Haizhou Wang

Orcid: 0000-0003-1197-5906

According to our database1, Haizhou Wang authored at least 63 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Detecting Offensive Language Based on Graph Attention Networks and Fusion Features.
IEEE Trans. Comput. Soc. Syst., February, 2024

A hybrid LLM workflow can help identify user privilege related variables in programs of any size.
CoRR, 2024

2023
MBSNN: A multi-branch scalable neural network for resource-constrained IoT devices.
J. Syst. Archit., September, 2023

An Efficient Architecture for Imputing Distributed Data Sets of IoT Networks.
IEEE Internet Things J., September, 2023

Depression detection on online social network with multivariate time series feature of user depressive symptoms.
Expert Syst. Appl., May, 2023

Interlayer Link Prediction in Multiplex Social Networks Based on Multiple Types of Consistency Between Embedding Vectors.
IEEE Trans. Cybern., April, 2023

Unveiling Qzone: A measurement study of a large-scale online social network.
Inf. Sci., April, 2023

Identifying Cantonese rumors with discriminative feature integration in online social networks.
Expert Syst. Appl., April, 2023

A novel hybrid feature fusion model for detecting phishing scam on Ethereum using deep neural network.
Expert Syst. Appl., 2023

Tackling imbalanced data in cybersecurity with transfer learning: a case with ROP payload detection.
Cybersecur., 2023

RAUCG: Retrieval-Augmented Unsupervised Counter Narrative Generation for Hate Speech.
CoRR, 2023

Multimodal Short Video Rumor Detection System Based on Contrastive Learning.
CoRR, 2023

TKSP: Long-Term Stance Prediction for Social Media Users by Fusing Time Series Features and Event Dynamic Evolution Knowledge.
Proceedings of the Knowledge Science, Engineering and Management, 2023

Implicit Offensive Speech Detection Based on Multi-feature Fusion.
Proceedings of the Knowledge Science, Engineering and Management, 2023

Fighting Attacks on Large Character Set CAPTCHAs Using Transferable Adversarial Examples.
Proceedings of the International Joint Conference on Neural Networks, 2023

TPTGAN: Two-Path Transformer-Based Generative Adversarial Network Using Joint Magnitude Masking and Complex Spectral Mapping for Speech Enhancement.
Proceedings of the Neural Information Processing - 30th International Conference, 2023

DKCS: A Dual Knowledge-Enhanced Abstractive Cross-Lingual Summarization Method Based on Graph Attention Networks.
Proceedings of the Neural Information Processing - 30th International Conference, 2023

2022
Database Resources of the National Genomics Data Center, China National Center for Bioinformation in 2022.
, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,
Nucleic Acids Res., 2022

Online social network individual depression detection using a multitask heterogenous modality fusion approach.
Inf. Sci., 2022

Identification of Chinese dark jargons in Telegram underground markets using context-oriented and linguistic features.
Inf. Process. Manag., 2022

Recognizing irrelevant faces in short-form videos based on feature fusion and active learning.
Neurocomputing, 2022

dbDEMC 3.0: Functional Exploration of Differentially Expressed miRNAs in Cancers of Human and Model Organisms.
Genom. Proteom. Bioinform., 2022

Improving IoT data availability via feedback- and voting-based anomaly imputation.
Future Gener. Comput. Syst., 2022

Detecting fake news on Chinese social media based on hybrid feature fusion method.
Expert Syst. Appl., 2022

ClueGraphSum: Let Key Clues Guide the Cross-Lingual Abstractive Summarization.
CoRR, 2022

Detecting Offensive Language on Social Networks: An End-to-end Detection Method based on Graph Attention Networks.
CoRR, 2022

Interlayer link prediction based on multiple network structural attributes.
Comput. Networks, 2022

An Unsupervised Detection Framework for Chinese Jargons in the Darknet.
Proceedings of the WSDM '22: The Fifteenth ACM International Conference on Web Search and Data Mining, Virtual Event / Tempe, AZ, USA, February 21, 2022

Multi-Access Edge Computing using Mode Division Multiple Access.
Proceedings of the 14th International Conference on Wireless Communications and Signal Processing, 2022

SICM: A Supervised-Based Identification and Classification Model for Chinese Jargons Using Feature Adapter Enhanced BERT.
Proceedings of the PRICAI 2022: Trends in Artificial Intelligence, 2022

A Novel Chinese Sarcasm Detection Model Based on Retrospective Reader.
Proceedings of the MultiMedia Modeling - 28th International Conference, 2022

GAIM: Graph-aware Feature Interactional Model for Spam Movie Review Detection.
Proceedings of the 26th International Conference on Pattern Recognition, 2022

GCMK: Detecting Spam Movie Review Based on Graph Convolutional Network Embedding Movie Background Knowledge.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2022, 2022

Fake Restaurant Review Detection Using Deep Neural Networks with Hybrid Feature Fusion Method.
Proceedings of the Database Systems for Advanced Applications, 2022

2021
User Identification Based on Integrating Multiple User Information across Online Social Networks.
Secur. Commun. Networks, 2021

A novel framework for detecting social bots with deep neural networks and active learning.
Knowl. Based Syst., 2021

Many-to-Many Matching-Theory-Based Dynamic Bandwidth Allocation for UAVs.
IEEE Internet Things J., 2021

End-to-end attack on text-based CAPTCHAs based on cycle-consistent generative adversarial network.
Neurocomputing, 2021

Identifying Non-Control Security-Critical Data in Program Binaries with a Deep Neural Model.
CoRR, 2021

Tackling Imbalanced Data in Cybersecurity with Transfer Learning: A Case with ROP Payload Detection.
CoRR, 2021

A novel framework for image-based malware detection with a deep neural network.
Comput. Secur., 2021

Three-Sided Matching Game Based Joint Bandwidth and Caching Resource Allocation for UAVs.
Proceedings of the 10th IEEE/CIC International Conference on Communications in China, 2021

2020
Interlayer link prediction in multiplex social networks: An iterative degree penalty algorithm.
Knowl. Based Syst., 2020

DeepReturn: A deep neural network can learn how to detect previously-unseen ROP payloads without using any heuristics.
J. Comput. Secur., 2020

Using deep learning to solve computer security challenges: a survey.
Cybersecur., 2020

A Multitask Deep Learning Approach for User Depression Detection on Sina Weibo.
CoRR, 2020

An End-to-End Attack on Text-based CAPTCHAs Based on Cycle-Consistent Generative Adversarial Network.
CoRR, 2020

Interlayer Link Prediction in Multiplex Social Networks Based on Multiple Types of Consistency between Embedding Vectors.
CoRR, 2020

Detecting Social Spammers in Sina Weibo Using Extreme Deep Factorization Machine.
Proceedings of the Web Information Systems Engineering - WISE 2020, 2020

A Novel Approach for Cantonese Rumor Detection based on Deep Neural Network.
Proceedings of the 2020 IEEE International Conference on Systems, Man, and Cybernetics, 2020

A Multimodal Feature Fusion-Based Method for Individual Depression Detection on Sina Weibo.
Proceedings of the 39th IEEE International Performance Computing and Communications Conference, 2020

Statistical Analysis of Inter-attribute Relationships in Unfractionated Heparin Injection Problems.
Proceedings of the 42nd Annual International Conference of the IEEE Engineering in Medicine & Biology Society, 2020

2019
An Automatic Event Detection Method for Massive Wireless Access Prediction.
IEEE Access, 2019

2018
Content pollution propagation in the overlay network of peer-to-peer live streaming systems: modelling and analysis.
IET Commun., 2018

2017
Exploring the accuracy of capturing snapshots in large-scale P2P IPTV systems.
Int. J. Commun. Syst., 2017

On Content Diffusion Modelling in Information-Centric Networks.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

2016
Accelerating Surgical Simulation Development via OpenSurgSim: Burr Hole Trainer.
Proceedings of the Medicine Meets Virtual Reality 22 - NextMed, 2016

2014
An Effective Scheme for Performance Improvement of P2P Live Streaming Systems.
J. Networks, 2014

2013
A resources monitoring architecture for P2P file-sharing systems.
Proceedings of the Fifth International Conference on Digital Image Processing, 2013

Evaluation of Lauge-Hansen classification for ankle fractures and follow-up management.
Proceedings of the 2013 IEEE International Conference on Bioinformatics and Biomedicine, 2013

2012
IPTV-RM: A Resources Monitoring Architecture for P2P IPTV Systems.
J. Networks, 2012

2011
Ckmeans.1d.dp: Optimal k-means Clustering in One Dimension by Dynamic Programming.
R J., 2011

2010
A Focused Crawler Based on Naive Bayes Classifier.
Proceedings of the Third International Symposium on Intelligent Information Technology and Security Informatics, 2010


  Loading...