


default search action
Wenzhong Tang
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j13]Cheng Qian
, Wenzhong Tang, Yanyang Wang:
RGAnomaly: Data reconstruction-based generative adversarial networks for multivariate time series anomaly detection in the Internet of Things. Future Gener. Comput. Syst. 167: 107751 (2025) - 2024
- [j12]Xiaolei Qu, Jiale Zhou
, Jue Jiang, Wenhan Wang, Haoran Wang, Shuai Wang, Wenzhong Tang, Xun Lin
:
EH-former: Regional easy-hard-aware transformer for breast lesion segmentation in ultrasound images. Inf. Fusion 109: 102430 (2024) - [j11]Yongxi Li, Wenzhong Tang, Ke Zhang, Xi Zhu, Haoming Wang, Shuai Wang:
Cross-modality neighbor constraints based unbalanced multi-view text-image re-identification. Multim. Syst. 30(6): 338 (2024) - [j10]Xun Lin
, Wenzhong Tang
, Haoran Wang, Yizhong Liu, Yakun Ju, Shuai Wang, Zitong Yu:
Exposing image splicing traces in scientific publications via uncertainty-guided refinement. Patterns 5(9): 101038 (2024) - [j9]Yongxi Li
, Wenzhong Tang, Shuai Wang
, Shengsheng Qian
, Changsheng Xu
:
Distribution-Guided Hierarchical Calibration Contrastive Network for Unsupervised Person Re-Identification. IEEE Trans. Circuits Syst. Video Technol. 34(8): 7149-7164 (2024) - [c10]Xun Lin, Shuai Wang, Rizhao Cai, Yizhong Liu, Ying Fu, Wenzhong Tang
, Zitong Yu, Alex C. Kot:
Suppress and Rebalance: Towards Generalized Multi-Modal Face Anti-Spoofing. CVPR 2024: 211-221 - [c9]Xun Lin
, Yi Yu
, Zitong Yu
, Ruohan Meng
, Jiale Zhou
, Ajian Liu
, Yizhong Liu
, Shuai Wang
, Wenzhong Tang
, Zhen Lei
, Alex C. Kot
:
HideMIA: Hidden Wavelet Mining for Privacy-Enhancing Medical Image Analysis. ACM Multimedia 2024: 8110-8119 - [i4]Xun Lin, Shuai Wang, Rizhao Cai, Yizhong Liu, Ying Fu, Zitong Yu, Wenzhong Tang, Alex C. Kot:
Suppress and Rebalance: Towards Generalized Multi-Modal Face Anti-Spoofing. CoRR abs/2402.19298 (2024) - [i3]Xun Lin, Yi Yu, Song Xia, Jue Jiang, Haoran Wang, Zitong Yu, Yizhong Liu, Ying Fu, Shuai Wang, Wenzhong Tang, Alex C. Kot:
Safeguarding Medical Image Segmentation Datasets against Unauthorized Training via Contour- and Texture-Aware Perturbations. CoRR abs/2403.14250 (2024) - [i2]Zifeng Li, Wenzhong Tang, Shijun Gao, Shuai Wang, Yanxiang Wang:
Multiple Contexts and Frequencies Aggregation Network forDeepfake Detection. CoRR abs/2408.01668 (2024) - 2023
- [j8]Fanyu Zeng, Mengdong Chen, Cheng Qian
, Yanyang Wang
, Yijun Zhou, Wenzhong Tang
:
Multivariate time series anomaly detection with adversarial transformer architecture in the Internet of Things. Future Gener. Comput. Syst. 144: 244-255 (2023) - [j7]Xun Lin
, Shuai Wang, Jiahao Deng, Ying Fu, Xiao Bai, Xinlei Chen, Xiaolei Qu, Wenzhong Tang:
Image manipulation detection by multiple tampering traces and edge artifact enhancement. Pattern Recognit. 133: 109026 (2023) - [j6]Haoran Wang, Jiahao Deng, Xun Lin, Wenzhong Tang, Shuai Wang
:
CDS-Net: Cooperative dual-stream network for image manipulation detection. Pattern Recognit. Lett. 176: 167-173 (2023) - [c8]Cheng Qian
, Wenzhong Tang
, Yanyang Wang
:
Time-Sensitive Data Processing Strategy for Enhancing the Performance of BFT Consensus Mechanism in IoT Edge Computing Environment. ADMIT 2023: 181-188 - [i1]Xun Lin, Wenzhong Tang, Shuai Wang, Zitong Yu, Yizhong Liu, Haoran Wang, Ying Fu, Alex C. Kot:
Biomedical Image Splicing Detection using Uncertainty-Guided Refinement. CoRR abs/2309.16388 (2023) - 2020
- [j5]Yingying Zhang
, Yuxin Gong
, Haogang Zhu, Xiao Bai, Wenzhong Tang:
Multi-head enhanced self-attention network for novelty detection. Pattern Recognit. 107: 107486 (2020)
2010 – 2019
- 2019
- [j4]Yueran Zu
, Wenzhong Tang, Xiuguo Bao, Yanyang Wang, Ke Gao:
Context-adaptive matching for optical flow. Multim. Tools Appl. 78(1): 641-659 (2019) - [c7]Sheng Li, Wenzhong Tang:
Space-Time Variation of Property Crime in Beijing with ESDA Method. IWCMC 2019: 799-804 - 2018
- [c6]Yueran Zu, Ke Gao, Xiuguo Bao, Wenzhong Tang:
Saliency guided fast interpolation for large displacement optical flow. ICPR 2018: 1145-1150 - [c5]Yueran Zu, Wenzhong Tang, Xiuguo Bao, Ke Gao, Mingdong Zhang:
A Combined Local-Global Match for Optical Flow. IGTA 2018: 192-200 - [c4]Peng Sun, Wenzhong Tang, Xiao Bai:
Learning Deep Embeddings via Margin-Based Discriminate Loss. S+SSPR 2018: 107-115 - 2017
- [c3]Chen Wang, Yun Liu, Xiao Bai, Wenzhong Tang, Peng Lei, Jun Zhou
:
Deep Residual Convolutional Neural Network for Hyperspectral Image Super-Resolution. ICIG (3) 2017: 370-380 - 2016
- [j3]Lei Liu, Xiao Bai, Huigang Zhang, Jun Zhou
, Wenzhong Tang:
Describing and learning of related parts based on latent structural model in big data. Neurocomputing 173: 355-363 (2016) - [j2]Cheng Yan, Xiao Bai, Peng Ren
, Lu Bai, Wenzhong Tang, Jun Zhou
:
Band Weighting via Maximizing Interclass Distance for Hyperspectral Image Classification. IEEE Geosci. Remote. Sens. Lett. 13(7): 922-925 (2016) - [j1]Haichuan Yang, Xiao Bai, Yanzhen Liu, Yanyang Wang, Lu Bai, Jun Zhou
, Wenzhong Tang:
Maximum margin hashing with supervised information. Multim. Tools Appl. 75(7): 3955-3971 (2016) - 2015
- [c2]Wenzhong Tang, Xiongyu Shan, Daxin Tian, Zhengguo Sheng, Haiying Xia:
Optimizing RSUs Network against Cascading Failure. UIC/ATC/ScalCom 2015: 1670-1675 - 2012
- [c1]Kewen Wang, Xuelian Lin, Wenzhong Tang:
Predator - An experience guided configuration optimizer for Hadoop MapReduce. CloudCom 2012: 419-426
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-04-03 01:29 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint