default search action
Fengjiao Wang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c20]Morteza Mohammady Gharasuie, Fengjiao Wang, Omar Sharif, Ravi Mukkamala:
SAWTab: Smoothed Adaptive Weighting for Tabular Data in Semi-supervised Learning. PAKDD (3) 2024: 316-328 - [i9]Chenyuan Bian, Nan Xia, Xia Yang, Feifei Wang, Fengjiao Wang, Bin Wei, Qian Dong:
MambaClinix: Hierarchical Gated Convolution and Mamba-Based U-Net for Enhanced 3D Medical Image Segmentation. CoRR abs/2409.12533 (2024) - 2023
- [c19]Chang Ge, Fengjiao Wang, Zhu Gao:
Research Design Based on Children's Participative Edutainment Products. HCI (2) 2023: 72-84 - 2022
- [j7]Qingzu Luan, Qian Cao, Lei Huang, Yupeng Liu, Fengjiao Wang:
Identification of the Urban Dry Islands Effect in Beijing: Evidence from Satellite and Ground Observations. Remote. Sens. 14(4): 809 (2022) - 2021
- [j6]Xinghai Yang, Fengjiao Wang, Zhiquan Bai, Feifei Xun, Yulin Zhang, Xiuyang Zhao:
Deep Learning-Based Congestion Detection at Urban Intersections. Sensors 21(6): 2052 (2021) - [j5]Fengjiao Wang, Ruixing Li, Hua Wang, Hengliang Zhu, Naixue Xiong:
TS-PADM: Anomaly Detection Model of Wireless Sensors Based on Spatial-Temporal Feature Points. Wirel. Commun. Mob. Comput. 2021: 6656498:1-6656498:10 (2021) - 2020
- [c18]Jinshan Zhang, Yutai Wang, Xinghai Yang, Fengjiao Wang:
Entity Recognition of Chinese Medical Literature Based on BiLSTM-CRF and Fusion Features. ICBDT 2020: 107-111 - [c17]Fengjiao Wang, Xinghai Yang, Yulin Zhang, Jianfeng Yuan:
Ship Target Detection Algorithm Based on Improved YOLOv3. ICBDT 2020: 162-166 - [i8]Khoa D. Doan, Saurav Manchanda, Fengjiao Wang, S. Sathiya Keerthi, Avradeep Bhowmik, Chandan K. Reddy:
Image Generation Via Minimizing Fréchet Distance in Discriminator Feature Space. CoRR abs/2003.11774 (2020)
2010 – 2019
- 2018
- [c16]Lei Zheng, Yixue Wang, Lifang He, Sihong Xie, Fengjiao Wang, Philip S. Yu:
PER: A Probabilistic Attentional Model for Personalized Text Recommendations. IEEE BigData 2018: 911-920 - 2017
- [c15]Fengjiao Wang, Yongzhi Qu, Lei Zheng, Chun-Ta Lu, Philip S. Yu:
Deep and Broad Learning on Content-Aware POI Recommendation. CIC 2017: 369-378 - [c14]Fengjiao Wang, Chun-Ta Lu, Yongzhi Qu, Philip S. Yu:
Collective Geographical Embedding for Geolocating Social Network Users. PAKDD (1) 2017: 599-611 - 2016
- [j4]Fengjiao Wang, Mei Tian, Yaping Huang, Lihua Ai:
基于眼动数据的分类视觉注意模型 (Classification Model of Visual Attention Based on Eye Movement Data). 计算机科学 43(1): 85-88 (2016) - [c13]Xiao Pan, Jiawei Zhang, Fengjiao Wang, Philip S. Yu:
DistSD: Distance-based social discovery with personalized posterior screening. IEEE BigData 2016: 1110-1119 - [c12]Fengjiao Wang, Shuyang Lin, Philip S. Yu:
Collaborative Co-clustering across Multiple Social Media. MDM 2016: 142-151 - 2015
- [c11]Fengjiao Wang, Guan Wang, Shuyang Lin, Philip S. Yu:
Concurrent goal-oriented co-clustering generation in social networks. ICSC 2015: 350-357 - 2014
- [c10]Fengjiao Wang, Guan Wang, Philip S. Yu:
Why Checkins: Exploring User Motivation on Location Based Social Networks. ICDM Workshops 2014: 27-34 - [c9]Shuyang Lin, Qingbo Hu, Fengjiao Wang, Philip S. Yu:
Steering Information Diffusion Dynamically against User Attention Limitation. ICDM 2014: 330-339 - [c8]Ning Yang, Xiangnan Kong, Fengjiao Wang, Philip S. Yu:
When and Where: Predicting Human Movements Based on Social Spatial-Temporal Events. SDM 2014: 515-523 - [c7]Yilin Shen, Fengjiao Wang, Hongxia Jin:
Defending against user identity linkage attack across multiple online social networks. WWW (Companion Volume) 2014: 375-376 - [i7]Ning Yang, Xiangnan Kong, Fengjiao Wang, Philip S. Yu:
When and Where: Predicting Human Movements Based on Social Spatial-Temporal Events. CoRR abs/1407.1450 (2014) - 2013
- [c6]Shuyang Lin, Fengjiao Wang, Qingbo Hu, Philip S. Yu:
Extracting social events for learning better information diffusion models. KDD 2013: 365-373 - 2010
- [c5]Chenhao Tan, Jie Tang, Jimeng Sun, Quan Lin, Fengjiao Wang:
Social action tracking via noise tolerant time-varying factor graphs. KDD 2010: 1049-1058
2000 – 2009
- 2009
- [j3]Liufei Wu, Yuqing Zhang, Fengjiao Wang:
A new provably secure authentication and key agreement protocol for SIP using ECC. Comput. Stand. Interfaces 31(2): 286-291 (2009) - [j2]Zhenchao Zhu, Yuqing Zhang, Fengjiao Wang:
An efficient and provable secure identity-based ring signcryption scheme. Comput. Stand. Interfaces 31(6): 1092-1097 (2009) - [c4]Fengjiao Wang, Yuqing Zhang:
Provably Secure Password-Authenticated Group Key Exchange with Different Passwords under Standard Assumption. Inscrypt 2009: 124-133 - 2008
- [j1]Fengjiao Wang, Yuqing Zhang:
A new provably secure authentication and key agreement mechanism for SIP using certificateless public-key cryptography. Comput. Commun. 31(10): 2142-2149 (2008) - [c3]Zhenchao Zhu, Yuqing Zhang, Fengjiao Wang:
The Analysis of an Efficient and Provably Secure ID-Based Threshold Signcryption Scheme and Its Secure Version. ProvSec 2008: 210-225 - [i6]Fengjiao Wang, Yuqing Zhang:
Cryptanalysis of a client-to-client password-authenticated key agreement protocol. IACR Cryptol. ePrint Arch. 2008: 248 (2008) - [i5]Zhenchao Zhu, Yuqing Zhang, Fengjiao Wang:
An Efficient Identity-based Ring Signcryption Scheme. IACR Cryptol. ePrint Arch. 2008: 254 (2008) - 2007
- [c2]Liufei Wu, Yuqing Zhang, Fengjiao Wang:
A Provable Secure Key Management Program for Wireless Sensor Network. CIS 2007: 662-666 - [c1]Fengjiao Wang, Yuqing Zhang:
A New Provably Secure Authentication and Key Agreement Mechanism for SIP Using Certificateless Public-Key Cryptography. CIS 2007: 809-814 - [i4]Liufei Wu, Yuqing Zhang, Fengjiao Wang:
A New Provably Secure Authentication and Key Agreement Protocol for SIP Using ECC. IACR Cryptol. ePrint Arch. 2007: 219 (2007) - [i3]Fengjiao Wang, Yuqing Zhang:
A New Provably Secure Authentication and Key Agreement Mechanism for SIP Using Certificateless Public-key Cryptography. IACR Cryptol. ePrint Arch. 2007: 220 (2007) - [i2]Fengjiao Wang, Yuqing Zhang:
A New Security Model for Cross-Realm C2C-PAKE Protocol. IACR Cryptol. ePrint Arch. 2007: 342 (2007) - [i1]Liufei Wu, Yuqing Zhang, Fengjiao Wang:
Security Analysis of WAPI Authentication and Key Exchange Protocol. IACR Cryptol. ePrint Arch. 2007: 344 (2007)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 13:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint