Zhiwen Wang

According to our database1, Zhiwen Wang authored at least 53 papers between 2006 and 2021.

Collaborative distances:



In proceedings 
PhD thesis 


On csauthors.net:


Multipath Fusion Mask R-CNN With Double Attention and Its Application Into Gear Pitting Detection.
IEEE Trans. Instrum. Meas., 2021

Dual-terminal event triggered control for cyber-physical systems under false data injection attacks.
Kybernetika, 2020

Locating the propagation source in complex networks with a direction-induced search based Gaussian estimator.
Knowl. Based Syst., 2020

An Anisotropic Gaussian Filtering Model for Image De-Hazing.
IEEE Access, 2020

Multi-level Visual Fusion Networks for Image Captioning.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

Hybrid Optimization-Based GRU Neural Network for Software Reliability Prediction.
Proceedings of the Data Science, 2020

False Data Injection Attacks in Smart Grid Using Gaussian Mixture Model.
Proceedings of the 16th International Conference on Control, 2020

A Novel Tax Evasion Detection Framework via Fused Transaction Network Representation.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

DGs for Service Restoration to Critical Loads in a Secondary Network.
IEEE Trans. Smart Grid, 2019

Risk-Limiting Load Restoration for Resilience Enhancement With Intermittent Energy Resources.
IEEE Trans. Smart Grid, 2019

Joint spatiograms for multi-modality tracking with online update.
Pattern Recognit. Lett., 2019

Security-based resilient event-triggered control of networked control systems under denial of service attacks.
J. Frankl. Inst., 2019

Sharp upper bounds of the spectral radius of a graph.
Discret. Math., 2019

Privacy-Preserving Probabilistic Forecasting for Temporal-spatial Correlated Wind Farms.
CoRR, 2019

<i>A<sub>α</sub></i>-spectral radius of the second power of a graph.
Appl. Math. Comput., 2019

Stabilization of Linear Systems Over Networks With Limited Communication Capacity.
IEEE Access, 2019

Dynamic Output Feedback Control of Cyber-Physical Systems Under DoS Attacks.
IEEE Access, 2019

Attention and Multi-layer Fusion for Real-time Semantic Segmentation.
Proceedings of the 12th International Symposium on Computational Intelligence and Design, 2019

Sparse High-Level Attention Networks for Person Re-Identification.
Proceedings of the 31st IEEE International Conference on Tools with Artificial Intelligence, 2019

Enhancing QoE for Mobile Users by Environment-Aware HTTP Adaptive Streaming.
Sensors, 2018

Joint compressive representation for multi-feature tracking.
Neurocomputing, 2018

Parallel Connecting Deep and Shallow CNNs for Simultaneous Detection of Big and Small Objects.
Proceedings of the Pattern Recognition and Computer Vision - First Chinese Conference, 2018

Conditional Distributions of Wind Power Ramping for Flexible Ramping Capacity Allocation: An Adjustable Chance-Constrained Approach.
CoRR, 2017

Attack frequency estimation of networked control systems under denial of service with energy constraints.
Proceedings of the IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, China, October 29, 2017

Spatiogram and Fuzzy Logic Based Multi-modality Fusion Tracking with Online Update.
Proceedings of the Computer Vision - Second CCF Chinese Conference, 2017

Analysis of Influencing Factors of Shooting Rate Based on Trajectory Prediction of the Basketball.
Proceedings of the 14th Web Information Systems and Applications Conference, 2017

On the adjacent vertex distinguishing edge chromatic number of graphs.
Ars Comb., 2016

An image segmentation method using automatic threshold based on improved genetic selecting algorithm.
Autom. Control. Comput. Sci., 2016

ERI: A New Method for Ensuring Request Integrity.
Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications, 2016

Total vertex irregularity strength of certain equitable complete m-partite graphs.
Ars Comb., 2015

Recognition of digital modulation signals based on high-order cumulants.
Proceedings of the International Conference on Wireless Communications & Signal Processing, 2015

Wideband spectrum sensing based on optimized adaptive compressive sampling.
Proceedings of the International Conference on Wireless Communications & Signal Processing, 2015

An evolutionary approach to sudoku puzzles with filtered mutations.
Proceedings of the IEEE Congress on Evolutionary Computation, 2015

Co-occurrence Relation of DNS Queries Based Research on Botnet Activities.
J. Networks, 2012

A New Attack Detection in Large Scale Network based on Entropy.
J. Networks, 2012

An Entropy-based Method for Attack Detection in Large Scale Network.
Int. J. Comput. Commun. Control, 2012

On the adjacent vertex distinguishing total chromatic number of outer plane graph.
Ars Comb., 2012

Control and scheduling co-design of networked control system: Overview and directions.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2012

A Bandwidth Allocation Strategy Based on the Proportion of Measurement Error in Networked Control System.
Proceedings of the Third International Conference on Digital Manufacturing & Automation, 2012

The Smarandachely Adjacent Vertex Total Coloring of a kind of 3-regular Grapsh.
Ars Comb., 2011

On model-based networked control system with multi-rate input sampling.
Int. J. Model. Identif. Control., 2010

Remote Sensing Image Enhancement Based on Orthogonal Wavelet Transformation Analysis and Pseudo-color Processing.
Int. J. Comput. Intell. Syst., 2010

A note on the vertex-distinguishing proper total coloring of graphs.
Ars Comb., 2010

Vertex Distinguishing Total Coloring of Ladder Graphs.
Proceedings of the Information and Automation - International Symposium, 2010

Component Availability Based Survivability Recovery in Information System.
Proceedings of the Fifth International Conference on Frontier of Computer Science and Technology, 2010

Iris Location Algorithm Based on Gradient Direction Information.
Proceedings of the ETT 2009, 2009

Establishing a New Self-Learning Mode in CAI Courseware Designing.
Proceedings of the ETT 2009, 2009

Two-Tier GCT Based Approach for Attack Detection.
J. Softw. Eng. Appl., 2008

On the vertex distinguishing equitable edge-coloring of graphs.
Ars Comb., 2008

Another Dimension of Web-Based Learning: Psychological Bestirring.
Proceedings of the Advances in Web Based Learning, 2008

A Large Scale Distance Learning System for IPv6/IPv4 Hybrid Environment.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

An Approach on Detecting Attack Based on Causality in Network Behavior.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

Delay Compensation for Networked Control Systems.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006