default search action
Huili Wang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c16]Tao Qi, Huili Wang, Yongfeng Huang:
Towards the Robustness of Differentially Private Federated Learning. AAAI 2024: 19911-19919 - [c15]Kaiyi Pang, Minhao Bai, Jinshuai Yang, Huili Wang, Minghu Jiang, Yongfeng Huang:
FREmax: A Simple Method Towards Truly Secure Generative Linguistic Steganography. ICASSP 2024: 4755-4759 - [i1]Minhao Bai, Jinshuai Yang, Kaiyi Pang, Huili Wang, Yongfeng Huang:
Towards Next-Generation Steganalysis: LLMs Unleash the Power of Detecting Steganography. CoRR abs/2405.09090 (2024) - 2023
- [j22]Huili Wang, Zhongliang Yang, Jinshuai Yang, Cheng Chen, Yongfeng Huang:
Linguistic Steganalysis in Few-Shot Scenario. IEEE Trans. Inf. Forensics Secur. 18: 4870-4882 (2023) - [c14]Huili Wang, Zhongliang Yang, Jinshuai Yang, Yue Gao, Yongfeng Huang:
Hi-Stega: A Hierarchical Linguistic Steganography Framework Combining Retrieval and Generation. ICONIP (5) 2023: 41-54 - [c13]Cheng Chen, Jinshuai Yang, Yue Gao, Huili Wang, Yongfeng Huang:
Minimizing Distortion in Steganography via Adaptive Language Model Tuning. ICONIP (12) 2023: 571-584 - [c12]Huili Wang, Wei Li, Beixian Gu, Yang Fu, Xin Chang, Wei Liu:
Mental Simulation of Implied Orientation Information in Chinese Sentences. SETE (1) 2023: 188-203 - 2022
- [j21]Huili Wang, Sheng Liu, Ling Zhang:
A 32-Bit DSP Instruction Pipeline Control Unit Verification Method Based on Instruction Reordering Strategy. Symmetry 14(4): 646 (2022) - 2021
- [j20]Lei Wang, Xuguang Yang, Huili Wang, Zhenhua Chai, Zhouchao Wei:
A modified regularized lattice Boltzmann model for convection-diffusion equation with a source term. Appl. Math. Lett. 112: 106766 (2021) - [j19]Huili Wang, Wenping Ma, Fuyang Deng, Haibin Zheng, Qianhong Wu:
Dynamic threshold ECDSA signature and application to asset custody in blockchain. J. Inf. Secur. Appl. 61: 102805 (2021) - [c11]Huili Wang, Zhongliang Yang, Yuting Hu, Zhen Yang, Yongfeng Huang:
Fast Detection of Heterogeneous Parallel Steganography for Streaming Voice. IH&MMSec 2021: 137-142 - 2020
- [j18]Kequan Lin, Lu Li, Yifei Dai, Huili Wang, Shuaishuai Teng, Xilinqiqige Bao, Zhi John Lu, Dong Wang:
A comprehensive evaluation of connectivity methods for L1000 data. Briefings Bioinform. 21(6): 2194-2205 (2020) - [j17]Xiaolei Yuan, Zhenhua Chai, Huili Wang, Baochang Shi:
A generalized lattice Boltzmann model for fluid flow system and its application in two-phase flows. Comput. Math. Appl. 79(6): 1759-1780 (2020) - [j16]Xinmeng Chen, Zhenhua Chai, Huili Wang, Baochang Shi:
A finite-difference lattice Boltzmann method with second-order accuracy of time and space for incompressible flow. Comput. Math. Appl. 80(12): 3066-3081 (2020) - [j15]Huili Wang, Wenping Ma, Lang Liao, Yushan Li, Linfeng Zheng:
Impossible Differential Distinguishers of Two Generalized Feistel Structures. Secur. Commun. Networks 2020: 8828504:1-8828504:9 (2020)
2010 – 2019
- 2019
- [j14]Huili Wang, Xiaoli Yan, Hanning Guo:
Visualizing the knowledge domain of embodied language cognition: A bibliometric review. Digit. Scholarsh. Humanit. 34(1): 21-31 (2019) - [c10]Lin Zhong, Huili Wang, Jan Xie, Bo Qin, Joseph K. Liu, Qianhong Wu:
A Flexible Instant Payment System Based on Blockchain. ACISP 2019: 289-306 - [c9]Huili Wang, Wenping Ma, Haibin Zheng, Qianhong Wu:
Distributed Secure Storage System Based on Blockchain and TPA. NSS 2019: 255-271 - [c8]Huili Wang, Wenping Ma, Haibin Zheng, Zhi Liang, Qianhong Wu:
Privacy-Preserving Sequential Data Publishing. NSS 2019: 596-614 - 2017
- [j13]Huili Wang, Baochang Shi, Hong Liang, Zhenhua Chai:
Finite-difference lattice Boltzmann model for nonlinear convection-diffusion equations. Appl. Math. Comput. 309: 334-349 (2017) - [j12]Fang Cao, Bowen An, Jinwei Wang, Dengpan Ye, Huili Wang:
Hierarchical recovery for tampered images based on watermark self-embedding. Displays 46: 52-60 (2017) - [j11]Guomin Chen, Yingwei Jin, Huili Wang, Shuo Cao:
Intelligent Decision Support Algorithm Based on Self-Adaption Reasoning. Int. J. Comput. Commun. Control 12(6): 803-812 (2017) - [j10]Sarah N. Banks, Koreen Millard, Amir Behnamian, Lori White, Tobias Ullmann, François Charbonneau, Zhaohua Chen, Huili Wang, Jon Pasher, Jason Duffe:
Contributions of Actual and Simulated Satellite SAR Data for Substrate Type Differentiation and Shoreline Mapping in the Canadian Arctic. Remote. Sens. 9(12): 1206 (2017) - 2016
- [j9]Chuan Qin, Huili Wang, Xinpeng Zhang, Xingming Sun:
Self-embedding fragile watermarking based on reference-data interleaving and adaptive selection of embedding mode. Inf. Sci. 373: 233-250 (2016) - [j8]Jianwei Wang, Huili Wang, Xianyong Liu:
A Portable Laser Photoacoustic Methane Sensor Based on FPGA. Sensors 16(9): 1551 (2016) - 2015
- [j7]Sarah N. Banks, Koreen Millard, Jon Pasher, Murray Richardson, Huili Wang, Jason Duffe:
Assessing the Potential to Operationalize Shoreline Sensitivity Mapping: Classifying Multiple Wide Fine Quadrature Polarized RADARSAT-2 and Landsat 5 Scenes with a Single Random Forest Model. Remote. Sens. 7(10): 13528-13563 (2015) - 2014
- [j6]Thierry Toutin, Huili Wang, François Charbonneau, Carla Vanessa Schmitt:
Impact of Orthorectification on Simulated Compact Polarimetric RCM Data With Accurate Lidar DSM. IEEE Geosci. Remote. Sens. Lett. 11(9): 1554-1558 (2014) - 2013
- [j5]Thierry Toutin, Huili Wang, Pierre Chomaz, Eric Pottier:
Orthorectification of Full-Polarimetric Radarsat-2 Data Using Accurate LIDAR DSM. IEEE Trans. Geosci. Remote. Sens. 51(12): 5252-5258 (2013) - 2012
- [j4]Hong-Mei Zhang, Hu Chen, Wei Liu, Hui Liu, Jing Gong, Huili Wang, An-Yuan Guo:
AnimalTFDB: a comprehensive animal transcription factor database. Nucleic Acids Res. 40(Database-Issue): 144-149 (2012) - [c7]Thierry Toutin, Huili Wang, Pierre Chomaz, Eric Pottier:
Ortho-rectification of polarimetric Radarsat-2/RCM data with accurate lidar DSM. IGARSS 2012: 5880-5883 - 2011
- [j3]Haoxiang Xia, Huili Wang, Zhaoguo Xuan:
Opinion Dynamics: A Multidisciplinary Review and Perspective on Future Research. Int. J. Knowl. Syst. Sci. 2(4): 72-91 (2011) - 2010
- [c6]Wenyu Liu, Huili Wang, Jian Li:
Electrocortical functional connectivity during language selection in bilinguals. ICNC 2010: 1948-1952 - [c5]Huili Wang, Yan Hou:
Research into the Markov property in mental lexicon of Chinese English learners based on spreading activation model. ICNC 2010: 2145-2149
2000 – 2009
- 2009
- [c4]Huili Wang, Hongjun Chen, Wenyu Liu, Jian Li, Yan Hou:
Neural Bases of Asymmetric Language Switch in Second-Language Learners: An ERP Study. CSIE (7) 2009: 239-242 - 2008
- [c3]Huili Wang, Wenyu Liu, Hongjun Chen, Yan Wang, Danni Sui, Yiyuan Tang:
Second Language Proficiency and Attentional Network: Evidence from the Multi-Source Interference Task (MSIT). ICNC (6) 2008: 109-115 - 2003
- [j2]Stephen T. C. Wong, Donny Tjandra, Huili Wang, Weimin Shen:
Workflow-enabled distributed component-based information architecture for digital medical imaging enterprises. IEEE Trans. Inf. Technol. Biomed. 7(3): 171-183 (2003)
1990 – 1999
- 1992
- [j1]Huili Wang, Ronald J. Jaszczak, R. Edward Coleman:
Solid geometry-based object model for Monte Carlo simulated emission and transmission tomographic imaging systems. IEEE Trans. Medical Imaging 11(3): 361-372 (1992) - 1990
- [c2]Huili Wang, Gregory H. Wakefield:
Non-asymptotic performance analysis of eigenstructure spectral methods. ICASSP 1990: 2591-2594
1980 – 1989
- 1987
- [c1]Huili Wang, Gregory H. Wakefield:
Signal-subspace approximation for line spectrum estimation. ICASSP 1987: 2054-2057
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-08 19:10 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint