default search action
Wenchao Huang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j42]Delun Li, Siyuan Cheng, Shaoyu Yang, Wenchao Huang, Wenjie Song:
Multi-Step Continuous Decision Making and Planning in Uncertain Dynamic Scenarios Through Parallel Spatio-Temporal Trajectory Searching. IEEE Robotics Autom. Lett. 9(10): 8282-8289 (2024) - [i11]Yiming Zhu, Wenchao Huang, Yan Xiong:
LightSLH: Provable and Low-Overhead Spectre v1 Mitigation through Targeted Instruction Hardening. CoRR abs/2408.16220 (2024) - 2023
- [j41]Wenchao Huang, Zhijun Pan, Zhezhuang Xu:
Underwater Cable Localization Method Based on Beetle Swarm Optimization Algorithm. IEEE CAA J. Autom. Sinica 10(9): 1893-1895 (2023) - [j40]Wenchao Huang, Binbin Tian, Yunpeng Chen, Jinhua Wang:
Reachable set estimation of multi-agent systems with semi-Markov switching topologies and time-delay. J. Frankl. Inst. 360(11): 7415-7437 (2023) - [c53]Renjie Ji, Wansen Wang, Yan Xiong, Wenchao Huang:
SolScope: Effectively Hunting Potential Permission Backdoor Threats in Smart Contracts. BIGCOM 2023: 88-95 - [c52]Jiaqi Guo, Zhaoyi Meng, Qian Zhang, Yan Xiong, Wenchao Huang:
MVVDroid: Android Malware Detection based on Multi-View Visualization. BIGCOM 2023: 96-102 - [c51]Caichang Tu, Wansen Wang, Kaiwen Shi, Yan Xiong, Wenchao Huang:
EOSVERIF: An Automated Analyzer for EOSIO Smart Contracts. BIGCOM 2023: 103-109 - [c50]Wansen Wang, Wenchao Huang, Zhaoyi Meng, Yan Xiong, Fuyou Miao, Xianjin Fang, Caichang Tu, Renjie Ji:
Automated Inference on Financial Security of Ethereum Smart Contracts. USENIX Security Symposium 2023: 3367-3383 - 2022
- [j39]Wenchao Huang, Hailin Liu, Jie Huang:
Distributed Robust Containment Control of Linear Heterogeneous Multi-Agent Systems: An Output Regulation Approach. IEEE CAA J. Autom. Sinica 9(5): 864-877 (2022) - [j38]Wenchao Huang, Binbin Tian, Tiantian Liu, Jinhua Wang, Zhiqiang Liu:
Event-triggered leader-following consensus of multi-agent systems under semi-Markov switching topology with partially unknown rates. J. Frankl. Inst. 359(7): 3103-3125 (2022) - [j37]Bo Zhou, Yi He, Wenchao Huang, Xiang Yu, Fang Fang, Xiaomao Li:
Place recognition and navigation of outdoor mobile robots based on random Forest learning with a 3D LiDAR. J. Intell. Robotic Syst. 104(4): 72 (2022) - [j36]Wenchao Huang, Yu Cao, Xu Cheng, Zongkai Guo:
Research on air quality prediction based on improved long short-term memory network algorithm. PeerJ Comput. Sci. 8: e1187 (2022) - [j35]Wenchao Huang, Chengrong Lin, Bo Hu, Tao Niu:
Robust distributed adaptive consensus for linear multiagent systems with uncertain topologies. Trans. Inst. Meas. Control 44(9): 1723-1731 (2022) - [j34]Xudong Feng, Wenchao Huang, Weiwei Xu, Huamin Wang:
Learning-Based Bending Stiffness Parameter Estimation by a Drape Tester. ACM Trans. Graph. 41(6): 221:1-221:16 (2022) - [i10]Wansen Wang, Wenchao Huang, Zhaoyi Meng, Yan Xiong, Fuyou Miao, Xianjin Fang, Caichang Tu, Renjie Ji:
An Automated Analyzer for Financial Security of Ethereum Smart Contracts. CoRR abs/2208.12960 (2022) - 2021
- [j33]Keju Meng, Fuyou Miao, Yu Ning, Wenchao Huang, Yan Xiong, Chin-Chen Chang:
A proactive secret sharing scheme based on Chinese remainder theorem. Frontiers Comput. Sci. 15(2): 152801 (2021) - [j32]Chengrong Lin, Bo Hu, Wenchao Huang, Tao Niu:
Robust distributed adaptive consensus for discrete-time multiagent systems with uncertain topologies. Neurocomputing 449: 100-107 (2021) - [j31]Zhaoyi Meng, Yan Xiong, Wenchao Huang, Fuyou Miao, Jianmeng Huang:
AppAngio: Revealing Contextual Information of Android App Behaviors by API-Level Audit Logs. IEEE Trans. Inf. Forensics Secur. 16: 1912-1927 (2021) - [j30]Yanwei Huang, Zhenyi Liu, Wenchao Huang, Shaobin Chen:
Robust H∞ control for nonlinear course system of unmanned surface vessel with polytopic uncertainty based on sum of squares. Trans. Inst. Meas. Control 43(2): 390-399 (2021) - [c49]Yuting Feng, Feng Xiong, Wenchao Huang, Yan Xiong:
Security Analysis of Session Initiation Protocol Digest Access Authentication Scheme. BigCom 2021: 129-135 - [c48]Mingzhe Hu, Yu Zhang, Wenchao Huang, Yan Xiong:
Static Type Inference for Foreign Functions of Python. ISSRE 2021: 423-433 - 2020
- [j29]Jiabin Zhu, Wenchao Huang, Fuyou Miao, Cheng Su, Baohua Zhao, Yan Xiong:
A Formal Framework of Shielding Systems by Stepwise Refinement. Int. J. Netw. Secur. 22(1): 54-67 (2020) - [j28]Jianmeng Huang, Wenchao Huang, Fuyou Miao, Yan Xiong:
Detecting Improper Behaviors of Stubbornly Requesting Permissions in Android Applications. Int. J. Netw. Secur. 22(3): 381-391 (2020) - [j27]Jianmeng Huang, Wenchao Huang, Zhaoyi Meng, Fuyou Miao, Yan Xiong:
Static Analysis of Superfluous Network Transmissions in Android Applications. Int. J. Netw. Secur. 22(3): 409-418 (2020) - [j26]Weikang Hu, Wenchao Huang, Yanwei Huang, Shaobin Chen, Ai-Guo Wu:
On reachable set estimation of multi-agent systems. Neurocomputing 401: 69-77 (2020) - [j25]Keju Meng, Fuyou Miao, Wenchao Huang, Yan Xiong:
Threshold changeable secret sharing with secure secret reconstruction. Inf. Process. Lett. 157: 105928 (2020) - [j24]Zeng Li, Wenchao Huang, Yan Xiong, Siqi Ren, Tuanfei Zhu:
Incremental learning imbalanced data streams with concept drift: The dynamic updated ensemble algorithm. Knowl. Based Syst. 195: 105694 (2020) - [j23]Changbin Lu, Fuyou Miao, Junpeng Hou, Wenchao Huang, Yan Xiong:
A verifiable framework of entanglement-free quantum secret sharing with information-theoretical security. Quantum Inf. Process. 19(1): 24 (2020) - [j22]Huihua Xia, Yan Xiong, Wenchao Huang, Zhaoyi Meng, Fuyou Miao:
Limiting Privacy Breaches in Average-Distance Query. Secur. Commun. Networks 2020: 8895281:1-8895281:24 (2020) - [j21]Jianmeng Huang, Yan Xiong, Wenchao Huang, Chen Xu, Fuyou Miao:
SieveDroid: Intercepting Undesirable Private-Data Transmissions in Android Applications. IEEE Syst. J. 14(1): 375-386 (2020) - [c47]Zihan Zhou, Yan Xiong, Wenchao Huang, Lu Ma:
SPrune: A Code Pruning Tool for Ethereum Solidity Contract Static Analysis. BigCom 2020: 66-70 - [c46]Guangshuai Mo, Yan Xiong, Wenchao Huang, Lu Ma:
Automated Theorem Proving via Interacting with Proof Assistants by Dynamic Strategies. BigCom 2020: 71-75 - [c45]Cijian Song, Yan Xiong, Wenchao Huang, Lu Ma:
Joint Self-Attention and Multi-Embeddings for Chinese Named Entity Recognition. BigCom 2020: 76-80 - [c44]Chuanhu Cheng, Yan Xiong, Wenchao Huang, Lu Ma:
Context-aware Generation of Proof Scripts for Theorem Proving. BigCom 2020: 81-85 - [c43]Shangwu Dong, Yan Xiong, Wenchao Huang, Lu Ma:
KIMS: Kernel Integrity Measuring System based on TrustZone. BigCom 2020: 103-107 - [c42]Chen Xu, Yan Xiong, Wenchao Huang, Zhaoyi Meng, Fuyou Miao, Cheng Su, Guangshuai Mo:
Identifying compatibility-related APIs by exploring biased distribution in Android apps. ICSE (Companion Volume) 2020: 280-281 - [c41]Yan Xiong, Cheng Su, Wenchao Huang, Fuyou Miao, Wansen Wang, Hengyi Ouyang:
SmartVerif: Push the Limit of Automation Capability of Verifying Security Protocols by Dynamic Strategies. USENIX Security Symposium 2020: 253-270
2010 – 2019
- 2019
- [j20]Yanwei Huang, Zhongyang Zhang, Wenchao Huang, Shaobin Chen:
DC-Link Voltage Regulation for Wind Power System by Complementary Sliding Mode Control. IEEE Access 7: 22773-22780 (2019) - [j19]Keju Meng, Fuyou Miao, Wenchao Huang, Yan Xiong:
Tightly coupled multi-group threshold secret sharing based on Chinese Remainder Theorem. Discret. Appl. Math. 268: 152-163 (2019) - [j18]Zhaoyi Meng, Yan Xiong, Wenchao Huang, Lei Qin, Xin Jin, Hongbing Yan:
AppScalpel: Combining static analysis and outlier detection to identify and prune undesirable usage of sensitive data in Android applications. Neurocomputing 341: 10-25 (2019) - [j17]Taeho Jung, Xiang-Yang Li, Wenchao Huang, Zhongying Qiao, Jianwei Qian, Linlin Chen, Junze Han, Jiahui Hou:
AccountTrade: Accountability Against Dishonest Big Data Buyers and Sellers. IEEE Trans. Inf. Forensics Secur. 14(1): 223-234 (2019) - [j16]Yanwei Huang, Wenchao Huang, Shaobin Chen, Zheyi Liu:
Complementary sliding mode control with adaptive switching gain for PMSM. Trans. Inst. Meas. Control 41(11): 3199-3205 (2019) - [j15]Xuangou Wu, Zhaobin Chu, Panlong Yang, Chaocan Xiang, Xiao Zheng, Wenchao Huang:
TW-See: Human Activity Recognition Through the Wall With Commodity Wi-Fi Devices. IEEE Trans. Veh. Technol. 68(1): 306-319 (2019) - [c40]Chen Xu, Yan Xiong, Wenchao Huang, Zhaoyi Meng:
An Observational Study on Compatibility-Related API Usage. BigCom 2019: 64-68 - [c39]Xiaoyu Li, Cheng Su, Yan Xiong, Wenchao Huang, Wansen Wang:
Formal Verification of BNB Smart Contract. BigCom 2019: 74-78 - [c38]Zeng Li, Yan Xiong, Wenchao Huang:
Drift-detection Based Incremental Ensemble for Reacting to Different Kinds of Concept Drift. BigCom 2019: 107-114 - [c37]Xianglin Bao, Cheng Su, Yan Xiong, Wenchao Huang, Yifei Hu:
FLChain: A Blockchain for Auditable Federated Learning with Trust and Incentive. BigCom 2019: 151-159 - [c36]Huihua Xia, Wenchao Huang, Yan Xiong:
Differentially Private Geo-Social Ranking. BigCom 2019: 250-254 - [c35]Wenchao Huang, Bo Zhou, Kun Qian, Fang Fang, Xudong Ma:
Real-Time Multi-Modal People Detection and Tracking of Mobile Robots with A RGB-D Sensor. ICARM 2019: 325-330 - [c34]Weikang Hu, Yanwei Huang, Wenchao Huang, Shaobin Chen:
Observer and Controller Design for State-Delay Takagi-Sugeno Fuzzy Systems Subjected to Unknown Time-Varying Output Delays. ICIRA (4) 2019: 169-180 - [c33]Zhaoyi Meng, Yan Xiong, Wenchao Huang, Fuyou Miao, Taeho Jung, Jianmeng Huang:
Divide and conquer: recovering contextual information of behaviors in Android apps around limited-quantity audit logs. ICSE (Companion Volume) 2019: 230-231 - [i9]Fuyou Miao, Keju Meng, Yue Yu, Wenchao Huang, Yan Xiong, Xingfu Wang:
Tightly Coupled Secret Sharing and Its Application to Group Authentication. CoRR abs/1908.02110 (2019) - 2018
- [j14]Wenchao Huang, Yanwei Huang, Shaobin Chen:
Robust consensus control for a class of second-order multi-agent systems with uncertain topology and disturbances. Neurocomputing 313: 426-435 (2018) - [j13]Yiqing Hu, Yan Xiong, Wenchao Huang, Xiang-Yang Li, Panlong Yang, Yanan Zhang, XuFei Mao:
Lightitude: Indoor Positioning Using Uneven Light Intensity Distribution. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 2(2): 67:1-67:25 (2018) - [j12]Shoubin Chen, Jingbin Liu, Teng Wu, Wenchao Huang, Keke Liu, Deyu Yin, Xinlian Liang, Juha Hyyppä, Ruizhi Chen:
Extrinsic Calibration of 2D Laser Rangefinders Based on a Mobile Sphere. Remote. Sens. 10(8): 1176 (2018) - [j11]Shoubin Chen, Jingbin Liu, Wenchao Huang, Ruizhi Chen:
Wide Swath Stereo Mapping from Gaofen-1 Wide-Field-View (WFV) Images Using Calibration. Sensors 18(3): 739 (2018) - [c32]Yu Ning, Fuyou Miao, Wenchao Huang, Keju Meng, Yan Xiong, Xingfu Wang:
Constructing Ideal Secret Sharing Schemes Based on Chinese Remainder Theorem. ASIACRYPT (3) 2018: 310-331 - [c31]Jianmeng Huang, Wenchao Huang, Fuyou Miao, Yan Xiong:
Detecting Stubborn Permission Requests in Android Applications. BigCom 2018: 84-89 - [c30]Jianmeng Huang, Wenchao Huang, Zhaoyi Meng, Fuyou Miao, Yan Xiong:
Identifying Superfluous Network Transmissions in Android Applications. BigCom 2018: 96-101 - [c29]Hongbing Yan, Yan Xiong, Wenchao Huang, Jianmeng Huang, Zhaoyi Meng:
Automatically Detecting Malicious Sensitive Data Usage in Android Applications. BigCom 2018: 102-107 - [c28]Lei Qin, Yan Xiong, Wenchao Huang, Zhaoyi Meng:
A Privacy Enforcement Framework for Android Systems Using Symbolic Execution-Based Instrumentation. BigCom 2018: 108-113 - [c27]Jiabin Zhu, Yan Xiong, Wenchao Huang:
A Formal Framework for State Continuity of Protected Modules. BigCom 2018: 114-119 - [c26]Yifei Hu, Yan Xiong, Wenchao Huang, Xianglin Bao:
KeyChain: Blockchain-Based Key Distribution. BigCom 2018: 126-131 - [c25]Jiabin Zhu, Wenchao Huang, Yan Xiong:
Formally Verifying Memory Isolation Based on ARM Processors. BigCom 2018: 195-200 - [c24]Luhui Yang, Guangjie Liu, Jiangtao Zhai, Yuewei Dai, Zhaozhi Yan, Yuguang Zou, Wenchao Huang:
A Novel Detection Method for Word-Based DGA. ICCCS (2) 2018: 472-483 - [c23]Wenchao Huang, Jinchuang Zhao, Wenli Fu:
A Deep Learning Approach Based on CSP for EEG Analysis. Intelligent Information Processing 2018: 62-70 - [c22]Shuangshuang Xue, Lan Zhang, Anran Li, Xiang-Yang Li, Chaoyi Ruan, Wenchao Huang:
AppDNA: App Behavior Profiling via Graph-based Deep Learning. INFOCOM 2018: 1475-1483 - [i8]Yan Xiong, Cheng Su, Wenchao Huang:
Verifying Security Protocols using Dynamic Strategies. CoRR abs/1807.00669 (2018) - [i7]Zhaoyi Meng, Yan Xiong, Wenchao Huang, Fuyou Miao, Taeho Jung, Jianmeng Huang:
Divide and Conquer: Recovering Contextual Information of Behaviors in Android Apps around Limited-quantity Audit Logs. CoRR abs/1809.07036 (2018) - [i6]Yu Ning, Fuyou Miao, Wenchao Huang, Keju Meng, Yan Xiong, Xingfu Wang:
Constructing Ideal Secret Sharing Schemes based on Chinese Remainder Theorem. IACR Cryptol. ePrint Arch. 2018: 837 (2018) - 2017
- [j10]Caimei Wang, Yan Xiong, Wenjuan Cheng, Wenchao Huang, Huihua Xia, Jianmeng Huang:
A General Formal Framework of Analyzing Selective Disclosure Attribute-Based Credential Systems. Int. J. Netw. Secur. 19(5): 794-803 (2017) - [j9]Wenchao Huang, Xiang-Yang Li, Yan Xiong, Panlong Yang, Yiqing Hu, XuFei Mao, Fuyou Miao, Baohua Zhao, Jumin Zhao:
Stride-in-the-Loop Relative Positioning Between Users and Dummy Acoustic Speakers. IEEE J. Sel. Areas Commun. 35(5): 1104-1117 (2017) - [c21]Xin Jin, Yan Xiong, Wenchao Huang, Zhaoyi Meng:
Mining Anomalous Usage of Sensitive Data through Anomaly Detection. BigCom 2017: 59-67 - [c20]Caimei Wang, Yan Xiong, Wenchao Huang, Huihua Xia, Jianmeng Huang, Cheng Su:
A Verified Secure Protocol Model of OAuth Dynamic Client Registration. BigCom 2017: 106-110 - [c19]Xi Yue, Zhezhuang Xu, Wenchao Huang, Rongkai Wang, Hao Jiang, Cailian Chen, Shih-Hau Fang:
LightCon: Simplify line-of-sight connection with visible symbols in industrial wireless networks. IECON 2017: 3480-3485 - [c18]Taeho Jung, Xiang-Yang Li, Wenchao Huang, Jianwei Qian, Linlin Chen, Junze Han, Jiahui Hou, Cheng Su:
AccountTrade: Accountable protocols for big data trading against dishonest consumers. INFOCOM 2017: 1-9 - 2016
- [j8]Xiaopu Wang, Yan Xiong, Wenchao Huang:
An Accurate Direction Finding Scheme Using Virtual Antenna Array via Smartphones. Sensors 16(11): 1811 (2016) - [c17]Xiaopu Wang, Yan Xiong, Wenchao Huang:
Rotate and Guide: Accurate and Lightweight Indoor Direction Finding Using Smartphones. BigCom 2016: 111-122 - [c16]Wenchao Huang, Xiang-Yang Li, Yan Xiong, Panlong Yang, Yiqing Hu, XuFei Mao, Fuyou Miao, Baohua Zhao, Ju-Min Zhao:
WalkieLokie: sensing relative positions of surrounding presenters by acoustic signals. UbiComp 2016: 439-450 - [c15]Caimei Wang, Yan Xiong, Wenchao Huang, Huihua Xia, Jianmeng Huang:
Formal Analysis of Selective Disclosure Attribute-Based Credential System in Applied Pi Calculus. Trustcom/BigDataSE/ISPA 2016: 42-49 - 2015
- [j7]Wenchao Huang, Jianping Zeng, Hongfei Sun:
Robust consensus for linear multi-agent systems with mixed uncertainties. Syst. Control. Lett. 76: 56-65 (2015) - [j6]Wenchao Huang, Yan Xiong, Xiang-Yang Li, Hao Lin, XuFei Mao, Panlong Yang, Yunhao Liu, Xingfu Wang:
Swadloon: Direction Finding and Indoor Localization Using Acoustic Signal by Shaking Smartphones. IEEE Trans. Mob. Comput. 14(10): 2145-2157 (2015) - [c14]Xiaopu Wang, Yan Xiong, Wenchao Huang:
Anti-multipath Indoor Direction Finding Using Acoustic Signal via Smartphones. BigCom 2015: 126-140 - [c13]Xudong Gong, Yan Xiong, Wenchao Huang, Lei Chen, Qiwei Lu, Yiqing Hu:
Fast Similarity Search of Multi-Dimensional Time Series via Segment Rotation. DASFAA (1) 2015: 108-124 - [c12]Yiqing Hu, Yan Xiong, Wenchao Huang, Xiang-Yang Li, Yanan Zhang, XuFei Mao, Panlong Yang, Caimei Wang:
Lightitude: Indoor Positioning Using Ubiquitous Visible Lights and COTS Devices. ICDCS 2015: 732-733 - [c11]Yuyang Ke, Yan Xiong, Yiqing Hu, Xudong Gong, Wenchao Huang:
Magemite: Character inputting system based on magnetic sensor. WOWMOM 2015: 1-3 - [i5]Yiqing Hu, Yan Xiong, Wenchao Huang, Xiang-Yang Li, Yanan Zhang, XuFei Mao, Panlong Yang, Caimei Wang:
Lightitude: Indoor Positioning Using Ubiquitous Visible Lights and COTS Devices. CoRR abs/1505.05977 (2015) - [i4]Wenchao Huang, Yan Xiong, Xiang-Yang Li, Yiqing Hu, XuFei Mao, Panlong Yang:
WalkieLokie: Relative Positioning for Augmented Reality Using a Dummy Acoustic Speaker. CoRR abs/1508.05477 (2015) - 2014
- [j5]Xuangou Wu, Yan Xiong, Panlong Yang, Shouhong Wan, Wenchao Huang:
Sparsest Random Scheduling for Compressive Data Gathering in Wireless Sensor Networks. IEEE Trans. Wirel. Commun. 13(10): 5867-5877 (2014) - [c10]Wenchao Huang, Yan Xiong, Xiang-Yang Li, Hao Lin, XuFei Mao, Panlong Yang, Yunhao Liu:
Shake and walk: Acoustic direction finding and fine-grained indoor localization using smartphones. INFOCOM 2014: 370-378 - [c9]Lan Zhang, Xiang-Yang Li, Wenchao Huang, Kebin Liu, Shuwei Zong, Xuesi Jian, Puchun Feng, Taeho Jung, Yunhao Liu:
It starts with iGaze: visual attention driven networking with smart glasses. MobiCom 2014: 91-102 - [c8]Lan Zhang, Xiang-Yang Li, Wenchao Huang, Kebin Liu, Shuwei Zong, Xuesi Jian, Puchun Feng, Taeho Jung, Yunhao Liu:
Demo: visual attention driven networking with smart glasses. MobiCom 2014: 329-332 - 2013
- [j4]Xuangou Wu, Yan Xiong, Wenchao Huang, Hong Shen, Mingxi Li:
An efficient compressive data gathering routing scheme for large-scale wireless sensor networks. Comput. Electr. Eng. 39(6): 1935-1946 (2013) - [j3]Wenchao Huang, Yan Xiong, Xingfu Wang, Fuyou Miao, Chengyi Wu, Xudong Gong, Qiwei Lu:
Fine-Grained Refinement on TPM-Based Protocol Applications. IEEE Trans. Inf. Forensics Secur. 8(6): 1013-1026 (2013) - [c7]Qingwen Liu, Yan Xiong, Wenchao Huang:
Integrating Social Information into Collaborative Filtering for Celebrities Recommendation. ACIIDS (2) 2013: 109-118 - [c6]Yiqing Hu, Yan Xiong, Xudong Gong, Qiwei Lu, Mingxi Li, Wenchao Huang:
TARS: Trusted Adaptive Routing Strategy with Back-Off Observing Mechanism. TrustCom/ISPA/IUCC 2013: 1729-1734 - [i3]Wenchao Huang, Yan Xiong, Xiang-Yang Li, Hao Lin, XuFei Mao, Panlong Yang, Yunhao Liu:
Accurate Indoor Localization Using Acoustic Direction Finding via Smart Phones. CoRR abs/1306.1651 (2013) - [i2]Qiwei Lu, Wenchao Huang, Xudong Gong, Xingfu Wang, Yan Xiong, Fuyou Miao:
A Secure Distributed Authentication scheme based on CRT-VSS and Trusted Computing in MANET. CoRR abs/1307.2977 (2013) - [i1]Qiwei Lu, Wenchao Huang, Yan Xiong, Xudong Gong:
Integrity Verification for Outsourcing Uncertain Frequent Itemset Mining. CoRR abs/1307.2991 (2013) - 2012
- [c5]Shichen Liu, Yan Xiong, Qiwei Lu, Wenchao Huang:
Replicator Dynamic Inspired Differential Evolution Algorithm for Global Optimization. IJCCI 2012: 133-143 - [c4]Qiwei Lu, Yan Xiong, Xudong Gong, Wenchao Huang:
Secure Collaborative Outsourced Data Mining with Multi-owner in Cloud Computing. TrustCom 2012: 100-108 - [c3]Qiwei Lu, Yan Xiong, Wenchao Huang, Xudong Gong, Fuyou Miao:
A Distributed ECC-DSS Authentication Scheme Based on CRT-VSS and Trusted Computing in MANET. TrustCom 2012: 656-665 - 2011
- [c2]Changhua Du, Chuntian Li, Tao Wang, Wenchao Huang:
The Study and Development of Modern Wave Soldering Materials for 3C Products. ICFCE 2011: 971-978
2000 – 2009
- 2009
- [c1]Wenchao Huang, Yan Xiong, Depin Chen:
DAAODV: A Secure Ad Hoc Routing Protocol Based on Direct Anonymous Attestation. CSE (2) 2009: 809-816
1990 – 1999
- 1997
- [j2]Daniel Hershkowitz, Wenchao Huang, Hans Schneider, Hans Weinberger:
Approximability by Weighted Norms of the Structured and VolumetricSingular Values of a Class of Nonnegative Matrices. SIAM J. Matrix Anal. Appl. 18(1): 249-257 (1997) - [j1]Wenchao Huang, Chi-Kwong Li, Hans Schneider:
Norms and Inequalities Related to Schur Products of Rectangular Matrices. SIAM J. Matrix Anal. Appl. 18(2): 334-347 (1997)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint