default search action
Xinli Wang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j9]Xinli Wang, Rencheng Sun:
Domain Adaptation of Time Series Classification. IEEE Access 12: 38456-38472 (2024) - [j8]Xiwen Wang, Xinli Wang, Xiaohong Yin, Kang Li, Lei Wang, Ruiqi Wang, Rui Song:
Distributed LSTM-GCN-Based Spatial-Temporal Indoor Temperature Prediction in Multizone Buildings. IEEE Trans. Ind. Informatics 20(1): 482-491 (2024) - [c41]Joy Buuri, Samah S. Mansour, Mostafa El-Said, Xinli Wang:
An Empirical Study Using Microsoft Azure Auto Machine Learning to Detect Zero-Day Attacks. SIGITE 2024: 7-11 - 2023
- [j7]Xinli Wang, Juan Gong, Yan Song, Jianhua Hu:
Adaptively weighted three-way decision oversampling: A cluster imbalanced-ratio based approach. Appl. Intell. 53(1): 312-335 (2023) - [j6]Wei Li, Xinli Wang, Lei Wang, Lei Jia, Rui Song, Zhichao Fu, Wenjie Xu:
An LSTM and ANN Fusion Dynamic Model of a Proton Exchange Membrane Fuel Cell. IEEE Trans. Ind. Informatics 19(4): 5743-5751 (2023) - [c40]Anjie Wang, Lai Zou, Xinli Wang:
Generation of Collision-Free Tool Posture for Robotic Belt Grinding Blisk Using Visualization Toolkit. ICIRA (6) 2023: 443-455 - [c39]Xinli Wang, Vijay Bhuse, Sara M. Sutton:
Hands-on Activities for Digital Forensics Education. SIGITE 2023: 205-206 - [c38]Kartikey Sanjay Tapiawala, Xinli Wang:
Knowledge Exploration: Teaching Cyber-Security Using Controlled Web-Based Laboratories. SIGITE 2023: 216-217 - 2022
- [j5]Shuangshuang Zhang, Miao Sun, Xinli Wang, Jiajia Wang, Zhenhong Jia, Xiaoyi Lv, Xiaohui Huang:
Spectral-Free Double Light Detection of DNA Based on a Porous Silicon Bragg Mirror. Sensors 22(18): 7048 (2022) - [c37]Kun Sun, Xiaohong Yin, Xinli Wang, Lin Cui, Mingjun Shao, Youliang Yu:
Prediction of outlet SO2 concentration based on a novel CNN-LSTM model. ASCC 2022: 143-147 - [c36]Xinli Wang, Samah S. Mansour, Mostafa El-Said:
Introducing Zero Trust in a Cybersecurity Course. SIGITE 2022: 118-120 - 2021
- [j4]Feifan Dai, Yan Song, Weiyun Si, Guisong Yang, Jianhua Hu, Xinli Wang:
Improved CBSO: A distributed fuzzy-based adaptive synthetic oversampling algorithm for imbalanced judicial data. Inf. Sci. 569: 70-89 (2021) - [j3]Lianjie Jiang, Xinli Wang, Wei Li, Lei Wang, Xiaohong Yin, Lei Jia:
Hybrid Multitask Multi-Information Fusion Deep Learning for Household Short-Term Load Forecasting. IEEE Trans. Smart Grid 12(6): 5362-5372 (2021) - [c35]Mostafa El-Said, Xinli Wang, Samah S. Mansour, Andrew J. Kalafut:
Building an Impersonation Attack and Defense Testbed for Vehicle To Vehicle Systems. SIGITE 2021: 65-66 - 2020
- [c34]Xinli Wang, Mostafa El-Said, Paul M. Leidig:
ITEval: A Framework for Information Technology Evaluation. SIGITE 2020: 358-364 - [c33]Xinli Wang, Mostafa El-Said:
DomainPKI: Domain Aware Certificate Management. SIGITE 2020: 419-425
2010 – 2019
- 2019
- [c32]Xian Shuang Liu, Baoyan Fan, Xinli Wang, Michael Chopp, Zheng Gang Zhang:
Differential long noncoding RNA and messenger RNA expression profiling and functional network analysis in stroke-induced neurogenesis. BIBM 2019: 2817-2824 - [c31]Wei Quan, Fengming Li, Sisi Zhang, Rui Song, Xinli Wang, Yibin Li:
Robotic Fasten Assembly using Vision and Force Sensing. RCAR 2019: 941-946 - [c30]Xinli Wang, Yan Bai, Bryan S. Goda:
Project Design and Implementation for Digital Forensics Education. SIGITE 2019: 33-38 - [c29]Xinli Wang, Mostafa El-Said:
Technology Acceptance Model Revisited: Toward a Framework of Integrated Information Technology Evaluation Model. SIGITE 2019: 159 - 2018
- [c28]Dave Poortvliet, Xinli Wang:
Intelligence Retrieval from a Centralized IoT Network. IEEE BigData 2018: 5176-5180 - 2017
- [j2]Jiajia Li, Xinli Wang, Fei Han, Guoliang Wei:
Fault detection for discrete piecewise linear systems with infinite distributed time-delays. Int. J. Syst. Sci. 48(16): 3431-3439 (2017) - 2016
- [c27]Qiong Wu, Wenjian Cai, Xinli Wang, Qing-Guo Wang, Haoren Yon:
An model for dynamic humidity control of liquid desiccant dehumidification system. ICCA 2016: 535-540 - [c26]Chad A. Arney, Xinli Wang:
Active Snort Rules and the Needs for Computing Resources: Computing Resources Needed to Activate Different Numbers of Snort Rules. RIIT 2016: 54 - 2015
- [c25]Xinli Wang, Yan Bai, Lihui Hu:
Certification with Multiple Signatures. RIIT 2015: 13-18 - [c24]Xinli Wang, Yan Bai, Guy C. Hembroff:
Hands-on Exercises for IT Security Education. SIGITE 2015: 161-166 - 2014
- [j1]Xinli Wang:
Least-square Support Vector Machine for Financial Crisis Forecast Based on Particle Swarm Optimization. J. Softw. 9(2): 313-318 (2014) - [c23]Matthew LaPointe, Lucas Walker, Matthew Nelson, Justin Shananaquet, Xinli Wang:
Comparing public and private iaas cloud models. RIIT 2014: 69-70 - [c22]Yan Bai, Xinli Wang:
ITSEED: hands-on labs for IT security education (abstract only). SIGCSE 2014: 739 - 2013
- [c21]Xinli Wang, Jiangang Lu, Qinmin Yang, Wenjian Cai, Youxian Sun:
Performance evaluation of packed tower liquid desiccant dehumidifier based on LSSVM. ICCA 2013: 987-990 - [c20]Zhongtian Chen, Wenjian Cai, Xiongxiong He, Xinli Wang, Lei Zhao:
Soft-sensing of liquid desiccant concentration based on ELM. ICST 2013: 16-21 - [c19]Xinli Wang, Alex Kordas, Lihui Hu, Matt Gaedke, Derrick W. Smith:
Administrative evaluation of intrusion detection system. RIIT 2013: 47-52 - 2012
- [c18]Dylan Steinmetz, Brian W. Perrault, Ross Nordeen, Jacob Wilson, Xinli Wang:
Cloud computing performance benchmarking and virtual machine launch time. SIGITE Conference 2012: 89-90 - 2011
- [c17]Xudan Dang, Xinli Wang, Meng Wei, Jun Xiao:
Finite element analysis of X-cor sandwich's compressive modulus. EMEIT 2011: 2532-2535 - [c16]Xinli Wang, Guy C. Hembroff, Alexander B. Cerier, Brian W. Perrault:
Introducing cloud computing with a senior design project in undergraduate education of computer system and network administration. SIGITE Conference 2011: 177-182 - [c15]Alexander B. Cerier, Matt Visich, Chris Bork, Jon Brooks, Brian W. Perrault, Philip Haddad, Xinli Wang:
Infrastructure-as-a-service clouds in a professional environment. SIGITE Conference 2011: 301-302 - [c14]Guy C. Hembroff, Xinli Wang, Sead Muftic:
Providing an Additional Factor for Patient Identification Based on Digital Fingerprint. HealthSec 2011 - 2010
- [c13]Xinli Wang, Jean Mayo, Guy C. Hembroff:
Detection of a Weak Conjunction of Unstable Predicates in Dynamic Systems. ICPADS 2010: 338-346 - [c12]Xinli Wang, Guy C. Hembroff, Rick Yedica:
Using VMware VCenter lab manager in undergraduate education for system administration and network security. SIGITE Conference 2010: 43-52
2000 – 2009
- 2009
- [c11]Xinli Wang, Jean Mayo, Guy C. Hembroff, Chunming Gao:
Detection of Conjunctive Stable Predicates in Dynamic Systems. ICPADS 2009: 828-835 - 2006
- [c10]Charles Wallace, Xinli Wang, Virginia Bluth:
Instruction in Problem Structuring and Analysis Through Problem Frames. CSEE&T 2006: 185-186 - [c9]Xinli Wang, Wei Gao, James Slusser, John Davis, Becky Olson, Gwen Scott, Bill Durham, Roger Tree, George Janson, Scott Janssen, Rita Deike:
USDA UV-B Monitoring System: An Application of Centralized Architecture. PDPTA 2006: 279-285 - [c8]Xinli Wang, Jean Mayo, Wei Gao, James Slusser:
An Efficient Implementation of Vector Clocks in Dynamic Systems. PDPTA 2006: 593-599 - 2005
- [c7]Donald Darling, Jean Mayo, Xinli Wang:
Stable Predicate Detection in Dynamic Systems. OPODIS 2005: 161-175 - 2004
- [c6]Xinli Wang, Jean Mayo:
A Distributed Algorithm for Detecting Deadlocks under the OR Model and the Resolution Based on Hardware Clocks. PDCS 2004: 193-200 - [c5]Xinli Wang, Jean Mayo:
A General Model for Detecting Distributed Termination in Dynamic Systems. IPDPS 2004 - [c4]Xinli Wang, Jean Mayo:
A Dynamic Priority Based Algorithm for Distributed Deadlock Detection and Resolution. PDPTA 2004: 599-605
1990 – 1999
- 1998
- [c3]Xinli Wang:
Log Classification by Sinlge X-ray Scans Using Texture Features from Growth Rings. ACCV (2) 1998: 129-136 - 1994
- [c2]Xinli Wang, Fritz Albregtsen, Bent Foyn:
Texture Features from Gray level Gap Length Matrix. MVA 1994: 375-378 - [c1]Xinli Wang, Bent Foyn, Fritz Albregtsen:
An Automatic Tree Ring Measurement System. MVA 1994: 387-390
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-12 21:58 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint