default search action
Wenhui Hu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c39]Shuyi Li, Pengyu Zhang, Xueyang Liu, Wenhui Hu:
Test Case Recommendation for Blockchain Systems Based on Graph Convolutional Networks. BigDataSecurity 2024: 17-22 - [c38]Yingying Cai, Wenhui Hu, Xueyang Liu, Haoxuan Wang, Xiankui Zhang, Jiaxi Wang:
User Dual Intents Graph Modeling for Information Diffusion Prediction. BigDataSecurity 2024: 35-40 - [c37]Beihu Wu, Hao Tian, Xueyang Liu, Wenhui Hu, Chen Yang, Shuyi Li:
Sarcasm Detection in Chinese and English Text with Fine-Tuned Large Language Models. BigDataSecurity 2024: 47-51 - [c36]Chen Yang, Xueyang Liu, Shuyi Li, Wenhui Hu, Beihu Wu, Hao Tian:
Temporal Analysis and Prediction of Marriage Registration Figures Based on Long-Term Time Series Models. BigDataSecurity 2024: 66-70 - [c35]Fangming Jing, Chen Yang, Shuyi Li, Xueyang Liu, Wenhui Hu:
Precision Assistance for Residents with Subsistence Allowance: Cluster Analysis of Mixed-Type Data Based on K-Prototypes. BigDataSecurity 2024: 78-83 - [c34]Shuyi Li, Fangming Jing, Chen Yang, Pengyu Zhang, Zeming Wang, Wenhui Hu:
Analysis of Elderly Care Services Based on Machine Learning and Factor Rotation Method. IDS 2024: 65-69 - [c33]Jiaxi Wang, Wenhui Hu, Xueyang Liu, Beihu Wu, Yuting Qiu, Yingying Cai:
Bridging Modality Gap for Visual Grounding with Effecitve Cross-Modal Distillation. PRCV (5) 2024: 347-363 - 2023
- [i1]Jiaxi Wang, Wenhui Hu, Xueyang Liu, Beihu Wu, Yuting Qiu, Yingying Cai:
Bridging Modality Gap for Visual Grounding with Effecitve Cross-modal Distillation. CoRR abs/2312.17648 (2023) - 2022
- [c32]Lizhuang Sun, Wenhui Hu, Kehui Xu, Yuhang Chen, Qidong Sun, Jiaxi Wang:
ASRC:A Knowledge Graph Relation Construction Model based on Active Learning and Semantic Recognition. IEEE Big Data 2022: 6025-6029 - [c31]Chaofan Zheng, Wenhui Hu, Tianci Li, Xueyang Liu, Jinchan Zhang, Litian Wang:
An Insider Threat Detection Method Based on Heterogeneous Graph Embedding. BigDataSecurity/HPSC/IDS 2022: 11-16 - [c30]Pengyu Zhang, Yufei Li, Xinliang Ge, Wenhui Hu, Lizhuang Sun, Xueyang Liu:
Predicting Relations in SG-CIM Model Based on Graph Structure and Semantic Information. BigDataSecurity/HPSC/IDS 2022: 17-22 - [c29]Litian Wang, Wenhui Hu, Tong Zheng, Shanshan Yin, Xiaoya Zhang, Xueyang Liu:
Node Similarity-based Search Method for Medical Insurance Heterogeneous Information Network. BigDataSecurity/HPSC/IDS 2022: 174-179 - [c28]Jinchan Zhang, Xueyang Liu, Wenyu Shao, Wenhui Hu, Wenmo Zhang, Chaofan Zheng:
Civil Servant Position Recommendation Algorithm Based on Model Fusion. BigDataSecurity/HPSC/IDS 2022: 200-205 - [c27]Wenmo Zhang, Xueyang Liu, Xiaoya Zhang, Wenhui Hu, Jinchan Zhang, Wenyu Shao:
Medicare Fraud Gang Discovery Based on Community Discovery Algorithms. BigDataSecurity/HPSC/IDS 2022: 206-211 - [c26]Wenyu Shao, Xueyang Liu, Wenhui Hu, Xiankui Zhang, Xiaodong Zeng:
Research on Diabetes Disease Development Prediction Algorithm Based on Model Fusion. SmartCom 2022: 439-449 - [c25]Xiaodong Zeng, Wenhui Hu, Xueyang Liu, Yuhang Chen, Wenyu Shao, Lizhuang Sun:
Few-Shot Learning for Medical Numerical Understanding Based on Machine Reading Comprehension. SmartCom 2022: 617-628 - 2021
- [c24]Wenyi Yang, Wenhui Hu, Yingjie Liu, Yu Huang, Xueyang Liu, Shikun Zhang:
Research on Bootstrapping Algorithm for Health Insurance Data Fraud Detection Based on Decision Tree. BigDataSecurity 2021: 57-62 - [c23]Yingjie Liu, Xueyang Liu, Wenhui Hu, Minghui Zhang, Dongdong Du, Yu Huang:
FBLE: A Feature-based Label Enhancement Method for Corporate Bond Credit Rating Prediction. SmartCloud 2021: 73-77 - [c22]Yu Huang, Wenhui Hu, Xueyang Liu:
SG-CIM Mapping Entity Relationship Inference and Verification Techniques Based on Graph Representation Learning Technology. SmartCloud 2021: 101-106 - [c21]Pengyu Zhang, Chunmei Wang, Baocong Hao, Wenhui Hu, Xueyang Liu, Lizhuang Sun:
An SG-CIM Model Table Classification Method Based on Multi Feature Semantic Recognition Technology. SmartCom 2021: 175-185 - [c20]Xiaoqi Liao, Xinliang Ge, Yufei Li, Wenhui Hu, Xin He, Shijie Gao, Xiaoming Chen, Xueyang Liu:
An Automatic Design Method of Similarity Fusion Neural Network Based on SG-CIM Model. SmartCom 2021: 352-363 - 2020
- [c19]Wenhui Hu, Long Zhang, Xueyang Liu, Yu Huang, Minghui Zhang, Liang Xing:
Research on Automatic Generation and Analysis Technology of Network Attack Graph. BigDataSecurity/HPSC/IDS 2020: 133-139 - [c18]Wenhui Hu, Xueyang Liu, Yu Huang, Yu Wang, Minghui Zhang, Hui Zhao:
Structured Data Encoder for Neural Networks Based on Gradient Boosting Decision Tree. ICA3PP (2) 2020: 603-618
2010 – 2019
- 2019
- [c17]Luyao Ma, Long Zhang, Wei Ye, Wenhui Hu:
PKUSE at SemEval-2019 Task 3: Emotion Detection with Emotion-Oriented Neural Attention Network. SemEval@NAACL-HLT 2019: 287-291 - [c16]Xueyang Liu, Junwei Qiu, Wenhui Hu, Yu Huang, Shikun Zhang, Heng Liu:
Research on Personalized Recommendation Technology Based on Collaborative Filtering. SmartCloud 2019: 41-46 - [c15]Wenhui Hu, Yu Wang, Xueyang Liu, Jinan Sun, Qing Gao, Yu Huang:
Open Source Software Vulnerability Propagation Analysis Algorithm based on Knowledge Graph. SmartCloud 2019: 121-127 - [c14]Wenhui Hu, Xueyang Liu, Chengli Xing, Minghui Zhang, Sen Ma:
Research on Template-Based Factual Automatic Question Answering Technology. SmartCom 2019: 366-375 - 2018
- [j2]Shushan Zhao, Wenhui Hu:
Improvement on OTP authentication and a possession-based authentication framework. Int. J. Multim. Intell. Secur. 3(2): 187-203 (2018) - [c13]Wenhui Hu, Peng Wang, Qigang Wang, Zhengdong Zhou, Hui Xiang, Mei Li, Zhongchao Shi:
Dynamic Delay Based Cyclic Gradient Update Method for Distributed Training. PRCV (3) 2018: 550-559 - 2017
- [c12]Yu Huang, Juntao Li, Wenhui Hu, Xueyang Liu:
Research on a Simulation Period Reference Model and Its General Description Language. BigDataSecurity/HPSC/IDS 2017: 107-111 - [c11]Wenhui Hu, Yu Huang, Xueyang Liu, Chen Xu:
Study on REST API Test Model Supporting Web Service Integration. BigDataSecurity/HPSC/IDS 2017: 133-138 - [c10]Wei Sun, Fei Zhang, Min Xue, Wenhui Hu, Long Li:
An SOM-based algorithm with locking mechanism for task assignment. CIS/RAM 2017: 36-41 - 2014
- [c9]Wenhui Hu, Damien Octeau, Patrick D. McDaniel, Peng Liu:
Duet: library integrity verification for android applications. WISEC 2014: 141-152 - 2012
- [c8]Wei Ye, Ruici Luo, Shikun Zhang, Xueyang Liu, Wenhui Hu:
BuOA: An Achitecture Style for Modular Web Applications. APSEC 2012: 802-807 - [c7]Xin Gao, Wenhui Hu, Wei Ye, Shikun Zhang, Xuan Sun:
A Data Collaboration Model for Collaborative Design Based on C-Net. SEKE 2012: 541-544 - 2011
- [j1]Xuan Jiang, Wenhui Hu, Sencun Zhu, Guohong Cao:
Compromise-resilient anti-jamming communication in wireless sensor networks. Wirel. Networks 17(6): 1513-1527 (2011) - [c6]Xin Gao, Wenhui Hu, Wei Ye, Shikun Zhang:
Data Uncertainty Model for Mashup. SEKE 2011: 503-508 - 2010
- [c5]Xuan Jiang, Wenhui Hu, Sencun Zhu, Guohong Cao:
Compromise-Resilient Anti-jamming for Wireless Sensor Networks. ICICS 2010: 140-154
2000 – 2009
- 2009
- [c4]Wei Ye, Wen Zhao, Yu Huang, Wenhui Hu, Shikun Zhang, Lifu Wang:
Towards Passive RFID Event. COMPSAC (1) 2009: 492-499 - [c3]Min Shao, Wenhui Hu, Sencun Zhu, Guohong Cao, Srikanth V. Krishnamurthy, Tom La Porta:
Cross-layer Enhanced Source Location Privacy in Sensor Networks. SECON 2009: 1-9 - [c2]Wei Ye, Wenhui Hu, Wen Zhao, Xin Gao, Shikun Zhang, Lifu Wang:
Towards Lightweight Application Integration Based on Mashup. SERVICES I 2009: 500-506 - [c1]Wei Ye, Wen Zhao, Yu Huang, Wenhui Hu, Shikun Zhang, Lifu Wang:
Formal Definition and Detection Algorithm for Passive Event in RFID Middleware. APWeb/WAIM 2009: 538-543
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-31 21:07 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint