default search action
Libin Wang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j37]Libin Wang, Lixia Liu:
Some bivariate options pricing in a regime-switching stochastic volatility jump-diffusion model with stochastic intensity, stochastic interest and dependent jump. Math. Comput. Simul. 229: 468-490 (2025) - 2024
- [j36]Longlong Chen, Yulong Wang, Youheng Liu, Yutao Hu, Libin Wang, Huiwu Luo, Yuan Yan Tang:
Double graphs regularized multi-view subspace clustering. Int. J. Wavelets Multiresolution Inf. Process. 22(1): 2350032:1-2350032:21 (2024) - [j35]Youheng Liu, Yulong Wang, Longlong Chen, Libin Wang, Yutao Hu:
TIHN: Tensor Improved Huber Norm for low-rank tensor recovery. Int. J. Wavelets Multiresolution Inf. Process. 22(5): 2450023:1-2450023:22 (2024) - [j34]Libin Wang, Raymond Chi-Wing Wong:
PCSP: Efficiently Answering Label-Constrained Shortest Path Queries in Road Networks. Proc. VLDB Endow. 17(11): 3082-3094 (2024) - [j33]Libin Wang, Zhuo Lin Teh:
Exact boundary controllability of nodal profile for the system of one-dimensional adiabatic flow. Syst. Control. Lett. 184: 105718 (2024) - [j32]Qisen Shang, Han Hu, Haojia Yu, Bo Xu, Libin Wang, Qing Zhu:
Semantic Image Translation for Repairing the Texture Defects of Building Models. IEEE Trans. Geosci. Remote. Sens. 62: 1-20 (2024) - [j31]Libin Wang, Han Hu, Qisen Shang, Haowei Zeng, Qing Zhu:
StructuredMesh: 3-D Structured Optimization of Façade Components on Photogrammetric Mesh Models Using Binary Integer Programming. IEEE Trans. Geosci. Remote. Sens. 62: 1-12 (2024) - [c20]Libin Wang, Raymond Chi-Wing Wong, Christian S. Jensen:
Congestion-Mitigating Spatiotemporal Routing in Road Networks. ICDE 2024: 4586-4599 - 2023
- [j30]Zijian Ye, Ying Ye, Chengping Zhang, Zhiming Zhang, Wei Li, Xuejie Wang, Lei Wang, Libin Wang:
A digital twin approach for tunnel construction safety early warning and management. Comput. Ind. 144: 103783 (2023) - [j29]Libin Wang, Raymond Chi-Wing Wong:
QHL: A Fast Algorithm for Exact Constrained Shortest Path Search on Road Networks. Proc. ACM Manag. Data 1(2): 155:1-155:25 (2023) - [j28]Libin Wang, Yulong Wang, Hao Deng, Hong Chen:
Attention reweighted sparse subspace clustering. Pattern Recognit. 139: 109438 (2023) - [j27]Ke Wang, Libin Wang:
Exact Boundary Controllability of Nodal Profile for Quasilinear Hyperbolic Systems and Its Asymptotic Stability. SIAM J. Control. Optim. 61(1): 1-21 (2023) - [j26]Jianchen Guo, Mingmin Ding, Libin Wang, Yangjie Ruan, Bin Luo:
Study on the Nonlinear Stability and Parametric Analysis of a Tensile-Beam Cable Dome. Symmetry 15(9): 1690 (2023) - [j25]Libin Wang, Peter Xiaoping Liu, Huanqing Wang:
Fast Finite-Time Control for Nonaffine Stochastic Nonlinear Systems Against Multiple Actuator Constraints via Output Feedback. IEEE Trans. Cybern. 53(5): 3253-3262 (2023) - [j24]Changsheng Liu, Shuxu Liu, Zhuowei Li, Libin Wang, Shaoyou Kan, Jie Liang:
Research on Ground-Airborne Frequency-Domain Electromagnetic Rapid Imaging Method Based on Space Magnetic Gradient Anomaly. IEEE Trans. Geosci. Remote. Sens. 61: 1-10 (2023) - [c19]Libin Wang, Raymond Chi-Wing Wong:
Efficient Public Transport Planning on Roads. ICDE 2023: 2443-2455 - [i9]Qisen Shang, Han Hu, Haojia Yu, Bo Xu, Libin Wang, Qing Zhu:
Semantic Image Translation for Repairing the Texture Defects of Building Models. CoRR abs/2303.17418 (2023) - [i8]Libin Wang, Han Hu, Qisen Shang, Bo Xu, Qing Zhu:
StructuredMesh: 3D Structured Optimization of Façade Components on Photogrammetric Mesh Models using Binary Integer Programming. CoRR abs/2306.04184 (2023) - 2022
- [j23]Libin Wang, Huanqing Wang, Peter Xiaoping Liu, Song Ling, Siwen Liu:
Fuzzy Finite-Time Command Filtering Output Feedback Control of Nonlinear Systems. IEEE Trans. Fuzzy Syst. 30(1): 97-107 (2022) - [j22]Libin Wang, Huanqing Wang, Peter Xiaoping Liu:
Finite-Time Compensation Control for State-Variable-Unmeasurable Nonlinear Systems With Sensor and Actuator Faults. IEEE Trans. Instrum. Meas. 71: 1-8 (2022) - [i7]Libin Wang, Yulong Wang, Shiyuan Wang, Youheng Liu, Yutao Hu, Longlong Chen, Hong Chen:
Global Weighted Tensor Nuclear Norm for Tensor Robust Principal Component Analysis. CoRR abs/2209.14084 (2022) - [i6]Longlong Chen, Yulong Wang, Youheng Liu, Yutao Hu, Libin Wang:
Double Graphs Regularized Multi-view Subspace Clustering. CoRR abs/2209.15143 (2022) - 2021
- [j21]Xiaodong Du, Libin Wang, Siming Zeng, Jianli Zhao, Ze Chen, Xi Han, Zhixin Liu:
Optimized Power Control in Internet of Vehicles Based on Serial Interference Cancellation and User Matching. IEEE Access 9: 68472-68481 (2021) - [j20]Zongru He, Songlin Chen, Zhengyi Sun, Libin Wang, Kemao Ma:
Twisting sliding mode extremum seeking control without steady-state oscillation. Int. J. Control 94(2): 411-421 (2021) - [j19]Huajia Dai, Yuhao Bian, Libin Wang, Junfeng Yang:
Support Vector Machine-Based Backprojection Algorithm for Detection of Gastric Cancer Lesions with Abdominal Endoscope Using Magnetic Resonance Imaging Images. Sci. Program. 2021: 9964203:1-9964203:8 (2021) - [j18]Fenghui Dong, Feng Shi, Libin Wang, Yang Wei, Kaiqi Zheng:
Probabilistic Assessment Approach of the Aerostatic Instability of Long-Span Symmetry Cable-Stayed Bridges. Symmetry 13(12): 2413 (2021) - [j17]Yongxin Tong, Yuxiang Zeng, Bolin Ding, Libin Wang, Lei Chen:
Two-Sided Online Micro-Task Assignment in Spatial Crowdsourcing. IEEE Trans. Knowl. Data Eng. 33(5): 2295-2309 (2021) - [c18]Libin Wang, Huanqing Wang, Peter Xiaoping Liu:
Observer-Based Fuzzy Adaptive Command Filtering Finite-Time Control of Stochastic Nonlinear Systems. SPAC 2021: 1-6 - 2020
- [j16]Runzhi Zeng, Libin Wang:
Tightly-secure two-pass authenticated key exchange protocol using twin Diffie-Hellman problem. IET Inf. Secur. 14(6): 764-772 (2020) - [j15]Runzhi Zeng, Libin Wang:
Cryptanalysis of certificateless authenticated key agreement protocols. Int. J. Ad Hoc Ubiquitous Comput. 34(4): 249-257 (2020) - [i5]Han Hu, Libin Wang, Yulin Ding, Qing Zhu:
Fast and Regularized Reconstruction of Building Façades from Street-View Images using Binary Integer Programming. CoRR abs/2002.08549 (2020) - [i4]Yang Liu, Xiong Zhang, Libin Wang:
Asymmetrical Vertical Federated Learning. CoRR abs/2004.07427 (2020)
2010 – 2019
- 2019
- [j14]Libin Wang, Songlin Chen, Kemao Ma:
Authors' Reply to "Comment on 'On stability and application of extremum seeking control without steady-state oscillation' ". Autom. 103: 582 (2019) - [c17]Libin Wang, Yongxin Tong, Chunming Hu, Lei Chen, Yiming Li:
Procrastination-Aware Scheduling: A Bipartite Graph Perspective. ICDE 2019: 1650-1653 - 2018
- [j13]Libin Wang, Shoukun Dong, Lijun Liu, Yuling Ma, Shuang Li, Wei Zu:
Transcriptome profilling analysis characterized the gene expression patterns responded to combined drought and heat stresses in soybean. Comput. Biol. Chem. 77: 413-429 (2018) - [c16]Hao Li, Fanfan Du, Mingyan Zhang, Libin Wang, Xue Yu:
Research on Collaborative Filtering Recommendation of Learning Resource Based on Knowledge Association. ICITL 2018: 561-567 - [c15]Yongxin Tong, Libin Wang, Zimu Zhou, Lei Chen, Bowen Du, Jieping Ye:
Dynamic Pricing in Spatial Crowdsourcing: A Matching-Based Approach. SIGMOD Conference 2018: 773-788 - 2017
- [j12]Songlin Chen, Libin Wang, Kemao Ma, Hui Zhao:
A switching-based extremum seeking control scheme. Int. J. Control 90(8): 1688-1702 (2017) - [j11]Yongxin Tong, Libin Wang, Zimu Zhou, Bolin Ding, Lei Chen, Jieping Ye, Ke Xu:
Flexible Online Task Assignment in Real-Time Spatial Data. Proc. VLDB Endow. 10(11): 1334-1345 (2017) - [c14]Tianshu Song, Yongxin Tong, Libin Wang, Jieying She, Bin Yao, Lei Chen, Ke Xu:
Trichromatic Online Matching in Real-Time Spatial Crowdsourcing. ICDE 2017: 1009-1020 - 2016
- [j10]Libin Wang, Songlin Chen, Kemao Ma:
On stability and application of extremum seeking control without steady-state oscillation. Autom. 68: 18-26 (2016) - [j9]Weiqiang Wen, Libin Wang, Jiaxin Pan:
Unified security model of authenticated key exchange with specific adversarial capabilities. IET Inf. Secur. 10(1): 8-17 (2016) - [j8]Weihua Xie, Songhe Meng, Hua Jin, Chong Du, Libin Wang, Tao Peng, Fabrizio Scarpa, Chenghai Xu:
Application of CCG Sensors to a High-Temperature Structure Subjected to Thermo-Mechanical Load. Sensors 16(10): 1686 (2016) - [j7]Xin Huo, Sizhao Feng, Kang-Zhi Liu, Libin Wang, Weishan Chen:
Aerodynamic Drag Analysis of 3-DOF Flex-Gimbal GyroWheel System in the Sense of Ground Test. Sensors 16(12): 2081 (2016) - [c13]Yongxin Tong, Jieying She, Bolin Ding, Libin Wang, Lei Chen:
Online mobile Micro-Task Allocation in spatial crowdsourcing. ICDE 2016: 49-60 - 2014
- [j6]Zhenan Sun, Libin Wang, Tieniu Tan:
Ordinal Feature Selection for Iris and Palmprint Recognition. IEEE Trans. Image Process. 23(9): 3922-3934 (2014) - [c12]Haiqing Li, Zhenan Sun, Man Zhang, Libin Wang, Lihu Xiao, Tieniu Tan:
A Brief Survey on Recent Progress in Iris Recognition. CCBR 2014: 288-300 - [i3]Weiqiang Wen, Libin Wang, Min Xie:
One-Round Deniable Key Exchange with Perfect Forward Security. IACR Cryptol. ePrint Arch. 2014: 661 (2014) - 2013
- [j5]Shusheng Liu, Zheng Gong, Libin Wang:
Cryptanalysis of Reduced-Round DASH. J. Comput. Sci. Technol. 28(1): 159-164 (2013) - [c11]Libin Wang, Zhenan Sun, Tieniu Tan:
Adaptive Feature Selection via Boosting-Like Sparsity Regularization. ACPR 2013: 79-83 - [c10]Xingguang Li, Libin Wang, Zhenan Sun, Tieniu Tan:
A feature-level solution to off-angle iris recognition. ICB 2013: 1-6 - [i2]Weiqiang Wen, Libin Wang, Jiaxin Pan:
A Unified Security Model of Authenticated Key Exchange with Specific Adversarial Capabilities. IACR Cryptol. ePrint Arch. 2013: 871 (2013) - 2012
- [j4]Min Xie, Libin Wang:
One-round identity-based key exchange with Perfect Forward Security. Inf. Process. Lett. 112(14-15): 587-591 (2012) - [c9]Shusheng Liu, Zheng Gong, Libin Wang:
Improved Related-Key Differential Attacks on Reduced-Round LBlock. ICICS 2012: 58-69 - [c8]Libin Wang, Zhenan Sun, Tieniu Tan:
Robust regularized feature selection for iris recognition via linear programming. ICPR 2012: 3358-3361 - 2011
- [j3]Jiaxin Pan, Libin Wang:
TMQV: A Strongly eCK-secure Diffie-Hellman Protocol without Gap Assumption. J. Internet Serv. Inf. Secur. 1(2/3): 107-124 (2011) - [c7]Jiaxin Pan, Libin Wang, Changshe Ma:
Analysis and Improvement of an Authenticated Key Exchange Protocol. ISPEC 2011: 417-431 - [c6]Jiaxin Pan, Libin Wang:
TMQV: A Strongly eCK-Secure Diffie-Hellman Protocol without Gap Assumption. ProvSec 2011: 380-388 - [i1]Shusheng Liu, Libin Wang, Zheng Gong:
Improved Related-Key Boomerang Distinguishing Attack of Threefish-256. IACR Cryptol. ePrint Arch. 2011: 323 (2011) - 2010
- [c5]Jiaxin Pan, Libin Wang, Changshe Ma:
Security Enhancement and Modular Treatment towards Authenticated Key Exchange. ICICS 2010: 203-217
2000 – 2009
- 2006
- [j2]Libin Wang, Kefei Chen:
Comments on an access control model in semantic grid. Future Gener. Comput. Syst. 22(1-2): 3-5 (2006) - [j1]Libin Wang, Kefei Chen:
Comments on a theorem on grid access control. Future Gener. Comput. Syst. 22(4): 381-384 (2006) - 2005
- [c4]Yongguo Liu, Dong Zheng, Shiqun Li, Libin Wang, Kefei Chen:
A Tabu Clustering Method with DHB Operation and Mergence and Partition Operation. Discovery Science 2005: 380-382 - [c3]Yongguo Liu, Libin Wang, Kefei Chen:
A Tabu Search Based Method for Minimum Sum of Squares Clustering. ICAPR (1) 2005: 248-256 - [c2]Yongguo Liu, Yan Liu, Libin Wang, Kefei Chen:
A Hybrid Tabu Search Based Clustering Algorithm. KES (2) 2005: 186-192 - 2003
- [c1]Libin Wang, Kefei Chen:
A Typed Theory for Access Control and Information Flow Control in Mobile Systems. ACISP 2003: 154-165
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-22 19:57 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint