default search action
Wenzhi Wang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j12]Jingxing Zhu, Guangyao Zhou, Feng Wang, Rui Liu, Yuming Xiang, Wenzhi Wang, Hongjian You:
Multitemporal SAR Images Change Detection Considering Ambiguous Co-Registration Errors: A Unified Framework. IEEE Geosci. Remote. Sens. Lett. 21: 1-5 (2024) - [j11]Wenzhi Wang, Yuqing Mao, Feng Duan:
The Design of a Layered Brain-Computer Interface System With Target Identification Module to Control Home Service Robot. IEEE Robotics Autom. Lett. 9(6): 5943-5949 (2024) - [j10]Shengqin Ma, Wenzhi Wang, Zongxu Pan, Yuxin Hu, Guangyao Zhou, Qiantong Wang:
A Recognition Model Incorporating Geometric Relationships of Ship Components. Remote. Sens. 16(1): 130 (2024) - [c16]Shoichi Naito, Wenzhi Wang, Paul Reisert, Naoya Inoue, Camélia Guerraoui, Kenshi Yamaguchi, Jungmin Choi, Irfan Robbani, Surawat Pothong, Kentaro Inui:
Designing Logic Pattern Templates for Counter-Argument Logical Structure Analysis. EMNLP (Findings) 2024: 11313-11331 - [c15]Irfan Robbani, Paul Reisert, Surawat Pothong, Naoya Inoue, Camélia Guerraoui, Wenzhi Wang, Shoichi Naito, Jungmin Choi, Kentaro Inui:
Flee the Flaw: Annotating the Underlying Logic of Fallacious Arguments Through Templates and Slot-filling. EMNLP 2024: 20524-20540 - [i3]Irfan Robbani, Paul Reisert, Naoya Inoue, Surawat Pothong, Camélia Guerraoui, Wenzhi Wang, Shoichi Naito, Jungmin Choi, Kentaro Inui:
Flee the Flaw: Annotating the Underlying Logic of Fallacious Arguments Through Templates and Slot-filling. CoRR abs/2406.12402 (2024) - 2023
- [c14]Camélia Guerraoui, Paul Reisert, Naoya Inoue, Farjana Sultana Mim, Keshav Singh, Jungmin Choi, Irfan Robbani, Shoichi Naito, Wenzhi Wang, Kentaro Inui:
Teach Me How to Argue: A Survey on NLP Feedback Systems in Argumentation. ArgMining@EMNLP 2023: 19-34 - [c13]Boyang Deng, Wenzhi Wang, Peng Shan:
Three-dimensional digital construction process method based on Hongshan cultural relics. ICAICE 2023: 331-336 - [c12]Wenzhi Wang, Na Wang:
A load balancing scheme of concurrent Internet of Things terminal equipment based on p-probability delay. ICCEIC 2023: 240-243 - [i2]Camélia Guerraoui, Paul Reisert, Naoya Inoue, Farjana Sultana Mim, Shoichi Naito, Jungmin Choi, Irfan Robbani, Wenzhi Wang, Kentaro Inui:
Teach Me How to Improve My Argumentation Skills: A Survey on Feedback in Argumentation. CoRR abs/2307.15341 (2023) - 2022
- [j9]Wenzhi Wang, Songling Huang, Jinghua Zhang, Yue Long, Shen Wang, Wei Zhao:
Characterization of Clustered Cracks at Weld Root Based on Uniform-Magnetic-Field Distortion Measurement. IEEE Trans. Instrum. Meas. 71: 1-10 (2022) - 2021
- [j8]Yu-an Zhang, Zijie Sun, Chen Zhang, Shujun Yin, Wenzhi Wang, Rende Song:
Body weight estimation of yak based on cloud edge computing. EURASIP J. Wirel. Commun. Netw. 2021(1): 6 (2021) - [j7]Fang Wang, Lei Fang, Xuehua Peng, Min Wu, Wenzhi Wang, Wenhan Zhang, Baiqu Zhu, Miao Wan, Xin Hu, Jianbo Shao:
Bias field correction for improved compressed sensing reconstruction in parallel magnetic resonance imaging. Signal Image Video Process. 15(4): 687-693 (2021) - [j6]Wenzhi Wang, Songling Huang, Wei Zhao:
A 3-D Imaging Method for Local Shallow Defects on the Surface of Ferromagnetic Materials. IEEE Trans. Instrum. Meas. 70: 1-9 (2021) - [c11]Wenzhi Wang, Meng Fan, Aimin Yu, Dan Meng:
BOFSanitizer: Efficient locator and detector for buffer overflow vulnerability. HPCC/DSS/SmartCity/DependSys 2021: 1075-1083 - [c10]Yue Long, Songling Huang, Lisha Peng, Wenzhi Wang, Shen Wang, Wei Zhao:
Internal and External Defects Discrimination of Pipelines Using Composite Magnetic Flux Leakage Detection. I2MTC 2021: 1-6 - [c9]Wenzhi Wang, Songling Huang, Lisha Peng, Yue Long, Shen Wang, Wei Zhao:
An Improved MFL Method Fusing Multi-Space Magnetic Field Information for The Surface Defect Inspecting. I2MTC 2021: 1-6 - [c8]Meng Fan, Wenzhi Wang, Aimin Yu, Dan Meng:
TDCT: Target-Driven Concolic Testing Using Extended Units by Calculating Function Relevance. ICA3PP (3) 2021: 196-213 - [c7]Wenzhi Wang, Meng Fan, Aimin Yu, Dan Meng:
Towards Heap-Based Memory Corruption Discovery. MSN 2021: 502-511 - [c6]Meng Fan, Wenzhi Wang, Aimin Yu, Dan Meng:
FCEP: A Fast Concolic Execution for Reaching Software Patches. SEKE 2021: 510-515 - 2020
- [j5]Jiewen Geng, Peng Hu, Zhe Ji, Chuanjie Li, Li Li, Jie Shen, Xue Feng, Wenzhi Wang, Guangming Yang, Jianjun Li, Hongqi Zhang:
Accuracy and reliability of computer-assisted semi-automated morphological analysis of intracranial aneurysms: an experimental study with digital phantoms and clinical aneurysm cases. Int. J. Comput. Assist. Radiol. Surg. 15(10): 1749-1759 (2020) - [c5]Wenzhi Wang, Songling Huang, Lisha Peng, Shen Wang, Wei Zhao:
Identifying Surface Defect Opening Profiles Based on the Uniform Magnetic Field Distortion. I2MTC 2020: 1-6 - [c4]Chen Zhang, Qiao Meng, Zijie Sun, Yuan Zhang, Wenzhi Wang, Shujun Yin:
Research on a road target detection method based on improved YOLOv3. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2020: 654-660
2010 – 2019
- 2019
- [j4]Mingyao Liu, Wenzhi Wang, Han Song, Shiguang Zhou, Weijian Zhou:
A High Sensitivity FBG Strain Sensor Based on Flexible Hinge. Sensors 19(8): 1931 (2019) - 2018
- [c3]Zairang Zhao, Xianmei Lang, Wenzhi Wang, Guixi Xiong:
Traffic detection algorithm based on outlier mining. ICBDT 2018: 40-43 - 2017
- [i1]Hongkai Wang, Zongwei Zhou, Yingci Li, Zhonghua Chen, Peiou Lu, Wenzhi Wang, Wanyu Liu, Lijuan Yu:
Comparison of machine learning methods for classifying mediastinal lymph node metastasis of non-small cell lung cancer from 18F-FDG PET/CT images. CoRR abs/1702.02223 (2017) - 2014
- [j3]Shu Tang, Weiguo Gong, Weihong Li, Wenzhi Wang:
Non-blind image deblurring method by local and nonlocal total variation models. Signal Process. 94: 339-349 (2014) - [c2]Weiguo Gong, Wenzhi Wang, Weihong Li, Shu Tang:
Temporal Consistency Based Method for Blind Video Deblurring. ICPR 2014: 861-864 - 2013
- [j2]Chao Zhang, Wieslaw K. Binienda, Frank E. Horvat, Wenzhi Wang:
Application of Numerical Methods for Crashworthiness Investigation of a Large Aircraft Wing Impact with a Tree. Math. Comput. For. Nat. Resour. Sci. 5(1): 71-85 (2013) - [c1]Yunfang Tai, Wanwei Cai, Qi Liu, Ge Zhang, Wenzhi Wang:
Comparisons of Memory Virtualization Solutions for Architectures with Software-Managed TLBs. NAS 2013: 125-130 - 2012
- [j1]Quansheng Xu, Kangning Xie, Kehong Yuan, Lijuan Yu, Wenzhi Wang, Datian Ye:
A statistical study of the factors influencing the extent of respiratory motion blur in PET imaging. Comput. Biol. Medicine 42(1): 8-18 (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-23 19:27 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint