


default search action
Zehui Wang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j9]Zehui Wang, Hao Li, Yinhao Qi
, Wei Qiao
, Song Liu, Chen Zhang, Bo Jiang
, Zhigang Lu:
PathWatcher: A path-based behavior detection method for attack detection and investigation. Comput. Secur. 157: 104563 (2025) - [j8]Yinhao Qi
, Chuyi Yan, Zehui Wang, Chen Zhang, Song Liu, Zhigang Lu, Bo Jiang
:
ATHITD: Attention-based temporal heterogeneous graph neural network for insider threat detection. Comput. Secur. 157: 104587 (2025) - [j7]Zehui Wang, Wolfram Höpken, Dietmar Jannach
:
A survey on point-of-interest recommendations leveraging heterogeneous data. J. Inf. Technol. Tour. 27(1): 29-73 (2025) - [c11]Zehui Wang, Yunxiang Wang, Wenhao Yan, Yinhao Qi, Tian Tian, Bo Jiang, Zhigang Lu:
Autumn: An Unsupervised APT Detection via Detailed Process-Level Analysis. CSCWD 2025: 600-605 - [c10]Yinhao Qi, Ning An, Zehui Wang, Yuan Yao, Chen Zhang, Yan Zhu, Zhigang Lu:
SiamEHGT: An Evolving Heterogeneous Graph Transformer for Insider Threat Detection based on Siamese Architecture. CSCWD 2025: 2354-2359 - [c9]Zehui Wang, Dan Du, Yinhao Qi, Wenhao Yan, Xiaobo Yang, Bo Jiang, Zhigang Lu:
MPKAN: APT Attack Detection on Audit Logs via Graph Semantic Enhancement. CSCWD 2025: 2605-2610 - [c8]Hao Li, Zehui Wang, Shang Shang, Zhengwei Jiang, Qiuyun Wang, Fangli Ren, Baoxu Liu:
Joint Spatial-Temporal Representation for Host Intrusion Detection System. ICCS (3) 2025: 256-269 - [c7]Zehui Wang, Wolfram Höpken, Dietmar Jannach:
Beyond Visit Trajectories: Enhancing POI Recommendation via LLM-Augmented Text and Image Representations. RecSys 2025: 521-526 - [i7]Mingjun Xu, Zehui Wang, Hengxing Cai, Renxin Zhong:
A Multi-Granularity Retrieval Framework for Visually-Rich Documents. CoRR abs/2505.01457 (2025) - [i6]Mingjun Xu, Jinhan Dong, Jue Hou, Zehui Wang, Sihang Li, Zhifeng Gao, Renxin Zhong, Hengxing Cai:
MM-R5: MultiModal Reasoning-Enhanced ReRanker via Reinforcement Learning for Document Retrieval. CoRR abs/2506.12364 (2025) - 2024
- [j6]Zehui Wang, Dianwei Chi:
Research on Wind Power Prediction Model Based on Random Forest and SVR. EAI Endorsed Trans. Energy Web 11 (2024) - [j5]Pavlos Athanasios Apostolopoulos
, Zehui Wang, Hanson Wang, Tenghyu Xu, Chad Zhou, Kittipat Virochsiri, Norm Zhou, Igor L. Markov:
Personalization for web-based services using offline reinforcement learning. Mach. Learn. 113(5): 3049-3071 (2024) - [j4]Mengke Li
, Qianhong Xiao
, Zehui Wang
, Chenjie Liu
, Kun Bai
:
A Variable Stiffness Spherical Joint Motor by Magnetic Energy Shaping. IEEE Trans. Robotics 40: 1410-1420 (2024) - [c6]Zehui Wang
, Zhihan Zhang, Hongtao Wang
:
A Multi-modal Framework with Contrastive Learning and Sequential Encoding for Enhanced Sleep Stage Detection. PRCV (5) 2024: 3-17 - 2023
- [i5]Mia Garrard, Hanson Wang, Ben Letham, Shaun Singh, Abbas Kazerouni, Sarah Tan, Zehui Wang, Yin Huang, Yichun Hu, Chad Zhou, Norm Zhou, Eytan Bakshy:
Practical Policy Optimization with Personalized Experimentation. CoRR abs/2303.17648 (2023) - [i4]Zehui Wang, Wolfram Höpken, Dietmar Jannach:
A Survey on Point-of-Interest Recommendations Leveraging Heterogeneous Data. CoRR abs/2308.07426 (2023) - 2022
- [j3]Chuyi Yan, Chen Zhang, Zhigang Lu, Zehui Wang, Yuling Liu, Baoxu Liu:
Blockchain abnormal behavior awareness methods: a survey. Cybersecur. 5(1): 5 (2022) - [j2]Weijia Huang, Wei Yang, Zhengyan Zhang, Caiping Xi, Zehui Wang, Yuanjiang Li:
Liver function classification based on local direction number and non-local binary pattern. Multim. Tools Appl. 81(22): 32305-32322 (2022) - [j1]Zehui Wang
, Yu Meng, Jingbo Chen, Junxian Ma, Anzhi Yue, Jiansheng Chen:
Learning Color Distributions from Bitemporal Remote Sensing Images to Update Existing Building Footprints. Remote. Sens. 14(22): 5851 (2022) - [c5]Igor L. Markov, Hanson Wang, Nitya S. Kasturi, Shaun Singh, Mia R. Garrard, Yin Huang
, Sze Wai Celeste Yuen, Sarah Tran, Zehui Wang, Igor Glotov, Tanvi Gupta, Peng Chen, Boshuang Huang, Xiaowen Xie, Michael Belkin, Sal Uryasev, Sam Howie, Eytan Bakshy, Norm Zhou:
Looper: An End-to-End ML Platform for Product Decisions. KDD 2022: 3513-3523 - 2021
- [c4]Shuangyong Song, Chao Wang, Xiao Pu, Zehui Wang, Huan Chen:
An Enhanced Convolutional Inference Model with Distillation for Retrieval-Based QA. DASFAA (3) 2021: 511-515 - [i3]Pavlos Athanasios Apostolopoulos, Zehui Wang, Hanson Wang, Chad Zhou, Kittipat Virochsiri, Norm Zhou, Igor L. Markov:
Personalization for Web-based Services using Offline Reinforcement Learning. CoRR abs/2102.05612 (2021) - [i2]Igor L. Markov, Hanson Wang, Nitya Kasturi, Shaun Singh, Sze Wai Yuen, Mia Garrard, Sarah Tran, Yin Huang, Zehui Wang, Igor Glotov, Tanvi Gupta, Boshuang Huang, Peng Chen, Xiaowen Xie, Michael Belkin, Sal Uryasev, Sam Howie, Eytan Bakshy, Norm Zhou:
Looper: An end-to-end ML platform for product decisions. CoRR abs/2110.07554 (2021) - 2020
- [c3]Hanson Wang, Zehui Wang, Yuanyuan Ma:
Predictive Precompute with Recurrent Neural Networks. MLSys 2020
2010 – 2019
- 2019
- [i1]Hanson Wang, Zehui Wang, Yuanyuan Ma:
Predictive Precompute with Recurrent Neural Networks. CoRR abs/1912.06779 (2019) - 2016
- [c2]Bohan Yang, Hesheng Wang, Weidong Chen, Zehui Wang:
Vision-based cutting control of deformable objects. RCAR 2016: 650-655
2000 – 2009
- 2006
- [c1]Zehui Wang, Zhiguo Zhang:
XTR + : A Provable Security Public Key Cryptosystem. CIS 2006: 534-544
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-09-26 00:08 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint