default search action
Yuanzhen Wang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j12]Xing Fang, Hongxin Zhang, Xiaotong Cui, Yuanzhen Wang, Linxi Ding:
Efficient Attack Scheme against SKINNY-64 Based on Algebraic Fault Analysis. Entropy 25(6): 908 (2023) - [j11]Yuanzhen Wang, Hongxin Zhang, Xing Fang, Xiaotong Cui, Wenxu Ning, Danzhi Wang, Fan Fan, Lei Shu:
Hybrid Threshold Denoising Framework Using Singular Value Decomposition for Side-Channel Analysis Preprocessing. Entropy 25(8): 1133 (2023)
2010 – 2019
- 2014
- [j10]Guiling Li, Zhihua Cai, Xiaojun Kang, Zongda Wu, Yuanzhen Wang:
ESPSA: A prediction-based algorithm for streaming time series segmentation. Expert Syst. Appl. 41(14): 6098-6105 (2014) - [j9]Tengfei Jiang, Jin Huang, Yuanzhen Wang, Yiying Tong, Hujun Bao:
Frame Field Singularity Correctionfor Automatic Hexahedralization. IEEE Trans. Vis. Comput. Graph. 20(8): 1189-1199 (2014) - [c17]Yonghui Ruan, Zhongsheng Cao, Yuanzhen Wang:
Efficient Live Migration of Virtual Machines with a Novel Data Filter. NPC 2014: 369-382 - 2013
- [j8]Xin Feng, Yuanzhen Wang, Yanlin Weng, Yiying Tong:
Compact combinatorial maps: A volume mesh data structure. Graph. Model. 75(3): 149-156 (2013) - [j7]Guiling Li, Olli Bräysy, Liangxiao Jiang, Zongda Wu, Yuanzhen Wang:
Finding time series discord based on bit representation clustering. Knowl. Based Syst. 54: 243-254 (2013) - 2012
- [j6]Lei Peng, Yuanzhen Wang, Guangming Dai, Zhongsheng Cao:
A Novel Differential Evolution with Uniform Design for Continuous Global Optimization. J. Comput. 7(1): 3-10 (2012) - [c16]Xin Feng, Yuanzhen Wang, Yanlin Weng, Yiying Tong:
Compact Combinatorial Maps in 3D. CVM 2012: 194-201 - 2011
- [j5]Zongda Wu, Zhongsheng Cao, Yuanzhen Wang:
Multimedia selection operation placement. Multim. Tools Appl. 54(1): 69-96 (2011) - [j4]Zhewen Su, Zhongsheng Cao, Yuanzhen Wang, Xiaoqiong Zhen:
Identification of unreliable segments to improve skeletonization of handwriting images. Pattern Anal. Appl. 14(1): 77-86 (2011) - 2010
- [j3]Sheng Sun, Yuanzhen Wang:
Research and Application of an improved Support Vector Clustering Algorithm on Anomaly Detection. J. Softw. 5(3): 328-335 (2010) - [c15]Lei Peng, Yuanzhen Wang, Guangming Dai, Yamin Chang, Fangjie Chen:
Optimization of the Earth-Moon low energy transfer with differential evolution based on uniform design. IEEE Congress on Evolutionary Computation 2010: 1-8 - [c14]Lei Peng, Yuanzhen Wang, Guangming Dai:
UDE: Differential Evolution with Uniform Design. PAAP 2010: 239-246
2000 – 2009
- 2009
- [j2]Zhewen Su, Zhongsheng Cao, Yuanzhen Wang:
Stroke extraction based on ambiguous zone detection: a preprocessing step to recover dynamic information from handwritten Chinese characters. Int. J. Document Anal. Recognit. 12(2): 109-121 (2009) - [c13]Zhongsheng Cao, Zhewen Su, Yuanzhen Wang:
Interpretation of Ambiguous Zone in Handwritten Chinese Character Images Using Bayesian Network. ISNN (3) 2009: 380-389 - 2008
- [c12]Guiling Li, Yuanzhen Wang, Min Li, Zongda Wu:
Similarity Match in Time Series Streams under Dynamic Time Warping Distance. CSSE (4) 2008: 399-402 - [c11]Lei Peng, Yuanzhen Wang, Guangming Dai:
A Novel Opposition-Based Multi-objective Differential Evolution Algorithm for Multi-objective Optimization. ISICA 2008: 162-170 - [c10]Tao Jiang, Yucai Feng, Bin Zhang, Jie Shi, Yuanzhen Wang:
Finding Motifs of Financial Data Streams in Real Time. ISICA 2008: 546-555 - [c9]Hong Zhu, Jie Shi, Yuanzhen Wang, Yucai Feng:
Controlling Information Leakage of Fine-Grained Access Model in DBMSs. WAIM 2008: 583-590 - 2007
- [j1]Tieyun Qian, Hui Xiong, Yuanzhen Wang, Enhong Chen:
On the strength of hyperclique patterns for text categorization. Inf. Sci. 177(19): 4040-4058 (2007) - [c8]Haibo Li, Yuanzhen Wang, Kevin Lü:
A Method of Improving the Efficiency of Mining Sub-structures in Molecular Structure Databases. BNCOD 2007: 180-184 - [c7]Zhongsheng Cao, Zongda Wu, Yuanzhen Wang:
UMQL: A Unified Multimedia Query Language. SITIS 2007: 109-115 - 2006
- [c6]Tieyun Qian, Hui Xiong, Yuanzhen Wang, Enhong Chen:
Adapting association patterns for text categorization: weaknesses and enhancements. CIKM 2006: 782-783 - [c5]Zhuan Li, Yuanzhen Wang:
An Approach for XML Inference Control Based on RDF. DEXA 2006: 338-347 - [c4]Tieyun Qian, Yuanzhen Wang, Langgang Xiang, WeiHua Gong:
Feature Selection, Rule Extraction, and Score Model: Making ATC Competitive with SVM. RSKT 2006: 476-481 - 2005
- [c3]Tieyun Qian, Yuanzhen Wang, Hao Long, Jianlin Feng:
2-PS Based Associative Text Classification. DaWaK 2005: 378-387 - [c2]Xiaobing Pei, Yuanzhen Wang:
A Heuristic Algorithm for Maximum Distribution Reduction. FSKD (1) 2005: 1297-1302 - [c1]Xiaobing Pei, Yuanzhen Wang:
Knowledge Reduction of Rough Set Based on Partition. IDEAL 2005: 48-55
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:10 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint