default search action
Shaohui Wang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j25]Luo De, Nan Xing, Qinyun Du, Sa Guo, Shaohui Wang:
Investigating the anti-lung cancer properties of Zhuang medicine Cycas revoluta Thunb. leaves targeting ion channels and transporters through a comprehensive strategy. Comput. Biol. Chem. 112: 108156 (2024) - [j24]Shaohui Wang, Youjia Shao, Na Tian, Wencang Zhao:
Comprehensive mining of information in Weakly Supervised Semantic Segmentation: Saliency semantics and edge semantics. Neural Networks 169: 75-82 (2024) - [j23]Yingchen Wang, Hongtao Wang, Cheng Wang, Shuting Zhang, Rongxi Wang, Shaohui Wang, Jingjing Duan:
Co-Kriging-Guided Interpolation for Mapping Forest Aboveground Biomass by Integrating Global Ecosystem Dynamics Investigation and Sentinel-2 Data. Remote. Sens. 16(16): 2913 (2024) - [c29]Xihe Yang, Xingyu Chen, Daiheng Gao, Shaohui Wang, Xiaoguang Han, Baoyuan Wang:
HAVE-FUN: Human Avatar Reconstruction from Few-Shot Unconstrained Images. CVPR 2024: 742-752 - [c28]Yaoyu Su, Shaohui Wang, Haoqian Wang:
DT-NeRF: Decomposed Triplane-Hash Neural Radiance Fields For High-Fidelity Talking Portrait Synthesis. ICASSP 2024: 3975-3979 - 2023
- [j22]Jiayi Yan, Shaohui Wang, Jing Lin, Peihao Li, Ruxin Zhang, Haoqian Wang:
GaitSG: Gait Recognition with SMPLs in Graph Structure. Sensors 23(20): 8627 (2023) - [c27]Peihao Li, Shaohui Wang, Chen Yang, Bingbing Liu, Weichao Qiu, Haoqian Wang:
NeRF-MS: Neural Radiance Fields with Multi-Sequence. ICCV 2023: 18545-18554 - [i8]Yaoyu Su, Shaohui Wang, Haoqian Wang:
DT-NeRF: Decomposed Triplane-Hash Neural Radiance Fields for High-Fidelity Talking Portrait Synthesis. CoRR abs/2309.07752 (2023) - [i7]Xihe Yang, Xingyu Chen, Shaohui Wang, Daiheng Gao, Xiaoguang Han, Baoyuan Wang:
HAVE-FUN: Human Avatar Reconstruction from Few-Shot Unconstrained Images. CoRR abs/2311.15672 (2023) - 2022
- [j21]Jia-Bao Liu, Jing Chen, Jing Zhao, Shaohui Wang:
The Laplacian Spectrum, Kirchhoff Index, and the Number of Spanning Trees of the Linear Heptagonal Networks. Complex. 2022: 5584167:1-5584167:10 (2022) - 2021
- [j20]Muhammad Javaid, Hafiz Usman Afzal, Shaohui Wang:
Complexity of Some Generalized Operations on Networks. Complex. 2021: 9999157:1-9999157:29 (2021) - 2020
- [j19]Zehui Shao, Zepeng Li, Bo Wang, Shaohui Wang, Xiujun Zhang:
Interval edge-coloring: A model of curriculum scheduling. AKCE Int. J. Graphs Comb. 17(3): 725-729 (2020) - [j18]Xiaoli Wang, Feifei Wang, Yuhou Song, Guirong Zhang, Shaohui Wang:
Design of Intelligent Management and Service System for Gas Valve. J. Inf. Process. Syst. 16(5): 1095-1104 (2020)
2010 – 2019
- 2019
- [j17]Xiaolong Shi, Pu Wu, Zehui Shao, Vladimir Samodivkin, Seyed Mahmoud Sheikholeslami, Marzieh Soroudi, Shaohui Wang:
Changing and Unchanging 2-Rainbow Independent Domination. IEEE Access 7: 72604-72612 (2019) - [j16]Zehui Shao, Huiqin Jiang, Pu Wu, Shaohui Wang, Janez Zerovnik, Xiaosong Zhang, Jia-Bao Liu:
On 2-rainbow domination of generalized Petersen graphs. Discret. Appl. Math. 257: 370-384 (2019) - [j15]Shaohui Wang, Yanxuan Zhang, Huaqun Wang, Fu Xiao, Ruchuan Wang:
抗内部关键词猜测攻击的高效公钥可搜索加密方案 (Efficient Public-key Searchable Encryption Scheme Against Inside Keyword Guessing Attack). 计算机科学 46(7): 91-95 (2019) - [c26]Shaohui Wang, Yanxuan Zhang, Changbo Ke, Fu Xiao, Ruchuan Wang:
Optimal Key-Tree for RFID Authentication Protocols with Storage Constraints. SciSec 2019: 278-292 - 2018
- [j14]Qun Liu, Jia-Bao Liu, Shaohui Wang:
Resistance Distance and Kirchhoff Index of the Corona-Vertex and the Corona-Edge of Subdivision Graph. IEEE Access 6: 55673-55679 (2018) - [j13]Shaohui Wang, Chunxiang Wang, Jia-Bao Liu:
On extremal multiplicative Zagreb indices of trees with given domination number. Appl. Math. Comput. 332: 338-350 (2018) - [j12]Zehui Shao, Jin Xu, Seyed Mahmoud Sheikholeslami, Shaohui Wang:
The Domination Complexity and Related Extremal Values of Large 3D Torus. Complex. 2018: 3041426:1-3041426:8 (2018) - [j11]Jia-Bao Liu, Jing Zhao, Shaohui Wang, Muhammad Javaid, Jinde Cao:
On the Topological Properties of the Certain Neural Networks. J. Artif. Intell. Soft Comput. Res. 8(4): 257-268 (2018) - 2017
- [j10]Wei Gao, Mohammad Reza Farahani, Shaohui Wang, Mohamad Nazri Husin:
On the edge-version atom-bond connectivity and geometric arithmetic indices of certain graph operations. Appl. Math. Comput. 308: 11-17 (2017) - [j9]Yinhu Zhai, Jia-Bao Liu, Shaohui Wang:
Structure Properties of Koch Networks Based on Networks Dynamical Systems. Complex. 2017: 6210878:1-6210878:7 (2017) - [j8]Chunxiang Wang, Jia-Bao Liu, Shaohui Wang:
Sharp upper bounds for multiplicative Zagreb indices of bipartite graphs with given diameter. Discret. Appl. Math. 227: 156-165 (2017) - [j7]Shaohui Wang, Chunxiang Wang, Lin Chen, Jia-Bao Liu:
On extremal multiplicative Zagreb indices of trees with given number of vertices of maximum degree. Discret. Appl. Math. 227: 166-173 (2017) - [j6]Xiaomei Cao, Haishan Chen, Shaohui Wang:
基于多重映射的安全S盒构造方法 (Method to Construct Secure S-boxes Based on Multimap). 计算机科学 44(7): 107-110 (2017) - 2016
- [j5]Shaohui Wang, Bing Wei:
Multiplicative Zagreb indices of cacti. Discret. Math. Algorithms Appl. 8(3): 1650040:1-1650040:15 (2016) - [j4]Shaohui Wang, Jihong Jiang, Fu Xiao:
基于重路由匿名通信系统的设计 (New Design of Rerouting-based Anonymous Communication System). 计算机科学 43(10): 154-159 (2016) - [c25]Shaohui Wang, Tian Liu, Fu Xiao, Ruchuan Wang:
Privacy-preserving k-NN computation over encrypted cloud data without key sharing. CCIS 2016: 398-403 - [c24]Djoko Sigit Sayogo, Shaohui Wang, Sri Budi Cantika Yuli:
The Values of Public Library in Promoting an Open Government Environment. DG.O 2016: 481-490 - [i6]Yinhu Zhai, Jia-Bao Liu, Shaohui Wang:
Structure Properties of Koch Networks Based on Networks Dynamical Systems. CoRR abs/1610.03705 (2016) - 2015
- [j3]Shaohui Wang, Bing Wei:
Multiplicative Zagreb indices of k-trees. Discret. Appl. Math. 180: 168-175 (2015) - [j2]Shaohui Wang, Sujuan Liu, Dan-wei Chen:
Security Analysis and Improvement on Two RFID Authentication Protocols. Wirel. Pers. Commun. 82(1): 21-33 (2015) - [c23]Shaohui Wang, Yoann Geoffroy, Gregor Gößler, Oleg Sokolsky, Insup Lee:
A Hybrid Approach to Causality Analysis. RV 2015: 250-265 - 2014
- [j1]Shaohui Wang, Zhijie Han, Sujuan Liu, Dan-wei Chen:
Security analysis of two lightweight RFID authentication protocols. Ann. des Télécommunications 69(5-6): 273-282 (2014) - 2013
- [c22]Shaohui Wang, Suqin Chang:
Construction of Lightweight Certificate-Based Signature and Application in Cloud Computing. CWSN 2013: 61-70 - [c21]Shaohui Wang, Anaheed Ayoub, Radoslav Ivanov, Oleg Sokolsky, Insup Lee:
Contract-based blame assignment by trace analysis. HiCoNS 2013: 117-126 - [c20]Shaohui Wang, Anaheed Ayoub, BaekGyu Kim, Gregor Gößler, Oleg Sokolsky, Insup Lee:
A Causality Analysis Framework for Component-Based Real-Time Systems. RV 2013: 285-303 - [i5]Shaohui Wang, Fu Xiao, Dan-wei Chen, Ruchuan Wang:
Security Analysis of Lightweight Authentication Protocol from WISTP 2013. IACR Cryptol. ePrint Arch. 2013: 411 (2013) - 2012
- [c19]Shaohui Wang, Sujuan Liu, Dan-wei Chen:
Analysis and Construction of Efficient RFID Authentication Protocol with Backward Privacy. CWSN 2012: 458-466 - [i4]Shaohui Wang, Zhijie Han, Sujuan Liu, Dan-wei Chen:
Security Analysis of RAPP An RFID Authentication Protocol based on Permutation. IACR Cryptol. ePrint Arch. 2012: 327 (2012) - [i3]Shaohui Wang, Dan-wei Chen, Zhi-Wei Wang, Suqin Chang:
Public Auditing for Ensuring Cloud Data Storage Security With Zero Knowledge Privacy. IACR Cryptol. ePrint Arch. 2012: 365 (2012) - [i2]Shaohui Wang, Sujuan Liu, Dan-wei Chen:
Analysis and Construction of Efficient RFID Authentication Protocol with Backward Privacy. IACR Cryptol. ePrint Arch. 2012: 391 (2012) - 2011
- [c18]Shaohui Wang, Weiwei Zhang:
Passive Attack on RFID LMAP++ Authentication Protocol. CANS 2011: 185-193 - [c17]Shaohui Wang, Anaheed Ayoub, Oleg Sokolsky, Insup Lee:
Runtime Verification of Traces under Recording Uncertainty. RV 2011: 442-456 - 2010
- [c16]Gaoli Wang, Shaohui Wang:
Differential Fault Analysis on PRESENT Key Schedule. CIS 2010: 362-366 - [c15]Gaoli Wang, Shaohui Wang:
Improved Differential Cryptanalysis of Serpent. CIS 2010: 367-371 - [c14]Shaohui Wang:
Research on mechanisms of providing electronic public services for information vulnerable groups in China. ICEGOV 2010: 295-300 - [c13]Eunkyoung Jee, Shaohui Wang, Jeong-Ki Kim, Jaewoo Lee, Oleg Sokolsky, Insup Lee:
A Safety-Assured Development Approach for Real-Time Software. RTCSA 2010: 133-142
2000 – 2009
- 2009
- [c12]Gaoli Wang, Shaohui Wang:
Second Preimage Attack on 5-Pass HAVAL and Partial Key-Recovery Attack on HMAC/NMAC-5-Pass HAVAL. AFRICACRYPT 2009: 1-13 - [c11]Gaoli Wang, Shaohui Wang:
Preimage Attack on Hash Function RIPEMD. ISPEC 2009: 274-284 - [c10]Shubin Yan, Yingzhan Yan, Zhe Ji, Baohua Wang, Shaohui Wang, Guoqing Jiang, Jijun Xiong, Xiongying Ye, Zhaoying Zhou, Wendong Zhang:
A precise measurement of quality factor for Planar Microtoroid Resonators. NEMS 2009: 13-16 - [c9]Shubin Yan, Baohua Wang, Yingzhan Yan, Nini Hao, Shaohui Wang, Xiaohong Ren, Xiongying Ye, Zhaoying Zhou, Chenyang Xue, Jun Liu:
The analysis of microtoroid cavity coupling system based on fullwave. NEMS 2009: 991-995 - [c8]Jun Liu, Guoqing Jiang, Shubin Yan, Shaohui Wang, Yingzhan Yan, Yanfeng Jing, Jijun Xiong, Xiongying Ye, Zhaoying Zhou, Wendong Zhang:
Design of the miniature optical fiber voltage sensor. NEMS 2009: 1008-1012 - [c7]Vivien Chinnapongse, Insup Lee, Oleg Sokolsky, Shaohui Wang, Paul L. Jones:
Model-Based Testing of GUI-Driven Applications. SEUS 2009: 203-214 - 2008
- [c6]Guoyan Zhang, Shaohui Wang:
A Certificateless Signature and Group Signature Schemes against Malicious PKG. AINA 2008: 334-341 - [c5]Guoyan Zhang, Shaohui Wang:
Aggregate and Separate of Signatures in Wireless Network. AINA Workshops 2008: 428-433 - [c4]Shaohui Wang, Lihua Ma:
The Application of Blog in Modern Education. CSSE (4) 2008: 1083-1085 - [c3]Shaohui Wang:
Modification and Improvement on Group Signature Scheme without Random Oracles. ISECS 2008: 462-466 - 2007
- [c2]Yun Kong, Shaohui Wang, Chengwei Ma, Baoming Li, Yuncong Yao:
Effect of Image Processing of a Leaf Photograph on the Calculated Fractal Dimension of Leaf Veins. CCTA 2007: 755-760 - [c1]Yun Kong, Shaohui Wang, Yuncong Yao, Chengwei Ma:
Optimization of Position of Reflective Boards for Increasing Light Intensity Inside Chinese Lean-to Greenhouses. CCTA 2007: 1383-1389 - 2006
- [i1]Haina Zhang, Shaohui Wang, Xiaoyun Wang:
The Probability Advantages of Two Linear Expressions in Symmetric Ciphers. IACR Cryptol. ePrint Arch. 2006: 242 (2006)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint