default search action
Wenli Wang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j37]Nan An, Zhenfeng Gao, Wen Li, Fuzhi Cao, Wenli Wang, Weinan Xu, Chunhui Wang, Min Xiang, Yang Gao, Dawei Wang, Dexin Yu, Xiaolin Ning:
Source localization comparison and combination of OPM-MEG and fMRI to detect sensorimotor cortex responses. Comput. Methods Programs Biomed. 254: 108292 (2024) - [j36]Wenli Wang, Zhuliang Jia, Mengfan Xu, Shundong Li:
FPMRQ: Fully Privacy-Preserving Multidimensional Range Queries on Encrypted Data. IEEE Internet Things J. 11(7): 12362-12376 (2024) - [j35]Lin Fan, Wenli Wang:
Big data-assisted student's English learning ability appraisal model using fuzzy logic system. J. Intell. Fuzzy Syst. 46(4): 10621-10636 (2024) - [j34]Jun Yan, Wenli Wang, Zhenqiang Wu, Laifeng Lu, Yihui Zhou:
An Uncertain Graph Method based on Shuffle Model to Preserve Link Privacy of Mobile Social Networks. J. Inf. Sci. Eng. 40(1): 125-150 (2024) - [j33]Wenli Wang, Gangshu (George) Cai:
Curtailing Bank Loan and Loan Insurance Under Risk Regulations in Supply Chain Finance. Manag. Sci. 70(4): 2682-2698 (2024) - [j32]Wen Li, Fuzhi Cao, Nan An, Wenli Wang, Chunhui Wang, Weinan Xu, Dexin Yu, Min Xiang, Xiaolin Ning:
Source imaging method based on diagonal covariance bases and its applications to OPM-MEG. NeuroImage 299: 120851 (2024) - [c24]Yijun Zhang, Jun Yan, Yihui Zhou, Wenli Wang:
The Preservation of Weighted Graphs based on Shuffle differential privacy in Social Networks. NaNA 2024: 209-214 - [i2]Wenli Wang, Duo Liu, Gangrong Qu, Caiqin Song:
Greedy randomized block Kaczmarz method for matrix equation AXB=C and its applications in color image restoration. CoRR abs/2408.05444 (2024) - 2023
- [j31]Wenli Wang, Gangrong Qu, Caiqin Song, Duo Liu:
Block-row and block-column iterative algorithms for solving linear matrix equation. Comput. Appl. Math. 42(4) (2023) - [j30]Xingwen Quan, Wenli Wang, Qian Xie, Binbin He, Víctor Resco de Dios, Marta Yebra, Miao Jiao, Rui Chen:
Improving wildfire occurrence modelling by integrating time-series features of weather and fuel moisture content. Environ. Model. Softw. 170: 105840 (2023) - [j29]Wenli Wang, Gangrong Qu, Caiqin Song:
Cyclic gradient based iterative algorithm for a class of generalized coupled Sylvester-conjugate matrix equations. J. Frankl. Inst. 360(11): 7206-7229 (2023) - [j28]Miao Jiao, Xingwen Quan, Jinsong Yao, Wenli Wang:
How Does the Management Paradigm Contain Wildfire Over Southwest China? Evidence From Remote Sensing Observation. IEEE Geosci. Remote. Sens. Lett. 20: 1-5 (2023) - [j27]Wenli Wang, Xingwen Quan:
Estimation of Live Fuel Moisture Content From Multiple Sources of Remotely Sensed Data. IEEE Geosci. Remote. Sens. Lett. 20: 1-5 (2023) - [j26]Qianhui Li, Liquan Dong, Yao Hu, Qun Hao, Wenli Wang, Jie Cao, Yang Cheng:
Polarimetry for Bionic Geolocation and Navigation Applications: A Review. Remote. Sens. 15(14): 3518 (2023) - [j25]Fuzhi Cao, Nan An, Weinan Xu, Wenli Wang, Wen Li, Chunhui Wang, Min Xiang, Yang Gao, Xiaolin Ning:
Optical Co-Registration Method of Triaxial OPM-MEG and MRI. IEEE Trans. Medical Imaging 42(9): 2706-2713 (2023) - [c23]Wenli Wang, Rui Chen, Mingzhao Li, Chunquan Fan, Miao Jiao:
Estimation of Live Fuel Moisture Content Based on A Machine Learning Approach. IGARSS 2023: 3070-3073 - [c22]Mingzhao Li, Miao Jiao, Wenli Wang, Rui Chen, Chunquan Fan:
Global Live Fuel Moisture Content Dynamic Monitoring Based on Modis Data Observation. IGARSS 2023: 3303-3306 - [c21]Jun Yan, Yi Tian, Wenli Wang, Yijun Zhang, Yihui Zhou, Laifeng Lu:
A Local Differential Privacy Based Method to Preserve Link Privacy in Mobile Social Network. NaNA 2023: 390-396 - [c20]Wenli Wang, Yijun Zhang, Jun Yan, Yihui Zhou, Laifeng Lu:
Joint Distribution Analysis of Multi-Dimensional Randomized Response. NaNA 2023: 422-427 - 2022
- [j24]Suzhen Wang, Wenli Wang, Zhiting Jia, Chaoyi Pang:
Flexible Task Scheduling Based on Edge Computing and Cloud Collaboration. Comput. Syst. Sci. Eng. 42(3): 1241-1255 (2022) - [j23]Wenli Wang, Zhuliang Jia, Mengfan Xu, Shundong Li:
SPCS: Strong Privacy-Preserving-Constrained Shortest Distance Queries on Encrypted Graphs. IEEE Internet Things J. 9(22): 22516-22528 (2022) - [j22]Nan An, Fuzhi Cao, Wen Li, Wenli Wang, Weinan Xu, Chunhui Wang, Yang Gao, Min Xiang, Xiaolin Ning:
Multiple Source Detection Based on Spatial Clustering and Its Applications on Wearable OPM-MEG. IEEE Trans. Biomed. Eng. 69(10): 3131-3141 (2022) - [j21]Fuzhi Cao, Nan An, Wenli Wang, Weinan Xu, Wen Li, Chunhui Wang, Min Xiang, Yang Gao, Xiaolin Ning:
Effects of Different Head Models in Wearable OPM-MEG. IEEE Trans. Instrum. Meas. 71: 1-10 (2022) - 2021
- [j20]Xue Ge, Jiawei Dou, Wenli Wang, Yingnan Wang:
Private feasible solution determination. IET Inf. Secur. 15(1): 76-86 (2021) - [j19]Wenli Wang, Caiqin Song, Shipu Ji:
Iterative solution to a class of complex matrix equations and its application in time-varying linear system. J. Appl. Math. Comput. 67(1-2): 317-341 (2021) - [j18]Alan Peslak, Lisa Kovalchick, Wenli Wang, Paul Kovacs:
Effectiveness of Educational Delivery Modes: A Study in Computer Information Systems. J. Inf. Syst. Educ. 32(4): 253-261 (2021) - [j17]Wenli Wang, Qinhong Zhang:
Financing the newsvendor: raising the loan limit by insurance contract. Oper. Res. 21(4): 2907-2932 (2021) - [j16]Rusheng Zhang, Akihiro Ishikawa, Wenli Wang, Benjamin Striner, Ozan K. Tonguz:
Using Reinforcement Learning With Partial Vehicle Detection for Intelligent Traffic Signal Control. IEEE Trans. Intell. Transp. Syst. 22(1): 404-415 (2021) - [c19]Suzhen Wang, Zhiting Jia, Wenli Wang:
Research on Optimization of Data Balancing Partition Algorithm Based on Spark Platform. ICAIS (2) 2021: 3-13 - [c18]Wenli Wang, Bo He:
Design of Predictive Controller for UAV Track Tracking Model. ISCID 2021: 246-249 - 2020
- [j15]Caiqin Song, Wenli Wang:
Solutions to the linear transpose matrix equations and their application in control. Comput. Appl. Math. 39(4) (2020) - [j14]Shundong Li, Sufang Zhou, Jiawei Dou, Wenli Wang:
Polynomial AND homomorphic cryptosystem and applications. Sci. China Inf. Sci. 63(1): 112105 (2020) - [j13]Yinhe Wang, Wenli Wang, Lili Zhang:
State synchronization of controlled nodes via the dynamics of links for complex dynamical networks. Neurocomputing 384: 225-230 (2020) - [j12]Wenli Wang, Shundong Li, Jiawei Dou, Runmeng Du:
Privacy-preserving mixed set operations. Inf. Sci. 525: 67-81 (2020) - [j11]Wenli Wang, Lan Zheng, Wei Li, Chen Zhu, Weiqing Peng, Bing Han, Wei Fu:
Design, Synthesis, and Structure-Activity Relationship Studies of Novel Indolyalkylpiperazine Derivatives as Selective 5-HT1A Receptor Agonists. J. Chem. Inf. Model. 60(1): 235-248 (2020) - [c17]Panpan Yao, Hui Lu, Wenli Wang, Changkun Shao, Kun Yang, Daniel Short Gianotti, Zhuang Liu, Xiaomeng Huang, Dara Entekhabi:
Soil Moisture Retrieval Only Using Smap L-Band Radar Observations. IGARSS 2020: 4586-4589
2010 – 2019
- 2019
- [j10]Mei Zhou, Sheng Tang, Wenli Wang, Jing Ke, Zhouhu Deng:
A Frequency Multiplication Method Based on Extracting Harmonic From Narrow Pulse. IEEE Access 7: 95341-95350 (2019) - [j9]Qiong Wei, Shundong Li, Wenli Wang, Yanjing Yang:
Privacy-preserving Computational Geometry. Int. J. Netw. Secur. 21(6): 1071-1080 (2019) - [c16]Li Wei, Xiang Li, Tingrong Cao, Quan Zhang, Liangqi Zhou, Wenli Wang:
Research on Optimization of CAPTCHA Recognition Algorithm Based on SVM. ICMLC 2019: 236-240 - 2018
- [j8]Ledi Fang, Shundong Li, Wenli Wang:
An Efficient Protocol for Privately Determining the Relationship Between Two Straight Lines. Int. J. Netw. Secur. 20(6): 1175-1182 (2018) - [j7]Edgardo Donovan, Indira R. Guzman, Monica Adya, Wenli Wang:
A Cloud Update of the DeLone and McLean Model of Information Systems Success. J. Inf. Technol. Manag. 29(3): 23-34 (2018) - [c15]Hongwei Duan, Runmeng Du, Qiong Wei, Wenli Wang, Xin Liu:
Efficient Collusion-Tolerable Secure Multiparty Computation of Weighted Average. CIS 2018: 412-415 - [c14]Tingrong Cao, Ling Lu, Wenli Wang, Lihua Li, Lei Wang:
A Method for Detecting Flower Collision Based on Spherical Projection. IGTA 2018: 22-34 - [i1]Rusheng Zhang, Akihiro Ishikawa, Wenli Wang, Benjamin Striner, Ozan K. Tonguz:
Partially Observable Reinforcement Learning for Intelligent Transportation Systems. CoRR abs/1807.01628 (2018) - 2017
- [j6]Guobao Wang, Jian Zhou, Zhou Yu, Wenli Wang, Jinyi Qi:
Hybrid Pre-Log and Post-Log Image Reconstruction for Computed Tomography. IEEE Trans. Medical Imaging 36(12): 2457-2465 (2017) - [c13]Wenli Wang, Robert J. Skovira:
Authenticity and Social Media. AMCIS 2017 - 2016
- [c12]Wenli Wang:
Reality Video vs. Video Modeling-A Case Study in Patient Education. AMCIS 2016 - 2015
- [j5]David J. Pauleen, Nikunj Dalal, David Rooney, Ali Intezari, Wenli Wang:
In Bed with Technology? Peril, Promise, and Prudence. Commun. Assoc. Inf. Syst. 37: 38 (2015) - [c11]Wenli Wang:
Building a Contemplative IS Workforce through Promoting Mindfulness in IS Design-A Case Study. AMCIS 2015 - [c10]Lu Yu, Wenli Wang, Xin Zhang, Wengang Zheng:
A Review on Leaf Temperature Sensor: Measurement Methods and Application. CCTA (1) 2015: 216-230 - 2013
- [c9]Nikunj Dalal, David J. Pauleen, Murray E. Jennex, Jon Beard, Peter Rosen, Wenli Wang:
Where is the Wisdom We Have Lost in Technology? AMCIS 2013 - [c8]Trond Steihaug, Wenli Wang:
Adaptive Curve Tailoring. ISCIS 2013: 3-13 - 2011
- [c7]Michael C. K. Khoo, Wenli Wang, Patjanaporn Chalacheva:
Monitoring ultradian changes in cardiorespiratory control in obstructive sleep apnea syndrome. EMBC 2011: 1487-1490 - [c6]Pauline Ray, Wenli Wang, Jerry C. Chang, Geoffrey S. Hubona:
Management of Change to Ensure IS Success: A Longitudinal Study. ICIS 2011 - 2010
- [c5]Thomas P. Barto, Wenli Wang:
Deterring Adolescent Dependency on Text Messaging: A Conceptual Model and Framework for Behavior Control. AMCIS 2010: 563
2000 – 2009
- 2008
- [c4]Yitshak Merin, Wenli Wang:
The Benefits of Unexpected Informal Customer Support from Vendors in Online Communities. AMCIS 2008: 141 - 2007
- [j4]Zoltán Hidvégi, Wenli Wang, Andrew B. Whinston:
Binary Vickrey auction - A robust and efficient multi-unit sealed-bid online auction protocol against buyer multi-identity bidding. Decis. Support Syst. 43(2): 301-312 (2007) - 2006
- [j3]Zoltán Hidvégi, Wenli Wang, Andrew B. Whinston:
Buy-price English auction. J. Econ. Theory 129(1): 31-56 (2006) - 2005
- [c3]David A. Cook, Wenli Wang:
To the Question "Does IT Matter?" Hollywood Answers "Yes". HICSS 2005 - 2002
- [c2]Wenli Wang, Zoltán Hidvégi, Andrew B. Whinston:
Shill Bidding In Multi-Round Online Auctions. HICSS (Addendum) 2002 - 2001
- [j2]Wenli Wang, Zoltán Hidvégi, Andrew B. Whinston:
Designing Mechanisms for E-Commerce Security: An Example from Sealed-Bid Auctions. Int. J. Electron. Commer. 6(2): 139-156 (2001) - 2000
- [j1]Wenli Wang, Zoltán Hidvégi, Andrew D. Bailey Jr., Andrew B. Whinston:
E-Process Design and Assurance Using Model Checking. Computer 33(10): 48-53 (2000) - [c1]Wenli Wang, Zoltán Hidvégi, Andrew B. Whinston:
Economic mechanism design for securing online auctions. ICIS 2000: 676-680
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-20 22:00 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint