default search action
Maoli Wang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Maoli Wang, Xiaodong Zang, Jianbo Cao, Bowen Zhang, Shengbao Li:
PhishHunter: Detecting camouflaged IDN-based phishing attacks via Siamese neural network. Comput. Secur. 138: 103668 (2024) - [c9]Maoli Wang, Haitao Qiu, Jiarui Wang:
Lightweight Human Pose Estimation Model for Industrial Scenarios. ICIC (11) 2024: 373-382 - 2023
- [j16]Maoli Wang, Yu Sun, Hongtao Sun, Bowen Zhang:
Security Issues on Industrial Internet of Things: Overview and Challenges. Comput. 12(12): 256 (2023) - [j15]Maoli Wang, Lu Zhang, Peng Gao, Xiaoli Yang, Kang Wang, Kunlun Yang:
Stackelberg-Game-Based Intelligent Offloading Incentive Mechanism for a Multi-UAV-Assisted Mobile-Edge Computing System. IEEE Internet Things J. 10(17): 15679-15689 (2023) - [j14]Xiaodong Zang, Jian Gong, Maoli Wang, Peng Gao, Guowei Zhang:
IP traffic behavior characterization via semantic mining. J. Netw. Comput. Appl. 213: 103603 (2023) - [j13]Xiaodong Zang, Jian Gong, Maoli Wang, Peng Gao:
Encrypted DNS Traffic Analysis for Service Intention Inferring. IEEE Trans. Netw. Serv. Manag. 20(2): 1405-1417 (2023) - [c8]Quanbo Pan, Yang Yu, Hanbing Yan, Maoli Wang, Bingzhi Qi:
FlowBERT: An Encrypted Traffic Classification Model Based on Transformers Using Flow Sequence. TrustCom 2023: 133-140 - 2022
- [j12]Maoli Wang, Kaizhi Li, Xiao Zhu, Yining Zhao:
Detection of Surface Defects on Railway Tracks Based on Deep Learning. IEEE Access 10: 126451-126465 (2022) - [j11]Hangfeng He, Yi Chen, Wenhai Qi, Maoli Wang, Xiaoming Chen:
Observer-based resilient control of positive systems with heterogeneous DoS attacks: A Markov model approach. J. Frankl. Inst. 359(1): 272-293 (2022) - [j10]Xiaolong Xu, Bowen Shen, Sheng Ding, Gautam Srivastava, Muhammad Bilal, Mohammad Reza Khosravi, Varun G. Menon, Mian Ahmad Jan, Maoli Wang:
Service Offloading With Deep Q-Network for Digital Twinning-Empowered Internet of Vehicles in Edge Computing. IEEE Trans. Ind. Informatics 18(2): 1414-1423 (2022) - [c7]Yining Zhao, Xiaomin Zhu, Maoli Wang, Xinming Wang, Min Zou, Kaizhi Li:
FeaturesRank: An unsupervised keyphrase extraction approach based on features representation for Chinese documents. EITCE 2022: 637-643 - 2021
- [j9]Fan Wang, Min Zhu, Maoli Wang, Mohammad Reza Khosravi, Qiang Ni, Shui Yu, Lianyong Qi:
6G-Enabled Short-Term Forecasting for Large-Scale Traffic Flow in Massive IoT Based on Time-Aware Locality-Sensitive Hashing. IEEE Internet Things J. 8(7): 5321-5331 (2021) - [j8]Ming Zong, Ruili Wang, Zhe Chen, Maoli Wang, Xun Wang, Johan Potgieter:
Multi-cue based 3D residual network for action recognition. Neural Comput. Appl. 33(10): 5167-5181 (2021) - [j7]Yuefeng Ma, Xun Liang, Gang Sheng, James T. Kwok, Maoli Wang, Guangshun Li:
Noniterative Sparse LS-SVM Based on Globally Representative Point Selection. IEEE Trans. Neural Networks Learn. Syst. 32(2): 788-798 (2021) - [c6]Maoli Wang, Kunlun Yang, Yining Zhao, Yalin Wang, Jinan Guo, Xu Ma:
Multi-Server Offloading Based on Game Theory in Cloud-Edge Collaborative Computing. ICEA 2021: 128-133 - 2020
- [j6]Guangshun Li, Ying Zhang, Maoli Wang, Junhua Wu, Qingyan Lin, Xiaofei Sheng:
Resource Management Framework Based on the Stackelberg Game in Vehicular Edge Computing. Complex. 2020: 8936064:1-8936064:11 (2020) - [c5]Yu-Ying Zhao, Maoli Wang, Juan Wang, Shasha Yuan, Jin-Xing Liu, Xiang-Zhen Kong:
Tensor Robust Principal Component Analysis with Low-Rank Weight Constraints for Sample Clustering. BIBM 2020: 397-401 - [c4]Xuexin Zhao, Junhua Wu, Maoli Wang, Guangshun Li, Haili Yu, Wenzhen Feng:
Multi-sensor Data Fusion Algorithm Based on Adaptive Trust Estimation and Neural Network. ICCC 2020: 582-587
2010 – 2019
- 2019
- [j5]Yongwei Tang, Jingbo Zhao, Maoli Wang, Huijuan Hao, Xiaoning He, Yuxiao Meng:
Beidou navigation method based on intelligent computing and extended Kalman filter fusion. J. Ambient Intell. Humaniz. Comput. 10(11): 4431-4438 (2019) - [j4]Huijuan Hao, Maoli Wang, Yongwei Tang, Qingdang Li:
Research on data fusion of multi-sensors based on fuzzy preference relations. Neural Comput. Appl. 31(S-1): 337-346 (2019) - [j3]Xinchang Zhang, Weidong Gu, Haijun Zhang, Maoli Wang:
Hybrid Communication Path Orchestration for 5G Heterogeneous Ultra-Dense Networks. IEEE Netw. 33(4): 112-118 (2019) - 2018
- [j2]Maoli Wang, Zhengqiang Zhang, Qiangde Wang, Hanyong Shao:
Adaptive Asymptotic Tracking of Nonlinear Systems Using Nonlinearly Parameterized First-Order Sugeno Fuzzy Approximator. Int. J. Fuzzy Syst. 20(4): 1079-1087 (2018) - 2016
- [c3]Huijuan Hao, Maoli Wang, Mei Xu, Yongwei Tang:
Adaptive weighted data fusion of muti-sensor based on fuzzy preference relations. ICIA 2016: 195-199 - 2015
- [j1]Maoli Wang, Zhengqiang Zhang:
Globally adaptive asymptotic tracking control of nonlinear systems using nonlinearly parameterized fuzzy approximator. J. Frankl. Inst. 352(7): 2783-2795 (2015) - 2014
- [c2]Huijuan Hao, Maoli Wang, Fengqi Hao, Zhengwei Wang:
Fault diagnosis of numerical controlled machine based on comprehensive fuzzy method. ROBIO 2014: 2031-2035 - 2013
- [c1]Guanjun Wang, Feng Ye, Ning Zhang, Maoli Wang:
Design and implementation of medical service robot with single arm and tracking function. ICIA 2013: 840-843
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-10 01:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint