


default search action
Yuxiang Yang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j18]Yansong Yue, Ruojing Zhang, Yuxiang Yang, Zhushanying Zhang, Yuan Gao, Huimin Cao:
Repeated interval random frog (RIRF) algorithm based on FTIR and application to quantitative analysis of serum proteins. Biomed. Signal Process. Control. 106: 107730 (2025) - [j17]Yuxiang Yang, Benji Wang, Xiao Cen, Bowen Shao, Baikang Zhu, Jin Yang, Bingyuan Hong
:
Susceptibility risk assessment of oil and gas pipeline geological hazards in mountainous areas based on data-driven model. Eng. Appl. Artif. Intell. 151: 110732 (2025) - [j16]Yanyang Wang
, Yuxiang Yang, Wei Li:
Autoencoder-assisted study of directed percolation with spatial long-range interactions. Mach. Learn. Sci. Technol. 6(1): 15051 (2025) - [c34]Yuxiang Yang
, Shiwen Chen
, Yangshen Deng
, Bo Tang
:
ParaGraph: Accelerating Graph Indexing through GPU-CPU Parallel Processing for Efficient Cross-modal ANNS. DaMoN 2025: 7:1-7:10 - [c33]Xuewei Feng, Yuxiang Yang, Qi Li, Xingxiang Zhan, Kun Sun, Ziqiang Wang, Ao Wang, Ganqiu Du, Ke Xu:
ReDAN: An Empirical Study on Remote DoS Attacks against NAT Networks. NDSS 2025 - [c32]Ziqiang Wang, Xuewei Feng, Qi Li, Kun Sun, Yuxiang Yang, Mengyuan Li, Ganqiu Du, Ke Xu, Jianping Wu:
Off-Path TCP Hijacking in Wi-Fi Networks: A Packet-Size Side Channel Attack. NDSS 2025 - [i14]Ailin Huang, Bingxin Li, Bruce Wang, Boyong Wu, Chao Yan, Chengli Feng, Heng Wang, Hongyu Zhou, Hongyuan Wang, Jingbei Li, Jianjian Sun, Joanna Wang, Mingrui Chen, Peng Liu, Ruihang Miao, Shilei Jiang, Fei Tian, Wang You, Xi Chen, Xuerui Yang, Yechang Huang, Yuxiang Zhang, Zheng Ge, Zheng Gong, Zhewei Huang, Zixin Zhang, Bin Wang, Bo Li, Buyun Ma, Changxin Miao, Changyi Wan, Chen Xu, Dapeng Shi, Dingyuan Hu, Enle Liu, Guanzhe Huang, Gulin Yan, Hanpeng Hu, Haonan Jia, Jiahao Gong, Jiaoren Wu, Jie Wu, Jie Yang, Junzhe Lin, Kaixiang Li, Lei Xia, Longlong Gu, Ming Li, Nie Hao, Ranchen Ming, Shaoliang Pang, Siqi Liu, Song Yuan, Tiancheng Cao, Wen Li, Wenqing He, Xu Zhao, Xuelin Zhang, Yanbo Yu, Yinmin Zhong, Yu Zhou, Yuanwei Liang, Yuanwei Lu, Yuxiang Yang, Zidong Yang, Zili Zhang, Binxing Jiao, Heung-Yeung Shum, Jiansheng Chen, Jing Li, Xiangyu Zhang, Xinhao Zhang, Yibo Zhu, Daxin Jiang, Shaohua Kevin Zhou, Chen Hu:
Step-Audio-AQAA: a Fully End-to-End Expressive Large Audio Language Model. CoRR abs/2506.08967 (2025) - [i13]Boyong Wu, Chao Yan, Chen Hu, Cheng Yi, Chengli Feng, Fei Tian, Feiyu Shen, Gang Yu, Haoyang Zhang, Jingbei Li, Mingrui Chen, Peng Liu, Wang You, Xiangyu Tony Zhang, Xingyuan Li, Xuerui Yang, Yayue Deng, Yechang Huang, Yuxin Li, Yuxin Zhang, Zhao You, Brian Li, Changyi Wan, Hanpeng Hu, Jiangjie Zhen, Siyu Chen, Song Yuan, Xuelin Zhang, Yimin Jiang, Yu Zhou, Yuxiang Yang, Bingxin Li, Buyun Ma, Changhe Song, Dongqing Pang, Guoqiang Hu, Haiyang Sun, Kang An, Na Wang, Shuli Gao, Wei Ji, Wen Li, Wen Sun, Xuan Wen, Yong Ren, Yuankai Ma, Yufan Lu, Bin Wang, Bo Li, Changxin Miao, Che Liu, Chen Xu, Dapeng Shi, Dingyuan Hu, Donghang Wu, Enle Liu, Guanzhe Huang, Gulin Yan, Han Zhang, Nie Hao, Haonan Jia, Hongyu Zhou, Jianjian Sun, Jiaoren Wu, Jie Wu, Jie Yang, Jin Yang, Junzhe Lin, Kaixiang Li, Lei Yang, Liying Shi, Li Zhou, Longlong Gu, Ming Li, Mingliang Li, Mingxiao Li, Nan Wu, Qi Han, Qinyuan Tan, Shaoliang Pang, Shengjie Fan, Siqi Liu, Tiancheng Cao, Wanying Lu, Wenqing He, Wuxun Xie, Xu Zhao, Xueqi Li, Yanbo Yu, Yang Yang, Yi Liu, Yifan Lu, Yilei Wang, Yuanhao Ding, Yuanwei Liang, Yuanwei Lu, Yuchu Luo, Yuhe Yin, Yumeng Zhan, Yuxiang Zhang:
Step-Audio 2 Technical Report. CoRR abs/2507.16632 (2025) - 2024
- [b1]Yuxiang Yang:
Agile Legged Robots through Reinforcement Learning and Optimal Control. University of Washington, USA, 2024 - [j15]Jun Qiu, Xun Xu, Yuxiang Yang:
Carbon emission reduction and channel development strategies under government subsidy and retailers' fairness concerns. Electron. Commer. Res. Appl. 68: 101447 (2024) - [j14]Yuxiang Yang, Jiangtao Guo, Zilong Li, Zhiwei He, Jing Zhang:
Ground4Act: Leveraging visual-language model for collaborative pushing and grasping in clutter. Image Vis. Comput. 151: 105280 (2024) - [j13]Lang Chen, Yuling Chen, Chaoyue Tan, Yun Luo, Hui Dou, Yuxiang Yang:
Cross-chain asset trading scheme for notaries based on edge cloud storage. J. Cloud Comput. 13(1): 90 (2024) - [j12]Yan Zheng, Yuling Chen, Chaoyue Tan, Yuxiang Yang, Chang Shu, Lang Chen:
Optimization model for vehicular network data queries in edge environments. J. Cloud Comput. 13(1): 145 (2024) - [j11]Xinyi Yang
, Yuxiang Yang
, Chao Yu
, Jiayu Chen
, Jingchen Yu
, Haibing Ren
, Huazhong Yang
, Yu Wang
:
Active Neural Topological Mapping for Multi-Agent Exploration. IEEE Robotics Autom. Lett. 9(1): 303-310 (2024) - [j10]Pengyu Chen, Yuling Chen, Xuewei Wang
, Linlin Yuan, Chaoyue Tan, Yuxiang Yang:
A high-capacity slicing PBFT protocol based on reputation evaluation model. Wirel. Networks 30(8): 7469-7482 (2024) - [c31]Pengyu Chen, Yuling Chen, Chaoyue Tan, Yuxiang Yang, Bo Li, Jiachen Huang:
Slicing PBFT Consensus Algorithm Based on VRF. Blockchain 2024: 569-574 - [c30]Bo Li, Yuling Chen, Siyuan Huang, Yuxiang Yang:
Cross-Chain Asset Trading Scheme Without Trusted Third-Party. DSPP (1) 2024: 39-51 - [c29]Entong He
, Yuxiang Yang, Chenshu Wu:
Quantum Ranging Enhanced TDoA Localization. ICASSP 2024: 106-110 - [c28]Ao Wang, Xuewei Feng, Qi Li, Yuxiang Yang, Ke Xu:
A Horizontal Study on the Mixed IPID Assignment Vulnerability in the Linux Ecosystem. IWQoS 2024: 1-10 - [c27]Yuxiang Yang, Xuewei Feng, Qi Li, Kun Sun, Ziqiang Wang, Ke Xu:
Exploiting Sequence Number Leakage: TCP Hijacking in NAT-Enabled Wi-Fi Networks. NDSS 2024 - [i12]Ziqiang Wang, Xuewei Feng, Qi Li, Kun Sun, Yuxiang Yang, Mengyuan Li, Ke Xu, Jianping Wu:
Off-Path TCP Hijacking in Wi-Fi Networks: A Packet-Size Side Channel Attack. CoRR abs/2402.12716 (2024) - [i11]Yuxiang Yang, Xuewei Feng, Qi Li, Kun Sun, Ziqiang Wang, Ke Xu:
Exploiting Sequence Number Leakage: TCP Hijacking in NAT-Enabled Wi-Fi Networks. CoRR abs/2404.04601 (2024) - [i10]Entong He
, Yuxiang Yang, Chenshu Wu:
QuERLoc: Towards Next-Generation Localization with Quantum-Enhanced Ranging. CoRR abs/2404.16895 (2024) - [i9]Entong He, Yuxiang Yang, Chenshu Wu:
Quantum Ranging Enhanced TDoA Localization. CoRR abs/2407.04703 (2024) - [i8]Shuyu Lei, Lingen Liu, Jiaolong Yang, Yasen Jiao, Yuxiang Yang, Yushu Yang, Xiang Guo:
Seal: Advancing Speech Language Models to be Few-Shot Learners. CoRR abs/2407.14875 (2024) - [i7]Xuewei Feng, Yuxiang Yang, Qi Li, Xingxiang Zhan, Kun Sun, Ziqiang Wang, Ao Wang, Ganqiu Du, Ke Xu:
ReDAN: An Empirical Study on Remote DoS Attacks against NAT Networks. CoRR abs/2410.21984 (2024) - 2023
- [j9]Yuxiang Yang, Xing Tian, Wing W. Y. Ng
, Ran Wang
, Ying Gao
, Sam Kwong
:
Generative face inpainting hashing for occluded face retrieval. Int. J. Mach. Learn. Cybern. 14(5): 1725-1738 (2023) - [j8]Masahito Hayashi
, Yuxiang Yang:
Efficient algorithms for quantum information bottleneck. Quantum 7: 936 (2023) - [j7]Yuxiang Yang
, Xing Tian
, Wing W. Y. Ng
, Ying Gao
:
Knowledge Distillation Hashing for Occluded Face Retrieval. IEEE Trans. Multim. 25: 9096-9107 (2023) - [c26]Xuewei Feng
, Qi Li
, Kun Sun
, Yuxiang Yang
, Ke Xu
:
Traffic Hijacking in Wi-Fi Networks via ICMP Redirects. ACM TUR-C 2023: 141-142 - [c25]Xinyi Yang, Shiyu Huang, Yiwen Sun, Yuxiang Yang, Chao Yu, Wei-Wei Tu, Huazhong Yang, Yu Wang:
Learning Graph-Enhanced Commander-Executor for Multi-Agent Navigation. AAMAS 2023: 1652-1660 - [c24]Linlin Yuan, Yuxiang Yang, Chaoyue Tan, Hui Dou, Yun Luo, Yuling Chen:
CHSTS: Chameleon Hash based on Schnorr threshold signature on Editable Blockchain. DASC/PiCom/CBDCom/CyberSciTech 2023: 389-394 - [c23]Siyuan Huang, Yuling Chen, Chaoyue Tan, Hui Dou, Yun Luo, Yuxiang Yang:
A Blockchain of Blockchains Structure Based on Asset Trading Scheme. DASC/PiCom/CBDCom/CyberSciTech 2023: 582-588 - [c22]Jiahao Jiang, Ping Li, Xudong Lv, Yuxiang Yang:
DMCL: Robot Autonomous Navigation via Depth Image Masked Contrastive Learning. IROS 2023: 5172-5178 - [c21]Xuepu Zeng
, Mingyu Gao, Zhiwei He, Yuxiang Yang:
Trajectory Prediction for Surrounding Traffic Participants via Local Perception and Attentive Map Encoding. ROBIO 2023: 1-6 - [c20]Xuewei Feng, Qi Li, Kun Sun, Yuxiang Yang, Ke Xu:
Man-in-the-Middle Attacks without Rogue AP: When WPAs Meet ICMP Redirects. SP 2023: 3162-3177 - [i6]Xinyi Yang, Shiyu Huang, Yiwen Sun, Yuxiang Yang, Chao Yu, Wei-Wei Tu, Huazhong Yang, Yu Wang:
Learning Graph-Enhanced Commander-Executor for Multi-Agent Navigation. CoRR abs/2302.04094 (2023) - [i5]Houwen Peng, Kan Wu, Yixuan Wei, Guoshuai Zhao, Yuxiang Yang, Ze Liu, Yifan Xiong, Ziyue Yang, Bolin Ni, Jingcheng Hu, Ruihang Li, Miaosen Zhang, Chen Li, Jia Ning, Ruizhe Wang, Zheng Zhang, Shuguang Liu, Joe Chau, Han Hu, Peng Cheng:
FP8-LM: Training FP8 Large Language Models. CoRR abs/2310.18313 (2023) - [i4]Xinyi Yang, Yuxiang Yang, Chao Yu, Jiayu Chen, Jingchen Yu, Haibing Ren, Huazhong Yang, Yu Wang:
Active Neural Topological Mapping for Multi-Agent Exploration. CoRR abs/2311.00252 (2023) - 2022
- [c19]Fereshte Mozafari, Yuxiang Yang, Giovanni De Micheli:
Efficient Preparation of Cyclic Quantum States. ASP-DAC 2022: 460-465 - [c18]Wenwen Zhang, Qi Wang, Yuxiang Yang:
Power battery recycling reverse logistics network optimization model and algorithm design. CIS 2022: 465-469 - [i3]Fereshte Mozafari, Giovanni De Micheli, Yuxiang Yang:
Efficient Deterministic Preparation of Quantum States Using Decision Diagrams. CoRR abs/2206.08588 (2022) - 2021
- [c17]Shi Lu, Yuxiang Yang:
Research on Product Pricing Strategy of Two-level Supply Chain under Carbon Trading Mechanism. CIS 2021: 625-628 - 2020
- [j6]Xinxin Ouyang, Qing He, Yuxiang Yang, Qun Wan:
TDOA/FDOA estimation algorithm of frequency-hopping signals based on CAF coherent integration. IET Commun. 14(2): 331-336 (2020) - [c16]Qian Guan, Yuxiang Yang:
Reverse logistics network design model for used power battery under the third-party recovery mode. CIS 2020: 293-297 - [c15]Hongbo Hu, Zhengbo Sun, Yuxiang Yang, Bing Deng:
Iterative Recovery for Interfered Scrambling Code Sequence on Factor Graph. CSAE 2020: 59:1-59:6
2010 – 2019
- 2019
- [j5]Kekang Song, Yuxiang Yang, Wentao Feng, Huafeng Peng:
DPD with IPF and GD method. IET Signal Process. 13(8): 718-725 (2019) - [c14]Yuxiang Yang, Qian Guan:
An Evolutionary Game Model Among the Interest-Related Parties for Return of E-Wastes. CIS 2019: 391-394 - [c13]Liyu Wang, Yuxiang Yang, Gustavo Correa, Konstantinos Karydis
, Ronald S. Fearing:
OpenRoACH: A Durable Open-Source Hexapedal Platform with Onboard Robot Operating System (ROS). ICRA 2019: 9466-9472 - [c12]Qi Yu, Xiaoping Che, Yuxiang Yang, Liqiang Wang:
A Transfer Learning Based Interpretable User Experience Model on Small Samples. QRS 2019: 186-196 - [i2]Liyu Wang, Yuxiang Yang, Gustavo Correa, Konstantinos Karydis, Ronald S. Fearing:
OpenRoACH: A Durable Open-Source Hexapedal Platform with Onboard Robot Operating System (ROS). CoRR abs/1903.00131 (2019) - [i1]Qiang Sun, Liting Wang, Maohui Li, Longtao Zhang, Yuxiang Yang:
A unified framework of predicting binary interestingness of images based on discriminant correlation analysis and multiple kernel learning. CoRR abs/1910.05996 (2019) - 2018
- [j4]Qi Yu, Xiaoping Che
, Siqi Ma, Shirui Pan
, Yuxiang Yang, Weiwei Xing, Ximeng Wang
:
A Hybrid User Experience Evaluation Method for Mobile Games. IEEE Access 6: 49067-49079 (2018) - 2017
- [j3]Yuxiang Yang, Zuqing Huang, Qiang Patrick Qiang, Gengui Zhou:
A Mathematical Programming Model with Equilibrium Constraints for Competitive Closed-Loop Supply Chain Network Design. Asia Pac. J. Oper. Res. 34(5): 1750026:1-1750026:31 (2017) - [c11]Dan Wu, Yuxiang Yang:
Cost-Sharing Contract of Supply Chain Based on Carbon Emission Control. CIS 2017: 341-345 - [c10]Fangyuan Dong, Qing Dong, Mingjiang Yan, Yuxiang Yang, Changxiong Xia, Qun Wan:
DOA estimation of fast moving target in accelerated scene. ICSPCC 2017: 1-4 - 2016
- [j2]Yuxiang Yang, Liang Niu, Zuqing Huang, Gengui Zhou:
Closed-loop supply chain network redesigning model post the horizontal merger based on environmental responsibility. Int. J. Serv. Technol. Manag. 22(3/4/5): 179-202 (2016) - [c9]Yuxiang Yang, Dan Wu:
Research on Environmental Impact Assessment of E-Waste Reverse Logistics. CIS 2016: 612-615 - 2015
- [c8]Yushi Guo, Zuqing Huang, Yuxiang Yang:
Waste Electrical Recycling Network Optimum Design under the Carbon Cap Constraint. CIS 2015: 53-57 - 2014
- [c7]Yuxiang Yang, Yushi Guo, Zuqing Huang:
A stochastic programming model for closed-loop supply chain network design based on environmental responsibility. SOLI 2014: 155-159 - 2012
- [c6]Yuxiang Yang, Zengfu Wang:
Range image super-resolution via guided image filter. ICIMCS 2012: 200-203 - 2011
- [j1]Yuxiang Yang, Zengfu Wang:
An Application of Matting Laplacian Matrix to Range Image Super-Resolution. Int. J. Inf. Acquis. 8(4): 273-280 (2011) - [c5]Yuxiang Yang, Gengui Zhou:
Closed-loop Supply Chain Network Horizontal Integration Problem. CIS 2011: 1442-1446 - [c4]Yuxiang Yang, Zengfu Wang:
A New Image Super-Resolution Method in the Wavelet Domain. ICIG 2011: 163-167 - [c3]Lintao Lv, Chengxuan Zhao, Hui Lv, Jin Shang, Yuxiang Yang, Jinfeng Wang:
Pornographic images detection using High-Level Semantic features. ICNC 2011: 1015-1018
2000 – 2009
- 2006
- [c2]Gang Yu
, Changguo Wang, Hongmei Zhang, Yuxiang Yang, Zhengzhong Bian:
A Novel Fuzzy Segmentation Approach for Brain MRI. ACIVS 2006: 887-896 - [c1]Gang Yu
, Yuxiang Yang, Peng Li, Zhengzhong Bian:
Robust Segmentation for Left Ventricle Based on Curve Evolution. KES (3) 2006: 507-514
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-10-10 00:00 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint