default search action
Linna Wang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j10]Linna Wang, Yunfei Song, Yujia Zhu, Daoxun Xia, Guoquan Han:
A framework for deep neural network multiuser authorization based on channel pruning. Concurr. Comput. Pract. Exp. 35(21) (2023) - [j9]Yichen Qin, Linna Wang, Yang Li, Rong Li:
Visualization and assessment of model selection uncertainty. Comput. Stat. Data Anal. 178: 107598 (2023) - [j8]Linna Wang, Yunfei Song, Daoxun Xia:
Deep neural network watermarking based on a reversible image hiding network. Pattern Anal. Appl. 26(3): 861-874 (2023) - [c12]Linna Wang, Leyi Zhao, Zhanpeng Luo, Xuan Wang, Ziliang Feng, Li Lu:
CARE-30: A Causally Driven Multi-Modal Model for Enhanced 30-Day ICU Readmission Predictions. BIBM 2023: 1509-1516 - [c11]Xuan Wang, Yi Li, Linna Wang, Li Lu:
CFNet: Point Cloud Upsampling via Cascaded Feedback Network. ICANN (1) 2023: 317-329 - [c10]Junnan Li, Siyuan Hong, Xiying Chen, Chuan Ai, Liang Fan, Yanping Ke, Linna Wang:
An improved target detection algorithm applied to domestic edge computing module. ICCEIC 2023: 329-333 - 2022
- [c9]Linna Wang, Yunfei Song, Yujia Zhu, Daoxun Xia:
Active Authorization Control of Deep Models Using Channel Pruning. ChineseCSCW (2) 2022: 530-542 - [c8]Lili Xu, Houfu Peng, Linna Wang, Daoxun Xia:
Meta-transfer Learning for Person Re-identification in Aerial Imagery. ChineseCSCW (2) 2022: 634-644 - 2021
- [j7]Daoxun Xia, Haojie Liu, Lili Xu, Jiawen Li, Linna Wang:
Self-training with one-shot stepwise learning method for person re-identification. Concurr. Comput. Pract. Exp. 33(17) (2021) - [j6]Daoxun Xia, Haojie Liu, Lili Xu, Linna Wang:
Visible-infrared person re-identification with data augmentation via cycle-consistent adversarial network. Neurocomputing 443: 35-46 (2021) - [j5]Linna Wang, Yichen Qin, Yang Li:
Confidence graphs for graphical model selection. Stat. Comput. 31(5): 52 (2021) - [c7]Linna Wang, Linji Li, Tao Zhu, Congli Ma, Li Lu:
Machine Learning-based Prediction of Postoperative 30-days Mortality. CSAE 2021: 55:1-55:9 - [c6]Zhekang Li, Rentao Gu, Linna Wang, Yuefeng Ji:
Computing-aware Proactive Network Reconfiguration for Optical Networks Interconnected Edge Computing System. OFC 2021: 1-3 - 2020
- [j4]Erisa Karafili, Linna Wang, Emil C. Lupu:
An Argumentation-Based Reasoner to Assist Digital Investigation and Attribution of Cyber-Attacks. Digit. Investig. 32 Supplement: 300925 (2020)
2010 – 2019
- 2019
- [i1]Erisa Karafili, Linna Wang, Emil C. Lupu:
An Argumentation-Based Approach to Assist in the Investigation and Attribution of Cyber-Attacks. CoRR abs/1904.13173 (2019) - 2018
- [j3]Linna Wang, Xin Yang, Yong Chen, Ling Liu, Shiyong An, Pan Zhuo:
Dynamic composite decision-theoretic rough set under the change of attributes. Int. J. Comput. Intell. Syst. 11(1): 355-370 (2018) - [j2]Linlin Yang, Ce Li, Chunyu Xie, Linna Wang, Baochang Zhang:
Adaptive multiclass correlation filters and its applications in the time series recognition. J. Electronic Imaging 27(03): 033010 (2018) - [j1]Linna Wang, Xin Yang, Xibei Yang:
监督邻域粗糙集 (Supervised Neighborhood Rough Set). 计算机科学 45(8): 186-190 (2018) - [c5]Erisa Karafili, Linna Wang, Antonis C. Kakas, Emil Lupu:
Helping Forensic Analysts to Attribute Cyber-Attacks: An Argumentation-Based Reasoner. PRIMA 2018: 510-518 - 2017
- [c4]Yunqi Miao, Linna Wang, Chunyu Xie, Baochang Zhang:
Gesture Recognition Based on Deep Belief Networks. CCBR 2017: 439-446 - [c3]Linna Wang, Ling Liu, Xin Yang, Pan Zhuo:
Quantitative composite decision-theoretic rough set. ISKE 2017: 1-6 - 2014
- [c2]Xin Yang, Linna Wang, Hongbo Zai, Yanrong Ren:
Simulation Study on the Keep-Right-Except-to-Pass Rule Model Based on Cellular Automata. CIS 2014: 338-342
2000 – 2009
- 2007
- [c1]Xi Li, Linna Wang, Andreas Timm-Giel, Carmelita Görg, Richard Schelb, T. Winter:
Optimization of Bit Rate Adaptation in UMTS Radio Access Network. VTC Spring 2007: 1051-1055
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:29 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint