Yongwei Wang

Orcid: 0000-0001-9712-8964

According to our database1, Yongwei Wang authored at least 75 papers between 2004 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Topological organization for hybrid rice growth stages Phenotype based on Contrastive clustering.
Expert Syst. Appl., 2025

2024
Auxiliary analysis of digital platform using internet of things technology in physical education teaching.
Educ. Inf. Technol., August, 2024

Occlusion-robust FAU recognition by mining latent space of masked autoencoders.
Neurocomputing, February, 2024

DeMuVGN: Effective Software Defect Prediction Model by Learning Multi-view Software Dependency via Graph Neural Networks.
CoRR, 2024

Training-free LLM-generated Text Detection by Mining Token Probability Sequences.
CoRR, 2024

HyperDet: Generalizable Detection of Synthesized Images by Generating and Merging A Mixture of Hyper LoRAs.
CoRR, 2024

Hyper Adversarial Tuning for Boosting Adversarial Robustness of Pretrained Large Vision Models.
CoRR, 2024

Coding-PTMs: How to Find Optimal Code Pre-trained Models for Code Embedding in Vulnerability Detection?
CoRR, 2024

DocGenome: An Open Large-scale Scientific Document Benchmark for Training and Testing Multi-modal Large Language Models.
CoRR, 2024

CCDM: Continuous Conditional Diffusion Models for Image Generation.
CoRR, 2024

Impart: An Imperceptible and Effective Label-Specific Backdoor Attack.
CoRR, 2024

HGAttack: Transferable Heterogeneous Graph Adversarial Attack.
CoRR, 2024

Certified Robustness on Visual Graph Matching via Searching Optimal Smoothing Range.
Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2024

Active Retrosynthetic Planning Aware of Route Quality.
Proceedings of the Twelfth International Conference on Learning Representations, 2024

Turning Waste into Wealth: Leveraging Low-Quality Samples for Enhancing Continuous Conditional Generative Adversarial Networks.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Optimization and validation of root-cutting device for Chinese cabbage harvester based on discrete element method.
Comput. Electron. Agric., November, 2023

Reversing skin cancer adversarial examples by multiscale diffusive and denoising aggregation mechanism.
Comput. Biol. Medicine, September, 2023

Continuous Conditional Generative Adversarial Networks: Novel Empirical Losses and Label Input Mechanisms.
IEEE Trans. Pattern Anal. Mach. Intell., July, 2023

Developing Comprehensive Local Climate Zone Land Use Datasets for Advanced High-Resolution Urban Climate and Environmental Modeling.
Remote. Sens., June, 2023

Robust detection of headland boundary in paddy fields from continuous RGB-D images using hybrid deep neural networks.
Comput. Electron. Agric., April, 2023

Distilling and transferring knowledge via cGAN-generated samples for image classification and regression.
Expert Syst. Appl., March, 2023

SSD-KD: A self-supervised diverse knowledge distillation method for lightweight skin lesion classification using dermoscopic images.
Medical Image Anal., 2023

Efficient subsampling of realistic images from GANs conditional on a class or a continuous variable.
Neurocomputing, 2023

DUET: A Tuning-Free Device-Cloud Collaborative Parameters Generation Framework for Efficient Device Model Generalization.
Proceedings of the ACM Web Conference 2023, 2023

FedCIO: Efficient Exact Federated Unlearning with Clustering, Isolation, and One-shot Aggregation.
Proceedings of the IEEE International Conference on Big Data, 2023

Revisiting Item Promotion in GNN-Based Collaborative Filtering: A Masked Targeted Topological Attack Perspective.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
Flux-weakening fuzzy adaptive ST-SMO sensorless control algorithm for PMSM in EV.
J. Supercomput., 2022

Video splicing detection and localization based on multi-level deep feature fusion and reinforcement learning.
Multim. Tools Appl., 2022

Towards general object-based video forgery detection via dual-stream networks and depth information embedding.
Multim. Tools Appl., 2022

FCMNet: Frequency-aware cross-modality attention networks for RGB-D salient object detection.
Neurocomputing, 2022

Novel Multiple RIS-Assisted Communications for 6G Networks.
IEEE Commun. Lett., 2022

MetaNetwork: A Task-agnostic Network Parameters Generation Framework for Improving Device Model Generalization.
CoRR, 2022

Fight Fire With Fire: Reversing Skin Adversarial Examples by Multiscale Diffusive and Denoising Aggregation Mechanism.
CoRR, 2022

SSD-KD: A Self-supervised Diverse Knowledge Distillation Method for Lightweight Skin Lesion Classification Using Dermoscopic Images.
CoRR, 2022

Simulation and parameter optimisation of pickup device for full-feed peanut combine harvester.
Comput. Electron. Agric., 2022

The commuting graph of the cyclic extension of an abelian group.
Appl. Math. Comput., 2022

Reconfigurable Intelligent Surface for NLOS Integrated Sensing and Communications.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2022

2021
Urban Thermal Characteristics of Local Climate Zones and Their Mitigation Measures across Cities in Different Climate Zones of China.
Remote. Sens., 2021

Perception matters: Exploring imperceptible and transferable anti-forensics for GAN-generated fake face imagery detection.
Pattern Recognit. Lett., 2021

Reliability Enhancement Algorithm of Human Motion Recognition Based on Knowledge Graph.
Int. J. Distributed Syst. Technol., 2021

Efficient Subsampling for Generating High-Quality Images from Conditional Generative Adversarial Networks.
CoRR, 2021

Discrimination of wood-boring beetles infested <i>Platycladus orientalis</i> plants by using gas chromatography-ion mobility spectrometry.
Comput. Electron. Agric., 2021

Optimizing the working performance of a pollination machine for hybrid rice.
Comput. Electron. Agric., 2021

Optimizing the working performance of a boat-type tractor using central composite rotatable design and response surface method.
Comput. Electron. Agric., 2021

Delving into Deep Image Prior for Adversarial Defense: A Novel Reconstruction-based Defense Framework.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021

Object-Based Video Forgery Detection via Dual-Stream Networks.
Proceedings of the 2021 IEEE International Conference on Multimedia and Expo, 2021

CcGAN: Continuous Conditional Generative Adversarial Networks for Image Generation.
Proceedings of the 9th International Conference on Learning Representations, 2021

Towards Universal Physical Attacks on Single Object Tracking.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
Perception Improvement for Free: Exploring Imperceptible Black-box Adversarial Attacks on Image Classification.
CoRR, 2020

Perception Matters: Exploring Imperceptible and Transferable Anti-forensics for GAN-generated Fake Face Imagery Detection.
CoRR, 2020

Evaluation of trunk borer infestation duration using MOS E-nose combined with different feature extraction methods and GS-SVM.
Comput. Electron. Agric., 2020

2019
Coarse-to-Fine Image DeHashing Using Deep Pyramidal Residual Learning.
IEEE Signal Process. Lett., 2019

A Deep Learning Based Attack for The Chaos-based Image Encryption.
CoRR, 2019

2018
RevHashNet: Perceptually de-hashing real-valued image hashes for similarity retrieval.
Signal Process. Image Commun., 2018

Sparsity-Based Image Inpainting Detection via Canonical Correlation Analysis With Low-Rank Constraints.
IEEE Access, 2018

Image Inpainting Detection Based on a Modified Formulation of Canonical Correlation Analysis.
Proceedings of the 20th IEEE International Workshop on Multimedia Signal Processing, 2018

2017
Quantitative Method for Network Security Situation Based on Attack Prediction.
Secur. Commun. Networks, 2017

2015
基于本体的网络安全态势要素知识库模型研究 (Research on Network Security Situational Elements Knowledge Base Model Based on Ontology).
计算机科学, 2015

2013
Multi-source Data Fusion Approach Based on Improved Evidence Theory.
J. Comput., 2013

A Novel Rule Matching Algorithm Based on Improved Twig Pattern.
Proceedings of the 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2013

2012
Grid-based partitioning for large-scale distributed agent-based crowd simulation.
Proceedings of the Winter Simulation Conference, 2012

2011
An analytical model for SOI triple RESURF devices.
Proceedings of the 2011 IEEE 9th International Conference on ASIC, 2011

2009
Identification of Tea Storage Times by Linear Discrimination Analysis and Back-Propagation Neural Network Techniques Based on the Eigenvalues of Principal Components Analysis of E-Nose Sensor Signals.
Sensors, 2009

A light-weight scalable truthful routing protocol in MANETs with selfish nodes.
Int. J. Ad Hoc Ubiquitous Comput., 2009

Cluster based Partitioning for Agent-based Crowd Simulations.
Proceedings of the 2009 Winter Simulation Conference, 2009

A framework of evaluating partitioning mechanisms for agent-based simulation systems.
Proceedings of the 2009 Spring Simulation Multiconference, SpringSim 2009, 2009

2008
Agent-based human behavior modeling for crowd simulation.
Comput. Animat. Virtual Worlds, 2008

Truthful multipath routing for ad hoc networks with selfish nodes.
J. Parallel Distributed Comput., 2008

2007
On improving the efficiency of truthful routing in MANETs with selfish nodes.
Pervasive Mob. Comput., 2007

On supporting high-throughput routing metrics in on-demand routing protocols for multi-hop wireless networks.
J. Parallel Distributed Comput., 2007

A Truthful Geographic Forwarding Algorithm for Ad-hoc Networks with Selfish Nodes.
Int. J. Netw. Secur., 2007

A Secure Position-Based Protocol Framework for Multi-hop Ad-Hoc Networks.
Proceedings of the Third IEEE International Conference on Wireless and Mobile Computing, 2007

2006
LSTOP: A Light-Weight Scalable Truthful Routing Protocol in MANETs with Selfish Nodes.
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks, 5th International Conference, 2006

2005
A light-weight solution for selfish nodes problem considering battery status in wireless ad-hoc networks.
Proceedings of the 2005 IEEE International Conference on Wireless And Mobile Computing, 2005

2004
A Fair Distributed Solution for Selfish Nodes Problem in Wireless Ad Hoc Networks.
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks: Third International Conference, 2004


  Loading...