default search action
An Wang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- An Wang 0001 — Chinese Academy of Sciences, Institute of Information Engineering, State Key Laboratory of Information Security, Beijing, China (and 3 more)
- An Wang 0002 — Case Western Reserve University, Cleveland, Ohio, USA (and 1 more)
- An Wang 0003 — University of Washington, Seattle, WA, USA
- An Wang 0004 — Nanjing University of Information Science and Technology, Nanjing, China
- An Wang 0005 — Shandong University, Jinan, China
- An Wang 0006 — University of Western Ontario, Canada
- An Wang 0007 — Chinese University of Hong Kong, Department of Electronic Engineering, Hong Kong, China
- An Wang 0008 — Fuzhou University, National and Local Joint Engineering Research Center of Satellite Geospatial Information Technology, Key Laboratory of Spatial Data Mining and Information Sharing, Fuzhou, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j19]Cuiling Fan, An Wang, Li Xu:
New classes of NMDS codes with dimension 3. Des. Codes Cryptogr. 92(2): 397-418 (2024) - [j18]Ni Wang, Yuhong Gong, An Wang:
A New AM-LBCNN Model for Tree Species Texture Extraction Using Airborne Images. IEEE Geosci. Remote. Sens. Lett. 21: 1-5 (2024) - [c25]Yaoyuan Hu, An Wang, Weiping Gong, Jingjie Wu, Ziyu Wang, Shiming Zhang, Shufan Ma:
Cross-Correlation Based Trace Segmentation for Clustering Power Analysis on Public Key Cryptosystems. ACNS Workshops (1) 2024: 359-375 - [c24]Youmi Ma, An Wang, Naoaki Okazaki:
Building a Japanese Document-Level Relation Extraction Dataset Assisted by Cross-Lingual Transfer. LREC/COLING 2024: 2567-2579 - [c23]Haonan Shi, Tu Ouyang, An Wang:
Learning-Based Difficulty Calibration for Enhanced Membership Inference Attacks. EuroS&P 2024: 62-77 - [c22]Jingqi Zhang, Yujie Jiang, An Wang:
Modular Inversion Architecture over GF(2m) Using Optimal Exponentiation Blocks for ECC Cryptosystems. ISCAS 2024: 1-5 - [i6]Haonan Shi, Tu Ouyang, An Wang:
Learning-Based Difficulty Calibration for Enhanced Membership Inference Attacks. CoRR abs/2401.04929 (2024) - [i5]Youmi Ma, An Wang, Naoaki Okazaki:
Building a Japanese Document-Level Relation Extraction Dataset Assisted by Cross-Lingual Transfer. CoRR abs/2404.16506 (2024) - [i4]An Wang, Xingwu Sun, Ruobing Xie, Shuaipeng Li, Jiaqi Zhu, Zhen Yang, Pinxue Zhao, J. N. Han, Zhanhui Kang, Di Wang, Naoaki Okazaki, Cheng-Zhong Xu:
HMoE: Heterogeneous Mixture of Experts for Language Modeling. CoRR abs/2408.10681 (2024) - 2023
- [j17]Fangfang Yin, An Wang, Yu Zhang, Danpu Liu, Libiao Jin:
Reliability enhancement for multimedia delivery in caching-assisted MmWave HetNets. J. Commun. Networks 25(3): 322-332 (2023) - [c21]Youmi Ma, An Wang, Naoaki Okazaki:
DREEAM: Guiding Attention with Evidence for Improving Document-Level Relation Extraction. EACL 2023: 1963-1975 - [c20]Yuan Ma, Xinyue Yang, An Wang, Congming Wei, Tianyu Chen, Haotong Xu:
Side-Channel Analysis on Lattice-Based KEM Using Multi-feature Recognition - The Case Study of Kyber. ICISC (1) 2023: 221-239 - [c19]An Wang, Junfeng Jiang, Youmi Ma, Ao Liu, Naoaki Okazaki:
Generative Data Augmentation for Aspect Sentiment Quad Prediction. *SEM@ACL 2023: 128-140 - [i3]Youmi Ma, An Wang, Naoaki Okazaki:
DREEAM: Guiding Attention with Evidence for Improving Document-Level Relation Extraction. CoRR abs/2302.08675 (2023) - 2022
- [j16]Qinghe Zhao, Yaru Jing, An Wang, Zaihui Yu, Yi Liu, Jinhai Yu, Guoshun Liu, Shengyan Ding:
Response of Sediment Connectivity to Altered Convergence Processes Induced by Forest Roads in Mountainous Watershed. Remote. Sens. 14(15): 3603 (2022) - [j15]Qinghe Zhao, An Wang, Yaru Jing, Guiju Zhang, Zaihui Yu, Jinhai Yu, Yi Liu, Shengyan Ding:
Optimizing Management Practices to Reduce Sediment Connectivity between Forest Roads and Streams in a Mountainous Watershed. Remote. Sens. 14(19): 4897 (2022) - [j14]An Wang, Ren Togo, Takahiro Ogawa, Miki Haseyama:
Defect Detection of Subway Tunnels Using Advanced U-Net Network. Sensors 22(6): 2330 (2022) - [c18]Ao Liu, An Wang, Naoaki Okazaki:
Semi-Supervised Formality Style Transfer with Consistency Training. ACL (1) 2022: 4689-4701 - [c17]Li Zou, An Wang, Huijuan Wang:
Memory Based Temporal Network Prediction. COMPLEX NETWORKS (2) 2022: 661-673 - [c16]An Wang, Ren Togo, Takahiro Ogawa, Miki Haseyama:
Multi-scale Defect Detection from Subway Tunnel Images with Spatial Attention Mechanism. ICCE-TW 2022: 305-306 - [i2]An Wang, Ao Liu, Hieu Hanh Le, Haruo Yokota:
Towards Effective Multi-Task Interaction for Entity-Relation Extraction: A Unified Framework with Selection Recurrent Network. CoRR abs/2202.07281 (2022) - [i1]Ao Liu, An Wang, Naoaki Okazaki:
Semi-Supervised Formality Style Transfer with Consistency Training. CoRR abs/2203.13620 (2022) - 2021
- [c15]Junfeng Jiang, An Wang, Akiko Aizawa:
Attention-based Relational Graph Convolutional Network for Target-Oriented Opinion Words Extraction. EACL 2021: 1986-1997 - 2020
- [j13]Wei Liao, Lijun Zhou, Dongyang Wang, An Wang, Lei Guo, Yi Cui:
A Diagnostic Method for Moisture Intrusion Fault in OIP Bushing. IEEE Trans. Instrum. Meas. 69(9): 7072-7081 (2020)
2010 – 2019
- 2019
- [j12]Yongzhuang Wei, Fu Yao, Enes Pasalic, An Wang:
New second-order threshold implementation of AES. IET Inf. Secur. 13(2): 117-124 (2019) - [j11]An Wang, Yang Cao, Jingxian Chen:
Modified Newton-Type Iteration Methods for Generalized Absolute Value Equations. J. Optim. Theory Appl. 181(1): 216-230 (2019) - [j10]Mingyue Yuan, Dong Yin, Jinwen Ding, Zhipeng Zhou, Chengfeng Zhu, Rui Zhang, An Wang:
A multi-image Joint Re-ranking framework with updateable Image Pool for person re-identification. J. Vis. Commun. Image Represent. 59: 527-536 (2019) - [j9]Yang Cao, An Wang:
Two-step modulus-based matrix splitting iteration methods for implicit complementarity problems. Numer. Algorithms 82(4): 1377-1394 (2019) - [c14]An Wang, Ren Togo, Takahiro Ogawa, Miki Haseyama:
Detection of Distress Region from Subway Tunnel Images via U-net-based Deep Semantic Segmentation. GCCE 2019: 766-767 - [c13]Kunming Li, Yijun Gu, Peijing Zhang, An Wang, Wenzheng Li:
Research on KNN Algorithm in Malicious PDF Files Classification under Adversarial Environment. ICBDC 2019: 156-159 - [c12]Xiaoqian Lv, An Wang, Qinglin Liu, Jiamin Sun, Shengping Zhang:
Proposal-Refined Weakly Supervised Object Detection in Underwater Images. ICIG (1) 2019: 418-428 - [c11]An Wang, Mingxue Liao, Pin Lv:
A Knowledge Selection Model in Pointer-Generator Dialogue Systems. ICNC-FSKD 2019: 451-458 - [c10]Wenzheng Li, Yijun Gu, An Wang, Kunming Li:
Improvement of Ego Network Detection Algorithm Based on Cluster Validity Index. ISI 2019: 35-40 - 2018
- [j8]An Wang, Guoliang Gong, Rongxuan Shen, Wenyu Mao, Huaxiang Lu, Ke Wang, Junping Wang:
Tracking the multi-well surface dynamometer card state for a sucker-rod pump by using a particle filter. IET Commun. 12(16): 2058-2066 (2018) - [j7]Yuhao Luo, Dong Yin, An Wang, Wentao Wu:
Pedestrian tracking in surveillance video based on modified CNN. Multim. Tools Appl. 77(18): 24041-24058 (2018) - [c9]Dong Yin, YuQing Miao, Kang Qiu, An Wang:
Study on Human Body Action Recognition. CCBR 2018: 87-95 - [c8]Chengyuan Tang, Runzi Liu, Min Sheng, An Wang, Ningbo Song, Jiandong Li, Weihua Wu:
Task-oriented Resource Management Simulation Platform for Space Information Networks. WCSP 2018: 1-7 - 2017
- [j6]Wuyin Jin, Qian Lin, An Wang, Chun-Ni Wang:
Computer Simulation of Noise Effects of the Neighborhood of Stimulus Threshold for a Mathematical Model of Homeostatic Regulation of Sleep-Wake Cycles. Complex. 2017: 4797545:1-4797545:7 (2017) - [j5]Danhui Wang, An Wang:
Bitwise Collision Attack Based on Second-Order Distance. KSII Trans. Internet Inf. Syst. 11(3): 1802-1819 (2017) - 2014
- [j4]Yu Xiao, Yong Cui, Petri Savolainen, Matti Siekkinen, An Wang, Liu Yang, Antti Ylä-Jääski, Sasu Tarkoma:
Modeling Energy Consumption of Data Transmission Over Wi-Fi. IEEE Trans. Mob. Comput. 13(8): 1760-1773 (2014) - [c7]Danhui Wang, An Wang, Xuexin Zheng:
Fault-Tolerant Linear Collision Attack: A Combination with Correlation Power Analysis. ISPEC 2014: 232-246 - 2013
- [j3]An Wang, Jin Chen, Yueming Cai, Chunxiao Cai, Wendong Yang, Yunpeng Cheng:
Joint subcarrier and power allocation for physical layer security in cooperative OFDMA networks. EURASIP J. Wirel. Commun. Netw. 2013: 193 (2013) - [j2]Xuexin Zheng, An Wang, Wei Wei:
First-order collision attack on protected NTRU cryptosystem. Microprocess. Microsystems 37(6-7): 601-609 (2013) - [c6]An Wang, Yueming Cai, Wendong Yang, Zhao Hou:
A Stackelberg security game with cooperative jamming over a multiuser OFDMA network. WCNC 2013: 4169-4174 - 2012
- [c5]An Wang, Jechang Jeong:
Deinterlacing using multi direction detection with fixed adaptive tap interpolation filter. BMSB 2012: 1-5 - [c4]Min-Woong Seo, An Wang, Zhuo Li, Keita Yasutomi, Keiichiro Kagawa, Shoji Kawahito:
A CMOS imager using focal-plane pinhole effect for confocal multibeam scanning microscopy. Sensors, Cameras, and Systems for Industrial and Scientific Applications 2012: 829807 - 2011
- [c3]An Wang, Yueming Cai, Zhao Hou:
A novel resource allocation algorithm in uplink multi-cell OFDMA networks based on game theory. WCSP 2011: 1-4
2000 – 2009
- 2009
- [c2]Yong Liu, Long Zhang, Ling Zhu, Yikun Wang, An Wang, Feng Yu:
Non-Invasive Method for Detecting Skin Autofluorescence of Advanced Glycation End Products. BMEI 2009: 1-3 - 2006
- [j1]Ralph O. Buchal, An Wang:
CMM sequence optimisation with collision detection. Int. J. Comput. Appl. Technol. 26(1/2): 65-74 (2006)
1950 – 1959
- 1952
- [c1]An Wang:
Static magnetic memory: its applications to computers and controlling systems. ACM National Meeting (Pittsburgh) 1952: 207-212
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-14 20:59 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint