


default search action
Wang Yang
Publications
- 2026
[j26]Sanfeng Zhang
, Yan Wang
, Zhen Zhang, Qingyu Hao
, Yujie Hou, Wang Yang, Linfeng Liu
:
Warning-Graph: An Early Warning Framework for APT Attacks Based on Threat Intelligence Modeling. IEEE Trans. Dependable Secur. Comput. 23(2): 3880-3897 (2026)
[j25]Ruikun Luo
, Wang Yang, Qiang He
, Feifei Chen
, Song Wu
, Hai Jin
, Yun Yang
:
EdgeDup: Popularity-Aware Communication-Efficient Decentralized Edge Data Deduplication. IEEE Trans. Parallel Distributed Syst. 37(2): 459-471 (2026)
[i12]Wang Yang, Debargha Ganguly, Xinpeng Li, Chaoda Song, Shouren Wang, Vikash Singh, Vipin Chaudhary, Xiaotian Han:
Mid-Think: Training-Free Intermediate-Budget Reasoning via Token-Level Triggers. CoRR abs/2601.07036 (2026)
[i10]Wang Yang, Shouren Wang, Chaoda Song, Chuang Ma, Xinpeng Li, Nengbo Wang, Kaixiong Zhou, Vipin Chaudhary, Xiaotian Han:
When Domains Interact: Asymmetric and Order-Sensitive Cross-Domain Effects in Reinforcement Learning for Reasoning. CoRR abs/2602.01365 (2026)
[i9]Xiaoran Cai, Wang Yang, Xiyu Ren, Chekun Law, Rohit Sharma, Peng Qi:
Toward Trustworthy Evaluation of Sustainability Rating Methodologies: A Human-AI Collaborative Framework for Benchmark Dataset Construction. CoRR abs/2602.17106 (2026)- 2025
[j24]Sanfeng Zhang
, Baiyu Tian, Yang Gao
, Mengyao Dai, Wang Yang:
BirdsSong: A stylized generative audio steganography. Comput. Electr. Eng. 123: 110112 (2025)
[j23]Jiahao Wu, Sanfeng Zhang
, Hongxian Liu, Wang Yang:
AAR-Log: A robust log anomaly detection method resisting adversarial attacks. Comput. Networks 269: 111471 (2025)
[j22]Sanfeng Zhang
, Heng Su, Hongxian Liu, Wang Yang:
MPDroid: A multimodal pre-training Android malware detection method with static and dynamic features. Comput. Secur. 150: 104262 (2025)
[j21]Sanfeng Zhang
, Shangze Li, Juncheng Lu, Wang Yang:
Power-ASTNN: A deobfuscation and AST neural network enabled effective detection method for malicious PowerShell Scripts. Comput. Secur. 154: 104441 (2025)
[j20]Sanfeng Zhang
, Zijian Gong, Zhen Zhang, Wang Yang:
APVFGL: A Robust Vertical Federated Graph Learning Framework Against Poisoning Attacks. Concurr. Comput. Pract. Exp. 37(25-26) (2025)
[j19]Sanfeng Zhang
, Luyao Huang
, Zheng Zhang
, Wenduan Xu
, Wang Yang, Linfeng Liu
:
RMD-Graph: Adversarial Attacks Resisting Malicious Domain Detection Based on Dual Denoising. IEEE Trans. Knowl. Data Eng. 37(3): 1394-1410 (2025)
[j18]Sanfeng Zhang
, Xinyi Liu, Zihao Qi
, Xingchen Yan, Wang Yang:
GI-Graph: A Generative Invariant Graph Learning Scheme Towards Out-of-Distribution Generalization. IEEE Trans. Knowl. Data Eng. 37(10): 5934-5947 (2025)
[c31]Wang Yang, Hongye Jin, Shaochen Zhong, Song Jiang, Qifan Wang, Vipin Chaudhary, Xiaotian Han:
100-LongBench: Are de facto Long-Context Benchmarks Literally Evaluating Long-Context Ability? ACL (Findings) 2025: 17560-17576
[c30]Huamin Zhang, Wang Yang, Yanbo Wang, Lihuan Hui:
ARHet: An Asymmetric Link-Based Routing Protocol in Heterogeneous Multi-Radio FANETs. ICC 2025: 3003-3008
[c29]Mingzhe Gao
, Ligeng Chen, Yiling He, Yuhang Chen, Lingyun Ying, Wang Yang:
Distilling Benign Knowledge with Fine-Grained AST Fragments for Precise Real-World Web Shell Detection. IWQoS 2025: 1-10
[i8]Wang Yang, Hongye Jin, Jingfeng Yang, Vipin Chaudhary, Xiaotian Han:
Thinking Preference Optimization. CoRR abs/2502.13173 (2025)
[i7]Wang Yang, Xiang Yue, Vipin Chaudhary, Xiaotian Han:
Speculative Thinking: Enhancing Small-Model Reasoning with Large Model Guidance at Inference Time. CoRR abs/2504.12329 (2025)
[i6]Phat Thanh Dang, Saahil Thoppay, Wang Yang, Qifan Wang, Vipin Chaudhary, Xiaotian Han:
SELF: Self-Extend the Context Length With Logistic Growth Function. CoRR abs/2505.17296 (2025)
[i5]Wang Yang, Zirui Liu, Hongye Jin, Qingyu Yin, Vipin Chaudhary, Xiaotian Han:
Longer Context, Deeper Thinking: Uncovering the Role of Long-Context Ability in Reasoning. CoRR abs/2505.17315 (2025)
[i4]Wang Yang, Hongye Jin, Shaochen Zhong, Song Jiang, Qifan Wang, Vipin Chaudhary, Xiaotian Han:
100-LongBench: Are de facto Long-Context Benchmarks Literally Evaluating Long-Context Ability? CoRR abs/2505.19293 (2025)
[i3]Shouren Wang, Wang Yang, Xianxuan Long, Qifan Wang, Vipin Chaudhary, Xiaotian Han:
Demystifying Hybrid Thinking: Can LLMs Truly Switch Between Think and No-Think? CoRR abs/2510.12680 (2025)- 2024
[j17]Zhiheng Lu, Shusheng Yu
, Kai Huang, Wang Yang
:
An Impurity Rate Estimation Method of Post-Harvest Sugarcane Based on Rotated Bounding Box and Binocular Vision. IEEE Access 12: 130557-130570 (2024)
[j16]Sanfeng Zhang
, Qingyu Hao
, Zijian Gong, Fengzhou Zhu, Yan Wang, Wang Yang:
MDD-FedGNN: A vertical federated graph learning framework for malicious domain detection. Comput. Secur. 147: 104093 (2024)
[c28]Wang Yang, Lingchen Zhao, Dengpan Ye
:
Reputation Defender: Local Black-Box Adversarial Attack against Image-Translation-Based DeepFake. ICME 2024: 1-6
[c27]Tao Yang, Wang Yang, Yanbo Wang
, Lihuan Hui, Jianwei Yao:
SARP: Service-Aware Routing Protocol in Task-Oriented FANET. IPCCC 2024: 1-8
[c26]Lihuan Hui, Wang Yang, Yanbo Wang:
Leveraging SmartNIC for Ring AllReduce Offloading. ISPA 2024: 173-180- 2023
[j14]Wang Yang, Mingzhe Gao
, Ligeng Chen
, Zhengxuan Liu, Lingyun Ying:
RecMaL: Rectify the malware family label via hybrid analysis. Comput. Secur. 128: 103177 (2023)
[c24]Junhao Wu, Wang Yang, Lihuan Hui:
An MPQUIC-Based Frame-Granularity Transmission Mechanism for Adaptive Video Streaming. GLOBECOM 2023: 2686-2691
[c23]Yong Wang, Wang Yang, Jieyu Zhou:
A Shared Bottleneck Aware Multi - Path Selection Scheme for NDN. HPCC/DSS/SmartCity/DependSys 2023: 393-399
[c20]Xueluan Gong, Yanjiao Chen
, Wang Yang, Qian Wang, Yuzhe Gu, Huayang Huang, Chao Shen:
Redeem Myself: Purifying Backdoors in Deep Learning Models using Self Attention Distillation. SP 2023: 755-772
[i2]Wei Zhiwei, Xiao Yi, Tong Ying, Wenjia Xu, Wang Yang:
Linear building pattern recognition via spatial knowledge graph. CoRR abs/2304.10733 (2023)- 2022
[c19]Yuxi Sun, Wang Yang, Lihuan Hui:
Eliminating Communication Bottlenecks in Consensus Protocols using NDN. IPCCC 2022: 87-93
[i1]Wei Zhiwei, Ding Su, Wenjia Xu, Cheng Lu, Zhang Song, Wang Yang:
Circular cartograms via the elastic beam algorithm originated from cartographic generalization. CoRR abs/2204.12645 (2022)- 2021
[j10]Wang Yang, Wenjie Zhao, Yingding Liu, Yaoqiong Chen, Jian Yang:
Simulation of forces acting on the cutter blade surfaces and root system of sugarcane using FEM and SPH coupled method. Comput. Electron. Agric. 180: 105893 (2021)
[j9]Wengang Li, Wang Yang
, Liuyan Yang
, Hailiang Xiong, Yilong Hui
:
Bidirectional Positioning Assisted Hybrid Beamforming for Massive MIMO Systems. IEEE Trans. Commun. 69(5): 3367-3378 (2021)
[c17]Yong Wang, Yongfa Zhou, Qi Scott Wang, Wang Yang, Qing Xu, Chen Wang:
Developing medical ultrasound imaging application across GPU, FPGA, and CPU using oneAPI. IWOCL 2021: 11:1- 2020
[j7]Xueluan Gong
, Qian Wang
, Yanjiao Chen
, Wang Yang, Xinchang Jiang:
Model Extraction Attacks and Defenses on Cloud-Based Machine Learning Models. IEEE Commun. Mag. 58(12): 83-89 (2020)- 2019
[j5]Yi Du, Wang Yang, Yi Zhou:
On the Exponential Stability of a Stratified Flow to the 2D Ideal MHD Equations with Damping. SIAM J. Math. Anal. 51(6): 5077-5102 (2019)- 2017
[j4]Yinglong Dai, Wang Yang, Guojun Wang:
Package balancing k-means algorithm for physical distribution. Int. J. Comput. Sci. Eng. 14(4): 349-358 (2017)- 2016
[j3]Li Li, Wang Yang, Md. Zakirul Alam Bhuiyan
, Guojun Wang:
Unsupervised learning of indoor localization based on received signal strength. Wirel. Commun. Mob. Comput. 16(15): 2225-2237 (2016)
[c13]Heli Zhang, Wang Yang, Hong Ji, Xi Li, Victor C. M. Leung, Lichao Yang:
Delay Aware Resource Allocation for Device-to-Device Communication Underlaying Cellular Networks. WICON 2016: 207-217- 2015
[j2]Qun Yu
, Taieb Znati, Wang Yang:
Energy-Efficient, QoS-Aware Packet Scheduling in High-Speed Networks. IEEE J. Sel. Areas Commun. 33(12): 2789-2800 (2015)
[c12]Yongqiang Dong, Wang Yang, Taieb Znati:
Carriers Selection for Content Dissemination in Social Opportunistic Networks. CIC 2015: 235-243
[c11]Wang Yang, Lei Jia, Guojun Wang:
Application Streaming: A Mobile Application Distribution Method. ICA3PP (1) 2015: 303-316
[c10]Qun Yu, Taieb Znati, Wang Yang:
Energy-efficient, Delay-aware packet scheduling in high-speed networks. IPCCC 2015: 1-8- 2014
[j1]Pinial Khan Butt
, Wang Yang, Guojun Wang:
Achieving energy efficient advertisements traffic for smartphones. Int. J. Embed. Syst. 6(2/3): 225-232 (2014)- 2013
[c9]Juan Li, Wang Yang, Guojun Wang:
A Cross Layer Design for Improving Trivial File Transfer Protocol in Mobile Transparent Computing. HPCC/EUC 2013: 1872-1877
[c8]Shaoming Guo, Wang Yang, Guojun Wang:
NFS Protocol Performance Analysis and Improvement for Mobile Transparent Computing. HPCC/EUC 2013: 1878-1883
[c7]Huanying Yin, Wang Yang, Guojun Wang:
Wireless Multicast for Mobile Transparent Computing. HPCC/EUC 2013: 1884-1889
[c6]Li Li, Wang Yang, Guojun Wang:
HIWL: An Unsupervised Learning Algorithm for Indoor Wireless Localization. TrustCom/ISPA/IUCC 2013: 1747-1753- 2011
[c5]Wang Yang, Hewu Li, Jianping Wu:
ACK Offloading for Reliable Multipath Transfer over Self-Contention Wireless Network. CMC 2011: 165-169- 2010
[c3]Wang Yang, Hewu Li, Fenghua Li, Qian Wu, Jianping Wu:
RPS: range-based path selection method for concurrent multipath transfer. IWCMC 2010: 944-948- 2008
[c2]Wang Yang, Hongliang Wang, Wendong Zhang
, Yu Jun:
Research on Feature Extraction and Recognition of Acoustic Signal Based on AR Parameters Model. ICESS 2008: 344-347- 2006
[c1]Yanbing Peng, Jian Gong, Wang Yang, Weijiang Liu:
Disclosing the Element Distribution of Bloom Filter. International Conference on Computational Science (1) 2006: 1022-1025

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-03-31 00:28 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID






