Wenhua Wang
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – today
- 2019
- [j17]Xiao Zhang, Faguo Wu, Wang Yao
, Zhao Wang, Wenhua Wang:
Multi-authority attribute-based encryption scheme with constant-size ciphertexts and user revocation. Concurrency and Computation: Practice and Experience 31(21) (2019) - [j16]Faguo Wu
, Wang Yao, Xiao Zhang, Wenhua Wang, Zhiming Zheng:
Identity-based proxy signature over NTRU lattice. Int. J. Communication Systems 32(3) (2019) - [j15]Tian Wang, Jiyuan Zhou, Wenhua Wang, Guangxue Zhang, Ming Huang, Yongxuan Lai:
A personal local area information interaction system based on NFC and Bluetooth technology. IJHPCN 13(4): 455-463 (2019) - [j14]Tian Wang, Wenhua Wang, Anfeng Liu, Shaobin Cai, Jiannong Cao:
Improve the Localization Dependability for Cyber-Physical Applications. TCPS 3(1): 6:1-6:21 (2019) - 2018
- [j13]Fuli Zhu, Lingen Chen, Wenhua Wang:
Thermodynamic Analysis of an Irreversible Maisotsenko Reciprocating Brayton Cycle. Entropy 20(3): 167 (2018) - [j12]Tian Wang, Wenhua Wang, Yongxuan Lai, Diwen Xu, Haixing Miao, Qun Wu:
Optimising order selection algorithm based on online taxi-hailing applications. IJCSE 17(1): 34-42 (2018) - [c17]Faguo Wu, Wang Yao, Xiao Zhang, Zhiming Zheng, Wenhua Wang:
Identity Based Privacy Information Sharing with Similarity Test in Cloud Environment. ICCCS (3) 2018: 69-78 - 2017
- [j11]Tian Wang, Wenhua Wang, Yongxuan Lai, Sheng Wen, Hui Tian, Yiqiao Cai, Yonghong Chen, Baowei Wang:
The Chaotic Video Surveillance in Mobile Camera Sensor Networks: Improving the Efficiency and Security. Ad Hoc & Sensor Wireless Networks 37(1-4): 95-115 (2017) - [j10]Tian Wang, Wenhua Wang, Jiannong Cao
, Md. Zakirul Alam Bhuiyan
, Yongxuan Lai, Yiqiao Cai, Hui Tian, Yonghong Chen, Baowei Wang:
Interoperable localization for mobile group users. Computer Communications 105: 53-65 (2017) - 2016
- [j9]Zhao Wang, Xiao Zhang, Sitao Wang, Zhiming Zheng, Wenhua Wang:
Construction of Boolean functions with excellent cryptographic criteria using bivariate polynomial representation. Int. J. Comput. Math. 93(3): 425-444 (2016) - [j8]Wenhua Wang, Sreedevi Sampath, Yu Lei, Raghu Kacker, D. Richard Kuhn, James Lawrence:
Using combinatorial testing to build navigation graphs for dynamic web applications. Softw. Test., Verif. Reliab. 26(4): 318-346 (2016) - [c16]Wenhua Wang, Tian Wang, Md. Zakirul Alam Bhuiyan
, Yiqiao Cai, Hui Tian, Yonghong Chen:
Improving the Localization Probability and Decreasing Communication Cost for Mobile Users. SpaCCS Workshops 2016: 197-207 - 2014
- [c15]Wenhua Wang, Weiwei Xia, Rui Zhang, Lianfeng Shen:
Design and implementation of gateway and server in an indoor high-precision positioning system. GCCE 2014: 540-541 - 2013
- [j7]Jianbin Xue, Ting Zhang, Yan Yan, Wenhua Wang, Songbai Li:
Cooperation-based Ant Colony Algorithm in WSN. JNW 8(4): 939-946 (2013) - [j6]Jianbin Xue, Wenhua Wang, Ting Zhang, Songbai Li:
Sleep mode operation for IEEE 802.16e UGS based WiMAX. Telecommunication Systems 53(1): 123-129 (2013) - [j5]Jianbin Xue, Ting Zhang, Songbai Li, Wenhua Wang:
An adaptive dual-threshold power saving mechanism in WiMAX. Telecommunication Systems 53(1): 131-137 (2013) - [c14]Jianbin Xue, Lijing Qin, Wenhua Wang:
The Binary Anti-Collision Algorithm Based on Labeled Packet. BIC-TA 2013: 97-102 - 2012
- [j4]Dazhi Zhang, Donggang Liu, Yu Lei, David Chenho Kung, Christoph Csallner, Nathaniel Nystrom, Wenhua Wang:
SimFuzz: Test case similarity directed deep fuzzing. Journal of Systems and Software 85(1): 102-111 (2012) - [c13]Yi-Chung Chen, Wenhua Wang, Hai Li
, Wei Zhang
:
Non-volatile 3D stacking RRAM-based FPGA. FPL 2012: 367-372 - [c12]Yi-Chung Chen, Wenhua Wang, Wei Zhang
, Hai Li
:
uBRAM-based run-time reconfigurable FPGA and corresponding reconfiguration methodology. FPT 2012: 80-86 - 2011
- [c11]Wenhua Wang, Yu Lei, Donggang Liu, David Chenho Kung, Christoph Csallner, Dazhi Zhang, Raghu Kacker, Rick Kuhn:
A combinatorial approach to detecting buffer overflow vulnerabilities. DSN 2011: 269-278 - 2010
- [j3]Fei Wu, Wenhua Wang, Yi Yang
, Yueting Zhuang, Feiping Nie:
Classification by semi-supervised discriminative regularization. Neurocomputing 73(10-12): 1641-1651 (2010) - [j2]Jian Wang, Wenhua Wang, Ru Huang, Yunpeng Pei, Shoubin Xue, Xin'an Wang, Chunhui Fan, Yangyuan Wang:
Deteriorated radiation effects impact on the characteristics of MOS transistors with multi-finger configuration. Microelectronics Reliability 50(8): 1094-1097 (2010) - [c10]Yi Yang, Feiping Nie, Shiming Xiang, Yueting Zhuang, Wenhua Wang:
Local and Global Regressive Mapping for Manifold Learning with Out-of-Sample Extrapolation. AAAI 2010 - [c9]Dazhi Zhang, Donggang Liu, Yu Lei, David Chenho Kung, Christoph Csallner, Wenhua Wang:
Detecting vulnerabilities in C programs using trace-based testing. DSN 2010: 241-250
2000 – 2009
- 2009
- [c8]Wenhua Wang, Qinguo Shen, Yu Song, Chunyong Han:
New MRAI setup mechanism for enhancing BGP route convergence. ICAT 2009: 1-7 - [c7]Wenhua Wang, Yu Lei, Sreedevi Sampath, Raghu Kacker, Rick Kuhn, James Lawrence:
A combinatorial approach to building navigation graphs for dynamic web applications. ICSM 2009: 211-220 - 2008
- [c6]Jiang Zhu, Wenhua Wang:
New-Knowledge-View Based Ontology Cloud Model. CSSE (5) 2008: 1140-1143 - [c5]Wenhua Wang, Sreedevi Sampath, Yu Lei, Raghu Kacker:
An Interaction-Based Test Sequence Generation Approach for Testing Web Applications. HASE 2008: 209-218 - [c4]Dazhi Zhang, Wenhua Wang, Donggang Liu, Yu Lei, David Chenho Kung:
Reusing Existing Test Cases for Security Testing. ISSRE 2008: 323-324 - [c3]Yi Yang
, Yueting Zhuang, Wenhua Wang:
Heterogeneous multimedia data semantics mining using content and location context. ACM Multimedia 2008: 655-658 - 2003
- [c2]Wenhua Wang, Wenxing Wang:
Research on parameter estimation of time-varying AR model. PIMRC 2003: 2378-2382
1990 – 1999
- 1992
- [j1]Wen-Ran Zhang, Su-Shing Chen, Wenhua Wang, Ronald S. King:
A cognitive-map-based approach to the coordination of distributed cooperative agents. IEEE Trans. Systems, Man, and Cybernetics 22(1): 103-114 (1992) - [c1]Wen-Ran Zhang, Wenhua Wang, Angela Guercio:
An Open System Protocol for Agent-Oriented Programming. SEKE 1992: 616-623
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org and opencitations.net to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy.
Citation data
Add a list of citing articles from to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter accout. At the same time, Twitter will persitently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2019-11-08 21:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint