default search action
Wenchuan Yang
Person information
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j12]Juntao He, Haoran Dai, Runqi Sui, Xuejing Yuan, Dun Liu, Hao Feng, Xinyue Liu, Wenchuan Yang, Baojiang Cui, Kedan Li:
EvilPromptFuzzer: generating inappropriate content based on text-to-image models. Cybersecur. 7(1): 70 (2024) - [j11]Haoran Yu, Wenchuan Yang, Baojiang Cui, Runqi Sui, Xuedong Wu:
Enhanced anomaly traffic detection framework using BiGAN and contrastive learning. Cybersecur. 7(1): 71 (2024) - [j10]Wenchuan Yang, Cheng Yang, Jichao Li, Yuejin Tan, Xin Lu, Chuan Shi:
Non-autoregressive personalized bundle generation. Inf. Process. Manag. 61(5): 103814 (2024) - [c23]Qing Guo, Wenchuan Yang, Baojiang Cui:
Graph-Based Detection of Encrypted Malicious Traffic with Spatio-Temporal Features. EIDWT 2024: 75-86 - [c22]Tianci Bu, Kang Yang, Wenchuan Yang, Jiawei Feng, Xiaoyu Zhang, Xin Lu:
DRAM-like Architecture with Asynchronous Refreshing for Continual Relation Extraction. WWW 2024: 2216-2225 - [c21]Bo Yan, Yang Cao, Haoyu Wang, Wenchuan Yang, Junping Du, Chuan Shi:
Federated Heterogeneous Graph Neural Network for Privacy-preserving Recommendation. WWW 2024: 3919-3929 - [i2]Wenchuan Yang, Cheng Yang, Jichao Li, Yuejin Tan, Xin Lu, Chuan Shi:
Non-autoregressive Personalized Bundle Generation. CoRR abs/2406.06925 (2024) - [i1]Xiaoyu Zhang, Wenchuan Yang, Jiawei Feng, Bitao Dai, Tianci Bu, Xin Lu:
GSpect: Spectral Filtering for Cross-Scale Graph Classification. CoRR abs/2409.00338 (2024) - 2023
- [j9]Wenchuan Yang, Haoran Yu, Baojiang Cui, Runqi Sui, Tianyu Gu:
Deep neural network pruning method based on sensitive layers and reinforcement learning. Artif. Intell. Rev. 56(S2): 1897-1917 (2023) - [j8]Hao Wang, Wenchuan Yang, Jichao Li, Junwei Ou, Yanjie Song, Yingwu Chen:
An improved heterogeneous graph convolutional network for job recommendation. Eng. Appl. Artif. Intell. 126(Part D): 107147 (2023) - [j7]Shihang Wang, Wenchuan Yang, Zongmin Li:
Towards fake news refuter identification: Mixture of Chi-Merge grounded CNN approach. Expert Syst. Appl. 231: 120712 (2023) - [j6]Wenchuan Yang, Jichao Li, Suoyi Tan, Yuejin Tan, Xin Lu:
A heterogeneous graph neural network model for list recommendation. Knowl. Based Syst. 277: 110822 (2023) - 2022
- [j5]Wenchuan Yang, Jichao Li, Suoyi Tan, Yuejin Tan, Xin Lu:
Feature-enhanced embedding learning for heterogeneous collaborative filtering. Neural Comput. Appl. 34(21): 18741-18756 (2022) - [c20]Fengjiao He, Wenchuan Yang, Baojiang Cui, Jia Cui:
Intelligent Fuzzing Algorithm for 5G NAS Protocol Based on Predefined Rules. ICCCN 2022: 1-7 - [c19]Wenchuan Yang, Tianyu Gu, Runqi Sui:
A Faster Method For Generating Chinese Text Summaries-Combining Extractive Summarization And Abstractive Summarization. MLNLP 2022: 54-58 - 2021
- [j4]Wenchuan Yang, Rui Hua, Qiuhan Zhao:
A sequence-to-sequence traffic predictor on software-defined networking. Int. J. Web Grid Serv. 17(3): 268-291 (2021) - [j3]Zishuai Cheng, Baojiang Cui, Tao Qi, Wenchuan Yang, Junsong Fu:
An Improved Feature Extraction Approach for Web Anomaly Detection Based on Semantic Structure. Secur. Commun. Networks 2021: 6661124:1-6661124:11 (2021) - [c18]Yang Hu, Wenchuan Yang, Baojiang Cui, Xiaohui Zhou, Zhijie Mao, Ying Wang:
Fuzzing Method Based on Selection Mutation of Partition Weight Table for 5G Core Network NGAP Protocol. IMIS 2021: 144-155
2010 – 2019
- 2019
- [j2]Wenchuan Yang, Wen Zuo, Baojiang Cui:
Detecting Malicious URLs via a Keyword-Based Convolutional Gated-Recurrent-Unit Neural Network. IEEE Access 7: 29891-29900 (2019) - [c17]Wenchuan Yang, Zishuai Cheng, Baojiang Cui:
Recombining TCP sessions based on finite state machine to detect cyber attackers. ICCSP 2019: 138-142 - [c16]Qiuhan Zhao, Wenchuan Yang, Rui Hua:
Design and Research of Composite Web Page Classification Network Based on Deep Learning. ICTAI 2019: 1531-1535 - [c15]Wenchuan Yang, Yifei Wang, Baojiang Cui, Chen Chen:
A Static Instrumentation Method for ELF Binary. IMIS 2019: 393-403 - 2018
- [c14]Wenchuan Yang, Zhen Fu, Jinxin Ma:
An Optimization Safety Solution for Sip Call Base on ESP. CISIS 2018: 476-485 - [c13]Wenchuan Yang, Bang Sun, Baojiang Cui:
A Webshell Detection Technology Based on HTTP Traffic Analysis. IMIS 2018: 336-342 - 2013
- [c12]Wenchuan Yang, Jian Liu, Miao Yu:
Research of an Improved Algorithm for Chinese Word Segmentation Dictionary Based on Double-Array Trie Tree. NLPCC 2013: 355-362 - 2012
- [c11]Wenchuan Yang, Bei Jia, Bowei Cao:
Study of a Fuzzy Comprehensive Evaluation Problem in Cloud Computing. AICI 2012: 120-125
2000 – 2009
- 2009
- [j1]Wenchuan Yang, Fang Fang:
Application of a Dynamic Identity Authentication Model Based on an Improved Keystroke Rhythm Algorithm. Int. J. Commun. Netw. Syst. Sci. 2(8): 714-719 (2009) - [c10]Wenchuan Yang, Yuanmei Hu, Qiancai Zhou:
Research on a Queue Scheduling Algorithm in Wireless Communications Network. WISM 2009: 554-562 - 2006
- [c9]Wenchuan Yang, Peng Wang, Chunyang Gao, Yanyang Fan, Huahua Luan:
The Research of an Improved Intelligent Algorithm to Process Network Blocking and Its Simulation. IEEE ICCI 2006: 652-657 - [c8]Wenchuan Yang, Peng Wang, Chunyang Gao, Yanyang Fan, Huahua Luan:
The Research of an Intelligent Agent to Process OLAP Service Over Statistical Data Warehouse. IEEE ICCI 2006: 794-798 - [c7]Wenchuan Yang, Peng Wang, Chunyang Gao, Yanyang Fan, Huahua Luan:
An Evolutive Algorithm for the Data Mining in Population Data Warehouse. IEEE ICCI 2006: 881-885 - [c6]Wenchuan Yang, Qiong Wu, Ping Hou, Fei Cui:
The Research of a Processing Prototype for NGN Congestion. AMT 2006: 307-310 - [c5]Wenchuan Yang, Xiao Liao, Cong Zhao, Chengyu Liang:
The Research of an Agent-based Handoff Performance on WLAN. AMT 2006: 331-334 - [c4]Wenchuan Yang, Qiong Wu, Ping Hou, Yang Zhang:
The research of a web-based network blocking prototype for next generation network. GrC 2006: 357-360 - [c3]Wenchuan Yang, Ping Hou, Yanyang Fan, Qiong Wu:
The Research of an Intelligent Object-Oriented Prototype for Data Warehouse. ICIC (1) 2006: 1300-1305 - 2005
- [c2]Wenchuan Yang, Junjian Yao, Xinguang Lin, Ruoyao Liu:
The Research of a Grid Security Agent for the Network Blocking. SKG 2005: 137 - 2004
- [c1]Wenchuan Yang, Wujie Zhu, Yang Liu II, Yan De:
The Prototype Research of a Web-Based DSS Intelligent Agent Over Data Warehouse. Web Intelligence 2004: 433-436
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 20:50 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint