


Остановите войну!
for scientists:


default search action
An Wang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information

Other persons with the same name
- An Wang 0001
— Chinese Academy of Sciences, Institute of Information Engineering, State Key Laboratory of Information Security, Beijing, China (and 3 more)
- An Wang 0002
— Case Western Reserve University, Cleveland, Ohio, USA (and 1 more)
- An Wang 0003 — University of Washington, Seattle, WA, USA
- An Wang 0004 — Nanjing University of Information Science and Technology, Nanjing, China
- An Wang 0005 — Shandong University, Jinan, China
- An Wang 0006 — University of Western Ontario, Canada
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [i4]Youmi Ma, An Wang, Naoaki Okazaki:
DREEAM: Guiding Attention with Evidence for Improving Document-Level Relation Extraction. CoRR abs/2302.08675 (2023) - 2022
- [j21]Hua Su
, Jinwen Jiang, An Wang
, Wei Zhuang
, Xiao-Hai Yan
:
Subsurface Temperature Reconstruction for the Global Ocean from 1993 to 2020 Using Satellite Observations and Deep Learning. Remote. Sens. 14(13): 3198 (2022) - [j20]Qinghe Zhao
, Yaru Jing, An Wang, Zaihui Yu, Yi Liu, Jinhai Yu, Guoshun Liu, Shengyan Ding:
Response of Sediment Connectivity to Altered Convergence Processes Induced by Forest Roads in Mountainous Watershed. Remote. Sens. 14(15): 3603 (2022) - [j19]Qinghe Zhao
, An Wang, Yaru Jing, Guiju Zhang, Zaihui Yu, Jinhai Yu, Yi Liu, Shengyan Ding:
Optimizing Management Practices to Reduce Sediment Connectivity between Forest Roads and Streams in a Mountainous Watershed. Remote. Sens. 14(19): 4897 (2022) - [j18]An Wang
, Ren Togo
, Takahiro Ogawa
, Miki Haseyama
:
Defect Detection of Subway Tunnels Using Advanced U-Net Network. Sensors 22(6): 2330 (2022) - [c18]Ao Liu, An Wang, Naoaki Okazaki:
Semi-Supervised Formality Style Transfer with Consistency Training. ACL (1) 2022: 4689-4701 - [c17]An Wang, Ren Togo, Takahiro Ogawa, Miki Haseyama:
Multi-scale Defect Detection from Subway Tunnel Images with Spatial Attention Mechanism. ICCE-TW 2022: 305-306 - [c16]An Wang, Hua Su, Xiao-Hai Yan:
Ai-Based Downscaling of Ocean Subsurface Salinity from Remote Sensing Perspective. IGARSS 2022: 6982-6985 - [c15]An Wang
, Mobarakol Islam
, Mengya Xu, Hongliang Ren:
Rethinking Surgical Instrument Segmentation: A Background Image Can Be All You Need. MICCAI (8) 2022: 355-364 - [d1]An Wang, Mobarakol Islam, Mengya Xu, Hongliang Ren:
OneToMany_ToolSynSeg. IEEE DataPort 2022 - [i3]An Wang, Ao Liu, Hieu Hanh Le, Haruo Yokota:
Towards Effective Multi-Task Interaction for Entity-Relation Extraction: A Unified Framework with Selection Recurrent Network. CoRR abs/2202.07281 (2022) - [i2]Ao Liu, An Wang, Naoaki Okazaki:
Semi-Supervised Formality Style Transfer with Consistency Training. CoRR abs/2203.13620 (2022) - [i1]An Wang
, Mobarakol Islam
, Mengya Xu, Hongliang Ren:
Rethinking Surgical Instrument Segmentation: A Background Image Can Be All You Need. CoRR abs/2206.11804 (2022) - 2021
- [j17]Hua Su
, An Wang, Tianyi Zhang, Tian Qin, Xiaoping Du, Xiao-Hai Yan:
Super-resolution of subsurface temperature field from remote sensing observations based on machine learning. Int. J. Appl. Earth Obs. Geoinformation 102: 102440 (2021) - [j16]Hua Su
, Tian Qin, An Wang, Wenfang Lu
:
Reconstructing Ocean Heat Content for Revisiting Global Ocean Warming from Remote Sensing Perspectives. Remote. Sens. 13(19): 3799 (2021) - [c14]Junfeng Jiang, An Wang, Akiko Aizawa:
Attention-based Relational Graph Convolutional Network for Target-Oriented Opinion Words Extraction. EACL 2021: 1986-1997 - [c13]Zhixuan Gao, Shuang Wang, Yaoling Ding, An Wang, Qingjun Yuan:
Correlation Power Analysis and Protected Implementation on Block Cipher RainDrop. FCS 2021: 308-323 - 2020
- [j15]Congming Wei
, Jiazhe Chen, An Wang, Beibei Wang, Hongsong Shi, Xiaoyun Wang:
x-only coordinate: with application to secp256k1 " >Chosen base-point side-channel attack on Montgomery ladder with x-only coordinate: with application to secp256k1. IET Inf. Secur. 14(5): 483-492 (2020) - [j14]Wei Liao, Lijun Zhou, Dongyang Wang, An Wang, Lei Guo, Yi Cui
:
A Diagnostic Method for Moisture Intrusion Fault in OIP Bushing. IEEE Trans. Instrum. Meas. 69(9): 7072-7081 (2020)
2010 – 2019
- 2019
- [j13]Yongzhuang Wei
, Fu Yao, Enes Pasalic, An Wang:
New second-order threshold implementation of AES. IET Inf. Secur. 13(2): 117-124 (2019) - [j12]An Wang, Yang Cao
, Jingxian Chen
:
Modified Newton-Type Iteration Methods for Generalized Absolute Value Equations. J. Optim. Theory Appl. 181(1): 216-230 (2019) - [j11]Mingyue Yuan, Dong Yin, Jinwen Ding, Zhipeng Zhou
, Chengfeng Zhu, Rui Zhang, An Wang:
A multi-image Joint Re-ranking framework with updateable Image Pool for person re-identification. J. Vis. Commun. Image Represent. 59: 527-536 (2019) - [j10]Yang Cao
, An Wang:
Two-step modulus-based matrix splitting iteration methods for implicit complementarity problems. Numer. Algorithms 82(4): 1377-1394 (2019) - [c12]An Wang, Ren Togo, Takahiro Ogawa
, Miki Haseyama:
Detection of Distress Region from Subway Tunnel Images via U-net-based Deep Semantic Segmentation. GCCE 2019: 766-767 - [c11]Xiaoqian Lv, An Wang, Qinglin Liu, Jiamin Sun, Shengping Zhang:
Proposal-Refined Weakly Supervised Object Detection in Underwater Images. ICIG (1) 2019: 418-428 - [c10]An Wang, Mingxue Liao, Pin Lv:
A Knowledge Selection Model in Pointer-Generator Dialogue Systems. ICNC-FSKD 2019: 451-458 - [c9]Wenzheng Li
, Yijun Gu, An Wang, Kunming Li:
Improvement of Ego Network Detection Algorithm Based on Cluster Validity Index. ISI 2019: 35-40 - 2018
- [j9]An Wang, Guoliang Gong, Rongxuan Shen, Wenyu Mao, Huaxiang Lu, Ke Wang, Junping Wang:
Tracking the multi-well surface dynamometer card state for a sucker-rod pump by using a particle filter. IET Commun. 12(16): 2058-2066 (2018) - [j8]Yuhao Luo, Dong Yin
, An Wang, Wentao Wu:
Pedestrian tracking in surveillance video based on modified CNN. Multim. Tools Appl. 77(18): 24041-24058 (2018) - [j7]Dan Li, Jiazhe Chen, An Wang, Xiaoyun Wang:
Analysis of Software Implemented Low Entropy Masking Schemes. Secur. Commun. Networks 2018: 7206835:1-7206835:8 (2018) - [c8]Dong Yin, Yu-Qing Miao, Kang Qiu, An Wang:
Study on Human Body Action Recognition. CCBR 2018: 87-95 - [c7]Chengyuan Tang, Runzi Liu, Min Sheng, An Wang, Ningbo Song, Jiandong Li, Weihua Wu:
Task-oriented Resource Management Simulation Platform for Space Information Networks. WCSP 2018: 1-7 - 2017
- [j6]Wuyin Jin
, Qian Lin, An Wang, Chun-Ni Wang
:
Computer Simulation of Noise Effects of the Neighborhood of Stimulus Threshold for a Mathematical Model of Homeostatic Regulation of Sleep-Wake Cycles. Complex. 2017: 4797545:1-4797545:7 (2017) - [j5]Danhui Wang, An Wang:
Bitwise Collision Attack Based on Second-Order Distance. KSII Trans. Internet Inf. Syst. 11(3): 1802-1819 (2017) - 2014
- [j4]Yu Xiao
, Yong Cui, Petri Savolainen, Matti Siekkinen
, An Wang, Liu Yang, Antti Ylä-Jääski
, Sasu Tarkoma
:
Modeling Energy Consumption of Data Transmission Over Wi-Fi. IEEE Trans. Mob. Comput. 13(8): 1760-1773 (2014) - [c6]Danhui Wang, An Wang, Xuexin Zheng:
Fault-Tolerant Linear Collision Attack: A Combination with Correlation Power Analysis. ISPEC 2014: 232-246 - 2013
- [j3]An Wang, Jin Chen, Yueming Cai, Chunxiao Cai, Wendong Yang, Yunpeng Cheng:
Joint subcarrier and power allocation for physical layer security in cooperative OFDMA networks. EURASIP J. Wirel. Commun. Netw. 2013: 193 (2013) - [j2]Xuexin Zheng, An Wang, Wei Wei:
First-order collision attack on protected NTRU cryptosystem. Microprocess. Microsystems 37(6-7): 601-609 (2013) - [c5]An Wang, Yueming Cai, Wendong Yang, Zhao Hou:
A Stackelberg security game with cooperative jamming over a multiuser OFDMA network. WCNC 2013: 4169-4174 - 2012
- [c4]An Wang, Jechang Jeong:
Deinterlacing using multi direction detection with fixed adaptive tap interpolation filter. BMSB 2012: 1-5 - 2011
- [c3]An Wang, Yueming Cai, Zhao Hou:
A novel resource allocation algorithm in uplink multi-cell OFDMA networks based on game theory. WCSP 2011: 1-4
2000 – 2009
- 2009
- [c2]Yong Liu, Long Zhang, Ling Zhu, Yikun Wang, An Wang, Feng Yu:
Non-Invasive Method for Detecting Skin Autofluorescence of Advanced Glycation End Products. BMEI 2009: 1-3 - 2006
- [j1]Ralph O. Buchal, An Wang:
CMM sequence optimisation with collision detection. Int. J. Comput. Appl. Technol. 26(1/2): 65-74 (2006)
1950 – 1959
- 1952
- [c1]An Wang:
Static magnetic memory: its applications to computers and controlling systems. ACM National Meeting (Pittsburgh) 1952: 207-212
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2023-03-29 01:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint