dblp: Xiangkun Wang (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches




This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2026

[j13]

Jie Zhang, Yanhua Li, Xiaocao Ouyang, Linbo Xiong, Xiangkun Wang, Jingkai Wang, Xin Yang, Tianrui Li:
Federated open intent classification via granular-ball knowledge representation. Neural Networks 200: 108817 (2026)

[j12]

Xiangkun Wang
, Kejiang Chen
, Jiansong Zhang
, Weiming Zhang
, Nenghai Yu
:
Leveraging Fluctuations of Black-Box Generative Models for Secure Deep Image Steganography. IEEE Trans. Dependable Secur. Comput. 23(2): 3357-3371 (2026)
- 2025

[j11]

Xuemei Cao
, Xiangkun Wang
, Haoyang Liang
, Bingjun Wei
, Xin Yang:
Open continual sampling with hypersphere knowledge transfer for rapid feature selection. Appl. Soft Comput. 170: 112664 (2025)

[j10]

Xiangkun Wang, Kaibo Shi
, Wenhao Wang, Xiao Cai, Sheng Han:
Non-fragile Proportional Integral Control Strategy via AETM for T-S Fuzzy Power System with Reaction-Diffusion and Controller Failure. Int. J. Fuzzy Syst. 27(4): 1127-1141 (2025)

[j9]

Yonghao Li
, Xiangkun Wang
, Xin Yang
, Wanfu Gao, Weiping Ding
, Tianrui Li
:
Fusion-enhanced multi-label feature selection with sparse supplementation. Inf. Fusion 117: 102813 (2025)

[j8]

Xiangkun Wang, Li Cao, Zhengwei Zhang, Yinggao Yue
, Tao Zhang, Zihui Wang:
Coverage optimization strategy for 3D wireless sensor network based on adaptive inertia weight Arctic Puffin Optimization Algorithm. J. Comput. Des. Eng. 12(11): 81-109 (2025)

[j7]

Jingkai Wang, Xiangkun Wang, Jiafen Liu, Xiaocao Ouyang
, Yanhua Li, Jie Zhang, Xin Yang:
Robust open intent classification in many-shot and few-shot scenarios. Neural Networks 192: 107964 (2025)

[j6]

Xiangkun Wang, Kejiang Chen
, Yuang Qi
, Ruiheng Liu, Weiming Zhang
, Nenghai Yu
:
GIFDL: Generated Image Fluctuation Distortion Learning for Enhancing Steganographic Security. IEEE Trans. Inf. Forensics Secur. 20: 4581-4594 (2025)

[c5]

Guannan Lai, Yujie Li, Xiangkun Wang, Junbo Zhang, Tianrui Li, Xin Yang:
Order-Robust Class Incremental Learning: Graph-Driven Dynamic Similarity Grouping. CVPR 2025: 4894-4904

[c4]

Xuemei Cao
, Hanlin Gu
, Xin Yang
, Bingjun Wei
, Haoyang Liang
, Xiangkun Wang
, Tianrui Li
:
ErrorEraser: Unlearning Data Bias for Improved Continual Learning. KDD (2) 2025: 119-130

[c3]

Yujie Li
, Xiangkun Wang
, Xin Yang, Marcello M. Bonsangue
, Junbo Zhang
, Tianrui Li
:
Improving Open-world Continual Learning under the Constraints of Scarce Labeled Data. KDD (2) 2025: 1647-1658

[i9]

Guannan Lai, Yujie Li, Xiangkun Wang, Junbo Zhang, Tianrui Li, Xin Yang:
Order-Robust Class Incremental Learning: Graph-Driven Dynamic Similarity Grouping. CoRR abs/2502.20032 (2025)

[i8]

Yujie Li, Xiangkun Wang, Xin Yang, Marcello M. Bonsangue, Junbo Zhang, Tianrui Li:
Improving Open-world Continual Learning under the Constraints of Scarce Labeled Data. CoRR abs/2502.20974 (2025)

[i7]

Xiangkun Wang, Kejiang Chen, Yuang Qi, Ruiheng Liu, Weiming Zhang, Nenghai Yu:
GIFDL: Generated Image Fluctuation Distortion Learning for Enhancing Steganographic Security. CoRR abs/2504.15139 (2025)

[i6]

Xuemei Cao, Hanlin Gu, Xin Yang, Bingjun Wei, Haoyang Liang, Xiangkun Wang, Tianrui Li:
ErrorEraser: Unlearning Data Bias for Improved Continual Learning. CoRR abs/2506.09347 (2025)

[i5]

Yixiao Liu, Yizhou Yang, Jinwen Li, Jun Tao, Ruoyu Li, Xiangkun Wang, Min Zhu, Junlong Cheng:
LG-CD: Enhancing Language-Guided Change Detection through SAM2 Adaptation. CoRR abs/2509.21894 (2025)

[i4]

Wei Fan, Kejiang Chen, Xiangkun Wang, Weiming Zhang, Nenghai Yu:
WavInWav: Time-domain Speech Hiding via Invertible Neural Network. CoRR abs/2510.02915 (2025)
- 2024

[j5]

Yanhua Li, Jiafen Liu, Longhao Yang, Chaofan Pan
, Xiangkun Wang, Xin Yang
:
Three-way open intent classification with nearest centroid-based representation. Inf. Sci. 681: 121251 (2024)

[c2]

Yujie Li
, Xin Yang, Hao Wang, Xiangkun Wang, Tianrui Li:
Learning to Prompt Knowledge Transfer for Open-World Continual Learning. AAAI 2024: 13700-13708
- 2023

[j4]

Xiaolong Zhou
, Xiangkun Wang, Haotian Wang, Zhongyuan Xing, Zhilun Yang, Linlin Cao
:
Method for Denoising the Vibration Signal of Rotating Machinery through VMD and MODWPT. Sensors 23(15): 6904 (2023)

[i3]

Yujie Li, Xin Yang, Hao Wang, Xiangkun Wang, Tianrui Li:
Learning to Prompt Knowledge Transfer for Open-World Continual Learning. CoRR abs/2312.14990 (2023)
- 2022

[j3]

Zhangqiang Ming
, Min Zhu, Xiangkun Wang, Jiamin Zhu
, Junlong Cheng
, Chengrui Gao
, Yong Yang, Xiaoyong Wei
:
Deep learning-based person re-identification methods: A survey and outlook of recent works. Image Vis. Comput. 119: 104394 (2022)
- 2021

[i2]
Zhangqiang Ming, Yong Yang, Xiaoyong Wei, Jianrong Yan, Xiangkun Wang, Fengjie Wang, Min Zhu:
Global-Local Dynamic Feature Alignment Network for Person Re-Identification. CoRR abs/2109.05759 (2021)
[i1]
Zhangqiang Ming, Min Zhu, Xiaoyong Wei, Xiangkun Wang, Jiamin Zhu, Junlong Cheng, Yong Yang:
Deep learning-based person re-identification methods: A survey and outlook of recent works. CoRR abs/2110.04764 (2021)
2010 – 2019
- 2019

[j2]

Xin Chen, Zhuo Li, Ying Chen, Xiangkun Wang
:
Performance Analysis and Uplink Scheduling for QoS-Aware NB-IoT Networks in Mobile Computing. IEEE Access 7: 44404-44415 (2019)

[j1]

Zhuo Li, Xin Chen, Lulu Li, Xiangkun Wang:
Joint routing and scheduling for transmission service in software-defined full-duplex wireless networks. Peer-to-Peer Netw. Appl. 12(2): 422-429 (2019)
- 2018

[c1]

Xiangkun Wang, Xin Chen, Zhuo Li, Ying Chen:
Access Delay Analysis and Optimization of NB-IoT Based on Stochastic Network Calculus. SmartIoT 2018: 23-28

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:


