowen Hu, Baiying Lei, Yong Liu, Min Gan, Bingchuan Wang, Shuqiang Wang:
3D Brain Reconstruction by Hierarchical Shape-Perception Network from a Single Incomplete Image. CoRR abs/2107.11010 (2021)
2010 – 2019
- 2019
- [j5]Lei Zhang, Bowen Hu, Ning Zhang, Maosen Wang:
图像超分辨率全局残差递归网络 (Global Residual Recursive Network for Image Super-resolution). 计算机科学 46(6A): 230-233 (2019) - [j4]Bowen Hu, Chunjie Zhou, Yu-Chu Tian, Yuanqing Qin, Xinjue Junping:
A Collaborative Intrusion Detection Approach Using Blockchain for Multimicrogrid Systems. IEEE Trans. Syst. Man Cybern. Syst. 49(8): 1720-1730 (2019) - [c1]Victor N. Silva, Ashley Herman, Maryam Mirzaei, Elisa Du, Bowen Hu, Lianne M. Lefsrud, Jörg Sander, Eleni Stroulia, Monica Sawchyn:
Analyzing and visualizing the canadian research landscape. CASCON 2019: 305-310 - 2018
- [j3]Jun Yang, Chunjie Zhou, Shuang-Hua Yang, Haizhou Xu, Bowen Hu:
Anomaly Detection Based on Zone Partition for Security Protection of Industrial Cyber-Physical Systems. IEEE Trans. Ind. Electron. 65(5): 4257-4267 (2018) - [j2]Qi Zhang, Chunjie Zhou, Yu-Chu Tian, Naixue Xiong, Yuanqing Qin, Bowen Hu:
A Fuzzy Probability Bayesian Network Approach for Dynamic Cybersecurity Risk Assessment in Industrial Control Systems. IEEE Trans. Ind. Informatics 14(6): 2497-2506 (2018) - 2016
- [j1]Shuang Huang, Chunjie Zhou, Lili Yang, Yuanqing Qin, Xiongfeng Huang, Bowen Hu:
Transient fault tolerant control for vehicle brake-by-wire systems. Reliab. Eng. Syst. Saf. 149: 148-163 (2016)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 21:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint