default search action
Weihong Wang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j27]Wei Cao, Feng Tian, Zongbao Liu, Fang Liu, Yang Zhao, Ying Shi, Weihong Wang, Xuebao Guo:
MLPCC-MLMAE-Based Early Stopping Strategy for Unsupervised 3-D Seismic Data Reconstruction. IEEE Geosci. Remote. Sens. Lett. 21: 1-5 (2024) - [j26]Wei Shi, Siyuan Chen, Weihong Wang, Mengxin Guo, Lin Chi, Ying Shi:
Sparse Velocity Analysis: Deconvolution of Velocity Spectrum Based on Sparse Inversion. IEEE Trans. Geosci. Remote. Sens. 62: 1-11 (2024) - [j25]Wei Shi, Weihong Wang, Ying Shi, Siyuan Chen, Ning Wang, Bingyi Cao:
Radon Transform Constrained Multitrace Pre-Stack Deconvolution Algorithm. IEEE Trans. Geosci. Remote. Sens. 62: 1-10 (2024) - [j24]Ying Shi, Bo Yu, Hui Zhou, Yamei Cao, Weihong Wang, Ning Wang:
FMG_INV, a Fast Multi-Gaussian Inversion Method Integrating Well-Log and Seismic Data. IEEE Trans. Geosci. Remote. Sens. 62: 1-12 (2024) - [j23]Nuan Wen, Zhenghua Liu, Weihong Wang, Shaoping Wang:
Recovering Robust Feedback Linearization With Generative Adversarial Networks for Uncertain High-Order Nonlinear Systems: A Path to Safe Learning and Practical Deployment. IEEE Trans. Ind. Electron. 71(11): 14886-14895 (2024) - [c52]Ruben Hias, Weihong Wang, Jan Vanhoof, Tom Van Cutsem:
A Scalable State Sharing Protocol for Low-Resource Validator Nodes in Blockchain Networks. BRAINS 2024: 1-9 - [c51]Weihong Wang, Tom Van Cutsem:
Poster: I Know What Crypto You Got Last Summer: A Study on Web3 Wallet Security and Privacy. BRAINS 2024: 1-2 - [c50]Weihong Wang, Zhixiao Yan, Zuxin Wang, Cheng Zhao:
ISANE: An Interpretable Real-time News Event Evaluation Stock Prediction Model. IJCNN 2024: 1-8 - [i5]Ruben Hias, Weihong Wang, Jan Vanhoof, Tom Van Cutsem:
A Scalable State Sharing Protocol for Low-Resource Validator Nodes in Blockchain Networks. CoRR abs/2410.05854 (2024) - 2023
- [j22]Iman Vakilinia, Weihong Wang, Jiajun Xin:
An Incentive-Compatible Mechanism for Decentralized Storage Network. IEEE Trans. Netw. Sci. Eng. 10(4): 2294-2306 (2023) - [c49]Jasper Surmont, Weihong Wang, Tom Van Cutsem:
Static Application Security Testing of Consensus-Critical Code in the Cosmos Network. BRAINS 2023: 1-8 - [c48]Weihong Wang:
Towards a User-Centric Decentralized Web: Lightweight Clients as First-class Blockchain Citizens. Middleware Demos/Posters/Doctoral Symposium 2023: 21-22 - [i4]Jasper Surmont, Weihong Wang, Tom Van Cutsem:
Static Application Security Testing of Consensus-Critical Code in the Cosmos Network. CoRR abs/2308.10613 (2023) - 2022
- [j21]Kaiwen Wei, Zequn Zhang, Li Jin, Zhi Guo, Shuchao Li, Weihong Wang, Jianwei Lv:
HEFT: A History-Enhanced Feature Transfer framework for incremental event detection. Knowl. Based Syst. 254: 109601 (2022) - [j20]Wei Cao, Ying Shi, Weihong Wang, Xuebao Guo, Feng Tian, Yang Zhao:
Self-Supervised Multitask 3-D Partial Convolutional Neural Network for Random Noise Attenuation and Reconstruction in 3-D Seismic Data. IEEE Trans. Geosci. Remote. Sens. 60: 1-19 (2022) - [i3]Iman Vakilinia, Weihong Wang, Jiajun Xin:
An Incentive-Compatible Mechanism for Decentralized Storage Network. CoRR abs/2208.09937 (2022) - 2020
- [j19]Weihong Wang, Tu Jiaoyang:
Research on License Plate Recognition Algorithms Based on Deep Learning in Complex Environment. IEEE Access 8: 91661-91675 (2020) - [j18]Chen Liang, Weihong Wang, Zhenghua Liu, Chao Lai, Sen Wang:
Range-Aware Impact Angle Guidance Law With Deep Reinforcement Meta-Learning. IEEE Access 8: 152093-152104 (2020) - [j17]Robin Von Haartman, Weihong Wang, Lars Bengtsson, Camilla Niss, Gunnar Herdin:
One size does not even fit one: supply chain strategies in the decline phase. Int. J. Manuf. Technol. Manag. 34(1): 25-45 (2020) - [j16]Weihong Wang, Xiaojun Wang:
Clinical Application of High Frequency Ultrasound in Diagnosis and Treatment of Lumbar Muscle Injury After Strenuous Exercise. J. Medical Imaging Health Informatics 10(4): 923-927 (2020) - [j15]Yanbo Zhou, Hongbing Cheng, Qu Li, Weihong Wang:
Diversity of temporal influence in popularity prediction of scientific publications. Scientometrics 123(1): 383-392 (2020) - [j14]Weihong Wang, Chang Lu:
Visualization analysis of big data research based on Citespace. Soft Comput. 24(11): 8173-8186 (2020) - [c47]Xinghe Zhou, Weihong Wang, Weibo Xia, Chen Liang:
Fixed time integrated guidance and control with impact angle constraint. ICCA 2020: 406-411 - [c46]Dilusha Weeraddana, Nguyen Lu Dang Khoa, Lachlan O'Neil, Weihong Wang, Chen Cai:
Energy Consumption Forecasting Using a Stacked Nonparametric Bayesian Approach. ECML/PKDD (5) 2020: 19-35 - [i2]Dilusha Weeraddana, Nguyen Lu Dang Khoa, Lachlan O'Neil, Weihong Wang, Chen Cai:
Energy consumption forecasting using a stacked nonparametric Bayesian approach. CoRR abs/2011.05519 (2020)
2010 – 2019
- 2019
- [j13]Chen Liang, Weihong Wang, Zhenghua Liu, Chao Lai, Benchun Zhou:
Learning to Guide: Guidance Law Based on Deep Meta-Learning and Model Predictive Path Integral Control. IEEE Access 7: 47353-47365 (2019) - [j12]Xinghe Zhou, Weihong Wang, Zhenghua Liu, Chen Liang, Chao Lai:
Impact Angle Constrained Three-Dimensional Integrated Guidance and Control Based on Fractional Integral Terminal Sliding Mode Control. IEEE Access 7: 126857-126870 (2019) - [j11]Weihong Wang, Chaokai Liang, Yong Min:
基于可视块的多记录型复杂网页信息提取算法 (Multi-recording Complex Webpage Information Extraction Algorithm Based on Visual Block). 计算机科学 46(10): 63-70 (2019) - [j10]Weihong Wang, Xiao Chen, Wei Wu, Xingyu Gao:
高分影像复杂背景下的城市水体自动提取方法 (Method of Automatically Extracting Urban Water Bodies from High-resolution Images with Complex Background). 计算机科学 46(11): 277-283 (2019) - [i1]Chen Liang, Weihong Wang, Zhenghua Liu, Chao Lai, Benchun Zhou:
Learning to Guide: Guidance Law Based on Deep Meta-learning and Model Predictive Path Integral Control. CoRR abs/1904.06892 (2019) - 2018
- [j9]Hongbing Cheng, Chunming Rong, Manyun Qian, Weihong Wang:
Accountable Privacy-Preserving Mechanism for Cloud Computing Based on Identity-Based Encryption. IEEE Access 6: 37869-37882 (2018) - [j8]Chao Lai, Weihong Wang, Zhenghua Liu, Tingting Liang, Shenao Yan:
Three-Dimensional Impact Angle Constrained Partial Integrated Guidance and Control With Finite-Time Convergence. IEEE Access 6: 53833-53853 (2018) - [j7]Jianhua Chen, Weihong Wang, Junwen Li:
A geospatial case-based reasoning model for oil-gas reservoir evaluation. Trans. GIS 22(2): 373-393 (2018) - [c45]Weihong Wang, Jie Xu, Yang Wang, Chen Cai, Fang Chen:
DualBoost: Handling Missing Values with Feature Weights and Weak Classifiers that Abstain. CIKM 2018: 1543-1546 - [c44]Weihong Wang, Fuxiang Zhou, Yuhui Cao, Dawei Zhang, Jieli Sun:
Multi-situation Analytic Hierarchy Process Based on Bayesian for Mobile Service Recommendation. ICCCS (1) 2018: 688-698 - 2017
- [j6]Weihong Wang, Luqin Yan, Jie Yang:
基于LTE方向型传播模型的模拟退火加权定位算法 (Simulated Annealing for Weighted Localization Algorithm Based on LTE Directional Propagation Model). 计算机科学 44(5): 251-256 (2017) - [j5]Dong Cheng, Weihong Wang:
OpenMP多核计算技术在SAR图像处理中的应用 (Application of OpenMP in SAR Image Processing). 计算机科学 44(Z6): 161-163 (2017) - 2016
- [b1]Weihong Wang:
A Weakly Supervised Approach for Object Detection. University of New South Wales, Sydney, Australia, 2016 - 2015
- [j4]Weihong Wang, Luqin Yan, Dandan Jin, Wentao Xu, Qu Li:
基于GEPSO模型的面向对象遥感图像分类 (Object-oriented Remote Sensing Image Classification Based on GEPSO Model). 计算机科学 42(5): 51-53 (2015) - 2014
- [c43]Weihong Wang, Jie Yang, Jianwei Xiao, Sheng Li, Dixin Zhou:
Face Recognition Based on Deep Learning. HCC 2014: 812-820 - 2013
- [j3]Zhidong Li, Weihong Wang, Yang Wang, Fang Chen, Yi Wang:
Visual tracking by proto-objects. Pattern Recognit. 46(8): 2187-2201 (2013) - [c42]Weihong Wang, Youbing Lu, Zhaolin Fang:
Biometric Template Protection Based on Biometric Certificate and Fuzzy Fingerprint Vault. ADMA (1) 2013: 241-252 - [c41]Weihong Wang, Dandan Jin, Qu Li, Zhaolin Fang, Jie Yang:
The GEPSO-Classification Algorithm. ADMA (1) 2013: 576-583 - [c40]Weihong Wang, Wenrou Lin, Qu Li:
Image retrieval based on Multi Expression Programming algorithms. ICNC 2013: 1359-1364 - [c39]Weihong Wang, Zhidong Li, Yang Wang, Fang Chen:
Indexing cognitive workload based on pupillary response under luminance and emotional changes. IUI 2013: 247-256 - [c38]Weihong Wang, Yang Wang, Fang Chen, Arcot Sowmya:
A weakly supervised approach for object detection based on Soft-Label Boosting. WACV 2013: 331-338 - [c37]Weihong Wang, Shusheng Zheng, Chunping Wang:
Reprogramming for target nodes in WSNs. WOCC 2013: 426-431 - 2012
- [c36]Qu Li, Chao Chen, Weihong Wang, Cheng Ren, Siliang Xia:
An Adaptive Multi-phenotype GEP algorithm. ICNC 2012: 631-634 - [c35]Xiping Hu, Weihong Wang, Victor C. M. Leung:
VSSA: a service-oriented vehicular social-networking platform for transportation efficiency. DIVANet@MSWiM 2012: 31-38 - 2011
- [c34]Yongling Fu, Dianliang Fan, Haitao Qi, Weihong Wang:
The application of co-simulation based on AMESim and Matlab in electro-hydraulic servo system. EMEIT 2011: 3547-3550 - [c33]Weihong Wang, Yuhui Cao, Lisheng Zhang:
Modeling Restricted Factor for Mobile Group Collaboration. ICAIC (4) 2011: 98-106 - [c32]Baoyao Zhou, Weihong Wang, Zhanghui Chen:
Easy generation of personal Chinese handwritten fonts. ICME 2011: 1-6 - [c31]Yuhui Cao, Weihong Wang, Zhiqiang He, Dianyuan Shi, Liang Li:
A Resource Entity Model Oriented Mobile Collaboration Environment. ICMLA (2) 2011: 321-324 - [c30]Weihong Wang, Yanye Du, Qu Li, Zhaolin Fang:
Chaotic GEP algorithm for dynamic multi-objective optimization. ICNC 2011: 1067-1071 - 2010
- [c29]Weihong Wang, Jian Zhang, Chunhua Shen:
Improved human detection and classification in thermal images. ICIP 2010: 2313-2316 - [c28]Weihong Wang, Wei Ruan, Qu Li:
Fuzzy decision tree construction with gene expression programming. ISKE 2010: 244-248
2000 – 2009
- 2009
- [c27]Xujia Qin, Xinhong Chen, Suqiong Zhang, Weihong Wang:
EMD based fairing algorithm for mesh surface. CAD/Graphics 2009: 606-609 - [c26]Weihong Wang, Zhongsheng Hou, Shangtai Jin:
Model-free indirect adaptive decoupling control for nonlinear discrete-time MIMO systems. CDC 2009: 7663-7668 - [c25]Qu Li, Min Yao, Weihong Wang, Xiaohong Cheng:
Dynamic Split-point Selection Method for decision tree evolved by Gene Expression Programming. IEEE Congress on Evolutionary Computation 2009: 736-740 - [c24]Tao Yu, Baoyao Zhou, Qinghu Li, Rui Liu, Weihong Wang, Cheng Chang:
The design of distributed real-time video analytic system. CloudDB@CIKM 2009: 49-52 - [c23]Qiming Chen, Meichun Hsu, Rui Liu, Weihong Wang:
Scaling-Up and Speeding-Up Video Analytics Inside Database Engine. DEXA 2009: 244-254 - [c22]Weihong Wang, Chunhua Shen, Jian Zhang, Sakrapee Paisitkriangkrai:
A Two-Layer Night-Time Vehicle Detector. DICTA 2009: 162-167 - [c21]Chris Connelly, Brian Cox, Tim Forell, Rui Liu, Dejan S. Milojicic, Alan Nemeth, Peter Piet, Suhas Shivanna, Weihong Wang:
Reiki: Serviceability Architecture and Approach for Reduction and Management of Product Service Incidents. ICWS 2009: 775-782 - [c20]Rui Liu, Weihong Wang:
Out of the Confusion of Tongues: A Unified Database Programming Paradigm. ICWS 2009: 1028-1029 - [c19]Qiming Chen, Meichun Hsu, Rui Liu, Tao Yu, Qinghu Li, Weihong Wang:
Operational BI platform for video analytics. MEDES 2009: 180-187 - [c18]Weihong Wang, Hany Farid:
Exposing digital forgeries in video by detecting double quantization. MM&Sec 2009: 39-48 - [c17]Tao Yu, Baoyao Zhou, Qinghu Li, Rui Liu, Weihong Wang, Cheng Chang:
The service architecture of real-time video analytic system. SOCA 2009: 1-8 - [c16]Tao Yu, Qiming Chen, Qinghu Li, Rui Liu, Weihong Wang, Wei Liu:
A System for Web-Based Interactive Real-Time Data Visualization and Analysis. CEC 2009: 453-459 - 2008
- [c15]Qu Li, Weihong Wang, Xing Qi, Bo Chen, Jianhong Li:
Function Finding Using Gene Expression Programming Based Neural Network. ICNC (3) 2008: 195-198 - [c14]Weihong Wang, Hany Farid:
Detecting Re-projected Video. Information Hiding 2008: 72-86 - [c13]Weihong Wang, Qu Li, Xing Qi:
Gene Expression Programming Neural Network for Regression and Classification. ISICA 2008: 212-219 - 2007
- [j2]Weihong Wang, Hany Farid:
Exposing Digital Forgeries in Interlaced and Deinterlaced Video. IEEE Trans. Inf. Forensics Secur. 2(3-1): 438-449 (2007) - [c12]Yuhui Cao, Weihong Wang, Zheng Qin:
A Multi-agent Supported Adaptive Mobile Collaborative Service Platform. ICNC (5) 2007: 331-335 - [c11]Qu Li, Weihong Wang, Shanshan Han, Jianhong Li:
Evolving Classifier Ensemble With Gene Expression Programming. ICNC (3) 2007: 546-550 - [c10]Weihong Wang, Kai Pei, Xiaogang Jin:
Using Hilbert-Huang Transform to Characterize Intrusions in Computer Networks. ICNC (5) 2007: 749-753 - [c9]Weihong Wang, Hany Farid:
Exposing digital forgeries in video by detecting duplication. MM&Sec 2007: 35-42 - 2006
- [c8]Weihong Wang, Zheng Qin:
Adaptive Mobile Cooperation Model Based on Context Awareness. APWeb 2006: 1189-1192 - [c7]Xujia Qin, Weihong Wang, Qu Li:
Practical Boolean Operations on Point-Sampled Models. ICCSA (1) 2006: 393-401 - [c6]Weihong Wang, Qu Li, Shanshan Han, Hai Lin:
A Preliminary Study on Constructing Decision Tree with Gene Expression Programming. ICICIC (1) 2006: 222-225 - [c5]Weihong Wang, Hany Farid:
Exposing digital forgeries in video by detecting double MPEG compression. MM&Sec 2006: 37-47 - [c4]Sheng Zhang, Weihong Wang, James Ford, Fillia Makedon:
Learning from Incomplete Ratings Using Non-negative Matrix Factorization. SDM 2006: 549-553 - 2005
- [j1]Weihong Wang, Baochun Li:
Market-based self-optimization for autonomic service overlay networks. IEEE J. Sel. Areas Commun. 23(12): 2320-2332 (2005) - [c3]Xiaogang Jin, Weihong Wang:
Complexity of Linear Cellular Automata over Zm. ICNC (1) 2005: 1209-1213 - [c2]Sheng Zhang, Weihong Wang, James Ford, Fillia Makedon, Justin D. Pearlman:
Using Singular Value Decomposition Approximation for Collaborative Filtering. CEC 2005: 257-264 - 2003
- [c1]Weihong Wang, Baochun Li:
To Play or to Control: A Game-Based Control-Theoretic Approach to Peer-to-Peer Incentive Engineering. IWQoS 2003: 174-194
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-20 21:58 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint