default search action
Rong Wang 0003
Person information
- affiliation: Chongqing University of Posts and Telecommunications, School of Software Engineering, China
- affiliation (PhD 2018): University of Electronic Science and Technology of China, Chengdu, China
Other persons with the same name
- Rong Wang — disambiguation page
- Rong Wang 0001 — Northwestern Polytechnical University, Center for OPTical IMagery Analysis and Learning (OPTIMAL), Xian, China
- Rong Wang 0002 — Hosei University, Department of Computer Science, Tokyo, Japan
- Rong Wang 0004 — Nanjing University of Aeronautics and Astronautics, Navigation Research Center, College of Automation Engineering, China
- Rong Wang 0005 — Stuttgart University, Institute of Natural Language Processing, Germany
- Rong Wang 0006 — Sichuan Normal University, College of Computer Science, Visual Computing and Virtual Reality Key Laboratory of Sichuan, Chengdu, China (and 1 more)
- Rong Wang 0007 — University of California, Riverside, Institute Center for Research in Intelligent Systems, CA, USA
- Rong Wang 0008 — Beihang University, Digital Society and Blockchain Laboratory, Beijing, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j13]Yunpeng Xiao, Xufeng Li, Tun Li, Rong Wang, Yucai Pang, Guoyin Wang:
A Distributed Generative Adversarial Network for Data Augmentation Under Vertical Federated Learning. IEEE Trans. Big Data 11(1): 74-85 (2025) - 2024
- [j12]Tun Li, Peng Shou, Xin Wan, Qian Li, Rong Wang, Chaolong Jia, Yunpeng Xiao:
A fast malware detection model based on heterogeneous graph similarity search. Comput. Networks 254: 110799 (2024) - [j11]Rong Wang, Miaofei Li, Qingwang Guo, Yunpeng Xiao, Zhenyi Yang:
Road network pixelization: A traffic flow imputation method based on image restoration techniques. Expert Syst. Appl. 237(Part A): 121468 (2024) - [j10]Sirui Duan, Yuxun Long, Yunpeng Xiao, Rong Wang, Qian Li:
E-commerce bookstore user alignment model based on multidimensional feature joint representation and implicit behavior compensation. Expert Syst. Appl. 238(Part E): 122084 (2024) - [j9]Tun Li, Ya Luo, Xin Wan, Qian Li, Qilie Liu, Rong Wang, Chaolong Jia, Yunpeng Xiao:
A malware detection model based on imbalanced heterogeneous graph embeddings. Expert Syst. Appl. 246: 123109 (2024) - [j8]Zhou Yang, Yucai Pang, Qian Li, Shihong Wei, Rong Wang, Yunpeng Xiao:
A model for early rumor detection base on topic-derived domain compensation and multi-user association. Expert Syst. Appl. 250: 123951 (2024) - [j7]Zhou Yang, Yucai Pang, Xuehong Li, Qian Li, Shihong Wei, Rong Wang, Yunpeng Xiao:
Topic Audiolization: A Model for Rumor Detection Inspired by Lie Detection Technology. Inf. Process. Manag. 61(1): 103563 (2024) - [j6]Yunpeng Xiao, Yu Zhang, Cong Zeng, Tun Li, Rong Wang, Qian Li, Chaolong Jia:
A prediction model for rumor user propagation behavior based on sparse representation and transfer learning. Inf. Sci. 670: 120590 (2024) - [j5]Tun Li, Zhou Li, Kexin Ma, Qian Li, Rong Wang, Chaolong Jia, Yunpeng Xiao:
A Malicious Information Traceability Model Based on Neighborhood Similarity and Multiple Types of Interaction. IEEE Trans. Comput. Soc. Syst. 11(5): 5815-5827 (2024) - [j4]Qian Li, Yunpeng Xiao, Xinming Zhou, Rong Wang, Sirui Duan, Xiang Yu:
A Derivative Topic Dissemination Model Based on Representation Learning and Topic Relevance. IEEE Trans. Knowl. Data Eng. 36(12): 7468-7482 (2024) - [j3]Yunpeng Xiao, Qunqing Zhang, Fei Tang, Rong Wang, Qian Li, Guoyin Wang:
Cycle-Fed: A Double-Confidence Unlabeled Data Augmentation Method Based on Semisupervised Federated Learning. IEEE Trans. Mob. Comput. 23(12): 11014-11028 (2024) - [j2]Yunpeng Xiao, Xuehong Li, Qunqing Zhang, Rui Lv, Qian Li, Rong Wang:
Spreading Mosaic: An Image Restoration-Inspired Social Rumor Propagation Model. IEEE Trans. Multim. 26: 2906-2917 (2024) - [j1]WeiKang He, Yunpeng Xiao, Tun Li, Rong Wang, Qian Li:
Interest HD: An Interest Frame Model for Recommendation Based on HD Image Generation. IEEE Trans. Neural Networks Learn. Syst. 35(10): 14356-14369 (2024) - [i1]Rong Wang, Guichen Zhou, Mingjun Gao, Yunpeng Xiao:
Dual Model Replacement:invisible Multi-target Backdoor Attack based on Federal Learning. CoRR abs/2404.13946 (2024)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-30 21:38 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint