


default search action
Yuhan Cao
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Yuhan Cao 0001
— Microsoft Research UK, Cambridge, UK - Yuhan Cao 0002
— Jiangsu Ocean University, School of Marine Technology and Geomatics, Lianyungang, China - Yuhan Cao 0003 — ShanghaiTech University, Key Laboratory of Intelligent Perception and Human-Machine Collaboration, Shanghai, China
- Yuhan Cao 0004 — Zhengzhou University of Light Industry, School of Electrical and Information Engineering, Zhengzhou, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[j11]Xiao Wang, Mengkun Liu
, Yuhan Cao, Tao Gao, Duie Wang:
Light suppression enhancement network for complex night traffic image enhancement. Eng. Appl. Artif. Intell. 162: 112605 (2025)
[j10]Yuping Lai, Zidong Wang
, Ziqing Lin, Yuhan Cao, Zihao Li, Qing Ye:
An efficient network intrusion detection model based on beta mixture models. Knowl. Based Syst. 330: 114506 (2025)
[j9]Yuhan Cao, Bukun Xu
, Bo Yuan
, Gaofeng Wang:
Compact HRS IPD N77 bandpass filter based on tapered spiral inductors and innovative source-load coupling. Microelectron. J. 159: 106653 (2025)
[j8]Yuhan Cao, Bukun Xu
, Bo Yuan, Gaofeng Wang:
A BVD-based on-chip bandpass filter with simplified source-load coupling for 5G N77 band using HRS IPD technology. Microelectron. J. 166: 106893 (2025)
[j7]Mengkun Liu
, Tao Gao
, Yao Liu, Yuhan Cao, Licheng Jiao
:
FUNet: Frequency-Aware and Uncertainty-Guiding Network for Rain-Hazy Image Restoration. IEEE Trans. Multim. 27: 9902-9917 (2025)
[c3]Cong Li, Yuhan Cao, Xingxing Liao, Zilong Wang, Wei You, Xinsheng Ji:
PASD-5GC: A Process-Based Approach for Anomalous Signaling Detection in 5G Core Network. Networking 2025
[i8]Can Zheng, Yuhan Cao, Xiaoning Dong, Tianxing He:
Demonstrations of Integrity Attacks in Multi-Agent Systems. CoRR abs/2506.04572 (2025)
[i7]Yuhan Cao, Zian Chen, Kun Quan, Ziliang Zhang, Yu Wang, Xiaoning Dong, Yeqi Feng, Guanzhong He, Jingcheng Huang, Jianhao Li, Yixuan Tan, Jiafu Tang, Yilin Tang, Junlei Wu, Qianyu Xiao, Can Zheng, Shouchen Zhou, Yuxiang Zhu, Yiming Huang, Tian Xie, Tianxing He:
Can LLMs Generate Reliable Test Case Generators? A Study on Competition-Level Programming Problems. CoRR abs/2506.06821 (2025)
[i6]Yu Wang, Yijian Liu, Liheng Ji, Han Luo, Wenjie Li, Xiaofei Zhou, Chiyun Feng, Puji Wang, Yuhan Cao, Geyuan Zhang, Xiaojian Li, Rongwu Xu, Yilei Chen, Tianxing He:
AICrypto: A Comprehensive Benchmark For Evaluating Cryptography Capabilities of Large Language Models. CoRR abs/2507.09580 (2025)
[i5]Yiyou Sun, Yuhan Cao, Pohao Huang, Haoyue Bai, Hannaneh Hajishirzi, Nouha Dziri, Dawn Song:
DELTA-Code: How Does RL Unlock and Transfer New Programming Algorithms in LLMs? CoRR abs/2509.21016 (2025)
[i4]Terry Yue Zhuo, Xiaolong Jin, Hange Liu, Juyong Jiang, Tianyang Liu, Chen Gong, Bhupesh Bishnoi, Vaisakhi Mishra, Marek Suppa, Noah Ziems, Saiteja Utpala, Ming Xu, Guangyu Song, Kaixin Li, Yuhan Cao, Bo Liu, Zheng Liu, Sabina Abdurakhmanova, Wenhao Yu, Mengzhao Jia, Jihan Yao, Kenneth Hamilton, Kumar Shridhar, Minh Chien Vu, Dingmin Wang, Jiawei Liu, Zijian Wang, Qian Liu, Binyuan Hui, Meg Risdal, Ahsen Khaliq, Atin Sood, Zhenchang Xing, Wasi Uddin Ahmad, John Grundy, David Lo, Banghua Zhu, Xiaoning Du, Torsten Scholak, Leandro von Werra:
BigCodeArena: Unveiling More Reliable Human Preferences in Code Generation via Execution. CoRR abs/2510.08697 (2025)
[i3]Yuhan Cao, Yu Wang, Sitong Liu, Miao Li, Yixin Tao, Tianxing He:
Pay for The Second-Best Service: A Game-Theoretic Approach Against Dishonest LLM Providers. CoRR abs/2511.00847 (2025)- 2024
[j6]Bukun Xu
, Yuhan Cao, Bo Yuan
, Gaofeng Wang:
On-chip Wi-Fi filter with FBW of 16.3 % and IL of 1.8 dB using novel T-type transmission zeros structure. Microelectron. J. 154: 106448 (2024)
[j5]Mengqi Wang, Hua Chen
, Yun Chen, Yuhan Cao, Linyuan Hou:
Trajectory tracking control of wheeled mobile robots with skidding and time-varying delay. Trans. Inst. Meas. Control 46(13): 2636-2646 (2024)- 2023
[j4]Kexing Zhou, Yong Dong, Juan Chen, Yuhan Cao, Zekai Li, Rongyu Deng, Yifei Guo, Zhixin Ou:
Processor power forecasting through model sample analysis and clustering. CCF Trans. High Perform. Comput. 5(3): 258-276 (2023)
[j3]Qingzhe Pan
, Zhifu Zhao
, Xuemei Xie
, Jianan Li
, Yuhan Cao, Guangming Shi
:
View-Normalized and Subject-Independent Skeleton Generation for Action Recognition. IEEE Trans. Circuits Syst. Video Technol. 33(12): 7398-7412 (2023)
[i2]Yuhan Cao, Haoran Jiang, Zhenghong Yu, Qi Li, Xuyang Li:
Rethinking the editing of generative adversarial networks: a method to estimate editing vectors based on dimension reduction. CoRR abs/2305.09454 (2023)- 2022
[c2]Beining Chen, Yuhan Cao, Yanbo Feng:
Research on Trajectory Tracking Control of Non-holonomic Wheeled Robot Using Backstepping Adaptive PI Controller. ACIRS 2022: 7-12- 2021
[j2]Jianan Li
, Xuemei Xie, Yuhan Cao, Qingzhe Pan, Zhifu Zhao, Guangming Shi:
Knowledge embedded GCN for skeleton-based two-person interaction recognition. Neurocomputing 444: 338-348 (2021)
[c1]Qingzhe Pan, Zhifu Zhao, Xuemei Xie, Jianan Li
, Yuhan Cao, Guangming Shi:
View-normalized Skeleton Generation for Action Recognition. ACM Multimedia 2021: 1875-1883- 2020
[j1]Jianan Li
, Xuemei Xie
, Qingzhe Pan, Yuhan Cao, Zhifu Zhao
, Guangming Shi:
SGM-Net: Skeleton-guided multimodal network for action recognition. Pattern Recognit. 104: 107356 (2020)
[i1]Jianan Li, Xuemei Xie, Zhifu Zhao, Yuhan Cao, Qingzhe Pan, Guangming Shi:
Temporal Graph Modeling for Skeleton-based Action Recognition. CoRR abs/2012.08804 (2020)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-02-26 23:27 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







