
Wu Yang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Other persons with the same name
- Wu Yang 0001
— Harbin Engineering University, Information Security Research Center, China (and 1 more)
- Wu Yang 0002 — Sichuan University, Chengdu, China
- Wu Yang 0003
— Huazhong University of Science and Technology, Wuhan, China
- Wu Yang 0004
— Zhejiang University, Hangzhou, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [c28]Mingzhe Han, Jun Wu, Ali Kashif Bashir, Wu Yang, Muhammad Imran, Nidal Nasser:
Adversarial Learning-based Bias Mitigation for Fatigue Driving Detection in Fair-Intelligent IoV. GLOBECOM 2020: 1-6 - [c27]Lianxiao Meng, Lin Yang, Gaigai Tang, Shuangyin Ren, Wu Yang:
An Optimization of Deep Sensor Fusion Based on Generalized Intersection over Union. ICA3PP (2) 2020: 552-562 - [c26]Lianxiao Meng, Shuangyin Ren, Gaigai Tang, Chao Yang, Wu Yang:
UAV Sensor Spoofing Detection Algorithm Based on GPS and Optical Flow Fusion. ICCSP 2020: 146-151 - [c25]Wu Yang, Himanshu Thapliyal:
Low-Power and Energy-Efficient Full Adders With Approximate Adiabatic Logic for Edge Computing. ISVLSI 2020: 312-315 - [c24]Haiying Ma, Ligang Lu, Haitao Qian, Jing Han, Xin Wen, Fanjin Meng, Rahul Singhal, Martin Keim, Yu Huang, Wu Yang:
Fast Bring-Up of an AI SoC through IEEE 1687 Integrating Embedded TAPs and IEEE 1500 Interfaces. ITC 2020: 1-5 - [c23]Hanson Peng, Mao-Yuan Hsia, Man-Ting Pang, I.-Y. Chang, Jeff Fan, Huaxing Tang, Manish Sharma, Wu Yang:
Using Volume Cell-aware Diagnosis Results to Improve Physical Failure Analysis Efficiency. ITC 2020: 1-4
2010 – 2019
- 2019
- [j9]Wanping Liu
, Xiao Wu, Wu Yang, Xiaofei Zhu, Shouming Zhong:
Modeling cyber rumor spreading over mobile social networks: A compartment approach. Appl. Math. Comput. 343: 214-229 (2019) - [j8]Korawit Orkphol
, Wu Yang:
Word Sense Disambiguation Using Cosine Similarity Collaborates with Word2vec and WordNet. Future Internet 11(5): 114 (2019) - [j7]Korawit Orkphol, Wu Yang:
Sentiment Analysis on Microblogging with K-Means Clustering and Artificial Bee Colony. Int. J. Comput. Intell. Appl. 18(3): 1950017:1-1950017:22 (2019) - [c22]Haiying Ma, Rui Guo, Quan Jing, Jing Han, Yu Huang, Rahul Singhal, Wu Yang, Xin Wen, Fanjin Meng:
A Case Study of Testing Strategy for AI SoC. ITC-Asia 2019: 61-66 - 2018
- [c21]Tao Wang, Zhangchun Shi, Junlin Huang, Huaxing Tang, Wu Yang, Junna Zhong:
A case study for using dynamic partitioning based solution in volume diagnosis. DATE 2018: 1001-1002 - [c20]Yang Bai, Wu Yang, Wei Xiao, Chao Gao:
Active Cancellation Stealth Technology Analysis and Verification in Experiment. IIKI 2018: 109-115 - 2017
- [j6]Jiqiang Tang, Wu Yang, Lingyun Zhu, Dong Wang, Xin Feng:
An Adaptive Clustering Approach Based on Minimum Travel Route Planning for Wireless Sensor Networks with a Mobile Sink. Sensors 17(5): 964 (2017) - [c19]Wu-Tung Cheng, Randy Klingenberg, Brady Benware, Wu Yang, Manish Sharma, Geir Eide, Yue Tian, Sudhakar M. Reddy, Yan Pan, Sherwin Fernandes, Atul Chittora:
Automatic Identification of Yield Limiting Layout Patterns Using Root Cause Deconvolution on Volume Scan Diagnosis Data. ATS 2017: 219-224 - [c18]Ning Xie, Mengyuan Ren, Wu Yang, Yang Yang, Heng Tao Shen:
WebPainter: Collaborative Stroke-Based Rendering Through HTML5 and WebGL. Edutainment 2017: 210-217 - 2016
- [j5]Chun-Hou Zheng, Wu Yang, Yanwen Chong, Junfeng Xia
:
Identification of mutated driver pathways in cancer using a multi-objective optimization model. Comput. Biol. Medicine 72: 22-29 (2016) - [c17]Hao Shen, Lance Shen, Pierce Xu, Wu Yang, Junna Zhong:
Application of Data Mining Based Scan Diagnosis Yield Analysis in a Foundry and Fabless Working Environment. ATS 2016: 128 - [c16]Wu Yang, Rui Tang, Ling Lu:
A fused method for news recommendation. BigComp 2016: 341-344 - 2015
- [j4]Zheng Yang
, Wu Yang:
A practical strongly secure one-round authenticated key exchange protocol without random oracles. Secur. Commun. Networks 8(6): 1118-1131 (2015) - [j3]Zheng Yang
, Wu Yang, Lingyun Zhu, Daigu Zhang:
Towards modelling perfect forward secrecy in two-message authenticated key exchange under ephemeral-key revelation. Secur. Commun. Networks 8(18): 3356-3371 (2015) - [c15]Yu Huang, Wu Yang, Wu-Tung Cheng:
Advancements in diagnosis driven yield analysis (DDYA): A survey of state-of-the-art scan diagnosis and yield analysis technologies. ETS 2015: 1-10 - [c14]Wu Yang, Junfeng Xia, Yan Zhang, Chun-Hou Zheng:
Multi-objective Optimization Method for Identifying Mutated Driver Pathways in Cancer. ICIC (2) 2015: 570-576 - 2013
- [c13]Ping Li, Limin Sun, Wu Yang, Qing Fang, Jinyang Xie, Kui Ma:
False Data Attacks Judgment Based on Consistency Loop Model in Wireless Sensor Networks. ICSI (2) 2013: 308-315 - [c12]Ping Li, Limin Sun, Qing Fang, Jinyang Xie, Wu Yang, Kui Ma:
An Study of Indoor Localization Algorithm Based on Imperfect Signal Coverage in Wireless Networks. ICSI (2) 2013: 325-333 - 2012
- [c11]Xiaoqiang Zhao, Xinming Wang, Wu Yang:
An Improved FVS-KPCA Method of Fault Detection on TE Process. ICDMA 2012: 186-189 - [c10]Sendong Zhao, Ding Wang
, Sicheng Zhao, Wu Yang, Chunguang Ma:
Cookie-Proxy: A Scheme to Prevent SSLStrip Attack. ICICS 2012: 365-372 - [c9]Sendong Zhao, Wu Yang, Ding Wang
, Wenzhen Qiu:
A New Scheme with Secure Cookie against SSLStrip Attack. WISM 2012: 214-221 - 2010
- [c8]Wu Yang, Liyun Ren, Rong Tang:
A Dictionary Mechanism for Chinese Word Segmentation Based on the Finite Automata. IALP 2010: 39-42
2000 – 2009
- 2009
- [c7]Zhanglin Guo, Wu Yang, Hao Liu:
The Application of Unascertained Measure Model to the Safety Evaluation of Bofang Coal Seam-Roof Stabiity. DBTA 2009: 115-118 - 2007
- [c6]Wu Yang, Xiuzi Ye:
Approximation of Circular Arcs by C2 Cubic Polynomial B-splines. CAD/Graphics 2007: 417-420 - [c5]Wu Yang, ShuangQing Li, DaiJie Cheng:
A Load Balancing Strategy in Web Cluster System. ICNC (4) 2007: 809-813 - 2006
- [c4]Bo He, Yue Wang, Wu Yang, Yuan Chen:
Fast Algorithm for Mining Global Frequent Itemsets Based on Distributed Database. RSKT 2006: 415-420 - 2005
- [c3]Wu Yang, Ya Luo, Ping Guo, HuangFu Tao, Bo He:
A Model for Classification of Topological Relationships Between Two Spatial Objects. FSKD (2) 2005: 723-726 - [c2]Andreas Leininger, Peter Muhmenthaler, Wu-Tung Cheng, Nagesh Tamarapalli, Wu Yang, Kun-Han Hans Tsai:
Compression mode diagnosis enables high volume monitoring diagnosis flow. ITC 2005: 10 - 2004
- [j2]Falai Chen, Wu Yang:
Degree reduction of disk Be'zier curves. Comput. Aided Geom. Des. 21: 263-280 (2004) - [j1]Wu Yang, Binxing Fang, Bo Liu, Hongli Zhang:
Intrusion detection system for high-speed network. Comput. Commun. 27(13): 1288-1294 (2004) - [c1]Wu Yang, Falai Chen:
Merging a pair of disk Bézier curves. GRAPHITE 2004: 65-70
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2021-02-11 23:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint