default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 37 matches
- 2024
- Yanxiong Li, Zhongjie Jiang, Qisheng Huang, Wenchang Cao, Jialong Li:
Lightweight Speaker Verification Using Transformation Module With Feature Partition and Fusion. IEEE ACM Trans. Audio Speech Lang. Process. 32: 794-806 (2024) - Dongnan He, Dongchen Xie, Yujie Wang, Wei You, Bin Liang, Jianjun Huang, Wenchang Shi, Zhuo Zhang, Xiangyu Zhang:
Define-Use Guided Path Exploration for Better Forced Execution. ISSTA 2024: 287-299 - Yuanjun Gong, Jianglei Nie, Wei You, Wenchang Shi, Jianjun Huang, Bin Liang, Jian Zhang:
SICode: Embedding-Based Subgraph Isomorphism Identification for Bug Detection. ICPC 2024: 304-315 - Zheng Cai, Maosong Cao, Haojiong Chen, Kai Chen, Keyu Chen, Xin Chen, Xun Chen, Zehui Chen, Zhi Chen, Pei Chu, Xiaoyi Dong, Haodong Duan, Qi Fan, Zhaoye Fei, Yang Gao, Jiaye Ge, Chenya Gu, Yuzhe Gu, Tao Gui, Aijia Guo, Qipeng Guo, Conghui He, Yingfan Hu, Ting Huang, Tao Jiang, Penglong Jiao, Zhenjiang Jin, Zhikai Lei, Jiaxing Li, Jingwen Li, Linyang Li, Shuaibin Li, Wei Li, Yining Li, Hongwei Liu, Jiangning Liu, Jiawei Hong, Kaiwen Liu, Kuikun Liu, Xiaoran Liu, Chengqi Lv, Haijun Lv, Kai Lv, Li Ma, Runyuan Ma, Zerun Ma, Wenchang Ning, Linke Ouyang, Jiantao Qiu, Yuan Qu, Fukai Shang, Yunfan Shao, Demin Song, Zifan Song, Zhihao Sui, Peng Sun, Yu Sun, Huanze Tang, Bin Wang, Guoteng Wang, Jiaqi Wang, Jiayu Wang, Rui Wang, Yudong Wang, Ziyi Wang, Xingjian Wei, Qizhen Weng, Fan Wu, Yingtong Xiong, et al.:
InternLM2 Technical Report. CoRR abs/2403.17297 (2024) - 2023
- Wen-Chang Cheng, Hung-Chou Hsiao, Yung-Fa Huang, Li-Hua Li:
Combining Classifiers for Deep Learning Mask Face Recognition. Inf. 14(7): 421 (2023) - Yanxiong Li, Hao Chen, Wenchang Cao, Qisheng Huang, Qianhua He:
Few-Shot Speaker Identification Using Lightweight Prototypical Network With Feature Grouping and Interaction. IEEE Trans. Multim. 25: 9241-9253 (2023) - Changqing Miao, Jianan Feng, Wei You, Wenchang Shi, Jianjun Huang, Bin Liang:
A Good Fishman Knows All the Angles: A Critical Evaluation of Google's Phishing Page Classifier. CCS 2023: 2486-2500 - Wenchang Zhu, Peng Huang:
Performance Degradation Assessment of Rolling Bearing Based on Difference of Eigenvalues in Random Matrix Theory. DSA 2023: 559-564 - Suyue Guo, Xinyu Wan, Wei You, Bin Liang, Wenchang Shi, Yiwei Zhang, Jianjun Huang, Jian Zhang:
Operand-Variation-Oriented Differential Analysis for Fuzzing Binding Calls in PDF Readers. ICSE 2023: 95-107 - Yanxiong Li, Zhongjie Jiang, Wenchang Cao, Qisheng Huang:
Speaker verification using attentive multi-scale convolutional recurrent network. CoRR abs/2306.00426 (2023) - Jianan Feng, Jiachun Li, Changqing Miao, Jianjun Huang, Wei You, Wenchang Shi, Bin Liang:
Fight Fire with Fire: Combating Adversarial Patch Attacks using Pattern-randomized Defensive Patches. CoRR abs/2311.06122 (2023) - 2022
- Yanxiong Li, Zhongjie Jiang, Wenchang Cao, Qisheng Huang:
Speaker verification using attentive multi-scale convolutional recurrent network. Appl. Soft Comput. 126: 109291 (2022) - Leilei Qu, Ruojin Xiao, Wenchang Shi, Keman Huang, Bo Qin, Bin Liang:
Your Behaviors Reveal What You Need: A Practical Scheme Based on User Behaviors for Personalized Security Nudges. Comput. Secur. 122: 102891 (2022) - Chin-Yuan Huang, Ming-Chin Yang, Chen I-Ming, Wen-Chang Hsu:
Modeling Consumer Adoption Intention of an AI-Powered Health Chatbot in Taiwan: An Empirical Perspective. Int. J. Perform. Eng. 18(5): 338 (2022) - Xiaohui Zhang, Yuanjun Gong, Bin Liang, Jianjun Huang, Wei You, Wenchang Shi, Jian Zhang:
Hunting bugs with accelerated optimal graph vertex matching. ISSTA 2022: 64-76 - 2021
- Shilei Bai, Bin Liang, Jianjun Huang, Wei You, Jiachun Li, Yaping Li, Wenchang Shi:
Detecting the Capacitance-Based Gamepad for Protecting Mobile Game Fairness. IEEE Trans. Computers 70(9): 1374-1387 (2021) - Jianjun Huang, Songming Han, Wei You, Wenchang Shi, Bin Liang, Jingzheng Wu, Yanjun Wu:
Hunting Vulnerable Smart Contracts via Graph Embedding Based Bytecode Matching. IEEE Trans. Inf. Forensics Secur. 16: 2144-2156 (2021) - Wenchang Ma, Ryuichi Takanobu, Minlie Huang:
CR-Walker: Tree-Structured Graph Reasoning and Dialog Acts for Conversational Recommendation. EMNLP (1) 2021: 1839-1851 - Ho Ka Chon, Yanxiong Li, Wenchang Cao, Qisheng Huang, Wei Xie, Wen-Feng Pang, Jiyue Wang:
Acoustic Scene Classification Using Aggregation of Two-Scale Deep Embeddings. ICCT 2021: 1341-1345 - 2020
- Bo Qin, Jikun Huang, Qin Wang, Xizhao Luo, Bin Liang, Wenchang Shi:
Cecoin: A decentralized PKI mitigating MitM attacks. Future Gener. Comput. Syst. 107: 805-815 (2020) - Hongcheng Li, Jianjun Huang, Bin Liang, Wenchang Shi, Yifang Wu, Shilei Bai:
Identifying parasitic malware as outliers by code clustering. J. Comput. Secur. 28(2): 157-189 (2020) - Yifang Wu, Jianjun Huang, Bin Liang, Wenchang Shi:
Do not jail my app: Detecting the Android plugin environments by time lag contradiction. J. Comput. Secur. 28(2): 269-293 (2020) - Wen-Chang Yang, Shu-Yun Lin, Tsung-Chu Huang:
Range-Lookup Approximate Computing Acceleration for Any Activation Functions in Low-Power Neural Network. ICCE-TW 2020: 1-2 - Pan Bian, Bin Liang, Jianjun Huang, Wenchang Shi, Xidong Wang, Jian Zhang:
SinkFinder: harvesting hundreds of unknown interesting function pairs with just one seed. ESEC/SIGSOFT FSE 2020: 1101-1113 - Wenchang Ma, Ryuichi Takanobu, Minghao Tu, Minlie Huang:
Bridging the Gap between Conversational Reasoning and Interactive Recommendation. CoRR abs/2010.10333 (2020) - 2019
- Aijuan Li, Wenchang Yuan, Xin Huang, Xuyun Qiu, Xiaodong Ban, Yuxing Zhang:
Traffic Control System Based on 5G Communication Network. ISIE 2019: 1950-1955 - 2018
- Yinghui Kong, Wenchan Huang, Baogang Li:
The Supply and Demand Mechanism of Electric Power Retailers and Cellular Networks Based on Matching Theory. Inf. 9(8): 192 (2018) - Pan Bian, Bin Liang, Wenchang Shi, Jianjun Huang, Yan Cai:
NAR-miner: discovering negative association rules from code for bug detection. ESEC/SIGSOFT FSE 2018: 411-422 - 2014
- Kuo-Liang Chung, Yong-Huai Huang, Wen-Chang Liu:
Quality-Efficient Upsampling Method for Asymmetric Resolution Stereoscopic Video Coding With Interview Motion Compensation and Error Compensation. IEEE Trans. Circuits Syst. Video Technol. 24(3): 430-442 (2014) - Tong Kun Lai, An-Ping Wang, Chun-Min Chang, Hua-Min Tseng, Kailing Huang, Jo-Ping Li, Wen-Chan Shih, Pai H. Chou:
Demonstration abstract: an 8x8 mm2 bluetooth low energy wireless motion-sensing platform. IPSN 2014: 341-342
skipping 7 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-10-19 00:14 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint