default search action
Hong He
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Hong He 0001 — University of Shanghai for Science and Technology, School of Health Science and Engineering, China (and 1 more)
- Hong He 0002 — Beijing University of Technology, Beijing Key Laboratory for Green Catalysis and Separation, Faculty of Environment and Life, China
- Hong He 0003 — Capital University of Economics and Business, China
- Hong He 0004 — Shandong University, School of Information Engineering, Jinan, China (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j17]Xingru Huang, Changpeng Yue, Yihao Guo, Jian Huang, Zhengyao Jiang, Mingkuan Wang, Zhaoyang Xu, Guangyuan Zhang, Jin Liu, Tianyun Zhang, Zhiwen Zheng, Xiaoshuai Zhang, Hong He, Shaowei Jiang, Yaoqi Sun:
Multidimensional Directionality-Enhanced Segmentation via large vision model. Medical Image Anal. 101: 103395 (2025) - 2024
- [j16]Yunyun Chen, Hong He, Xintong Zou, Xuemin Zhang:
When Good Intention Goes Away: Social Feedback Modulates the Influence of Outcome Valence on Temporal Binding. Cogn. Sci. 48(1) (2024) - [j15]Xiaobin Xu, Jiahao Zhou, Xu Weng, Zehui Zhang, Hong He, Felix Steyskal, Georg Brunauer:
A novel evidence reasoning-based RUL prediction method integrating uncertainty information. Reliab. Eng. Syst. Saf. 250: 110250 (2024) - [j14]Xiaohong Li, Yang Li, Hong He:
Computer Network Virus Defense with Data Mining-based Active Protection. Scalable Comput. Pract. Exp. 25(1): 45-54 (2024) - 2021
- [j13]Xilong Qu, Shengzong Liu, Sha Fu, Hong He, Ying Hu, Leyi Xiao:
Design and Implementation of Wireless Environment Monitoring System Based on STM32. Sci. Program. 2021: 6070664:1-6070664:15 (2021) - 2020
- [j12]Hong He:
A Novel Data Consistence Model Based on Virtual Peers in Peer-to-Peer Systems. Int. J. e Collab. 16(3): 1-16 (2020) - [j11]Hong He:
A reliable peer-to-peer storage framework based on virtual peers model. Int. J. Netw. Virtual Organisations 22(2): 129-146 (2020)
2010 – 2019
- 2019
- [j10]Qunlin Chen, Roger E. Beaty, Zaixu Cui, Jiangzhou Sun, Hong He, Kaixiang Zhuang, Zhiting Ren, Guangyuan Liu, Jiang Qiu:
Brain hemispheric involvement in visuospatial and verbal divergent thinking. NeuroImage 202 (2019) - [c23]Zhihong Zhang, Hong He:
Research on Switching Power Supply Based on Soft Switching Technology. CSPS 2019: 156-164 - [c22]Jianhuo Shen, Teng Li, Chuanrui Hu, Hong He, Dashan Jiang, Jianfei Liu:
An Augmented Cell Segmentation in Fluorescent in Situ Hybridization Images. EMBC 2019: 6306-6309 - [c21]Hong He, Wenxiu Zhao, Ken'ichi Fujimoto:
Identification of EEG-Based Music Emotion Using Hybrid COA Features and t-SNE. ICBET 2019: 95-102 - [c20]Hong He, Feihu Peng, Jun Ying:
Feature Selection and Recognition of Multivariate Physiological Signals Using Binary Firefly Algorithm. INDIN 2019: 821-826 - [c19]Jianhuo Shen, Teng Li, Chuanrui Hu, Hong He, Jianfei Liu:
Automatic cell segmentation using mini-u-net on fluorescence in situ hybridization images. Computer-Aided Diagnosis 2019: 109502T - [c18]Huifang Yao, Hong He, Shilong Wang, Zhangping Xie:
EEG-based Emotion Recognition Using Multi-scale Window Deep Forest. SSCI 2019: 381-386 - 2017
- [c17]Hong He, Congji Li, Xiaoqin Li, Zegang Wang, Peng Xu:
Development of Control System for the Assembly Equipments of Spacer Bar Based on PLC. ICIRA (3) 2017: 788-795 - [c16]Xuelei Fu, Hong He, Wenchang Wang:
Numerical Simulation of Forming Process Conditions and Wall Thickness for Balloon. ICIRA (3) 2017: 808-818 - [c15]Hong He, Kai Liu, Xuelei Fu, Kehan Ye:
Development of Rubber Aging Life Prediction Software. ICIRA (3) 2017: 831-842 - [c14]Hong He, Jifeng Huang, Wuxiong Zhang:
Multi-sensor activity recognition using 2DPCA and K-means clustering based on dual-measure distance. RO-MAN 2017: 858-863 - 2016
- [j9]Chaocan Xiang, Panlong Yang, Xuangou Wu, Hong He, Baowei Wang, Yunhao Liu:
iStep: A Step-Aware Sampling Approach for Diffusion Profiling in Mobile Sensor Networks. IEEE Trans. Veh. Technol. 65(10): 8616-8628 (2016) - [c13]Hong He, Xiaowen Yan, Wei Wei:
Meridian ECG information transmission system modeling using NARX neural network. ICIS 2016: 1-6 - 2015
- [j8]Hong He:
Virtual resource provision based on elastic reservation in cloud computing. Int. J. Netw. Virtual Organisations 15(1): 30-47 (2015) - 2014
- [j7]Yong Wang, Aixiang Guo, Hong He, Hui Li, Fengrong Li:
Signalling scheme for achieving dynamic degrees of freedom in MIMO Y channel. Int. J. Grid Util. Comput. 5(3): 149-155 (2014) - [j6]Hong He:
Incorporating Fault Tolerance Mechanism into Grid Meta-Scheduler. J. Softw. 9(10): 2651-2657 (2014) - [j5]Hong He, Dongbo Liu:
An Automatic Software Requirement Analysis Approach based on Intelligent Planning Technology. J. Softw. 9(11): 2861-2867 (2014) - [c12]Shu-Cheng Xiao, Jia-Feng Wu, Hong He, Zhen-Dong Yang, Xin Shen:
An emergency logistics transportation path optimization model by using trapezoidal fuzzy. FSKD 2014: 199-203 - [c11]Chaocan Xiang, Panlong Yang, Bin Yu, Chang Tian, Hong He, Jibin Guo, Yan Xiong:
Confidence-interval based sensing quality evaluation for mobile sensor networks. MSCC@MobiHoc 2014: 25-28 - 2013
- [j4]Yongjian Zhao, Hong He, Jian-Xun Mi:
Noisy component extraction with reference. Frontiers Comput. Sci. 7(1): 135-144 (2013) - [j3]Fanxin Meng, Guangyu Du, Hong He, Shengzhong Yuan:
Performance Modeling on the Basis of Application Type in Virtualized Environments. J. Softw. 8(11): 2847-2854 (2013) - [c10]Hongwei Zhang, Baoming Zhang, Haitao Guo, Jun Lu, Hong He:
An automatic coastline extraction method based on active contour model. Geoinformatics 2013: 1-5 - 2012
- [j2]Hao Chen, Tong Yang, Jianfu Teng, Hong He:
Interference Analysis of TD-SCDMA System and CDMA2000 System. J. Networks 7(1): 101-109 (2012) - [c9]Yong Wang, Aixiang Guo, Hong He, Hui Li:
Optimization Transmission for Improving Degrees of Freedom in MIMO Y Channel. INCoS 2012: 121-125 - 2011
- [j1]Shuliang Li, Jim Zheng Li, Hong He, Philippa Ward, Barry J. Davies:
WebDigital: A Web-based hybrid intelligent knowledge automation system for developing digital marketing strategies. Expert Syst. Appl. 38(8): 10606-10613 (2011) - [p1]Biyu Lv, Jiantong Zhang, Hong He:
Resident Population Prediction Based on Cohort-Component Method. Modeling Risk Management in Sustainable Construction 2011: 343-350
2000 – 2009
- 2009
- [c8]Hong He, Yi Wu, Baofeng Zhang, Dajian Zhang, Yong Tian, Kexi Wang, Hui Meng, Mingfeng Hou:
Discrete Chaotic Synchronization and Secure Communication Design. ICNC (5) 2009: 473-476 - 2008
- [c7]Ying He, Hong He, Li Li, Yi Wu, Hongyan Pan:
The Applications and Simulation of Adaptive Filter in Noise Canceling. CSSE (4) 2008: 1-4 - [c6]Hong He, Shengzhong Yuan:
Autocatalytic-Based Service Locating Algorithm on Grid. FSKD (5) 2008: 463-467 - [c5]Shengzhong Yuan, Hong He, Wei Wang:
A Probabilistic Method to Estimate Life Expectancy of Application Software. FSKD (1) 2008: 505-509 - [c4]Hao Liu, Hong He, Sheng-Lei Han, Jin-Rong Yang, Lei Su, Fang Liu:
Based on Single-Chip Adaptive Fuzzy Algorithm Escalator Energy-Saving Control System. FSKD (3) 2008: 523-526 - [c3]Shengzhong Yuan, Hong He:
A Probabilistic Method to Estimate Life Expectancy of Application Software. ISNN (1) 2008: 417-421 - 2007
- [c2]Xi Tan, Hong He:
Image Denoising Based on the Ridgelet Frame Using the Generalized Cross Validation Technique. ICIAR 2007: 38-45 - 2006
- [c1]Hong He, Shi-jiu Jin, Dajian Zhang, Hui Meng, Xian-wei Zhu, Lu Tang:
Study of Suppression Techniques for Harmonic Current. ISDA (1) 2006: 1092-1097
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-26 23:50 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint