default search action
Donghua Wang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j18]Donghua Wang, Wen Yao, Tingsong Jiang, Weien Zhou, Lang Lin, Xiaoqian Chen:
An invisible, robust copyright protection method for DNN-generated content. Neural Networks 177: 106391 (2024) - [j17]Donghua Wang, Wen Yao, Tingsong Jiang, Xiaoqian Chen:
AdvOps: Decoupling adversarial examples. Pattern Recognit. 149: 110252 (2024) - [j16]Donghua Wang, Wen Yao, Tingsong Jiang, Xiaoqian Chen:
Improving Transferability of Universal Adversarial Perturbation With Feature Disruption. IEEE Trans. Image Process. 33: 722-737 (2024) - [c10]Chao Li, Wen Yao, Handing Wang, Tingsong Jiang, Donghua Wang, Jialiang Sun:
QRPatch: A Deceptive Texture-Based Black-Box Adversarial Attacks with Genetic Algorithm. CEC 2024: 1-8 - [i10]Donghua Wang, Wen Yao, Tingsong Jiang, Chao Li, Xiaoqian Chen:
Universal Multi-view Black-box Attack against Object Detectors via Layout Optimization. CoRR abs/2407.06688 (2024) - [i9]Donghua Wang, Wen Yao, Tingsong Jiang, Xiaohu Zheng, Junqi Wu, Xiaoqian Chen:
Improving the Transferability of Adversarial Examples by Feature Augmentation. CoRR abs/2407.06714 (2024) - 2023
- [j15]Jialiang Sun, Wen Yao, Tingsong Jiang, Donghua Wang, Xiaoqian Chen:
Differential evolution based dual adversarial camouflage: Fooling human eyes and object detectors. Neural Networks 163: 256-271 (2023) - [j14]Guijian Tang, Wen Yao, Tingsong Jiang, Weien Zhou, Yang Yang, Donghua Wang:
Natural Weather-Style Black-Box Adversarial Attacks Against Optical Aerial Detectors. IEEE Trans. Geosci. Remote. Sens. 61: 1-11 (2023) - [c9]Donghua Wang, Wen Yao, Tingsong Jiang, Chao Li, Xiaoqian Chen:
RFLA: A Stealthy Reflected Light Adversarial Attack in the Physical World. ICCV 2023: 4432-4442 - [i8]Donghua Wang, Wen Yao, Tingsong Jiang, Weien Zhou, Lang Lin, Xiaoqian Chen:
A Plug-and-Play Defensive Perturbation for Copyright Protection of DNN-based Applications. CoRR abs/2304.10679 (2023) - [i7]Chengyin Hu, Weiwen Shi, Chao Li, Jialiang Sun, Donghua Wang, Junqi Wu, Guijian Tang:
Impact of Light and Shadow on Robustness of Deep Neural Networks. CoRR abs/2305.14165 (2023) - [i6]Donghua Wang, Wen Yao, Tingsong Jiang, Chao Li, Xiaoqian Chen:
RFLA: A Stealthy Reflected Light Adversarial Attack in the Physical World. CoRR abs/2307.07653 (2023) - [i5]Jiakai Wang, Donghua Wang, Jin Hu, Siyang Wu, Tingsong Jiang, Wen Yao, Aishan Liu, Xianglong Liu:
Adversarial Examples in the Physical World: A Survey. CoRR abs/2311.01473 (2023) - [i4]Donghua Wang, Wen Yao, Tingsong Jiang, Xiaoqian Chen:
Universal Perturbation-based Secret Key-Controlled Data Hiding. CoRR abs/2311.01696 (2023) - 2022
- [j13]Lingling Yao, Minjuan Lv, Tao Li, Donghua Wang, Xiaoshu Cao:
Exploring the Evolution of the Accessibility of Educational Facilities and Its Influencing Factors in Mountainous Areas: A Case Study of the Rocky Desertification Area in Yunnan, Guangxi, and Guizhou. ISPRS Int. J. Geo Inf. 11(5): 296 (2022) - [c8]Donghua Wang, Tingsong Jiang, Jialiang Sun, Weien Zhou, Zhiqiang Gong, Xiaoya Zhang, Wen Yao, Xiaoqian Chen:
FCA: Learning a 3D Full-Coverage Vehicle Camouflage for Multi-View Physical Adversarial Attack. AAAI 2022: 2414-2422 - [i3]Donghua Wang, Wen Yao, Tingsong Jiang, Guijian Tang, Xiaoqian Chen:
A Survey on Physical Adversarial Attack in Computer Vision. CoRR abs/2209.14262 (2022) - [i2]Jialiang Sun, Tingsong Jiang, Wen Yao, Donghua Wang, Xiaoqian Chen:
Differential Evolution based Dual Adversarial Camouflage: Fooling Human Eyes and Object Detectors. CoRR abs/2210.08870 (2022) - 2021
- [j12]Donghua Wang, Li Dong, Rangding Wang, Diqun Yan:
Fast speech adversarial example generation for keyword spotting system with conditional GAN. Comput. Commun. 179: 145-156 (2021) - [j11]Changli Feng, Quan Zou, Donghua Wang:
Using a low correlation high orthogonality feature set and machine learning methods to identify plant pentatricopeptide repeat coding gene/protein. Neurocomputing 424: 246-254 (2021) - [j10]Yongkang Gong, Diqun Yan, Terui Mao, Donghua Wang, Rangding Wang:
Defending and Detecting Audio Adversarial Example using Frame Offsets. KSII Trans. Internet Inf. Syst. 15(4): 1538-1552 (2021) - [i1]Donghua Wang, Tingsong Jiang, Jialiang Sun, Weien Zhou, Xiaoya Zhang, Zhiqiang Gong, Wen Yao, Xiaoqian Chen:
FCA: Learning a 3D Full-coverage Vehicle Camouflage for Multi-view Physical Adversarial Attack. CoRR abs/2109.07193 (2021) - 2020
- [j9]Zhibin Lv, Donghua Wang, Hui Ding, Bineng Zhong, Lei Xu:
Escherichia Coli DNA N-4-Methycytosine Site Prediction Accuracy Improved by Light Gradient Boosting Machine Feature Selection Technology. IEEE Access 8: 14851-14859 (2020) - [j8]Zihao Yan, Dong Chen, Zhixia Teng, Donghua Wang, Yanjuan Li:
SMOPredT4SE: An Effective Prediction of Bacterial Type IV Secreted Effectors Using SVM Training With SMO. IEEE Access 8: 25570-25578 (2020) - [j7]Shanwen Sun, Chunyan Ao, Donghua Wang, BenZhi Dong:
The Frequencies of Oppositely Charged, Uncharged Polar, and β-Branched Amino Acids Determine Proteins' Thermostability. IEEE Access 8: 66839-66845 (2020) - [j6]Qingwen Li, BenZhi Dong, Donghua Wang, Sui Wang:
Identification of Secreted Proteins From Malaria Protozoa With Few Features. IEEE Access 8: 89793-89801 (2020) - [j5]Donghua Wang, Li Dong, Rangding Wang, Diqun Yan, Jie Wang:
Targeted Speech Adversarial Example Generation With Generative Adversarial Network. IEEE Access 8: 124503-124513 (2020) - [c7]Donghua Wang, Rangding Wang, Li Dong, Diqun Yan, Yiming Ren:
Efficient Generation of Speech Adversarial Examples with Generative Model. IWDW 2020: 251-264 - [c6]Donghua Wang, Rangding Wang, Li Dong, Diqun Yan, Xueyuan Zhang, Yongkang Gong:
Adversarial Examples Attack and Countermeasure for Speech Recognition System: A Survey. SPDE 2020: 443-468
2010 – 2019
- 2019
- [j4]Han Luo, Donghua Wang, Juan Liu, Ying Ju, Zhe Jin:
A Framework Integrating Heterogeneous Databases for the Completion of Gene Networks. IEEE Access 7: 168859-168869 (2019) - [j3]Xin Gao, Donghua Wang, Jun Zhang, Qing Liao, Bin Liu:
iRBP-Motif-PSSM: Identification of RNA-Binding Proteins Based on Collaborative Learning. IEEE Access 7: 168956-168962 (2019) - [j2]Defeng Kong, Zhijun Shuai, Wanyou Li, Donghua Wang:
Electromagnetic Vibration Characteristics Analysis of a Squirrel-Cage Induction Motor Under Different Loading Conditions. IEEE Access 7: 173240-173248 (2019) - 2018
- [j1]Yinshan Yu, Xiaolei Yu, Zhimin Zhao, Kun Qian, Donghua Wang:
Image Analysis System for Optimal Geometric Distribution of RFID Tags Based on Flood Fill and DLT. IEEE Trans. Instrum. Meas. 67(4): 839-848 (2018) - 2011
- [c5]Baofeng Li, Donghua Wang:
Application of Fuzzy Cluster Analysis for Academic Title Evaluation. ICICA (1) 2011: 221-226 - 2010
- [c4]Baofeng Li, Donghua Wang:
Configuration Issues of Cashier Staff in Supermarket Based on Queuing Theory. ICICA (2) 2010: 334-340 - [c3]Donghua Wang, Baofeng Li:
Comprehensive Evaluation of Banking Sustainable Development Based on Entropy Weight Method. ICICA (1) 2010: 368-375
2000 – 2009
- 2008
- [c2]Donghua Wang, Yunmin Zhu, Xiaojing Shen:
Distributed Multisensor Estimation Fusion with Out-of-Sequence Measurements. ICESS 2008: 390-395 - [c1]Xiaojing Shen, Yunmin Zhu, Donghua Wang, Zhisheng You, Enbin Song:
Optimal Distributed Fusion Update with Same Lag Time Out-of-Sequence Measurements. RAM 2008: 613-618
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-25 21:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint