default search action
Huan Wang 0006
Person information
- affiliation (PhD 2017): Changchun University of Science and Technology, College of Computer Science and Technology, China
Other persons with the same name
- Huan Wang — disambiguation page
- Huan Wang 0001 — Yale University, Computer Science Department, New Haven, CT, USA (and 1 more)
- Huan Wang 0002 — Xi'an Jiaotong University, School of Electronics and Information Engineering, Smiles Laboratory, China
- Huan Wang 0003 — TU München, Institute of Medical Engineering, GarchingGermany (and 2 more)
- Huan Wang 0004 — Nanyang Technological University, School of Computer Engineering, Singapore
- Huan Wang 0005 — Huazhong Agricultural University, College of Informatics, Wuhan, China (and 3 more)
- Huan Wang 0007 — Sun Yat-sen University, School of Geography and Planning, Guangzhou, China
- Huan Wang 0008 — University of California at Irvine, Department of Electrical Engineering and Computer Science, CA, USA
- Huan Wang 0009 — University of Massachusetts, Electrical and Computer Engineering Department, Lowell, MA, USA
- Huan Wang 0010 — Southwest Jiaotong University, School of Information Science and Technology, Chengdu, China
- Huan Wang 0011 — University of Science and Technology Beijing, School of Mechanical Engineering, China
- Huan Wang 0012 — Hohai University, College of IoT Engineerin, Changzhou, China (and 1 more)
- Huan Wang 0013 — Nanjing University of Science and Technology, School of Computer Science and Engineering, China
- Huan Wang 0014 — Northeastern University, Boston, MA, USA (and 1 more)
- Huan Wang 0015 — Tsinghua University, Department of Industrial Engineerin, Beijing, China (and 1 more)
- Huan Wang 0016 — Salesforce Research, AI Research, Palo Alto, CA, USA
- Huan Wang 0017 — University of Victoria, Department of Computer Science, Canada
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j14]Junyuan Yang, Chungui Li, Xingwen Chen, Kejiu Tan, Yuncheng Zhao, Huan Wang, Jie Wang:
Research on Method for Fusion and Mapping of Cyberspace Assets Based on Knowledge Graph. IEEE Access 12: 149061-149075 (2024) - [j13]Yunlong Tang, Jing Sun, Huan Wang, Junyi Deng, Liang Tong, Wenhong Xu:
A method of network attack-defense game and collaborative defense decision-making based on hierarchical multi-agent reinforcement learning. Comput. Secur. 142: 103871 (2024) - [j12]Bing Zhang, Hui Li, Shuai Zhang, Jing Sun, Ning Wei, Wenhong Xu, Huan Wang:
Multi-Constraint and Multi-Policy Path Hopping Active Defense Method Based on SDN. Future Internet 16(4): 143 (2024) - [j11]Bin Ren, Yunlong Tang, Huan Wang, Yichuan Wang, Jianxiong Liu, Ge Gao, Wei Wei:
A Multiagent Deep Reinforcement Learning Autonomous Security Management Approach for Internet of Things. IEEE Internet Things J. 11(15): 25600-25612 (2024) - 2023
- [j10]Junyi Deng, Jikai Deng, Peihao Liu, Huan Wang, Junjie Yan, Deru Pan, Jiahua Liu:
A Survey on Vehicular Cloud Network Security. IEEE Access 11: 136741-136757 (2023) - [j9]Yan Wang, Haifeng Zhang, Yongjun Wei, Huan Wang, Yong Peng, Zhiyan Bin, Weilong Li:
An evolutionary computation-based machine learning for network attack detection in big data traffic. Appl. Soft Comput. 138: 110184 (2023) - [j8]Huan Wang, Xiaoqiang Di, Yan Wang, Bin Ren, Ge Gao, Junyi Deng:
An Intelligent Digital Twin Method Based on Spatio-Temporal Feature Fusion for IoT Attack Behavior Identification. IEEE J. Sel. Areas Commun. 41(11): 3561-3572 (2023) - 2021
- [j7]Huan Wang, Shahid Mumtaz, Houjun Li, Jingxian Liu, Fan Yang:
An identification strategy for unknown attack through the joint learning of space-time features. Future Gener. Comput. Syst. 117: 145-154 (2021) - 2020
- [j6]Hua Li, Lifan Wu, Huan Wang, Cheng Han, Wei Quan, Jianping Zhao:
Hand Gesture Recognition Enhancement Based on Spatial Fuzzy Matching in Leap Motion. IEEE Trans. Ind. Informatics 16(3): 1885-1894 (2020)
2010 – 2019
- 2019
- [j5]Huan Wang, Jian Gu, Xiaoqiang Di, Dan Liu, Jianping Zhao, Xin Sui:
Research on classification and recognition of attacking factors based on radial basis function neural network. Clust. Comput. 22(Supplement): 5573-5585 (2019) - [j4]Xin Sui, Dan Liu, Li Li, Huan Wang, Hongwei Yang:
Virtual machine scheduling strategy based on machine learning algorithms for load balancing. EURASIP J. Wirel. Commun. Netw. 2019: 160 (2019) - [i1]Xu Liu, Xiaoqiang Di, Jinqing Li, Huan Wang, Jianping Zhao, Huamin Yang, Ligang Cong:
Allocating Limited Resources to Protect a Massive Number of Targets using a Game Theoretic Model. CoRR abs/1902.08712 (2019) - 2018
- [j3]Huan Wang, Zhanfang Chen, Jianping Zhao, Xiaoqiang Di, Dan Liu:
A Vulnerability Assessment Method in Industrial Internet of Things Based on Attack Graph and Maximum Flow. IEEE Access 6: 8599-8609 (2018) - [j2]Dan Liu, Xin Sui, Li Li, Zhengang Jiang, Huan Wang, Zetian Zhang, Yan Zeng:
A cloud service adaptive framework based on reliable resource allocation. Future Gener. Comput. Syst. 89: 455-463 (2018) - [j1]Huan Wang, Zhanfang Chen, Xin Feng, Xiaoqiang Di, Dan Liu, Jianping Zhao, Xin Sui:
Research on Network Security Situation Assessment and Quantification Method Based on Analytic Hierarchy Process. Wirel. Pers. Commun. 102(2): 1401-1420 (2018) - [c3]Huan Wang, Zhanfang Chen, Jianping Zhao, Dan Liu, Wei Zhao, Bo Li:
Dynamic Consistency Adjustment Mechanism of Distributed Cloud Data Storage Based on Hotspot. ICIEB 2018: 166-169 - 2017
- [c2]Dan Liu, Yue Zhang, Xin Sui, Yan Zeng, Huan Wang, Li Li:
An Improved Fast Decision Tree Algorithm Based on Attribute Deviation. FSDM 2017: 441-446
2000 – 2009
- 2009
- [c1]Fangchao Yin, Xin Feng, Yonglin Han, Libai He, Huan Wang:
An Improved Intrusion Detection Method in Mobile AdHoc Network. DASC 2009: 527-532
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 20:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint