


Остановите войну!
for scientists:
Run Wang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j23]Felix Juefei-Xu, Run Wang, Yihao Huang, Qing Guo, Lei Ma, Yang Liu:
Countering Malicious DeepFakes: Survey, Battleground, and Horizon. Int. J. Comput. Vis. 130(7): 1678-1734 (2022) - [j22]Wenqi Wang
, Lina Wang
, Run Wang
, Aoshuang Ye
, Jianpeng Ke
:
Better constraints of imperceptibility, better adversarial examples in the text. Int. J. Intell. Syst. 37(6): 3440-3459 (2022) - [i12]Run Wang, Ziheng Huang, Zhikai Chen, Li Liu, Jing Chen, Lina Wang:
Anti-Forgery: Towards a Stealthy and Robust DeepFake Disruption Attack via Adversarial Perceptual-aware Perturbations. CoRR abs/2206.00477 (2022) - 2021
- [j21]Wenqi Wang
, Run Wang
, Jianpeng Ke, Lina Wang
:
TextFirewall: Omni-Defending Against Adversarial Texts in Sentiment Classification. IEEE Access 9: 27467-27475 (2021) - [j20]Aoshuang Ye
, Lina Wang
, Run Wang
, Wenqi Wang, Jianpeng Ke, Danlei Wang:
An End-to-End Rumor Detection Model Based on Feature Aggregation. Complex. 2021: 6659430:1-6659430:16 (2021) - [j19]Yuanyuan Liu, Wei Dai, Fang Fang, Yongquan Chen, Rui Huang, Run Wang, Bo Wan:
Dynamic multi-channel metric network for joint pose-aware and identity-invariant facial expression recognition. Inf. Sci. 578: 195-213 (2021) - [j18]Lifei Wei, Kun Wang, Qikai Lu, Yajing Liang, Haibo Li, Zhengxiang Wang, Run Wang, Liqin Cao
:
Crops Fine Classification in Airborne Hyperspectral Imagery Based on Multi-Feature Fusion and Deep Learning. Remote. Sens. 13(15): 2917 (2021) - [j17]Muhammad Afaq Hussain, Zhanlong Chen
, Run Wang
, Muhammad Shoaib:
PS-InSAR-Based Validated Landslide Susceptibility Mapping along Karakorum Highway, Pakistan. Remote. Sens. 13(20): 4129 (2021) - [j16]Run Wang, Somak Dutta, Vivekananda Roy
:
A note on marginal correlation based screening. Stat. Anal. Data Min. 14(1): 88-92 (2021) - [c12]Wenxin Li, Qi Wang, Run Wang, Lei Zhao, Lina Wang:
Exposing DeepFakes via Localizing the Manipulated Artifacts. ICICS (2) 2021: 3-20 - [c11]Wenyu Zhang, Run Wang, Yanqin Tang, En Yuan, Yongfen Wu, Zhen Wang:
Research on Teaching Evaluation of Courses Based on Computer System Ability Training. ICPCSEE (2) 2021: 434-442 - [c10]Run Wang, Felix Juefei-Xu, Meng Luo, Yang Liu, Lina Wang:
FakeTagger: Robust Safeguards against DeepFake Dissemination via Provenance Tracking. ACM Multimedia 2021: 3546-3555 - [i11]Felix Juefei-Xu, Run Wang, Yihao Huang, Qing Guo, Lei Ma, Yang Liu:
Countering Malicious DeepFakes: Survey, Battleground, and Horizon. CoRR abs/2103.00218 (2021) - [i10]Guanlin Li, Shangwei Guo, Run Wang, Guowen Xu, Tianwei Zhang:
A Stealthy and Robust Fingerprinting Scheme for Generative Models. CoRR abs/2106.11760 (2021) - [i9]Run Wang, Xiaotian Zhou, Wei Li, Zhongzhi Zhang:
Maximizing the Smallest Eigenvalue of Grounded Laplacian Matrix. CoRR abs/2110.12576 (2021) - 2020
- [j15]Feng Shen, Yongyong Liu, Run Wang, Wei Zhou:
A dynamic financial distress forecast model with multiple forecast results under unbalanced data environment. Knowl. Based Syst. 192: 105365 (2020) - [j14]Fei Sun, Fang Fang, Run Wang
, Bo Wan
, Qinghua Guo, Hong Li, Xincai Wu:
An Impartial Semi-Supervised Learning Strategy for Imbalanced Classification on VHR Images. Sensors 20(22): 6699 (2020) - [j13]Run Wang
, Zhibo Wang
, Benxiao Tang
, Lei Zhao, Lina Wang
:
SmartPI: Understanding Permission Implications of Android Apps from User Reviews. IEEE Trans. Mob. Comput. 19(12): 2933-2945 (2020) - [c9]Run Wang, Ke Xu, Hui Feng, Wei Chen:
Hybrid RNN-ANN Based Deep Physiological Network for Pain Recognition. EMBC 2020: 5584-5587 - [c8]Run Wang, Felix Juefei-Xu, Lei Ma, Xiaofei Xie, Yihao Huang
, Jian Wang, Yang Liu:
FakeSpotter: A Simple yet Robust Baseline for Spotting AI-Synthesized Fake Faces. IJCAI 2020: 3444-3451 - [c7]Run Wang, Felix Juefei-Xu, Yihao Huang, Qing Guo, Xiaofei Xie
, Lei Ma, Yang Liu:
DeepSonar: Towards Effective and Robust Detection of AI-Synthesized Fake Voices. ACM Multimedia 2020: 1207-1216 - [c6]Yihao Huang, Felix Juefei-Xu, Run Wang, Qing Guo, Lei Ma, Xiaofei Xie
, Jianwen Li, Weikai Miao, Yang Liu, Geguang Pu:
FakePolisher: Making DeepFakes More Detection-Evasive by Shallow Reconstruction. ACM Multimedia 2020: 1217-1226 - [c5]Run Wang, Felix Juefei-Xu, Qing Guo, Yihao Huang, Xiaofei Xie
, Lei Ma, Yang Liu:
Amora: Black-box Adversarial Morphing Attack. ACM Multimedia 2020: 1376-1385 - [c4]Lina Wang, Kang Yang, Wenqi Wang, Run Wang, Aoshuang Ye
:
MGAAttack: Toward More Query-efficient Black-box Attack by Microbial Genetic Algorithm. ACM Multimedia 2020: 2229-2236 - [i8]Yihao Huang, Felix Juefei-Xu, Run Wang, Xiaofei Xie, Lei Ma, Jianwen Li, Weikai Miao, Yang Liu, Geguang Pu:
FakeLocator: Robust Localization of GAN-Based Face Manipulations via Semantic Segmentation Networks with Bells and Whistles. CoRR abs/2001.09598 (2020) - [i7]Run Wang, Felix Juefei-Xu, Yihao Huang, Qing Guo, Xiaofei Xie, Lei Ma, Yang Liu:
DeepSonar: Towards Effective and Robust Detection of AI-Synthesized Fake Voices. CoRR abs/2005.13770 (2020) - [i6]Yihao Huang, Felix Juefei-Xu, Run Wang, Qing Guo, Lei Ma, Xiaofei Xie, Jianwen Li, Weikai Miao, Yang Liu, Geguang Pu:
FakePolisher: Making DeepFakes More Detection-Evasive by Shallow Reconstruction. CoRR abs/2006.07533 (2020) - [i5]Run Wang, Felix Juefei-Xu, Meng Luo, Yang Liu, Lina Wang:
FakeTagger: Robust Safeguards against DeepFake Dissemination via Provenance Tracking. CoRR abs/2009.09869 (2020)
2010 – 2019
- 2019
- [j12]Yang Meng
, Run Wang
, Juan Wang
, Jie Yang
, Guan Gui
:
IRIS: Smart Phone Aided Intelligent Reimbursement System Using Deep Learning. IEEE Access 7: 165635-165645 (2019) - [j11]Sha Zhou
, Run Wang
, Junhua Ding, Xiaofang Pan, Shunping Zhou
, Fang Fang, Wenjie Zhen:
An approach for computing routes without complicated decision points in landmark-based pedestrian navigation. Int. J. Geogr. Inf. Sci. 33(9): 1829-1846 (2019) - [j10]Fei Sun
, Run Wang
, Bo Wan
, Yanjun Su
, Qinghua Guo, Youxin Huang, Xincai Wu:
Efficiency of Extreme Gradient Boosting for Imbalanced Land Cover Classification Using an Extended Margin and Disagreement Performance. ISPRS Int. J. Geo Inf. 8(7): 315 (2019) - [j9]Yanwei Sun
, Chao Gao, Jialin Li, Run Wang, Jian Liu:
Quantifying the Effects of Urban Form on Land Surface Temperature in Subtropical High-Density Urban Areas Using Machine Learning. Remote. Sens. 11(8): 959 (2019) - [j8]Dezhi Wang
, Bo Wan
, Penghua Qiu, Zejun Zuo, Run Wang
, Xincai Wu:
Mapping Height and Aboveground Biomass of Mangrove Forests on Hainan Island Using UAV-LiDAR Sampling. Remote. Sens. 11(18): 2156 (2019) - [c3]Yiru Zhao, Wanfeng Ge, Wenxin Li, Run Wang, Lei Zhao, Jiang Ming:
Capturing the Persistence of Facial Expression Features for Deepfake Video Detection. ICICS 2019: 630-645 - [i4]Wenqi Wang, Benxiao Tang, Run Wang, Lina Wang, Aoshuang Ye:
A survey on Adversarial Attacks and Defenses in Text. CoRR abs/1902.07285 (2019) - [i3]Run Wang, Lei Ma, Felix Juefei-Xu, Xiaofei Xie, Jian Wang, Yang Liu:
FakeSpotter: A Simple Baseline for Spotting AI-Synthesized Fake Faces. CoRR abs/1909.06122 (2019) - [i2]Run Wang, Felix Juefei-Xu, Xiaofei Xie, Lei Ma, Yihao Huang, Yang Liu:
Amora: Black-box Adversarial Morphing Attack. CoRR abs/1912.03829 (2019) - 2018
- [j7]Bo Wan, Lin Yang
, Shunping Zhou, Run Wang
, Dezhi Wang
, Wenjie Zhen:
A Parallel-Computing Approach for Vector Road-Network Matching Using GPU Architecture. ISPRS Int. J. Geo Inf. 7(12): 472 (2018) - [j6]Dezhi Wang
, Bo Wan, Penghua Qiu, Yanjun Su
, Qinghua Guo
, Run Wang, Fei Sun, Xincai Wu:
Evaluating the Performance of Sentinel-2, Landsat 8 and Pléiades-1 in Mapping Mangrove Extent and Species. Remote. Sens. 10(9): 1468 (2018) - [j5]Benxiao Tang
, Zhibo Wang
, Run Wang, Lei Zhao, Lina Wang:
Niffler: A Context-Aware and User-Independent Side-Channel Attack System for Password Inference. Wirel. Commun. Mob. Comput. 2018: 4627108:1-4627108:19 (2018) - 2017
- [j4]Run Wang, Pei Liu, Lei Zhao, Yueqiang Cheng, Lina Wang:
deExploit: Identifying misuses of input data to diagnose memory-corruption exploits at the binary level. J. Syst. Softw. 124: 153-168 (2017) - [j3]Run Wang, Bo Wan, Qinghua Guo
, Maosheng Hu, Shunping Zhou:
Mapping Regional Urban Extent Using NPP-VIIRS DNB and MODIS NDVI Data. Remote. Sens. 9(8): 862 (2017) - 2015
- [j2]Fei Guo, Li Yan, Run Wang:
Rigorous derivation and propagation speed property for a two-component Degasperis-Procesi system in shallow water regimes. Appl. Math. Comput. 259: 980-986 (2015) - [j1]Bo Wan, Qinghua Guo
, Fang Fang, Yanjun Su
, Run Wang:
Mapping US Urban Extents from MODIS Data Using One-Class Classification Method. Remote. Sens. 7(8): 10143-10163 (2015) - [c2]Lei Zhao, Run Wang, Lina Wang, Yueqiang Cheng:
Reversing and Identifying Overwritten Data Structures for Memory-Corruption Exploit Diagnosis. COMPSAC 2015: 434-443 - [i1]Run Wang, Qiaoli Mo, Qian Zhang, Fudi Chen, Dazuo Yang:
Prediction of the Yield of Enzymatic Synthesis of Betulinic Acid Ester Using Artificial Neural Networks and Support Vector Machine. CoRR abs/1511.03984 (2015) - 2010
- [c1]Yongzhu Xiong, Zhengdong Zhang, Feng Chen, Run Wang:
Estimation of urbanization effect on climatic warming over the recent 30 years in Guangzhou, South China. Geoinformatics 2010: 1-6
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2022-07-04 22:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint