Alert button
Picture for Hao Guo

Hao Guo

Alert button

Chalmers University of Technology

A Comparison between Network-Controlled Repeaters and Reconfigurable Intelligent Surfaces

Add code
Bookmark button
Alert button
Nov 13, 2022
Hao Guo, Charitha Madapatha, Behrooz Makki, Boris Dortschy, Lei Bao, Magnus Åström, Tommy Svensson

Figure 1 for A Comparison between Network-Controlled Repeaters and Reconfigurable Intelligent Surfaces
Figure 2 for A Comparison between Network-Controlled Repeaters and Reconfigurable Intelligent Surfaces
Figure 3 for A Comparison between Network-Controlled Repeaters and Reconfigurable Intelligent Surfaces
Figure 4 for A Comparison between Network-Controlled Repeaters and Reconfigurable Intelligent Surfaces
Viaarxiv icon

NormSAGE: Multi-Lingual Multi-Cultural Norm Discovery from Conversations On-the-Fly

Add code
Bookmark button
Alert button
Oct 16, 2022
Yi R. Fung, Tuhin Chakraborty, Hao Guo, Owen Rambow, Smaranda Muresan, Heng Ji

Figure 1 for NormSAGE: Multi-Lingual Multi-Cultural Norm Discovery from Conversations On-the-Fly
Figure 2 for NormSAGE: Multi-Lingual Multi-Cultural Norm Discovery from Conversations On-the-Fly
Figure 3 for NormSAGE: Multi-Lingual Multi-Cultural Norm Discovery from Conversations On-the-Fly
Figure 4 for NormSAGE: Multi-Lingual Multi-Cultural Norm Discovery from Conversations On-the-Fly
Viaarxiv icon

Constrained Deployment Optimization in Integrated Access and Backhaul Networks

Add code
Bookmark button
Alert button
Oct 11, 2022
Charitha Madapatha, Behrooz Makki, Hao Guo, Tommy Svensson

Figure 1 for Constrained Deployment Optimization in Integrated Access and Backhaul Networks
Figure 2 for Constrained Deployment Optimization in Integrated Access and Backhaul Networks
Figure 3 for Constrained Deployment Optimization in Integrated Access and Backhaul Networks
Figure 4 for Constrained Deployment Optimization in Integrated Access and Backhaul Networks
Viaarxiv icon

Electromagnetic Field Exposure Avoidance thanks to Non-Intended User Equipment and RIS

Add code
Bookmark button
Alert button
Oct 07, 2022
Hao Guo, Dinh-Thuy Phan-Huy, Tommy Svensson

Figure 1 for Electromagnetic Field Exposure Avoidance thanks to Non-Intended User Equipment and RIS
Figure 2 for Electromagnetic Field Exposure Avoidance thanks to Non-Intended User Equipment and RIS
Figure 3 for Electromagnetic Field Exposure Avoidance thanks to Non-Intended User Equipment and RIS
Figure 4 for Electromagnetic Field Exposure Avoidance thanks to Non-Intended User Equipment and RIS
Viaarxiv icon

GReS: Graphical Cross-domain Recommendation for Supply Chain Platform

Add code
Bookmark button
Alert button
Sep 02, 2022
Zhiwen Jing, Ziliang Zhao, Yang Feng, Xiaochen Ma, Nan Wu, Shengqiao Kang, Cheng Yang, Yujia Zhang, Hao Guo

Figure 1 for GReS: Graphical Cross-domain Recommendation for Supply Chain Platform
Figure 2 for GReS: Graphical Cross-domain Recommendation for Supply Chain Platform
Figure 3 for GReS: Graphical Cross-domain Recommendation for Supply Chain Platform
Figure 4 for GReS: Graphical Cross-domain Recommendation for Supply Chain Platform
Viaarxiv icon

Reinforcement Learning for Hardware Security: Opportunities, Developments, and Challenges

Add code
Bookmark button
Alert button
Aug 29, 2022
Satwik Patnaik, Vasudev Gohil, Hao Guo, Jeyavijayan, Rajendran

Viaarxiv icon

ATTRITION: Attacking Static Hardware Trojan Detection Techniques Using Reinforcement Learning

Add code
Bookmark button
Alert button
Aug 26, 2022
Vasudev Gohil, Hao Guo, Satwik Patnaik, Jeyavijayan, Rajendran

Figure 1 for ATTRITION: Attacking Static Hardware Trojan Detection Techniques Using Reinforcement Learning
Figure 2 for ATTRITION: Attacking Static Hardware Trojan Detection Techniques Using Reinforcement Learning
Figure 3 for ATTRITION: Attacking Static Hardware Trojan Detection Techniques Using Reinforcement Learning
Figure 4 for ATTRITION: Attacking Static Hardware Trojan Detection Techniques Using Reinforcement Learning
Viaarxiv icon

DETERRENT: Detecting Trojans using Reinforcement Learning

Add code
Bookmark button
Alert button
Aug 26, 2022
Vasudev Gohil, Satwik Patnaik, Hao Guo, Dileep Kalathil, Jeyavijayan, Rajendran

Figure 1 for DETERRENT: Detecting Trojans using Reinforcement Learning
Figure 2 for DETERRENT: Detecting Trojans using Reinforcement Learning
Figure 3 for DETERRENT: Detecting Trojans using Reinforcement Learning
Figure 4 for DETERRENT: Detecting Trojans using Reinforcement Learning
Viaarxiv icon

A generalized regionalization framework for geographical modelling and its application in spatial regression

Add code
Bookmark button
Alert button
Jun 19, 2022
Hao Guo, Andre Python, Yu Liu

Figure 1 for A generalized regionalization framework for geographical modelling and its application in spatial regression
Figure 2 for A generalized regionalization framework for geographical modelling and its application in spatial regression
Figure 3 for A generalized regionalization framework for geographical modelling and its application in spatial regression
Figure 4 for A generalized regionalization framework for geographical modelling and its application in spatial regression
Viaarxiv icon