


default search action
Xiaobo Hu
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Xiaobo Sharon Hu
(aka: Xiaobo Hu 0001, X. Sharon Hu) — University of Notre Dame, Department of Computer Science and Engineering
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Dingyu Shou
, Chao Li
, Zhen Wang
, Song Cheng, Xiaobo Hu, Kai Zhang
, Mi Wen, Yong Wang
:
An Intrusion Detection Method Based on Attention Mechanism to Improve CNN-BiLSTM Model. Comput. J. 67(5): 1851-1865 (2024) - [j15]Xiaobo Hu
, Jianbo Su
, Jun Zhang:
Disturbance rejection with compensation on features. Pattern Recognit. 147: 110129 (2024) - [j14]Xiaobo Hu
, Youfang Lin
, Shuo Wang
, Zhihao Wu, Kai Lv
:
Agent-Centric Relation Graph for Object Visual Navigation. IEEE Trans. Circuits Syst. Video Technol. 34(2): 1295-1309 (2024) - [j13]Yan Pu
, Maoguo Gong
, Tongfei Liu
, Mingyang Zhang
, Tianqi Gao
, Fenlong Jiang
, Xiaobo Hu:
Adversarial Feature Equilibrium Network for Multimodal Change Detection in Heterogeneous Remote Sensing Images. IEEE Trans. Geosci. Remote. Sens. 62: 1-17 (2024) - [j12]Xiaobo Hu
, Youfang Lin
, Hehe Fan
, Shuo Wang
, Zhihao Wu
, Kai Lv
:
Building Category Graphs Representation with Spatial and Temporal Attention for Visual Navigation. ACM Trans. Multim. Comput. Commun. Appl. 20(7): 217:1-217:22 (2024) - [c18]Shuo Wang, Zhihao Wu, Xiaobo Hu, Jinwen Wang, Youfang Lin, Kai Lv:
What Effects the Generalization in Visual Reinforcement Learning: Policy Consistency with Truncated Return Prediction. AAAI 2024: 5590-5598 - [c17]Xiaobo Yang, Xiaobo Hu, Chao Li, Lin Zhou, Yong Wang:
A Lightweight Edge Network Intrusion Detection System Based on MobileVit. ICPCSEE (3) 2024: 19-31 - [c16]Zhiming Ma, Lin Zhou, Xiaobo Hu, Chao Li, Siyuan Chen, Yong Wang:
Stage-Zero: A Dynamic Ensemble Method for Intrusion Detection in Industrial Control Systems. ICPCSEE (3) 2024: 254-267 - [c15]Yunlong Ye, Lin Zhou, Xiaobo Hu, Yong Wang:
TCB Intrusion Detection Method Based on Data Enhancement. ICPCSEE (2) 2024: 269-280 - [c14]Shuo Wang, Zhihao Wu, Jinwen Wang, Xiaobo Hu, Youfang Lin, Kai Lv:
How to Learn Domain-Invariant Representations for Visual Reinforcement Learning: An Information-Theoretical Perspective. IJCAI 2024: 1389-1397 - 2023
- [j11]Song Cheng, Hailong Zhang, Xiaobo Hu, Shunxian Gao
, Huizhi Liu:
Efficient Exploitation of Noise Leakage for Template Attack. IEEE Embed. Syst. Lett. 15(3): 161-164 (2023) - [j10]Xiaobo Hu, Jianbo Su, Jun Zhang:
Disturbance rejection in pattern recognition: a realization of quantum neural network. Quantum Inf. Process. 22(11): 409 (2023) - [j9]Xiaobo Hu
, Wei Xu
, Yi Gan, Jianbo Su
, Jun Zhang
:
Towards Disturbance Rejection in Feature Pyramid Network. IEEE Trans. Artif. Intell. 4(4): 946-958 (2023) - [j8]Hongyu Xie
, Dong Zhang
, Xiaobo Hu
, MengChu Zhou
, Zhengcai Cao
:
Autonomous Multirobot Navigation and Cooperative Mapping in Partially Unknown Environments. IEEE Trans. Instrum. Meas. 72: 1-12 (2023) - [j7]Hongyu Xie
, Dong Zhang
, Jun Wang
, MengChu Zhou
, Zhengcai Cao
, Xiaobo Hu
, Abdullah Abusorrah
:
Semi-Direct Multimap SLAM System for Real-Time Sparse 3-D Map Reconstruction. IEEE Trans. Instrum. Meas. 72: 1-13 (2023) - [j6]Shuo Wang
, Zhihao Wu, Xiaobo Hu
, Youfang Lin
, Kai Lv
:
Skill-Based Hierarchical Reinforcement Learning for Target Visual Navigation. IEEE Trans. Multim. 25: 8920-8932 (2023) - [c13]Jiarui Lei, Xiaobo Hu, Yue Wang, Dong Liu:
PyramidFlow: High-Resolution Defect Contrastive Localization Using Pyramid Normalizing Flow. CVPR 2023: 14143-14152 - [i5]Jiarui Lei, Xiaobo Hu, Yue Wang, Dong Liu:
PyramidFlow: High-Resolution Defect Contrastive Localization using Pyramid Normalizing Flow. CoRR abs/2303.02595 (2023) - [i4]Xiaobo Hu, Youfang Lin, Yue Liu, Jinwen Wang, Shuo Wang, Hehe Fan, Kai Lv:
A Reliable Representation with Bidirectional Transition Model for Visual Reinforcement Learning Generalization. CoRR abs/2312.01915 (2023) - [i3]Xiaobo Hu, Youfang Lin, Hehe Fan, Shuo Wang, Zhihao Wu, Kai Lv:
Building Category Graphs Representation with Spatial and Temporal Attention for Visual Navigation. CoRR abs/2312.03327 (2023) - 2022
- [j5]Xiaobo Hu
, Dejun Zhang
, Jinzhi Chen, Yiqi Wu
, Yilin Chen:
NrtNet: An Unsupervised Method for 3D Non-Rigid Point Cloud Registration Based on Transformer. Sensors 22(14): 5128 (2022) - [c12]Song Cheng, Hailong Zhang, Xiaobo Hu, Shunxian Gao, Huizhi Liu:
Variance analysis based distinguisher for template attack. CIS 2022: 381-385 - [c11]Quan He, Xiaobo Hu, Feng Sun, Lulu Zhou, Jing Wang, Qiming Wan:
Improved-STCN Network with Enhanced Strategy for Sequence Polyp Segmentation. EndoCV@ISBI 2022: 29-34 - 2021
- [c10]Danni Peng, Xiaobo Hu, Anxiang Zeng, Jie Zhang:
Preventing Overfitting via Sample Reweighting for Recommender System Incremental Update (Student Abstract). AAAI 2021: 15863-15864 - [i2]Xiaobo Hu, Zhihao Wu, Kai Lv, Shuo Wang, Youfang Lin:
Agent-Centric Relation Graph for Object Visual Navigation. CoRR abs/2111.14422 (2021) - 2020
- [j4]Xiaobo Hu, Youyang Wang, Yun Jia
, Jianyu Hong, Tengfei Chen, Juanjuan Xue, Yuanjing Chen, Jiahua Tao
, Guoen Weng, Shaoqiang Chen
, Ziqiang Zhu, Junhao Chu:
Resistive Effects on the Spatially Resolved Absolute Electroluminescence of Thin-Film Cu(In, Ga)Se2 Solar Cells Studied by a Distributed Two-Diode Model. IEEE Access 8: 112859-112866 (2020) - [c9]Ruoyu Wang, Xiaobo Hu, Daniel Sun, Guoqiang Li, Raymond K. Wong, Shiping Chen
, Jianquan Liu:
Statistical Detection Of Collective Data Fraud. ICME 2020: 1-6
2010 – 2019
- 2019
- [c8]Wen Bo, Yufang Sun, Xiaobo Hu, Qian Xu, Changyou Zhang:
Customer Value Analysis Method Based on Automotive Multi-value-Chain Collaboration. ChineseCSCW 2019: 158-169 - 2018
- [c7]Rui Jin, Yidong Yuan, Ruishan Xin, Jie Gan, Xiaobo Hu, Yanyan Yu, Na Li, Yiqiang Zhao:
Active Shield Design for Security Chip in Smart Grid. FCS 2018: 273-281 - [c6]Xiaobo Hu, Enguang Guan, Weixin Yan, Yanzheng Zhao:
A Real-Time Abnormal Data Detecting Strategy for Length Sensors Measurement. RCAR 2018: 508-513 - 2017
- [c5]Kaiyu Zhang, Sen Xu, Dawu Gu, Haihua Gu, Junrong Liu, Zheng Guo, Ruitong Liu, Liang Liu, Xiaobo Hu:
Practical Partial-Nonce-Exposure Attack on ECC Algorithm. CIS 2017: 248-252 - [c4]Xiaobo Hu, Xinhuai Tang, Feilong Tang:
Analysis of Investment Relationships Between Companies and Organizations Based on Knowledge Graph. IMIS 2017: 208-218 - 2014
- [j3]Ming Tang, Zhenlong Qiu, Hongbo Peng, Xiaobo Hu, Yi Mu, Huanguo Zhang:
Toward reverse engineering on secret S-boxes in block ciphers. Sci. China Inf. Sci. 57(3): 1-18 (2014) - [j2]Leo Yu Zhang
, Xiaobo Hu, Yuansheng Liu, Kwok-Wo Wong, Jie Gan:
A chaotic image encryption scheme owning temp-value feedback. Commun. Nonlinear Sci. Numer. Simul. 19(10): 3653-3659 (2014) - [j1]Ming Tang, Zhenlong Qiu, Weijie Li, Weijin Sun, Xiaobo Hu, Huanguo Zhang:
Power analysis based reverse engineering on the secret round function of block ciphers. Concurr. Comput. Pract. Exp. 26(8): 1531-1545 (2014) - [c3]Cuiping Shao, Huiyun Li, Guoqing Xu, Xiaobo Hu:
Design for security test on cryptographic ICs for design-time security evaluation. IDT 2014: 1-6 - 2013
- [c2]Haohan Wang, Yiwei Li, Xiaobo Hu, Yucong Yang, Zhu Meng, Kai-Min Chang:
Using EEG to Improve Massive Open Online Courses Feedback Interaction. AIED Workshops 2013 - [i1]Leo Yu Zhang, Xiaobo Hu, Yuansheng Liu, Kwok-Wo Wong, Jie Gan:
A chaotic image encryption scheme owning temp-value feedback. CoRR abs/1304.2612 (2013)
2000 – 2009
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-13 20:18 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint