


default search action
I-Jeng Wang
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c39]Kelun Lu, Lingxin Hao, I-Jeng Wang, Anqi Liu:
Eighth Graders and a Math Intelligent Tutoring System: A Deep Neural Network Analysis. AIED Companion (2) 2024: 38-46 - [i12]Gregory Canal, Vladimir Leung, Philip Sage, Eric Heim, I-Jeng Wang:
A Decision-driven Methodology for Designing Uncertainty-aware AI Self-Assessment. CoRR abs/2408.01301 (2024) - 2023
- [c38]Jared Markowitz, Ryan W. Gardner, Ashley J. Llorens, Raman Arora, I-Jeng Wang:
A Risk-Sensitive Approach to Policy Optimization. AAAI 2023: 15019-15027 - [c37]Nathan Drenkow, Max Lennon, I-Jeng Wang, Philippe Burlina:
Do Adaptive Active Attacks Pose Greater Risk Than Static Attacks? WACV 2023: 1380-1389 - [i11]Erik C. Johnson, Brian S. Robinson, Gautam K. Vallabha, Justin Joyce, Jordan K. Matelsky, Raphael Norman-Tenazas, Isaac Western, Marisel Villafañe-Delgado, Martha Cervantes, Michael S. Robinette, Arun V. Reddy, Lindsey Kitchell, Patricia K. Rivlin, Elizabeth Perez Reilly, Nathan Drenkow, Matthew J. Roos, I-Jeng Wang, Brock A. Wester, William R. Gray Roncal, Joan A. Hoffmann:
Exploiting Large Neuroimaging Datasets to Create Connectome-Constrained Approaches for more Robust, Efficient, and Adaptable Artificial Intelligence. CoRR abs/2305.17300 (2023) - 2022
- [c36]Kapil D. Katyal, Yuxiang Gao, Jared Markowitz, Sara Pohland, Corban G. Rivera, I-Jeng Wang, Chien-Ming Huang:
Learning a Group-Aware Policy for Robot Navigation. IROS 2022: 11328-11335 - [i10]Jared Markowitz, Ryan W. Gardner, Ashley J. Llorens, Raman Arora
, I-Jeng Wang:
A Risk-Sensitive Approach to Policy Optimization. CoRR abs/2208.09106 (2022) - 2021
- [j13]William Paul, I-Jeng Wang, Fady Alajaji, Philippe Burlina:
Unsupervised Discovery, Control, and Disentanglement of Semantic Attributes With Applications to Anomaly Detection. Neural Comput. 33(3): 802-826 (2021) - [c35]Jared Markowitz, Marie Chau, I-Jeng Wang:
Deep CPT-RL: Imparting Human-Like Risk Sensitivity to Artificial Agents. SafeAI@AAAI 2021 - [c34]Kapil D. Katyal, I-Jeng Wang, Gregory D. Hager:
Out-of-Distribution Robustness with Deep Recursive Filters. ICRA 2021: 14134-14140 - [i9]Kapil D. Katyal, I-Jeng Wang, Gregory D. Hager:
Out-of-Distribution Robustness with Deep Recursive Filters. CoRR abs/2104.02799 (2021) - 2020
- [c33]Neil Fendley, Max Lennon, I-Jeng Wang, Philippe Burlina, Nathan Drenkow:
Jacks of All Trades, Masters of None: Addressing Distributional Shift and Obtrusiveness via Transparent Patch Attacks. ECCV Workshops (1) 2020: 105-119 - [c32]Kapil D. Katyal, Katie M. Popek, Gregory D. Hager, I-Jeng Wang, Chien-Ming Huang
:
Prediction-Based Uncertainty Estimation for Adaptive Crowd Navigation. HCI (37) 2020: 353-368 - [i8]William Paul, I-Jeng Wang, Fady Alajaji, Philippe Burlina:
Unsupervised Semantic Attribute Discovery and Control in Generative Models. CoRR abs/2002.11169 (2020) - [i7]Corban G. Rivera, Olivia Lyons, Arielle Summitt, Ayman Fatima, Ji Pak, William Shao, Robert Chalmers, Aryeh Englander, Edward W. Staley, I-Jeng Wang, Ashley J. Llorens:
TanksWorld: A Multi-Agent Environment for AI Safety Research. CoRR abs/2002.11174 (2020) - [i6]Neil Fendley, Max Lennon, I-Jeng Wang, Philippe Burlina, Nathan Drenkow:
Jacks of All Trades, Masters Of None: Addressing Distributional Shift and Obtrusiveness via Transparent Patch Attacks. CoRR abs/2005.00656 (2020) - [i5]Kapil D. Katyal, Yuxiang Gao, Jared Markowitz, I-Jeng Wang, Chien-Ming Huang:
Group-Aware Robot Navigation in Crowded Environments. CoRR abs/2012.12291 (2020)
2010 – 2019
- 2019
- [j12]Philippe Burlina, Neil Joshi, Seth Billings, I-Jeng Wang, Jemima Albayda:
Deep embeddings for novelty detection in myopathy. Comput. Biol. Medicine 105: 46-53 (2019) - [c31]Philippe Burlina, Neil Joshi, I-Jeng Wang:
Where's Wally Now? Deep Generative and Discriminative Embeddings for Novelty Detection. CVPR 2019: 11507-11516 - [c30]Philippe Burlina, Neil J. Joshi, Seth Billings, I-Jeng Wang, Jemima Albayda:
Unsupervised Deep Novelty Detection: Application To Muscle Ultrasound And Myositis Screening. ISBI 2019: 1910-1914 - 2018
- [c29]Wojciech Czaja, Neil Fendley, Michael J. Pekala, Christopher Ratto, I-Jeng Wang:
Adversarial examples in remote sensing. SIGSPATIAL/GIS 2018: 408-411 - [i4]Wojciech Czaja, Neil Fendley, Michael J. Pekala, Christopher Ratto, I-Jeng Wang:
Adversarial Examples in Remote Sensing. CoRR abs/1805.10997 (2018) - 2017
- [c28]Kapil D. Katyal, I-Jeng Wang, Philippe Burlina:
Leveraging Deep Reinforcement Learning for Reaching Robotic Tasks. CVPR Workshops 2017: 490-491 - [c27]Jared Markowitz, Aurora C. Schmidt, Philippe M. Burlina, I-Jeng Wang:
Hierarchical zero-shot classification with convolutional neural network features and semantic attribute learning. MVA 2017: 194-197 - [i3]Jared Markowitz, Aurora C. Schmidt, Philippe M. Burlina, I-Jeng Wang:
Combining Deep Universal Features, Semantic Attributes, and Hierarchical Classification for Zero-Shot Learning. CoRR abs/1712.03151 (2017) - 2015
- [c26]Philippe M. Burlina, Aurora C. Schmidt, I-Jeng Wang:
Zero Shot Deep Learning from Semantic Attributes. ICMLA 2015: 871-876 - [i2]Michael D. Lieberman, Christine D. Piatko, I-Jeng Wang, Joseph Downs, Perry Wilson:
JHU/APL CONSENSE: The Confidence-Based System Ensembler. TAC 2015 - 2014
- [c25]Michael J. Pekala, I-Jeng Wang, Ashley J. Llorens:
Conformal predictors for online track classification. ICASSP 2014: 2922-2926 - 2013
- [c24]Nathan Drenkow, Philippe Burlina, I-Jeng Wang, Daniel DeMenthon, Craig Carmen:
A practical test set bound for rank learning. MLSP 2013: 1-6 - [i1]I-Jeng Wang, Edwina Liu, Cash Costello, Christine D. Piatko:
JHUAPL TAC-KBP2013 Slot Filler Validation System. TAC 2013 - 2012
- [c23]Matthew D. Sharp, Michael J. Pekala, Jeffrey A. Nanzer, I-Jeng Wang, Dennis Lucarelli, Keir Christian Lauritzen:
Exploiting adaptive beamforming for compressive measurements. SAM 2012: 337-340 - [c22]Michael J. Pekala, Ashley J. Llorens, I-Jeng Wang:
Local distance metric learning for efficient conformal predictors. MLSP 2012: 1-6 - 2010
- [j11]Anne Jorstad
, Daniel DeMenthon, I-Jeng Wang, Philippe Burlina:
Distributed Consensus on Camera Pose. IEEE Trans. Image Process. 19(9): 2396-2407 (2010) - [c21]Jixin Li, Ehsan Elhamifar, I-Jeng Wang, René Vidal:
Consensus with robustness to outliers via distributed optimization. CDC 2010: 2111-2117 - [c20]Jong Hyun Lim, Andreas Terzis, I-Jeng Wang:
Tracking a non-cooperative mobile target using low-power pulsed Doppler radars. LCN 2010: 913-920
2000 – 2009
- 2009
- [j10]Ryan Farrell, Roberto García, Dennis Lucarelli, Andreas Terzis, I-Jeng Wang:
Target localization in camera wireless networks. Pervasive Mob. Comput. 5(2): 165-181 (2009) - 2008
- [j9]I-Jeng Wang, James C. Spall:
Stochastic optimisation with inequality constraints using simultaneous perturbations and penalty functions. Int. J. Control 81(8): 1232-1238 (2008) - [j8]Xin Bai, Dan C. Marinescu, Ladislau Bölöni, Howard Jay Siegel, Rose A. Daley, I-Jeng Wang:
A macroeconomic model for resource allocation in large-scale distributed systems. J. Parallel Distributed Comput. 68(2): 182-199 (2008) - [j7]Vladimir Shestak, Edwin K. P. Chong
, Howard Jay Siegel, Anthony A. Maciejewski
, Lotfi Benmohamed, I-Jeng Wang, Rose A. Daley:
A hybrid Branch-and-Bound and evolutionary approach for allocating strings of applications to heterogeneous distributed computing systems. J. Parallel Distributed Comput. 68(4): 410-426 (2008) - [c19]I-Jeng Wang, Jong Hyun Lim, Andreas Terzis:
Energy-efficient sensor management in multi-static active sonar networks. ACSCC 2008: 1611-1616 - [c18]Anshu Saksena, I-Jeng Wang:
Dynamic ping optimization for surveillance in multistatic sonar buoy networks with energy constraints. CDC 2008: 1109-1114 - [c17]Dennis Lucarelli, Anshu Saksena, Ryan Farrell, I-Jeng Wang:
Distributed Inference for Network Localization Using Radio Interferometric Ranging. EWSN 2008: 52-73 - [c16]Qinqing Zhang, Lotfi Benmohamed, I-Jeng Wang:
Exploiting time and user diversity in distributed medium access control for mobile ad-hoc networks. QSHINE 2008: 20 - 2006
- [c15]Xin Bai, Ladislau Bölöni, Dan C. Marinescu, Howard Jay Siegel, Rose A. Daley, I-Jeng Wang:
A brokering framework for large-scale heterogeneous systems. IPDPS 2006 - [c14]Han Yu, Dan C. Marinescu, Annie S. Wu, Howard Jay Siegel, Rose A. Daley, I-Jeng Wang:
Plan switching: an approach to plan execution in changing environments. IPDPS 2006 - [c13]Andreas Terzis, Annalingam Anandarajah, Kevin Moore, I-Jeng Wang:
Slip surface localization in wireless sensor networks for landslide prediction. IPSN 2006: 109-116 - 2005
- [j6]Anshu Saksena, Dennis Lucarelli, I-Jeng Wang:
Bayesian model selection for mining mass spectrometry data. Neural Networks 18(5-6): 843-849 (2005) - [c12]Cash Costello, I-Jeng Wang:
Surveillance Camera Coordination Through Distributed Scheduling. CDC/ECC 2005: 1485-1490 - [c11]Anshu Saksena, Dennis Lucarelli, I-Jeng Wang:
Using domain knowledge to constrain structure learning in a Bayesian bioagent detector. IJCNN 2005: 2601-2606 - [c10]Vladimir Shestak, Edwin K. P. Chong
, Anthony A. Maciejewski
, Howard Jay Siegel, Lotfi Benmohamed, I-Jeng Wang, Rose A. Daley:
Resource Allocation for Periodic Applications in a Shipboard Environment. IPDPS 2005 - [c9]Annalingam Anandarajah, Kevin Moore, Andreas Terzis, I-Jeng Wang:
Sensor networks for landslide detection. SenSys 2005: 268-269 - 2004
- [c8]Edward Y. Chang, Yuan-Fang Wang, I-Jeng Wang:
Toward building a robust and intelligent video surveillance system: a case study. ICME 2004: 1391-1394 - [c7]Dennis Lucarelli, I-Jeng Wang:
Decentralized synchronization protocols with nearest neighbor communication. SenSys 2004: 62-68 - 2003
- [j5]Shalabh Bhatnagar
, Michael C. Fu, Steven I. Marcus, I-Jeng Wang:
Two-timescale simultaneous perturbation stochastic approximation using deterministic perturbation sequences. ACM Trans. Model. Comput. Simul. 13(2): 180-209 (2003) - [c6]I-Jeng Wang, James C. Spall:
Stochastic optimization with inequality constraints using simultaneous perturbations and penalty functions. CDC 2003: 3808-3813 - [c5]I-Jeng Wang, Christopher P. Diehl, Fernando J. Pineda:
A Statistical Model of Proteolytic Digestion. CSB 2003: 506-508 - [c4]Dennis Lucarelli, Cheryl Resch, I-Jeng Wang, Fernando J. Pineda:
Field-Theoretic Methods for Intractable Probabilistic Models. SDM 2003: 294-298 - 2002
- [c3]Xiaoping Xiong, I-Jeng Wang, Michael C. Fu:
Optimization via simulation: randomized-direction stochastic approximation algorithms using deterministic sequences. WSC 2002: 285-291 - 2000
- [j4]Michael C. Fu, Steven I. Marcus, I-Jeng Wang:
Monotone Optimal Policies for a Transient Queueing Staffing Problem. Oper. Res. 48(2): 327-331 (2000)
1990 – 1999
- 1999
- [j3]Edwin K. P. Chong
, I-Jeng Wang, Sanjeev R. Kulkarni:
Noise Conditions for Prespecified Convergence Rates of Stochastic Approximation Algorithms. IEEE Trans. Inf. Theory 45(2): 810-814 (1999) - [c2]Cheryl Resch, Fernando J. Pineda, I-Jeng Wang:
Automatic recognition and assignment of missile pieces in clutter. IJCNN 1999: 3177-3181 - [c1]Surjamukhi Chatterjea, Edwin K. P. Chong, Howard Jay Siegel, Steven D. Jones, I-Jeng Wang, Michael Jurczyk:
Quality of Service Attributes in a Hierarchical System for Global Information Dissemination: A Preliminary Study. PDPTA 1999: 1076-1082 - 1998
- [j2]I-Jeng Wang, Edwin K. P. Chong
:
A deterministic analysis of stochastic approximation with randomized directions. IEEE Trans. Autom. Control. 43(12): 1745-1749 (1998) - 1997
- [j1]I-Jeng Wang, Edwin K. P. Chong
, Sanjeev R. Kulkarni:
Weighted averaging and stochastic approximation. Math. Control. Signals Syst. 10(1): 41-60 (1997)
Coauthor Index
aka: Philippe M. Burlina

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-22 20:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint