default search action
Rong Wang 0006
Person information
- affiliation: Sichuan Normal University, College of Computer Science, Visual Computing and Virtual Reality Key Laboratory of Sichuan, Chengdu, China
- affiliation: Southwest Jiaotong University, School of Information Science and Technology, Chengdu, Sichuan, China
Other persons with the same name
- Rong Wang — disambiguation page
- Rong Wang 0001 — Northwestern Polytechnical University, Center for OPTical IMagery Analysis and Learning (OPTIMAL), Xian, China
- Rong Wang 0002 — Hosei University, Department of Computer Science, Tokyo, Japan
- Rong Wang 0003 — Chongqing University of Posts and Telecommunications, School of Software Engineering, China (and 1 more)
- Rong Wang 0004 — Nanjing University of Aeronautics and Astronautics, Navigation Research Center, College of Automation Engineering, China
- Rong Wang 0005 — Stuttgart University, Institute of Natural Language Processing, Germany
- Rong Wang 0007 — University of California, Riverside, Institute Center for Research in Intelligent Systems, CA, USA
- Rong Wang 0008 — Beihang University, Digital Society and Blockchain Laboratory, Beijing, China
Other persons with a similar name
- Wang-Rong Chang
- JinRong Wang (aka: Jinrong Wang, Jin-Rong Wang) — disambiguation page
- Li-Rong Wang
- Rong-Hua Wang
- Rong-Jyue Wang
- Rong-Nian Wang
- Rong-ben Wang
- Rong Long Wang
- Ruirong Wang (aka: Rui-Rong Wang)
- JinRong Wang 0001 (aka: Jinrong Wang 0001, Jin-Rong Wang 0001, Jin Rong Wang 0001) — Guizhou University, Department of Mathematics, Guiyang, China
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j8]Rong Wang, Junchuan Liang, Siyu Wang, Chin-Chen Chang:
A divide-and-conquer approach to privacy-preserving high-dimensional big data release. J. Inf. Secur. Appl. 83: 103756 (2024) - [j7]Heng Yang, Nan Mu, Jinjia Guo, Yiyue Hu, Rong Wang:
Video salient object detection via self-attention-guided multilayer cross-stack fusion. Multim. Tools Appl. 83(17): 51853-51866 (2024) - [c2]Rong Wang, Siyu Wang:
PrivRBFN: Building Privacy-Preserving Radial Basis Function Networks Based on Federated Learning. APWeb/WAIM (4) 2024: 214-227 - 2023
- [c1]Heng Yang, Nan Mu, Jinjia Guo, Rong Wang:
Exploring a Self-Attentive Multilayer Cross-Stacking Fusion Model for Video Salient Object Detection. SMC 2023: 3956-3961 - [i3]Junchuan Liang, Rong Wang:
Covert Communication Based on the Poisoning Attack in Federated Learning. CoRR abs/2306.01342 (2023) - [i2]Junchuan Liang, Rong Wang:
FedCIP: Federated Client Intellectual Property Protection with Traitor Tracking. CoRR abs/2306.01356 (2023) - [i1]Junchuan Liang, Rong Wang, Chaosheng Feng, Chin-Chen Chang:
A Survey on Federated Learning Poisoning Attacks and Defenses. CoRR abs/2306.03397 (2023) - 2021
- [j6]Rong Wang, Benjamin C. M. Fung, Yan Zhu, Qiang Peng:
Differentially private data publishing for arbitrarily partitioned data. Inf. Sci. 553: 247-265 (2021) - 2020
- [j5]Rong Wang, Yan Zhu, Chin-Chen Chang, Qiang Peng:
Privacy-preserving high-dimensional data publishing for classification. Comput. Secur. 93: 101785 (2020) - [j4]Rong Wang, Benjamin C. M. Fung, Yan Zhu:
Heterogeneous data release for cluster analysis with differential privacy. Knowl. Based Syst. 201-202: 106047 (2020)
2010 – 2019
- 2018
- [j3]Rong Wang, Yan Zhu, Tung-Shou Chen, Chin-Chen Chang:
An Authentication Method Based on the Turtle Shell Algorithm for Privacy-Preserving Data Mining. Comput. J. 61(8): 1123-1132 (2018) - [j2]Rong Wang, Yan Zhu, Tung-Shou Chen, Chin-Chen Chang:
Privacy-Preserving Algorithms for Multiple Sensitive Attributes Satisfying t-Closeness. J. Comput. Sci. Technol. 33(6): 1231-1242 (2018) - 2017
- [j1]Rong Wang, Yan Zhu, Jiefan Tan, Binbin Zhou:
Detection of malicious web pages based on hybrid analysis. J. Inf. Secur. Appl. 35: 68-74 (2017)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-12 22:01 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint