Xueke Wang

Orcid: 0000-0003-2734-2249

According to our database1, Xueke Wang authored at least 10 papers between 2016 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

2016
2017
2018
2019
2020
2021
2022
2023
2024
2025
0
1
2
3
4
2
1
1
3
1
1
1

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
A fair multi-party contract signing scheme based on off-chain protocols and on-chain smart contracts.
J. Supercomput., January, 2025

The fuzzy graph model for conflict resolution considering power asymmetry based on social trust network.
Inf. Sci., 2025

2023
Agent manipulator: Stealthy strategy attacks on deep reinforcement learning.
Appl. Intell., May, 2023

2022
GC-LSTM: graph convolution embedded LSTM for dynamic network link prediction.
Appl. Intell., 2022

2021
DeepPoison: Feature Transfer Based Stealthy Poisoning Attack for DNNs.
IEEE Trans. Circuits Syst. II Express Briefs, 2021

DeepPoison: Feature Transfer Based Stealthy Poisoning Attack.
CoRR, 2021

A fast detector generation algorithm for negative selection.
Appl. Intell., 2021

2020
Attention Mechanism Based Adversarial Attack Against Deep Reinforcement Learning.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2020

2019
The Effects of Load Stability and Visual Access During Asymmetric Lifting Tasks on Back and Upper Extremity Biomechanical Responses.
Hum. Factors, 2019

2016
Performance prediction of subspace-based adaptive detectors with signal mismatch.
Signal Process., 2016


  Loading...