default search action
Yichao Wang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Yichao Wang 0001 — Shanghai Jiao Tong University, Shanghai, China
- Yichao Wang 0002 — Noah's Ark Lab, Huawei, Shenzhen, China (and 1 more)
- Yichao Wang 0003 — Hunan University, Changsha, China
- Yichao Wang 0004 — Hohai University, Nanjing, China
- Yichao Wang 0005 — Meta, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j12]Yichao Wang, Mohamadamin Rajabinezhad, Shan Zuo:
Secondary Defense Strategies of AC Microgrids Under Polynomially Unbounded FDI Attacks and Communication Link Faults. IEEE Control. Syst. Lett. 8: 2223-2228 (2024) - [j11]Yichao Wang, Yili Ren, Jie Yang:
Multi-Subject 3D Human Mesh Construction Using Commodity WiFi. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 8(1): 23:1-23:25 (2024) - [j10]Bofan Li, Yili Ren, Yichao Wang, Jie Yang:
SpaceBeat: Identity-aware Multi-person Vital Signs Monitoring Using Commodity WiFi. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 8(3): 113:1-113:23 (2024) - [j9]Shan Zuo, Yichao Wang, Mohamadamin Rajabinezhad, Yi Zhang:
Resilient Containment Control of Heterogeneous Multiagent Systems Against Unbounded Attacks on Sensors and Actuators. IEEE Trans. Control. Netw. Syst. 11(3): 1537-1547 (2024) - [j8]Hui Liu, Pengxi Li, Dongpei Liu, Bocheng Zhang, Jieshu Ren, Yichao Wang, Hongyu Li, Jianxin Zhang, Liang Yang, Bin Liu:
A personalized insertion centers preoperative positioning method for minimally invasive surgery of cruciate ligament reconstruction. Vis. Comput. 40(6): 3937-3960 (2024) - [c27]Yali Yuan, Yichao Wang, Guang Cheng:
ProfistMAC: A Protocol Finite State Machine Classifier via Graph Representation. ACISP (2) 2024: 350-369 - [c26]Yichao Wang, Budi Arief, Julio C. Hernandez-Castro:
Analysis of Security Mechanisms of Dark Web Markets. EICC 2024: 120-127 - 2023
- [j7]Xiangxiang Zhang, Yichao Wang:
DeepMECagent: multi-agent computing resource allocation for UAV-assisted mobile edge computing in distributed IoT system. Appl. Intell. 53(1): 1180-1191 (2023) - [j6]Xiaoyu Zhang, Yichao Wang, Xiting Peng, Chaofeng Zhang:
An Efficient Method for Solving Two-Dimensional Partial Differential Equations with the Deep Operator Network. Axioms 12(12): 1095 (2023) - [c25]Zhibo Ren, Huizhen Wang, Muhua Zhu, Yichao Wang, Tong Xiao, Jingbo Zhu:
Overcoming Language Priors with Counterfactual Inference for Visual Question Answering. CCL 2023: 58-71 - [c24]Yichao Wang, Budi Arief, Virginia Nunes Leal Franqueira, Anna Grace Coates, Caoilte Ó Ciardha:
Investigating the Availability of Child Sexual Abuse Materials in Dark Web Markets: Evidence Gathered and Lessons Learned. EICC 2023: 59-64 - [c23]Yichao Wang, Chunzhi Wang, Lingyu Yan:
Image Classification Based on Improved Unsupervised Clustering Algorithm. ICCSE (1) 2023: 147-161 - [c22]Yichao Wang, Budi Arief, Julio C. Hernandez-Castro:
Dark Ending: What Happens when a Dark Web Market Closes down. ICISSP 2023: 106-117 - [c21]Zhengzhong Wang, Shengdong Wang, Kai Zhang, Xingchang Tang, Yichao Wang:
Prediction of mechanical properties of hot-rolled steel based on multi-channel convolutional neural network. IoTAAI 2023: 252-257 - [c20]Yichao Wang, Sophia Roscoe, Budi Arief, Lena Yuryna Connolly, Hervé Borrion, Sanaa Kaddoura:
The Social and Technological Incentives for Cybercriminals to Engage in Ransomware Activities. SocialSec 2023: 149-163 - [c19]Yili Ren, Yichao Wang, Sheng Tan, Yingying Chen, Jie Yang:
Person Re-identification in 3D Space: A WiFi Vision-based Approach. USENIX Security Symposium 2023: 5217-5234 - [i6]Shan Zuo, Yi Zhang, Yichao Wang:
Resilient Containment Control of Heterogeneous Multi-Agent Systems Against Unbounded Sensor and Actuator Attacks. CoRR abs/2301.07823 (2023) - [i5]Yichao Wang, Mohamadamin Rajabinezhad, Shan Zuo:
Secondary Defense Strategies of AC Microgrids Against Generally Unbounded Attacks. CoRR abs/2309.17253 (2023) - [i4]Yichao Wang, Mohamadamin Rajabinezhad, Omar Ali Beg, Shan Zuo:
Distributed Resilient Control of DC Microgrids Under Generally Unbounded FDI Attacks. CoRR abs/2309.17301 (2023) - [i3]Yi Zhang, Yichao Wang, Junbo Zhao, Shan Zuo:
Resilient Model-Free Asymmetric Bipartite Consensus for Nonlinear Multi-Agent Systems against DoS Attacks. CoRR abs/2309.17411 (2023) - 2022
- [j5]Yili Ren, Zi Wang, Yichao Wang, Sheng Tan, Yingying Chen, Jie Yang:
GoPose: 3D Human Pose Estimation Using WiFi. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 6(2): 69:1-69:25 (2022) - [j4]Yichao Wang, Lang Qin:
Research on state prediction method of tobacco curing process based on model fusion. J. Ambient Intell. Humaniz. Comput. 13(6): 2951-2961 (2022) - [c18]Yongxin Jiang, Shunlin Hou, Li Zhang, Xuanfeng Liu, Jiaxi Zhang, Yichao Wang:
Design and Experiment of Secondary Throwing Device of Cotton Straw Crushing and Returning Machine Using Fluent. AIEE 2022: 118-129 - [c17]Yili Ren, Yichao Wang, Sheng Tan, Yingying Chen, Jie Yang:
Poster: A WiFi Vision-based Approach to Person Re-identification. CCS 2022: 3443-3445 - [c16]Shan Zuo, Yichao Wang, Yi Zhang:
Resilient Synchronization of Heterogeneous MAS Against Correlated Sensor Attacks. CDC 2022: 2276-2282 - [c15]Yichao Wang, Hua Chai, Jayashri Ravishankar:
Statistical Analysis Methods in Engineering Education Research: A state-of-the-art Review. EDUCON 2022: 438-444 - [c14]Xiaoyang Wang, Lilan Tu, Yichao Wang:
Benefits Analysis of Chinese Cities on Urban Networks Based on Evolutionary Games. ICBASE 2022: 139-144 - [c13]Mengwei Wu, Qin Lu, Yingxue Wang, Yichao Wang, Huanyu Chen, Weixiao Li:
A Hybrid Model for QoS Prediction based on Improved Conditional Variational Autoencoder. ISPA/BDCloud/SocialCom/SustainCom 2022: 339-346 - [c12]Yingxue Wang, Qin Lu, Yichao Wang, Mengwei Wu, Weixiao Li:
Dynamic QoS Prediction Based on Attention Mechanism and Recurrent Neural Network. ISPA/BDCloud/SocialCom/SustainCom 2022: 347-354 - [c11]Yichao Wang, Yili Ren, Yingying Chen, Jie Yang:
A wifi vision-based 3D human mesh reconstruction. MobiCom 2022: 814-816 - [c10]Yili Ren, Yichao Wang, Sheng Tan, Yingying Chen, Jie Yang:
Person re-identification using wifi signals. MobiCom 2022: 829-831 - [c9]Yichao Wang, Yili Ren, Yingying Chen, Jie Yang:
Wi-Mesh: A WiFi Vision-Based Approach for 3D Human Mesh Construction. SenSys 2022: 362-376 - [c8]Yili Ren, Yichao Wang, Yingying Chen, Jie Yang:
A Vision-Based Approach for Commodity WiFi Sensing. SenSys 2022: 800-801 - [i2]Keenan Jones, Enes Altuncu, Virginia N. L. Franqueira, Yichao Wang, Shujun Li:
A Comprehensive Survey of Natural Language Generation Advances from the Perspective of Digital Deception. CoRR abs/2208.05757 (2022) - [i1]Yichao Wang, Jie Yang:
3D Human Mesh Construction Leveraging Wi-Fi. CoRR abs/2210.10957 (2022) - 2021
- [c7]Yichao Wang, Budi Arief, Julio César Hernández Castro:
Toad in the Hole or Mapo Tofu? Comparative Analysis of English and Chinese Darknet Markets. eCrime 2021: 1-13 - [c6]Yili Ren, Zi Wang, Yichao Wang, Sheng Tan, Yingying Chen, Jie Yang:
3D Human Pose Estimation Using WiFi Signals. SenSys 2021: 363-364
2010 – 2019
- 2019
- [j3]Xi Chen, Luhan Ye, Yichao Wang, Xin Li:
Beyond Expert-Level Performance Prediction for Rechargeable Batteries by Unsupervised Machine Learning. Adv. Intell. Syst. 1(8): 1900102 (2019) - [c5]Huiling Xia, Chunzhi Wang, Lingyu Yan, Xinhua Dong, Yichao Wang:
Machine Learning Based Medicine Distribution System. IDAACS 2019: 912-915 - [c4]Chunzhi Wang, Yichao Wang, Lingyu Yan, Zhiwei Ye, Wencheng Cai, Pan Wu:
Financial Early Warning of Listed Companies Based on Fireworks Algorithm Optimized Back-Propagation Neural Network. IDAACS 2019: 927-932 - 2015
- [j2]Yichao Wang, Qiang Qin, Simon See, Xinhua Lin:
在Intel Knights Corner和NVIDIA Kepler架构上OpenACC的性能可移植性分析 (Performance Portability Evaluation for OpenACC on Intel Knights Corner and NVIDIA Kepler). 计算机科学 42(1): 75-78 (2015) - 2011
- [c3]Yichao Wang, Jun Liu:
Research on the Load Characteristics of Permanent Magnet Synchronous Motor. ICDMA 2011: 1034-1037
2000 – 2009
- 2003
- [c2]Chongxi Feng, Pingyi Fan, Yichao Wang, Ning Ge:
An efficient approach for the selection of priority control parameters in adaptive proportional delay differentiated services. PIMRC 2003: 99-104 - 2002
- [c1]Pingyi Fan, Chongxi Feng, Yichao Wang, Ning Ge:
Investigation of the time-offset-based QoS support with optical burst switching in WDM networks. ICC 2002: 2682-2686
1990 – 1999
- 1993
- [j1]Chongxi Feng, Yichao Wang:
VLSI technology in China. IEEE Commun. Mag. 31(7): 66-69 (1993)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-12 22:58 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint