


default search action
Wu Yang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Wu Yang 0001
— Harbin Engineering University, Information Security Research Center, China (and 1 more)
- Wu Yang 0002 — Sichuan University, Chengdu, China
- Wu Yang 0003
— Guangxi University, Nanning, China (and 1 more)
- Wu Yang 0004
— Zhejiang University, Hangzhou, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j23]Wu Yang, Xing Zhang, Li-Mei Wei, Yan-Wu Wang
, Xiao-Kang Liu:
Concave K∞ function-based adaptive tracking control of nonlinear second-order system. Eur. J. Control 82: 101191 (2025) - 2024
- [j22]Zhao-Min Chen, Jun-Lin Zhan, Hao Chen, Ya Li, Hongjun He, Wu Yang, Zhen-Guo Liu, Wei-Bing Lu:
Robust textile-based spoof plasmonic frequency scanning antenna for on-body IoT applications. Sci. China Inf. Sci. 67(8) (2024) - [j21]Wu Yang, Jie Gao, Qiu Li, Jun Zhang:
Design of RISC-V out-of-order processor based on segmented exclusive or Gshare branch prediction. Microelectron. J. 152: 106334 (2024) - [j20]Yuke Wang
, Ling Lu
, Wu Yang
, Yinong Chen
:
Local or global? A novel transformer for Chinese named entity recognition based on multi-view and sliding attention. Int. J. Mach. Learn. Cybern. 15(6): 2199-2208 (2024) - [j19]Wu Yang, Hongdan Xu
, Shuang Wang:
A limit citation network for identification of core technologies: a case of extreme ultraviolet lithography technology. Technol. Anal. Strateg. Manag. 36(10): 2561-2576 (2024) - [c38]Liangyi Gong, Kunxian Lv, Chun Long, Hao Fu, Huanran Wang, Wei Wan, Wu Yang:
Robust Malicious Domain Detection Based on Spatio-Temporal Hypergraph Networks. ISPA 2024: 2038-2045 - [c37]Milad Tanavardi Nasab, Wu Yang, Himanshu Thapliyal
:
Energy-Efficient Power Analysis Attack Resilient Adiabatic MTJ-Based Nonvolatile CLB. ISVLSI 2024: 469-474 - [c36]Wu Yang, Jinshan Yu, Pearl He, Xijiang Lin:
DFT for Complex Designs and Test Data Management. ITC-Asia 2024: 1 - 2023
- [j18]Ting Shi
, Wu Yang, Ailin Qi, Pengyu Li, Junfei Qiao:
LASSO and attention-TCN: a concurrent method for indoor particulate matter prediction. Appl. Intell. 53(17): 20076-20090 (2023) - [j17]Chunxia Qu
, Ling Lu
, Aijuan Wang, Wu Yang, Yinong Chen
:
Novel multi-domain attention for abstractive summarisation. CAAI Trans. Intell. Technol. 8(3): 796-806 (2023) - [j16]Tyler Cultice
, Joseph Clark, Wu Yang
, Himanshu Thapliyal
:
A Novel Hierarchical Security Solution for Controller-Area-Network-Based 3D Printing in a Post-Quantum World. Sensors 23(24): 9886 (2023) - [j15]Wuzhen Shi
, Dan Li, Yang Wen
, Wu Yang
:
Occlusion-Aware Graph Neural Networks for Skeleton Action Recognition. IEEE Trans. Ind. Informatics 19(10): 10288-10298 (2023) - [c35]Yiran Liu, Xin Feng, Yunlong Wang, Wu Yang, Di Ming
:
TRM-UAP: Enhancing the Transferability of Data-Free Universal Adversarial Perturbation via Truncated Ratio Maximization. ICCV 2023: 4739-4748 - [c34]Yuke Wang
, Ling Lu, Wu Yang, Yinong Chen:
Chinese named entity recognition based on Heterogeneous Graph and Dynamic Attention Network. ISADS 2023: 1-8 - [c33]Lee Harrison, Wu Yang:
Scalable hierarchical DFT technologies for AI, SOC and multi-die : Tutorial 1. ITC-Asia 2023: 1 - 2022
- [j14]Wu Yang, Himanshu Thapliyal
:
Approximate Adiabatic Logic for Low-Power and Secure Edge Computing. IEEE Consumer Electron. Mag. 11(1): 88-94 (2022) - [j13]Jean-François Côté
, Jeff Fan, Sean Shen, Givargis Danialy, Marcin Lipinski, Michael Garbers
, Wu Yang, Martin Keim
, Andreas Glowatz
, Joe Reynick
, Ayush Patel
, Joanna Michna
:
Affordable and Comprehensive Testing of 3-D Stacked Die Devices. IEEE Des. Test 39(5): 17-25 (2022) - [j12]Xiaoqin Xie
, Jiaming Zhang, Wei Wang, Wu Yang:
Attributed community search considering community focusing and latent relationship. Knowl. Inf. Syst. 64(3): 799-829 (2022) - [c32]Wu Yang, Wuzhen Shi:
Detail Generation and Fusion Networks for Image Inpainting. ICASSP 2022: 2335-2339 - [c31]Ting Shi, Ailin Qi, Wu Yang, Pengyu Li, Chengxu Zhou, Ke Gu:
The Effects of Air Pollution and Meteorological Factors in the Transmission and Lethality of COVID-19. IFTC 2022: 465-477 - [c30]Ting Shi, Pengyu Li, Wu Yang, Ailin Qi, Junfei Qiao:
Research on Air Quality Monitoring System Based on STM32 Single Chip Microcomputer. ISPACS 2022: 1-4 - [c29]Wu Yang, Amit Degada, Himanshu Thapliyal
:
Adiabatic Logic-based STT-MRAM Design for IoT. ISVLSI 2022: 235-240 - 2021
- [j11]Xiaoqin Xie
, Jiahui Li, Yi Sheng, Wei Wang, Wu Yang:
Competitive influence maximization considering inactive nodes and community homophily. Knowl. Based Syst. 233: 107497 (2021) - [j10]Wu Yang, Chonglei Zhang
, Jiaqi Zeng, Wei Song:
Ultrasonic signal detection based on Fabry-Perot cavity sensor. Vis. Comput. Ind. Biomed. Art 4(1): 8 (2021) - [c28]Di Qiao, Wu Yang, Wei Wang:
Node-Image CAE: A Novel Embedding Method via Convolutional Auto-encoder and High-Order Proximities. KSEM 2021: 331-345 - 2020
- [c27]Wu Yang, Himanshu Thapliyal
:
Low-Power and Energy-Efficient Full Adders With Approximate Adiabatic Logic for Edge Computing. ISVLSI 2020: 312-315 - [c26]Haiying Ma, Ligang Lu, Haitao Qian, Jing Han, Xin Wen, Fanjin Meng, Rahul Singhal, Martin Keim, Yu Huang, Wu Yang:
Fast Bring-Up of an AI SoC through IEEE 1687 Integrating Embedded TAPs and IEEE 1500 Interfaces. ITC 2020: 1-5 - [c25]Hanson Peng, Mao-Yuan Hsia, Man-Ting Pang, I.-Y. Chang, Jeff Fan, Huaxing Tang, Manish Sharma, Wu Yang:
Using Volume Cell-aware Diagnosis Results to Improve Physical Failure Analysis Efficiency. ITC 2020: 1-4
2010 – 2019
- 2019
- [j9]Wanping Liu
, Xiao Wu, Wu Yang, Xiaofei Zhu, Shouming Zhong:
Modeling cyber rumor spreading over mobile social networks: A compartment approach. Appl. Math. Comput. 343: 214-229 (2019) - [j8]Korawit Orkphol
, Wu Yang:
Word Sense Disambiguation Using Cosine Similarity Collaborates with Word2vec and WordNet. Future Internet 11(5): 114 (2019) - [j7]Korawit Orkphol, Wu Yang:
Sentiment Analysis on Microblogging with K-Means Clustering and Artificial Bee Colony. Int. J. Comput. Intell. Appl. 18(3): 1950017:1-1950017:22 (2019) - [c24]Haiying Ma, Rui Guo, Quan Jing, Jing Han, Yu Huang, Rahul Singhal, Wu Yang, Xin Wen, Fanjin Meng:
A Case Study of Testing Strategy for AI SoC. ITC-Asia 2019: 61-66 - 2018
- [c23]Tao Wang, Zhangchun Shi, Junlin Huang, Huaxing Tang, Wu Yang, Junna Zhong:
A case study for using dynamic partitioning based solution in volume diagnosis. DATE 2018: 1001-1002 - [c22]Yang Bai, Wu Yang, Wei Xiao, Chao Gao:
Active Cancellation Stealth Technology Analysis and Verification in Experiment. IIKI 2018: 109-115 - 2017
- [j6]Jiqiang Tang, Wu Yang, Lingyun Zhu, Dong Wang, Xin Feng:
An Adaptive Clustering Approach Based on Minimum Travel Route Planning for Wireless Sensor Networks with a Mobile Sink. Sensors 17(5): 964 (2017) - [c21]Wu-Tung Cheng, Randy Klingenberg, Brady Benware, Wu Yang, Manish Sharma, Geir Eide, Yue Tian, Sudhakar M. Reddy, Yan Pan, Sherwin Fernandes, Atul Chittora:
Automatic Identification of Yield Limiting Layout Patterns Using Root Cause Deconvolution on Volume Scan Diagnosis Data. ATS 2017: 219-224 - [c20]Ning Xie, Mengyuan Ren, Wu Yang, Yang Yang, Heng Tao Shen:
WebPainter: Collaborative Stroke-Based Rendering Through HTML5 and WebGL. Edutainment 2017: 210-217 - 2016
- [j5]Chun-Hou Zheng, Wu Yang, Yanwen Chong, Junfeng Xia
:
Identification of mutated driver pathways in cancer using a multi-objective optimization model. Comput. Biol. Medicine 72: 22-29 (2016) - [c19]Hao Shen, Lance Shen, Pierce Xu, Wu Yang, Junna Zhong:
Application of Data Mining Based Scan Diagnosis Yield Analysis in a Foundry and Fabless Working Environment. ATS 2016: 128 - [c18]Wu Yang, Rui Tang, Ling Lu:
A fused method for news recommendation. BigComp 2016: 341-344 - 2015
- [j4]Zheng Yang
, Wu Yang:
A practical strongly secure one-round authenticated key exchange protocol without random oracles. Secur. Commun. Networks 8(6): 1118-1131 (2015) - [j3]Zheng Yang
, Wu Yang, Lingyun Zhu, Daigu Zhang:
Towards modelling perfect forward secrecy in two-message authenticated key exchange under ephemeral-key revelation. Secur. Commun. Networks 8(18): 3356-3371 (2015) - [c17]Yu Huang, Wu Yang, Wu-Tung Cheng:
Advancements in diagnosis driven yield analysis (DDYA): A survey of state-of-the-art scan diagnosis and yield analysis technologies. ETS 2015: 1-10 - [c16]Wu Yang, Junfeng Xia, Yan Zhang, Chun-Hou Zheng:
Multi-objective Optimization Method for Identifying Mutated Driver Pathways in Cancer. ICIC (2) 2015: 570-576 - 2013
- [c15]Ping Li, Limin Sun, Wu Yang, Qing Fang, Jinyang Xie, Kui Ma:
False Data Attacks Judgment Based on Consistency Loop Model in Wireless Sensor Networks. ICSI (2) 2013: 308-315 - [c14]Ping Li, Limin Sun, Qing Fang, Jinyang Xie, Wu Yang, Kui Ma:
An Study of Indoor Localization Algorithm Based on Imperfect Signal Coverage in Wireless Networks. ICSI (2) 2013: 325-333 - 2012
- [c13]Xiaoqiang Zhao, Xinming Wang, Wu Yang:
An Improved FVS-KPCA Method of Fault Detection on TE Process. ICDMA 2012: 186-189 - [c12]Sendong Zhao, Ding Wang
, Sicheng Zhao, Wu Yang, Chunguang Ma:
Cookie-Proxy: A Scheme to Prevent SSLStrip Attack. ICICS 2012: 365-372 - [c11]Sendong Zhao, Wu Yang, Ding Wang
, Wenzhen Qiu:
A New Scheme with Secure Cookie against SSLStrip Attack. WISM 2012: 214-221 - 2010
- [c10]Wu Yang, Liyun Ren, Rong Tang:
A Dictionary Mechanism for Chinese Word Segmentation Based on the Finite Automata. IALP 2010: 39-42
2000 – 2009
- 2009
- [c9]Zhanglin Guo, Wu Yang, Hao Liu:
The Application of Unascertained Measure Model to the Safety Evaluation of Bofang Coal Seam-Roof Stabiity. DBTA 2009: 115-118 - 2007
- [c8]Wu Yang, Wu-Tung Cheng, Yu Huang, Martin Keim, Randy Klingenberg:
Scan Diagnosis and Its Successful Industrial Applications. ATS 2007: 215 - [c7]Wu Yang, Xiuzi Ye:
Approximation of Circular Arcs by C2 Cubic Polynomial B-splines. CAD/Graphics 2007: 417-420 - [c6]Wu Yang, ShuangQing Li, DaiJie Cheng:
A Load Balancing Strategy in Web Cluster System. ICNC (4) 2007: 809-813 - 2006
- [c5]Andreas Leininger, Ajay Khoche, Martin Fischer, Nagesh Tamarapalli, Wu-Tung Cheng, Randy Klingenberg, Wu Yang:
The Next Step in Volume Scan Diagnosis: Standard Fail Data Format. ATS 2006: 360-368 - [c4]Bo He, Yue Wang, Wu Yang, Yuan Chen:
Fast Algorithm for Mining Global Frequent Itemsets Based on Distributed Database. RSKT 2006: 415-420 - 2005
- [c3]Wu Yang, Ya Luo, Ping Guo, HuangFu Tao, Bo He:
A Model for Classification of Topological Relationships Between Two Spatial Objects. FSKD (2) 2005: 723-726 - [c2]Andreas Leininger, Peter Muhmenthaler, Wu-Tung Cheng, Nagesh Tamarapalli, Wu Yang, Kun-Han Hans Tsai:
Compression mode diagnosis enables high volume monitoring diagnosis flow. ITC 2005: 10 - 2004
- [j2]Falai Chen, Wu Yang:
Degree reduction of disk Be'zier curves. Comput. Aided Geom. Des. 21: 263-280 (2004) - [j1]Wu Yang, Binxing Fang, Bo Liu, Hongli Zhang:
Intrusion detection system for high-speed network. Comput. Commun. 27(13): 1288-1294 (2004) - [c1]Wu Yang, Falai Chen:
Merging a pair of disk Bézier curves. GRAPHITE 2004: 65-70
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-04-30 20:51 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint