default search action
Huaibin Wang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j10]Yutong Han, Chundong Wang, Huaibin Wang:
Research on Blockchain Cross-Chain Model Based on "NFT + Cross-Chain Bridge". IEEE Access 12: 77065-77078 (2024) - [j9]Chen Luo, Shanshan Feng, Huaibin Wang, Baoquan Zhang, Pengjuan Yao, Chuyao Luo, Yunming Ye, Yong Xu, Xutao Li, Hao Fang:
LGCNet: A Cloud Detection Method in Remote Sensing Images Using Local and Global Semantics. IEEE Trans. Geosci. Remote. Sens. 62: 1-18 (2024) - [c10]Baoquan Zhang, Huaibin Wang, Chuyao Luo, Xutao Li, Guotao Liang, Yunming Ye, Xiaochen Qi, Yao He:
Codebook Transfer with Part-of-Speech for Vector-Quantized Image Modeling. CVPR 2024: 7757-7766 - [i3]Baoquan Zhang, Huaibin Wang, Chuyao Luo, Xutao Li, Guotao Liang, Yunming Ye, Xiaochen Qi, Yao He:
Codebook Transfer with Part-of-Speech for Vector-Quantized Image Modeling. CoRR abs/2403.10071 (2024) - [i2]Guotao Liang, Baoquan Zhang, Yaowei Wang, Xutao Li, Yunming Ye, Huaibin Wang, Chuyao Luo, Kola Ye, linfeng Luo:
LG-VQ: Language-Guided Codebook Learning. CoRR abs/2405.14206 (2024) - 2023
- [j8]Luyang Zhang, Huaibin Wang, Haitao Wang:
A feature map aggregation network for unconstrained video face recognition. J. Intell. Fuzzy Syst. 44(2): 2413-2425 (2023) - [i1]Xinhai Li, Huaibin Wang, Kuo-Kun Tseng:
GaussianDiffusion: 3D Gaussian Splatting for Denoising Diffusion Probabilistic Models with Structured Noise. CoRR abs/2311.11221 (2023) - 2022
- [j7]Gengxian Li, Chundong Wang, Huaibin Wang:
Unreachable Peers Communication Scheme in Decentralized Networks Based on Peer-to-Peer Overlay Approaches. Future Internet 14(10): 290 (2022) - [j6]Meng Wang, Huaibin Wang, Peng Chen, Tongyu Ding, Jun Xiao, Liang Zhang:
A butterfly-like slot UWB antenna with WLAN band-notch characteristics for MIMO applications. IEICE Electron. Express 19(14): 20220233 (2022) - [c9]Ting Li, Chundong Wang, Huaibin Wang:
TGNRec: Recommendation Based on Trust Networks and Graph Neural Networks. SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta 2022: 1896-1901 - 2021
- [j5]Luyang Zhang, Haitao Wang, Xinyao Wang, Qiang Liu, Huaibin Wang, Hailong Wang:
Vehicle object detection method based on candidate region aggregation. Pattern Anal. Appl. 24(4): 1635-1647 (2021) - 2020
- [c8]Tao Yu, Zhen Liu, Yuaning Liu, Huaibin Wang, Nodir Adilov:
A New Feature Selection Method for Intrusion Detection System Dataset - TSDR method. CIS 2020: 362-365 - [c7]Yuefei Wang, Zhen Liu, Liucun Zhu, Xiaoying Li, Huaibin Wang:
An impedance control method of lower limb exoskeleton rehabilitation robot based on predicted forward dynamics. TrustCom 2020: 1515-1518
2010 – 2019
- 2019
- [j4]Shujie Ren, Huaibin Wang, Liangyi Gong, Chaocan Xiang, Xuangou Wu, Yufeng Du:
Intelligent Contactless Gesture Recognition Using WLAN Physical Layer Information. IEEE Access 7: 92758-92767 (2019) - [c6]Shujie Ren, Huaibin Wang, Bin Li, Liangyi Gong, Hao Yang, Chaocan Xiang, Bo Li:
Demo: Robust Contactless Gesture Recognition Using Commodity WiFi. EWSN 2019: 273-275 - [c5]Linying Xiao, Huaibin Wang:
Network Intrusion Detection Based on Hidden Markov Model and Conditional Entropy. iSCI 2019: 509-519 - 2018
- [c4]Wenjun Yang, Shuzhen Fan, Huaibin Wang:
An Item-Diversity-Based Collaborative Filtering Algorithm to Improve the Accuracy of Recommender System. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 106-110 - 2013
- [j3]Yuanquan Wang, Huaibin Wang, Yan Xu:
Texture segmentation using vector-valued Chan-Vese model driven by local histogram. Comput. Electr. Eng. 39(5): 1506-1515 (2013) - [j2]Yuanquan Wang, Wenqi Ren, Huaibin Wang:
Anisotropic second and fourth order diffusion models based on Convolutional Virtual Electric Field for image denoising. Comput. Math. Appl. 66(10): 1729-1742 (2013) - [c3]Huaibin Wang, Boting Chen:
Design and Research of Data Packets Transmission by Shared Memory Block Based on NDIS. MSN 2013: 550-554 - 2012
- [j1]Huaibin Wang, Yuanquan Wang, Wenqi Ren:
Image denoising using anisotropic second and fourth order diffusions based on gradient vector convolution. Comput. Sci. Inf. Syst. 9(4): 1493-1511 (2012) - 2011
- [c2]Jinfeng Li, Huaibin Wang, Yuanchao Liu:
Research of Fault Alarm Correlation Analysis Based on Association Rules in Communication Network. ICAIC (4) 2011: 40-48 - [c1]Jie Zhao, Yuanquan Wang, Huaibin Wang:
Optical Flow with Harmonic Constraint and Oriented Smoothness. ICIG 2011: 94-99
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint