default search action
Huiqiang Wang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j75]Yafei Li, Huiqiang Wang, Jiayu Sun, Hongwu Lv, Wenqi Zheng, Guangsheng Feng:
Two-timescale joint service caching and resource allocation for task offloading with edge-cloud cooperation. Comput. Networks 254: 110771 (2024) - [j74]Gaigai Tang, Lin Yang, Long Zhang, Hongyu Kuang, Huiqiang Wang:
MRC-VulLoc: Software source code vulnerability localization based on multi-choice reading comprehension. Comput. Secur. 141: 103816 (2024) - [j73]Zihan Gao, Xin Lyu, Anqi Ge, Huiqiang Wang:
The Influence of Clutching Mechanism on Object Manipulation Tasks in Virtual Environments. Int. J. Hum. Comput. Interact. 40(17): 4454-4464 (2024) - [j72]Yifan Zou, Huiqiang Wang, Hongwu Lv, Shuai Zhao, Haoye Tian:
A Cross-Project Defect Prediction Approach Based on Code Semantics and Cross-Version Structural Information. Int. J. Softw. Eng. Knowl. Eng. 34(7): 1135-1171 (2024) - [j71]Jiayu Sun, Huiqiang Wang, Jiayue Sun, Hongwu Lv, Jingyao Liu, Guangsheng Feng:
An online integrated satellite-terrestrial IoT task offloading and service deployment strategy. Internet Things 26: 101210 (2024) - [j70]Kaixuan Gao, Huiqiang Wang, Hongwu Lv:
Surgical Strike on 5G Positioning: Selective-PRS-Spoofing Attacks and Its Defence. IEEE J. Sel. Areas Commun. 42(10): 2922-2937 (2024) - [j69]Zhiwei Liu, Jianjun Zhu, Juan M. Lopez-Sanchez, Cristina Gómez, Haiqiang Fu, Cui Zhou, Huiqiang Wang, Rong Zhao:
Simultaneous Estimation of Subcanopy Topography and Forest Height With Single-Baseline Single-Polarization TanDEM-X Interferometric Data Combined With ICESat-2 Data. IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. 17: 11598-11617 (2024) - [j68]Guanghan Duan, Hongwu Lv, Huiqiang Wang, Guangsheng Feng, Xiaoli Li:
Practical Cyber Attack Detection With Continuous Temporal Graph in Dynamic Network System. IEEE Trans. Inf. Forensics Secur. 19: 4851-4864 (2024) - [j67]Kaixuan Gao, Huiqiang Wang, Hongwu Lv, Wenxue Liu:
Localization-Oriented Digital Twinning in 6G: A New Indoor-Positioning Paradigm and Proof-of-Concept. IEEE Trans. Wirel. Commun. 23(8): 10473-10486 (2024) - [c84]Mingchen Song, Huiqiang Wang, Guoqiang Zhong:
Self-Prompt Mechanism for Few-Shot Image Recognition. AAAI 2024: 4934-4942 - [c83]Zhibo Zhang, Huiqiang Wang, Hongwu Lv, Jiayu Sun:
E-LDAC: A High-Accuracy Method for Predicting Bursty Latency in 5G Networks. COMPSAC 2024: 776-783 - 2023
- [j66]Jiayu Sun, Huiqiang Wang, Guangsheng Feng, Hongwu Lv, Jingyao Liu, Zihan Gao:
TOS-LRPLM: a task value-aware offloading scheme in IoT edge computing system. Clust. Comput. 26(1): 319-335 (2023) - [j65]Jiayu Sun, Huiqiang Wang, Lili Nie, Guangsheng Feng, Zhibo Zhang, Jingyao Liu:
A joint strategy for service deployment and task offloading in satellite-terrestrial IoT. Comput. Networks 225: 109656 (2023) - [j64]Xiaofeng Qu, Huiqiang Wang:
Emergency task offloading strategy based on cloud-edge-end collaboration for smart factories. Comput. Networks 234: 109915 (2023) - [j63]Jingyao Liu, Guangsheng Feng, Zhibo Zhang, Liying Zheng, Huiqiang Wang, Jyri Hämäläinen:
Joint mixed-timescale optimization of content caching and delivery policy in NOMA-based vehicular networks. Comput. Networks 237: 110075 (2023) - [j62]Lili Nie, Huiqiang Wang, Guangsheng Feng, Jiayu Sun, Hongwu Lv, Hang Cui:
A deep reinforcement learning assisted task offloading and resource allocation approach towards self-driving object detection. J. Cloud Comput. 12(1): 131 (2023) - [j61]Kaixuan Gao, Huiqiang Wang, Hongwu Lv, Pengfei Gao:
A DL-Based High-Precision Positioning Method in Challenging Urban Scenarios for B5G CCUAVs. IEEE J. Sel. Areas Commun. 41(6): 1670-1687 (2023) - [j60]Gaigai Tang, Lin Yang, Long Zhang, Weipeng Cao, Lianxiao Meng, Hongbin He, Hongyu Kuang, Feng Yang, Huiqiang Wang:
An attention-based automatic vulnerability detection approach with GGNN. Int. J. Mach. Learn. Cybern. 14(9): 3113-3127 (2023) - [j59]Guanghan Duan, Hongwu Lv, Huiqiang Wang, Guangsheng Feng:
Application of a Dynamic Line Graph Neural Network for Intrusion Detection With Semisupervised Learning. IEEE Trans. Inf. Forensics Secur. 18: 699-714 (2023) - [j58]Xiaofeng Qu, Huiqiang Wang:
A joint optimization scheme of task caching and offloading for smart factories. J. Supercomput. 79(13): 15185-15211 (2023) - [j57]Zhibo Zhang, Huiqiang Wang, Hongwu Lv, Jiayu Sun, Guodong Li, Xin Han:
CHAT: Accurate Network Latency Measurement for 5G E2E Networks. IEEE/ACM Trans. Netw. 31(6): 2854-2869 (2023) - [c82]Xiangxu Meng, Wei Li, Zheng Zhao, Zhihan Liu, Huiqiang Wang:
Hierarchical Contrastive Learning for CSI-Based Fingerprint Localization. ICANN (8) 2023: 306-318 - [c81]Xiangxu Meng, Wei Li, Wenqi Zheng, Zheng Zhao, Guangsheng Feng, Huiqiang Wang:
Make Active Attention More Active: Using Lipschitz Regularity to Improve Long Sequence Time-Series Forecasting. ICIC (2) 2023: 162-173 - [c80]Xiangxu Meng, Wei Li, Zheng Zhao, Zhihan Liu, Guangsheng Feng, Huiqiang Wang:
Detformer: Detect the Reliable Attention Index for Ultra-long Time Series Forecasting. ICIC (5) 2023: 457-468 - [c79]Huiqiang Wang, Jian Peng, Feihu Huang, Jince Wang, Junhui Chen, Yifei Xiao:
MICN: Multi-scale Local and Global Context Modeling for Long-term Series Forecasting. ICLR 2023 - [c78]Kaixuan Gao, Huiqiang Wang, Hongwu Lv, Pengfei Gao:
Your Locations May Be Lies: Selective-PRS-Spoofing Attacks and Defence on 5G NR Positioning Systems. INFOCOM 2023: 1-10 - [c77]Wei Li, Xiangxu Meng, Chuhan Chen, Hailin Mi, Huiqiang Wang:
Bidformer: A Transformer-Based Model via Bidirectional Sparse Self-Attention Mechanism for Long Sequence Time-Series Forecasting. SMC 2023: 4076-4082 - 2022
- [j56]Yufeng Zhong, Huiqiang Wang, Hongwu Lv, Fangfang Guo:
A vertical handoff decision scheme using subjective-objective weighting and grey relational analysis in cognitive heterogeneous networks. Ad Hoc Networks 134: 102924 (2022) - [j55]Kaixuan Gao, Huiqiang Wang, Hongwu Lv, Wenxue Liu:
Toward 5G NR High-Precision Indoor Positioning via Channel Frequency Response: A New Paradigm and Dataset Generation Method. IEEE J. Sel. Areas Commun. 40(7): 2233-2247 (2022) - [j54]Meng Luo, Yanan Tian, Shengwei Zhang, Lei Huang, Huiqiang Wang, Zhiqiang Liu, Lin Yang:
Individual Tree Detection in Coal Mine Afforestation Area Based on Improved Faster RCNN in UAV RGB Images. Remote. Sens. 14(21): 5545 (2022) - [j53]Zihan Gao, Huiqiang Wang, Guangsheng Feng, Hongwu Lv:
Exploring Sonification Mapping Strategies for Spatial Auditory Guidance in Immersive Virtual Environments. ACM Trans. Appl. Percept. 19(3): 9:1-9:21 (2022) - [j52]Zihan Gao, Huiqiang Wang, Hongwu Lv, Moshu Wang, Yifan Qi:
Evaluating the Effects of Non-Isomorphic Rotation on 3D Manipulation Tasks in Mixed Reality Simulation. IEEE Trans. Vis. Comput. Graph. 28(2): 1261-1273 (2022) - [c76]Zihan Gao, Huiqiang Wang, Anqi Ge, Hongwu Lv, Guangsheng Feng:
Effects of Clutching Mechanism on Remote Object Manipulation Tasks. VR Workshops 2022: 538-539 - [d1]Kaixuan Gao, Huiqiang Wang, Hongwu Lv:
CSI Dataset towards 5G NR High-Precision Positioning. IEEE DataPort, 2022 - [i1]Julong Young, Huiqiang Wang, Junhui Chen, Feihu Huang, Jian Peng:
Split Time Series into Patches: Rethinking Long-term Series Forecasting with Dateformer. CoRR abs/2207.05397 (2022) - 2021
- [j51]Zhong-Nan Zhao, Yanli Wang, Huiqiang Wang:
SDN-based cross-domain cooperative method for trusted nodes recommendation in Mobile crowd sensing. Peer-to-Peer Netw. Appl. 14(6): 3793-3805 (2021) - [j50]Huiqiang Wang, Yushan Zhou, Haiqiang Fu, Jianjun Zhu, Yanan Yu, Ruiping Li, Shengwei Zhang, Zhongyi Qu, Shouzhong Hu:
Parameterized Modeling and Calibration for Orbital Error in TanDEM-X Bistatic SAR Interferometry over Complex Terrain Areas. Remote. Sens. 13(24): 5124 (2021) - [j49]Gaigai Tang, Lin Yang, Shuangyin Ren, Lianxiao Meng, Feng Yang, Huiqiang Wang:
An Automatic Source Code Vulnerability Detection Approach Based on KELM. Secur. Commun. Networks 2021: 5566423:1-5566423:12 (2021) - [j48]Zihao Shao, Huiqiang Wang, Yifan Zou, Zihan Gao, Hongwu Lv:
From Centralized Protection to Distributed Edge Collaboration: A Location Difference-Based Privacy-Preserving Framework for Mobile Crowdsensing. Secur. Commun. Networks 2021: 5855745:1-5855745:18 (2021) - [j47]Jingya Wang, Xianhua Song, Huiqiang Wang, Ahmed A. Abd El-Latif:
Applicable Image Security Based on New Hyperchaotic System. Symmetry 13(12): 2290 (2021) - [j46]Huiqiang Wang, Haiqiang Fu, Jianjun Zhu, Guangcai Feng, Ze Fa Yang, Changcheng Wang, Jun Hu, Yanan Yu:
Correction of Time-Varying Baseline Errors Based on Multibaseline Airborne Interferometric Data Without High-Precision DEMs. IEEE Trans. Geosci. Remote. Sens. 59(11): 9307-9318 (2021) - [c75]Gaigai Tang, Long Zhang, Feng Yang, Lianxiao Meng, Weipeng Cao, Meikang Qiu, Shuangyin Ren, Lin Yang, Huiqiang Wang:
Interpretation of Learning-Based Automatic Source Code Vulnerability Detection Model Using LIME. KSEM 2021: 275-286 - 2020
- [j45]Yufeng Zhong, Huiqiang Wang, Hongwu Lv:
A cognitive wireless networks access selection algorithm based on MADM. Ad Hoc Networks 109: 102286 (2020) - [j44]Xiao-min Yu, Hui-qiang Wang, Jin-qiu Wu:
A method of fingerprint indoor localization based on received signal strength difference by using compressive sensing. EURASIP J. Wirel. Commun. Netw. 2020(1): 72 (2020) - [j43]Wei Jiang, Huiqiang Wang, Bingyang Li, Haibin Lv, Max Qinghu Meng:
A multi-user multi-operator computing pricing method for Internet of things based on bi-level optimization. Int. J. Distributed Sens. Networks 16(1) (2020) - [j42]Guangsheng Feng, Yue Wang, Bingyang Li, Yafei Li, Hongwu Lv, Chengbo Wang, Zihan Gao, Huiqiang Wang:
A near-optimal content placement in D2D underlaid cellular networks. Peer-to-Peer Netw. Appl. 13(5): 1799-1813 (2020) - [j41]Hongwu Lv, Jane Hillston, Paul Piho, Huiqiang Wang:
An Attribute-Based Availability Model for Large Scale IaaS Clouds with CARMA. IEEE Trans. Parallel Distributed Syst. 31(3): 733-748 (2020) - [c74]Qingyang Fan, Junyu Lin, Guangsheng Feng, Zihan Gao, Huiqiang Wang, Yafei Li:
Joint Service Caching and Computation Offloading to Maximize System Profits in Mobile Edge-Cloud Computing. MSN 2020: 244-251 - [c73]Gaigai Tang, Lianxiao Meng, Huiqiang Wang, Shuangyin Ren, Qiang Wang, Lin Yang, Weipeng Cao:
A Comparative Study of Neural Network Techniques for Automatic Software Vulnerability Detection. TASE 2020: 1-8
2010 – 2019
- 2019
- [b1]Huiqiang Wang:
Dynamic fault handling and reconfiguration for industrial automation systems. University of Stuttgart, Germany, Shaker Verlag 2019, ISBN 978-3-8440-6536-7, pp. 1-161 - [j40]Xiao-min Yu, Hui-qiang Wang, Hongwu Lv, Xiubing Liu, Jin-qiu Wu:
A fusion optimization algorithm of network element layout for indoor positioning. EURASIP J. Wirel. Commun. Netw. 2019: 284 (2019) - [j39]Shichen Zou, Junyu Lin, Huiqiang Wang, Hongwu Lv, Guangsheng Feng:
An effective method for service components selection based on micro-canonical annealing considering dependability assurance. Frontiers Comput. Sci. 13(2): 264-279 (2019) - [j38]Huiqiang Wang, Jianjun Zhu, Haiqiang Fu, Guangcai Feng, Changcheng Wang:
Modeling and Robust Estimation for the Residual Motion Error in Airborne SAR Interferometry. IEEE Geosci. Remote. Sens. Lett. 16(1): 65-69 (2019) - [j37]Zihan Gao, Huiqiang Wang, Guangsheng Feng, Fangfang Guo, Hongwu Lv, Bingyang Li:
RealPot: an immersive virtual pottery system with handheld haptic devices. Multim. Tools Appl. 78(18): 26569-26596 (2019) - [j36]Guangsheng Feng, Haibin Lv, Bingyang Li, Chengbo Wang, Hongwu Lv, Huiqiang Wang:
A near-optimal cloud offloading under multi-user multi-radio environments. Peer-to-Peer Netw. Appl. 12(5): 1454-1465 (2019) - [j35]Guangsheng Feng, Chengbo Wang, Bingyang Li, Haibin Lv, Xiaoxiao Zhuang, Hongwu Lv, Huiqiang Wang, Xianlang Hu:
UAV-assisted wireless relay networks for mobile offloading and trajectory optimization. Peer-to-Peer Netw. Appl. 12(6): 1820-1834 (2019) - [j34]Zihao Shao, Huiqiang Wang, Guangsheng Feng:
PUEGM: A Method of User Revenue Selection Based on a Publisher-User Evolutionary Game Model for Mobile Crowdsensing. Sensors 19(13): 2927 (2019) - [c72]Di He, Guangsheng Feng, Bingyang Li, Hongwu Lv, Huiqiang Wang, Quanming Li:
Joint Uplink and Downlink Optimization for Resource Allocation Under D2D Communication Networks. CWSN 2019: 35-47 - [c71]Guangsheng Feng, Quanming Li, Junyu Lin, Hongwu Lv, Huiqiang Wang, Silin Lv:
A Near-Optimal Heterogeneous Task Allocation Scheme for Mobile Crowdsensing. CWSN 2019: 263-274 - [c70]Naila Marir, Huiqiang Wang, Guangsheng Feng:
Unsupervised Feature Learning With Distributed Stacked Denoising Sparse Autoencoder for Abnormal Behavior Detection Using Apache Spark. ICKII 2019: 473-476 - [c69]Yingying Yuan, Guangsheng Feng, Hongwu Lv, Weiping Wang, Quanming Li, Di He, Huiqiang Wang:
A Near-Optimal Resource Allocation Approach to Computation Offloading Under D2D Communications. SmartIoT 2019: 183-188 - 2018
- [j33]Guangsheng Feng, Fumin Xia, Yongmin Zhang, Dongdong Su, Haibin Lv, Huiqiang Wang, Hongwu Lv:
Optimal Cooperative Wireless Communication for Mobile User Data Offloading. IEEE Access 6: 16224-16234 (2018) - [j32]Hezhe Wang, Huiqiang Wang, Fangfang Guo, Guangsheng Feng, Hongwu Lv:
ARAG: A Routing Algorithm Based on Incentive Mechanisms for DTN With Nodes' Selfishness. IEEE Access 6: 29419-29425 (2018) - [j31]Hezhe Wang, Huiqiang Wang, Jing Tan, Hongwu Lv, Meijin Zhu:
A Delay Tolerant Network Routing Policy Based on Optimized Control Information Generation Method. IEEE Access 6: 51791-51803 (2018) - [j30]Naila Marir, Huiqiang Wang, Guangsheng Feng, Bingyang Li, Meijuan Jia:
Distributed Abnormal Behavior Detection Approach Based on Deep Belief Network and Ensemble SVM Using Spark. IEEE Access 6: 59657-59671 (2018) - [j29]Ruijuan Zheng, Jing Chen, Mingchuan Zhang, Qingtao Wu, Junlong Zhu, Huiqiang Wang:
A collaborative analysis method of user abnormal behavior based on reputation voting in cloud environment. Future Gener. Comput. Syst. 83: 60-74 (2018) - [j28]Hezhe Wang, Guangsheng Feng, Huiqiang Wang, Hongwu Lv, Renjie Zhou:
RABP: Delay/disruption tolerant network routing and buffer management algorithm based on weight. Int. J. Distributed Sens. Networks 14(3) (2018) - [j27]Shijun Chen, Huiqiang Wang, Yuanyuan Wang, Haijing Hu:
一种面向室内定位的基站选择优化方法 (Base Station Selection Optimization Method Oriented at Indoor Positioning). 计算机科学 45(10): 115-119 (2018) - [j26]Hezhe Wang, Huiqiang Wang, Guangsheng Feng, Hongwu Lv:
NWBBMP: a novel weight-based buffer management policy for DTN routing protocols. Peer-to-Peer Netw. Appl. 11(5): 917-923 (2018) - [j25]Haiqiang Fu, Jian Jun Zhu, Changcheng Wang, Huiqiang Wang, Rong Zhao:
A Wavelet Decomposition and Polynomial Fitting-Based Method for the Estimation of Time-Varying Residual Motion Error in Airborne Interferometric SAR. IEEE Trans. Geosci. Remote. Sens. 56(1): 49-59 (2018) - [j24]Ruijuan Zheng, Jing Chen, Kang Liu, Mingchuan Zhang, Junlong Zhu, Qingtao Wu, Huiqiang Wang:
A User Recognition Strategy Under Mobile Cloud Environment. Wirel. Pers. Commun. 102(4): 3749-3758 (2018) - [c68]Fuliang Ma, Jing Tan, Xiubing Liu, Huiqiang Wang, Guangsheng Feng, Bingyang Li, Hongwu Lv, Junyu Lin, Mao Tang:
An Action Recognition Method Based on Wearable Sensors. ADHOCNETS 2018: 202-211 - [c67]Fangfang Guo, Luomeng Chao, Huiqiang Wang:
A Decision Tree Candidate Property Selection Method Based on Improved Manifold Learning Algorithm. ADHOCNETS 2018: 261-271 - [c66]Xiaoxiao Zhuang, Guangsheng Feng, Haibin Lv, Hongwu Lv, Huiqiang Wang, Liqiang Zhang, Junyu Lin, Mao Tang:
A Collision-Free Path Planning Approach for Multiple Robots Under Warehouse Scenarios. CWSN 2018: 55-63 - [c65]Guangsheng Feng, Haibin Lv, Chengbo Wang, Fumin Xia, Hongwu Lv, Huiqiang Wang, Qian Zhao:
A Non-Cooperative Game-Theoretical Approach to Mobile Data Offloading. GLOBECOM 2018: 1-6 - [c64]Jingwen Li, Liqiang Zhang, Qian Zhao, Huiqiang Wang, Hongwu Lv, Guangsheng Feng:
A Heuristic Indoor Path Planning Method Based on Hierarchical Indoor Modelling. ICPCSEE (2) 2018: 467-476 - [c63]Qian Zhao, Yang Liu, Huiqiang Wang, Hongwu Lv, Guangsheng Feng, Mao Tang:
A Cooperative Indoor Localization Method Based on Spatial Analysis. ICPCSEE (1) 2018: 628-637 - [c62]Xianlang Hu, Xiaoxiao Zhuang, Guangsheng Feng, Haibin Lv, Huiqiang Wang, Junyu Lin:
Joint Optimization of Traffic and Computation Offloading in UAV-Assisted Wireless Networks. MASS 2018: 475-480 - [c61]Yue Wang, Guangsheng Feng, Junyu Lin, Haibin Lv, Jiayu Sun, Huiqiang Wang, Zihan Gao:
Optimal Content Caching Policy Considering Mode Selection and User Preference under Overlay D2D Communications. MSN 2018: 212-217 - [c60]Guangsheng Feng, Sen Liang, Huiqiang Wang, Junyu Lin, Jingyao Liu, Hongwu Lv, Shuai Zhao:
Abstract: An Indoor Localization Simulation Platform for Localization Accuracy Evaluation. SECON 2018: 471-473 - [c59]Guangsheng Feng, Teng Li, Dongdong Su, Haibin Lv, Huiqiang Wang, Hongwu Lv:
A joint optimization method for data offloading in D2D-enabled cellular networks. WiOpt 2018: 1-6 - 2017
- [j23]Guangsheng Feng, Junyu Lin, Qian Zhao, Huiqiang Wang, Hongwu Lv, Bingyang Li, Dongdong Su:
Optimal transmission for scalable video coded streaming in cellular wireless networks with the cooperation of local peer-to-peer network. Int. J. Distributed Sens. Networks 13(4) (2017) - [j22]Guangsheng Feng, Yongmin Zhang, Junyu Lin, Huiqiang Wang, Lin Cai:
Joint optimization of downlink and D2D transmissions for SVC streaming in cooperative cellular networks. Neurocomputing 270: 178-187 (2017) - [j21]Hezhe Wang, Hongwu Lv, Huiqiang Wang, Guangsheng Feng:
DCAR: DTN Congestion Avoidance Routing Algorithm Based on Tokens in an Urban Environment. J. Sensors 2017: 6523076:1-6523076:9 (2017) - [j20]Huiqiang Wang, Xiuxiu Wen, Hongwu Lv, Guangsheng Feng, Junyu Lin:
面向移动物联网的可信超网络概念及构架研究 (Concept and Architecture of Trustworthy Super Network for Mobile Internet of Things). 计算机科学 44(5): 75-80 (2017) - [j19]Meijuan Jia, Huiqiang Wang, Junyu Lin, Guangsheng Feng, Haitao Yu:
DGTM: a dynamic grouping based trust model for mobile peer-to-peer networks. Frontiers Inf. Technol. Electron. Eng. 18(4): 559-569 (2017) - [j18]Xiuxiu Wen, Huiqiang Wang, Junyu Lin, Guangsheng Feng, Hongwu Lv, Jizhong Han:
Performance analysis and optimization for chunked network coding based wireless cooperative downloading systems. Frontiers Inf. Technol. Electron. Eng. 18(10): 1601-1613 (2017) - [j17]Guangsheng Feng, Yue Li, Qian Zhao, Huiqiang Wang, Hongwu Lv, Junyu Lin:
Optimizing broadcast duration for layered video streams in cellular networks. Peer-to-Peer Netw. Appl. 10(3): 765-779 (2017) - [j16]Haiqiang Fu, Jianjun Zhu, Changcheng Wang, Huiqiang Wang, Rong Zhao:
Underlying Topography Estimation over Forest Areas Using High-Resolution P-Band Single-Baseline PolInSAR Data. Remote. Sens. 9(4): 363 (2017) - [j15]Huiqiang Wang, Guangcai Feng, Bing Xu, Yongping Yu, Zhiwei Li, Yanan Du, Jianjun Zhu:
Deriving Spatio-Temporal Development of Ground Subsidence Due to Subway Construction and Operation in Delta Regions with PS-InSAR Data: A Case Study in Guangzhou, China. Remote. Sens. 9(10): 1004 (2017) - [c58]Guangsheng Feng, Dongdong Su, Junyu Lin, Fumin Xia, Hongwu Lv, Huiqiang Wang:
A Cooperative Optimization Method for Mobile User Data Offloading. CWSN 2017: 296-306 - [c57]Naila Marir, Huiqiang Wang:
A Cooperative Abnormal Behavior Detection Framework Based on Big Data Analytics. ICPCSEE (1) 2017: 192-206 - 2016
- [j14]Xiuxiu Wen, Guangsheng Feng, Huiqiang Wang, Hongwu Lv, Junyu Lin:
An adaptive disorder-avoidance cooperative downloading method. Comput. Networks 107: 148-162 (2016) - [j13]Huiqiang Wang, Xiuhao Dai, Hongwu Lv, Junyu Lin:
服务器监控技术综述及展望 (Review and Prospect of Server Monitoring Technology). 计算机科学 43(8): 1-6 (2016) - [j12]Chao Ding, Guangcai Feng, Zhiwei Li, Xinjian Shan, Yanan Du, Huiqiang Wang:
Spatio-Temporal Error Sources Analysis and Accuracy Improvement in Landsat 8 Image Ground Displacement Measurements. Remote. Sens. 8(11): 937 (2016) - [c56]Meijuan Jia, Huiqiang Wang, Bin Ye, Yan Wang:
A Dynamic Grouping-Based Trust Model for Mobile P2P Networks. SCC 2016: 848-851 - [c55]Junyu Lin, Guangsheng Feng, Xiuxiu Wen, Huiqiang Wang, Hongwu Lv, Qian Zhao, Jizhong Han:
MM-Sync: A Mobility Built-In Model Based Time Synchronization Approach for Underwater Sensor Networks. BDCloud-SocialCom-SustainCom 2016: 338-345 - [c54]Guangsheng Feng, Junyu Lin, Yongmin Zhang, Huiqiang Wang, Lin Cai, Qian Zhao, Hongwu Lv:
Joint Optimization of Downlink and D2D Transmissions for SVC Streaming in Cooperative Cellular Networks. WASA 2016: 149-161 - 2015
- [j11]Chao Zhao, Huiqiang Wang, Junyu Lin, Hongwu Lv, Yushu Zhang:
A Generation Method of Network Security Hardening Strategy Based on Attack Graphs. Int. J. Web Serv. Res. 12(1): 45-61 (2015) - [j10]Hongwu Lv, Junyu Lin, Huiqiang Wang, Guangsheng Feng, Mo Zhou:
Analyzing the service availability of mobile cloud computing systems by fluid-flow approximation. Frontiers Inf. Technol. Electron. Eng. 16(7): 553-567 (2015) - [c53]Huiqiang Wang, Shichen Zou, Junyu Lin, Guangsheng Feng, Hongwu Lv:
A Dependable Service Path Searching Method in Distributed Virtualized Environment Using Adaptive Bonus-Penalty Micro-Canonical Annealing. CSCloud 2015: 530-539 - [c52]Guangsheng Feng, Junyu Lin, Huiqiang Wang, Xiaoyu Zhao, Hongwu Lv, Qian Zhao:
A Distributed Strategy for Defensing Objective Function Attack in Large-scale Cognitive Networks. ICYCSEE 2015: 8-15 - [c51]Huiqiang Wang, Xiuxiu Wen, Junyu Lin, Guangsheng Feng, Hongwu Lv:
An Energy Efficient Random Walk Based Expanding Ring Search Method for Wireless Networks. ICYCSEE 2015: 16-22 - [c50]Zhanbo He, Huiqiang Wang, Junyu Lin, Guangsheng Feng, Hongwu Lv, Yibing Hu:
An Availability Evaluation Method of Web Services Using Improved Grey Correlation Analysis with Entropy Difference and Weight. ICYCSEE 2015: 300-308 - 2014
- [j9]Zhendong Wang, Huiqiang Wang, Hongwu Lv, Guangsheng Feng:
Spectrum Migration Approach Based on Pre-decision Aid and Interval Mamdani Fuzzy Inference in Cognitive Radio Networks. Int. J. Comput. Commun. Control 9(1): 85-92 (2014) - [j8]Amjad Ali, Huiqiang Wang, Hongwu Lv, Xiaoming Chen:
A Survey of MAC Protocols Design Strategies and Techniques in Wireless Ad Hoc Networks. J. Commun. 9(1): 30-38 (2014) - [j7]Amjad Ali, Huiqiang Wang, Hongwu Lv, Xiaoming Chen:
Asynchronous Session Reservation Multi-Channel MAC for Ad Hoc Networks. J. Networks 9(2): 259-268 (2014) - [j6]Huiqiang Wang, Yanqiu Xing, Weilian Sun:
Study on Measuring System of Casing Machine Based on PLC. J. Networks 9(5): 1287-1294 (2014) - [c49]Xiaoming Chen, Huiqiang Wang, Junyu Lin, Guangsheng Feng, Chao Zhao:
Network Traffic Analysis for Mobile Terminal Based Multi-scale Entropy. APSCC 2014: 74-80 - [c48]Guangsheng Feng, Qian Zhao, Huiqiang Wang, Hongwu Lv, Junyu Lin:
An Adaptive Channel Sensing Approach and its Analysis Based on Hierarchical Colored Petri Net in Distributed Cognitive Radio Networks. CWSN 2014: 69-83 - [c47]Chao Zhao, Huiqiang Wang, Fangfang Guo, Mo Zhou, Yushu Zhang:
A Heuristic Method of Attack Graph Analysis for Network Security Hardening. CyberC 2014: 43-47 - [c46]Meiling Liu, Kaiqun Fu, Chang-Tien Lu, Guangsheng Chen, Huiqiang Wang:
A search and summary application for traffic events detection based on Twitter data. SIGSPATIAL/GIS 2014: 549-552 - [c45]Guangsheng Feng, Huiqiang Wang, Qian Zhao, Hongwu Lv:
An Adaptive Channel Sensing Approach Based on Sequential Order in Distributed Cognitive Radio Networks. NPC 2014: 395-408 - 2013
- [j5]Zhenguo Gao, Weidong Xiang, Yunlong Zhao, Jing Zhao, Shaobin Cai, Wu Pan, Hua Jiang, Huiqiang Wang:
Random network coding-based optimal scheme for perfect wireless packet retransmission problems. Wirel. Commun. Mob. Comput. 13(6): 577-592 (2013) - [j4]Zhenguo Gao, Klara Nahrstedt, Weidong Xiang, Huiqiang Wang, Yibing Li:
Random Network Coding Based Schemes for Perfect Wireless Packet Retransmission Problems in Multiple Channel Networks. Wirel. Pers. Commun. 69(4): 1517-1534 (2013) - [c44]Yanbo Wang, Huiqiang Wang, Chao Zhao, Yushu Zhang, Ming Yu:
Research on Attack Graph Generation for Network Security Situation. BIC-TA 2013: 1147-1154 - 2012
- [j3]Zhenguo Gao, Mei Yang, Jianping Wang, Klara Nahrstedt, Shaobin Cai, Xiang Li, Huiqiang Wang:
Network Coding Based Schemes for Imperfect Wireless Packet Retransmission Problems: A Divide and Conquer Approach. Wirel. Pers. Commun. 62(4): 937-958 (2012) - [c43]Yanbo Wang, Huiqiang Wang, Chengqin Han, Baoyu Ge, Ming Yu:
Research on Information Fusion Method Based on sFlow and Netflow in Network Security Situation. ICIC (3) 2012: 139-145 - 2011
- [c42]Yanping Chen, Huiqiang Wang, Guangsheng Feng, Yulong Gao:
End-to-end performance of network with coding-aware. CHINACOM 2011: 831-835 - [c41]Renjie Zhou, Samamon Khemmarat, Lixin Gao, Huiqiang Wang:
Boosting video popularity through recommendation systems. DBSocial 2011: 13-18 - 2010
- [j2]Chunguang Ma, Guining Geng, Huiqiang Wang:
A Location-aware and Secret-share Based Dynamic Key Management Scheme for Heterogeneous Sensor Networks. J. Networks 5(4): 500-507 (2010)
2000 – 2009
- 2009
- [c40]Huiqiang Wang, Jianjun Cui, Ying Zheng, Minying Hu:
The Research and Design of the Belt Grinder which Based on PLC. CAR 2009: 8-11 - [c39]Hongwu Lv, Huiqiang Wang, Qian Zhao, Chunguang Ma:
Modeling and Analysis of Self-Reflection Based on Continuous State-Space Approximation of PEPA. DASC 2009: 84-89 - [c38]Huiqiang Wang, Xikun Dong, Haifeng Wang:
A Method for Software Security Growth Based on the Real-Time Monitor Algorithm and Software Hot-Swapping. DASC 2009: 137-142 - [c37]Chunguang Ma, Xiangjun Lin, Hongwu Lv, Huiqiang Wang:
ABSR: An Agent Based Self-Recovery Model for Wireless Sensor Network. DASC 2009: 400-404 - [c36]Qian Zhao, Huiqiang Wang, Guangsheng Feng, Xu Lu, Hongwu Lv:
A Service-Oriented Model for Autonomic Computing Elements Based upon Queuing Theory. DASC 2009: 473-477 - [c35]Xikun Dong, Huiqiang Wang, Jibao Lai:
A Self-Recovery Method Based on Mixed Reboot. ICAS 2009: 56-62 - [c34]Xu Lu, Huiqiang Wang, Renjie Zhou, Baoyu Ge:
Using Hessian Locally Linear Embedding for Autonomic Failure Prediction. NaBIC 2009: 772-776 - [c33]Guangsheng Feng, Huiqiang Wang, Bingyang Li, Zengyou He:
Dynamic Self-configuration of User QoS for Next Generation Network. NPC 2009: 80-85 - [c32]Huiqiang Wang, Hongwu Lv, Guangsheng Feng:
A Self-Reflection Model for Autonomic Computing Systems Based on p-Calculus. NSS 2009: 310-315 - 2008
- [j1]Jibao Lai, Huiqiang Wang, Xiaowu Liu, Ying Liang, Ruijuan Zheng, Guosheng Zhao:
WNN-Based Network Security Situation Quantitative Prediction Method and Its Optimization. J. Comput. Sci. Technol. 23(2): 222-230 (2008) - [c31]Haitao Zhang, Huiqiang Wang, Honggang Liu:
Research on Autonomic-Trusted Software Evaluation. CSSE (5) 2008: 1180-1183 - [c30]Ying Liang, Huiqiang Wang, Yonggang Pang:
A Kind of Formal Modelling for Network Security Situational Awareness Based on HMM. WAIM 2008: 598-605 - [c29]Guosheng Zhao, Huiqiang Wang, Jian Wang:
A Strategy Selection Model for Network Survivability Based on Fuzzy Matrix Game. WAIM 2008: 636-639 - [c28]Haizhi Ye, Huiqiang Wang, Ying Liang:
An Optimization Approach to Restart Tree Based on Mean Failure Frequencies. WKDD 2008: 644-648 - 2007
- [c27]Ruijuan Zheng, Huiqiang Wang, Yonggang Pang:
Research on Bio-inspired Multi-net Paralleling Mechanism Based on Web Application. International Conference on Computational Science (3) 2007: 117-120 - [c26]Yonggang Pang, Huiqiang Wang, Ye Du:
Experiment of Event Injection Technology for Network Dependability Evaluation. International Conference on Computational Science (3) 2007: 141-144 - [c25]Guosheng Zhao, Huiqiang Wang, Jian Wang, Linshan Shen:
A Novel Situation Awareness Model for Network Systems' Security. International Conference on Computational Science (3) 2007: 1077-1084 - [c24]Xiaowu Liu, Huiqiang Wang, Ying Liang, Jibao Lai:
Heterogeneous Multisensor Data Fusion with Neural Network: Creating Network Security Situation Awareness. IMECS 2007: 42-46 - [c23]Huiqiang Wang, Xiaowu Liu, Jibao Lai, Ying Liang:
Network Security Situation Awareness Based on Heterogeneous Multi-sensor Data Fusion and Neural Network. IMSCCS 2007: 352-359 - [c22]Huiqiang Wang, Jibao Lai, Xiaowu Liu:
A Quantitative Forecast Method of Network Security Situation Basedon BP Neural Network with Genetic Algorithm. IMSCCS 2007: 374-380 - [c21]Chunguang Ma, Zhiguo Shang, Huiqiang Wang, Guining Geng:
An Improved Key Management Scheme for Heterogeneity Wireless Sensor Networks. MSN 2007: 854-865 - [c20]Guangsheng Feng, Huiqiang Wang, Qian Zhao:
A Novel Approach of Alarm Classification for Intrusion Detection based upon Dempster-Shafer Theory. WEBIST (1) 2007: 234-239 - 2006
- [c19]Huiqiang Wang, Jian Wang, Guosheng Zhao:
A New Bio-inspired Model for Network Security and Its Application. APWeb Workshops 2006: 756-759 - [c18]Huiqiang Wang, Zeng-Quan Wang, Qian Zhao, G. F. Wang, R. J. Zheng, D. X. Liu:
Mobile Agents for Network Intrusion Resistance. APWeb Workshops 2006: 965-970 - [c17]Huiqiang Wang, Yonggang Pang, Ye Du, Dong Xu, Daxin Liu:
Evaluation of Network Dependability Using Event Injection. APWeb Workshops 2006: 991-998 - [c16]Huiqiang Wang, Gaofei Wang, Ying Lan, Ke Wang, Daxin Liu:
A New Automatic Intrusion Response Taxonomy and Its Application. APWeb Workshops 2006: 999-1003 - [c15]Zeng-Quan Wang, Hui-qiang Wang, Rui-jie Zhang:
Research and Design on Intelligent Agent Intrusion Response System. CIMCA/IAWTIC 2006: 231 - [c14]Liran Shen, Qingbo Yin, Xueyao Li, Huiqiang Wang:
Speech Enhancement in Short-Wave Channel Based on Empirical Mode Decomposition. CSR 2006: 591-599 - [c13]Zeng-Quan Wang, Hui-qiang Wang, Rui-jie Zhang:
Analysis of an Intelligent Agent Intrusion Response System. IAT Workshops 2006: 53-56 - [c12]Liran Shen, Xueyao Li, Qingbo Yin, Huiqiang Wang:
Speech Enhancement in Short-Wave Channel Based on ICA in Empirical Mode Decomposition Domain. ICA 2006: 708-713 - [c11]Huiqiang Wang, Ruijuan Zheng, Xueyao Li, Daxin Liu:
A Bio-inspired Multidimensional Network Security Model. IMSCCS (2) 2006: 3-7 - [c10]Guosheng Zhao, Huiqiang Wang, Jian Wang:
A Novel Quantitative Analysis Method for Network Survivability. IMSCCS (2) 2006: 30-33 - [c9]Jian Wang, Huiqiang Wang, Guosheng Zhao:
ERAS - an Emergency Response Algorithm for Survivability of Critical Services. IMSCCS (2) 2006: 97-100 - [c8]Liran Shen, Qingbo Yin, Xueyao Li, Huiqiang Wang:
Speech Stream Detection in Short-wave Channel Based on Cepstral of Auditory Wavelet Packets. IMSCCS (1) 2006: 203-207 - [c7]Ruijuan Zheng, Huiqiang Wang:
A Computer Immune System: LAN Immune System Model based on Host (LISMH). IMSCCS (2) 2006: 207-211 - 2005
- [c6]Huiqiang Wang, D. X. Liu, D. Xu, Y. Y. Lan, X. Y. Li, Qian Zhao:
A Holistic Approach to Survivable Distributed Information System for Critical Applications. ISPA 2005: 713-724 - [c5]Huiqiang Wang, Jian Wang, Guosheng Zhao:
A Comprehensive Bio-inspired Model for Network Security. SKG 2005: 119 - 2004
- [c4]Ye Du, Huiqiang Wang, Yonggang Pang:
HMMs for Anomaly Intrusion Detection. CIS 2004: 692-697 - [c3]Ye Du, Huiqiang Wang, Yonggang Pang:
A Useful System Prototype for Intrusion Detection - Architecture and Experiments. Discovery Science 2004: 388-395 - [c2]Ye Du, Huiqiang Wang, Yonggang Pang:
IADIDF: A Framework for Intrusion Detection. GCC 2004: 895-898 - [c1]Liran Shen, Xueyao Li, Huiqiang Wang, Rubo Zhang:
Speech Hiding Based on Auditory Wavelet. ICCSA (4) 2004: 414-420
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-22 20:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint