


default search action
Ruiqi Hu
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c13]Xuening Wu, Yiqing Shen, Qing Zhao, Yanlan Kang, Ruiqi Hu, Wenqiang Zhang:
Edge-SAN: An Edge-Prompted Foundation Model for Accurate Nuclei Instance Segmentation in Histology Images. BIBM 2024: 2694-2701 - 2023
- [c12]Jia Geng, Ruiqi Hu, Kairong Liu, Zhihui Li, Zhikun She:
Reachability Based Uniform Controllability to Target Set with Evolution Function. SETTA 2023: 21-37 - 2022
- [j5]Ruiqi Hu, Zhikun She
:
OURS: Over- and Under-approximating Reachable Sets for analytic time-invariant differential equations. J. Syst. Archit. 128: 102580 (2022) - [j4]Chun Wang, Shirui Pan, Celina Ping Yu, Ruiqi Hu, Guodong Long, Chengqi Zhang
:
Deep neighbor-aware embedding for node clustering in attributed graphs. Pattern Recognit. 122: 108230 (2022) - [c11]Ruiqi Hu, Kairong Liu, Zhikun She:
Reach-Avoid Verification for Time-varying Systems with Uncertain Disturbances. MEMOCODE 2022: 1-12 - 2021
- [j3]Zhineng Fu, Weijun Xu, Ruiqi Hu, Guodong Long
, Jing Jiang:
MHieR-encoder: Modelling the high-frequency changes across stocks. Knowl. Based Syst. 224: 107092 (2021) - [c10]Ruiqi Hu, Meilun Li, Zhikun She:
$\mathbf{OURS} $: Over- and Under-Approximating Reachable Sets for Analytic Time-Invariant Differential Equations. SETTA 2021: 261-278 - 2020
- [j2]Yu Zheng
, Ruiqi Hu, Sai-Fu Fung
, Celina Ping Yu, Guodong Long, Ting Guo
, Shirui Pan
:
Clustering social audiences in business information networks. Pattern Recognit. 100: 107126 (2020) - [j1]Shirui Pan
, Ruiqi Hu, Sai-Fu Fung
, Guodong Long
, Jing Jiang, Chengqi Zhang
:
Learning Graph Embedding With Adversarial Training Methods. IEEE Trans. Cybern. 50(6): 2475-2487 (2020) - [c9]Ruiqi Hu, Shirui Pan, Guodong Long, Qinghua Lu, Liming Zhu
, Jing Jiang:
Going Deep: Graph Convolutional Ladder-Shape Networks. AAAI 2020: 2838-2845 - [i5]Claire Ye, Chinedu Ojukwu, Anthony Hsu, Ruiqi Hu:
Alt-Coin Traceability. IACR Cryptol. ePrint Arch. 2020: 593 (2020)
2010 – 2019
- 2019
- [b1]Ruiqi Hu:
Learning and representing attributed graphs. University of Technology Sydney, Australia, 2019 - [c8]Chun Wang, Shirui Pan
, Ruiqi Hu, Guodong Long, Jing Jiang
, Chengqi Zhang
:
Attributed Graph Clustering: A Deep Attentional Embedding Approach. IJCAI 2019: 3670-3676 - [c7]Di Wu
, Ruiqi Hu, Yu Zheng
, Jing Jiang
, Nabin Sharma, Michael Blumenstein:
Feature-Dependent Graph Convolutional Autoencoders with Adversarial Training Methods. IJCNN 2019: 1-8 - [i4]Shirui Pan, Ruiqi Hu, Sai-Fu Fung, Guodong Long, Jing Jiang, Chengqi Zhang
:
Learning Graph Embedding with Adversarial Training Methods. CoRR abs/1901.01250 (2019) - [i3]Chun Wang, Shirui Pan, Ruiqi Hu, Guodong Long, Jing Jiang, Chengqi Zhang:
Attributed Graph Clustering: A Deep Attentional Embedding Approach. CoRR abs/1906.06532 (2019) - 2018
- [c6]Shirui Pan
, Ruiqi Hu, Guodong Long, Jing Jiang
, Lina Yao, Chengqi Zhang
:
Adversarially Regularized Graph Autoencoder for Graph Embedding. IJCAI 2018: 2609-2615 - [c5]Venkatasubramanian Kalpathy Venkiteswaran
, Ruiqi Hu, Haijun Su
:
A Pneumatically-Actuated Variable-Stiffness Robot Arm Using Parallel Flexures. ROBIO 2018: 1-7 - [i2]Shirui Pan, Ruiqi Hu, Guodong Long, Jing Jiang, Lina Yao, Chengqi Zhang:
Adversarially Regularized Graph Autoencoder. CoRR abs/1802.04407 (2018) - [i1]Ruiqi Hu, Celina Ping Yu, Sai-Fu Fung, Shirui Pan, Haishuai Wang, Guodong Long:
Universal Network Representation for Heterogeneous Information Networks. CoRR abs/1811.12157 (2018) - 2017
- [c4]Ruiqi Hu, Shirui Pan
, Jing Jiang
, Guodong Long:
Graph Ladder Networks for Network Classification. CIKM 2017: 2103-2106 - [c3]Ruiqi Hu, Celina Ping Yu, Sai-Fu Fung
, Shirui Pan
, Haishuai Wang, Guodong Long:
Universal network representation for heterogeneous information networks. IJCNN 2017: 388-395 - 2016
- [c2]Ruiqi Hu, Shirui Pan
, Guodong Long, Xingquan Zhu
, Jing Jiang
, Chengqi Zhang
:
Co-clustering enterprise social networks. IJCNN 2016: 107-114
2000 – 2009
- 2004
- [c1]Ruiqi Hu, Aloysius K. Mok:
Detecting Unknown Massive Mailing Viruses Using Proactive Methods. RAID 2004: 82-101
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-04 22:06 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint