default search action
Kun Hao
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j24]Kun Hao, Zhihui Deng, Beibei Wang, Zhigang Jin, Zhisheng Li, Xiaofang Zhao:
Lightweight multiobject ship tracking algorithm based on trajectory association and improved YOLOv7tiny. Expert Syst. Appl. 259: 125129 (2025) - 2024
- [j23]Zhisheng Li, Zhihui Deng, Kun Hao, Xiaofang Zhao, Zhigang Jin:
A Ship Detection Model Based on Dynamic Convolution and an Adaptive Fusion Network for Complex Maritime Conditions. Sensors 24(3): 859 (2024) - [j22]Beibei Wang, Xiufang Yue, Kun Hao, Yonglei Liu, Zhisheng Li, Xiaofang Zhao:
An Underwater Source Location Privacy Protection Scheme Based on Game Theory in a Multi-Attacker Cooperation Scenario. Sensors 24(9): 2851 (2024) - 2023
- [j21]Guanke Chen, Kun Hao, Beibei Wang, Zhisheng Li, Xiaofang Zhao:
A power line segmentation model in aerial images based on an efficient multibranch concatenation network. Expert Syst. Appl. 228: 120359 (2023) - [j20]Lu Zhao, Liming Yuan, Kun Hao, Xianbin Wen:
Generalized attention-based deep multi-instance learning. Multim. Syst. 29(1): 275-287 (2023) - [j19]Kun Hao, Junchang Xin, Zhiqiong Wang, Zhongming Yao, Guoren Wang:
Efficient and Secure Data Sharing Scheme on Interoperable Blockchain Database. IEEE Trans. Big Data 9(4): 1171-1185 (2023) - [c10]Zhongming Yao, Zhiqiong Wang, Liang Wen, Kun Hao, Junming Xu:
Efficient Blockchain Data Trusty Provenance Based on the W3C PROV Model. ADMA (5) 2023: 61-76 - [c9]Kun Hao, Jessica Moysen Cortes, Mustafa Özger:
Counterfactual and Causal Analysis for AI-Based Modulation and Coding Scheme Selection. GLOBECOM (Workshops) 2023: 32-37 - 2022
- [j18]Kun Hao, Junchang Xin, Zhiqiong Wang, Zhongming Yao, Guoren Wang:
On efficient top-k transaction path query processing in blockchain database. Data Knowl. Eng. 141: 102079 (2022) - [j17]Yonglei Liu, Kun Hao, Weilong Zhang, Lin Gao, Li Wang:
A Multi-User Shared Mobile Payment Protocol in the Context of Smart Homes. Int. J. Inf. Secur. Priv. 16(1): 1-14 (2022) - [j16]Zili Liu, Kun Hao, Xiaoyi Geng, Zhengxia Zou, Zhenwei Shi:
Dual-Branched Spatio-Temporal Fusion Network for Multihorizon Tropical Cyclone Track Forecast. IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. 15: 3842-3852 (2022) - [j15]Kun Hao, Guanke Chen, Lu Zhao, Zhisheng Li, Yonglei Liu, Chuanqi Wang:
An Insulator Defect Detection Model in Aerial Images Based on Multiscale Feature Pyramid Network. IEEE Trans. Instrum. Meas. 71: 1-12 (2022) - [i1]Zili Liu, Kun Hao, Xiaoyi Geng, Zhenwei Shi:
Dual-Branched Spatio-temporal Fusion Network for Multi-horizon Tropical Cyclone Track Forecast. CoRR abs/2202.13336 (2022) - 2021
- [j14]Kun Hao, Jiale Zhao, Beibei Wang, Yonglei Liu, Chuanqi Wang:
The Application of an Adaptive Genetic Algorithm Based on Collision Detection in Path Planning of Mobile Robots. Comput. Intell. Neurosci. 2021: 5536574:1-5536574:20 (2021) - [j13]Xiang Tian, Baoxian Zhang, Cheng Li, Kun Hao:
Throughput-Optimal Broadcast for Time-Varying Directed Acyclic Wireless Multi-Hop Networks With Energy Harvesting Constraints. IEEE Trans. Green Commun. Netw. 5(4): 2089-2103 (2021) - 2020
- [j12]Kun Hao, Qixin Xue, Cheng Li, Kaicheng Yu:
A Hybrid Localization Algorithm Based on Doppler Shift and AOA for an Underwater Mobile Node. IEEE Access 8: 181662-181673 (2020) - [j11]Kun Hao, Kaicheng Yu, Zijun Gong, Xiujuan Du, Yonglei Liu, Lu Zhao:
An Enhanced AUV- Aided TDoA Localization Algorithm for Underwater Acoustic Sensor Networks. Mob. Networks Appl. 25(5): 1673-1682 (2020) - [j10]Kun Hao, Jiale Zhao, Kaicheng Yu, Cheng Li, Chuanqi Wang:
Path Planning of Mobile Robots Based on a Multi-Population Migration Genetic Algorithm. Sensors 20(20): 5873 (2020) - [j9]Kun Hao, Junchang Xin, Zhiqiong Wang, Guoren Wang:
Outsourced data integrity verification based on blockchain in untrusted environment. World Wide Web 23(4): 2215-2238 (2020)
2010 – 2019
- 2019
- [j8]Kun Hao, Junchang Xin, Zhiqiong Wang, Keyan Cao, Guoren Wang:
Blockchain-Based Outsourced Storage Schema in Untrusted Environment. IEEE Access 7: 122707-122721 (2019) - [j7]Fan Jiang, Cheng Li, Zijun Gong, Yan Zhang, Shudong Liu, Kun Hao:
MMSE-based iterative processing with imperfect channel and parity check in MIMO systems. IET Commun. 13(17): 2660-2667 (2019) - [j6]Fan Jiang, Cheng Li, Zijun Gong, Kun Hao, Shudong Liu, Yan Zhang:
Iterative Approaches for Massive MIMO Uplink Processing Under Imperfect Channel Conditions. IEEE Trans. Veh. Technol. 68(4): 3642-3654 (2019) - [c8]Yuying Ding, Kun Hao, Cheng Li, Yonglei Liu, Lu Zhao, Shudong Liu:
A Routing Void Handling Protocol Based on Autonomous Underwater Vehicle for Underwater Acoustic Sensor Networks. ADHOCNETS 2019: 40-52 - [c7]Fan Jiang, Cheng Li, Zijun Gong, Yan Zhang, Shudong Liu, Kun Hao:
Efficient and Fast Processing of Large Array Signal Detection in Underwater Acoustic Communications. ICC 2019: 1-6 - 2018
- [j5]Kun Hao, Haifeng Shen, Yonglei Liu, Beibei Wang, Xiujuan Du:
Integrating Localization and Energy-Awareness: A Novel Geographic Routing Protocol for Underwater Wireless Sensor Networks. Mob. Networks Appl. 23(5): 1427-1435 (2018) - [j4]Tao Wang, Zheng Yao, Baoxian Zhang, Cheng Li, Kun Hao:
Adaptive Flow Rate Control for Network Utility Maximization Subject to QoS Constraints in Wireless Multi-hop Networks. Peer-to-Peer Netw. Appl. 11(5): 881-899 (2018) - [c6]Sheng Yu, Baoxian Zhang, Chunxi Li, Kun Hao, Cheng Li:
Asymptotical Performance of Ring Based Routing for Wireless Sensor Networks with a Mobile Sink: An Analysis. ADHOCNETS 2018: 93-104 - [c5]Kun Hao, Junchang Xin, Zhiqiong Wang, Zhuochen Jiang, Guoren Wang:
Decentralized Data Integrity Verification Model in Untrusted Environment. APWeb/WAIM (2) 2018: 410-424 - [c4]Ming Gu, Kun Hao, Zhiyi Qu:
Flag Detection with Convolutional Network. CSAI/ICIMT 2018: 258-262 - 2017
- [j3]Zijun Gong, Cheng Li, Fan Jiang, Ruoyu Su, Ramachandran Venkatesan, Chuiyang Meng, Shuai Han, Yan Zhang, Shudong Liu, Kun Hao:
Design, Analysis, and Field Testing of an Innovative Drone-Assisted Zero-Configuration Localization Framework for Wireless Sensor Networks. IEEE Trans. Veh. Technol. 66(11): 10322-10335 (2017) - [c3]Kun Hao, Haifeng Shen, Yonglei Liu, Beibei Wang:
An Energy-Efficient Localization-Based Geographic Routing Protocol for Underwater Wireless Sensor Networks. WICON 2017: 365-373 - [c2]Meiwei Hao, Hua-Lin Dai, Kun Hao, Cheng Li, Yun-Jie Zhang, Hao-Nan Song:
Optimization of Density-Based K-means Algorithm in Trajectory Data Clustering. WICON 2017: 440-450 - 2016
- [c1]Kun Hao, Xiaolin Zhang, Lixin Liu, Huanxiang Zhang:
An Efficient Algorithm for XML Keyword Search Based on Interval Encoding. IEEE WISA 2016: 45-50 - 2015
- [j2]Tao Yang, Fa-Kai Wen, Kun Hao, Li-Ke Cao, Rui-Hong Yue:
The Effect of a Long-Range Correlated-Hopping Interaction on Bariev Spin Chains. Entropy 17(9): 6044-6055 (2015) - [j1]Kun Hao, Zhigang Jin, Haifeng Shen, Ying Wang:
An Efficient and Reliable Geographic Routing Protocol Based on Partial Network Coding for Underwater Sensor Networks. Sensors 15(6): 12720-12735 (2015)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-04 20:01 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint