default search action
Yunchao Wang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Xixing Li, Lei Zhao, Qiang Wei, Zehui Wu, Weiming Shi, Yunchao Wang:
SHFuzz: Service handler-aware fuzzing for detecting multi-type vulnerabilities in embedded devices. Comput. Secur. 138: 103618 (2024) - [j12]Pan Liang, Danwei Ye, Zihao Zhu, Yunchao Wang, Wang Xia, Ronghua Liang, Guodao Sun:
C5: toward better conversation comprehension and contextual continuity for ChatGPT. J. Vis. 27(4): 713-730 (2024) - [j11]Tong Li, Guodao Sun, Baofeng Chang, Yunchao Wang, Qi Jiang, Yuanzhong Ying, Li Jiang, Haixia Wang, Ronghua Liang:
LANDER: Visual Analysis of Activity and Uncertainty in Surveillance Video. IEEE Trans. Hum. Mach. Syst. 54(4): 427-440 (2024) - [j10]Yunchao Wang, Guodao Sun, Zihao Zhu, Tong Li, Ling Chen, Ronghua Liang:
E2Storyline: Visualizing the Relationship with Triplet Entities and Event Discovery. ACM Trans. Intell. Syst. Technol. 15(1): 16:1-16:26 (2024) - [i2]Yunchao Wang, Zihang Fu, Chaoqing Xu, Guodao Sun, Ronghua Liang:
Investigating Human-Computer Interaction and Visual Comprehension in Text Generation Process of Natural Language Generation Models. CoRR abs/2410.08723 (2024) - 2023
- [j9]Guodao Sun, Zihao Zhu, Gefei Zhang, Chaoqing Xu, Yunchao Wang, Sujia Zhu, Baofeng Chang, Ronghua Liang:
Application of Mathematical Optimization in Data Visualization and Visual Analytics: A Survey. IEEE Trans. Big Data 9(4): 1018-1037 (2023) - [j8]Yang Zhang, Ling Chen, Haonan Chen, Jinghui Chu, Baofeng Chang, Yunchao Wang, Guodao Sun:
Visual analysis of inscriptions in the Tang Dynasty: a case study on the calligraphy style of Wang Xizhi. Vis. Intell. 1(1) (2023) - [c3]Linhao He, Yunchao Wang, Chenyu Yan, Xixing Li, Qiang Wei:
KBEE: Linux Kernel Vulnerability Exploitability Exploration. ICCEIC 2023: 10-15 - [i1]Pan Liang, Danwei Ye, Zihao Zhu, Yunchao Wang, Wang Xia, Ronghua Liang, Guodao Sun:
C5: Towards Better Conversation Comprehension and Contextual Continuity for ChatGPT. CoRR abs/2308.05567 (2023) - 2022
- [j7]Lei Wang, Guodao Sun, Yunchao Wang, Ji Ma, Xiaomin Zhao, Ronghua Liang:
AFExplorer: Visual analysis and interactive selection of audio features. Vis. Informatics 6(1): 47-55 (2022) - [j6]Yunchao Wang, Zihao Zhu, Lei Wang, Guodao Sun, Ronghua Liang:
Visualization and visual analysis of multimedia data in manufacturing: A survey. Vis. Informatics 6(4): 12-21 (2022) - 2020
- [j5]Yunchao Wang, Zehui Wu, Qiang Wei, Qingxian Wang:
EPfuzzer: Improving Hybrid Fuzzing with Hardest-to-reach Branch Prioritization. KSII Trans. Internet Inf. Syst. 14(9): 3885-3906 (2020) - [j4]Yunfa Li, Yifei Tu, Jiawa Lu, Yunchao Wang:
A Security Transmission and Storage Solution about Sensing Image for Blockchain in the Internet of Things. Sensors 20(3): 916 (2020) - [c2]Yunchao Wang, Yunfa Li, Xiao-Nan Lu:
Evaluation Criteria for Visual Cryptography Schemes via Neural Networks. CW 2020: 289-292
2010 – 2019
- 2019
- [j3]Yunchao Wang, Zehui Wu, Qiang Wei, Qingxian Wang:
NeuFuzz: Efficient Fuzzing With Deep Neural Network. IEEE Access 7: 36340-36352 (2019) - 2018
- [j2]Yunchao Wang, Zhen Liu:
融合用户对项目和属性偏好的协同过滤算法 (Collaborative Filtering Algorithm Based on User's Preference for Items and Attributes). 计算机科学 45(11A): 412-416 (2018) - [c1]Xiaobin Song, Zehui Wu, Yunchao Wang:
Directer: A Parallel and Directed Fuzzing based on Concolic Execution. ICSIE 2018: 87-92 - 2016
- [j1]Yunchao Wang, Qiang Wei, Zehui Wu:
基于静态污点分析的Android应用Intent注入漏洞检测方法 (Approach of Android Applications Intent Injection Vulnerability Detection Based on Static Taint Analysis). 计算机科学 43(9): 192-196 (2016)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-19 20:48 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint