Chuhan Wang
Orcid: 0000-0003-4715-4667
According to our database1,
Chuhan Wang
authored at least 28 papers
between 2017 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Analyzing research diversity of scholars based on multi-dimensional calculation of knowledge entities.
Scientometrics, November, 2024
IEEE Trans. Veh. Technol., July, 2024
A Low-Cost Defect Segmentation System Based on IoT for Large-Scale Photovoltaic Manufacturing.
IEEE Internet Things J., May, 2024
SSN: Shift Suppression Network for Endogenous Shift of Photovoltaic Defect Detection.
IEEE Trans. Ind. Informatics, March, 2024
RERN: Rich Edge Features Refinement Detection Network for Polycrystalline Solar Cell Defect Segmentation.
IEEE Trans. Ind. Informatics, February, 2024
RGR-Net: Refined Graph Reasoning Network for multi-height hotspot defect detection in photovoltaic farms.
Expert Syst. Appl., 2024
Uncovering Security Vulnerabilities in Real-world Implementation and Deployment of 5G Messaging Services.
Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2024
Where URLs Become Weapons: Automated Discovery of SSRF Vulnerabilities in Web Applications.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
TuDoor Attack: Systematically Exploring and Exploiting Logic Vulnerabilities in DNS Response Pre-processing with Malformed Packets.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the 18th International Workshop on Semantic Evaluation, 2024
Proceedings of the Natural Language Processing and Chinese Computing, 2024
ReqsMiner: Automated Discovery of CDN Forwarding Request Inconsistencies and DoS Attacks with Grammar-based Fuzzing.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
BreakSPF: How Shared Infrastructures Magnify SPF Vulnerabilities Across the Internet.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
CV-Hunet and Resnet Combined Method for Coherent Integration and Clutter Suppression of Maneuvering Target Over Sea-Surface.
Proceedings of the IGARSS 2024, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
Link prediction in research collaboration: a multi-network representation learning framework with joint training.
Multim. Tools Appl., December, 2023
Proceedings of the International Conference on Consumer Electronics - Taiwan, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
Multipath Mitigation Methods of BOC-Family Signals Based on Dual BPSK Tracking Techniques.
IEEE Trans. Aerosp. Electron. Syst., 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Analyzing Research Diversity of Scholars Based on Multi-dimensional Calculation of Entities (short paper).
Proceedings of the 3rd Workshop on Extraction and Evaluation of Knowledge Entities from Scientific Documents, 2022
2021
Weak Links in Authentication Chains: A Large-scale Analysis of Email Sender Spoofing Attacks.
Proceedings of the 30th USENIX Security Symposium, 2021
2020
Multim. Tools Appl., 2020
The Effect of Information Sharing Intention on Virtual Communities in China: An Empirical Study.
Proceedings of the ICEME '20: The 11th International Conference on E-business, 2020
2019
J. Comput. Civ. Eng., 2019
The Fusion of Electroencephalography and Facial Expression for Continuous Emotion Recognition.
IEEE Access, 2019
2017
Asymmetric Dual-Band Tracking Technique for Optimal Joint Processing of BDS B1I and B1C Signals.
Sensors, 2017