default search action
Zhaohong Wang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]Wang Yin, Linxi Chen, Xinrui Huang, Chunling Huang, Zhaohong Wang, Yang Bian, You Wan, Yuan Zhou, Tongyan Han, Ming Yi:
A self-supervised spatio-temporal attention network for video-based 3D infant pose estimation. Medical Image Anal. 96: 103208 (2024) - [j5]Zhaohong Wang, Gang Li:
Research on Path Planning Algorithm of Driverless Ferry Vehicles Combining Improved A* and DWA. Sensors 24(13): 4041 (2024) - 2023
- [j4]Jing Guo, Skip Moses, Zhaohong Wang:
Graph Learning From Signals With Smoothness Superimposed by Regressors. IEEE Signal Process. Lett. 30: 942-946 (2023) - [c9]Biqing Zeng, Xinru Zheng, Zhaohong Wang, Peilin Hong:
Anomaly Detection of Small Time Series Data Based on Improved Generative Adversarial Networks. AAIA 2023: 90-95 - 2022
- [c8]Zhaohong Wang, Ke Xu, Yonghong Lan, Xiaofan Yang:
Novel Explicit Model Predictive Control Strategy For Boost Converters Based on State-space Averaging Method. IECON 2022: 1-8 - 2021
- [c7]Zhaohong Wang, Jing Guo:
Peer-to-Peer Assisted Off-Grid Message Dissemination in the Failure of Communication Infrastructures. CCWC 2021: 1127-1133 - [c6]Zhaohong Wang, Sen-Ching S. Cheung:
Privacy-Protected Denoising for Signals on Graphs from Distributed Systems. ISCAS 2021: 1-5 - [c5]Zhaohong Wang, Jing Guo:
Denoising Signals on the Graph for Distributed Systems by Secure Outsourced Computation. WF-IoT 2021: 524-529 - 2020
- [j3]Zhaohong Wang, Seiji Fukushima:
Control strategy for networked control systems with time delay and packet dropout using linear matrix inequalities. EURASIP J. Wirel. Commun. Netw. 2020(1): 42 (2020) - [j2]Abid Rauf, Zhaohong Wang, Hasan Sajid, Muhammad Ali Tahir:
Secure Route-Obfuscation Mechanism with Information-Theoretic Security for Internet of Things. Sensors 20(15): 4221 (2020)
2010 – 2019
- 2018
- [c4]Zhaohong Wang, Kathleen Meehan, Jing Guo:
Teaching with Video Assistance in Embedded Real-Time Operating System. FIE 2018: 1-6 - 2017
- [j1]Zhaohong Wang, Sen-Ching S. Cheung, Ying Luo:
Information-Theoretic Secure Multi-Party Computation With Collusion Deterrence. IEEE Trans. Inf. Forensics Secur. 12(4): 980-995 (2017) - 2016
- [c3]Zhaohong Wang, Sen-Ching S. Cheung:
On privacy preference in collusion-deterrence games for secure multi-party computation. ICASSP 2016: 2044-2048 - 2014
- [c2]Zhaohong Wang, Ying Luo, Sen-ching Samson Cheung:
Efficient multi-party computation with collusion-deterred secret sharing. ICASSP 2014: 7401-7405 - 2011
- [c1]Zhaohong Wang, Yue Yu:
Information entropy method for project portfolio selection. FSKD 2011: 2618-2622
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-23 19:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint