


default search action
Wen Yao 0001
Person information
- affiliation: Chinese Academy of Military Science, Defense Innovation Institute, Beijing, China
- affiliation: National University of Defense Technology, College of Aerospace Science and Engineering, Changsha, China
Other persons with the same name
- Wen Yao (aka: Yao Wen) — disambiguation page
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[j42]Jialiang Sun, Xiaohu Zheng, Wen Yao
, Xiaoya Zhang, Weien Zhou, Xiaoqian Chen:
Heat source layout optimization using automatic deep learning surrogate and multimodal neighborhood search algorithm. Ann. Oper. Res. 348(1): 345-371 (2025)
[j41]Chengyin Hu, Weiwen Shi
, Wen Yao, Tingsong Jiang, Ling Tian, Wen Li:
Two-stage optimized unified adversarial patch for attacking visible-infrared cross-modal detectors in the physical world. Appl. Soft Comput. 171: 112818 (2025)
[j40]Wen Yao, Ning Wang
, Xingchen Li:
Fuzzy treed Gaussian process for nonstationary regression with large-scale datasets. Knowl. Based Syst. 315: 113285 (2025)
[j39]Chao Li
, Tingsong Jiang
, Handing Wang
, Wen Yao
, Donghua Wang
:
Optimizing Latent Variables in Integrating Transfer and Query Based Attack Framework. IEEE Trans. Pattern Anal. Mach. Intell. 47(1): 161-171 (2025)
[j38]Jialiang Sun
, Wen Yao
, Tingsong Jiang
, Chao Li
, Xiaoqian Chen
:
${A^{3}D}$A3D: A Platform of Searching for Robust Neural Architectures and Efficient Adversarial Attacks. IEEE Trans. Pattern Anal. Mach. Intell. 47(5): 3975-3991 (2025)
[j37]Junqi Wu
, Wen Yao
, Shuai Jia
, Tingsong Jiang, Weien Zhou, Chao Ma, Xiaoqian Chen:
Gradient-based sparse voxel attacks on point cloud object detection. Pattern Recognit. 160: 111156 (2025)
[j36]Donghua Wang
, Wen Yao
, Tingsong Jiang
, Chao Li
, Xiaoqian Chen
:
Universal Multi-View Black-Box Attack Against Object Detectors via Layout Optimization. IEEE Trans. Circuits Syst. Video Technol. 35(7): 7129-7142 (2025)
[j35]Donghua Wang
, Wen Yao
, Tingsong Jiang
, Xiaohu Zheng
, Junqi Wu:
Improving the Transferability of Adversarial Examples by Feature Augmentation. IEEE Trans. Neural Networks Learn. Syst. 36(9): 17212-17226 (2025)
[c23]Jiahuan Long, Zhengqin Xu, Tingsong Jiang, Wen Yao, Shuai Jia, Chao Ma, Xiaoqian Chen:
Robust SAM: On the Adversarial Robustness of Vision Foundation Models. AAAI 2025: 5775-5783
[c22]Jiahuan Long, Wen Yao, Tingsong Jiang, Jiacheng Hou, Shuai Jia, Junqi Wu, Xiaoya Zhang, Xiaohu Zheng, Chao Ma:
CDUPatch: Color-Driven Universal Adversarial Patch Attack for Dual-Modal Visible-Infrared Detectors. ACM Multimedia 2025: 1462-1470
[i32]Jiahuan Long, Zhengqin Xu, Tingsong Jiang, Wen Yao, Shuai Jia, Chao Ma, Xiaoqian Chen:
Robust SAM: On the Adversarial Robustness of Vision Foundation Models. CoRR abs/2504.08906 (2025)
[i31]Jiahuan Long, Tingsong Jiang, Wen Yao, Yizhe Xiong, Zhengqin Xu, Shuai Jia, Chao Ma:
Parameter-Free Fine-tuning via Redundancy Elimination for Vision Foundation Models. CoRR abs/2504.08915 (2025)
[i30]Jiahuan Long, Tingsong Jiang, Wen Yao, Shuai Jia, Weijia Zhang, Weien Zhou, Chao Ma, Xiaoqian Chen:
PapMOT: Exploring Adversarial Patch Attack against Multiple Object Tracking. CoRR abs/2504.09361 (2025)
[i29]Jiahuan Long, Wen Yao, Tingsong Jiang, Chao Ma:
CDUPatch: Color-Driven Universal Adversarial Patch Attack for Dual-Modal Visible-Infrared Detectors. CoRR abs/2504.10888 (2025)
[i28]Jiahuan Long, Wenzhe Zhang, Ning Wang, Tingsong Jiang, Wen Yao:
FR-Mamba: Time-Series Physical Field Reconstruction Based on State Space Model. CoRR abs/2505.16083 (2025)
[i27]Hanqing Liu, Jiahuan Long, Junqi Wu, Jiacheng Hou, Huili Tang, Tingsong Jiang, Weien Zhou, Wen Yao:
Eva-VLA: Evaluating Vision-Language-Action Models' Robustness Under Real-World Physical Variations. CoRR abs/2509.18953 (2025)
[i26]Jiahuan Long, Tingsong Jiang, Hanqing Liu, Chao Ma, Wen Yao:
Thermally Activated Dual-Modal Adversarial Clothing against AI Surveillance Systems. CoRR abs/2511.09829 (2025)- 2024
[j34]Yang Xie, Wen Yao
, Xingchen Li, Ning Wang, Xiaohu Zheng, Xiaoqian Chen:
Hybrid digital twin for satellite temperature field perception and attitude control. Adv. Eng. Informatics 60: 102405 (2024)
[j33]Ruofan Zhang, Xingchen Li, Wen Yao, Xiaohu Zheng, Ning Wang, Jialiang Sun:
Implicitly physics-informed multi-fidelity physical field data fusion method based on Taylor modal decomposition. Adv. Eng. Informatics 62: 102738 (2024)
[j32]Xiaoyu Zhao
, Xiaoqian Chen
, Zhiqiang Gong
, Wen Yao, Yunyang Zhang, Xiaohu Zheng:
Contrastive enhancement using latent prototype for few-shot segmentation. Digit. Signal Process. 144: 104282 (2024)
[j31]Guijian Tang
, Wen Yao, Chao Li, Tingsong Jiang, Shaowu Yang:
Black-box adversarial patch attacks using differential evolution against aerial imagery object detectors. Eng. Appl. Artif. Intell. 137: 109141 (2024)
[j30]Xiaoyu Zhao
, Xiaoqian Chen, Zhiqiang Gong
, Wen Yao, Yunyang Zhang:
A hybrid method based on proper orthogonal decomposition and deep neural networks for flow and heat field reconstruction. Expert Syst. Appl. 247: 123137 (2024)
[j29]Guijian Tang
, Wen Yao
, Tingsong Jiang, Yong Zhao, Jialiang Sun:
Adversarial patch-based false positive creation attacks against aerial imagery object detectors. Neurocomputing 579: 127431 (2024)
[j28]Jialiang Sun
, Wen Yao
, Tingsong Jiang, Xiaoqian Chen:
Multi-objective evolutionary search of variable-length composite semantic perturbations. Inf. Sci. 677: 120827 (2024)
[j27]Chao Li, Handing Wang, Wen Yao, Tingsong Jiang:
Adversarial attacks in computer vision: a survey. J. Membr. Comput. 6(2): 130-147 (2024)
[j26]Chengyin Hu, Weiwen Shi
, Tingsong Jiang, Wen Yao, Ling Tian, Xiaoqian Chen, Jingzhi Zhou
, Wen Li:
Adversarial infrared blocks: A multi-view black-box attack to thermal infrared detectors in physical world. Neural Networks 175: 106310 (2024)
[j25]Donghua Wang
, Wen Yao
, Tingsong Jiang, Weien Zhou, Lang Lin, Xiaoqian Chen:
An invisible, robust copyright protection method for DNN-generated content. Neural Networks 177: 106391 (2024)
[j24]Chengyin Hu, Weiwen Shi
, Wen Yao, Tingsong Jiang, Ling Tian, Xiaoqian Chen, Wen Li:
Adversarial Infrared Curves: An attack on infrared pedestrian detectors in the physical world. Neural Networks 178: 106459 (2024)
[j23]Jialiang Sun, Wen Yao
, Tingsong Jiang, Xiaoqian Chen:
Efficient search of comprehensively robust neural architectures via multi-fidelity evaluation. Pattern Recognit. 146: 110038 (2024)
[j22]Donghua Wang
, Wen Yao
, Tingsong Jiang, Xiaoqian Chen:
AdvOps: Decoupling adversarial examples. Pattern Recognit. 149: 110252 (2024)
[j21]Xiaohu Zheng
, Wen Yao, Yingchun Xu, Ning Wang
:
Algorithms for Bayesian network modeling and reliability inference of complex multistate systems with common cause failure. Reliab. Eng. Syst. Saf. 241: 109663 (2024)
[j20]Donghua Wang
, Wen Yao
, Tingsong Jiang
, Xiaoqian Chen
:
Improving Transferability of Universal Adversarial Perturbation With Feature Disruption. IEEE Trans. Image Process. 33: 722-737 (2024)
[c21]Chao Li, Wen Yao, Handing Wang, Tingsong Jiang, Donghua Wang, Jialiang Sun:
QRPatch: A Deceptive Texture-Based Black-Box Adversarial Attacks with Genetic Algorithm. CEC 2024: 1-8
[c20]Jiahuan Long, Tingsong Jiang, Wen Yao, Shuai Jia, Weijia Zhang, Weien Zhou, Chao Ma, Xiaoqian Chen:
PapMOT: Exploring Adversarial Patch Attack Against Multiple Object Tracking. ECCV (51) 2024: 128-144
[c19]Yifan Hao, Yang Yang, Junru Song, Wei Peng, Weien Zhou, Tingsong Jiang, Wen Yao:
HeteroMorpheus: Universal Control Based on Morphological Heterogeneity Modeling. IJCNN 2024: 1-8
[i25]Donghua Wang, Wen Yao, Tingsong Jiang, Chao Li, Xiaoqian Chen:
Universal Multi-view Black-box Attack against Object Detectors via Layout Optimization. CoRR abs/2407.06688 (2024)
[i24]Donghua Wang, Wen Yao, Tingsong Jiang, Xiaohu Zheng, Junqi Wu, Xiaoqian Chen:
Improving the Transferability of Adversarial Examples by Feature Augmentation. CoRR abs/2407.06714 (2024)
[i23]Yifan Hao, Yang Yang, Junru Song, Wei Peng, Weien Zhou, Tingsong Jiang, Wen Yao:
HeteroMorpheus: Universal Control Based on Morphological Heterogeneity Modeling. CoRR abs/2408.01230 (2024)
[i22]Xu Liu, Wen Yao, Wei Peng, Zhuojia Fu, Zixue Xiang, Xiaoqian Chen:
A physics-driven sensor placement optimization methodology for temperature field reconstruction. CoRR abs/2409.18423 (2024)- 2023
[j19]Chao Li
, Wen Yao, Handing Wang
, Tingsong Jiang, Xiaoya Zhang:
Bayesian evolutionary optimization for crafting high-quality adversarial examples with limited query budget. Appl. Soft Comput. 142: 110370 (2023)
[j18]Xiaoqian Chen, Zhiqiang Gong, Xiaoyu Zhao, Weien Zhou, Wen Yao:
A machine learning surrogate modeling benchmark for temperature field reconstruction of heat source systems. Sci. China Inf. Sci. 66(5) (2023)
[j17]Xiaoyu Zhao, Zhiqiang Gong
, Yunyang Zhang, Wen Yao, Xiaoqian Chen:
Physics-informed convolutional neural networks for temperature field prediction of heat source layout without labeled data. Eng. Appl. Artif. Intell. 117(Part): 105516 (2023)
[j16]Guijian Tang
, Tingsong Jiang, Weien Zhou, Chao Li, Wen Yao, Yong Zhao:
Adversarial patch attacks against aerial imagery object detectors. Neurocomputing 537: 128-140 (2023)
[j15]Jialiang Sun, Wen Yao, Tingsong Jiang, Xiaoqian Chen:
A multi-objective memetic algorithm for automatic adversarial attack optimization design. Neurocomputing 547: 126318 (2023)
[j14]Jialiang Sun
, Wen Yao
, Tingsong Jiang, Donghua Wang, Xiaoqian Chen:
Differential evolution based dual adversarial camouflage: Fooling human eyes and object detectors. Neural Networks 163: 256-271 (2023)
[j13]Chao Li
, Wen Yao, Handing Wang
, Tingsong Jiang:
Adaptive momentum variance for attention-guided sparse adversarial attacks. Pattern Recognit. 133: 108979 (2023)
[j12]Wen Yao, Xiaohu Zheng
, Jun Zhang, Ning Wang, Guijian Tang
:
Deep adaptive arbitrary polynomial chaos expansion: A mini-data-driven semi-supervised method for uncertainty quantification. Reliab. Eng. Syst. Saf. 229: 108813 (2023)
[j11]Guijian Tang
, Wen Yao
, Tingsong Jiang, Weien Zhou
, Yang Yang, Donghua Wang
:
Natural Weather-Style Black-Box Adversarial Attacks Against Optical Aerial Detectors. IEEE Trans. Geosci. Remote. Sens. 61: 1-11 (2023)
[c18]Jun Zhang, Wen Yao, Xiaoqian Chen, Ling Feng:
Transferable Post-hoc Calibration on Pretrained Transformers in Noisy Text Classification. AAAI 2023: 13940-13948
[c17]Donghua Wang, Wen Yao, Tingsong Jiang, Chao Li, Xiaoqian Chen:
RFLA: A Stealthy Reflected Light Adversarial Attack in the Physical World. ICCV 2023: 4432-4442
[c16]Zepu Xi, Hongbo Chen, Xiaoqian Chen, Wen Yao:
Conformal Prediction Enhanced SVMs for Swarm Behavior Classification. IJCNN 2023: 1-8
[c15]Zepu Xi, Hongbo Chen, Xiaoqian Chen, Wen Yao:
Swarm Behavior Recognition: Martingales Protected Paradigm. IJCNN 2023: 1-6
[c14]Xiaoyu Zhao, Zhiqiang Gong, Xiaoqian Chen, Wen Yao, Yunyang Zhang:
A Unified Framework of Deep Neural Networks and Gappy Proper Orthogonal Decomposition for Global Field Reconstruction. IJCNN 2023: 1-8
[c13]Zepu Xi, Hongbo Chen, Xiaoqian Chen, Wen Yao:
Distributions-free Martingales Test Distributions-shift. INNS DLIA@IJCNN 2023: 157-166
[i21]Xiaoyu Zhao, Xiaoqian Chen, Zhiqiang Gong, Weien Zhou, Wen Yao, Yunyang Zhang:
RecFNO: a resolution-invariant flow and heat field reconstruction method from sparse observations via Fourier neural operator. CoRR abs/2302.09808 (2023)
[i20]Donghua Wang, Wen Yao, Tingsong Jiang, Weien Zhou, Lang Lin, Xiaoqian Chen:
A Plug-and-Play Defensive Perturbation for Copyright Protection of DNN-based Applications. CoRR abs/2304.10679 (2023)
[i19]Jialiang Sun, Wen Yao, Tingsong Jiang, Xiaoqian Chen:
Efficient Search of Comprehensively Robust Neural Architectures via Multi-fidelity Evaluation. CoRR abs/2305.07308 (2023)
[i18]Jialiang Sun, Wen Yao, Tingsong Jiang, Xiaoqian Chen:
Multi-objective Evolutionary Search of Variable-length Composite Semantic Perturbations. CoRR abs/2307.06548 (2023)
[i17]Donghua Wang, Wen Yao, Tingsong Jiang, Chao Li, Xiaoqian Chen:
RFLA: A Stealthy Reflected Light Adversarial Attack in the Physical World. CoRR abs/2307.07653 (2023)
[i16]Jiakai Wang, Donghua Wang, Jin Hu, Siyang Wu, Tingsong Jiang, Wen Yao, Aishan Liu, Xianglong Liu:
Adversarial Examples in the Physical World: A Survey. CoRR abs/2311.01473 (2023)
[i15]Donghua Wang, Wen Yao, Tingsong Jiang, Xiaoqian Chen:
Universal Perturbation-based Secret Key-Controlled Data Hiding. CoRR abs/2311.01696 (2023)- 2022
[j10]Chao Li
, Handing Wang
, Jun Zhang
, Wen Yao
, Tingsong Jiang:
An Approximated Gradient Sign Method Using Differential Evolution for Black-Box Adversarial Attack. IEEE Trans. Evol. Comput. 26(5): 976-990 (2022)
[j9]Ning Wang, Witold Pedrycz
, Wen Yao
, Xiaoqian Chen
, Yong Zhao:
Disjunctive Fuzzy Neural Networks: A New Splitting-Based Approach to Designing a T-S Fuzzy Model. IEEE Trans. Fuzzy Syst. 30(2): 370-381 (2022)
[c12]Donghua Wang
, Tingsong Jiang, Jialiang Sun, Weien Zhou, Zhiqiang Gong, Xiaoya Zhang, Wen Yao, Xiaoqian Chen:
FCA: Learning a 3D Full-Coverage Vehicle Camouflage for Multi-View Physical Adversarial Attack. AAAI 2022: 2414-2422
[c11]Xiaohu Zheng, Wen Yao, Zhiqiang Gong, Yunyang Zhang, Xiaoyu Zhao, Tingsong Jiang:
Deep Monte Carlo Quantile Regression for Quantifying Aleatoric Uncertainty in Physics-informed Temperature Field Reconstruction. IJCNN 2022: 1-8
[c10]Jun Zhang, Wen Yao, Xiaoqian Chen, Ling Feng:
Improve Calibration Robustness of Temperature Scaling by Penalizing Output Entropy. ISMIS 2022: 294-304
[c9]Jun Zhang, Wen Yao, Xiaoqian Chen, Ling Feng:
Understanding Negative Calibration from Entropy Perspective. ISMIS 2022: 305-314
[i14]Xiaohu Zheng, Wen Yao, Zhiqiang Gong, Yunyang Zhang, Xiaoyu Zhao, Tingsong Jiang:
Deep Monte Carlo Quantile Regression for Quantifying Aleatoric Uncertainty in Physics-informed Temperature Field Reconstruction. CoRR abs/2202.06596 (2022)
[i13]Jialiang Sun, Tingsong Jiang, Chao Li, Weien Zhou, Xiaoya Zhang, Wen Yao, Xiaoqian Chen:
Searching for Robust Neural Architectures via Comprehensive and Reliable Evaluation. CoRR abs/2203.03128 (2022)
[i12]Xiaoyu Zhao, Xiaoqian Chen, Zhiqiang Gong, Wen Yao, Yunyang Zhang, Xiaohu Zheng:
Contrastive Enhancement Using Latent Prototype for Few-Shot Segmentation. CoRR abs/2203.04095 (2022)
[i11]Xiaohu Zheng, Wen Yao, Xiaoqian Chen:
Algorithms for Bayesian network modeling and reliability inference of complex multistate systems: Part II-Dependent systems. CoRR abs/2204.01327 (2022)
[i10]Jialiang Sun, Wen Yao, Tingsong Jiang, Xiaoqian Chen:
A Multi-objective Memetic Algorithm for Auto Adversarial Attack Optimization Design. CoRR abs/2208.06984 (2022)
[i9]Donghua Wang, Wen Yao, Tingsong Jiang, Guijian Tang
, Xiaoqian Chen:
A Survey on Physical Adversarial Attack in Computer Vision. CoRR abs/2209.14262 (2022)
[i8]Jialiang Sun, Tingsong Jiang, Wen Yao, Donghua Wang, Xiaoqian Chen:
Differential Evolution based Dual Adversarial Camouflage: Fooling Human Eyes and Object Detectors. CoRR abs/2210.08870 (2022)- 2021
[i7]Xianqi Chen, Xiaoyu Zhao, Zhiqiang Gong, Jun Zhang, Weien Zhou, Xiaoqian Chen, Wen Yao:
A Deep Neural Network Surrogate Modeling Benchmark for Temperature Field Prediction of Heat Source Layout. CoRR abs/2103.11177 (2021)
[i6]Wei Peng, Jun Zhang, Weien Zhou, Xiaoyu Zhao, Wen Yao, Xiaoqian Chen:
IDRLnet: A Physics-Informed Neural Network Library. CoRR abs/2107.04320 (2021)
[i5]Yufeng Xia, Jun Zhang, Zhiqiang Gong, Tingsong Jiang, Wen Yao:
Randomized ReLU Activation for Uncertainty Estimation of Deep Neural Networks. CoRR abs/2107.07197 (2021)
[i4]Xiaohu Zheng, Jun Zhang, Ning Wang, Guijian Tang, Wen Yao:
Mini-data-driven Deep Arbitrary Polynomial Chaos Expansion for Uncertainty Quantification. CoRR abs/2107.10428 (2021)
[i3]Xiaoqian Chen, Zhiqiang Gong, Xiaoyu Zhao, Weien Zhou, Wen Yao:
TFRD: A Benchmark Dataset for Research on Temperature Field Reconstruction of Heat-Source Systems. CoRR abs/2108.08298 (2021)
[i2]Donghua Wang, Tingsong Jiang, Jialiang Sun, Weien Zhou, Xiaoya Zhang, Zhiqiang Gong, Wen Yao, Xiaoqian Chen:
FCA: Learning a 3D Full-coverage Vehicle Camouflage for Multi-view Physical Adversarial Attack. CoRR abs/2109.07193 (2021)
[i1]Xiaoyu Zhao, Zhiqiang Gong, Yunyang Zhang, Wen Yao, Xiaoqian Chen:
Physics-informed Convolutional Neural Networks for Temperature Field Prediction of Heat Source Layout without Labeled Data. CoRR abs/2109.12482 (2021)- 2020
[j8]Ning Wang, Marek Z. Reformat, Wen Yao, Yong Zhao, Xiaoqian Chen:
Fuzzy Linear regression based on approximate Bayesian computation. Appl. Soft Comput. 97(Part): 106763 (2020)
[j7]Xiaohu Zheng, Wen Yao, Yingchun Xu, Xiaoqian Chen:
Algorithms for Bayesian network modeling and reliability inference of complex multistate systems: Part I - Independent systems. Reliab. Eng. Syst. Saf. 202: 107011 (2020)
[j6]Yingchun Xu, Wen Yao, Xiaohu Zheng, Xiaoqian Chen:
An iterative information integration method for multi-level system reliability analysis based on Bayesian Melding Method. Reliab. Eng. Syst. Saf. 204: 107201 (2020)
2010 – 2019
- 2019
[j5]Yingchun Xu
, Wen Yao
, Xiaohu Zheng, Xiaoqian Chen:
Satellite System Design Optimization Based on Bayesian Melding of Multi-Level Multi-Source Lifetime Information. IEEE Access 7: 103505-103516 (2019)
[j4]Xiaohu Zheng
, Wen Yao
, Yingchun Xu
, Xiaoqian Chen
:
Complex Satellite Lifetime Optimization Based on Bayesian Network Reliability Compression Inference Algorithm. IEEE Access 7: 175166-175185 (2019)- 2018
[c8]Xianqi Chen, Wen Yao, Yong Zhao, Xiaoqian Chen, Jun Zhang, Yazhong Luo:
The Hybrid Algorithms Based on Differential Evolution for Satellite Layout Optimization Design. CEC 2018: 1-8
[c7]Wen Yao, Zhengyang Ma, Yazhong Luo, Xiaoqian Chen, Longqi Yang:
Satellite Lifetime Optimization Based on Discrete Cross Entropy Method. CEC 2018: 1-8
[c6]Xiaohu Zheng, Xianqi Chen, Wen Yao, Xiaoqian Chen, Longqi Yang, Yazhong Luo:
Multistate Satellite System Reliability Optimization Based on Improved Compression Inference Algorithm and Bayesian Network. CEC 2018: 1-7
[c5]Yue-he Zhu, Yazhong Luo, Wen Yao:
Fast Accessibility Evaluation of the Main-Belt Asteroids Manned Exploration Mission Based on a Learning Method. CEC 2018: 1-8- 2016
[c4]Xiaoqian Chen, Xingzhi Hu, Valerio Lattarulo, Wen Yao, Yong Zhao:
Application of multi-objective alliance algorithm to multidisciplinary design optimization under uncertainty. CEC 2016: 2669-2675
[c3]Yi Zhang, Xiaoqian Chen, Ning Wang, Wen Yao, Bingxiao Du:
Ensemble of surrogates based on error classification by unsupervised learning. CEC 2016: 4344-4349- 2013
[j3]Wen Yao, Xiaoqian Chen, Yiyong Huang, Michel van Tooren:
An enhanced unified uncertainty analysis approach based on first order reliability method with single-level optimization. Reliab. Eng. Syst. Saf. 116: 28-37 (2013)- 2012
[j2]Wen Yao, Xiaoqian Chen, Yong Zhao, Michel van Tooren:
Concurrent Subspace Width Optimization Method for RBF Neural Network Modeling. IEEE Trans. Neural Networks Learn. Syst. 23(2): 247-259 (2012)- 2010
[c2]Wen Yao, Xiaoqian Chen, Michel van Tooren, Yuexing Wei:
Euclidean distance and second derivative based widths optimization of radial basis function neural networks. IJCNN 2010: 1-8
2000 – 2009
- 2009
[j1]Wen Yao, Xiaoqian Chen, Wencai Luo:
A gradient-based sequential radial basis function neural network modeling method. Neural Comput. Appl. 18(5): 477-484 (2009)
[c1]Wen Yao, Xiaoqian Chen:
A Sequential Radial Basis Function Neural Network Modeling Method Based on Partial Cross Validation Error Estimation. ICNC (3) 2009: 405-409
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-01-29 03:59 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







