default search action
Yajie Wang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j52]Yajie Wang, Yu Fu:
Identification of circRNA-miRNA-mRNA networks to explore underlying mechanism in lung cancer. Health Inf. Sci. Syst. 13(1): 5 (2025) - [j51]Wenxu Zhang, Yajie Wang, Xiuming Zhou, Zhongkai Zhao, Feiran Liu:
An interference power allocation method against multi-objective radars based on optimized proximal policy optimization. Signal Process. 230: 109785 (2025) - 2024
- [j50]Yishu Xu, Zhenshu Ma, Yajie Wang, Long Zhang, Jiaming Ye, Yuan Chen, Zhengrong Yuan:
CuPCA: a web server for pan-cancer association analysis of large-scale cuproptosis-related genes. Database J. Biol. Databases Curation 2024 (2024) - [j49]Wenya Hao, Haiyan Guan, Yajie Wang:
Line-Transitive Point-Imprimitive Linear Spaces with Fang-Li Parameter gcd$(k,r)$ at most $12$. Electron. J. Comb. 31(2) (2024) - [j48]Haoran Lyu, Yajie Wang, Yu-An Tan, Huipeng Zhou, Yuhang Zhao, Quanxin Zhang:
Maxwell's Demon in MLP-Mixer: towards transferable adversarial attacks. Cybersecur. 7(1): 6 (2024) - [j47]Yajie Wang, Zhihao Wei, Shengyu Han, Zhonghui Shi:
Research on improving Mahjong model based on deep reinforcement learning. Int. J. Comput. Sci. Math. 19(1): 83-92 (2024) - [j46]Zijie Pan, Zuobin Ying, Yajie Wang, Chuan Zhang, Chunhai Li, Liehuang Zhu:
One-Shot Backdoor Removal for Federated Learning. IEEE Internet Things J. 11(23): 37718-37730 (2024) - [j45]Yajie Wang, Shaolin Liang:
A Fast Scenario Transfer Approach for Portrait Styles Through Collaborative Awareness of Convolutional Neural Network and Generative Adversarial Learning. J. Circuits Syst. Comput. 33(7): 2450121:1-2450121:19 (2024) - [j44]Huipeng Zhou, Yajie Wang, Yu-an Tan, Shangbo Wu, Yuhang Zhao, Quanxin Zhang, Yuanzhang Li:
Crafting Transferable Adversarial Examples Against Face Recognition via Gradient Eroding. IEEE Trans. Artif. Intell. 5(1): 412-419 (2024) - [j43]Wenxu Zhang, Tong Zhao, Zhongkai Zhao, Yajie Wang, Feiran Liu:
An Intelligent Strategy Decision Method for Collaborative Jamming Based on Hierarchical Multi-Agent Reinforcement Learning. IEEE Trans. Cogn. Commun. Netw. 10(4): 1467-1480 (2024) - [j42]Yajie Wang, Yi Wu, Shangbo Wu, Ximeng Liu, Wanlei Zhou, Liehuang Zhu, Chuan Zhang:
Boosting the Transferability of Adversarial Attacks With Frequency-Aware Perturbation. IEEE Trans. Inf. Forensics Secur. 19: 6293-6304 (2024) - [j41]Qi Chen, Yajie Wang, Yunfei Sun:
An improved dung beetle optimizer for UAV 3D path planning. J. Supercomput. 80(18): 26537-26567 (2024) - [j40]Yajie Wang, Mulin Chen, Xuelong Li:
Continuous Emotion-Based Image-to-Music Generation. IEEE Trans. Multim. 26: 5670-5679 (2024) - [j39]Haoran Wang, Yajie Wang, Baosheng Yu, Yibing Zhan, Chunfeng Yuan, Wankou Yang:
Attentional Composition Networks for Long-Tailed Human Action Recognition. ACM Trans. Multim. Comput. Commun. Appl. 20(1): 8:1-8:18 (2024) - [c32]Shangbo Wu, Yu-an Tan, Yajie Wang, Ruinan Ma, Wencong Ma, Yuanzhang Li:
Towards Transferable Adversarial Attacks with Centralized Perturbation. AAAI 2024: 6109-6116 - [c31]Bo Zou, Shaofeng Wang, Hao Liu, Gaoyue Sun, Yajie Wang, Feifei Zuo, Chengbin Quan, Youjian Zhao:
Teeth-SEG: An Efficient Instance Segmentation Framework for Orthodontic Treatment Based on Multi-Scale Aggregation and Anthropic Prior Knowledge. CVPR 2024: 11601-11610 - [c30]Cheng Peng, Yajie Wang:
Research on Solving the Problem of Children's Doctor-Patient Relationship from the Perspective of System Theory - The Example of Children's Medical IP "Courageous Planet". HCI (37) 2024: 334-348 - [i13]Bo Zou, Shaofeng Wang, Hao Liu, Gaoyue Sun, Yajie Wang, Feifei Zuo, Chengbin Quan, Youjian Zhao:
Teeth-SEG: An Efficient Instance Segmentation Framework for Orthodontic Treatment based on Anthropic Prior Knowledge. CoRR abs/2404.01013 (2024) - 2023
- [j38]Honghan Bei, Qian Wang, Yajie Wang, Wenyang Wang, Roberto Murcio:
Optimal Reinsurance-Investment Strategy Based on Stochastic Volatility and the Stochastic Interest Rate Model. Axioms 12(8): 736 (2023) - [j37]Yajie Wang, Shengyu Han, Zhihao Wei, Zhonghui Shi:
An integration model for Texas Hold'em. Int. J. Comput. Sci. Math. 18(3): 203-213 (2023) - [j36]Yajie Wang, Xiaomei Zhang, Haomin Hu:
Continuous User Authentication on Multiple Smart Devices. Inf. 14(5): 274 (2023) - [j35]Yucheng Long, Zuobin Ying, Hongyang Yan, Ranqing Fang, Xingyu Li, Yajie Wang, Zijie Pan:
Membership reconstruction attack in deep neural networks. Inf. Sci. 634: 27-41 (2023) - [j34]Yajie Wang, Alesia A. Zuccala, Haiyan Hou, Zhigang Hu:
Corrigendum to ['To tweet or not to tweet?' A study of the use of Twitter by scholarly book publishers in Social Sciences and Humanities', Journal of Informetrics, Volume15, (2021) 1-14/Article101170]. J. Informetrics 17(2): 101351 (2023) - [j33]Wenxu Zhang, Yajie Wang, Zhongkai Zhao, Tong Zhao, Manjun Lu:
An Online Jamming Effect Evaluation Method for Asymmetric Radar Information in Complex Electromagnetic Environment. IEEE Geosci. Remote. Sens. Lett. 20: 1-5 (2023) - [j32]Yajie Wang, Kongyang Chen, Yu-an Tan, Shuxin Huang, Wencong Ma, Yuanzhang Li:
Stealthy and Flexible Trojan in Deep Learning Framework. IEEE Trans. Dependable Secur. Comput. 20(3): 1789-1798 (2023) - [j31]Hongyang Yan, Shuhao Li, Yajie Wang, Yaoyuan Zhang, Kashif Sharif, Haibo Hu, Yuanzhang Li:
Membership Inference Attacks Against Deep Learning Models via Logits Distribution. IEEE Trans. Dependable Secur. Comput. 20(5): 3799-3808 (2023) - [j30]Yajie Wang, Yu-an Tan, Thar Baker, Neeraj Kumar, Quanxin Zhang:
Deep Fusion: Crafting Transferable Adversarial Examples and Improving Robustness of Industrial Artificial Intelligence of Things. IEEE Trans. Ind. Informatics 19(6): 7480-7488 (2023) - [c29]Ang Zeng, Xusen Cheng, Yajie Wang:
Exploring the Factors and Influence Mechanisms of User Loyalty for Generative AI. DSC 2023: 397-400 - [i12]Xinrui Liu, Yu-an Tan, Yajie Wang, Kefan Qiu, Yuanzhang Li:
Stealthy Low-frequency Backdoor Attack against Deep Neural Networks. CoRR abs/2305.09677 (2023) - [i11]Xinrui Liu, Yajie Wang, Yu-An Tan, Kefan Qiu, Yuanzhang Li:
Towards Invisible Backdoor Attacks in the Frequency Domain against Deep Neural Networks. CoRR abs/2305.10596 (2023) - [i10]Ruinan Ma, Yu-an Tan, Shangbo Wu, Tian Chen, Yajie Wang, Yuanzhang Li:
Unified High-binding Watermark for Unconditional Image Generation Models. CoRR abs/2310.09479 (2023) - [i9]Shangbo Wu, Yu-an Tan, Yajie Wang, Ruinan Ma, Wencong Ma, Yuanzhang Li:
Towards Transferable Adversarial Attacks with Centralized Perturbation. CoRR abs/2312.06199 (2023) - 2022
- [j29]Yajie Wang, Jiaxin Shen, Shenglin Zhou:
Alternating groups and flag-transitive non-symmetric 2-(v, k, λ) designs with λ ≥ (r, λ)2. Discret. Math. 345(2): 112703 (2022) - [j28]Xiaoqin Zhan, Xuan Pang, Yajie Wang:
Block-Transitive 3-Designs with Block Size At Most 6. Graphs Comb. 38(5): 145 (2022) - [j27]Xiao Yu, Liu Cong, Mingwen Zheng, Yajie Wang, Xinrui Liu, Song Shuxiao, Ma Yuexuan, Zheng Jun:
A multitarget backdooring attack on deep neural networks with random location trigger. Int. J. Intell. Syst. 37(3): 2567-2583 (2022) - [j26]Yajie Wang, Yu-an Tan, Haoran Lyu, Shangbo Wu, Yuhang Zhao, Yuanzhang Li:
Toward feature space adversarial attack in the frequency domain. Int. J. Intell. Syst. 37(12): 11019-11036 (2022) - [j25]Xiao Yu, Xiangxiang Jiang, Zhizhuo Sun, Liu Cong, Yajie Wang:
A smart file-level continuous data protection scheme based on security baseline. Int. J. Intell. Syst. 37(12): 11101-11116 (2022) - [j24]Dianxi Shi, Chenran Zhao, Yajie Wang, Huanhuan Yang, Gongju Wang, Hao Jiang, Chao Xue, Shaowu Yang, Yongjun Zhang:
Multi actor hierarchical attention critic with RNN-based feature extraction. Neurocomputing 471: 79-93 (2022) - [j23]Yajie Wang, Kai Liang, Jilin Qiao, Yanyan Xie:
The application of improved UCT combined with neural network in Tibetan JIU chess. Int. J. Wirel. Mob. Comput. 23(1): 22-32 (2022) - [j22]Xiao Yu, Bing Xia, Shuxin Yang, Hongshen Yin, Yajie Wang, Xiaowen Liu:
A Deep Domain-Adversarial Transfer Fault Diagnosis Method for Rolling Bearing Based on Ensemble Empirical Mode Decomposition. J. Sensors 2022: 1-18 (2022) - [j21]Xiaomei Zhang, Pengming Zhang, Xin Zeng, Yajie Wang, Chi-Hung Chi:
sAuth: a hierarchical implicit authentication mechanism for service robots. J. Supercomput. 78(14): 16029-16055 (2022) - [c28]Yidan Xu, Juan Wang, Yuanzhang Li, Yajie Wang, Zixuan Xu, Dianxin Wang:
Universal Physical Adversarial Attack via Background Image. ACNS Workshops 2022: 3-14 - [c27]Miao Hao, Yajie Wang, Wei Huang, Minghui Wang, Hong Yang:
Food Safety Risk Assessment Method Based on SVM Optimization Model. ICMSSP 2022: 52-56 - [c26]Yajie Wang, Yanyan Xie, Yanyan Wu, Kai Liang, Jilin Qiao:
An Unsupervised Multi-scale Generative Adversarial Network for Remote Sensing Image Pan-Sharpening. MMM (2) 2022: 356-368 - [c25]Yajie Wang, Zhonghui Shi, Shengyu Han, Zhihao Wei:
Hyperspectral Image Classification Based on Transformer and Generative Adversarial Network. PRICAI (3) 2022: 212-225 - [i8]Haoran Lyu, Yajie Wang, Yu-an Tan, Huipeng Zhou, Yuhang Zhao, Quanxin Zhang:
Boosting Adversarial Transferability of MLP-Mixer. CoRR abs/2204.12204 (2022) - [i7]Huipeng Zhou, Yu-an Tan, Yajie Wang, Haoran Lyu, Shangbo Wu, Yuanzhang Li:
Improving the Transferability of Adversarial Examples with Restructure Embedded Patches. CoRR abs/2204.12680 (2022) - [i6]Shuhao Li, Yajie Wang, Yuanzhang Li, Yu-an Tan:
l-Leaks: Membership Inference Attacks with Logits. CoRR abs/2205.06469 (2022) - [i5]Nan Luo, Yuanzhang Li, Yajie Wang, Shangbo Wu, Yu-An Tan, Quanxin Zhang:
Enhancing Clean Label Backdoor Attack with Two-phase Specific Triggers. CoRR abs/2206.04881 (2022) - [i4]Yinpeng Dong, Peng Chen, Senyou Deng, Lianji L, Yi Sun, Hanyu Zhao, Jiaxing Li, Yunteng Tan, Xinyu Liu, Yangyi Dong, Enhui Xu, Jincai Xu, Shu Xu, Xuelin Fu, Changfeng Sun, Haoliang Han, Xuchong Zhang, Shen Chen, Zhimin Sun, Junyi Cao, Taiping Yao, Shouhong Ding, Yu Wu, Jian Lin, Tianpeng Wu, Ye Wang, Yu Fu, Lin Feng, Kangkang Gao, Zeyu Liu, Yuanzhe Pang, Chengqi Duan, Huipeng Zhou, Yajie Wang, Yuhang Zhao, Shangbo Wu, Haoran Lyu, Zhiyu Lin, Yifei Gao, Shuang Li, Haonan Wang, Jitao Sang, Chen Ma, Junhao Zheng, Yijia Li, Chao Shen, Chenhao Lin, Zhichao Cui, Guoshuai Liu, Huafeng Shi, Kun Hu, Mengxin Zhang:
Artificial Intelligence Security Competition (AISC). CoRR abs/2212.03412 (2022) - [i3]Yujia Lin, Liming Chen, Aftab Ali, Christopher Nugent, Ian Cleland, Rongyang Li, Dazhi Gao, Hang Wang, Yajie Wang, Huansheng Ning:
Human Digital Twin: A Survey. CoRR abs/2212.05937 (2022) - 2021
- [j20]Hao Jiang, Dianxi Shi, Chao Xue, Yajie Wang, Gongju Wang, Yongjun Zhang:
Multi-agent deep reinforcement learning with type-based hierarchical group communication. Appl. Intell. 51(8): 5793-5808 (2021) - [j19]Yajie Wang, Haoran Lv, Xiaohui Kuang, Gang Zhao, Yu-an Tan, Quanxin Zhang, Jingjing Hu:
Towards a physical-world adversarial patch for blinding object detection models. Inf. Sci. 556: 459-471 (2021) - [j18]Yajie Wang, Haiyan Hou, Zhigang Hu:
'To tweet or not to tweet?' A study of the use of Twitter by scholarly book publishers in Social Sciences and Humanities. J. Informetrics 15(3): 101170 (2021) - [j17]Yajie Wang, Alesia A. Zuccala:
Scholarly book publishers as publicity agents for SSH titles on Twitter. Scientometrics 126(6): 4817-4840 (2021) - [c24]Yajie Wang, Nan Zhang, Zhenhua Duan:
Design and Implementation of List and Dictionary in XD-M Language. AAIM 2021: 344-355 - [c23]Yajie Wang, Shangbo Wu, Wenyi Jiang, Shengang Hao, Yu-an Tan, Quanxin Zhang:
Demiguise Attack: Crafting Invisible Semantic Adversarial Perturbations with Perceptual Similarity. IJCAI 2021: 3125-3133 - [c22]Yajie Wang, Jinli Ma, Zhao Pei, Jun Li:
Human Trajectory Prediction Using Stacked Temporal Convolutional Network. TrustCom 2021: 1270-1274 - [c21]Yajie Wang, Zhiyang Wan, Zhao Pei, Chengcai Leng, Yuli Chen:
GEA-net: Global embedded attention neural network for image classification. TrustCom 2021: 1300-1305 - [i2]Yajie Wang, Shangbo Wu, Wenyi Jiang, Shengang Hao, Yu-an Tan, Quanxin Zhang:
Demiguise Attack: Crafting Invisible Semantic Adversarial Perturbations with Perceptual Similarity. CoRR abs/2107.01396 (2021) - [i1]Yuefeng Chen, Xiaofeng Mao, Yuan He, Hui Xue, Chao Li, Yinpeng Dong, Qi-An Fu, Xiao Yang, Wenzhao Xiang, Tianyu Pang, Hang Su, Jun Zhu, Fangcheng Liu, Chao Zhang, Hongyang Zhang, Yichi Zhang, Shilong Liu, Chang Liu, Wenzhao Xiang, Yajie Wang, Huipeng Zhou, Haoran Lyu, Yidan Xu, Zixuan Xu, Taoyu Zhu, Wenjun Li, Xianfeng Gao, Guoqiu Wang, Huanqian Yan, Ying Guo, Chaoning Zhang, Zheng Fang, Yang Wang, Bingyang Fu, Yunfei Zheng, Yekui Wang, Haorong Luo, Zhen Yang:
Unrestricted Adversarial Attacks on ImageNet Competition. CoRR abs/2110.09903 (2021) - 2020
- [j16]Quanxin Zhang, Yuhang Zhao, Yajie Wang, Thar Baker, Jian Zhang, Jingjing Hu:
Towards cross-task universal perturbation against black-box object detectors in autonomous driving. Comput. Networks 180: 107388 (2020) - [j15]Yajie Wang, Shenglin Zhou:
Flag-transitive 2-(v, k, λ) symmetric designs with λ≥(k, λ)2 and alternating socle. Discret. Math. 343(9): 111973 (2020) - [j14]Yajie Wang, Yu-an Tan, Wenjiao Zhang, Yuhang Zhao, Xiaohui Kuang:
An adversarial attack on DNN-based black-box object detectors. J. Netw. Comput. Appl. 161: 102634 (2020) - [c20]Ying Wang, Yajie Wang, Haiyan Xie:
Fault Diagnosis for Ballast Water System Operation on Ships based on SVM. CACRE 2020: 453-457 - [c19]Gongju Wang, Dianxi Shi, Chao Xue, Hao Jiang, Yajie Wang:
BiC-DDPG: Bidirectionally-Coordinated Nets for Deep Multi-agent Reinforcement Learning. CollaborateCom (2) 2020: 337-354 - [c18]Yajie Wang, Dianxi Shi, Chao Xue, Hao Jiang, Gongju Wang, Peng Gong:
AHAC: Actor Hierarchical Attention Critic for Multi-Agent Reinforcement Learning. SMC 2020: 3013-3020 - [c17]Hao Jiang, Dianxi Shi, Chao Xue, Yajie Wang, Gongju Wang, Yongjun Zhang:
GHGC: Goal-based Hierarchical Group Communication in Multi-Agent Reinforcement Learning. SMC 2020: 3507-3514 - [c16]Hao Jiang, Dianxi Shi, Chao Xue, Yajie Wang, Gongju Wang, Yongjun Zhang:
Friend-or-Foe Deep Deterministic Policy Gradient. SMC 2020: 3523-3530
2010 – 2019
- 2019
- [j13]Yajie Wang, Huan Yu, Feng Shi:
Research on the security of information system authentication scheme based on the fuzzy number intuitionistic fuzzy information. J. Intell. Fuzzy Syst. 37(2): 1629-1637 (2019) - [j12]Guanghui Zhu, Ya Wang, Yajie Wang:
Model Identification of Unobservable Behavior of Discrete Event Systems Using Petri Nets. J. Control. Sci. Eng. 2019: 2895685:1-2895685:11 (2019) - [j11]Zheng Wang, Kai Chen, Mingxing Zhang, Peilin He, Yajie Wang, Ping Zhu, Yang Yang:
Multi-scale aggregation network for temporal action proposals. Pattern Recognit. Lett. 122: 60-65 (2019) - [c15]Yajie Wang, Nianxiong Tan:
An Application-Specific Microprocessor for Energy Metering Based on RISC-V. ICICDT 2019: 1-4 - [c14]Yajie Wang, Alesia A. Zuccala:
Scholarly Book Publishers and their Promotional Activity on Twitter. ISSI 2019: 1178-1183 - 2018
- [j10]Yajie Wang, Ximin Rong, Hui Zhao:
Optimal investment strategies for an insurer and a reinsurer with a jump diffusion risk process under the CEV model. J. Comput. Appl. Math. 328: 414-431 (2018) - [j9]Song Zhao, Yajie Wang, Hongyuan Xu, Chengzhi Feng, Wenfeng Feng:
Early cross-modal interactions underlie the audiovisual bounce-inducing effect. NeuroImage 174: 208-218 (2018) - [c13]Yajie Wang, Xing Fang, Ying Luo:
Design Research on Customized Online Education Platform Catering to Business Demands. HCI (30) 2018: 124-130 - [c12]Ying Luo, Yajie Wang, Younghwan Pan:
An Analytical Investigation on Ecological Strategy Based on "Edu+AR" Education Cloud Platform. HCI (25) 2018: 308-318 - 2017
- [j8]Guoqiang Liang, Haiyan Hou, Zhigang Hu, Fu Huang, Yajie Wang, Shanshan Zhang:
Usage Count: A New Indicator to Detect Research Fronts. J. Data Inf. Sci. 2(1): 89-104 (2017) - [j7]Yajie Wang, Dengsheng Lu:
Mapping Torreya grandis Spatial Distribution Using High Spatial Resolution Satellite Imagery with the Expert Rules-Based Approach. Remote. Sens. 9(6): 564 (2017) - [c11]Yajie Wang, Yangshuo Zheng, Xing Fang:
Research on Information Architecture Design of Online Creative Space. HCI (4) 2017: 539-550 - [c10]Qixuan Xue, Yongxin Zhu, Yajie Wang, Kedun Mao, Han Wu, Mengjun Li, Yishu Mao, Junjie Hou:
A Scheduling Scheme of Task Allocation in Real Time Multiple-Partition Embedded Avionic. SmartCloud 2017: 41-46 - 2015
- [j6]Shenglin Zhou, Yajie Wang:
Flag-transitive Non-symmetric 2-designs with $(r, \lambda)=1$ and Alternating Socle. Electron. J. Comb. 22(2): 2 (2015) - [c9]Weiyuan Zhang, Yajie Wang:
Passivity Analysis of BAM NNs with Mixed Time Delays. ICIC (3) 2015: 127-135 - [c8]Yajie Wang, Weiyuan Zhang:
A Brief Survey on Fuzzy Cognitive Maps Research. ICIC (3) 2015: 159-166 - [c7]Xueshi Dong, Wenyong Dong, Yunfei Yi, Yajie Wang, Xiaosong Xu:
The Recent Developments and Comparative Analysis of Neural Network and Evolutionary Algorithms for Solving Symbolic Regression. ICIC (1) 2015: 703-714 - [c6]Yanyan Wu, Yajie Wang, Linlin Wang, Xiangbin Shi:
A Novel NSCT Fusion Algorithm for Images Based on Compressive Sensing and Dynamic WNMF. ICIG (1) 2015: 361-372 - 2013
- [j5]Yajie Wang, Hui Li, Zhufeng Yu:
Study on Default Risk Based on LT Model: Evidence from Chinese List Companies. Int. J. Online Biomed. Eng. 9(S4): 10-14 (2013) - [c5]Jian Li, Yajie Wang, Jun Wu, Fengmei Yang:
Application of User-Based Collaborative Filtering Recommendation Technology on Logistics Platform. BIFE 2013: 135-138 - [c4]Yajie Wang, Yanyan Wu, Xiangbin Shi, Yongsheng Ye:
The Color Fusion of Infrared and Visual Images Based on NSCT. ICIG 2013: 597-602 - 2012
- [j4]Yan Liu, Heng-Da Cheng, Jianhua Huang, Yingtao Zhang, Xianglong Tang, Jin-Wen Tian, Yajie Wang:
Computer Aided Diagnosis System for Breast Cancer Based on Color Doppler Flow Imaging. J. Medical Syst. 36(6): 3975-3982 (2012) - [j3]Daichi Shigemizu, Zhenjun Hu, Jui-Hung Hung, Chia-Ling Huang, Yajie Wang, Charles DeLisi:
Using Functional Signatures to Identify Repositioned Drugs for Breast, Myelogenous Leukemia and Prostate Cancer. PLoS Comput. Biol. 8(2) (2012) - [c3]Yuxia Sun, Yajie Wang, Fei Li:
Pattern matching and Monte-Carlo simulation mechanism for the game of NoGo. CCIS 2012: 61-64 - 2011
- [j2]Yonghong Hao, Yajie Wang, Jiaojuan Zhao, Huamin Li:
Grey system model with time lag and application to simulation of karst spring discharge. Grey Syst. Theory Appl. 1(1): 47-56 (2011) - 2010
- [c2]Cheng Liu, Yajie Wang, Mowu Lu, Xiaoyan Wang:
A Kind of Webpage Styled PowerPoint Courseware Quiz Developed by VBA for Computer Courses. DBTA 2010: 1-3 - [c1]Xiufeng Zuo, Yajie Wang, Qian Ran, Rui Cui:
Emergency repositories network layout model and calculation. ICNC 2010: 2754-2758
2000 – 2009
- 2009
- [j1]Yajie Wang, Xiaofeng Hui, Yan Liu:
The dynamic relationship between spot and futures prices of the soybean futures market in China. Int. J. Netw. Virtual Organisations 6(4): 379-388 (2009)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:02 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint