Xueke Wang

Orcid: 0000-0003-2734-2249

According to our database1, Xueke Wang authored at least 9 papers between 2016 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
The fuzzy graph model for conflict resolution considering power asymmetry based on social trust network.
Inf. Sci., 2025

2023
Agent manipulator: Stealthy strategy attacks on deep reinforcement learning.
Appl. Intell., May, 2023

2022
GC-LSTM: graph convolution embedded LSTM for dynamic network link prediction.
Appl. Intell., 2022

2021
DeepPoison: Feature Transfer Based Stealthy Poisoning Attack for DNNs.
IEEE Trans. Circuits Syst. II Express Briefs, 2021

DeepPoison: Feature Transfer Based Stealthy Poisoning Attack.
CoRR, 2021

A fast detector generation algorithm for negative selection.
Appl. Intell., 2021

2020
Attention Mechanism Based Adversarial Attack Against Deep Reinforcement Learning.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2020

2019
The Effects of Load Stability and Visual Access During Asymmetric Lifting Tasks on Back and Upper Extremity Biomechanical Responses.
Hum. Factors, 2019

2016
Performance prediction of subspace-based adaptive detectors with signal mismatch.
Signal Process., 2016


  Loading...