default search action
Teng Hu
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j35]Qiao Yang, Zhizhong Kang, Teng Hu, Zhen Cao, Chenming Ye, Dongming Liu, Haoxiang Hu, Shuai Shao:
Cross-section extraction and model reconstruction of lava tube based on L1-medial skeleton. Int. J. Appl. Earth Obs. Geoinformation 132: 104062 (2024) - [j34]Ran Yi, Teng Hu, Mengfei Xia, Yizhe Tang, Yong-Jin Liu:
FEditNet++: Few-Shot Editing of Latent Semantics in GAN Spaces With Correlated Attribute Disentanglement. IEEE Trans. Pattern Anal. Mach. Intell. 46(12): 9975-9990 (2024) - [j33]Xinyu Ma, Meixi Chen, Teng Hu, Zhizhong Kang, Meng Xiao:
Study on the Degradation Pattern of Impact Crater Populations in Yutu-2′s Rovering Area. Remote. Sens. 16(13): 2356 (2024) - [j32]Meixi Chen, Xinyu Ma, Teng Hu, Zhizhong Kang, Meng Xiao:
Multi-Platform Integrated Analysis of the Degradation Patterns of Impact Crater Populations on the Lunar Surface. Remote. Sens. 16(13): 2359 (2024) - [j31]Teng Hu, Cheng Wang, Qing Yang, Xue Chen, Rui Li:
Leveraging Adversarial Augmentation on Imbalance Data for Online Trading Fraud Detection. IEEE Trans. Comput. Soc. Syst. 11(2): 1602-1614 (2024) - [j30]Qing Yang, Cheng Wang, Haifeng Yuan, Jipeng Cui, Teng Hu, Xue Chen, Changjun Jiang:
Approaching the Information-Theoretic Limit of Privacy Disclosure With Utility Guarantees. IEEE Trans. Inf. Forensics Secur. 19: 3339-3352 (2024) - [c20]Teng Hu, Jiangning Zhang, Ran Yi, Yuzhen Du, Xu Chen, Liang Liu, Yabiao Wang, Chengjie Wang:
AnomalyDiffusion: Few-Shot Anomaly Image Generation with Diffusion Model. AAAI 2024: 8526-8534 - [c19]Teng Hu, Ran Yi, Baihong Qian, Jiangning Zhang, Paul L. Rosin, Yu-Kun Lai:
SuperSVG: Superpixel-Based Scalable Vector Graphics Synthesis. CVPR 2024: 24892-24901 - [c18]Haokun Zhu, Juang Ian Chong, Teng Hu, Ran Yi, Yu-Kun Lai, Paul L. Rosin:
SAMVG: A Multi-Stage Image Vectorization Model with the Segment-Anything Model. ICASSP 2024: 4350-4354 - [c17]Yuzhen Du, Teng Hu, Ran Yi, Lizhuang Ma:
LD-BFR: Vector-Quantization-Based Face Restoration Model with Latent Diffusion Enhancement. ACM Multimedia 2024: 2852-2860 - [c16]Teng Hu, Jiangning Zhang, Ran Yi, Yating Wang, Jieyu Weng, Hongrui Huang, Yabiao Wang, Lizhuang Ma:
COMD: Training-free Video Motion Transfer With Camera-Object Motion Disentanglement. ACM Multimedia 2024: 3459-3468 - [c15]Ran Yi, Haokun Zhu, Teng Hu, Yu-Kun Lai, Paul L. Rosin:
AesStyler: Aesthetic Guided Universal Style Transfer. ACM Multimedia 2024: 9789-9798 - [i11]Teng Hu, Jiangning Zhang, Ran Yi, Yating Wang, Hongrui Huang, Jieyu Weng, Yabiao Wang, Lizhuang Ma:
MotionMaster: Training-free Camera Motion Transfer For Video Generation. CoRR abs/2404.15789 (2024) - [i10]Teng Hu, Ran Yi, Baihong Qian, Jiangning Zhang, Paul L. Rosin, Yu-Kun Lai:
SuperSVG: Superpixel-based Scalable Vector Graphics Synthesis. CoRR abs/2406.09794 (2024) - [i9]Ying Jin, Jinlong Peng, Qingdong He, Teng Hu, Hao Chen, Jiafu Wu, Wenbing Zhu, Mingmin Chi, Jun Liu, Yabiao Wang, Chengjie Wang:
DualAnoDiff: Dual-Interrelated Diffusion Model for Few-Shot Anomaly Image Generation. CoRR abs/2408.13509 (2024) - [i8]Teng Hu, Jiangning Zhang, Ran Yi, Hongrui Huang, Yabiao Wang, Lizhuang Ma:
SaRA: High-Efficient Diffusion Model Fine-tuning with Progressive Sparse Low-Rank Adaptation. CoRR abs/2409.06633 (2024) - [i7]Yizhe Tang, Yue Wang, Teng Hu, Ran Yi, Xin Tan, Lizhuang Ma, Yu-Kun Lai, Paul L. Rosin:
AttentionPainter: An Efficient and Adaptive Stroke Predictor for Scene Painting. CoRR abs/2410.16418 (2024) - 2023
- [j29]Xue Chen, Cheng Wang, Qing Yang, Teng Hu, Changjun Jiang:
Locally differentially private high-dimensional data synthesis. Sci. China Inf. Sci. 66(1) (2023) - [j28]Teng Hu, Siqi Yang, Yanping Wang, Gongliang Li, Yulong Wang, Gang Wang, Mingyong Yin:
N-Accesses: A Blockchain-Based Access Control Framework for Secure IoT Data Management. Sensors 23(20): 8535 (2023) - [j27]Xue Chen, Cheng Wang, Jipeng Cui, Qing Yang, Teng Hu, Changjun Jiang:
Incorporating Prior Knowledge in Local Differentially Private Data Collection for Frequency Estimation. IEEE Trans. Big Data 9(2): 499-511 (2023) - [j26]Xue Chen, Cheng Wang, Qing Yang, Teng Hu, Changjun Jiang:
The Opportunity in Difficulty: A Dynamic Privacy Budget Allocation Mechanism for Privacy-Preserving Multi-dimensional Data Collection. ACM Trans. Manag. Inf. Syst. 14(1): 8:1-8:24 (2023) - [c14]Yixiao Xu, Xiaolei Liu, Teng Hu, Bangzhou Xin, Run Yang:
Sparse Black-Box Inversion Attack with Limited Information. ICASSP 2023: 1-5 - [c13]Teng Hu, Jiangning Zhang, Liang Liu, Ran Yi, Siqi Kou, Haokun Zhu, Xu Chen, Yabiao Wang, Chengjie Wang, Lizhuang Ma:
Phasic Content Fusing Diffusion Model with Directional Distribution Consistency for Few-Shot Model Adaption. ICCV 2023: 2406-2415 - [c12]Teng Hu, Cheng Wang, Qing Yang, Xue Chen:
Hard Anomaly Detection: An Adversarial Data Augmentation Solution. ICDM (Workshops) 2023: 1065-1075 - [c11]Teng Hu, Ran Yi, Haokun Zhu, Liang Liu, Jinlong Peng, Yabiao Wang, Chengjie Wang, Lizhuang Ma:
Stroke-based Neural Painting and Stylization with Dynamically Predicted Painting Region. ACM Multimedia 2023: 7470-7480 - [i6]Sijin Wu, Dan Zhang, Teng Hu, Shikun Feng:
DocPrompt: Large-scale continue pretrain for zero-shot and few-shot document question answering. CoRR abs/2308.10959 (2023) - [i5]Teng Hu, Ran Yi, Haokun Zhu, Liang Liu, Jinlong Peng, Yabiao Wang, Chengjie Wang, Lizhuang Ma:
Stroke-based Neural Painting and Stylization with Dynamically Predicted Painting Region. CoRR abs/2309.03504 (2023) - [i4]Teng Hu, Jiangning Zhang, Liang Liu, Ran Yi, Siqi Kou, Haokun Zhu, Xu Chen, Yabiao Wang, Chengjie Wang, Lizhuang Ma:
Phasic Content Fusing Diffusion Model with Directional Distribution Consistency for Few-Shot Model Adaption. CoRR abs/2309.03729 (2023) - [i3]Haokun Zhu, Juang Ian Chong, Teng Hu, Ran Yi, Yu-Kun Lai, Paul L. Rosin:
SAMVG: A Multi-stage Image Vectorization Model with the Segment-Anything Model. CoRR abs/2311.05276 (2023) - [i2]Teng Hu, Jiangning Zhang, Ran Yi, Yuzhen Du, Xu Chen, Liang Liu, Yabiao Wang, Chengjie Wang:
AnomalyDiffusion: Few-Shot Anomaly Image Generation with Diffusion Model. CoRR abs/2312.05767 (2023) - 2022
- [j25]Bangzhou Xin, Yangyang Geng, Teng Hu, Sheng Chen, Wei Yang, Shaowei Wang, Liusheng Huang:
Federated synthetic data generation with differential privacy. Neurocomputing 468: 1-10 (2022) - [j24]Hui Wang, Teng Hu, Zhen Wang, Zhizhong Kang, Perpetual Hope Akwensi, Juntao Yang:
Reconstruction of Power Pylons From LiDAR Point Clouds Based on Structural Segmentation and Parameter Estimation. IEEE Geosci. Remote. Sens. Lett. 19: 1-5 (2022) - [j23]Teng Hu, Ze Yang, Zhizhong Kang, Hongyu Lin, Jie Zhong, Dongya Zhang, Yameng Cao, Haomin Geng:
Population of Degrading Small Impact Craters in the Chang'E-4 Landing Area Using Descent and Ground Images. Remote. Sens. 14(15): 3608 (2022) - [j22]Xiaojian Xu, Teng Hu, Zhizhong Kang, Xing Du, Lin Zhao:
Study of the Buried Basin C-H, Based on the Multi-Source Remote Sensing Data. Remote. Sens. 14(21): 5284 (2022) - [j21]Qing Yang, Cheng Wang, Teng Hu, Xue Chen, Changjun Jiang:
Implicit privacy preservation: a framework based on data generation. Secur. Saf. 1: 2022008 (2022) - [j20]Kangyi Ding, Teng Hu, Weina Niu, Xiaolei Liu, Junpeng He, Mingyong Yin, Xiaosong Zhang:
A Novel Steganography Method for Character-Level Text Image Based on Adversarial Attacks. Sensors 22(17): 6497 (2022) - [c10]Yixiao Xu, Xiaolei Liu, Mingyong Yin, Teng Hu, Kangyi Ding:
Sparse Adversarial Attack For Video Via Gradient-Based Keyframe Selection. ICASSP 2022: 2874-2878 - [c9]Kangyi Ding, Teng Hu, Xiaolei Liu, Weina Niu, Yanping Wang, Xiaosong Zhang:
Targeted Anonymization: A Face Image Anonymization Method for Unauthorized Models. ICME 2022: 1-6 - [i1]Qiming Peng, Yinxu Pan, Wenjin Wang, Bin Luo, Zhenyu Zhang, Zhengjie Huang, Teng Hu, Weichong Yin, Yongfeng Chen, Yin Zhang, Shikun Feng, Yu Sun, Hao Tian, Hua Wu, Haifeng Wang:
ERNIE-Layout: Layout Knowledge Enhanced Pre-training for Visually-rich Document Understanding. CoRR abs/2210.06155 (2022) - 2021
- [j19]Kun Zhou, Wenyong Wang, Teng Hu, Kai Deng:
Application of Improved Asynchronous Advantage Actor Critic Reinforcement Learning Model on Anomaly Detection. Entropy 23(3): 274 (2021) - [j18]Teng Hu, Xiaolei Liu, Ting Chen, Xiaosong Zhang, Xiaoming Huang, Weina Niu, Jiazhong Lu, Kun Zhou, Yuan Liu:
Transaction-based classification and detection approach for Ethereum smart contract. Inf. Process. Manag. 58(2): 102462 (2021) - [j17]Kangyi Ding, Xiaolei Liu, Weina Niu, Teng Hu, Yanping Wang, Xiaosong Zhang:
A low-query black-box adversarial attack based on transferability. Knowl. Based Syst. 226: 107102 (2021) - [j16]Peng Lu, Teng Hu, Hao Wang, Ruobin Zhang, Guo Wu:
G-CAS: Greedy Algorithm-Based Security Event Correlation System for Critical Infrastructure Network. Secur. Commun. Networks 2021: 3566360:1-3566360:13 (2021) - [j15]Qing Yang, Cheng Wang, Changqi Wang, Teng Hu, Changjun Jiang:
Fundamental Limits of Data Utility: A Case Study for Data-Driven Identity Authentication. IEEE Trans. Comput. Soc. Syst. 8(2): 398-409 (2021) - [c8]Fanzhi Meng, Peng Lu, Junhao Li, Teng Hu, Mingyong Yin, Fang Lou:
GRU and Multi-autoencoder based Insider Threat Detection for Cyber Security. DSC 2021: 203-210 - 2020
- [j14]Teng Hu, Ishtiaq Ahmad, Alamgir M. S. M, KyungHi Chang:
3D Optimal Surveillance Trajectory Planning for Multiple UAVs by Using Particle Swarm Optimization With Surveillance Area Priority. IEEE Access 8: 86316-86327 (2020) - [j13]Jiazhong Lu, Xiaosong Zhang, Xiaolei Liu, Teng Hu, Yu Cao:
An equalisation control method for network big data transmission based on parallel computing. Int. J. Internet Protoc. Technol. 13(1): 32-38 (2020) - [j12]Teng Hu, Bangzhou Xin, Xiaolei Liu, Ting Chen, Kangyi Ding, Xiaosong Zhang:
Tracking the Insider Attacker: A Blockchain Traceability System for Insider Threats. Sensors 20(18): 5297 (2020) - [j11]Kun Zhou, Wenyong Wang, Teng Hu, Kai Deng:
Time Series Forecasting and Classification Models Based on Recurrent with Attention Mechanism and Generative Adversarial Networks. Sensors 20(24): 7211 (2020) - [c7]Xiaolei Liu, Teng Hu, Kangyi Ding, Yang Bai, Weina Niu, Jiazhong Lu:
A Black-Box Attack on Neural Networks Based on Swarm Evolutionary Algorithm. ACISP 2020: 268-284 - [c6]Yanping Wang, Xiaofen Wang, Pan Wen, Teng Hu, Xiaosong Zhang:
A Privacy-Preserving Blockchain-based Information Shared Scheme in Smart-Cities. CSoNet 2020: 283-294
2010 – 2019
- 2019
- [j10]Jiazhong Lu, Weina Niu, Xiaolei Liu, Teng Hu, Xiaosong Zhang:
A Lockable Abnormal Electromagnetic Signal Joint Detection Algorithm. Int. J. Pattern Recognit. Artif. Intell. 33(13): 1958009:1-1958009:17 (2019) - [j9]Jiazhong Lu, Xiaolei Liu, Teng Hu, Jianwei Zhang, Xiaosong Zhang:
Network Intrusion Feature Map Node Equalization Algorithm Based on Modified Variable Step-Size Constant Modulus. Int. J. Pattern Recognit. Artif. Intell. 33(14): 1955015:1-1955015:15 (2019) - [j8]Weina Niu, Ting Li, Xiaosong Zhang, Teng Hu, Tianyu Jiang, Heng Wu:
Using XGBoost to Discover Infected Hosts Based on HTTP Traffic. Secur. Commun. Networks 2019: 2182615:1-2182615:11 (2019) - [j7]Teng Hu, Weina Niu, Xiaosong Zhang, Xiaolei Liu, Jiazhong Lu, Yuan Liu:
An Insider Threat Detection Approach Based on Mouse Dynamics and Deep Learning. Secur. Commun. Networks 2019: 3898951:1-3898951:12 (2019) - [j6]Jiazhong Lu, Fengmao Lv, Zhongliu Zhuo, Xiaosong Zhang, Xiaolei Liu, Teng Hu, Wei Deng:
Integrating Traffics with Network Device Logs for Anomaly Detection. Secur. Commun. Networks 2019: 5695021:1-5695021:10 (2019) - [j5]Zhizhong Kang, Xingkun Wang, Teng Hu, Juntao Yang:
Coarse-to-Fine Extraction of Small-Scale Lunar Impact Craters From the CCD Images of the Chang'E Lunar Orbiters. IEEE Trans. Geosci. Remote. Sens. 57(1): 181-193 (2019) - [j4]Weina Niu, Xiaosong Zhang, Xiaojiang Du, Teng Hu, Xin Xie, Nadra Guizani:
Detecting Malware on X86-Based IoT Devices in Autonomous Driving. IEEE Wirel. Commun. 26(4): 80-87 (2019) - [c5]Ting Chen, Zihao Li, Yufei Zhang, Xiapu Luo, Ting Wang, Teng Hu, Xiuzhuo Xiao, Dong Wang, Jin Huang, Xiaosong Zhang:
A Large-Scale Empirical Study on Control Flow Identification of Smart Contracts. ESEM 2019: 1-11 - [c4]Ting Chen, Teng Hu, Jiachi Chen, Xiaosong Zhang, Zihao Li, Yufei Zhang, Xiapu Luo, Ang Chen, Kun Yang, Bin Hu, Tong Zhu, Shifang Deng:
DataEther: Data Exploration Framework For Ethereum. ICDCS 2019: 1369-1380 - [c3]Zhizhong Kang, Teng Hu, Matteo Massironi, Harald Hiesinger:
High-resolution geological mapping and age determination for ILRS site characterization. IGARSS 2019: 4915-4916 - 2018
- [j3]Guanwen Li, Huachun Zhou, Bohao Feng, Guanglei Li, Hongke Zhang, Teng Hu:
Rule Anomaly-Free Mechanism of Security Function Chaining in 5G. IEEE Access 6: 13653-13662 (2018) - [c2]Yuan Fang, Lizhen Wang, Teng Hu:
Spatial Co-location Pattern Mining Based on Density Peaks Clustering and Fuzzy Theory. APWeb/WAIM (2) 2018: 298-305 - [c1]Yuan Fang, Lizhen Wang, Teng Hu, Xiaoxuan Wang:
DFCPM: A Dominant Feature Co-location Pattern Miner. APWeb/WAIM (1) 2018: 456-460 - 2015
- [j2]Zhizhong Kang, Zhongfei Luo, Teng Hu, Paolo Gamba:
Automatic Extraction and Identification of Lunar Impact Craters Based on Optical Data and DEMs Acquired by the Chang'E Satellites. IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. 8(10): 4751-4761 (2015) - 2012
- [j1]Teng Hu, Bingxuan Guo, Huayi Wu, Jianya Gong, Tong Zhang:
Dense Corresponding Pixel Matching Between Aerial Epipolar Images Using an RGB-Belief Propagation Algorithm. IEEE Geosci. Remote. Sens. Lett. 9(6): 1036-1040 (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 21:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint