default search action
Haizhou Wang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Haizhou Wang 0001 — Sichuan University, School of Cyber Science and Engineering, Chengdu, China (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i6]Haizhou Wang, Zhilong Wang, Peng Liu:
A hybrid LLM workflow can help identify user privilege related variables in programs of any size. CoRR abs/2403.15723 (2024) - [i5]Zhilong Wang, Haizhou Wang, Nanqing Luo, Lan Zhang, Xiaoyan Sun, Yebo Cao, Peng Liu:
Hide Your Malicious Goal Into Benign Narratives: Jailbreak Large Language Models through Neural Carrier Articles. CoRR abs/2408.11182 (2024) - 2023
- [j10]Haizhou Wang, Anoop Singhal, Peng Liu:
Tackling imbalanced data in cybersecurity with transfer learning: a case with ROP payload detection. Cybersecur. 6(1): 2 (2023) - [j9]Liying Li, Yinghui Wang, Haizhou Wang, Shiyan Hu, Tongquan Wei:
An Efficient Architecture for Imputing Distributed Data Sets of IoT Networks. IEEE Internet Things J. 10(17): 15100-15114 (2023) - [j8]Haizhou Wang, Liying Li, Yangguang Cui, Nuo Wang, Fuke Shen, Tongquan Wei:
MBSNN: A multi-branch scalable neural network for resource-constrained IoT devices. J. Syst. Archit. 142: 102931 (2023) - [c7]Zijian Zhou, Shuoyu Hu, Kai Yang, Haizhou Wang:
TKSP: Long-Term Stance Prediction for Social Media Users by Fusing Time Series Features and Event Dynamic Evolution Knowledge. KSEM (2) 2023: 406-421 - [i4]Yuxing Yang, Junhao Zhao, Siyi Wang, Xiangyu Min, Pengchao Wang, Haizhou Wang:
Multimodal Short Video Rumor Detection System Based on Contrastive Learning. CoRR abs/2304.08401 (2023) - 2022
- [j7]Liying Li, Haizhou Wang, Youyang Wang, Mingsong Chen, Tongquan Wei:
Improving IoT data availability via feedback- and voting-based anomaly imputation. Future Gener. Comput. Syst. 135: 194-204 (2022) - [j6]Feng Xu, Yifan Wang, Yunchao Ling, Chenfen Zhou, Haizhou Wang, Andrew E. Teschendorff, Yi Zhao, Haitao Zhao, Yungang He, Guoqing Zhang, Zhen Yang:
dbDEMC 3.0: Functional Exploration of Differentially Expressed miRNAs in Cancers of Human and Model Organisms. Genom. Proteom. Bioinform. 20(3): 446-454 (2022) - [j5]Yongbiao Xue, Yiming Bao, Zhang Zhang, Wenming Zhao, Jing-Fa Xiao, Shunmin He, Guoqing Zhang, Yixue Li, Guoping Zhao, Runsheng Chen, Jingyao Zeng, Yadong Zhang, Yunfei Shang, Jialin Mai, Shuo Shi, Mingming Lu, Congfan Bu, Zhewen Zhang, Zhenglin Du, Yinying Wang, Hongen Kang, Tianyi Xu, Lili Hao, Peilin Jia, Shuai Jiang, Qiheng Qian, Tongtong Zhu, Wenting Zong, Tong Jin, Yuansheng Zhang, Dong Zou, Qiang Du, Changrui Feng, Lina Ma, Sisi Zhang, Anke Wang, Lili Dong, Yanqing Wang, Wan Liu, Xing Yan, Yunchao Ling, Zhihua Zhou, Wang Kang, Tao Zhang, Shuai Ma, Haoteng Yan, Zunpeng Liu, Zejun Ji, Yusheng Cai, Si Wang, Moshi Song, Jie Ren, Qi Zhou, Jing Qu, Weiqi Zhang, Guanghui Liu, Xu Chen, Tingting Chen, Yanling Sun, Caixia Yu, Bixia Tang, Junwei Zhu, Shuang Zhai, Yubin Sun, Qiancheng Chen, Xiaoyu Yang, Xin Zhang, Zhengqi Sang, Yonggang Wang, Yilin Zhao, Huanxin Chen, Li Lan, Yingke Ma, Yaokai Jia, Xinchang Zheng, Meili Chen, Ming Chen, Guangyi Niu, Rong Pan, Wei Jing, Jian Sang, Chang Liu, Yujia Xiong, Mochen Zhang, Guoliang Wang, Lizhi Yi, Wei Zhao, Song Wu, Zhuang Xiong, Rujiao Li, Zheng Gong, Lin Liu, Zhao Li, Qianpeng Li, Sicheng Luo, Jiajia Wang, Yirong Shi, Honghong Zhou, Peng Zhang, Tingrui Song, Yanyan Li, Fei Yang, Mengwei Li, Zhaohua Li, Dongmei Tian, Xiaonan Liu, Cuiping Li, Xufei Teng, Shuhui Song, Yang Zhang, Ruru Chen, Rongqin Zhang, Feng Xu, Yifan Wang, Chenfen Zhou, Haizhou Wang, Andrew E. Teschendorff, Yungang He, Zhen Yang, Lun Li, Na Li, Ying Cui, Guangya Duan, Gangao Wu, Tianhao Huang, Enhui Jin, Hailong Kang, Zhonghuang Wang, Hua Chen, Mingkun Li, Wanshan Ning, Yu Xue, Yanhu Liu, Qijun Zhou, Xingyan Liu, Longlong Zhang, Bingyu Mao, Shihua Zhang, Yaping Zhang, Guodong Wang, Qianghui Zhu, Xin Li, Menghua Li, Yuanming Liu, Hong Luo, Xiaoyuan Wu, Haichun Jing, Yitong Pan, Leisheng Shi, Zhixiang Zuo, Jian Ren, Xinxin Zhang, Yun Xiao, Xia Li, Dan Liu, Chi Zhang, Zheng Zhao, Tao Jiang, Wanying Wu, Fangqing Zhao, Xianwen Meng, Di Peng, Hao Luo, Feng Gao, Shaofeng Lin, Chuijie Liu, Anyuan Guo, Hao Yuan, Tianhan Su, Yong E. Zhang, Yincong Zhou, Guoji Guo, Shanshan Fu, Xiaodan Tan, Weizhi Zhang, Mei Luo, Yubin Xie, Chenwei Wang, Xingyu Liao, Xin Gao, Jianxin Wang, Guiyan Xie, Chunhui Yuan, Feng Tian, Dechang Yang, Ge Gao, Dachao Tang, Wenyi Wu, Yujie Gou, Cheng Han, Qinghua Cui, Xiangshang Li, Chuan-Yun Li, Xiaotong Luo:
Database Resources of the National Genomics Data Center, China National Center for Bioinformation in 2022. Nucleic Acids Res. 50(D1): 27-38 (2022) - [c6]Lei Wang, Haizhou Wang, Xue Jiang, Jingwu Cui, Baoyu Zheng:
Multi-Access Edge Computing using Mode Division Multiple Access. WCSP 2022: 292-297 - 2021
- [j4]Qixun Zhang, Haizhou Wang, Zhiyong Feng, Zhu Han:
Many-to-Many Matching-Theory-Based Dynamic Bandwidth Allocation for UAVs. IEEE Internet Things J. 8(12): 9995-10009 (2021) - [c5]Qixun Zhang, Haizhou Wang, Zhiyong Feng:
Three-Sided Matching Game Based Joint Bandwidth and Caching Resource Allocation for UAVs. ICCC 2021: 183-188 - [i3]Haizhou Wang, Peng Liu:
Tackling Imbalanced Data in Cybersecurity with Transfer Learning: A Case with ROP Payload Detection. CoRR abs/2105.02996 (2021) - [i2]Zhilong Wang, Haizhou Wang, Hong Hu, Peng Liu:
Identifying Non-Control Security-Critical Data in Program Binaries with a Deep Neural Model. CoRR abs/2108.12071 (2021) - 2020
- [j3]Yoon-Ho Choi, Peng Liu, Zitong Shang, Haizhou Wang, Zhilong Wang, Lan Zhang, Junwei Zhou, Qingtian Zou:
Using deep learning to solve computer security challenges: a survey. Cybersecur. 3(1): 15 (2020) - [j2]Xusheng Li, Zhisheng Hu, Haizhou Wang, Yiwei Fu, Ping Chen, Minghui Zhu, Peng Liu:
DeepReturn: A deep neural network can learn how to detect previously-unseen ROP payloads without using any heuristics. J. Comput. Secur. 28(5): 499-523 (2020) - [c4]Haizhou Wang, Hui Yang:
Statistical Analysis of Inter-attribute Relationships in Unfractionated Heparin Injection Problems. EMBC 2020: 5374-5377
2010 – 2019
- 2019
- [i1]Yoon-Ho Choi, Peng Liu, Zitong Shang, Haizhou Wang, Zhilong Wang, Lan Zhang, Junwei Zhou, Qingtian Zou:
Using Deep Learning to Solve Computer Security Challenges: A Survey. CoRR abs/1912.05721 (2019) - 2017
- [c3]Bo Chen, Liang Liu, Haizhou Wang, Huadong Ma:
On Content Diffusion Modelling in Information-Centric Networks. GLOBECOM 2017: 1-6 - 2016
- [c2]Ryan A. Beasley, Haizhou Wang, Harald Scheirich, Wesley D. Turner, Gughan Sathyaseelan, Paul Novotny, Julien Lenoir, Timothy P. Kelliher:
Accelerating Surgical Simulation Development via OpenSurgSim: Burr Hole Trainer. MMVR 2016: 39-44 - 2013
- [c1]Haiyun Chen, Yingyu Hu, Haizhou Wang, Zhe Li, Qiang Lin:
Evaluation of Lauge-Hansen classification for ankle fractures and follow-up management. BIBM 2013: 10-12 - 2011
- [j1]Haizhou Wang, Mingzhou Song:
Ckmeans.1d.dp: Optimal k-means Clustering in One Dimension by Dynamic Programming. R J. 3(2): 29 (2011)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-14 00:52 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint