
Wenhao Wang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Other persons with the same name
- Wenhao Wang 0001 — Chinese Academy of Sciences, SKLOIS, Institute of Information Engineering, Beijing, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j16]Cheng Pang, Wenhao Wang, Rushi Lan, Zhuo Shi, Xiaonan Luo:
Bilinear pyramid network for flower species categorization. Multim. Tools Appl. 80(1): 215-225 (2021) - 2020
- [j15]Chengliang Sun, Xiaojun Xu, Wenhao Wang
, Haijun Xu:
Influence on Stern Flaps in Resistance Performance of a Caterpillar Track Amphibious Vehicle. IEEE Access 8: 123828-123840 (2020) - [j14]Wenhao Wang:
Detection of panoramic vision pedestrian based on deep learning. Image Vis. Comput. 103: 103986 (2020) - [j13]Yukui Luo
, Wenhao Wang, Scott Best, Yanzhi Wang, Xiaolin Xu:
A High-Performance and Secure TRNG Based on Chaotic Cellular Automata Topology. IEEE Trans. Circuits Syst. 67-I(12): 4970-4983 (2020) - [c31]Wenhao Wang, BenFu Tang, Cheng Zhu, Bin Liu, Aiping Li, Zhaoyun Ding:
Clustering Using a Similarity Measure Approach Based on Semantic Analysis of Adversary Behaviors. DSC 2020: 1-7 - [c30]Yifan Gong, Zheng Zhan, Zhengang Li, Wei Niu, Xiaolong Ma, Wenhao Wang, Bin Ren, Caiwen Ding, Xue Lin, Xiaolin Xu, Yanzhi Wang:
A Privacy-Preserving-Oriented DNN Pruning and Mobile Acceleration Framework. ACM Great Lakes Symposium on VLSI 2020: 119-124 - [i8]Wenhao Wang:
Adapted Center and Scale Prediction: More Stable and More Accurate. CoRR abs/2002.09053 (2020) - [i7]Wenhao Wang, Fang Zhao, Shengcai Liao, Ling Shao:
Attentive WaveBlock: Complementarity-enhanced Mutual Networks for Unsupervised Domain Adaptation in Person Re-identification. CoRR abs/2006.06525 (2020) - [i6]Wenhao Wang, Jing Meng, Duan Chen, Wei Cong:
Scenario Forecast of Cross-border Electric Interconnection towards Renewables in South America. CoRR abs/2009.05194 (2020) - [i5]Kai Zhang, Martin Danelljan, Yawei Li, Radu Timofte, Jie Liu, Jie Tang, Gangshan Wu, Yu Zhu, Xiangyu He, Wenjie Xu, Chenghua Li, Cong Leng, Jian Cheng, Guangyang Wu, Wenyi Wang, Xiaohong Liu, Hengyuan Zhao, Xiangtao Kong, Jingwen He, Yu Qiao, Chao Dong, Xiaotong Luo, Liang Chen, Jiangtao Zhang, Maitreya Suin, Kuldeep Purohit, A. N. Rajagopalan, Xiaochuan Li, Zhiqiang Lang, Jiangtao Nie, Wei Wei, Lei Zhang, Abdul Muqeet, Jiwon Hwang, Subin Yang, Jung Heum Kang, Sung-Ho Bae, Yongwoo Kim, Liang Chen, Jiangtao Zhang, Xiaotong Luo, Yanyun Qu, Geun-Woo Jeon, Jun-Ho Choi, Jun-Hyuk Kim, Jong-Seok Lee, Steven Marty, Éric Marty, Dongliang Xiong, Siang Chen, Lin Zha, Jiande Jiang, Xinbo Gao, Wen Lu, Haicheng Wang, Vineeth Bhaskara, Alex Levinshtein, Stavros Tsogkas, Allan D. Jepson, Xiangzhen Kong, Tongtong Zhao, Shanshan Zhao, Hrishikesh P. S, Densen Puthussery, C. Victor Jiji, Nan Nan, Shuai Liu, Jie Cai, Zibo Meng, Jiaming Ding, Chiu Man Ho, Xuehui Wang, Qiong Yan, Yuzhi Zhao, Long Chen, Jiangtao Zhang, Xiaotong Luo, Liang Chen, Yanyun Qu, Long Sun, Wenhao Wang, Zhenbing Liu, Rushi Lan, Rao Muhammad Umer, Christian Micheloni:
AIM 2020 Challenge on Efficient Super-Resolution: Methods and Results. CoRR abs/2009.06943 (2020) - [i4]Wenhao Wang, Shengcai Liao, Fang Zhao, Cuicui Kang, Ling Shao:
DomainMix: Learning Generalizable Person Re-Identification Without Human Annotations. CoRR abs/2011.11953 (2020)
2010 – 2019
- 2019
- [j12]Wenhao Wang
, Haijun Xu, Xiaojun Xu, Faliang Zhou:
Enhancing the Passing Ability of Unmanned Vehicles Using a Variable-Wheelbase Driving System. IEEE Access 7: 115871-115885 (2019) - [j11]Xiaofeng Ouyang
, Fangling Zeng, Daqian Lv
, Wenhao Wang:
Spatial Power Combining of DSSS Signals From a Sparse Array. IEEE Access 7: 121863-121873 (2019) - [j10]Wenhao Wang
, Ming-Xin Jiang, Xiaobing Chen, Li Hua, Shangbing Gao:
A Tracking Window Adaptive Compressive Tracking Algorithm. Int. J. Pattern Recognit. Artif. Intell. 33(14): 1959045:1-1959045:23 (2019) - [c29]Xipu Hu, Wenhao Wang, Cheng Pang, Rushi Lan, Xiaonan Luo:
Rain-Density Squeeze-and-Excitation Residual Network for Single Image Rain-removal. ICACI 2019: 284-289 - [c28]Kai Zhang, Nan Nan, Chenghua Li, Xueyi Zou, Ning Kang, Zhan Wang, Hang Xu
, Chaofeng Wang, Zheng Li, Linlin Wang, Jun Shi, Shuhang Gu, Wenyu Sun, Zhiqiang Lang, Jiangtao Nie, Wei Wei, Lei Zhang, Yazhe Niu, Peijin Zhuo, Xiangzhen Kong, Long Sun, Wenhao Wang, Radu Timofte, Zheng Hui, Xiumei Wang, Xinbo Gao, Dongliang Xiong
, Shuai Liu, Ruipeng Gang:
AIM 2019 Challenge on Constrained Super-Resolution: Methods and Results. ICCV Workshops 2019: 3565-3574 - [c27]Xiaoxin Chen, Ping Qian, Chen Li, Wenlin He, Wenhao Wang, Xianjun Shao:
Optimized Power Equipment Maintenance Strategy Based on Risk Assessment. ICITEE 2019: 60:1-60:5 - [c26]Wenhao Wang, Xiaobo Lu, Pengguo Zhang, Huibin Xie, Wenbin Zeng:
Driver Action Recognition Based on Attention Mechanism. ICSAI 2019: 1255-1259 - [c25]Wenhao Wang, Cheng Pang, Zhenbing Liu, Rushi Lan, Xiaonan Luo:
SRGNet: A GRU Based Feature Fusion Network for Image Denoising. ISPACS 2019: 1-2 - [c24]Xiaoyang Xu, Masoud Ghaffarinia, Wenhao Wang, Kevin W. Hamlen, Zhiqiang Lin:
CONFIRM: Evaluating Compatibility and Relevance of Control-flow Integrity Protections for Modern Software. USENIX Security Symposium 2019: 1805-1821 - [i3]Kai Zhang, Shuhang Gu, Radu Timofte, Zheng Hui, Xiumei Wang, Xinbo Gao, Dongliang Xiong, Shuai Liu, Ruipeng Gang, Nan Nan, Chenghua Li, Xueyi Zou, Ning Kang, Zhan Wang, Hang Xu, Chaofeng Wang, Zheng Li, Linlin Wang, Jun Shi, Wenyu Sun, Zhiqiang Lang, Jiangtao Nie, Wei Wei, Lei Zhang, Yazhe Niu, Peijin Zhuo, Xiangzhen Kong, Long Sun, Wenhao Wang:
AIM 2019 Challenge on Constrained Super-Resolution: Methods and Results. CoRR abs/1911.01249 (2019) - 2018
- [j9]Wenhao Wang, Ming-Xin Jiang, Yunyang Yan, Xiaobing Chen, Wendong Zhao:
Improved CT algorithm based on target block division and feature points matching. EURASIP J. Image Video Process. 2018: 60 (2018) - [c23]Longyin Wen, Pengfei Zhu, Dawei Du, Xiao Bian, Haibin Ling, Qinghua Hu, Chenfeng Liu, Hao Cheng, Xiaoyu Liu, Wenya Ma, Qinqin Nie, Haotian Wu, Lianjie Wang, Asanka G. Perera
, Baochang Zhang, Byeongho Heo, Chunlei Liu, Dongdong Li, Emmanouil Michail, Hanlin Chen, Hao Liu, Haojie Li, Ioannis Kompatsiaris, Jian Cheng, Jiaqing Fan, Jie Zhang, Jin Young Choi, Jing Li, Jinyu Yang, Jongwon Choi, Juanping Zhao, Jungong Han, Kaihua Zhang, Kaiwen Duan, Ke Song, Konstantinos Avgerinakis, Kyuewang Lee, Lu Ding, Martin Lauer, Panagiotis Giannakeris, Peizhen Zhang, Qiang Wang, Qianqian Xu, Qingming Huang, Qingshan Liu, Robert Laganière, Ruixin Zhang, Sangdoo Yun, Shengyin Zhu, Sihang Wu, Stefanos Vrochidis, Wei Tian
, Wei Zhang, Weidong Chen, Weiming Hu, Wenhao Wang, Wenhua Zhang, Wenrui Ding, Xiaohao He, Xiaotong Li, Xin Zhang, Xinbin Luo, Xixi Hu, Yang Meng, Yangliu Kuai, Yanyun Zhao, Yaxuan Li, Yifan Yang, Yifan Zhang, Yong Wang, Yuankai Qi, Zhipeng Deng, Zhiqun He:
VisDrone-SOT2018: The Vision Meets Drone Single-Object Tracking Challenge Results. ECCV Workshops (5) 2018: 469-495 - [c22]Wenhao Wang, Benjamin Ferrell, Xiaoyang Xu, Kevin W. Hamlen, Shuang Hao:
SEISMIC: SEcure In-lined Script Monitors for Interrupting Cryptojacks. ESORICS (2) 2018: 122-142 - [c21]Jiangyong Shi, Yingzhi Zeng, Wenhao Wang, Yuexiang Yang:
Feedback based Sampling for Intrusion Detection in Software Defined Network. ICCSP 2018: 95-99 - 2017
- [j8]Wenhao Wang
, Zhi Sun, Kui Ren, Bocheng Zhu:
User Capacity of Wireless Physical-Layer Identification. IEEE Access 5: 3353-3368 (2017) - [j7]Wenhao Wang, Xiong Chen, Yuqi Pan:
Strip wrinkling detection based on feature extraction and sparse representation. Int. J. Wirel. Mob. Comput. 12(1): 36-40 (2017) - [j6]Wenhao Wang, Shanlin Sun, Ming-Xin Jiang, Yunyang Yan, Xiaobing Chen:
Traffic lights detection and recognition based on multi-feature fusion. Multim. Tools Appl. 76(13): 14829-14846 (2017) - [c20]Wenhao Wang, Xiaoyang Xu, Kevin W. Hamlen:
Object Flow Integrity. CCS 2017: 1909-1924 - [c19]Yuxiang Feng, Wenhao Wang, Yukai Weng, Huanming Zhang:
A Replay-Attack Resistant Authentication Scheme for the Internet of Things. CSE/EUC (1) 2017: 541-547 - [c18]Siyuan Tan, Wenhao Wang, Bocheng Zhu:
Combined UKF/KF for Fast In-Motion Attitude Determination of SINS. VTC-Fall 2017: 1-6 - 2016
- [j5]Wenhao Wang, Zhi Sun
, Sixu Piao, Bocheng Zhu, Kui Ren
:
Wireless Physical-Layer Identification: Modeling and Validation. IEEE Trans. Inf. Forensics Secur. 11(9): 2091-2106 (2016) - [c17]Wenhao Wang, Fabrice Camut, Benoît Miramond
:
Generation of schedule tables on multi-core systems for AUTOSAR applications. DASIP 2016: 191-198 - [c16]Wenhao Wang, Zhi Sun, Kui Ren, Bocheng Zhu:
Increasing User Capacity of Wireless Physical-Layer Identification in Internet of Things. GLOBECOM 2016: 1-6 - [c15]Wenhao Wang, Zhi Sun, Kui Ren
, Bocheng Zhu:
User capacity of wireless physical-layer identification: An information-theoretic perspective. ICC 2016: 1-6 - [c14]Wenhao Wang, Dongzhi He, Mingdong Fang:
An algorithm for evaluating the influence of micro-blog users. ICIIP 2016: 14 - [c13]Xiaojie Wang, Benedikt Leible, Wenhao Wang, David Rorich, Stephan ten Brink:
Joint IQ imbalance compensation and channel estimation in coherent optical OFDM systems. ICSPCS 2016: 1-6 - 2015
- [j4]Wenhao Wang, Zhi Sun, Bocheng Zhu:
Modeling the Seismic Impacts on Communication Networks in Smart Grid. Int. J. Distributed Sens. Networks 11: 587640:1-587640:10 (2015) - [c12]Keyi Zhang, Ping Zhao, Hongfei Yao, Jie Liu, Wenzhe Shi, Wenhao Wang, Zhenjin Wang, Bo Li:
An Improved 3D Location Algorithm Model Research Based on Directional TD-MUSIC. SmartCity 2015: 581-585 - [i2]Wenhao Wang, Zhi Sun, Kui Ren, Bocheng Zhu, Sixu Piao:
Wireless Physical-Layer Identification: Modeling and Validation. CoRR abs/1510.08485 (2015) - [i1]Wenhao Wang, Zhi Sun, Kui Ren, Bocheng Zhu:
User Capacity of Wireless Physical-layer Identification: An Information-theoretic Perspective. CoRR abs/1511.00150 (2015) - 2013
- [c11]Wenhao Wang, Chen Zhang, Quan Zhang:
An Anomaly Detection Model Based on Cloud Model and Danger Theory. ISCTCS 2013: 115-122 - 2011
- [j3]Todd Arbogast
, Wen-Hao Wang:
Stability, Monotonicity, Maximum and Minimum Principles, and Implementation of the Volume Corrected Characteristic Method. SIAM J. Sci. Comput. 33(4): 1549-1573 (2011) - [c10]Xiuqin Lin, Wenhao Wang, Bin Wu:
A complementary method to determine semantic orientations of words based on WordNet. FSKD 2011: 1738-1740 - [c9]Wenhao Wang, Toshikazu Kato:
Visual Perception Model for Sense of Materials. HCI (23) 2011: 365-368 - 2010
- [j2]Todd Arbogast
, Wen-Hao Wang:
Convergence of a Fully Conservative Volume Corrected Characteristic Method for Transport Problems. SIAM J. Numer. Anal. 48(3): 797-823 (2010)
2000 – 2009
- 2009
- [c8]Chia-Te Liao, Shang-Hong Lai
, Wen-Hao Wang:
A hierarchical image kernel with application to pedestrian identification for video surveillance. ICIP 2009: 1125-1128 - 2006
- [c7]Chi-Jiunn Wu, Hui-Chi Zeng, Szu-Hao Huang, Shang-Hong Lai
, Wen-Hao Wang:
Learning-Based Interactive Video Retrieval System. ICME 2006: 1785-1788 - [c6]Wen-Hao Wang, Ruei-Cheng Wu:
Fusion of Luma and Chroma GMMs for HMM-Based Object Detection. PSIVT 2006: 573-581 - 2005
- [c5]Szu-Hao Huang, Qi-Jiunn Wu, KaiYeuh Chang, Hsin-Cheang Lin, Shang-Hong Lai
, Wen-Hao Wang, Yu-Sheng Tsai, Chia-Lun Chen, Guanrong Chen:
Intelligent home video management system. ITRE 2005: 176-180 - [c4]Wen-Hao Wang, Fu-Jen Hsiao, Tsuhan Chen:
Directional Feature Detection and Correspondence. PCM (2) 2005: 665-675 - 2003
- [c3]Chiang-Cheng Chiang, Wen-Hao Wang:
Decentralized robust adaptive fuzzy controller for large-scale nonlinear uncertain systems. FUZZ-IEEE 2003: 436-440 - 2002
- [c2]Wen-Hao Wang, Chieh-Chih Chang, Ming-Fen Lin:
Implementation of Live Video Transmission in MPEG-4 3D Scene. IEEE Pacific Rim Conference on Multimedia 2002: 1243-1250
1990 – 1999
- 1997
- [j1]Wen-Hao Wang, Yung-Chang Chen:
Image registration by control points pairing using the invariant properties of line segments. Pattern Recognit. Lett. 18(3): 269-281 (1997) - 1994
- [c1]Wen-Hao Wang, Wen-Nung Lie, Yung-Chang Chen:
A Fuzzy-Computing Method for Rotation-Invariant Image Tracking. ICIP (1) 1994: 540-544
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2021-01-14 22:56 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint