Donghua Wang

Orcid: 0000-0003-4685-8232

According to our database1, Donghua Wang authored at least 36 papers between 2008 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Optimizing Latent Variables in Integrating Transfer and Query Based Attack Framework.
IEEE Trans. Pattern Anal. Mach. Intell., January, 2025

2024
Improving Transferability of Universal Adversarial Perturbation With Feature Disruption.
IEEE Trans. Image Process., 2024

AdvOps: Decoupling adversarial examples.
Pattern Recognit., 2024

An invisible, robust copyright protection method for DNN-generated content.
Neural Networks, 2024

Improving the Transferability of Adversarial Examples by Feature Augmentation.
CoRR, 2024

Universal Multi-view Black-box Attack against Object Detectors via Layout Optimization.
CoRR, 2024

QRPatch: A Deceptive Texture-Based Black-Box Adversarial Attacks with Genetic Algorithm.
Proceedings of the IEEE Congress on Evolutionary Computation, 2024

2023
Natural Weather-Style Black-Box Adversarial Attacks Against Optical Aerial Detectors.
IEEE Trans. Geosci. Remote. Sens., 2023

Differential evolution based dual adversarial camouflage: Fooling human eyes and object detectors.
Neural Networks, 2023

Universal Perturbation-based Secret Key-Controlled Data Hiding.
CoRR, 2023

Adversarial Examples in the Physical World: A Survey.
CoRR, 2023

Impact of Light and Shadow on Robustness of Deep Neural Networks.
CoRR, 2023

A Plug-and-Play Defensive Perturbation for Copyright Protection of DNN-based Applications.
CoRR, 2023

RFLA: A Stealthy Reflected Light Adversarial Attack in the Physical World.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

2022
Exploring the Evolution of the Accessibility of Educational Facilities and Its Influencing Factors in Mountainous Areas: A Case Study of the Rocky Desertification Area in Yunnan, Guangxi, and Guizhou.
ISPRS Int. J. Geo Inf., 2022

A Survey on Physical Adversarial Attack in Computer Vision.
CoRR, 2022

FCA: Learning a 3D Full-Coverage Vehicle Camouflage for Multi-View Physical Adversarial Attack.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
Defending and Detecting Audio Adversarial Example using Frame Offsets.
KSII Trans. Internet Inf. Syst., 2021

Using a low correlation high orthogonality feature set and machine learning methods to identify plant pentatricopeptide repeat coding gene/protein.
Neurocomputing, 2021

Fast speech adversarial example generation for keyword spotting system with conditional GAN.
Comput. Commun., 2021

2020
SMOPredT4SE: An Effective Prediction of Bacterial Type IV Secreted Effectors Using SVM Training With SMO.
IEEE Access, 2020

Targeted Speech Adversarial Example Generation With Generative Adversarial Network.
IEEE Access, 2020

The Frequencies of Oppositely Charged, Uncharged Polar, and β-Branched Amino Acids Determine Proteins' Thermostability.
IEEE Access, 2020

Escherichia Coli DNA N-4-Methycytosine Site Prediction Accuracy Improved by Light Gradient Boosting Machine Feature Selection Technology.
IEEE Access, 2020

Identification of Secreted Proteins From Malaria Protozoa With Few Features.
IEEE Access, 2020

Adversarial Examples Attack and Countermeasure for Speech Recognition System: A Survey.
Proceedings of the Security and Privacy in Digital Economy, 2020

Efficient Generation of Speech Adversarial Examples with Generative Model.
Proceedings of the Digital Forensics and Watermarking - 19th International Workshop, 2020

2019
A Framework Integrating Heterogeneous Databases for the Completion of Gene Networks.
IEEE Access, 2019

Electromagnetic Vibration Characteristics Analysis of a Squirrel-Cage Induction Motor Under Different Loading Conditions.
IEEE Access, 2019

iRBP-Motif-PSSM: Identification of RNA-Binding Proteins Based on Collaborative Learning.
IEEE Access, 2019

2018
Image Analysis System for Optimal Geometric Distribution of RFID Tags Based on Flood Fill and DLT.
IEEE Trans. Instrum. Meas., 2018

2011
Application of Fuzzy Cluster Analysis for Academic Title Evaluation.
Proceedings of the Information Computing and Applications, 2011

2010
Comprehensive Evaluation of Banking Sustainable Development Based on Entropy Weight Method.
Proceedings of the Information Computing and Applications - International Conference, 2010

Configuration Issues of Cashier Staff in Supermarket Based on Queuing Theory.
Proceedings of the Information Computing and Applications - International Conference, 2010

2008
Optimal Distributed Fusion Update with Same Lag Time Out-of-Sequence Measurements.
Proceedings of the 2008 IEEE Conference on Robotics, Automation and Mechatronics, 2008

Distributed Multisensor Estimation Fusion with Out-of-Sequence Measurements.
Proceedings of the International Conference on Embedded Software and Systems, 2008


  Loading...