default search action
Zhenghong Wang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j12]Zhenghong Wang, Yi Wang, Furong Jia, Kun Liu
, Yishan Zhang, Fan Zhang, Zhou Huang, Yu Liu:
Learning from leading indicators to predict long-term dynamics of hourly electricity generation from multiple resources. Neural Networks 186: 107268 (2025) - 2024
- [j11]Jingyuan Zhao
, Wenyi Zhao, Bo Deng
, Zhenghong Wang, Feng Zhang, Wenxiang Zheng, Wanke Cao
, Jinrui Nan, Yubo Lian, Andrew F. Burke
:
Autonomous driving system: A comprehensive survey. Expert Syst. Appl. 242: 122836 (2024) - [j10]Zhenghong Wang, Yi Wang, Furong Jia, Fan Zhang, Nikita Klimenko, Leye Wang, Zhengbing He, Zhou Huang, Yu Liu:
Spatiotemporal Fusion Transformer for large-scale traffic forecasting. Inf. Fusion 107: 102293 (2024) - [j9]Zhenghong Wang, Sijie Ruan, Tianqiang Huang, Haoyi Zhou, Shanghang Zhang, Yi Wang, Leye Wang, Zhou Huang, Yu Liu:
A lightweight multi-layer perceptron for efficient multivariate time series forecasting. Knowl. Based Syst. 288: 111463 (2024) - [j8]Zhenghong Wang, Fanhua Yu, Dan Wang, Taihui Liu, Rongjun Hu:
Multi-threshold segmentation of breast cancer images based on improved dandelion optimization algorithm. J. Supercomput. 80(3): 3849-3874 (2024) - 2023
- [c13]Mingxin Wu, Zhenghong Wang:
The Construction of Subject Knowledge Mapping in the Background of Smart Education. ICEIT 2023: 317-320 - 2022
- [j7]Yueming Yin, Chaoqun Wei, Haichao Wang, Zhenghong Wang, Qinglu Deng
:
Prediction of thawing settlement coefficient of frozen soil using 5G communication. Soft Comput. 26(20): 10837-10852 (2022) - [j6]Yuhong Wen
, You Zhou
, Fei Wu
, Shu Li, Zhenghong Wang, Changsheng Xie
:
WA-OPShare: Workload-Adaptive Over-Provisioning Space Allocation for Multi-Tenant SSDs. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 41(11): 4527-4538 (2022) - 2020
- [j5]Chuan Yang
, Zhenghong Wang
:
An Ensemble Wasserstein Generative Adversarial Network Method for Road Extraction From High Resolution Remote Sensing Images in Rural Areas. IEEE Access 8: 174317-174324 (2020)
2010 – 2019
- 2018
- [j4]Zhenghong Wang
, Zhangjie Fu
, Xingming Sun
:
Semantic Contextual Search Based on Conceptual Graphs over Encrypted Cloud. Secur. Commun. Networks 2018: 1420930:1-1420930:10 (2018) - 2016
- [j3]Hong Qin, Zhenghong Wang, Kashinath Chatterjee
:
Uniformity Pattern of Asymmetric Fractional Factorials. J. Syst. Sci. Complex. 29(2): 499-510 (2016) - 2013
- [c12]Kei Uchizawa, Zhenghong Wang, Hiroki Morizumi, Xiao Zhou:
Complexity of Counting Output Patterns of Logic Circuits. CATS 2013: 37-43 - 2011
- [j2]Xiaolei Liu, Zhen Bao, Haitao Liu, Zhenghong Wang:
The Quality and Characteristics of Leading General Hospitals' Websites in China. J. Medical Syst. 35(6): 1553-1562 (2011) - 2010
- [j1]Xiaolei Liu, Haitao Liu, Zhen Bao, Bo Ju, Zhenghong Wang:
A web-based self-testing system with some features of Web 2.0: Design and primary implementation. Comput. Educ. 55(1): 265-275 (2010) - [c11]Xiaoping Li, Xuelin Wu, Lihua Zhang, Zhenghong Wang:
Research on clustering algorithm used to choose the villa topographic. ICIS 2010: 22-25
2000 – 2009
- 2008
- [c10]Zhenghong Wang, Ruby B. Lee:
A novel cache architecture with enhanced performance and security. MICRO 2008: 83-93 - 2007
- [c9]Zhenghong Wang, Jing Deng, Ruby B. Lee:
Mutual Anonymous Communications: A New Covert Channel Based on Splitting Tree MAC. INFOCOM 2007: 2531-2535 - [c8]Zhenghong Wang, Ruby B. Lee:
New cache designs for thwarting software cache-based side channel attacks. ISCA 2007: 494-505 - 2006
- [c7]Zhenghong Wang, Ruby B. Lee:
Covert and Side Channels Due to Processor Architecture. ACSAC 2006: 473-482 - [c6]Michael Neve, Jean-Pierre Seifert, Zhenghong Wang:
A refined look at Bernstein's AES side-channel analysis. AsiaCCS 2006: 369 - 2005
- [c5]Zhenghong Wang, Ruby B. Lee:
Capacity Estimation of Non-Synchronous Covert Channels. ICDCS Workshops 2005: 170-176 - [c4]Ruby B. Lee, Peter C. S. Kwan, John Patrick McGregor, Jeffrey S. Dwoskin, Zhenghong Wang:
Architecture for Protecting Critical Secrets in Microprocessors. ISCA 2005: 2-13 - [c3]Zhenghong Wang, Ruby B. Lee:
New Constructive Approach to Covert Channel Modeling and Channel Capacity Estimation. ISC 2005: 498-505 - 2003
- [c2]Zhenghong Wang, Xieting Ling, Bo Hu:
A low-complexity low-distortion topology for wideband delta-sigma ADCs. ISCAS (1) 2003: 937-940 - 2001
- [c1]Zhenghong Wang, Xieting Ling:
Noise-reducing loop in multi-bit Sigma-Delta modulators. ISCAS (1) 2001: 284-287
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-04-03 00:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint