default search action
Chunhua Wu
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j34]Dan Luo, Kangfeng Zheng, Chunhua Wu, Xiujuan Wang, Jvjie Wang:
ERAT-DLoRA: Parameter-efficient tuning with enhanced range adaptation in time and depth aware dynamic LoRA. Neurocomputing 614: 128778 (2025) - 2024
- [j33]Haoyu Wang, Chunhua Wu, Kangfeng Zheng:
Defense against adversarial attacks based on color space transformation. Neural Networks 173: 106176 (2024) - 2023
- [j32]Rundong Yang, Kangfeng Zheng, Xiujuan Wang, Bin Wu, Chunhua Wu:
Social Engineering Attack-Defense Strategies Based on Reinforcement Learning. Comput. Syst. Sci. Eng. 47(2): 2153-2170 (2023) - [j31]Tat Y. Chan, Yijun Chen, Chunhua Wu:
Collaborate to Compete: An Empirical Matching Game Under Incomplete Information in Rank-Order Tournaments. Mark. Sci. 42(5): 1004-1026 (2023) - 2022
- [j30]Yanping Shen, Kangfeng Zheng, Chunhua Wu:
A Hybrid PSO-BPSO Based Kernel Extreme Learning Machine Model for Intrusion Detection. J. Inf. Process. Syst. 18(1): 146-158 (2022) - [i4]Zihao Li, Chunhua Wu, Shenglin Wu, Wenbo Wan, Yuhao Wang, Qiegen Liu:
Generative Modeling in Structural-Hankel Domain for Color Image Inpainting. CoRR abs/2211.13857 (2022) - 2021
- [j29]Yudao Sun, Chunhua Wu, Kangfeng Zheng, Xinxin Niu:
Adv-Emotion: The Facial Expression Adversarial Attack. Int. J. Pattern Recognit. Artif. Intell. 35(11): 2152016:1-2152016:23 (2021) - [j28]Yudao Sun, Juan Yin, Chunhua Wu, Kangfeng Zheng, Xinxin Niu:
Generating facial expression adversarial examples based on saliency map. Image Vis. Comput. 116: 104318 (2021) - [j27]Rundong Yang, Kangfeng Zheng, Bin Wu, Chunhua Wu, Xiujuan Wang:
Phishing Website Detection Based on Deep Convolutional Neural Network and Random Forest Ensemble Learning. Sensors 21(24): 8281 (2021) - [c11]Huiwen Fang, Chunhua Wu:
Neural Network Model Extraction Based on Adversarial Examples. AISS 2021: 34:1-34:5 - [c10]Ran Jin, Chunhua Wu:
WordErrorSim: An Adversarial Examples Generation Method in Chinese by Erroneous Knowledge. ICCDA 2021: 155-161 - [c9]Yufei Liu, Dongmei Zhang, Chunhua Wu, Wei Liu:
A Word-Level Method for Generating Adversarial Examples Using Whole-Sentence Information. NLPCC (1) 2021: 183-195 - [i3]Kai Hong, Chunhua Wu, Cailian Yang, Minghui Zhang, Yancheng Lu, Yuhao Wang, Qiegen Liu:
High-dimensional Assisted Generative Model for Color Image Restoration. CoRR abs/2108.06460 (2021) - 2020
- [j26]Ke Wen, Yafei Song, Chunhua Wu, Tianpeng Li:
A Novel Measure of Uncertainty in the Dempster-Shafer Theory. IEEE Access 8: 51550-51559 (2020) - [j25]Yanping Shen, Kangfeng Zheng, Chunhua Wu, Yixian Yang:
A Nature-inspired Multiple Kernel Extreme Learning Machine Model for Intrusion Detection. KSII Trans. Internet Inf. Syst. 14(2): 702-723 (2020) - [j24]Chunhua Wu, Koray Cosguner:
Profiting from the Decoy Effect: A Case Study of an Online Diamond Retailer. Mark. Sci. 39(5): 974-995 (2020) - [j23]Zhe Wang, Bo Yan, Chunhua Wu, Bin Wu, Xiujuan Wang, Kangfeng Zheng:
Graph Adaptation Network with Domain-Specific Word Alignment for Cross-Domain Relation Extraction. Sensors 20(24): 7180 (2020) - [i2]Qingbiao Li, Chunhua Wu, Kangfeng Zheng, Zhe Wang:
Hierarchical Transformer Network for Utterance-level Emotion Recognition. CoRR abs/2002.07551 (2020) - [i1]Qingbiao Li, Chunhua Wu, Kangfeng Zheng:
Text Classification with Lexicon from PreAttention Mechanism. CoRR abs/2002.07591 (2020)
2010 – 2019
- 2019
- [j22]Yuhua Wang, Chunhua Wu, Kangfeng Zheng, Xiujuan Wang:
Improving Reliability: User Authentication on Smartphones Using Keystroke Biometrics. IEEE Access 7: 26218-26228 (2019) - [j21]Kangfeng Zheng, Tong Wu, Xiujuan Wang, Bin Wu, Chunhua Wu:
A Session and Dialogue-Based Social Engineering Framework. IEEE Access 7: 67781-67794 (2019) - [j20]Zhe Wang, Chunhua Wu, Kangfeng Zheng, Xinxin Niu, Xiujuan Wang:
SMOTETomek-Based Resampling for Personality Recognition. IEEE Access 7: 129678-129689 (2019) - [j19]Tong Wu, Kangfeng Zheng, Guangzhi Xu, Chunhua Wu, Xiujuan Wang:
User identification by keystroke dynamics using improved binary particle swarm optimisation. Int. J. Bio Inspired Comput. 14(3): 171-180 (2019) - [j18]Tong Wu, Kangfeng Zheng, Chunhua Wu, Xiujuan Wang:
User Identification Using Real Environmental Human Computer Interaction Behavior. KSII Trans. Internet Inf. Syst. 13(6): 3055-3073 (2019) - [j17]Li Sang, Zhejiang Zhou, Chunhua Wu:
Diagnosis of Pulmonary Embolism by Treatment Based on Analysis of Multi-slice Spiral Ct Pulmonary Artery Images. J. Medical Imaging Health Informatics 9(5): 867-872 (2019) - [j16]Yanwen Wang, Chunhua Wu, Ting Zhu:
Mobile Hailing Technology and Taxi Driving Behaviors. Mark. Sci. 38(5): 734-755 (2019) - [j15]Michael Lewis, Yanwen Wang, Chunhua Wu:
Season Ticket Buyer Value and Secondary Market Options. Mark. Sci. 38(6): 973-993 (2019) - [j14]Yanping Shen, Kangfeng Zheng, Chunhua Wu, Yixian Yang:
A Neighbor Prototype Selection Method Based on CCHPSO for Intrusion Detection. Secur. Commun. Networks 2019: 1283495:1-1283495:9 (2019) - [j13]Yanqing Yang, Kangfeng Zheng, Chunhua Wu, Yixian Yang:
Improving the Classification Effectiveness of Intrusion Detection by Using Improved Conditional Variational AutoEncoder and Deep Neural Network. Sensors 19(11): 2528 (2019) - [j12]Xiayun Feng, Fei Wang, Chunhua Wu, Jian Luo, Lijun Zhang:
Modeling and Comparisons of Aggregated Flyback Microinverters in Aspect of Harmonic Resonances With the Grid. IEEE Trans. Ind. Electron. 66(1): 276-285 (2019) - [c8]Bo Yan, Dongmei Zhang, Huadong Wang, Chunhua Wu:
Cross-View Adaptation Network for Cross-Domain Relation Extraction. CCL 2019: 306-317 - [c7]Heci Zheng, Chunhua Wu:
Predicting Personality Using Facebook Status Based on Semi-supervised Learning. ICMLC 2019: 59-64 - 2018
- [j11]Yanping Shen, Kangfeng Zheng, Chunhua Wu, Mingwu Zhang, Xinxin Niu, Yixian Yang:
An Ensemble Method based on Selection Using Bat Algorithm for Intrusion Detection. Comput. J. 61(4): 526-538 (2018) - [c6]Yahan Wang, Chunhua Wu, Kangfeng Zheng, Xiujuan Wang:
Social Bot Detection Using Tweets Similarity. SecureComm (2) 2018: 63-78 - 2017
- [j10]Yanping Xu, Chunhua Wu, Kangfeng Zheng, Xinxin Niu, Yixian Yang:
Fuzzy-synthetic minority oversampling technique: Oversampling based on fuzzy set theory for Android malware detection in imbalanced datasets. Int. J. Distributed Sens. Networks 13(4) (2017) - [j9]Yanping Xu, Chunhua Wu, Kangfeng Zheng, Xinxin Niu, Tianling Lu:
Feature Selection to Mine Joint Features from High-dimension Space for Android Malware Detection. KSII Trans. Internet Inf. Syst. 11(9): 4658-4679 (2017) - [j8]Yanping Xu, Chunhua Wu, Kangfeng Zheng, Xu Wang, Xinxin Niu, Tianliang Lu:
Computing Adaptive Feature Weights with PSO to Improve Android Malware Detection. Secur. Commun. Networks 2017: 3284080:1-3284080:14 (2017) - [c5]Zhihua Li, Zhiqun Ye, Chunhua Wu, Wenxin Xu:
Modeling and Simulation Study of Photovoltaic DC Arc Faults. LSMS/ICSEE (3) 2017: 137-146 - 2016
- [j7]Weixin Liu, Kangfeng Zheng, Bin Wu, Chunhua Wu, Xinxin Niu:
Flow-based Anomaly Detection Using Access Behavior Profiling and Time-sequenced Relation Mining. KSII Trans. Internet Inf. Syst. 10(6): 2781-2800 (2016) - [c4]Xu Wang, Kangfeng Zheng, Xinxin Niu, Bin Wu, Chunhua Wu:
Detection of command and control in advanced persistent threat based on independent access. ICC 2016: 1-6 - 2015
- [j6]Chunhua Wu, Hai Che, Tat Y. Chan, Xianghua Lu:
The Economic Value of Online Reviews. Mark. Sci. 34(5): 739-754 (2015) - [j5]Chunhua Wu:
Matching Value and Market Design in Online Advertising Networks: An Empirical Analysis. Mark. Sci. 34(6): 906-921 (2015) - 2013
- [j4]Mingzhi Cheng, Minchao Xi, Kaiguo Yuan, Chunhua Wu, Min Lei:
Recoverable Video Watermark in DCT Domain. J. Comput. 8(2): 533-538 (2013) - 2012
- [j3]Da Xiao, Yan Yang, Wenbin Yao, Chunhua Wu, Jianyi Liu, Yixian Yang:
Multiple-File Remote Data Checking for cloud storage. Comput. Secur. 31(2): 192-205 (2012) - [j2]Weiwei Zhang, Ru Zhang, Xianyi Liu, Chunhua Wu, Xinxin Niu:
A Video Watermarking Algorithm of H.264/AVC for Content Authentication. J. Networks 7(8): 1150-1154 (2012) - 2011
- [j1]Tat Y. Chan, Chunhua Wu, Ying Xie:
Measuring the Lifetime Value of Customers Acquired from Google Search Advertising. Mark. Sci. 30(5): 837-850 (2011)
2000 – 2009
- 2009
- [c3]Da Xiao, Wenbin Yao, Chunhua Wu, Cong Wang, Yixian Yang:
VAOFS: A Verifiable Append-Only File System for Regulatory Compliance. GCC 2009: 325-330 - 2008
- [c2]Chun Dong, Chunhua Wu, Xiaoli Sun:
Research on Evaluating Urban Comprehensive Competitiveness during Multi-year and the Spatial Characters of Important Cities in China. FSKD (2) 2008: 498-503 - [c1]Cong Wang, Chunhua Wu:
Utility Presentation in Destination Decision System. ICNSC 2008: 636-641
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 22:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint