


default search action
Yixiang Wang
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j25]Susu Deng, Qi Xu, Yuanzheng Yue, Sishuo Jing, Yixiang Wang:
Individual tree detection and segmentation from unmanned aerial vehicle-LiDAR data based on a trunk point distribution indicator. Comput. Electron. Agric. 218: 108717 (2024) - [j24]Yixiang Wang, Zhicheng Hu, Kai Zhang, Jiayi Zhou, Ligang Zhou:
A combination prediction model based on Theil coefficient and induced continuous aggregation operator for the prediction of Shanghai composite index. Expert Syst. Appl. 249: 123671 (2024) - [j23]Jianhua Wang
, Xiaolin Chang
, Jelena V. Misic
, Vojislav B. Misic
, Yixiang Wang
:
PASS: A Parameter Audit-Based Secure and Fair Federated Learning Scheme Against Free-Rider Attack. IEEE Internet Things J. 11(1): 1374-1384 (2024) - [j22]Jiaxiang Yang, Hechao Liu, Yixiang Wang:
Vertex-degree function index for concave functions of graphs with a given clique number. J. Appl. Math. Comput. 70(3): 2197-2208 (2024) - [j21]Kai Zhang, Yixiang Wang, Zhicheng Hu, Ligang Zhou:
BRT oil price combination forecasting based on the dispersion degree of triangular fuzzy numbers. J. Intell. Fuzzy Syst. 46(1): 1143-1166 (2024) - [j20]Jianlin Wang
, Yixiang Wang
, Lining Peng
, Haixiang Zhang
, Hang Gao
, Chengjiang Wang
, Yuan Gao
, Huanliang Luo
, Yongquan Chen
:
Transformable Inspection Robot Design and Implementation for Complex Pipeline Environment. IEEE Robotics Autom. Lett. 9(6): 5815-5822 (2024) - [c17]Yixiang Wang, Haonan Li, Zhenguo Zhang:
TIFE: Tree-Structured Interactive Feature Enhancement for Multivariate Time Series Forecasting. ICIC (LNAI 6) 2024: 134-145 - 2023
- [j19]Zhicheng Hu, Ligang Zhou
, Kai Zhang, Yixiang Wang:
Continuous triangular fuzzy generalized OWA operator and its application to combined prediction. Soft Comput. 27(23): 17551-17571 (2023) - [j18]Wenxin Tai
, Tian Lan, Zufeng Wu, Pengyu Wang, Yixiang Wang, Fan Zhou:
Improving session-based recommendation with contrastive learning. User Model. User Adapt. Interact. 33(1): 1-42 (2023) - 2022
- [j17]Yixiang Wang
, Jiqiang Liu
, Xiaolin Chang
, Jelena V. Misic
, Vojislav B. Misic
:
IWA: Integrated gradient-based white-box attacks for fooling deep neural networks. Int. J. Intell. Syst. 37(7): 4253-4276 (2022) - [j16]Yixiang Wang, Jiqiang Liu, Xiaolin Chang, Ricardo J. Rodríguez, Jianhua Wang
:
DI-AA: An interpretable white-box attack for fooling deep neural networks. Inf. Sci. 610: 14-32 (2022) - [j15]Yixiang Wang
, Jiqiang Liu, Xiaolin Chang
, Jianhua Wang
, Ricardo J. Rodríguez
:
AB-FGSM: AdaBelief optimizer and FGSM-based approach to generate adversarial examples. J. Inf. Secur. Appl. 68: 103227 (2022) - [c16]Jianhua Wang
, Xiaolin Chang, Ricardo J. Rodríguez, Yixiang Wang:
Assessing Anonymous and Selfish Free-rider Attacks in Federated Learning. ISCC 2022: 1-6 - [i7]Yixiang Wang, Yujing Hu, Feng Wu, Yingfeng Chen:
Automatic Reward Design via Learning Motivation-Consistent Intrinsic Rewards. CoRR abs/2207.14722 (2022) - 2021
- [j14]Jianhua Wang
, Xiaolin Chang
, Yixiang Wang, Ricardo J. Rodríguez, Jianan Zhang:
LSGAN-AT: enhancing malware detector robustness against adversarial examples. Cybersecur. 4(1): 38 (2021) - [c15]Jianhua Wang
, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic, Yixiang Wang, Jianan Zhang:
Mal-LSGAN: An Effective Adversarial Malware Example Generation Model. GLOBECOM 2021: 1-6 - [c14]Cong Chen, Yilan Lyu, Yixiang Wang, Jiajia Li, Tian Lan:
Selective Kernel Network with Intermediate Supervision Loss for Monaural Speech Enhancement. ICCT 2021: 1330-1334 - [i6]Yixiang Wang, Jiqiang Liu, Xiaolin Chang:
Generalizing Adversarial Examples by AdaBelief Optimizer. CoRR abs/2101.09930 (2021) - [i5]Yixiang Wang, Jiqiang Liu, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic:
IWA: Integrated Gradient based White-box Attacks for Fooling Deep Neural Networks. CoRR abs/2102.02128 (2021) - [i4]Wenxin Tai, Jiajia Li, Yixiang Wang, Tian Lan, Qiao Liu:
Foster Strengths and Circumvent Weaknesses: a Speech Enhancement Framework with Two-branch Collaborative Learning. CoRR abs/2110.05713 (2021) - [i3]Yixiang Wang, Jiqiang Liu, Xiaolin Chang, Jianhua Wang, Ricardo J. Rodríguez:
DI-AA: An Interpretable White-box Attack for Fooling Deep Neural Networks. CoRR abs/2110.07305 (2021) - 2020
- [j13]Yixiang Wang, ShaoHua Lv, Jiqiang Liu, Xiaolin Chang
, Jinqiang Wang:
On the combination of data augmentation method and gated convolution model for building effective and robust intrusion detection. Cybersecur. 3(1): 23 (2020) - [j12]Yuanhong Ren, Weiqun Wang, Yixiang Wang, Weisong Zhou:
Exponentially incremental dissipativity for nonlinear stochastic switched systems. Int. J. Control 93(5): 1074-1087 (2020) - [c13]Shanguo Huang, Bingli Guo, Yabo Yuan, Bo Wang, Yu Zhang, Hai Yang, Mingyi Jiang, Yixiang Wang, Mingjiang Fu, Yiting Liu:
Control and Management of Optical Inter-Satellite Network based on CCSDS Protocol (Invited). ECOC 2020: 1-3 - [c12]Yujing Hu, Weixun Wang, Hangtian Jia, Yixiang Wang, Yingfeng Chen, Jianye Hao, Feng Wu, Changjie Fan:
Learning to Utilize Shaping Rewards: A New Approach of Reward Shaping. NeurIPS 2020 - [c11]Yixiang Wang, Feng Wu
:
Policy Adaptive Multi-agent Deep Deterministic Policy Gradient. PRIMA 2020: 165-181 - [c10]Yingdi Wang, Yixiang Wang, Endong Tong, Wenjia Niu, Jiqiang Liu:
A C-IFGSM Based Adversarial Approach for Deep Learning Based Intrusion Detection. VECoS 2020: 207-221 - [i2]Yujing Hu, Weixun Wang, Hangtian Jia, Yixiang Wang, Yingfeng Chen, Jianye Hao, Feng Wu, Changjie Fan:
Learning to Utilize Shaping Rewards: A New Approach of Reward Shaping. CoRR abs/2011.02669 (2020)
2010 – 2019
- 2019
- [j11]Haining Liu
, Yixiang Wang, Fajia Li, Xiaohong Wang, Chengliang Liu, Michael G. Pecht:
Perceptual Vibration Hashing by Sub-Band Coding: An Edge Computing Method for Condition Monitoring. IEEE Access 7: 129644-129658 (2019) - [j10]Yixiang Wang, Jiqiang Liu
, Jelena V. Misic, Vojislav B. Misic, ShaoHua Lv
, Xiaolin Chang
:
Assessing Optimizer Impact on DNN Model Sensitivity to Adversarial Examples. IEEE Access 7: 152766-152776 (2019) - [j9]Dingli Hua
, Weiqun Wang, Weiren Yu, Yixiang Wang:
Finite-region boundedness and stabilization for 2D continuous-discrete systems in Roesser model. IMA J. Math. Control. Inf. 36(3): 1033-1057 (2019) - [c9]Yixiang Wang, Jiqiang Liu, Xiaolin Chang:
Assessing transferability of adversarial examples against malware detection classifiers. CF 2019: 211-214 - [i1]Yixiang Wang, Feng Wu:
Multi-Agent Deep Reinforcement Learning with Adaptive Policies. CoRR abs/1912.00949 (2019) - 2018
- [j8]Yuanhong Ren, Weiqun Wang, Yixiang Wang:
Incremental H∞ control for switched nonlinear systems. Appl. Math. Comput. 331: 251-263 (2018) - [j7]Yuanhong Ren, Weiqun Wang, Yixiang Wang, Mingxuan Shen:
Incremental H∞ performance for a class of stochastic switched nonlinear systems. J. Frankl. Inst. 355(15): 7134-7157 (2018) - [c8]Xinxin Liu, Yixiang Wang, Xianhao Le, Zhonggui Xu, Jin Xie:
A Novel Electrode Design in DETF with Reducing Multimode Effect. NEMS 2018: 1-5 - 2017
- [j6]Yuanhong Ren, Weiqun Wang, Yixiang Wang:
Exponentially incremental (Q, S, R)-dissipativity and incremental stability for switched time-varying nonlinear systems. Int. J. Syst. Sci. 48(15): 3201-3214 (2017) - [j5]Zuqing Zhu
, Xiahe Liu, Yixiang Wang, Wei Lu, Long Gong, Shui Yu
, Nirwan Ansari
:
Impairment- and Splitting-Aware Cloud-Ready Multicast Provisioning in Elastic Optical Networks. IEEE/ACM Trans. Netw. 25(2): 1220-1234 (2017) - 2016
- [j4]Jinsheng Xiao
, Guanlin Pang, Yongqin Zhang, Yuli Kuang, Yuchen Yan, Yixiang Wang:
Adaptive shock filter for image super-resolution and enhancement. J. Vis. Commun. Image Represent. 40: 168-177 (2016) - [j3]Long Gong, Huihui Jiang, Yixiang Wang, Zuqing Zhu
:
Novel Location-Constrained Virtual Network Embedding (LC-VNE) Algorithms Towards Integrated Node and Link Mapping. IEEE/ACM Trans. Netw. 24(6): 3648-3661 (2016) - [c7]Hong Ding
, Lifeng Fu, Yixiang Wang, Jin Xie:
Resonant frequency tunable silicon fishbone-shaped MEMS double ended tuning fork. NEMS 2016: 233-236 - [c6]Yixiang Wang, Hong Ding
, Xianhao Le, Jin Xie:
A MEMS piezoelectric in-plane resonant accelerometer with two-stage micro-leverage mechanism. NEMS 2016: 455-459 - 2015
- [j2]Huihui Jiang, Yixiang Wang, Long Gong, Zuqing Zhu
:
Availability-Aware Survivable Virtual Network Embedding in Optical Datacenter Networks. JOCN 7(12): 1160-1171 (2015) - 2012
- [j1]Hui Yu, Jing Cui, Yixiang Wang, Yibin Yang:
Systematic construction, verification and implementation methodology for LDPC codes. EURASIP J. Wirel. Commun. Netw. 2012: 84 (2012) - [c5]Heather Ting Ma, Haiyan Lv, Alvin F. W. Li, James F. Griffith, Yixiang Wang, Anthony Wai Leung Kwok
, Ping Chung Leung:
Perfusion study on Modic changes of spine based on DCE-MRI. BHI 2012: 365-367 - 2011
- [c4]Jing Cui, Yixiang Wang, Hui Yu:
Systematic Construction and Verification Methodology for LDPC Codes. WASA 2011: 366-379 - [c3]Yixiang Wang, Hui Yu, Youyun Xu:
Quasi-cyclic low-density parity-check convolutional code. WiMob 2011: 351-356
2000 – 2009
- 2008
- [c2]Yixiang Wang, Yong Zhou, Yubiao Wang:
Design of a new wind speed measuring installation. ICARCV 2008: 1920-1923 - 2005
- [c1]Yixiang Wang, Baotian Pan, Hongshan Gao
, Yong Liu:
Planation surface extraction and quantitative analysis based on high-resolution digital elevation models. IGARSS 2005: 5369-5371
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-04 21:27 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint