default search action
Yuanda Wang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Kun Jiang, Wenzhang Liu, Yuanda Wang, Lu Dong, Changyin Sun:
Discovering Latent Variables for the Tasks With Confounders in Multi-Agent Reinforcement Learning. IEEE CAA J. Autom. Sinica 11(7): 1591-1604 (2024) - [j14]Jingyu Cao, Lu Dong, Xin Yuan, Yuanda Wang, Changyin Sun:
Hierarchical multi-agent reinforcement learning for cooperative tasks with sparse rewards in continuous domain. Neural Comput. Appl. 36(1): 273-287 (2024) - [c19]Zeyu Gao, Hao Wang, Yuanda Wang, Chao Zhang:
Virtual Compiler Is All You Need For Assembly Code Search. ACL (1) 2024: 3040-3051 - [c18]Jiacheng Yang, Yuanda Wang, Lu Dong, Xin Yuan:
Reinforcement Learning with Safe Action Generation for Autonomous Racing. CEC 2024: 1-8 - [i11]Yuanda Wang, Xin Yuan, Changyin Sun:
Learning Autonomous Race Driving with Action Mapping Reinforcement Learning. CoRR abs/2406.14934 (2024) - [i10]Zeyu Gao, Hao Wang, Yuanda Wang, Chao Zhang:
ViC: Virtual Compiler Is All You Need For Assembly Code Search. CoRR abs/2408.06385 (2024) - [i9]Bocheng Chen, Hanqing Guo, Guangjing Wang, Yuanda Wang, Qiben Yan:
The Dark Side of Human Feedback: Poisoning Large Language Models via User Inputs. CoRR abs/2409.00787 (2024) - [i8]Guangjing Wang, Hanqing Guo, Yuanda Wang, Bocheng Chen, Ce Zhou, Qiben Yan:
Protecting Activity Sensing Data Privacy Using Hierarchical Information Dissociation. CoRR abs/2409.03796 (2024) - 2023
- [j13]Kun Jiang, Wenzhang Liu, Yuanda Wang, Lu Dong, Changyin Sun:
Credit assignment in heterogeneous multi-agent reinforcement learning for fully cooperative tasks. Appl. Intell. 53(23): 29205-29222 (2023) - [j12]Olufemi Odegbile, Chaoyi Ma, Shigang Chen, Yuanda Wang:
Policy enforcement in traditional non-SDN networks. J. Parallel Distributed Comput. 177: 39-52 (2023) - [j11]Guangran Cheng, Yuanda Wang, Lu Dong, Wenzhe Cai, Changyin Sun:
Multi-objective deep reinforcement learning for crowd-aware robot navigation with dynamic human preference. Neural Comput. Appl. 35(22): 16247-16265 (2023) - [j10]Xin Yuan, Yuanda Wang, Jian Liu, Changyin Sun:
Action Mapping: A Reinforcement Learning Method for Constrained-Input Systems. IEEE Trans. Neural Networks Learn. Syst. 34(10): 7145-7157 (2023) - [c17]Bocheng Chen, Guangjing Wang, Hanqing Guo, Yuanda Wang, Qiben Yan:
Understanding Multi-Turn Toxic Behaviors in Open-Domain Chatbots. RAID 2023: 282-296 - [c16]Hanqing Guo, Guangjing Wang, Yuanda Wang, Bocheng Chen, Qiben Yan, Li Xiao:
PhantomSound: Black-Box, Query-Efficient Audio Adversarial Attack via Split-Second Phoneme Injection. RAID 2023: 366-380 - [c15]Yuanda Wang, Hanqing Guo, Guangjing Wang, Bocheng Chen, Qiben Yan:
VSMask: Defending Against Voice Synthesis Attack via Real-Time Predictive Perturbation. WISEC 2023: 239-250 - [i7]Yuanda Wang, Hanqing Guo, Guangjing Wang, Bocheng Chen, Qiben Yan:
VSMask: Defending Against Voice Synthesis Attack via Real-Time Predictive Perturbation. CoRR abs/2305.05736 (2023) - [i6]Bocheng Chen, Guangjing Wang, Hanqing Guo, Yuanda Wang, Qiben Yan:
Understanding Multi-Turn Toxic Behaviors in Open-Domain Chatbots. CoRR abs/2307.09579 (2023) - [i5]Hanqing Guo, Guangjing Wang, Yuanda Wang, Bocheng Chen, Qiben Yan, Li Xiao:
PhantomSound: Black-Box, Query-Efficient Audio Adversarial Attack via Split-Second Phoneme Injection. CoRR abs/2309.06960 (2023) - [i4]Guangjing Wang, Ce Zhou, Yuanda Wang, Bocheng Chen, Hanqing Guo, Qiben Yan:
Beyond Boundaries: A Comprehensive Survey of Transferable Attacks on AI Systems. CoRR abs/2311.11796 (2023) - [i3]Yuanda Wang, Qiben Yan, Nikolay Ivanov, Xun Chen:
A Practical Survey on Emerging Threats from AI-driven Voice Attacks: How Vulnerable are Commercial Voice Control Systems? CoRR abs/2312.06010 (2023) - [i2]Wenzhang Liu, Wenzhe Cai, Kun Jiang, Guangran Cheng, Yuanda Wang, Jiawei Wang, Jingyu Cao, Lele Xu, Chaoxu Mu, Changyin Sun:
XuanCe: A Comprehensive and Unified Deep Reinforcement Learning Library. CoRR abs/2312.16248 (2023) - 2022
- [j9]Qiben Yan, Qi Xia, Yuanda Wang, Pan Zhou, Huacheng Zeng:
URadio: Wideband Ultrasound Communication for Smart Home Applications. IEEE Internet Things J. 9(15): 13113-13125 (2022) - [j8]Haibo Wang, Chaoyi Ma, Shigang Chen, Yuanda Wang:
Fast and Accurate Cardinality Estimation by Self-Morphing Bitmaps. IEEE/ACM Trans. Netw. 30(4): 1674-1688 (2022) - [c14]Hanqing Guo, Yuanda Wang, Nikolay Ivanov, Li Xiao, Qiben Yan:
SPECPATCH: Human-In-The-Loop Adversarial Audio Spectrogram Patch Attack on Speech Recognition. CCS 2022: 1353-1366 - [c13]Yuanda Wang, Haibo Wang, Chaoyi Ma, Shigang Chen:
Supporting Real-time Networkwide T-Queries in High-speed Networks. ICDCS 2022: 1-11 - [c12]Haibo Wang, Chaoyi Ma, Shigang Chen, Yuanda Wang:
Online Cardinality Estimation by Self-morphing Bitmaps. ICDE 2022: 1-13 - [c11]Yuanda Wang, Hanqing Guo, Qiben Yan:
GhostTalk: Interactive Attack on Smartphone Voice System Through Power Line. NDSS 2022 - [i1]Yuanda Wang, Hanqing Guo, Qiben Yan:
GhostTalk: Interactive Attack on Smartphone Voice System Through Power Line. CoRR abs/2202.02585 (2022) - 2021
- [j7]Qingling Wang, Yuanda Wang, Changyin Sun:
Cooperative control with designated convergence rate for high-order integrators under heterogeneous couplings. J. Frankl. Inst. 358(9): 4626-4642 (2021) - [c10]Yuanda Wang, Shigang Chen, Ye Xia, Dimitrios Melissourgos, Haibo Wang:
Dynamic Edge-Twin Computing for Vehicle Tracking. CLOUD 2021: 106-111 - [c9]Yuanda Wang, Haibo Wang, Chaoyi Ma, Shigang Chen, Ye Xia:
Supporting Real-Time ${T}$-Queries on Network Traffic with a Cloud-Based Offloading Model. CLOUD 2021: 179-188 - [c8]Yuanda Wang, Ye Xia, Youlin Zhang, Dimitrios Melissourgos, Olufemi Odegbile, Shigang Chen:
A Full Mirror Computation Model for Edge-Cloud Computing. IC3 2021: 132-139 - [c7]Yuanda Wang, Haibo Wang, Shigang Chen, Ye Xia:
A Survey on Mainstream Dimensions of Edge Computing. ICISDM 2021: 46-54 - [c6]Yuanda Wang, Haibo Wang, Shigang Chen, Ye Xia:
Rumor Remove Order Strategy on Social Networks. ICISDM 2021: 128-137 - 2020
- [j6]Jia Sun, Jian Liu, Yuanda Wang, Yao Yu, Changyin Sun:
Fixed-time event-triggered synchronization of a multilayer Kuramoto-oscillator network. Neurocomputing 379: 214-226 (2020) - [j5]Yuanda Wang, Lu Dong, Changyin Sun:
Cooperative control for multi-player pursuit-evasion games with reinforcement learning. Neurocomputing 412: 101-114 (2020) - [j4]Yuanda Wang, Jia Sun, Haibo He, Changyin Sun:
Deterministic Policy Gradient With Integral Compensator for Robust Quadrotor Control. IEEE Trans. Syst. Man Cybern. Syst. 50(10): 3713-3725 (2020) - [c5]Olufemi Odegbile, Shigang Chen, Yuanda Wang, Dimitrios Melissourgos:
Accurate Hierarchical Traffic Measurement in Datacenters Through Differentiated Memory Allocation. BigCom 2020: 122-130 - [c4]Dimitrios Melissourgos, Sishun Wang, Shigang Chen, Youlin Zhang, Olufemi Odegbile, Yuanda Wang:
An Experimental Study on the Impact of Execution Location in Edge-Cloud Computing. BigCom 2020: 145-151 - [c3]Woojae Jeong, Jinhwan Jung, Yuanda Wang, Shuai Wang, Seokwon Yang, Qiben Yan, Yung Yi, Song Min Kim:
SDR receiver using commodity wifi via physical-layer signal reconstruction. MobiCom 2020: 32:1-32:14
2010 – 2019
- 2019
- [j3]Jia Sun, Yuanda Wang, Yao Yu, Changyin Sun:
Nonlinear Robust Compensation Method for Trajectory Tracking Control of Quadrotors. IEEE Access 7: 26766-26776 (2019) - [c2]Olufemi Odegbile, Shigang Chen, Yuanda Wang:
Dependable Policy Enforcement in Traditional Non-SDN Networks. ICDCS 2019: 545-554 - 2018
- [j2]Yuanda Wang, Haibo He, Changyin Sun:
Learning to Navigate Through Complex Dynamic Environment With Modular Deep Reinforcement Learning. IEEE Trans. Games 10(4): 400-412 (2018) - 2016
- [j1]Qingling Wang, Yuanda Wang:
Exponential Consensus in Directed Networks of Multi-Agents with Saturated Protocols. J. Interconnect. Networks 16(2): 1650003:1-1650003:12 (2016) - [c1]Qingling Wang, Yuanda Wang:
Pole placement for discrete-time systems via multiple parametric Lyapunov equations. VSS 2016: 436-441
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-10 22:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint