default search action
Ruidong Wang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j22]Haoyi Fan, Ruidong Wang, Xunhua Huang, Fengbin Zhang, Zuoyong Li, Shimei Su:
Deep joint adversarial learning for anomaly detection on attribute networks. Inf. Sci. 654: 119840 (2024) - [j21]Han Liu, Fengbin Zhang, Xunhua Huang, Ruidong Wang, Liang Xi:
Bidirectional consistency with temporal-aware for semi-supervised time series classification. Neural Networks 180: 106709 (2024) - [j20]Chongrui Tian, Fengbin Zhang, Ruidong Wang:
Adversarial regularized attributed network embedding for graph anomaly detection. Pattern Recognit. Lett. 183: 111-116 (2024) - [j19]Liang Xi, Dehua Miao, Menghan Li, Ruidong Wang, Han Liu, Xunhua Huang:
Adaptive-Correlation-Aware Unsupervised Deep Learning for Anomaly Detection in Cyber-Physical Systems. IEEE Trans. Dependable Secur. Comput. 21(4): 2888-2899 (2024) - [j18]Ruidong Wang, Fengbin Zhang, Xunhua Huang, Chongrui Tian, Liang Xi, Haoyi Fan:
CaCo: Attributed Network Anomaly Detection via Canonical Correlation Analysis. IEEE Trans. Ind. Informatics 20(1): 461-470 (2024) - [i7]Jialiang Wang, Ning Zhang, Shimin Di, Ruidong Wang, Lei Chen:
Class-aware and Augmentation-free Contrastive Learning from Label Proportion. CoRR abs/2408.06743 (2024) - 2023
- [j17]Peng Wei, Ruimin Lu, Ganhua Ye, Shijun Xie, Ruidong Wang:
Channel synchronization based on deep learning. Trans. Emerg. Telecommun. Technol. 34(1) (2023) - [j16]Ruidong Wang, Shilian Wang, Wei Zhang:
Joint power and hopping rate adaption against follower jammer based on deep reinforcement learning. Trans. Emerg. Telecommun. Technol. 34(2) (2023) - [j15]Xunhua Huang, Fengbin Zhang, Ruidong Wang, Xiaohui Lin, Han Liu, Haoyi Fan:
KalmanAE: Deep Embedding Optimized Kalman Filter for Time Series Anomaly Detection. IEEE Trans. Instrum. Meas. 72: 1-11 (2023) - [c7]Jun Ren, Ruidong Wang, Huichen Jia, Yingchen Li, Pei Pei:
Link Transmission Stability Detection Based on Deep Learning in Opportunistic Networks. ICMTEL (3) 2023: 110-126 - [i6]Mingliang Bai, Zhihao Zhou, Ruidong Wang, Yusheng Yang, Zizhen Qin, Yunxiao Chen, Chunjin Mu, Jinfu Liu, Daren Yu:
HouYi: An open-source large language model specially designed for renewable energy and carbon neutrality field. CoRR abs/2308.01414 (2023) - 2022
- [j14]Liang Xi, Zichao Yun, Han Liu, Ruidong Wang, Xunhua Huang, Haoyi Fan:
Semi-supervised Time Series Classification Model with Self-supervised Learning. Eng. Appl. Artif. Intell. 116: 105331 (2022) - [j13]Fengbin Zhang, Haoyi Fan, Ruidong Wang, Zuoyong Li, Tiancai Liang:
Deep Dual Support Vector Data description for anomaly detection on attributed networks. Int. J. Intell. Syst. 37(2): 1509-1528 (2022) - [j12]Liang Xi, Ruidong Wang, Zygmunt J. Haas:
Data-Correlation-Aware Unsupervised Deep-Learning Model for Anomaly Detection in Cyber-Physical Systems. IEEE Internet Things J. 9(22): 22410-22421 (2022) - [j11]Zhanjun Hao, Jianxiang Peng, Xiaochao Dang, Hao Yan, Ruidong Wang:
mmSafe: A Voice Security Verification System Based on Millimeter-Wave Radar. Sensors 22(23): 9309 (2022) - [c6]Ruidong Wang, Shilian Wang, Wei Zhang:
Cooperative Multi-UAV Dynamic Anti-Jamming Scheme with Deep Reinforcement Learning. ICCT 2022: 590-595 - [c5]Yu Lan, Danyang Liu, Jianxiong Zhou, Ruidong Wang:
Near-Field Imaging Algorithm of MIMO Radar with the Aid of Reference Points. ICCT 2022: 624-628 - 2021
- [j10]Csaba Biró, Bartlomiej Bosek, Heather C. Smith, William T. Trotter, Ruidong Wang, Stephen J. Young:
Planar Posets that are Accessible from Below Have Dimension at Most 6. Order 38(1): 21-36 (2021) - [j9]Liang Xi, Ruidong Wang, Zhi-Yu Yao, Fengbin Zhang:
Multisource Neighborhood Immune Detector Adaptive Model for Anomaly Detection. IEEE Trans. Evol. Comput. 25(3): 582-594 (2021) - [c4]Haoyi Fan, Fengbin Zhang, Ruidong Wang, Xunhua Huang, Zuoyong Li:
Semi-Supervised Time Series Classification by Temporal Relation Prediction. ICASSP 2021: 3545-3549 - [i5]Fengbin Zhang, Haoyi Fan, Ruidong Wang, Zuoyong Li, Tiancai Liang:
Deep Dual Support Vector Data Description for Anomaly Detection on Attributed Networks. CoRR abs/2109.00138 (2021) - 2020
- [j8]Liang Xi, Ruidong Wang, Fengbin Zhang, Yuezhongyi Sun:
CC-CSA: A culture&chaos-inspired clonal selection algorithm for abnormal detection. J. Intell. Fuzzy Syst. 39(1): 1289-1301 (2020) - [c3]Shunyao Wang, Ye Tian, Ruidong Wang, Yang Du, Han Yan, Ruilin Yang, Jian Ma:
Video Episode Boundary Detection with Joint Episode-Topic Model. ICPR 2020: 2049-2056 - [c2]Haoyi Fan, Fengbin Zhang, Ruidong Wang, Liang Xi, Zuoyong Li:
Correlation-Aware Deep Generative Model for Unsupervised Anomaly Detection. PAKDD (2) 2020: 688-700 - [i4]Haoyi Fan, Fengbin Zhang, Ruidong Wang, Liang Xi, Zuoyong Li:
Correlation-aware Deep Generative Model for Unsupervised Anomaly Detection. CoRR abs/2002.07349 (2020)
2010 – 2019
- 2019
- [j7]David M. Howard, Noah Streib, William T. Trotter, Bartosz Walczak, Ruidong Wang:
Dimension of posets with planar cover graphs excluding two long incomparable chains. J. Comb. Theory A 164: 1-23 (2019) - 2017
- [j6]Gwenaël Joret, Piotr Micek, William T. Trotter, Ruidong Wang, Veit Wiechert:
On the Dimension of Posets with Cover Graphs of Treewidth 2. Order 34(2): 185-234 (2017) - [c1]Hui Gao, Jun Feng, Ruidong Wang, Wendong Wang:
A Multi-task Oriented Selection Strategy for Efficient Cooperation of Collocated Mobile Devices. ICA3PP 2017: 705-714 - 2016
- [j5]Gwenaël Joret, Piotr Micek, Kevin G. Milans, William T. Trotter, Bartosz Walczak, Ruidong Wang:
Tree-width and dimension. Comb. 36(4): 431-450 (2016) - [j4]Elad Cohen, Martin Charles Golumbic, William T. Trotter, Ruidong Wang:
Posets and VPG Graphs. Order 33(1): 39-49 (2016) - [j3]William T. Trotter, Ruidong Wang:
Dimension and Matchings in Comparability and Incomparability Graphs. Order 33(1): 101-119 (2016) - [j2]William T. Trotter, Ruidong Wang:
Planar Posets, Dimension, Breadth and the Number of Minimal Elements. Order 33(2): 333-346 (2016) - [i3]David M. Howard, Noah Streib, William T. Trotter, Bartosz Walczak, Ruidong Wang:
The dimension of posets with planar cover graphs excluding two long incomparable chains. CoRR abs/1608.08843 (2016) - 2015
- [i2]William T. Trotter, Bartosz Walczak, Ruidong Wang:
Dimension and cut vertices: an application of Ramsey theory. CoRR abs/1505.08162 (2015) - 2014
- [j1]William T. Trotter, Ruidong Wang:
Incidence Posets and Cover Graphs. Order 31(2): 279-287 (2014) - 2013
- [i1]Gwenaël Joret, Piotr Micek, Kevin G. Milans, William T. Trotter, Bartosz Walczak, Ruidong Wang:
Tree-Width and Dimension. CoRR abs/1301.5271 (2013)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-01 21:37 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint