


Остановите войну!
for scientists:


default search action
Huanhuan Wang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j40]Huanhuan Wang, Xiao Zhang, Youbing Xia, Xiang Wu:
An intelligent blockchain-based access control framework with federated learning for genome-wide association studies. Comput. Stand. Interfaces 84: 103694 (2023) - [j39]Shanshan Zhi, Huanhuan Wang:
A search ranking algorithm for web information retrieval. Int. J. Commun. Networks Distributed Syst. 29(2): 113-124 (2023) - [j38]Jiagong Wang
, Libo Xu, Xin Yu, Huanda Lu, Zhenrui Huang, Huanhuan Wang
, Chaoyi Pang:
A non-definitive auto-transfer mechanism for arbitrary style transfers. Knowl. Based Syst. 260: 110171 (2023) - [j37]Leilei Wei, Huanhuan Wang:
Local discontinuous Galerkin method for multi-term variable-order time fractional diffusion equation. Math. Comput. Simul. 203: 685-698 (2023) - [j36]Huanhuan Wang, Xiang Wu
:
IPP: An Intelligent Privacy-Preserving Scheme for Detecting Interactions in Genome Association Studies. IEEE ACM Trans. Comput. Biol. Bioinform. 20(1): 455-464 (2023) - 2022
- [j35]Huanhuan Wang
, Libo Xu
, Zhenrui Huang, Jiagong Wang:
Co-Training Method Based on Semi-Decoupling Features for MOOC Learner Behavior Prediction. Axioms 11(5): 223 (2022) - [j34]Adrie A. Koehler
, Zui Cheng
, Holly Fiock, Huanhuan Wang
, Shamila Janakiraman
, Katherine Chartier:
Examining students' use of online case-based discussions to support problem solving: Considering individual and collaborative experiences. Comput. Educ. 179: 104407 (2022) - [j33]Huanhuan Wang, Xiao Zhang, Youbing Xia, Xiang Wu
:
A differential privacy-preserving deep learning caching framework for heterogeneous communication network systems. Int. J. Intell. Syst. 37(12): 11142-11166 (2022) - [j32]Huanhuan Wang, Guyang Yang, Lijuan Feng:
Quantitative analysis the similarity of appearance color of white porcelain in xing and ding kilns based on chromaticity. J. Comput. Methods Sci. Eng. 22(5): 1573-1581 (2022) - [j31]Qiangwei Zhou
, Pengpeng Guan, Zhixian Zhu, Sheng Cheng, Cong Zhou, Huanhuan Wang, Qian Xu, Wing-Kin Sung, Guoliang Li
:
ASMdb: a comprehensive database for allele-specific DNA methylation in diverse organisms. Nucleic Acids Res. 50(D1): 60-71 (2022) - [j30]Xiang Wu
, Yongting Zhang
, Aming Wang, Minyu Shi, Huanhuan Wang, Lian Liu:
MNSSp3: Medical big data privacy protection platform based on Internet of things. Neural Comput. Appl. 34(14): 11491-11505 (2022) - [j29]Huanhuan Wang, Jonathan D. Muller, Fyodor Tatarinov, Dan Yakir, Eyal Rotenberg:
Disentangling Soil, Shade, and Tree Canopy Contributions to Mixed Satellite Vegetation Indices in a Sparse Dry Forest. Remote. Sens. 14(15): 3681 (2022) - [j28]Ahmed Tlili, Ronghuai Huang, Boulus Shehata, Dejian Liu, Jialu Zhao, Ahmed Hosny Saleh Metwally
, Huanhuan Wang
, Mouna Denden
, Aras Bozkurt
, Lik-Hang Lee
, Dogus Beyoglu, Fahriye Altinay, Ramesh C. Sharma, Zehra Altinay, Zhisheng Li, Jiahao Liu, Faizan Ahmad, Ying Hu, Soheil Salha, Mourad Abed, Daniel Burgos:
Is Metaverse in education a blessing or a curse: a combined content and bibliometric analysis. Smart Learn. Environ. 9(1): 24 (2022) - 2021
- [j27]Minyu Shi
, Yongting Zhang
, Huanhuan Wang
, Junfeng Hu, Xiang Wu
:
A Clonal Selection Optimization System for Multiparty Secure Computing. Complex. 2021: 7638394:1-7638394:14 (2021) - [j26]Huanhuan Wang, Debin Cheng, Hui Peng:
Phishing website detection method based on CNAIR framework. Int. J. Inf. Priv. Secur. Integr. 5(1): 18-35 (2021) - [j25]Jingjing Wang, Qingan Qiu
, Huanhuan Wang
:
Joint optimization of condition-based and age-based replacement policy and inventory policy for a two-unit series system. Reliab. Eng. Syst. Saf. 205: 107251 (2021) - [j24]Jing-jing Wang, Qingan Qiu
, Huanhuan Wang
, Cong Lin:
Optimal condition-based preventive maintenance policy for balanced systems. Reliab. Eng. Syst. Saf. 211: 107606 (2021) - [j23]Kaijian Xia, Xiang Wu, Yaqing Mao, Huanhuan Wang:
Secure DNA Motif-Finding Method Based on Sampling Candidate Pruning. ACM Trans. Internet Techn. 21(3): 58:1-58:19 (2021) - [c14]Huanhuan Wang, Ahmed Tlili, Xiaoyu Zhong, Zhenyu Cai, Ronghuai Huang:
The Impact of Gender on Online Learning Behavioral Patterns: A Comparative Study Based on Lag Sequential Analysis. ICALT 2021: 190-194 - [c13]Shangzhi Wu, Huanhuan Wang, Ning Xia, Fan Zhang:
Attribute Reduction Method and Its Application using Bat Algorithm and Rough Sets. ICCAI 2021: 252-256 - 2020
- [j22]Huanhuan Wang, Miao Jiang, Lei Yan, Yunjun Yao, Yu Fu, Shezhou Luo, Yi Lin:
Angular effect in proximal sensing of leaf-level chlorophyll content using low-cost DIY visible/near-infrared camera. Comput. Electron. Agric. 178: 105765 (2020) - [j21]Xiang Wu, Huanhuan Wang, Dashun Wei, Minyu Shi:
ANFIS with natural language processing and gray relational analysis based cloud computing framework for real time energy efficient resource allocation. Comput. Commun. 150: 122-130 (2020) - [j20]Huanhuan Wang, Long Yu
, Shengwei Tian, Shiqi Luo, Xin-jun Pei:
Malicious webpages analysis and detection algorithm based on BiLSTM. Int. J. Electron. Bus. 15(4): 351-367 (2020) - [j19]Huan-huan Wang, Shengwei Tian, Long Yu, Xian-Xian Wang, Qing-Shan Qi, Ji-Hong Chen:
Bidirectional IndRNN malicious webpages detection algorithm based on convolutional neural network and attention mechanism. J. Intell. Fuzzy Syst. 38(2): 1929-1941 (2020) - [j18]Xin-jun Pei, Long Yu, Shengwei Tian, Huan-huan Wang, Yongfang Peng:
Combining multi-features with a neural joint model for Android malware detection. J. Intell. Fuzzy Syst. 38(2): 2151-2163 (2020) - [j17]Xinjun Pei, Shengwei Tian, Long Yu, Huanhuan Wang, Yongfang Peng:
A Two-Stream Network Based on Capsule Networks and Sliced Recurrent Neural Networks for DGA Botnet Detection. J. Netw. Syst. Manag. 28(4): 1694-1721 (2020) - [j16]Xiang Wu
, Huanhuan Wang, Wei Tan, Dashun Wei, Minyu Shi:
Dynamic allocation strategy of VM resources with fuzzy transfer learning method. Peer-to-Peer Netw. Appl. 13(6): 2201-2213 (2020) - [c12]Ronghuai Huang, Huanhuan Wang
, Wei Zhou, Jing Du, Ting-Wen Chang, Dejian Liu:
A Computing Engine for the New Generation of Learning Environments. ICALT 2020: 293-294
2010 – 2019
- 2019
- [j15]Xiang Wu
, Huanhuan Wang, Minyu Shi, Aming Wang, Kaijian Xia
:
DNA Motif Finding Method Without Protection Can Leak User Privacy. IEEE Access 7: 152076-152087 (2019) - [j14]Huan-huan Wang, Long Yu
, Shengwei Tian, Yongfang Peng, Xin-jun Pei:
Bidirectional LSTM Malicious webpages detection algorithm based on convolutional neural network and independent recurrent neural network. Appl. Intell. 49(8): 3016-3026 (2019) - [j13]Tianbao Ren, Huanhuan Wang, Huilin Feng, Chensheng Xu, Guoshun Liu, Pan Ding:
Study on the improved fuzzy clustering algorithm and its application in brain image segmentation. Appl. Soft Comput. 81 (2019) - [j12]Shiqi Luo, Zhiyuan Liu, Bo Li, Huanhuan Wang, Hua Sun, Yong Yuan:
Android Malware Analysis and Detection Based on Attention-CNN-LSTM. J. Comput. 14(1): 31-43 (2019) - 2018
- [j11]Zhen Yang
, Huanhuan Wang, Pengfei Guo, Yuanyuan Ding, Chong Lei, Yongsong Luo:
A Multi-Region Magnetoimpedance-Based Bio-Analytical System for Ultrasensitive Simultaneous Determination of Cardiac Biomarkers Myoglobin and C-Reactive Protein. Sensors 18(6): 1765 (2018) - [j10]Wenyi Qian
, Xin Peng, Huanhuan Wang, John Mylopoulos, Jiahuan Zheng, Wenyun Zhao:
MobiGoal: Flexible Achievement of Personal Goals for Mobile Users. IEEE Trans. Serv. Comput. 11(2): 384-398 (2018) - 2017
- [j9]Huanhuan Wang, Yi Lin, Zeliang Wang, Yunjun Yao, Yuhu Zhang, Ling Wu:
Validation of a low-cost 2D laser scanner in development of a more-affordable mobile terrestrial proximal sensing system for 3D plant structure phenotyping in indoor environment. Comput. Electron. Agric. 140: 180-189 (2017) - [j8]Yanhua Zhuang, Wan-Yi Li, Huanhuan Wang, Song Hong, Haijun Wang:
A Bibliographic Review of Cellular Automaton Publications in the Last 50 Years. J. Cell. Autom. 12(6): 475-492 (2017) - 2016
- [j7]Huanhuan Wang, Xin Peng, Wenyun Zhao:
基于移动设备的个人云服务及资源Mashup (Towards Personal Cloud Service and Resource Mashup Based on Mobile Devices). 计算机科学 43(6): 160-166 (2016) - [j6]Fenglian Liu, Aiwen Lin, Huanhuan Wang, Yuling Peng, Song Hong:
Global research trends of geographical information system from 1961 to 2010: a bibliometric analysis. Scientometrics 106(2): 751-768 (2016) - [c11]Huanhuan Wang, Yingying Guo, Yan Sun, Hong Luo:
An effective pursuing scheme for iBeacon device. ICCE-TW 2016: 1-2 - [c10]Weihua Lei, Qun Yang, Huanhuan Wang:
Positive Influence Maximization Algorithm Based on Three Degrees of Influence. IDEAL 2016: 503-514 - [c9]Mengting Chen, Heather T. Ma, Jie Li, Huanhuan Wang:
Emotion recognition using fixed length micro-expressions sequence and weighting method. RCAR 2016: 427-430 - [c8]Huanhuan Wang, Pai-Ying Hsiao, Byung-Cheol Min
:
Examine the Potential of Robots to Teach Autistic Children Emotional Concepts: A Preliminary Study. ICSR 2016: 571-580 - 2015
- [j5]Huanhuan Wang, Yijian Wu, Wenyun Zhao:
Web应用界面跨浏览器兼容性的自动检测方法 (Automatic Detection Method of Cross-browser Web Application). 计算机科学 42(Z11): 444-449 (2015) - [j4]Wenyi Qian, Xin Peng, Bihuan Chen, John Mylopoulos, Huanhuan Wang, Wenyun Zhao:
Rationalism with a dose of empiricism: combining goal reasoning and case-based reasoning for self-adaptive software systems. Requir. Eng. 20(3): 233-252 (2015) - [c7]Huanhuan Wang, Qun Yang, Lei Fang, Weihua Lei:
Maximizing Positive Influence in Signed Social Networks. ICCCS 2015: 356-367 - 2014
- [j3]Jinfu Chen, Qing Li, Chengying Mao
, Dave Towey
, Yongzhao Zhan, Huanhuan Wang:
A Web services vulnerability testing approach based on combinatorial mutation and SOAP message mutation. Serv. Oriented Comput. Appl. 8(1): 1-13 (2014) - [c6]Huanhuan Wang, Xiaoyu Liu, Yi Chen:
Detection of capsule foreign matter defect based on BP neural network. GrC 2014: 325-328 - [c5]Wenyi Qian, Xin Peng, Bihuan Chen, John Mylopoulos, Huanhuan Wang, Wenyun Zhao:
Rationalism with a dose of empiricism: Case-based reasoning for requirements-driven self-adaptation. RE 2014: 113-122 - 2013
- [j2]Huanhuan Wang, Bin Hu, Hu Li:
An agent-based simulation study for exploring organisation design under environmental uncertainty. Int. J. Simul. Process. Model. 8(2/3): 118-132 (2013) - [c4]Jinfu Chen, Qing Li, Huanhuan Wang, Rubing Huang
:
Describing Component Behavior Using Improved Chemical Abstract Machine. COMPSAC 2013: 605-606 - 2012
- [j1]Jinfu Chen, Yansheng Lu, Huanhuan Wang:
Component Security Testing Approach Based on Extended Chemical Abstract Machine. Int. J. Softw. Eng. Knowl. Eng. 22(1): 59-83 (2012) - [c3]Qing Li, Jinfu Chen, Yongzhao Zhan, Chengying Mao
, Huanhuan Wang:
Combinatorial Mutation Approach to Web Service Vulnerability Testing Based on SOAP Message Mutations. ICEBE 2012: 156-162
2000 – 2009
- 2009
- [c2]Huanhuan Wang, Bin Hu, Guoyin Jiang:
Simulation of Project-based Organizational Design in China: From the Perspective of Contextual Interactions. WSC 2009: 2723-2732 - 2008
- [c1]Jianhu Cai, Huanhuan Wang, Gengui Zhou:
Study on a Two-Echelon Supply Chain VMI Model under Demand Uncertainty. ISECS 2008: 148-152
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2023-03-29 01:38 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint