default search action
Weinong Wang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c30]Zhiyuan Fan, Weinong Wang, Xing Wu, Debing Zhang:
SedarEval: Automated Evaluation using Self-Adaptive Rubrics. EMNLP (Findings) 2024: 16916-16930 - 2023
- [c29]Huimin Zeng, Weinong Wang, Xin Tao, Zhiwei Xiong, Yu-Wing Tai, Wenjie Pei:
Feature Decoupling-Recycling Network for Fast Interactive Segmentation. ACM Multimedia 2023: 6665-6675 - [i3]Huimin Zeng, Weinong Wang, Xin Tao, Zhiwei Xiong, Yu-Wing Tai, Wenjie Pei:
Feature Decoupling-Recycling Network for Fast Interactive Segmentation. CoRR abs/2308.03529 (2023) - 2021
- [j4]Weinong Wang, Wenjie Pei, Qiong Cao, Shu Liu, Guangming Lu, Yu-Wing Tai:
Push for Center Learning via Orthogonalization and Subspace Masking for Person Re-Identification. IEEE Trans. Image Process. 30: 907-920 (2021) - [i2]Zhen Wei, Bingkun Liu, Weinong Wang, Yu-Wing Tai:
Few-Shot Model Adaptation for Customized Facial Landmark Detection, Segmentation, Stylization and Shadow Removal. CoRR abs/2104.09457 (2021)
2010 – 2019
- 2019
- [i1]Weinong Wang, Wenjie Pei, Qiong Cao, Shu Liu, Xiaoyong Shen, Yu-Wing Tai:
Orthogonal Center Learning with Subspace Masking for Person Re-Identification. CoRR abs/1908.10535 (2019) - 2017
- [c28]Weinong Wang, Fei Wang, Yu Guo:
A Lightweight Discriminative Tracker Based on Classification and Similarity. DICTA 2017: 1-8
2000 – 2009
- 2007
- [c27]Xiao Chen, Huagang Shao, Weinong Wang:
TOMOON: A Novel Approach for Topology-Aware Overlay Multicasting. International Conference on Computational Science (4) 2007: 644-651 - 2006
- [j3]Wen Chen, Feiyu Lei, Weinong Wang:
Adaptive improving forward-link soft handoff performance in power-controlled DS-CDMA cellular networks. Comput. Electr. Eng. 32(1-3): 37-49 (2006) - [c26]Xiao Chen, Weinong Wang:
Multihomed Routing in Multicast Service Overlay Network. ISPA 2006: 125-136 - [c25]Xiao Chen, Huagang Shao, Weinong Wang:
A Novel Approach for Topology-Aware Overlay Multicasting. ISPA 2006: 147-158 - 2005
- [j2]Yi Zhang, Xiaoli Liu, Weinong Wang:
Policy Lifecycle Model for Systems Management. IT Prof. 7(2): 50-54 (2005) - [c24]Ruijun Yang, Qi Xia, Qunhua Pan, Minglu Li, Weinong Wang:
New Enhancement Scheme for Secure Routing Protocol in Mobile Ad Hoc Networks. CIT 2005: 685-689 - [c23]Qi Xia, Ruijun Yang, Weinong Wang, De Yang:
Fully Decentralized DHT based Approach to Grid Service Discovery using Overlay Networks. CIT 2005: 1140-1045 - [c22]Junjie Jiang, Ruoyu Pan, Changyong Liang, Weinong Wang:
BiChord: An Improved Approach for Lookup Routing in Chord. ADBIS 2005: 338-348 - [c21]Qi Xia, Weinong Wang, Ruijun Yang:
A Fully Decentralized Approach to Grid Service Discovery Using Self-organized Overlay Networks. EGC 2005: 164-172 - [c20]Huagang Shao, Weinong Wang:
An End-to-End QoS Provisioning Architecture in IPv6 Networks. ICCNMC 2005: 600-609 - [c19]Wen Chen, Feiyu Lei, Weinong Wang:
A General Framework for Analyzing the Optimal Call Admission Control in DS-CDMA Cellular Network. ICCSA (2) 2005: 806-815 - [c18]Ruijun Yang, Qunhua Pan, Weinong Wang, Minglu Li:
Secure Enhancement Scheme for Routing Protocol in Mobile Ad Hoc Networks. ICDCS Workshops 2005: 664-667 - [c17]Wen Chen, Feiyu Lei, Weinong Wang:
A General Model for Non-Markovian Stochastic Decision Discrete-Event Systems. ICECCS 2005: 132-137 - [c16]Xiao Chen, Huagang Shao, Weinong Wang:
DIRA: Distributed Insertion and Relocation Routing Algorithm for Overlay Multicast in Diffserv Domain. ISPA 2005: 333-344 - [c15]Huagang Shao, Weinong Wang, Rui Xie, Xiao Chen:
An Efficient QoS Framework with Distributed Adaptive Resource Management in IPv6 Networks. ISPA 2005: 1077-1088 - [c14]Yi Zhang, Yong Zhang, Weinong Wang:
Optimization of Firewall Filtering Rules by a Thorough Rewriting. LANOMS 2005: 77-88 - [c13]Yi Zhang, Yong Zhang, Weinong Wang:
Policy Engineering for Security Management of Organization Information Systems. LANOMS 2005: 289-294 - [c12]Wen Chen, Feiyu Lei, Weinong Wang, Xi Chen:
Adaptive Supporting Prioritized Soft Handoff Calls for Power-Controlled DS-CDMA Cellular Networks. MMNS 2005: 23-34 - [c11]Ruijun Yang, Qi Xia, Qunhua Pan, Weinong Wang, Minglu Li:
Cost Management Based Secure Framework in Mobile Ad Hoc Networks. MSN 2005: 63-72 - [c10]Xiao Chen, Ruijun Yang, Qi Xia, Weinong Wang:
Overlay Multicasting over Multihomed Proxie. PDCAT 2005: 144-148 - [c9]Ruijun Yang, Qi Xia, Weinong Wang, Qunhua Pan, Xinli Huang, Minglu Li:
Secure Protocols Enhancement Based on Radio-propagation Related Looser Assumptions in Mobile Ad hoc Networks. PDCAT 2005: 201-204 - [c8]Qi Xia, Ruijun Yang, Weinong Wang:
Spatial Gossip on the Percolation Model. PDCAT 2005: 755-758 - 2004
- [j1]Yi Zhang, Yong Zhang, Weinong Wang:
Modeling and Analyzing of Workflow Authorization Management. J. Netw. Syst. Manag. 12(4): 507-535 (2004) - [c7]Junjie Jiang, Weinong Wang:
Text-Based P2P Content Search Using a Hierarchical Architecture. ICADL 2004: 429-439 - 2003
- [c6]Xianfeng Zhao, Weinong Wang, Kefei Chen:
On the Noninvertibility of Adaptive Digital Watermarking. DEXA Workshops 2003: 347-351 - [c5]Junjie Jiang, Haihuan Bai, Weinong Wang:
Trust and Cooperation in Peer-to-Peer Systems. GCC (1) 2003: 371-378 - [c4]Xianfeng Zhao, Weinong Wang, Kefei Chen:
Multimedia Tampering Localization Based on the Perturbation in Reverse Processing. WAIM 2003: 483-494 - [c3]Xianfeng Zhao, Weinong Wang, Kefei Chen:
On the spectral singularities of watermarked audio. WEDELMUSIC 2003: 67-70 - 2002
- [c2]Cheng Li, Weinong Wang:
Internet Mail Transfer and Check System Based on Intelligence Mobile Agents. SAINT 2002: 2-3 - [c1]Xianfeng Zhao, Weinong Wang, Kefei Chen:
Exploiting the Intrinsic Irreversibility of Adaptive Technologies to Enhance the Security of Digital Watermarking. WAIM 2002: 430-440
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-15 19:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint