Haizhou Wang

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Known people with the same name:

Bibliography

2024
From Score-Driven to Value-Sharing: Understanding Chinese Family Use of AI to Support Decision Making of College Applications.
CoRR, 2024

Unmasking the Shadows: Pinpoint the Implementations of Anti-Dynamic Analysis Techniques in Malware Using LLM.
CoRR, 2024

Hide Your Malicious Goal Into Benign Narratives: Jailbreak Large Language Models through Neural Carrier Articles.
CoRR, 2024

A hybrid LLM workflow can help identify user privilege related variables in programs of any size.
CoRR, 2024

2023
MBSNN: A multi-branch scalable neural network for resource-constrained IoT devices.
J. Syst. Archit., September, 2023

An Efficient Architecture for Imputing Distributed Data Sets of IoT Networks.
IEEE Internet Things J., September, 2023

Tackling imbalanced data in cybersecurity with transfer learning: a case with ROP payload detection.
Cybersecur., 2023

Multimodal Short Video Rumor Detection System Based on Contrastive Learning.
CoRR, 2023

TKSP: Long-Term Stance Prediction for Social Media Users by Fusing Time Series Features and Event Dynamic Evolution Knowledge.
Proceedings of the Knowledge Science, Engineering and Management, 2023

2022
Database Resources of the National Genomics Data Center, China National Center for Bioinformation in 2022.
, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,
Nucleic Acids Res., 2022

dbDEMC 3.0: Functional Exploration of Differentially Expressed miRNAs in Cancers of Human and Model Organisms.
Genom. Proteom. Bioinform., 2022

Improving IoT data availability via feedback- and voting-based anomaly imputation.
Future Gener. Comput. Syst., 2022

Multi-Access Edge Computing using Mode Division Multiple Access.
Proceedings of the 14th International Conference on Wireless Communications and Signal Processing, 2022

2021
Many-to-Many Matching-Theory-Based Dynamic Bandwidth Allocation for UAVs.
IEEE Internet Things J., 2021

Identifying Non-Control Security-Critical Data in Program Binaries with a Deep Neural Model.
CoRR, 2021

Tackling Imbalanced Data in Cybersecurity with Transfer Learning: A Case with ROP Payload Detection.
CoRR, 2021

Three-Sided Matching Game Based Joint Bandwidth and Caching Resource Allocation for UAVs.
Proceedings of the 10th IEEE/CIC International Conference on Communications in China, 2021

2020
DeepReturn: A deep neural network can learn how to detect previously-unseen ROP payloads without using any heuristics.
J. Comput. Secur., 2020

Using deep learning to solve computer security challenges: a survey.
Cybersecur., 2020

Statistical Analysis of Inter-attribute Relationships in Unfractionated Heparin Injection Problems.
Proceedings of the 42nd Annual International Conference of the IEEE Engineering in Medicine & Biology Society, 2020

2017
On Content Diffusion Modelling in Information-Centric Networks.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

2016
Accelerating Surgical Simulation Development via OpenSurgSim: Burr Hole Trainer.
Proceedings of the Medicine Meets Virtual Reality 22 - NextMed, 2016

2013
Evaluation of Lauge-Hansen classification for ankle fractures and follow-up management.
Proceedings of the 2013 IEEE International Conference on Bioinformatics and Biomedicine, 2013

2011
Ckmeans.1d.dp: Optimal k-means Clustering in One Dimension by Dynamic Programming.
R J., 2011


  Loading...