default search action
Hui Wen
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j24]Rong Zheng, Ruikang Li, Abdelazim G. Hussien, Qusay Shihab Hamad, Mohammed Azmi Al-Betar, Yan Che, Hui Wen:
A multi-strategy boosted bald eagle search algorithm for global optimization and constrained engineering problems: case study on MLP classification problems. Artif. Intell. Rev. 58(1): 18 (2025) - 2024
- [j23]Xiaogang Cao, Jing Yuan, Hui Wen, Cuiwei Zhang:
The pricing strategies under the online platform selling mode with information sharing. Kybernetes 53(3): 1181-1207 (2024) - [j22]Chenming Yang, Hui Wen, Bryan Hooi, Liang Zhou:
CapMax: A Framework for Dynamic Network Representation Learning From the View of Multiuser Communication. IEEE Trans. Neural Networks Learn. Syst. 35(4): 4554-4566 (2024) - [c32]Jianshuo Liu, Hong Li, Mengjie Sun, Haining Wang, Hui Wen, Zhi Li, Limin Sun:
NFCEraser: A Security Threat of NFC Message Modification Caused by Quartz Crystal Oscillator. SP 2024: 2775-2793 - [i7]Jie Zhang, Haoyu Bu, Hui Wen, Yu Chen, Lun Li, Hongsong Zhu:
When LLMs Meet Cybersecurity: A Systematic Literature Review. CoRR abs/2405.03644 (2024) - [i6]Jianshuo Liu, Hong Li, Haining Wang, Mengjie Sun, Hui Wen, Jinfa Wang, Limin Sun:
TimeTravel: Real-time Timing Drift Attack on System Time Using Acoustic Waves. CoRR abs/2407.06853 (2024) - [i5]Ying Zhang, Xiaoyan Zhou, Hui Wen, Wenjia Niu, Jiqiang Liu, Haining Wang, Qiang Li:
Tactics, Techniques, and Procedures (TTPs) in Interpreted Malware: A Zero-Shot Generation with Large Language Models. CoRR abs/2407.08532 (2024) - 2023
- [j21]Liting Deng, Hui Wen, Mingfeng Xin, Hong Li, Zhiwen Pan, Limin Sun:
Enimanal: Augmented cross-architecture IoT malware analysis using graph neural networks. Comput. Secur. 132: 103323 (2023) - [j20]Zhaoyu Shou, Mengxue Tang, Hui Wen, Jinghua Liu, Jianwen Mo, Huibing Zhang:
Key Student Nodes Mining in the In-Class Social Network Based on Combined Weighted GRA-TOPSIS Method. Int. J. Inf. Commun. Technol. Educ. 19(1): 1-19 (2023) - [j19]Chenming Yang, Hui Wen, Bryan Hooi, Yue Wu, Liang Zhou:
A multi-scale reconstruction method for the anomaly detection in stochastic dynamic networks. Neurocomputing 518: 482-495 (2023) - [j18]Hui Wen, Yue Wu, Jia Hu, Zi Wang, Hancong Duan, Geyong Min:
Communication-Efficient Federated Learning on Non-IID Data Using Two-Step Knowledge Distillation. IEEE Internet Things J. 10(19): 17307-17322 (2023) - [c31]Xiaohui Chen, Lei Cui, Hui Wen, Zhi Li, Hongsong Zhu, Zhiyu Hao, Limin Sun:
MalAder: Decision-Based Black-Box Attack Against API Sequence Based Malware Detectors. DSN 2023: 165-178 - [c30]Tao Yan, Wenting Luo, Hang Xu, Hui Wen, Qian Zhang, Long Zhou:
Research and analysis of big data based on decision model. EITCE 2023: 959-963 - [c29]Jie Zhang, Hui Wen, Liting Deng, Mingfeng Xin, Zhi Li, Lun Li, Hongsong Zhu, Limin Sun:
HackMentor: Fine-Tuning Large Language Models for Cybersecurity. TrustCom 2023: 452-461 - 2022
- [j17]Zhoumingju Jiang, Hui Wen, Fred Han, Yunlong Tang, Yi Xiong:
Data-driven generative design for mass customization: A case study. Adv. Eng. Informatics 54: 101786 (2022) - [j16]Hui Wen, Dongshun Jia, Zhiqiang Liu, Hang Xu, Guangtao Hao:
Optimal SVM learning method based on adaptive sparse sampling and granularity shift factor. KSII Trans. Internet Inf. Syst. 16(4): 1110-1127 (2022) - [j15]Hui Wen, Yue Wu, Jingjing Li, Chenming Yang, Hancong Duan, Yang Yang:
Transferring Inter-Class Correlation for Teacher-Student frameworks with flexible models. Knowl. Based Syst. 242: 108316 (2022) - [j14]Junjiao Liu, Xiaodong Lin, Xin Chen, Hui Wen, Hong Li, Yan Hu, Jiawei Sun, Zhiqiang Shi, Limin Sun:
ShadowPLCs: A Novel Scheme for Remote Detection of Industrial Process Control Attacks. IEEE Trans. Dependable Secur. Comput. 19(3): 2054-2069 (2022) - [c28]Hui Wen, Yue Wu, Jingjing Li, Hancong Duan:
Communication-Efficient Federated Data Augmentation on Non-IID Data. CVPR Workshops 2022: 3376-3385 - 2021
- [j13]Wenguang Wang, Yonglin Xu, Chunhui Du, Yunwen Chen, Yijie Wang, Hui Wen:
Data Set and Evaluation of Automated Construction of Financial Knowledge Graph. Data Intell. 3(3): 418-443 (2021) - [c27]Shuangpeng Bai, Hui Wen, Dongliang Fang, Yue Sun, Puzhuo Liu, Limin Sun:
DSS: Discrepancy-Aware Seed Selection Method for ICS Protocol Fuzzing. ACNS (2) 2021: 27-48 - [c26]Jianzhou You, Shichao Lv, Yue Sun, Hui Wen, Limin Sun:
HoneyVP: A Cost-Effective Hybrid Honeypot Architecture for Industrial Control Systems. ICC 2021: 1-6 - [i4]Mingfeng Xin, Hui Wen, Liting Deng, Hong Li, Qiang Li, Limin Sun:
Firmware Re-hosting Through Static Binary-level Porting. CoRR abs/2107.09856 (2021) - 2020
- [j12]Tao Yan, In-Ho Ra, Hui Wen, Min-Hang Weng, Qian Zhang, Yan Che:
CTU Layer Rate Control Algorithm in Scene Change Video for Free-Viewpoint Video. IEEE Access 8: 24549-24560 (2020) - [j11]Tao Yan, In-Ho Ra, Hui Wen, Min-Hang Weng, Qian Zhang, Yan Che:
Corrections to "CTU Layer Rate Control Algorithm in Scene Change Video for Free-Viewpoint Video". IEEE Access 8: 68982 (2020) - [j10]Yuting Zheng, Lijian Wu, Huayang Li, Hui Wen, Lin Qiu:
Harmonic Analysis of Airgap Magnetic Fields in Doubly-Fed Flux Reversal Permanent Magnet Machines. IEEE Access 8: 134856-134867 (2020) - [j9]Xiaogang Cao, Hui Wu, Hui Wen, Kebing Chen:
Decision-Making of Closed-Loop Supply Chain Strategic Alliance Considering the Quality Level of Remanufactured Products and Patent Protection. Asia Pac. J. Oper. Res. 37(5): 2050021:1-2050021:27 (2020) - [j8]Xiaogang Cao, Xianjia Wang, Hui Wen:
Managing new and remanufactured products with remanufacturing degree under patent protection. Kybernetes 49(3): 707-731 (2020) - [c25]Jiabei Zhu, Lijian Wu, Hui Wen:
Influence of Design Parameters on Output Torque of Novel Doubly-Fed Flux-Switching Permanent Magnet Machines. EVER 2020: 1-7 - [c24]Chenming Yang, Zhiheng Zhou, Hui Wen, Liang Zhou:
MSTNN: A Graph Learning Based Method for the Origin-Destination Traffic Prediction. ICC 2020: 1-6 - [c23]Hui Wen, Jingxin Luo:
Research on a Digital Control of Inverter Power. ICCT 2020: 1650-1654 - [c22]Chenming Yang, Liang Zhou, Hui Wen, Yue Wu:
U-ASG: A Universal Method to Perform Adversarial Attack on Autoencoder based Network Anomaly Detection Systems. INFOCOM Workshops 2020: 68-73 - [c21]Hui Wen, Yue Wu, Chenming Yang, Hancong Duan, Shui Yu:
A Unified Federated Learning Framework for Wireless Communications: towards Privacy, Efficiency, and Security. INFOCOM Workshops 2020: 653-658 - [c20]Liting Deng, Hui Wen, Mingfeng Xin, Yue Sun, Limin Sun, Hongsong Zhu:
Malware Classification Using Attention-Based Transductive Learning Network. SecureComm (2) 2020: 403-418 - [c19]Zhaoteng Yan, Nan Yu, Hui Wen, Zhi Li, Hongsong Zhu, Limin Sun:
Detecting Internet-Scale NATs for IoT Devices Based on Tri-Net. WASA (1) 2020: 602-614 - [i3]Chenming Yang, Liang Zhou, Hui Wen, Zhiheng Zhou, Yue Wu:
H-VGRAE: A Hierarchical Stochastic Spatial-Temporal Embedding Method for Robust Anomaly Detection in Dynamic Networks. CoRR abs/2007.06903 (2020) - [i2]Hui Wen, Yue Wu, Chenming Yang, Jingjing Li, Yue Zhu, Xu Jiang, Hancong Duan:
Transferring Inter-Class Correlation. CoRR abs/2008.10444 (2020)
2010 – 2019
- 2019
- [j7]Zhixin Ma, Pan M. Chu, Yingtong Su, Yue Yu, Hui Wen, Xiongfei Fu, Shuqiang Huang:
Applications of single-cell technology on bacterial analysis. Quant. Biol. 7(3): 171-181 (2019) - [c18]Ke Li, Hong Li, Hongsong Zhu, Limin Sun, Hui Wen:
Side-Channel Information Leakage of Traffic Data in Instant Messaging. IPCCC 2019: 1-8 - [c17]Jingxin Luo, Hui Wen:
Research on Radar Echo Signal Noise Processing and Adaptive RLS Noise Reduction Algorithm. ISCID (2) 2019: 71-74 - [c16]Hui Wen, Weidong Zhang, Yan Hu, Qing Hu, Hongsong Zhu, Limin Sun:
Lightweight IoT Malware Visualization Analysis via Two-Bits Networks. WASA 2019: 613-621 - 2018
- [j6]Hongtao Wang, Hongmei Wang, Feng Yi, Hui Wen, Gang Li, Limin Sun:
Context-aware personalized path inference from large-scale GPS snippets. Expert Syst. Appl. 91: 78-88 (2018) - [c15]Weidong Zhang, Hong Li, Hui Wen, Hongsong Zhu, Limin Sun:
A graph neural network based efficient firmware information extraction method for IoT devices. IPCCC 2018: 1-8 - [c14]Feng Yi, Libo Yin, Hui Wen, Hongsong Zhu, Limin Sun, Gang Li:
Mining Human Periodic Behaviors Using Mobility Intention and Relative Entropy. PAKDD (1) 2018: 488-499 - [c13]Ke Li, Hui Wen, Hong Li, Hongsong Zhu, Limin Sun:
Security OSIF: Toward Automatic Discovery and Analysis of Event Based Cyber Threat Intelligence. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 741-747 - [c12]Tao Zhou, Cheng Tao, Liu Liu, Hui Wen, Nan Zhang:
Analysis of time-frequency-space dispersion and nonstationarity in narrow-strip-shaped networks. WCNC 2018: 1-6 - 2017
- [j5]Hui Wen, Hongguang Fan, Weixin Xie, Jihong Pei:
Hybrid Structure-Adaptive RBF-ELM Network Classifier. IEEE Access 5: 16539-16554 (2017) - [j4]Hongtao Wang, Hui Wen, Feng Yi, Hongsong Zhu, Limin Sun:
Road Traffic Anomaly Detection via Collaborative Path Inference from GPS Snippets. Sensors 17(3): 550 (2017) - [c11]Hui Wen, Minglan Li, Zhili Ye:
Neural Architecture for Negative Opinion Expressions Extraction. APWeb/WAIM (1) 2017: 460-474 - [c10]Minglan Li, Yang Gao, Hui Wen, Yang Du, Haijing Liu, Hao Wang:
Joint RNN model for argument component boundary detection. SMC 2017: 57-62 - [c9]Zhihao Wang, Yongle Chen, Hui Wen, Lian Zhao, Limin Sun:
Discovering Routers as Secondary Landmarks for Accurate IP Geolocation. VTC Fall 2017: 1-5 - [c8]Tao Zhou, Cheng Tao, Liu Liu, Hui Wen, Nan Zhang:
Virtual SIMO Measurement-Based Angular Characterization in High-Speed Railway Scenarios. VTC Spring 2017: 1-5 - [c7]Feng Yi, Hong Li, Hongtao Wang, Hui Wen, Limin Sun:
Mobility Intention-Based Relationship Inference from Spatiotemporal Data. WASA 2017: 871-876 - [i1]Minglan Li, Yang Gao, Hui Wen, Yang Du, Haijing Liu, Hao Wang:
Joint RNN Model for Argument Component Boundary Detection. CoRR abs/1705.02131 (2017) - 2016
- [j3]Hui Wen, Weixin Xie, Jihong Pei, Lixin Guan:
An incremental learning algorithm for the hybrid RBF-BP network classifier. EURASIP J. Adv. Signal Process. 2016: 57 (2016) - [c6]Hongtao Wang, Hui Wen, Feng Yi, Zhi Li, Limin Sun:
Tensor Filter: Collaborative Path Inference from GPS Snippets of Vehicles. WASA 2016: 103-115 - 2015
- [c5]Hui Wen, Shiming Ge, Shuixian Chen, Hongtao Wang, Limin Sun:
Abnormal event detection via adaptive cascade dictionary learning. ICIP 2015: 847-851 - 2014
- [j2]Shuai Jiang, Yi-Rong Liu, Teng Huang, Hui Wen, Kang-Ming Xu, Wei-Xiong Zhao, Wei-Jun Zhang, Wei Huang:
Study of Cl-(H2O)n (n = 1-4) using basin-hopping method coupled with density functional theory. J. Comput. Chem. 35(2): 159-165 (2014) - [c4]Shiming Ge, Rui Yang, Hui Wen, Shuixian Chen, Limin Sun:
Eye localization based on correlation filter bank. ICME 2014: 1-5 - [c3]Hui Wen, Qiang Li, Qi Han, Shiming Ge, Limin Sun:
Poster: Crowdsourcing for video traffic surveillance. MobiSys 2014: 384 - 2012
- [c2]Hui Wen, Peiguang Lin, Yaobin Hu:
Analysis and Design of Internet Monitoring System on Public Opinion Based on Cloud Computing and NLP. WISM 2012: 528-535 - 2010
- [j1]Tianping Zhang, Hui Wen, Qing Zhu:
Adaptive Fuzzy Control of Nonlinear Systems in Pure Feedback Form Based on Input-to-State Stability. IEEE Trans. Fuzzy Syst. 18(1): 80-93 (2010)
2000 – 2009
- 2009
- [c1]Feng Yang, Hui Wen, Wei Cheng, Kangkang Zhang, Peiguang Lin:
A P2P Service Management Model for Emergency Response Using Virtual Service Pool. ICA3PP 2009: 704-714
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 20:49 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint